Monday, September 30, 2019

Marketing research report: using SPSS indentify case study Essay

The Questionnaire having 19 key questions to extract consumer’s perception about Auto Online website and the important factors which motivated for consumer to buy online. The research objective is try to identify the important factors motivating to buy online, for consumers and to take action plans further to improve consumer’s needs. The survey mainly concentrating on the following aspects; Consumer’s view on use of Internet, Awareness of Auto Online website, Security, Convenience while making a purchase etc. All these questions were asked on 1 to 5 Ratings scale, so the data collected on 19 factors is an ordinal. The labels taken as Strongly Disagree (1) to Strongly Agree (5) for all the variables: The most prominent way of analyzing these type of data in Descriptive Statistics is Frequency Tables and Cross Tabulations, also Top 2 Box scores for important factors; where Top 2 Box scores is the Percent of respondents for any particular question answered the Top 2 responses, i.e. Strongly Agree and Agree. It will be the best measure to interpret the respective attribute (In terms of Percentages). The important thing to be consider when interpreting the Ordinal Data is that it does not make any significance if we calculate the average forms like Mean or Median. Below are the Frequency Tables which are basically about how consumer thinks about Internet and Making purchase decisions etc. Marketing research report: using SPSS indentify case study 3 Executive Summary: Auto Online is a very â€Å"convenient† website and motivating respondent to buy products online. Most of the respondents aware about Auto Online through web surfing or any search engine. It will be very good if Auto Online website get innovative so that the overall experience with the site will be stronger than what know it is; since consumer is surfing the net as he is looking more information about Automobile products and he can reduce the strain with dealing car salesmen. Analysis and Interpretation: The following tables are the frequency tables for the questions, in what way the internet would be used by the respondent. Here the key questions for Auto Online are â€Å"I use the internet to research purchases I make†, â€Å"The Internet is a good tool to us when researching an automobile†, The Internet should not be used to purchase vehicles† and â€Å"Online dealership are just another way of getting you into the traditional dealership†. Where no single important factor got more than 50% of respondent saying whether â€Å"strongly agree† or â€Å"agree†. So on average a respondent is using internet to research automobile and of course it does not turning him to purchase online, they are thinking that they should not purchase automobiles on line. Since the Percent of respondents for â€Å"The Internet should not be used to purchase vehicles†Ã‚   got only 40% of Top2 Box Score. So on average not more than 40% of respondents turning their Internet use into online purchase for any automobile products. Following tables are the frequency tables on consumer’s perception about buying a new vehicle and don’t like to hassle with car salesmen.

Sunday, September 29, 2019

Nietzsche and the Nazis Essay

The word â€Å"Nazi† has been recalled with feelings of regret, fear, horror and the threat of violent crimes throughout human history. However, nothing can conceal or change the reality of the period of Nazi Weltanschauung and its consequences for humanity and culture. It was a deep refreshment of German souls as the Aryan race and a collective movement of intellectuals, writers and social leaders in support of Christian and Protestant society against Jews. Nevertheless, the appealing eccentricity of the growing ideology among anti-Semite writers and thinkers very much attracted the attention of the Nazis. They examined the complex philosophical works of Nietzsche, Hegel, Fichte, Treitschke, and Huston Stewart Chamberlain, and ultimately concluded with the hard philosophy of Nazism, including racist, nationalistic, and anti-Semitic attitudes (Aschheim, 1992, p. 123). It was not very difficult for Nazis to find a way to utilize many intellectuals’ ideal systems, philosophies and literature as they proceeded in the way that led to the holocaust and racial genocide. For instance, Wagner hated Jews, thus, his operas contained myths, fighting, pagan gods, heroes and demons. As an artist, Wagner had bred the growing hunger of anti-Semitism with his art to a great extent. Besides Wagner, Huston Stewart Chamberlain, the British author who was the composer Richard Wagner’s son-in-law, deeply influenced Hitler with his fundamentally racist text â€Å"Foundations of the 19th Century,† and understanding this helps to explain why the Holocaust took place (Harms, 2001). Nonetheless, Hegel believed that the state was everything and war was a great purifier. Thus, the idea of restoring the ethical health of people was borrowed from Hegel’s philosophy by the Nazis. On the other hand, politicians like Georg von Schà ¯Ã‚ ¿Ã‚ ½nerer, a German nationalist and a strong anti-Semite, and Karl Lueger, the mayor of Vienna, supported Nazi Weltanschauung from the heart by their political policies and notions. However, unlike the other cultural icons Nazis utilized, the relationship between Nietzsche and the Nazis developed in an odd, but widely effective manner. Nietzsche’s influence as a philosopher and a writer was apparently limited to his closest friends and some intellectuals in Austria, France and Denmark (Canada, 1997). His books were not widely read or considered by publishers. However, after becoming insane by the end of the 1890s, his fame immediately spread around Europe and he became a figure of considerable importance in German history. Macintyre states in his book â€Å"The Forgotten Fatherland† (as cited in Canada, 1997) that Nietzsche’s name started to appear in popular German journals and newspapers as well as numerous books, which collectively promoted him as the â€Å"philosopher of the time, whose influence is stirring the entire cultural world.† This shift in the attitude toward Nietzsche and his work was a bit because of the ideological movement from rationalism and empiricism to romanticism during the end of the eighteenth century and the beginning of the nineteenth century, according to Hinton’s â€Å"Nietzsche in German Politics and Society† (as cited in Canada, 1997). Consequently, suffering the subjugation of Napoleon as well as witnessing the growing strength of the West, the German population, experiencing a sense of inferiority, attempted to assure itself of its innate superiority by glorifying its history and culture with no doubts, according to the point of view Kohn (as cited in Canada, 1997). At this point, Nietzsche’s mental â€Å"death† made him a prime target for this German myth-making project. Nietzsche and his philosophy’s affiliation with the Nazi movement occurred as a product of the need for raw material to build a new valid consciousness for humanity under the unity of a superior nation. Hitler and other Nazi leaders made use of Nietzschean philosophy wherever possible. In other words, Nietzsche’s philosophy was a â€Å"blueprint† for the Nazis’ war, and they took Nietzsche’s logic to drive the atheistic world view to its legitimate conclusion (Krueger, 2001). Nietzschean phrases and themes, such as â€Å"lords of the earth, the will to power, herd instinct,† were most often used in public speeches, and written expressions of Nazi leaders, furthermore, appeared even in Hitler’s book, â€Å"Mein Kampf,† many times. Nietzsche’s open-ended philosophy gave big opportunities to Nazis as a means of support for their war. For instance, in â€Å"The Will to Power,† Nietzsche exclaims (as cited in DeLong, 1959): â€Å"A daring and ruler race is building itself up†¦. The aim should be to prepare a transvaluation of values for a particularly strong kind of man, most highly gifted in intellect and will. This man and the elite around him will become the ‘lords of the earth.'† Ultimately, the idea of superior German nation, the idea of superior individuals – overmans, in other words – as members of that nation and the idea of exerting extreme power over others that were inferior and weak, emerged as the fundamental codes of Nazi culture, and keywords for their aim. Nietzsche played a key role in the development and preservation of the cultural and ideological foundations of the Nazis (Canada, 1997). In short, in terms of political culture, with his peculiarity; Nietzsche had a significant role in German history by having an important effect on the Nazi movement. As Crane Brinton states (cited in Geib, 2001), Nietzsche called for the superman; Mussolini and Hitler answered the call. Nazis and other anti-Semites perceived Jews as scapegoats in every situation, even for their own personal failings. They never forgave the Jews for possessing â€Å"spirit† and money, and named them as underprivileged (Canada, 1997). This notion was very similar to the one that Nietzsche used to describe his overman in â€Å"Thus Spoke Zarathustra† (1967): â€Å"For that man be delivered from revenge that is for me the bridge to the highest hope and a rainbow after long storms† (127). At this point, it is clear that, according to the point of view of the Nazis, Nietzsche’s open-ended philosophy was working for them and their goal, while making Nazis’ ideologies concrete and reliable. The Nietzschean overman was the model of the Aryan race, which was destined to conquer other lesser races in the global struggle for racial supremacy (Canada, 1997). Nietzschean â€Å"heroic idealism† embodied the virtues of hardness, masculinity, leadership, courage, power, struggle, and the various other characteristics promoted by the Nazis. By introducing the overman to humanity, Nietzsche advised people to challenge themselves, not to live passively. It was a good reason for anti-Semites to take action and responsibility in the way that led toward creating a higher against reproducing a lower. Having a great willingness to be powerful in order to take possession of the life and destiny of a superior race, Nazis needed the cooperating hand and inspiration of Nietzsche’s philosophy, and Nietzschean themes and phrases, such as â€Å"the will to power.† Because Nietzsche cried out for the survival of the strongest, thus, a strong world while building his philosophy and creating the overman, at the same time, he supplied Nazis with a strong argument that they later used to reinforce their ideological system and movement. As Nietzsche exclaimed for the masters and slave morality, anti-Semites perceived themselves as the master of the world, commanding the rest as humiliated slaves. They treated people other than anti-Semites as dangerous creatures or obstacles threatening the cultural and racial superiority of the Aryan state. By exerting force on them, Nazis kept themselves safe from the misfortune and curse of declining Jews. They stepped forward in every situation that gave them the chance to realize the Nietzschean slogan: â€Å"Whatever does not kill me makes me stronger.† Moreover, they preferred war and courage to charity, with the illumination of the Nietzschean phrase, â€Å"Ye shall love peace as a means to new wars† (as cited in DeLong, 1959). They fought for years, lived dangerously and tried to become â€Å"hard† in terms of the Nietzschean will to power. War against the lower to attain the higher was a kind of ritual for the purpose of the Nazi movement. Besides all the inner attractive forces of Nietzsche’s philosophy for the Nazis, Nietzsche’s Sister Elizabeth (who was a radical anti-Semite), had a vital influence in the affiliation of Nietzsche and the Nazis. She interpreted everything in Nietzsche’s philosophy as creating a perfect accord with Nazi ideologies and values. In other words, she served Nietzsche’s philosophy on the ideological plates of the Nazi leaders as the main food of their meal. After the death of Nietzsche, Elizabeth took over the control of Nietzschean ideas and themes, and immediately hurled them upon the Jews with ideal appropriations she could succeed in making legitimate. For instance, as Kaufmann states, Elizabeth published new editions that incorporated her own introductions, which were intended to explain those passages that seemed antagonistic to the pro-German image of Nietzsche she was attempting to create. In many instances, Elisabeth rearranged material and included new passages in her editions of her brother’s work (as cited in Canada, 2001). In short, Elizabeth reflected Nietzsche as a German patriot and a heroic warrior in the Nazi movement (Aschheim, 1992, p. 47-48). After all, Elizabeth Nietzsche became an important icon for the Nazis as both the sister and a wonderful follower of Nietzsche. Rosenberg’s elaborate funeral service for â€Å"Zarathustra’s sister† was the best example of Elizabeth Nietzsche’s importance. On the other hand, anti-Semitism was the mainstay of the Nazi movement, and the structure of the Nazi movement was shaped completely according to the spirit of anti-Semitism. The Nazis built their education and jurisprudence system upon the basis of the Nietzschean philosophy. â€Å"Heroic idealism† and â€Å"the will to power† were the basic themes of the Nazi education system, where they perceived Nietzsche as their teacher (Aschheim, 1992, p.234). In this way, the objective of education was fairly clear: Nazis wanted to manufacture efficient, clever, and brave soldiers and leaders of tomorrow’s Germany. Under the direction of Rosenberg, Hitler’s appointed supervisor of German educational activities, along with Bernhard Rust, the Reich Minister of Education, the Nazi educational system was inundated with Nietzschean literature. Parts from such works as â€Å"Thus Spoke Zarathustra,† â€Å"Beyond Good and Evil,† and â€Å"The Will to Power† were heavily integrated into the school system as required reading (Aschheim, 1992, p.245). Too much of Nietzschean strong, meaningful, encouraging phrases and slogans like â€Å"whatever does not kill me makes me stronger† or â€Å"I have a why of living and can put up with any how† were repeated continuously and drawn into the mainstream thought of Nazi youth. Besides the influence of Nietzschean doctrines in the education system, the jurisprudence and judgment system were inspired by Nietzsche’s philosophy, as well. Hans Frank, the Reich Commissioner for Justice, once commented, â€Å"Both personally and objectively, it is of importance to me that Nietzsche of all people has become the mentor of German jurisprudence† (as cited form Macintyre in Canada, 2001) As in the case of education, thoughts and writings of Nietzsche were altered and appropriated to the Nazi’s legal and judicial objectives. In terms of these, violent punishments of anti-Semites were understood as being advocated in the words of Nietzsche’s philosophy. For instance, having experienced life in the concentration camps of the Nazis, Dr. Victor Frankl asserted (as cited in Geib), â€Å"I am absolutely convinced that the gas chambers of Auschwitz, Treblinka and Maidanek were ultimately prepared not in some ministry or other in Berlin, but rather at the desks and in the lecture halls of nihilistic scientists and philosophers.† As it is clear in the preceding quotation, the educational system based on Nietzschean doctrines was inevitably one of the main points of argument for the reasons of genocide and other violent acts committed by Nazis. Without a question, Nietzsche was perceived by the Nazis as being the intellectual and spiritual pillar of their regime (Canada, 1997). Such a creative policy gave the Nazis an intellectual justification and respectability to their ideology, while being the source of legitimization to their actions as well. Perhaps the most telling explanation of Kohn (as cited in Canada, 1997) concerning the Nazis’ motivation for appropriating Nietzsche, was that the former were attempting to create a mythical continuity in German history that would serve as a means for legitimizing the Nazi Weltanschauung.. As a result, with the great desire of being the biggest power not only in Germany, but also in the rest of the world, the Nazis made use of everything that would serve their purposes. And building upon a philosophical basis of a very appropriable scheme of Nietzsche, Nazis managed to draw their political culture upon vital foundations of one of the turning points of German history.    Bibliography Aschheim, S. E. (1992). The Nietzsche Legacy in Germany, 1890-1990. Berkeley: University of California Press. Canada, G. (2001). Nietzsche and the Third Reich. In Nietzsche [online]. Available: http://student.vwc.edu/~phialpha/%5CGreg.html (December 8. 2001). DeLong, J. B. (1998). William L. Shirer’s Take On The Relationship Between Friedrich Nietzsche and The Nazis. In Nietzsche and Hitler [online]. Available: http://econ161.berkeley.edu/TCEH/Nietzsche.html (December 12, 2001) Geib, R. J. (2001) Frederick Nietzsche: Religion, Imagery and Politics [online]. Available: http://www.rjgeib.com/thoughts/nietzsche/nietzsche.html (December 1, 2001). Harms, W. (2001) Bernard Silberman. In University of Chicago Quantrell Award Winner Bernard Silberman [online]. Available: http://www-news.uchicago.edu/resources/quantrell/silberman.html (December 7, 2001). Krueger, D. (1997). A Review of Zacharias’s A Shattered Visage: The Real Face of Atheism. In That Colossal Wreck [online]. Available: http://www.infidels.org/library/modern/doug_krueger/colossal.html (December 12, 2001). Nietzsche, F. W. (1967). Thus Spoke Zarathustra. New York: Heritage Press.

Saturday, September 28, 2019

The Memo Every Woman Keeps in Her Desk

Case Analysis: The Memo Every Woman Keeps in Her Desk Introduction In this case study, Liz Ames has come up against an all too common problem in business today: gender bias. Effectively managing racial, ethnic and gender diversity is not just a human resources issue; it is a serious business issue. Background The recent departure of several senior-level women at Vision Software has significantly elevated Liz’s concern for gender bias at the company. She has arrived at a point where she feels compelled to communicate her frustration to their CEO, John Clark. She has experienced some uncertainty on whether or not she should send him a memo, and has asked for advice from a colleague whom she trusts. Problem Statement Liz’s male colleague seems to be considering only whether or not he should advise Liz to send or not send the memo. The issue here is not whether Liz should communicate her message to Clark, but how and when she should communicate that message. As her colleague examines his options for counseling and supporting her, he should carefully consider how best he can help communicate the importance of addressing gender diversity at Vision Software. Analysis and Issues When the senior-level women at Vision resigned, it seems from the information in Liz’s memo that people assumed that they were choosing family over a career and therefore, management believed there was nothing that the company could have done to retain these women. However, these women may have left for better opportunities, potentially with competitors. Vision’s obvious costs of losing these employees include the loss of investment made in recruiting and training them as well as the cost of recruiting and training their replacements. Yet, the hidden cost of employee turnover is possibly even more devastating. These hidden costs include the loss of intellectual capital and the potential for the former employee to become a competitor; potential disruption in the continuity of Vision’s customer service and the associated dissatisfaction and potential loss of market share; and the negative impact on the morale, motivation and productivity of the remaining employees. If Clark is just starting to recognize the high cost of losing these seasoned employees, he should be receptive to Liz’s message and wide open to strategies for resolving the issue. However, it would most likely be a mistake for Liz to communicate the message in a memo that she alone has authored. The one-way communication channel afforded by a memo does not provide Liz with the ability to tweak her message on the fly as she receives feedback from Clark. Recommendations Liz absolutely needs to communicate the important points of her memo to Clark, but this is far too important and complex of a subject to effectively address in a memo. A subject of this level of importance and involvement is much better suited for interactive communication. Liz’s colleague should advise her to work with him and other like-minded co-workers to develop a strong business case for gender diversity that will effectively persuade Clark, convincing him that Vision will lose out on the best executives, senior-level talent and potentially new business and customers if it continues to operate in an environment of exclusionism. Then, taking it a step further, they need to convince Clark that Vision will be able to capitalize on diversity by integrating it into their business strategy and company culture. Clark needs to be able to relate to their cause and adopt it as his own. They should be sure that Clark understands that women are a rapidly growing and highly educated group from which Vision will need to recruit and develop its future leadership. Vision’s high cost of failing to address gender diversity issues will be significant, including the cost of turnover and the inability to attract and advance talented managers. In an environment of exclusionism, talented leaders of both genders will depart for better opportunities in more open and progressive companies. In order to bolster her argument for gender diversity, Liz needs to remove all of the conjecture from her message. She needs to replace any statement that begins with â€Å"I believe† and replace it with facts. She could talk with the women who resigned to find out the true reasons for their departures rather than guessing and putting words into their mouths. For example, Susan French did not receive the esteem and authority that her male predecessors enjoyed. This disparity in authority caused Susan frustration that ultimately led to her resignation. Liz needs to cite this and other specific incidents that can be corroborated. She must choose her examples carefully, selecting only those that really strengthen her case. Stories of a man commending his wife and a male coworker going home to play mom are not firm examples of gender bias, thus weaken her argument. Stories of women being closed out of meetings and purposely excluded from conversations serve well to strengthen her case. In her memo, Liz has adopted a negative and accusatory tone that could serve to alienate Clark, leading him to dismiss the message as too extreme. If Vision truly does have an atmosphere that slowly erodes a woman’s sense of worth and place, why has she continued to work there for ten years? Once Liz crafts her message to remove the negative tone and accusation, it will be much more persuasive to Clark. Over dramatizing this situation will not serve the goal of effective and persuasive communication. Conclusion/Summary Liz’s message of the importance of gender diversity is a critical one which needs to be communicated in an effective and compelling manner. Liz’s male colleague should provide her with coaching, support and corroboration to build a solid business case for developing an atmosphere of gender diversity at Vision Software. Vision’s need to develop senior-level women is a critical business management issue. Those companies that learn to manage gender diversity are able to recruit and retain the most talented managers, reduce turnover costs, respond to the changing marketplace, and, ultimately, make better business decisions. Vision will reap benefits within the company such as increased employee retention, loyalty and morale, as well as the potential for increased customer satisfaction and market share. The approach to the communication with Clark needs to be well planned and ffectively crafted. Liz needs to take a number of steps to strengthen and fortify her message, build cohesive strength in numbers with her co-workers, and then communicate the message to Clark in a positive, proactive and supportive manner. Sexist or exclusionary practices are not good for anyone in a business. Liz has taken on the task of communicating the message to senior management so she now has a responsibility to craf t a message that has the best opportunity to be heard, understood and well-received by the CEO and others in management at Vision.

Friday, September 27, 2019

The Enlightenment Essay Example | Topics and Well Written Essays - 250 words

The Enlightenment - Essay Example With the development of scientific societies and academies, there has been considerable progression in science which has aided the contemporary world. Furthermore, the popularity of science increased in the educated population. People became aware of the philosophies, knowledge and theories. There were advancements in terms of medicine, physics and mathematics which have extended till now and ministered to the advent of various technologies today that were once only seen as a far sighted notion. There had been advancements in the fields of electronics, chemistry which then evolved into modern chemistry. Enlightenment science paved ways for rationality and empiricism. Enlightenment ideas educated people all over Europe. It also spread the knowledge of art and literature which changed the styles into more ‘neo-classical’ themes. However, there was some criticism that argued that the development of science made man secluded from nature and it contributed to unhappiness in m ankind. The era of enlightenment and its impacts on science are very vast. The enlightenment was a stepping stone between the medieval world and the world we live in today. Many institutions were developed and more importantly, the mindset of the people was changed. The age of enlightenment focused on the power of reason and the attainability of the Truth. (Mulder) Works Cited Mulder, H.

Thursday, September 26, 2019

Rehtorical analysis Essay Example | Topics and Well Written Essays - 750 words

Rehtorical analysis - Essay Example The impact that the image has on the target audience by virtue of the ethos that oozes out of it is indeed amazing and noteworthy. There is no denying the fact that in the last decade, Kim Kardashian and Kanye West did happen to be one of the most fashionable and talked about couple in the world. Thereby the strategy of Vogue to tag the fashionable aura of Kim Kardashian and Kanye West with the discernibly fashion associated credentials of the magazine has loaded the image with much credibility and believability. The target audience simply cannot help taking the image with all the due credibility, veracity and appeal that it commands. The image with the sense of grace and sophistication it carries when juxtaposed with the background text mentioning Vogue did indeed bring out much substance and reliability. Besides the placement of the image of their daughter North, embossed on the larger image does bring in a familial element and appeal to the image. The message that it does try to c onvey is that yes it is indeed possible to be a family person and yet be fashionable. This extends the appeal of the issue beyond its conventional audience to a clientele that is family oriented and somewhat prosaic as the subtext in the image mentions, â€Å"Kim & Kanye: Their fashionable life and surreal times.† The image no way lacks in pathos coefficient as it also impresses the audience with the emotional appeal that it carries. Everybody likes to be fashionable and almost many people love children. Thereby, frankly speaking no matter how glamorous or celebrity a person may be, still the fact that one is a parent does accrue much emotional backing to one. In that context the image of their daughter North juxtaposed on their romantic image in which the two of them are fashionably dressed and are coalesced in a romantic embrace is poised to eke out the emotions of even the most unfashionable and prosaic of a family person. The placement of the image of

The Walt Disney Corporation Research Paper Example | Topics and Well Written Essays - 1000 words

The Walt Disney Corporation - Research Paper Example The dream of iestablishingthe giant corporation can be traced back in time when Alice in Wonderland short series began (Denny and Williams, 2004). A theme well developed in many of Walt’s cartoons is undying optimism, which can be related to the Vision of Dream on which the company is formed. From the time the company was incorporated to its current performance, for instance in the figures illustrated above, it is quite in order to state that the company has followed its dream. Believing in the company’s position and capacity to achieve its goals could have been the secret behind its success. Achieving what might appear impossible can only be accomplished in believing. Another character possessed by Walt Disney is that of unwavering belief in achieving anything desired of. Walt had a dream of becoming a cartoonist and the belief he had propelled him above that to be founder of animated cartoons watched all over the world. The company’s story can be said to be a successful belief, now that it even covers more than animated cartoons. Concerning a daring spirit, Walt was a good salesman from the beginning, with some fine skills that were rare to find in those times. Early in his art work, he aggressively and determinately sold his cartoons and comedies until he got into partnerships that enabled him to settle down for business. He was capable of using his salesmanship skills to successfully convince his animation team at Kansas City to relocate to California. The company’s markets its products aggressively and with a good precision to take advantage of the market better than its competitors, such that it has become a worldwide household brand Capodagli and Jackson, 2000). According to Hair et al (2008), when a market evolves to become well established, it becomes a lucrative venture that many investors would want to try. The line of business that Walt Disney deals with has

Wednesday, September 25, 2019

Who was the best secretary of state and why Research Paper

Who was the best secretary of state and why - Research Paper Example It is difficult to rate any one above others because of the diversity of problems faced and managed by these secretaries in the past. John Quincy Adams, William Seward John Hay, Henry Kissinger, Collin Powel and Medline Albright were some of the most famous American state secretaries in the past. However, in my opinion, current American state secretary Hillary Clinton seems to be the best secretaries of all time. This paper analyses the capabilities of Hillary Clinton as the secretary of state. â€Å"There is a growing bipartisan consensus that Hillary Clinton is the best ever Secretary of State, US President Barack Obama has said. His decision to appoint Clinton as the Secretary of State was one of his better decisions† (Clinton best ever Secretary of State: Obama). Obama’s opinion about Mrs Clinton’s performance as secretary of state cannot be taken lightly. It should be noted that Hillary Clinton was the major rival for Obama when he competed for the Democrati c Party candidature for president ship. I rate Hillary Clinton as the best ever secretary of state because of the fact that no other state secretaries in American history were faced such challenging situations as Hillary did. It should be noted that terrorism and global recession are some of the most challenging situations for America at present. ... As a secretary of state, it was the duty of Hillary to convince Arab world about the necessities of war on terror and she did succeed in doing so. Moreover, some kind of revolutions are taking place at Arab world now, especially in countries like Libya, Egypt, Tunisia etc. Moreover, agitations already started in countries like Bahrain, Syria and Saudi Arabia. America has a significant role to play in the political developments in these countries. It should be noted that Libyan revolution was successful only because of NATO’s involvement. Same way, America has to decide whether to support or oppose the democratic movements in countries like Bahrain, Syria and Saudi Arabia. Bahrain and Saudi are some of the closest allies of America in the Middle East and therefore, it is difficult for America either to support or oppose agitations in these countries. Hillary Clinton has a major role to play in shaping America’s policies towards these countries. Iran’s ambition to become a nuclear power was another challenging situation for Hillary. Iran is the country in Middle East which raises strong challenges to America’s interest in this region. Allowing Iran to become a nuclear power is not good for the interests of America and Hillary had a major role to play in preventing Iran from developing nuclear arsenal. At the time of writing this paper, Iran has threatened that they are going to close Hormuz gulf and disallow the passage of oil tankers through this region. â€Å"Iran threatened to stop the flow of oil through the Strait of Hormuz if it became the target of an oil export embargo over its nuclear ambitions, a move that could trigger

Tuesday, September 24, 2019

Nursing Care Plans in the Textile Industry Assignment

Nursing Care Plans in the Textile Industry - Assignment Example It is evidently clear from the discussion that general body malaise and dizziness are the major presentations of inadequate oxygen supply. Since this is a factory interested in high output, precautionary measures should be taken to protect the employees. The reasons presented in the study  justify why respiratory problems should be the first priority. The program will target the secondary level of disease prevention. The primary level would require sophisticated technology to prevent the generation of the tiny textile particles and also eliminate the ones already produced. Such technologies are very expensive hence unattainable to install with the limited resources. The initial purchase and installation aside, technicians who operate the technology will have to be employed. This will make the labor costs skyrocket to unimaginable levels. An approach that would protect the workers from respiratory problems at an affordable cost would be preferable. The perfect approach that can be e mployed is the cellulose nose filter. The filters are cheap and easy to use since only a demonstration is required to ensure maximum protection from the devices hence the decision to approach it. The factory can purchase them in large scale, which will further reduce the costs incurred. Although the filters seem to be very simple, they can help prevent most of the respiratory problems. This program may not be the perfect one, but it will save the company a lot of time lost due to sick leaves. Furthermore, the implementation of the program will be a lower financial burden to the company. This is because the large-scale purchase of the filters is required. The program also has tremendous benefits to the employees in terms of their health and general quality of life. For one their respiratory systems will be protected from the tiny textile particles, therefore reducing their probability of contracting chronic obstructive pulmonary diseases.  

Monday, September 23, 2019

E-billing in Local Municipalities in South Africa Essay

E-billing in Local Municipalities in South Africa - Essay Example It provides various of benefits to consumers such as convenient distribution and navigation, in order to improve the analysis as well as cost reporting in business sectors. Several companies are adopting e Billing solutions in the file and contract management. Through e Billing, customers better understand their manner of spending and how cost savings are made. Tshwane is one municipality of South Africa in which approximate population is 2.2 million. Most part of the municipality have low income level; 55% of the people are unemployed with ages 18 - 65; 8.7% of inhabitants who are older than 15 are illiterate. classified as 'illiterate'. Despite this fact, the leaders are pushing the economic growth and development of the entire city and one example towards achieving their goals is their involvement in the advance information and communication technology system programs such as the Tshwane Global Digital Hub program. The city is envisioned to be the destination of communication and information technology-based business.

Sunday, September 22, 2019

The interest of the reader Throughout Essay Example for Free

The interest of the reader Throughout Essay In the story the Adventure of the Speckled Band a girl dies mysteriously. No one knows how she died, and her sister, fearing for her own life, goes to see Sherlock Holmes. She tells him all about the mysterious death of her sister and he goes to her home, with his assistant Dr Watson, to investigate. They stay in the room that the girl was in when she died and discover that theres an air-vent that runs from the stepfathers bedroom to the girls bedroom. The bed is bolted to the floor so it cant be moved away from the wall and theres a bell-pull by the bed that isnt connected, its fake. In the end they discover that the stepfather wasnt happy about the girl getting married because he didnt want her husband to get her money so he killed her using an Indian Swamp Adder the Speckled Band. As the sister of the dead girl was getting married, the stepfather moved her into her sisters bedroom, next to his, and tried to kill her before she married. The relationship between the stepfather and the two women was not the best of father-daughter relationships. They hated him and he didnt exactly like them because theyd inherit his money when he died. The mystery was solved and his plan backfired, the snake bit him and killed him instantly, before he had a chance to kill the daughter. Conan Doyle keeps the reader in suspense throughout the story. He does this by giving the reader clues, which dont make sense when theyre first given, and lead you down the wrong path completely. These are called red herrings, something that make you think one thing when its actually something completely different. In the end all the clues Conan Doyle has given make sense. The story keeps the reader in suspense because its a mystery story. As its to do with a murder, that makes the story more exciting and makes you want to read on and find out what actually happens at the end and what conclusion Sherlock Holmes comes to at the end and whether or not its correct. I thought this story was a bit boring, as it was 19th century. Back then it would probably have been thought to be a very good story, but I prefer more up-to-date stories. I didnt find it that bad or that good. Im glad it wasnt too long because I would probably have got very fed up of it if it had gone on and on and on. It gave you all the facts and information you needed and didnt go on and on about one thing for too long. It was kept short and sweet. In that way I thought it was ok. In the story the stepfather is a doctor and worked over in India but got sent back to England because of his violent temper, as he struck a person for something that wasnt their fault. The doctor had animals imported from countries hed worked in, e. g. ) India. He kept a cheetah, an orangutan, which everyone knew about in the village, and an Indian swamp adder, (the speckled band), which no one except the doctor, knew about. In the story the doctor rents out some of the land he owns to some gypsies. At first when people hear about the mysterious death at the manor, some think that it was the cheetah or the orangutan that had killed Julia, and some think the speckled band was a bandanna that the gypsies wore and that it was one of them that had murdered her. Others didnt know what to think. After some investigating, Sherlock Holmes solved the mystery, with the help of his assistant, Dr Watson, and the story had a happy ending. Helen, Julias sister got married and the doctor, her stepfather, got killed by the swamp adder he was going to use to kill Helen like he did Julia.

Saturday, September 21, 2019

What Affects Tropical Cyclones Environmental Sciences Essay

What Affects Tropical Cyclones Environmental Sciences Essay What are tropical cyclones? A tropical cyclone is the main term used for a low pressure system which gets its energy mainly from evaporation from the sea and condenses in clouds concentrated near its centre (Holland, 1993). Tropical cyclones occur in tropical latitudes. The central area of the tropical cyclone is called the eye of the storm; this is the area of the lowest pressure. The eye is encircled by dense cloud (cyclone walls) which rotates. The walls are less dense as you move out from the eye as the wind gradually weakens down (Nalivkin, 1983). Tropical cyclones have three different names that are defined by their wind speed; a tropical depression is a storm with maximum sustained surface winds of less than 17m s  ¯Ã‚ ¹ but still has a circulation (Wallace and Hobbs 2006: Landsea, 2006). A tropical storm is a storm with winds of at least 17 m s  ¯Ã‚ ¹ and peak speeds of 32 m s  ¯Ã‚ ¹ (Wallace and Hobbs 2006: Landsea, 2006). Hurricanes or Typhoons (the regional names for strong tropical cyclones) are when winds reach above 32 m s ¯Ã‚ ¹ (Wallace and Hobbs 2006: Landsea, 2006). Tropical cyclones form in ocean basins around the world; these are the North Atlantic Ocean, Northeast Pacific Ocean, North-western Pacific Ocean, North Indian Ocean, South- West Indian Ocean, Australian Ocean and South Pacific Ocean (Aguado and Burt, 2007).This study concentrates on the North Atlantic basin. The tropical cyclone season is from 1st June to 30th November in the Atlantic basin (NOAA, 2007). 1.2.2 What do tropical cyclones need to form? Tropical cyclones need certain conditions to form. They need a deep surface layer and sea surface temperatures above 26.5 °C (81 °F) (Goldenberg, et al, 2001: Wallace and Hobbs, 2006: Aguado and Burt, 2007). They need a disturbance near the surface with adequate amounts of spin to start the formation and an atmosphere that is unstable so that it encourages thunderstorm activity. Low vertical wind shear is needed since wind shear can disrupt the organisation of thunderstorms. If the wind shear is too high, it can cause the cyclone to dissipate (Gray 1968: Wallace and Hobbs, 2006). Tropical cyclones also wont form if the disturbance is too close to the equator. Tropical cyclones need enough coriolis force to maintain the low pressure in their centre, the coriolis is not strong enough to do this near the equator and for this reason tropical cyclones do not form between 0 °W and 5 °W latitude (Wallace and Hobbs, 2006: Aguado and Burt, 2007). All these conditions are generally nee ded for a tropical cyclone to form, but even if the conditions are met, it does not mean a tropical cyclone will form every time (Australian Government, Bureau of Meteorology, 2013). North Atlantic tropical cyclones vary from other basins in the way they form as a high percentage of cyclones form from tropical waves that move across from West Africa (Landsea, 1993). Most major hurricanes form from African waves especially in the area between 10 ° and 20 ° North (Goldenberg, 2001). This area 10 ° and 20 ° North was termed the main development region by (Goldenberg, 2001). The number of easterly waves remains relatively constant from one year to the next, but the amount that develop into tropical cyclones varies greatly due to other factors (Frank, 1975). 1.2.3 What affects tropical cyclones? Many different atmospheric factors affect tropical cyclones; the main ones are listed below: Sea Surface Temperatures (SSTs): SSTs are one of the main factors that affects whether a tropical cyclone forms. Since heat from oceans are the primary energy source for a tropical cyclone, the theory is that if sea surface temperatures were to increase, so too would the number and intensity of tropical cyclones (Goldenberg, et al, 2001). However, this has not been proven by using historical data or models. The research conclusions are mixed with no definitive answer; some studies show that SSTs are increasing intensity of cyclones (Emanuel, 2005), whilst others are coming to the conclusion that the increase in tropical cyclone frequency is due to rising SSTs (Holland and Webster, 2007: Mann and Emanuel, 2006). Some research even points to a decrease in frequency under global warming (Knutson et al 2008). Overall no research has shown conclusively an increase in the frequency or intensity due to rising SSTs and there are many mixed views on the subject. ENSO: ENSO is very important for tropical storm development and depending on what stage it is in can either cause formation or hinder it. Trenberth (1997) gives a good definition of El Nià ±o and La Nià ±a. El Nià ±os effect on tropical cyclones has been well documented and there is a lot of literature on the topic available. It is agreed that El Nià ±o supresses Atlantic hurricane activity (Gray, 1984). During El Nià ±o years there are fewer tropical cyclones and weaker intense storms (Chu, 2004). El Nià ±o years were found to have fewer hurricane days then non El Nià ±o years (Gray 1984: Landsea et al, 1999). La Nià ±a has the opposite effect on tropical cyclones by creating favourable conditions for the development of tropical cyclones (Pielke and Landsea 1999). During El Nià ±o, Pielke and Landsea (1999) found that there are more economical losses during a La Nià ±a year then an El Nià ±o year, this fits in with Atlantic tropical cyclone activity being supressed during El Nià ±o. Atlantic Multidecadal Oscillation (AMO): This is a pattern of sea surface temperatures which has warm and cold phases, a 25-40 year cycle (Aguado and Burt 2007). The AMO then affects tropical cyclones due to the change in sea surface temperatures. The AMO has been thought to affect the activity of tropical cyclones in the past with the active year of 1995 coinciding with a shift in the AMO (Aguado and Burt 2007). Goldenberg et al (2001) indicates that the Atlantic Multidecadal variation would have a greater impact on tropical cyclones sooner than the warming of SSTs. This is because global warming will only gradually create higher SSTs. If the rise of SSTs due to global warming were to coincide with a change to a warm phase in the AMO there could be a large impact on tropical cyclones. Wind shear: Wind shear is horizontal wind between the upper and lower troposphere. It inhibits tropical cyclones by stopping organisation of deep convection in the atmosphere, which prevents the organisation of cloud walls (Goldenberg et al, 2001). Wind shear has a big impact on hurricane frequency and intensity (Aiyyer and Thorncroft, 2006). Goldenberg and Shapiro (1996) came to the conclusion that wind shear was the most important environmental factor effecting tropical cyclones since it decreases the chances of cyclones forming and can dissipate them when they have already formed. Overall, though all of the above factors interlink, for example an increase in SSTs could create an increase in wind shear (Vecchi and Soden, 2007). The above factors that affect tropical cyclones are complex and the knowledge is uncertain. (Emanuel, 2005: Landsea, 2010) argue that there can be no strong conclusion made on research using past data due to the uncertainty of accurate records. Until a good overall understanding is gained no conclusions can be made on what has happened and what will happen to tropical cyclones, one of the ways to gain this is to look at where they have formed and why and what effected past tracks, leaving room for error in the data. Tropical cyclone tracks Tropical cyclone tracks in the North Atlantic are variable. There are no defined paths, but there are rough patterns cyclones will follow, depending on meteorological and oceanographic factors. Cyclones will generally move straight West or East and then may move north to hit land. Some recurve (go West then East). These cyclones are generally known to form by the Cape Verde Islands and will recurve around the periphery of the subtropical cell (Reading, 1990). These are known to form the deadliest hurricanes. The cyclones as well are known to form in different areas at different times of the hurricane season (Reading, 1990) this then effects the tracks too. Early in the season they form more on the Western side of the Atlantic (Reading, 1990: Willet and Sanders, 1959). They then form throughout most of the basin in the middle of the season and by the end of season most of the cyclones form in the West of the Atlantic basin (Willet and Sanders, 1959). Changes in intensity, frequency and tracks Webster et al, (2005) found a small percentage increase in the number and proportion of hurricanes reaching categories 4 and 5 in the North Atlantic, but no increase in the intensity of the strongest hurricanes. Overall Webster (2005) found no global trend for increasing SSTs and number of tropical storms/ hurricanes, but found a global decrease in tropical cyclone days since 1995 to 2004 after a peak in 1995. Webster (2005) concludes that their data points to a 30 year increase in more frequent and intense hurricanes. This links in with Bender et al, (2010) model that found the frequency of intense hurricanes should increase, but the number of hurricanes will decrease in a warmer world due to global warming. Vecchi and Knutson (2008) found that Atlantic tropical cyclone counts may have increased since the 19th century but with an average decrease in tropical cyclone duration over time. On the other hand Emanuel (2005) found that the duration of storms in the North Atlantic had increased since 1949 but he warns this may be due to changes in reporting practices. Overall the research gives very mixed results. There is little work done on whether with climate change there will be changes in tracks (Walsh, 2004). Work that has been done varies in the results. Most of the results show little change in tracks, under simulations of enhanced greenhouse conditions and warmer SSTs (Knutson and Tuleya 1999, Tsutsui 2002). This research concentrated on the Pacific, and mainly in the North. This then does not give a picture of what may happen in other basins such as the North Atlantic. The research done has mainly used models to simulate tropical cyclone tracks, with more data every year data analysis and statistical methods could be used better to analyse past tracks. (Walsh and Reading, 1991: Vecchi and Knutson, 2008) have suggested that in the North Atlantic basin there has been a shift in the position of tropical cyclones to the east of the basin using data analysis but did point to possible changes due to better data collection methods. Wang and Chan (2002) concentrate on tropical cyclone tracks in the North Pacific and demonstrated mainly how El Nià ±o affects the tracks due to changes in El Nià ±o. This then shows that El Nià ±o has this affect in the North Pacific but has not been shown to have an impact on tracks in the North Atlantic or other basins. 1.2.4 What the future holds Due to the theory of climate change there have been many ideas about how tropical cyclones will react, research using statistics has created many climatic models of tracks and what could happen. Quite a few conclusions have been drawn due to the idea of increasing sea surface temperatures, which could cause increases in frequency and intensity of storms but no firm evidence has yet been found due to uncertainties in the data and the number of parameters which could also affect tropical cyclones. Further uncertainties with how the climate will change mean no conclusions have been made yet for future predictions. Overall there is no agreement on what will happen to tropical cyclones in a warmer climate (Villarini et al., 2011). Looking at past data has issues due to the inaccuracies that might have occurred before the satellite era. Landsea et al (2010) discusses this issue and found that the occurrence of short lived storms has increased over the last century but medium and intense storms havent. He concludes that this is most likely due to better equipment picking up storms, as well as storms being identified as cyclones when in the past they wouldnt have been. 1.2.5 Why is the research being done, how is it different from other research Research into tropical cyclones is important due to the impacts cyclones have on the human and natural world. Most research has focused on frequency and intensity of tropical cyclones. Not much work has been previously done on tracks, or the starting points of tropical cyclones. This research looks into where storms form throughout the North Atlantic basin and if this has changed in the basin over time, as well as focusing on recurving cyclones. Wang and Chan (2002) did look at tracks and formation in the Pacific, but one of the issues with the North Pacific was that the record is quite short. The North Atlantic has the longest reliable record (Goldenberg, et al, 2001) and will be examined in this study.

Friday, September 20, 2019

Case Report of Secondary Narcolepsy

Case Report of Secondary Narcolepsy Title of the article: â€Å" Case Report of Secondary Narcolepsy presenting as self-inflicted genital injury † Abstract: Primary Narcolepsy is a sleep disorder with classical presentation showing tetrad of excessive daytime sleepiness, cataplexy, sleep paralysis, and Hypnogogic hallucinations. Some conditions that result in secondary narcolepsy include traumatic brain injury, tumors, and stroke. [1] A rare case of secondary narcolepsy was seen in a patient with self-inflicted genital injury. A 30 year old male was referred to Psychiatry from Surgery for a self-inflicted incised wound on hydrocoele. Since last 1 year, he had multiple episodes of 1. Sudden falls while working 2. Sleep during daytime often at unusual places 3. Periods of unresponsiveness during which he was aware but unable to move. During hospital stay, daytime somnolence, sleep paralysis and cataplexy were noted several times, but hallucinations were not consistently reported. Based on DSM-IV-TR Narcolepsy was diagnosed. Possible reasons for genital injury were 1. To remove fluid from swelling 2. Under sleep paralysis 3. Under Hypnogogic hallucinations. Patients EEG was normal. MRI brain showed Gliosis at cervico-medullary junction.MRI spine was advised to examine the cervico-vertebral junction but patient was lost to follow-up. But from history and investigations, it was concluded that he had secondary narcolep sy due to traumatic brain injury. Narcolepsy typically begins in the 2nd and 3rd decades of life and negatively impacts the quality of life of affected patients. Diagnosis relies on patient history and objective data gathered from polysomnography and multiple sleep latency testing. Treatment focuses on symptom relief through medication, education, and behavioural modification. Key-words: Cataplexy; Narcolepsy; Polysomnography; Self inflicted injury, Key Messages [D1]:Secondary narcolepsy is rare and sometimes can be missed to diagnose. Such rare presentation of secondary narcolepsy helps in diagnosing other cases of self-inflicting injuries. Introduction:[D2] Narcolepsy is neither a type of epilepsy nor a psychogenic disturbance. It is an abnormality of the sleep mechanisms specifically, REM-inhibiting mechanisms and it has been studied in dogs, sheep, and humans. Narcolepsy can occur at any age, but it most frequently begins in adolescence or young adulthood, generally before the age of 30. The disorder either progresses slowly or reaches a plateau that is maintained throughout life.[2]. The prevalence of narcolepsy varies across countries and with different ethnic groups, and so the exact prevalence is not known. Prevalence estimates have been reported to be between 168 and 799 per 100,000 in most studies, although Japanese studies have indicated a higher prevalence of 1600 per 100,000.[2,3]. There are no genetic tests current ly available for clinical use to make a positive diagnosis of narcolepsy. Genetic testing may correlate best to narcolepsy when there is already clear cataplexy.[4]. Supporting the evidence for an environmental influence is the fact that the disease is not apparent at birth, but instead commonly has its onset during the second decade of life. Additionally, there are apparent precipitating factors such as head trauma, infection, and changes in sleep-waking habits that have been identified in some cases.[6] Chronic, daytime sleepiness is a major, disabling symptom for many patients with traumatic brain injury (TBI), but thus far, its aetiology is not well understood. Extensive loss of the hypothalamic neurons that produce the wake-promoting neuropeptide hypocretin (orexin) causes the severe sleepiness of narcolepsy, and partial loss of these cells may contribute to the sleepiness of Parkinson disease and other disorders. One study has found that the number of hypocretin neurons is significantly reduced in patients with severe TBI. This observation highlights the often overlooked hypothalamic injury in TBI and provides new insights into the causes o f chronic sleepiness in patients with TBI.[7] Amphetamine usage has been associated with addiction, psychosis and self-injurious behaviour. There are reports on two patients who severely and repeatedly mutilated their own genitalia while intoxicated on amphetamines and consider possible diagnostic aetiologies.[8] Genital mutilation is common in males compared to females.[9] But narcolepsy presenting as self inflicted genital injury has not been reported so far. That is why this is a rare case. Case History[D3]: A case of secondary narcolepsy was seen in a patient presenting as self-inflicted genital injury. A 30 year old Hindi speaking illiterate male was referred to Psychiatry from Surgery for a self-inflicted incised wound on hydrocele. After primary wound closure at surgical side, patient was taken transfer to Psychiatry for detailed assessment. When detailed history was obtained from patients elder brother and father, it was found that since last 1 year, he had multiple episodes of sudden falls while working at kitchen as he was a cook. He used to sleep during daytime often at unusual places like in the courtyard, once over the road and sometimes in bathroom. Patient also had periods of unresponsiveness during which he was aware but unable to move himself even on painful stimulation. During hospital stay, daytime somnolence, sleep paralysis and cataplexy were noted several times, but hallucinations were not consistently reported. Based on DSM-IV-TR Narcolepsy was diagn osed. Possible reasons for genital injury were 1. To remove fluid from swelling 2. Under sleep paralysis 3. Under Hypnogogic hallucinations. Patients EEG was normal. MRI brain showed Gliosis at cervico-medullary junction.MRI spine advised to examine the cervico-vertebral junction but patient was lost to follow-up. But from history and investigations, it was concluded that he had secondary narcolepsy due to traumatic brain injury Discussion: Narcolepsy is a condition characterized by excessive sleepiness, as well as auxiliary symptoms that represent the intrusion of aspects of REM sleep into the wakingstate. The sleep attacks of narcolepsy represent episodes of irresistible sleepiness, leading to perhaps 10 to 20 minutes of sleep, after which the patient feels refreshed, at least briefly. They can occur at inappropriate times (e.g., while eating, talking, or driving and during sex). The REM sleep includes Hypnogogic and Hypnopompic hallucinations, cataplexy, and sleep paralysis. The appearance of REM sleep within 10 minutes of sleep onset (sleep-onset REM periods) is also considered evidence of narcolepsy. The disorder can be dangerous because it can lead to automobile and industrial accidents. Other symptoms include Hypnogogic or Hypnopompic hallucinations, which are vivid perceptual experiences, either auditory or visual, occurring at sleep onset or on awakening. Patients are often momentarily frightened, but within a minute or two they return to an entirely normal frame of mind and are aware that nothing was actually there. Here patient had symptoms of narcolepsy after head injury and patient himself injured his scrotum with sharp blade for which he had no clear memory and there was no history suggestive of epilepsy so diagnosis of secondary narcolepsy presenting as self-inflicted genital injury was considered.In this case, patient showed clinical features of narcolepsy as diagnosed by DSM- IV which was secondary type as there was history of multiple falls and MRI brain showed gliosis. But in this case, unusual presentation was genital self-inflicted injury. Possible reasons for genital injury are: Automatic behavior. Acting on Hypnogogic/Hypnopompic hallucinations. Due to impaired cognitive function/ judgment due to long-standing Narcolepsy. No cure exists for narcolepsy, but symptom management is possible. A regimen of forced naps at a regular time of day occasionally helps patients with narcolepsy and, in some cases, the regimen alone, without medication, can almost cure the condition. When medication is required, stimulants are most commonly used.[10] Although drug therapy is the treatment of choice, the overall therapeutic approach should include scheduled naps, lifestyle adjustment, psychological counselling, drug holidays to reduce tolerance, and careful monitoring of drug refills, general health, and cardiac status. References[D4]: 1. Narcolepsy: Clinical features, co-morbidities treatment Jeremy Peacock Ruth M. Benca Indian J Med Res 131, pp 338-349: 2010 2. Longstreth WT, Jr., Koepsell TD, Ton TG, Hendrickson AF, van Belle G. The epidemiology of narcolepsy. Sleep 2007; 30 : 13-26. 3.Tashiro T, Kanbayashi T, Iijima S, Hishakawa Y. An epidemiological study on prevalence of narcolepsy in Japanese. J Sleep Res 1992; (Suppl 1) : 228. 4. Bourgin P, Zeitzer JM, Mignot E. CSF hypocretin-1 assessment in sleep and neurological disorders. Lancet Neurol 2008; 7 : 649-62 5. Krahn LE, Pankratz VS, Oliver L, Boeve BF et al, Narcoleptic and schizophrenic hallucinations. Implications for differential diagnosis and pathophysiology. Eur J Health Econ. 2002; 3 (Suppl 2) : S94-8. 6. Bourgin P, Zeitzer JM, Mignot E. CSF hypocretin-1 assessment in sleep and neurological disorders. Lancet Neurol 2008; 7 :649-62. 7. Christian R. Baumann MD, Claudio L. Bassetti MD, Philipp O. Valko MD, Johannes Haybaeck MD,et al Loss of hypocretin (orexin) neurons with traumatic brain injury. 8. Joshua A. Israel and Kewchang, Lee Article first published online: Amphetamine usage and genital self-mutilation. 2002 DOI:10.1046/j.1360-0443.2002.00230.x 9. MartinT. ·GattazW.F, Psychiatric Aspects of Male Genital Self-Mutilation.Psychopathology; 24:170–178,1991. 10. synopsis of psychiatry 10th edition Case series of genital mutilation :The Journal of Urology150(4):1143-1146] 1993. [D1]1 Provide appropriate messages of about 35-50 words to be printed in centre box [D2]1 Please include why this case is unique. If it is rare, how rare, how many cases have been reported. [D3]1 Include the tables/charts at appropriate places in the text it self. Do not include images in the text. Mark the point of insertion of images (e.g. Figure 1) along with the legends. Send the images separately as jpeg files (not larger than 100 kb each) [D4]1 Follow the punctuation marks carefully. Do not include unnecessary bibliographic elements such as issue number, month of publication, etc. Include names of six authors followed by et al if there are more than six authors.

Thursday, September 19, 2019

Of Revenge: Francis Bacon’s Optimistic Tale? Essay -- Of Revenge Essay

Of Revenge: Francis Bacon’s Optimistic Tale? Revenge and vengeance are basic tools of human instinct. Whether society chooses to accept or blind itself to this fact, it is an indisputable truth. Francis Bacon examines this truth in "Of Revenge", a view of society and literary characters that reflects the strive for vengeance. However, "Of Revenge" deeply underestimates the corruption of the human spirit and soul. It completely disregards the presence of the basic human instinct which thrives on the manipulation and destruction of others, for the sake of satisfaction. Though Bacon’s inferences to the book of Job or Solomon are perfectly viable to a character that chooses to take revenge after they have been wronged, to believe that "no man does evil just for the sake of evil" annihilates any complete sense of credibility that Bacon’s thoughts imply. The author’s aspirations of the seeking of revenge solely as a means of retribution for oneself, and not to satisfy the evil within the human soul, is a beautifu l and idealistic hope which belongs in some earthen utopia. Unfortunately, it has no bearing on the modern world. Though the beliefs of Bacon expressed in "On Revenge" fulfill the traits of characters such as Medea, they neglect the human thrive for meaningless vengeance in characters such as Shakespeare’s Iago. Euripides’s Medea uses the theme of the search for revenge in order to instigate the downfalls and deaths of many characters. This theme is expressed through the character of Medea, who fits directly into the mold laid out in the guidelines of "Of Revenge". Medea’s search for revenge commences after her husband, the famous Greek hero Jason, leaves her for... ...nge" Francis Bacon considers the good and evil sides of man, and thus draws conclusions given the relationship between the good and evil in a character is equal. Therefore, a character such as Medea, who possessed many virtuous qualities, as well as detestable ones, fits the mold of Bacon’s beliefs of the justification of revenge. However, Bacon disregards the fact that in some men, their is more evil than their is good, and the strength and tenacity of that man override moral views. It is this imbalance that leads characters like Iago to do "evil for the sake of evil" and though they are not justified in their search for revenge, they endlessly endeavor to disrupt the natural flow of good to satisfy their evil cravings. Bacon discounts this amoral view of the human race which irrevocably overshadows the conclusions he draws as to the justification of human vengeance.

Wednesday, September 18, 2019

Jane Addams and the Progressive Movement Essay -- Jane Addams Feminism

Jane Addams and the Progressive Movement Works Cited Not Included Jane Addams is recognized as a social and political pioneer for women in America. In her biography, which later revealed her experiences in Hull House, she demonstrates her altruistic personality, which nurtured the poor and pushed for social reforms. Although many of Addams ideas were considered radical for her time, she provided women with a socially acceptable way to participate in both political and social change. She defied the prototypical middle class women by integrating the line that separated private and political life. Within these walls of the settlement house, Addams redefined the idea of ?separate spheres,? and with relentless determination, she separated herself from the domestic chores that woman were confined to during the later half of the nineteenth century which led to the twentieth one. During the late nineteenth century, the notion of ?separate spheres? dictated that the women?s world was limited to the home, taking care of domestic concerns. Women were considered to be in the private sphere of society. Men on the other hand were assigned the role of the public sphere, consisting in the participation of politics, law and economics. Women in the meantime were to preserve religious and moral ideals within the home, placing children on the proper path while applying valuable influence on men. The idea was that the typical middle class woman would teach children middle class values so that they too will enjoy the luxuries and benefits in the future that the middle class has to offer (Lecture, 10/17). One can argue that Jane Addams did comply with the ideal middle class women, that she remained in ?her sphere? of society. This can mos... ...the stereotypical idea of the man as the provider and leader of the typical home, women were free to run their lives as they felt, and not as society entailed them to do. It provided women experience in life that reached over to the public realm. The ?separate spheres? did not exist in Addams world; her progressive stance enabled many workers to benefit. Addams envisioned a world that did not discriminate based on one?s gender, and her commitment into the ?public realm? had tremendous impact. Child labor ceased, women won the eight-hour workday, and everyone enjoyed more benefits and improved working conditions. Jane Addams established the path for future women to take as well, which led to women?s suffrage, and eventually equal pay and mutual respect. She was not your typical middle class woman; she was a reformer that changed the way America functioned forever.

Tuesday, September 17, 2019

Reid Based Prepaid Energy Mater

chapter 1 [pic] 1. 1 Objectives of the Study Prepaid energy meter are being used worldwide to improve the collection of funds for the energy used. Weather it is developed nation or developing nation all electricity boards are facing two major issues 1. Power Theft 2. Collection of funds In the existing system the above two problems are non predictable and time consuming process respectively. To overcome these things in the proposed system Cal cards has developed and implemented as RFID based pre-paid energy meter. Cal card take information management to new heights with RFID technology.Using the state of the art technology, we can now write data into the RFID tag electronically. Using dual Authentication, Stream Encryption and other security features we restrict access to un-authorized personnel for any particular information. In this project three units are important they are RFID Card, RFID Reader and Writer. Tags are programmable and they may be read or read/write i. e. the inform ation stored in the tag’s memory cannot be changed or can be updated as required. The reader powers the antenna to generate radio frequency waves to transmit a signal that activates the tag and allows data to come into or leave the tag’s memory.This card can be designed to hold all amount details including Name of the family head, ID number, resident address and amount has been recharged. chapter 2 [pic] 2. 1 Methodology of the study Methodology: This System assigns a unique card number for each house. A particular house person places the RFID card within 5cm distance from the RFID Reader. The RFID Reader reads down the time, date and for how much amount it was recharged. The success of recharge will be indicated on the LCD display with buzzer acknowledgement sound.The display also indicates the current energy utilization. The Interface software is responsible for energy utilization record processing and calculation amount for the utilized energy. 2. 2 EMBEDDED SYSTEM: Embedded System is a combination of hardware and software used to achieve a single specific task. An embedded system is a microcontroller-based, software driven, reliable, real-time control system, autonomous, or human or network interactive, operating on diverse physical variables and in diverse environments and sold into a competitive and cost conscious market.An embedded system is not a computer system that is used primarily for processing, not a software system on PC or UNIX, not a traditional business or scientific application. High-end embedded & lower end embedded systems. High-end embedded system – Generally 32, 64 Bit Controllers used with OS. Examples Personal Digital Assistant and Mobile phones etc . Lower end embedded systems – Generally 8,16 Bit Controllers used with an minimal operating systems and hardware layout designed for the specific purpose. Examples Small controllers and devices in our everyday life like Washing Machine, Microwave Ovens, where th ey are embedded in.SYSTEM DESIGN CALLS:[pic] THE EMBEDDED SYSTEM DESIGN CYCLE: [pic] â€Å"V Diagram† In this place we need to discuss the role of simulation software, real-time systems and data acquisition in dynamic test applications. Traditional testing is referred to as â€Å"static† testing where functionality of components is tested by providing known inputs and measuring outputs. Today there is more pressure to get products to market faster and reduce design cycle times. This has led to a need for â€Å"dynamic† testing where components are tested while in use with the entire system – either real or simulated.Because of cost and safety concerns, simulating the rest of the the system with real-time hardware is preferred to testing components in the actual real system. The diagram shown on this slide is the â€Å"V Diagram† that is often used to describe the development cycle. Originally developed to encapsulate the design process of software applications, many different versions of this diagram can be found to describe different product design cycles. Here we have shown one example of such a diagram representing the design cycle of embedded control applications common to automotive, aerospace and defense applications.In this diagram the general progression in time of the development stages is shown from left to right. Note however that this is often an iterative process and the actual development will not proceed linearly through these steps. The goal of rapid development is to make this cycle as efficient as possible by minimizing the iterations required for a design. If the x-axis of the diagram is thought of as time, the goal is to narrow the â€Å"V† as much as possible and thereby reduce development time. The y-axis of this diagram can be thought of as the level at which the system components are considered.Early on in the development, the requirements of the overall system must be considered. As the system is divided into sub-systems and components, the process becomes very low-level down to the point of loading code onto individual processors. Afterwards components are integrated and tested together until such time that the entire system can enter final production testing. Therefore the top of the diagram represents the high-level system view and the bottom of the diagram represents a very low-level view. Notes: †¢ V diagram describes lots of applications—derived from software development. Reason for shape, every phase of design requires a complimentary test phase. High-level to low-level view of application. †¢ This is a simplified version. †¢ Loop Back/ Iterative process, X-axis is time (sum up). Characteristics of Embedded System: †¢ An embedded system is any computer system hidden inside a product other than a computer †¢ There will encounter a number of difficulties when writing embedded system software in addition to those we encounter when we wr ite applications – Throughput – Our system may need to handle a lot of data in a short period of time. Response–Our system may need to react to events quickly – Testability–Setting up equipment to test embedded software can be difficult – Debugability–Without a screen or a keyboard, finding out what the software is doing wrong (other than not working) is a troublesome problem – Reliability – embedded systems must be able to handle any situation without human intervention – Memory space – Memory is limited on embedded systems, and you must make the software and the data fit into whatever memory exists – Program installation – you will need special tools to get your oftware into embedded systems – Power consumption – Portable systems must run on battery power, and the software in these systems must conserve power – Processor hogs – computing that requires large amount s of CPU time can complicate the response problem – Cost – Reducing the cost of the hardware is a concern in many embedded system projects; software often operates on hardware that is barely adequate for the job. †¢ Embedded systems have a microprocessor/ microcontroller and a memory. Some have a serial port or a network connection. They usually do not have keyboards, screens or disk drives.APPLICATIONS: 1. Military and aerospace embedded software applications 2. Communication Applications 3. Industrial automation and process control software CLASSIFICATION: †¢ Real Time Systems. †¢ RTS is one which has to respond to events within a specified deadline. †¢ A right answer after the dead line is a wrong answer RTS CLASSIFICATION: †¢ Hard Real Time Systems †¢ Soft Real Time System HARD REAL TIME SYSTEM: †¢ â€Å"Hard† real-time systems have very narrow response time. †¢ Example: Nuclear power system, Cardiac pacemaker. SOFT RE AL TIME SYSTEM: â€Å"Soft† real-time systems have reduced constrains on â€Å"lateness† but still must operate very quickly and repeatable. †¢ Example: Railway reservation system – takes a few extra seconds the data remains valid. LANGUAGES USED: †¢ C †¢ C++ †¢ Java †¢ Linux †¢ Ada †¢ Assembly MPLAB FEATURES: MPLAB Integrated Development Environment (IDE) is a free, integrated toolset for the development of embedded applications employing Microchip's PIC ® and dsPIC ® microcontrollers. MPLAB Integrated Development Environment (IDE) is a free, integrated toolset for the development of embedded applications employing Microchip's PIC ® and dsPIC ® microcontrollers.MPLAB IDE runs as a 32-bit application on MS Windows ®, is easy to use and includes a host of free software components for fast application development and super-charged debugging. MPLAB IDE also serves as a single, unified graphical user interface for additio nal Microchip and third party software and hardware development tools. Moving between tools is a snap, and upgrading from the free software simulator to hardware debug and programming tools is done in a flash because MPLAB IDE has the same user interface for all tools.MPLAB IDE’s SIM, high speed software simulator for PIC and dsPIC (Digital Signal Processing PIC Microcontroller) devices with peripheral simulation, complex stimulus injection and register logging. CHAPTER 3 [pic] 3. 1 Block Diagram of RFID PREPAID energy meter BLOCK DIAGRAM 3. 2 Description of the Block Diagram The AC main Block is the power supply which is of single phase 230V ac. This should be given to step down transformer to reduce the 230V ac voltage to low voltage. i. e. , to 6V or 12V ac this value depends on the transformer inner winding. The output of the transformer is given to the rectifier circuit.This rectifier converts ac voltage to dc voltage. But the voltage may consist of ripples or harmonics. To avoid these ripples the output of the rectifier is connected to filter. The filter thus removes the harmonics. This is the exact dc voltage of the given specification. But the controller operates at 5V dc and the relays and driver operates at 12V dc voltage. So we need a regulator to reduce the voltage. 7805 regulator produces 5V dc. The 7805 regulator produces 5V dc and this voltage is given to PIC micro controller and sensors. The outputs of the sensors are also given to PIC micro controller.LCD, Keypad unit, SMART CARD read and write unit are connected to the controller. The controller reads the SMART CARD data from SMART CARD reader. The controller displays the data on LCD, depends upon the energy consumption the amount will be reduced. [pic] 3. 3 circuit diagram of RFID PREPAID energy meter: [pic] 3. 4 Circuit Description POWER SUPPLY: Power supply unit consists of Step down transformer, Rectifier, Input filter, Regulator unit, Output filter. The Step down Transformer is us ed to step down the main supply voltage from 230V AC to lower value.This 230 AC voltage cannot be used directly, thus it is stepped down. The Transformer consists of primary and secondary coils. To reduce or step down the voltage, the transformer is designed to contain less number of turns in its secondary core. The output from the secondary coil is also AC waveform. Thus the conversion from AC to DC is essential. This conversion is achieved by using the Rectifier Circuit/Unit. The Rectifier circuit is used to convert the AC voltage into its corresponding DC voltage. There are Half-Wave, Full-Wave and bridge Rectifiers available for this specific function.The most important and simple device used in Rectifier circuit is the diode. The simple function of the diode is to conduct when forward biased and not to conduct in reverse bias. The Forward Bias is achieved by connecting the diode’s positive with positive of the battery and negative with battery’s negative. The effi cient circuit used is the Full wave Bridge rectifier circuit. The output voltage of the rectifier is in rippled form, the ripples from the obtained DC voltage are removed using other circuits available. The circuit used for removing the ripples is called Filter circuit.Capacitors are used as filter. The ripples from the DC voltage are removed and pure DC voltage is obtained. And also these capacitors are used to reduce the harmonics of the input voltage. The primary action performed by capacitor is charging and discharging. It charges in positive half cycle of the AC voltage and it will discharge in negative half cycle. Here we used 1000 µF capacitor. So it allows only AC voltage and does not allow the DC voltage. This filter is fixed before the regulator. Thus the output is free from ripples. Regulator regulates the output voltage to be always constant.The output voltage is maintained irrespective of the fluctuations in the input AC voltage. As and then the AC voltage changes, th e DC voltage also changes. Thus to avoid this Regulators are used. Also when the internal resistance of the power supply is greater than 30 ohms, the output gets affected. Thus this can be successfully reduced here. The regulators are mainly classified for low voltage and for high voltage. Here we used 7805 positive regulators. It reduces the 6V dc voltage to 5V dc Voltage. The Filter circuit is often fixed after the Regulator circuit. Capacitor is most often used as filter.The principle of the capacitor is to charge and discharge. It charges during the positive half cycle of the AC voltage and discharges during the negative half cycle. So it allows only AC voltage and does not allow the DC voltage. This filter is fixed after the Regulator circuit to filter any of the possibly found ripples in the output received finally. Here we used 0. 1 µF capacitor. The output at this stage is 5V and is given to the Microcontroller Microcontroller and sensors are operated at 5V dc voltage. The output of the 7805 regulator is connected to PIC 16f877A microcontroller. Controller CircuitThe PIC 16f877A microcontroller is a 40-pin IC. The first pin of the controller is MCLR pin and the 5V dc supply is given to this pin through 10K? resistor. This supply is also given to 11th pin directly. The 12th pin of the controller is grounded. A tank circuit consists of a 4 MHZ crystal oscillator and two 22pf capacitors is connected to 13th and 14th pins of the PIC. The circuit consists of MAX-232 IC. It is a 16-pin dual in package IC. The 11th and 12th pins of MAX-232 IC are connected to the 25th and 26th pins of the PIC microcontroller. These are receiver OUT and Transmitter IN pins respectively.LCD is connected to the RC0 to RD7 pins of the PIC microcontroller. 13th, 14th and 15th pins of the MAX-232 IC are connected to the smart card read Buffer. The Keypad unit connected to the RB0 to RB3 pins of the PIC micro controller. The keypad unit consists of 4 switches. One is for menu, sec ond is Exit, third one is for Clear and the other is for Day Increment. MAX-232 IC is used to convert the voltage from 5V to 10V and 10V to 5V. This IC is used to communicate with the PC. It also acts as voltage converter. The LCD used here is to display the Attendance details. [pic] 3. 5 CIRCUIT OPERATIONThe input of the circuit is taken from the main. It is a single phase 230V ac voltage. This 230 AC voltage cannot be used directly, thus it is stepped down. The Step down Transformer is used to step down the main supply voltage from 230V AC to lower value. Because the microcontroller and sensors are operated at +5V dc voltage and relays and drivers will be operate at +12V dc voltage. So first this 230C AC voltage should be stepped down and then it should be converted to dc. After converting to dc it is applied to controller, sensors, relays and drivers. In this project we used 230/12V step down transformer.In this circuit we used two regulators. 7805 regulator for producing 5V dc, and 7812 regulators for 12V dc voltage. The output of 7805 regulators is given to PIC microcontroller and three sensors. The output of the 7812 regulator is connected to driver IC and a Relay. The main parts of this project are smart card and PIC micro controller. The coding will be installed to microcontroller through PIC Flash micro systems compiler unit. The crystal oscillator is used to generate the clock pulses to the PIC micro controller. The speed of the microcontroller depends upon the value of the crystal oscillator.In this project we used the 4 MHz crystal oscillator. Whenever recharged smart card shown in front of the reader the data from card will be read and send to controller through reader. The controller confirms whether it is old or new card. After this it will automatically open the lock to use EB power supply. If the wrong card shown, controller activate the alarm. Depends on the energy consumption the amount will reduced by the controller, when its come to below zero the controller automatically cut down the EB power supply through driver unit. In the driver unit ULN2003 is used as driver to driver the 12v relay.We inserted the process into the controller through coding. Coding was developed in Embedded ‘C’ Language. CHAPTER 4 [pic] 4. 1 Hardware Requirements: 1. Power supply unit 2. Microcontroller 3. MAX-232 IC 4. LCD 5. Keypad Unit 4. 2 POWER SUPPLY UNIT: Circuit Diagram [pic] Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter 4. 3. 1 Stepdown transformer: The Step down Transformer is used to step down the main supply voltage from 230V AC to lower value. This 230 AC voltage cannot be used directly, thus it is stepped down.The Transformer consists of primary and secondary coils. To reduce or step down the voltage, the transformer is designed to contain less number of turns in its secondary core. The output from the secondary coil is a lso AC waveform. Thus the conversion from AC to DC is essential. This conversion is achieved by using the Rectifier Circuit/Unit. 4. 3. 2 Rectifier Unit: The Rectifier circuit is used to convert the AC voltage into its corresponding DC voltage. There are Half-Wave, Full-Wave and bridge Rectifiers available for this specific function. The most important and simple device used in Rectifier circuit is the diode.The simple function of the diode is to conduct when forward biased and not to conduct in reverse bias. The Forward Bias is achieved by connecting the diode’s positive with positive of the battery and negative with battery’s negative. The efficient circuit used is the Full wave Bridge rectifier circuit. The output voltage of the rectifier is in rippled form, the ripples from the obtained DC voltage are removed using other circuits available. The circuit used for removing the ripples is called Filter circuit. 4. 3. 3 Input Filter: Capacitors are used as filter.The ri pples from the DC voltage are removed and pure DC voltage is obtained. And also these capacitors are used to reduce the harmonics of the input voltage. The primary action performed by capacitor is charging and discharging. It charges in positive half cycle of the AC voltage and it will discharge in negative half cycle. So it allows only AC voltage and does not allow the DC voltage. This filter is fixed before the regulator. Thus the output is free from ripples. 4. 3. 4 Regulator unit: [pic] 7805 Regulator Regulator regulates the output voltage to be always constant.The output voltage is maintained irrespective of the fluctuations in the input AC voltage. As and then the AC voltage changes, the DC voltage also changes. Thus to avoid this Regulators are used. Also when the internal resistance of the power supply is greater than 30 ohms, the output gets affected. Thus this can be successfully reduced here. The regulators are mainly classified for low voltage and for high voltage. Furth er they can also be classified as: i) Positive regulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator —> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. 4. 3. 5 Output Filter: The Filter circuit is often fixed after the Regulator circuit. Capacitor is most often used as filter. The principle of the capacitor is to charge and discharge. It charges during the positive half cycle of the AC voltage and discharges during the negative half cycle. So it allows only AC voltage and does not allow the DC voltage. This filter is fixed after the Regulator circuit to filter any of the possibly found ripples in the output received finally. Here we used 0. 1 µF capacitor.The output at this stage is 5V and is given to the Microcontroller. 4. 4 MICRO CONTROLLER: A computer-on-a-chip is a variation of a microprocessor which combines the processor core (CPU), some memory, and I/O (input/output) lines, all on one chip. The computer-on-a-chip is called the microcomputer whose proper meaning is a computer using a (number of) microprocessor(s) as its CPUs, while the concept of the microcomputer is known to be a microcontroller. A microcontroller can be viewed as a set of digital logic circuits integrated on a single silicon chip. This chip is used for only specific applications. . 4. 1 ADVANTAGES OF USING A MICROCONTROLLER OVER MICROPROCESSOR: A designer will use a Microcontroller to 1. Gather input from various sensors 2. Process this input into a set of actions 3. Use the output mechanisms on the Microcontroller to do something useful 4. RAM and ROM are inbuilt in the MC. 5. Cheap compared to MP. 6. Multi machine control is possible simultaneously. Examples: 8051 (ATMAL), PIC (Microchip), Motorola (Motorola), ARM Processor, Applications: Cell phones, Computers, Robots, Interfacing to two pc’s. 4. 4. 2 Microcontroller Core Features: †¢ High-per formance RISC CPU. Only 35 single word instructions to learn. †¢ All single cycle instructions except for program branches which are two cycle. †¢ Operating speed: DC – 20 MHz clock input DC – 200 ns instruction cycle. †¢ Up to 8K x 14 words of FLASH Program Memory, Up to 368 x 8 bytes of Data Memory (RAM) Up to 256 x 8 bytes of EEPROM data memory. †¢ Pin out compatible to the PIC16C73B/74B/76/77 †¢ Interrupt capability (up to 14 sources) †¢ Eight level deep hardware stack †¢ Direct, indirect and relative addressing modes. †¢ Power-on Reset (POR). †¢ Power-up Timer (PWRT) and Oscillator Start-up Timer (OST). Watchdog Timer (WDT) with its own on-chip RC oscillator for reliable operation. †¢ Programmable code-protection. †¢ Power saving SLEEP mode. †¢ Selectable oscillator options. †¢ Low-power, high-speed CMOS FLASH/EEPROM technology. †¢ Fully static design. †¢ In-Circuit Serial Programming (ICSP ) . †¢ Single 5V In-Circuit Serial Programming capability. †¢ In-Circuit Debugging via two pins. †¢ Processor read/write access to program memory. †¢ Wide operating voltage range: 2. 0V to 5. 5V. †¢ High Sink/Source Current: 25 mA. †¢ Commercial and Industrial temperature ranges. †¢ Low-power consumption.In this project we used PIC 16f877A microcontroller. PIC means Peripheral Interface Controller. The PIC family having different series. The series are 12- Series, 14- Series, 16- Series, 18- Series, and 24- Series. We used 16 Series PIC microcontroller. 3. PIC MICROCONTROLLER 16F877A 1. INTRODUCTION TO PIC MICROCONTROLLER 16F877A The PIC 16f877A microcontroller is a 40-pin IC. The first pin of the controller is MCLR pin and the 5V dc supply is given to this pin through 10K? resistor. This supply is also given to 11th pin directly. The 12th pin of the controller is grounded.A tank circuit consists of a 4 MHZ crystal oscillator and two 22pf capacitor s is connected to 13th and 14th pins of the PIC. 2. FEATURES OF PIC MICROCONTROLLER 16F877A †¢ Operating frequency: DC-20Mhz. †¢ Flash program memory (14 bit words):8K †¢ Data memory (in bytes): 368 †¢ EEPROM Data memory (in bytes):256 †¢ Interrupts: 15 †¢ I/o ports: A, B, C, D, E †¢ Timers: 3 †¢ Analog comparators: 2 †¢ Instructions: 35 4. 3. 3 pin diagram of pic 16f874a/877a: [pic] 4. 3. 4 FUNCTIONAL BLOCK DIAGRAM OF PIC 16F877A [pic] 4. 4 LCD Display: Liquid crystal display (LCD) has material which combines the properties of both liquid and crystals.They have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an order form similar to a crystal. LCD DISPLAY: [pic] More microcontroller devices are using ‘smart LCD' displays to output visual information. The following discussion covers the connection of a Hitachi LCD display to a PIC microcontroller. LCD disp lays designed around Hitachi's LCD HD44780 module, are inexpensive, easy to use, and it is even possible to produce a readout using the 8 x 80 pixels of the display.Hitachi LCD displays have a standard ASCII set of characters plus Japanese, Greek and mathematical symbols. For an 8-bit data bus, the display requires a +5V supply plus 11 I/O lines. For a 4-bit data bus it only requires the supply lines plus seven extra lines. When the LCD display is not enabled, data lines are tri-state which means they are in a state of high impedance (as though they are disconnected) and this means they do not interfere with the operation of the microcontroller when the display is not being addressed. The LCD also requires 3 â€Å"control† lines from the microcontroller. Enable (E) |This  line allows access to the display through R/W and RS lines. When this line is low, the LCD is disabled and | | |ignores signals from R/W and RS. When (E) line is high, the LCD checks the state of the two c ontrol lines and | | |responds accordingly. | |Read/Write (R/W) |This line determines the direction of data between the LCD and microcontroller. When it is low, data is written | | |to the LCD. When it is high, data is read from the LCD. |Register select (RS) |With the help of this line, the LCD interprets the type of data on data lines. When it is low, an instruction is | | |being written to the LCD. When it is high, a character is being written to the LCD. | Logic status on control lines: E  Ã‚  Ã‚  Ã‚   0 Access to LCD disabled 1 Access to LCD enabled R/W 0 Writing data to LCD 1 Reading data from LCD RS  Ã‚  Ã‚   0 Instruction 1 Character Writing data to the LCD is done in several steps: Set R/W bit to low Set RS bit to logic 0 or 1 (instruction or character) Set data to data lines (if it is writing) Set E line to highSet E line to low Read data from data lines (if it is reading). Reading data from the LCD is done in the same way, but control line R/W has to be high. When we send a high to the LCD, it will reset and wait for instructions. Typical instructions sent to LCD display after a reset are: turning on a display, turning on a cursor and writing characters from left to right. When the LCD is initialized, it is ready to continue receiving data or instructions. If it receives a character, it will write it on the display and move the cursor one space to the right. The Cursor marks the next location where a character will be written.When we want to write a string of characters, first we need to set up the starting address, and then send one character at a time. Characters that can be shown on the display are stored in data display (DD) RAM. The size of DDRAM is 80 bytes. |The LCD display also possesses 64 bytes of Character-Generator (CG)|[pic] | |RAM. This memory is used for characters defined by the user. Data | | |in CG RAM is represented as an 8-bit character bit-map.Each | | |character takes up 8 bytes of CG RAM, so the total number of | | |ch aracters, which the user can define, is eight. In order to read | | |in the character bit-map to the LCD display, we must first set the | | |CG RAM address to starting point (usually 0), and then write data | | |to the display.The definition of a ‘special' character is given in| | |the picture. | | Before we access DD RAM after defining a special character, the program must set the DD RAM address. Writing and reading data from any LCD memory is done from the last address which was set up using set-address instruction. Once the address of DD RAM is set, a new written character will be displayed at the appropriate place on the screen.Until now we discussed the operation of writing and reading to an LCD as if it were an ordinary memory. But this is not so. The LCD controller needs 40 to 120 microseconds (uS) for writing and reading. Other operations can take up to 5 mS. During that time, the microcontroller can not access the LCD, so a program needs to know when the LCD is bu sy. We can solve this in two ways. One way is to check the BUSY bit found on data line D7. This is not the best method because LCD's can get stuck, and program will then stay forever in a loop checking the BUSY bit. The other way is to introduce a delay in the program.The delay has to be long enough for the LCD to finish the operation in process. Instructions for writing to and reading from an LCD memory are shown in the previous table. At the beginning we mentioned that we needed 11 I/O lines to communicate with an LCD. However, we can communicate with an LCD through a 4-bit data bus. Thus we can reduce the total number of communication lines to seven. The wiring for connection via a 4-bit data bus is shown in the diagram below. In this example we use an LCD display with 2Ãâ€"16 characters, labeled LM16X212 by Japanese maker SHARP.The message ‘character' is written in the first row: and two special characters ‘~' and ‘}' are displayed. In the second row we have p roduced the word ‘mikroElektronika'. INTERFACING PIC MICROCONTROLLER TO LCD: [pic] 4. 5 DESIGN OF EMBEDDED SYSTEM Like every other system development design cycle embedded system too have a design cycle. The flow of the system will be like as given below. For any design cycle these will be the implementation steps. From the initial state of the project to the final fabrication the design considerations will be taken like the software consideration and the hardware components, sensor, input and output.The electronics usually uses either a microprocessor or a microcontroller. Some large or old systems use general-purpose mainframe computers or minicomputers. User Interfaces: User interfaces for embedded systems vary widely, and thus deserve some special comment. User interface is the ultimate aim for an embedded module as to the user to check the output with complete convenience. One standard interface, widely used in embedded systems, uses two buttons (the absolute minimum) to control a menu system (just to be clear, one button should be â€Å"next menu entry† the other button should be â€Å"select this menu entry†).Another basic trick is to minimize and simplify the type of output. Designs sometimes use a status light for each interface plug, or failure condition, to tell what failed. A cheap variation is to have two light bars with a printed matrix of errors that they select- the user can glue on the labels for the language that he speaks. For example, most small computer printers use lights labeled with stick-on labels that can be printed in any language. In some markets, these are delivered with several sets of labels, so customers can pick the most comfortable language.In many organizations, one person approves the user interface. Often this is a customer, the major distributor or someone directly responsible for selling the system. PLATFORM: There are many different CPU architectures used in embedded designs such as ARM, MIPS, Coldfir e/68k, PowerPC, X86, PIC, 8051, Atmel AVR, H8, SH, V850, FR-V, M32R etc. This in contrast to the desktop computer market, which as of this writing (2003) is limited to just a few competing architectures, mainly the Intel/AMD x86, and the Apple/Motorola/IBM PowerPC, used in the Apple Macintosh.With the growing acceptance of Java in this field, there is a tendency to even further eliminate the dependency on specific CPU/hardware (and OS) requirements. Standard PC/104 is a typical base for small, low-volume embedded and rugged zed system design. These often use DOS, Linux or an embedded real-time operating system such as QNX or Inferno. A common configuration for very-high-volume embedded systems is the system on a chip, an application-specific integrated circuit, for which the CPU was purchased as intellectual property to add to the IC's design.A related common scheme is to use a field-programmable gate array, and program it with all the logic, including the CPU. Most modern FPGAs are designed for this purpose. Tools: Like typical computer programmers, embedded system designers use compilers, assemblers, and debuggers to develop embedded system software. However, they also use a few tools that are unfamiliar to most programmers. Software tools can come from several sources: †¢ Software companies that specialize in the embedded market. †¢ Ported from the GNU software development tools.Sometimes, development tools for a personal computer can be used if the embedded processor is a close relative to a common PC processor. Embedded system designers also use a few software tools rarely used by typical computer programmers. One common tool is an â€Å"in-circuit emulator† (ICE) or, in more modern designs, an embedded debugger. This debugging tool is the fundamental trick used to develop embedded code. It replaces or plugs into the microprocessor, and provides facilities to quickly load and debug experimental code in the system. A small pod usually prov ides the special electronics to plug into the system.Often a personal computer with special software attaches to the pod to provide the debugging interface. Another common tool is a utility program (often home-grown) to add a checksum or CRC to a program, so it can check its program data before executing it. An embedded programmer that develops software for digital signal processing often has a math workbench such as MathCad or Mathematica to simulate the mathematics. Less common are utility programs to turn data files into code, so one can include any kind of data in a program. A few projects use Synchronous programming languages for extra reliability or digital signal processing.DEBUGGING: Debugging is usually performed with an in-circuit emulator, or some type of debugger that can interrupt the microcontroller's internal microcode. The microcode interrupt lets the debugger operate in hardware in which only the CPU works. The CPU-based debugger can be used to test and debug the el ectronics of the computer from the viewpoint of the CPU. This feature was pioneered on the PDP-11. As the complexity of embedded systems grows, higher level tools and operating systems are migrating into machinery where it makes sense.For example, cell phones, personal digital assistants and other consumer computers often need significant software that is purchased or provided by a person other than the manufacturer of the electronics. In these systems, an open programming environment such as Linux, OSGi or Embedded Java is required so that the third-party software provider can sell to a large market. OPERATING SYSTEM: Embedded systems often have no operating system, or a specialized embedded operating system (often a real-time operating system), or the programmer is assigned to port one of these to the new system.BUILT- IN SELF- TEST: Most embedded systems have some degree or amount of built-in self-test. There are several basic types. 1. Testing the computer. 2. Test of peripheral s. 3. Tests of power. 4. Communication tests. 5. Cabling tests. 6. Rigging tests. 7. Consumables test. 8. Operational test. 9. Safety test. START UP: All embedded systems have start-up code. Usually it disables interrupts, sets up the electronics, tests the computer (RAM, CPU and software), and then starts the application code. Many embedded systems recover from short-term power failures by restarting (without recent self-tests).Restart times under a tenth of a second are common. Many designers have found a few LEDs useful to indicate errors (they help troubleshooting). A common scheme is to have the electronics turn on all of the LED(s) at reset (thereby proving that power is applied and the LEDs themselves work), whereupon the software changes the LED pattern as the Power-On Self Test executes. After that, the software may blink the LED(s) or set up light patterns during normal operation to indicate program execution progress or errors. This serves to reassure most technicians/eng ineers and some users.An interesting exception is that on electric power meters and other items on the street, blinking lights are known to attract attention and vandalism. CHAPTER 5 [pic] 5. 1 Software Tools: 1. MPLAB 2. Protel 3. Propic 4. HI-Tech PIC C Compiler 5. 2 MPLAB Integration: MPLAB Integrated Development Environment (IDE) is a free, integrated toolset for the development of embedded applications employing Microchip's PIC micro and dsPIC microcontrollers. MPLAB IDE runs as a 32-bit application on MS Windows, is easy to use and includes a host of free software components for fast application development and super-charged debugging.MPLAB IDE also serves as a single, unified graphical user interface for additional Microchip and third party software and hardware development tools. Moving between tools is a snap, and upgrading from the free simulator to MPLAB ICD 2 or the MPLAB ICE emulator is done in a flash because MPLAB IDE has the same user interface for all tools. Choose MPLAB C18, the highly optimized compiler for the PIC18 series microcontrollers, or try the newest Microchip's language tools compiler, MPLAB C30, targeted at the high performance PIC24 and dsPIC digital signal controllers.Or, use one of the many products from third party language tools vendors. They integrate into MPLAB IDE to function transparently from the MPLAB project manager, editor and compiler. 5. 3 INTRODUCTION TO EMBEDDED ‘C’: Ex: Hitec – c, Keil – c HI-TECH Software makes industrial-strength software development tools and C compilers that help software developers write compact, efficient embedded processor code. For over two decades HI-TECH Software has delivered the industry's most reliable embedded software development tools and compilers for writing efficient and compact code to run on the most popular embedded processors.Used by tens of thousands of customers including General Motors, Whirlpool, Qualcomm, John Deere and many others, HI-TECH's reliable development tools and C compilers, combined with world-class support have helped serious embedded software programmers to create hundreds of breakthrough new solutions. Whichever embedded processor family you are targeting with your software, whether it is the ARM, PICC or 8051 series, HI-TECH tools and C compilers can help you write better code and bring it to market faster. HI-TECH PICC is a high-performance C compiler for the Microchip PIC micro 10/12/14/16/17 series of microcontrollers.HI-TECH PICC is an industrial-strength ANSI C compiler – not a subset implementation like some other PIC compilers. The PICC compiler implements full ISO/ANSI C, with the exception of recursion. All data types are supported including 24 and 32 bit IEEE standard floating point. HI-TECH PICC makes full use of specific PIC features and using an intelligent optimizer, can generate high-quality code easily rivaling hand-written assembler. Automatic handling of page and bank selection f rees the programmer from the trivial details of assembler code. 5. 4 Embedded C Compiler: ? ANSI C – full featured and portable Reliable – mature, field-proven technology ? Multiple C optimization levels ? An optimizing assembler ? Full linker, with overlaying of local variables to minimize RAM usage ? Comprehensive C library with all source code provided ? Includes support for 24-bit and 32-bit IEEE floating point and 32-bit long data types ? Mixed C and assembler programming ? Unlimited number of source files ? Listings showing generated assembler ? Compatible – integrates into the MPLAB IDE, MPLAB ICD and most 3rd-party development tools ? Runs on multiple platforms: Windows, Linux, UNIX, Mac OS X, Solaris Embedded Development Environment:PICC can be run entirely from the. This environment allows you to manage all of your PIC projects. You can compile, assemble and link your embedded application with a single step. Optionally, the compiler may be run directly from the command line, allowing you to compile, assemble and link using one command. This enables the compiler to be integrated into third party development environments, such as Microchip's MPLAB IDE. 5. 5 Embedded system tools: 5. 5. 1 Assembler: An assembler is a computer program for translating assembly language — essentially, a mnemonic representation of machine language — into object code.A cross assembler (see cross compiler) produces code for one type of processor, but runs on another. The computational step where an assembler is run is known as assembly time. Translating assembly instruction mnemonics into opcodes, assemblers provide the ability to use symbolic names for memory locations (saving tedious calculations and manually updating addresses when a program is slightly modified), and macro facilities for performing textual substitution — typically used to encode common short sequences of instructions to run inline instead of in a subroutine.Assemb lers are far simpler to write than compilers for high-level languages. Assembly language has several benefits: †¢ Speed: Assembly language programs are generally the fastest programs around. †¢ Space: Assembly language programs are often the smallest. †¢ Capability: You can do things in assembly which are difficult or impossible in High level languages. †¢ Knowledge: Your knowledge of assembly language will help you write better programs, even when using High level languages. An example of an assembler we use in our project is RAD 51. . 5. 2 Simulator: Simulator is a machine that simulates an environment for the purpose of training or research. We use a UMPS simulator for this purpose in our project. 5. 5. 3 UMPS: Universal microprocessor program simulator simulates a microcontroller with its external environment. UMPS is able to simulate external components connected to the microcontroller. Then, debug step is dramatically reduced. UMPS is not dedicated to only one microcontroller family, it can simulate all kind of microcontrollers.The main limitation is to have less than 64K-Bytes of RAM and ROM space and the good microcontroller library. UMPS provide all the facilities other low-cost simulator does not have. It offers the user to see the â€Å"real effect† of a program and a way to change the microcontroller family without changing IDE. UMPS provide a low-cost solution to the problems. UMPS is really the best solution to your evaluation. 5. 5. 4 UMPS key features: -The speed, UMPS can run as fast as 1/5 the real microcontroller speed. No need to wait 2 days to see the result of a LCD routine access.All the microcontroller parts are simulated, interrupts, communication protocol, parallel handshake, timer and so on. – UMPS have an integrated assembler/disassembler and debugger. It is able to accept an external assembler or compiler. It has a text editor which is not limited to 64K-bytes and shows keyword with color. It can a lso communicate with an external compiler to integrate all the debug facilities you need. – UMPS is universal, it can easily be extended to other microcontroller with a library. Ask us for toolkit development. – External resource simulation is not limited.It can be extended to your proper needs by writing your own DLL. – UMPS allows you to evaluate at the lowest cost the possibility to build a microcontroller project without any cable. – UMPS include a complete documentation on each microcontroller which describe special registers and each instruction 5. 5. 5 Compiler: A compiler is a program that reads a program in one language, the source language and translates into an equivalent program in another language, the target language. The translation process should also report the presence of errors in the source program. Source Program |> |  Compiler |> |Target Program | |   |   |v |   |   | |   |   |Error Messages |   |   | There are two parts of compilation. The analysis part breaks up the source program into constant piece and creates an intermediate representation of the source program. The synthesis part constructs the desired target program from the intermediate representation. 5. 5. 6 The cousins of the compiler are: 1. Preprocessor. 2.Assembler. 3. Loader and Link-editor. A naive approach to that front end might run the phases serially. 1. Lexical analyzer takes the source program as an input and produces a long string of tokens. 2. Syntax Analyzer takes an out of lexical analyzer and produces a large tree. Semantic analyzer takes the output of syntax analyzer and produces another tree. Similarly, intermediate code generator takes a tree as an input produced by semantic analyzer and produces  intermediate code 5. 5. 7 Phases of compiler: The compiler has a number of phases plus symbol table manager and an error handler.    |   |Input Source Program |   |   | |   |   |v |   |   | |   |   |Lexical Analyzer |   |   | |   |   |v |   |   | |   |   |Syntax Analyzer |   |   | |   |   |v |   |   | |Symbol Table Manager |   |Semantic Analyzer |   |  Error Handler | |   |   |v |   |   | |   |   |Intermediate Code |   |   | | | |Generator | | | |   |   |v |   |   | |   | Code Optimizer |   |   | |   |   |v |   |   | |   |   |Code Generator |   |   | |   |   |v |   |   | |   |   |Out Target Program |   |   | 5. 6 FABRICATION DETAILS The fabrication of one demonstration unit is carried out in the following sequence. ? Finalizing the total circuit diagram, listing out the components and sources of procurement. ? Procuring the components, testing the components and screening the components. ? Making layout, repairing the interconnection diagram as per the circuit diagram. Assembling the components as per the component layout and circuit diagram and soldering components. ? Integrating t he total unit, intertwining the unit and final testing the unit. CHAPTER 7 CONCLUSION The System RFID BASED ENERGY is developed and operated successfully in the laboratory. The prepaid energy meter was working properly and perfectly. The circuit having potential and current transformers which gives the power consumption in analog form. This is converted to digital and the converted one is again converted into KWH form i. e one unit. According to the tariff rates stored in the microcontroller, The consumed units and cost are displayed on the LCD. Future enhancements: Our project is just to caluculate the reading i. consumed power and caluculate the cost and then display the cost on the LCD. In future this circuit can also be used as a prepaid energy meter using a smart type arrangement. For we want to add a smart card reader and relay in extra. Due to this every customer has a smart card with some credits and after completing these credits we again go to EB and recharge the card. The energy meter reading can be send to the EB by implementing small kind of SCADA system, using this the readings can be straightly monitor by the EB. CODE: #include;pic. h; #include†lcd_16x4. c† __CONFIG(XT & WDTDIS & PWRTDIS & BORDIS & LVPDIS & WRTEN & DEBUGDIS & DUNPROT & UNPROTECT); void init(); oid ADC_VTG_CT(); void ADC_VTG_CT1(); void disp_meter(); void delay(); write_eeprom(unsigned char add,unsigned int data); unsigned int read_eeprom(unsigned char add); unsigned int i, j,bal,gsmcost, curt,vltg,crt,tmp,tmp1,k,fcrt,escp,cap_time,testeng,Engeeprom,tempvalue,ROTabv100=0,ROTupt100=0; bank2 unsigned char mill_count,tick1=0,h[15],rec=0; bank1 unsigned char sec, min,hr,check1,VHUDS,VTENS,VONES,CHUDS, CTENS, CONES,COLACK,COTENTH, ETHOD,EHUDS,ETENS,EONES,COTHOD,COHUDS,COTENS,COONES,EEONES,EETHOD,EETENS,EEHUDS,EELACK,EETENTH,unteeprom,unit,var=0,u11,u12,u13; unsigned char tm,tt,th,ctl; float cpwt1,cpwt2,Energy,Cost_engy,Cost; bit check_dev,card_present; ank2 unsigned char q t,msg,n,set1=0,set2=0,set3=0,set,set4=0,tab,cap,cap1,cap2,eeprom_erase_cnt; unsigned interrupt isr(void) { if(TMR1IF) { TMR1IF=0; mill_count++; //mill_count, scan_count, keypress, check, keyok,key if(mill_count;=25) { mill_count=0; sec++; if(sec;=59) { tick1=1; sec =0; ctl=1; min++; if(min;59) { min=0; hr++; if(hr;23) { hr=0; } } } }//mill_count }//TMR1IF if(RCIF==1) { h[rec]=RCREG; rec++; if(rec==12) { card_present=1; rec=0; } RCIF=0; } } void main() { init(); RC4=0; while(1) { lcd_move(0,0); lcd_puts(â€Å"Energy Meter†); RC4=0; if(card_present==1) { lcd_move(1,0); lcd_puts(â€Å"Recharged:†); if(h[9]==51) { lcd_move(1,10); lcd_puts(â€Å"Rs. 100†); or(j=0;j;=45000;j++); for(j=0;j;=45000;j++); gsmcost= 100; set1=1; card_present==0; lcd_clear(); } if(h[9]==56) { lcd_move(1,10); lcd_puts(â€Å"Rs. 50 â€Å"); for(j=0;j;=45000;j++); for(j=0;j;=45000;j++); gsmcost= 50; set1=1; card_present==0; lcd_clear(); } } while(set1==1) //&& SW==1) { //while(SW==1); lcd_mov e(0,0); lcd_puts(â€Å"Energy Meter†); COLACK =read_eeprom(0x00); COTENTH =read_eeprom(0x01); COTHOD =read_eeprom(0x02); COHUDS =read_eeprom(0x03); COTENS =read_eeprom(0x04); COONES =read_eeprom(0x05); Engeeprom = ((COLACK*100000)+(COTENTH*10000)+(COTHOD*1000)+(CHUDS *100)+(COTENS *10)+COONES); unteeprom =read_eeprom(0x06); ROTupt100 =read_eeprom(0x07);ROTabv100 =read_eeprom(0x08); disp_meter(); RC4=1; DelayMs(10); ADC_VTG_CT(); } while(set2) { lcd_move(0,0); //lcd_putn(check1); disp_meter(); ADC_VTG_CT1(); lcd_move(0,0); lcd_puts(â€Å"vtg:†); lcd_write(VHUDS+0x30); lcd_write(VTENS+0x30); lcd_write(VONES+0x30); lcd_move(0,8); lcd_puts(â€Å"crt:†); lcd_write(CHUDS+0x30); lcd_puts(â€Å". â€Å"); lcd_write(CTENS+0x30); lcd_write(CONES+0x30); RC4=1; DelayMs(10); if(curt) { tm = min – cap_time; //check1=1; if(min ; 58) { th++; } tt = (th*60)+tm; if(ctl==1) { ctl=0; //check1=2; Energy = ((vltg * curt *(float)tt)/100000); Energy = Energy*1000; testeng = (i nt)Energy; Energy = Energy/1000; Cost = Energy * cpwt1;Cost_engy = Cost + Cost_engy; bal = gsmcost – Cost_engy ; Cost_engy = Cost_engy*1000; Engeeprom = (int)Cost_engy; //bal = gsmcost – Engeeprom ; fcrt =bal; COLACK = fcrt/100000; fcrt=fcrt%100000; COTENTH=fcrt/10000; fcrt=fcrt%10000; COTHOD=fcrt/1000; fcrt=fcrt%1000; COHUDS=fcrt/100; fcrt=fcrt%100; COTENS=fcrt/10; fcrt=fcrt%10; COONES=fcrt; write_eeprom(0x00,COLACK); write_eeprom(0x01,COTENTH); write_eeprom(0x02,COTHOD); write_eeprom(0x03,COHUDS); write_eeprom(0x04,COTENS); write_eeprom(0x05,COONES); DelayMs(2); Cost_engy = Cost_engy/1000; if(Energy;0. 900) { Energy = 0; unit++; unteeprom = unit; write_eeprom(0x06,unteeprom); DelayMs(2); if(unit==100) { cpwt1 = cpwt2; nit = 0; } } } } else { set1=1; set2=0; lcd_clear(); } /*if(SW==1) { while(SW==1); RC4=0; set1=0; set2=0; lcd_clear(); } */ }//while(set2) }//while(1) }//main() void init() { TRISA = 0xFF; TRISB = 0xF0; TRISC = 0x80; PORTB = 0x00; ADCON1=0X82; GIE=PEIE= TMR1IE=RCIE=1; TMR1L=0X17; TMR1H=0XFC; SPBRG=25; BRGH=1; RCSTA=0X90; TXSTA=0X24; cpwt1 = . 4; Cost_engy = 0; unit = 0; unteeprom = 0; Engeeprom = 0; eeprom_erase_cnt=read_eeprom(0x10); if(eeprom_erase_cnt;5) { eeprom_erase_cnt=0; write_eeprom(0x10,0); write_eeprom(0x00,0); write_eeprom(0x01,0); write_eeprom(0x02,0); write_eeprom(0x03,0); write_eeprom(0x04,0); write_eeprom(0x05,0); } else { eprom_erase_cnt++; write_eeprom(0x10,eeprom_erase_cnt); } lcd_init(); //set1=1; T1CON=0X01; DelayMs(10); } void disp_meter() { if(set1) { lcd_move(1,0); lcd_puts(â€Å"U:†); lcd_putn(unteeprom); } if(set2) { fcrt =testeng; ETHOD=fcrt/1000; fcrt=fcrt%1000; EHUDS=fcrt/100; fcrt=fcrt%100; ETENS=fcrt/10; fcrt=fcrt%10; EONES=fcrt; lcd_move(1,0); lcd_puts(â€Å"E:†); lcd_write(ETHOD+0x30); lcd_puts(â€Å". â€Å"); lcd_write(EHUDS+0x30); lcd_write(ETENS+0x30); lcd_write(EONES+0x30); } lcd_move(1,8); lcd_puts(â€Å"C:†); if(COLACK) { lcd_write(COLACK+0x30); lcd_write(COTENTH+0x30); lcd_write(COTHOD+0x30); } else if(COTENTH) { lcd_write(COTENTH+0x30); lcd_write(COTHOD+0x30); //lcd_puts(â€Å". ); lcd_write(COHUDS+0x30); lcd_write(COTENS+0x30); //lcd_write(COONES+0x30); } else { lcd_write(COTHOD+0x30); lcd_puts(â€Å". â€Å"); lcd_write(COHUDS+0x30); lcd_write(COTENS+0x30); lcd_write(COONES+0x30); } /*********************AT COMMANDS********gsm energy meter coding********* if(tick1==1) { tick1=0; u11=unteeprom/100; u12=(unteeprom%100)/10; u13=unteeprom%10; sendtopc1(â€Å"AT†); TXREG=13; while(! TXREG); delay(); for(k=0; k