Saturday, August 31, 2019

Government Role Essay

The main role of the executive is to preform leadership like duties such as carrying out leadership roles, ceremonial roles, and preforming symbolic. The leadership role demand formulating, articulating, and implementing goals of the political system. The effective chief executive becomes the spokesperson for the people, attempts to invigorate the people’s support for these goals, and then develops strategies that ease their accomplishment. For the most part the chief executive takes the initiative in a policy form. The executive policy leadership is very crucial during times of crisis, because the executive structure has the potential for a level of coherence and consent of action, which is almost always lacking in legislature. In most political systems the chief executive officer has the power to veto the legislation that the legislature initiates, which may be directly or indirectly. The actors in the executive role usually function as the unifying symbol of the entire soci ety, becoming the lead figurehead for the people. The executive presence becomes a central to many of society’s ceremonies and rituals. In the majority of all political systems the executive has the primary responsibility for implementing the laws and policies of political order. Most systems have an executive cabinet in where each member is directly and personally responsible for some of the major areas of administration. However they are supposed to set a broad set of guidelines for policy and implementation and responsibility for any major mishaps that occur. In parliament for examples, the minster of a department will usually resign if there is a serious shortcoming in his or her area of responsibility. The chief executive must set policy and supervise the organization and utilization of the state’s military capabilities, which is a task that can have the most serious consequences for the security, and well being of the society. Along with this comes the supervision of foreign affairs that involves a complicated pattern of meeting officials from other states and deal with national dealings with other nations usually showing some form of cooperation. The British government and the United States government are different in many aspects but yet share many similarities. A prime minister who handles the majority of the executive responsibilities mainly holds Britain’s executive, and of curse the king or queen handles ceremonial responsibilities like a figurehead would. However the United States has a fused executive system in where the president handles both the  head of state and the head of government roles. 2. Democracy has a wide range of meanings, but true direct democracy is a government of and by the people. An alternative concept in which it is pretty clear is representative democracy. This is a system in which the citizens elect people to represent them in the political aspect of things and to express the values on their behalf of society. Another general term to describe this democracy is a republic even though not all republics are democratic and not all democrats are republicans. Electoral democracy is defined as a political system in where all citizens periodically vote in order to elect political leaders in their society. It also seems important to establish that the people have the power to retain or reject those serving as their political leaders. This additional condition, called the limited mandate, means that the electorate grants the authority to rule for only a short fixed period of time, and then the electorate has the opportunity to elect their representatives again. Meaning that if the political leaders do not gain sufficient votes the political leaders will voluntarily resign office. We can also classify a political system called liberal democracy when citizens enjoy not only electoral democracy but also substantial political rights and civil liberties regarding participation, personal freedoms, and oppositions. The United States is considered to have some like similarities in this regard for the notion that its citizens enjoy the freedoms and rights that come along with voting and individual values. A non-democracy is a concept by with all major decisions especially with those that deal with the state is handled by the person or political group in charge of the state in that time. One conventional concept used to define non democracies is a dictatorship. A definition of a dictator might be a ruler with absolute power and authority. Dictatorship may be further defined as the absence of a limited mandate- a critical factor in the definition of democracy. That is, the citizens of that state have no power to remove the person in office or political leadership period. This government type is often time seen as harsh to its citizens and harsh. Totalitarianism, which is a political system that the allocation of values and its control penetrate into almost every aspect of its citizen’s every day lives. The totalitarian political system demands complete obedience to its extensive  rules in culture, economics, religion, and most of all morality. All organizations are subordinated to the totalitarian state. Every activity is under scrutiny by the state in the name of the public interest. The state might define what is ok to watch or be produce in a movie, what acceptable to say in the media, and It even has acceptable behaviors and thoughts for its people. Another concept that falls under the category of non-democratic is Authoritarian regimes. Many authoritarian regimes such as dictatorships lack empowerment. What really distinguish authoritarianism are the political actions and decisions of the ruler, while the political rights and freedoms of the people are significantly limited. In other words under authoritarianism the population has very minimal political rights. An authoritarian regime places many severe restrictions on the activities of individuals and groups who advocate the people on the actions of the political system. The great majority of the populations are not allowed to participate in any political activities except in ways that expressly encouraged by the regime such as mass rallies and speeches. Citizens of such places are not allowed to question th e political intuitions, procedures, or public policies of an authoritarian regime. 3. There are a few different types of states, first there is the unitary state and then there is central government, which holds all legislative power. While the central government has indivisible sovereignty, it can delegate power or functional responsibilities to territorial units, which have names such as department or regions. These peripheral governments serve only at the convenience of the central government, which can revoke their power or functions at any given time. The majority of all citizens tend to identify with the country as a whole, rather than with regional authorities as they should. A federation is divided constitutionally and functions between a central government and the set of regional governments. On the other hand to a unitary state, there is an explicit sharing of power among the levels of government in a federation, and no level has legal power to dominate any other level in all policy domains. There are five major rationales that make up a federation: large size, prior existence of strong states, desire to create unity or accommodate diversity, the desire to concentrate power and resources, and the desire to disperse political power. A federation can be established to prevent the over centration of power in the central government. A confederation is an association in which states delegate some power to a supranational central government but retain primary power. Confederations emphasize on economic cooperation and or military cooperation’s. It is a loose grouping of states in which each state’s involvement membership, and compliance with the central government are conditional depending on the state’s perception of its own national interest.

Pay It Forward

Pay it Forward Jennifer Trager University of Phoenix PSY/490 Instructor: Vicki Koenig November 25, 2011 Pay it forward is becoming a more popular phrase it seems. When you drive through towns and different communities, one can see signs for soup kitchens, volunteer services, etc. There is something about the idea of giving back to others that is not only for the one receiving, but also beneficial to the one doing the work behind it. This idea is considered altruism and is driven by a want to contribute to someone else’s life instead of focusing on what one can get from others.There once was a movie called â€Å"Pay it forward† about the whole idea of doing something for someone with the only stipulation being to do something for someone else. Once, Oprah did a show on random acts of kindness and the reactions of those receiving these acts. Currently, it is the holiday season and it might be safe to assume that these acts of kindness might be more in the making. Some of these acts could include carrying someone’s groceries to their car, buying someone a cup of coffee at the local convenience store, or even paying someone’s check at a restaurant.Personally, one of my favorite things to do is pay the toll for multiple cars on one of our major highways. I enjoy this most because I am unable to see their reactions and I hope that they would â€Å"pay it forward† also essay writers online. Although I am not there to see their reactions, there have been moments when people have sped up to wave to me or mouth a thank you, which is nice even though these are not things I look for in doing this. Some might suggest that the idea of altruism can be based on Abraham Maslow’s hierarchy of needs model. This idea suggests that there are fundamental drives behind people’s actions.While the first two stages might suggest a more selfish need due to the idea of meeting one’s physical needs such as food, shelter, etc. and the second stage is security and the idea that one’s needs will be met in the future. The third stage is belong or a need for unconditional love and leads to the fourth and fifth stage. The fourth is purpose/esteem which is seen in one’s activities and the fifth is human potential that is suggested as meaning â€Å"self-actualisation† or the development of self, personal creative potential.In an article titled â€Å"Re-Establishing Altruism As a Viable Social Norm† (2011), it is stated that â€Å"people are generally keen to promote well-being of others, and a new generation is working as volunteers far more than their parents ever did†. This might be attributed to the idea that today needs are met with less struggle than in years past or that this â€Å"new generation is discovering the tremendous value of making a real contribution to the lives of others†.Another article in Psychology Today suggests that â€Å"acting with an unselfish regard for others doesn’t always come naturally, even though many psychologists believe we’re hard-wired for empathy†. And the final thought from this same article states that â€Å"most of us realize that when we make an effort to give without expectations of reciprocity, we feel fulfilled and energized†. So if this is the new idea behind our everyday, the world might not be doomed! I often feel that we are becoming more of a society that is all about themselves and what can be gained at anyone’s expense.This small assignment and project has shed some hope on my sometimes cynical attitude. And brings me to a place of realization in that there is always more that can be done on my part alone. References Psychology Today. (2011). Altruism Basics. Retrieved November 23, 2011 from http://www. psychologytoday. com/basics/altruism. Re-Establishing Altruism As A Viable Social Norm. (2011). Retrieved November 21, 2011 from http://www. altruists. org/ideas/psychol ogy.

Friday, August 30, 2019

The Book Gender

In chapter six of the book Gender: Ideas, Interactions and Institutions, Lisa Wade and Myra Marx Ferree discuss inequality involving men and masculinities. The reading talks about the concept of â€Å"doing gender†, braking or going by certain gender rules, is performed by everyone in order to fit into society. The concept that there are two genders, otherwise known as gender binary, is hierarchical and places men above women and values masculinity above femininity. (Wade 113). This has bad outcomes for both genders due to the fact that for women, it reduces their social status. For men, it leads them to believe their interests take more priority than women. The chapter then discusses an example of this with cheerleading where in the mid 1800s, cheerleading was an all male sport and it was â€Å"too masculine for women.† When women showed interest in the sport, it changed how people thought of cheerleading. The focus on the chapter is to show the different ways social inequality occurs and gives different examples of situations in which certain traits of masculinity are glorified, allowing certain men to be glorified. The chapter continues through talking about hegemony; a sociological concept used to help us understand this social inequality in our society. Men who fail to embody hegemonic masculinity, otherwise known as being the â€Å"idealized man† are lower on the scale that establishes the hierarchy of man that ranks them from most to least masculine. The traits of a â€Å"higher up man† would include strength, white, athletic and be considered a â€Å"real man.† This is experienced on both the individual and group level, because individual men are viewed as a certain way, but are put into distinct groups because of it. An example of this is men who are physically weak are called â€Å"wimps†, but solely based on their individual traits. Men take many risks in their lives and are shown to be more likely to get into a fight than a woman. (Wade 129). Research was done to show the different arrests based on an individual's sex. It showed that all crimes were over 50% male with murder, rape and carrying weapons being the greatest percentage over 80%. These rules of masculinity keep men from being able to express certain emotions, even enough to develop intimate friendships. A psychologist named Niobe Way interviewed boys about their friendships, with a 17 year old mind answering that their relationship is mostly â€Å"joking around† and â€Å"not about serious stuff.† This proves the argument that men have to follow the gender rules of masculinity, which is unfair because they feel unable to show emotions while women are more likely to seek help. Men become lonely and are more likely to commit suicide. These aspects of doing gender as a man are called toxic masculinity, because they are bad for other men, women and the individual man himself. These include some of the traits explained above, like suppressing emotion and dangerous actions. The authors were able to prove their argument of certain men being put over others, especially women. Those hegemonic traits allow them to avoid femininity and contribute to the sexist society we are in today. Avoiding acting like a girl is constraining to men, and limit their lives option in order to remain a â€Å"manly man.† There are lots of research involving examples of men giving up all feminine acts or of their masculine traits giving them power over â€Å"weaker† men, but especially women. In preforming in strictly manly activities, men tend to miss out of things they may enjoy just because they are considered more â€Å"feminine.† Men continue this act of masculinity to preserve the privileges and the gender binary that gives hegemonic masculinity its power (Wade 136). They choose to follow the rules, or appear as lower in the hierachy. Wherever they fall though, they all have a fear of joining the men who are disadvantaged and in the lower parts of the hiarchy. Some future studies about this idea of men challenging the gender binary. Few men do, while many women are less afraid to do so. Research could involve what men would be more likely to challenge the gender rules and face falling lower, and how those men would affect our society with them performing more feminine acts. Understanding both men and women's experiences and perspective can help us better perform gender to where both genders actions aren't constrained to the binary gender system.

Thursday, August 29, 2019

History of Arts and Artists Essay Example | Topics and Well Written Essays - 1000 words

History of Arts and Artists - Essay Example Like civilization, art has its own progress and/or decline as an observer might consider. Art has primarily been known as the appreciation of beauty which has been expressed early on through paintings and carvings in various forms. In this essay author pays exclusive attention to the history of art through human civilization. Ancient art on the other hand followed a quite similar way of expressing one’s appreciation of beauty but could be said to have improved in details. Prehistoric and ancient art have been expressed mostly in paintings on walls and stones. Egyptian art, for instance, made use of more vivid illustrations, adding more details to the subject which usually picture their culture. The pyramids themselves were an expression of the artistic point of view of ancient art. This essay covers the renaissance era, that brought artists like Leonardo da Vinci and Michelangelo Buonarroti. Their beautiful paintings were concentrated more on culture and religion illustrations with the use of more deeper colors. It also pays attention to the baroque period which was borne in France and dominated by artists like Bernini, Caravaggio and Rembrandt. Realism was described, as style that came to existence with its objective rejecting the ideas set by romantics. Contemporary art movements like Dadaism, which was an effect of World War I are also explained in detail. Artists at this time saw the atrocities of war and used art as their instrument of sending their messages to the world, facing the realities of war and not just concentrating on the beautiful things.

Wednesday, August 28, 2019

Business Law Essay Example | Topics and Well Written Essays - 1500 words - 25

Business Law - Essay Example â€Å"Procedures for settling disputes by means other than litigation; e.g., by Arbitration, mediation, or minitrials. Such procedures, which are usually less costly and more expeditious than litigation, are increasingly being used in commercial and labor disputes, Divorce actions, in resolving motor vehicle and Medical Malpractice tort claims, and in other disputes that would likely otherwise involve court litigation.† Reading and understanding from the above definition, it can be interpreted that ADR is an alternate mechanism for justice which is less costly and more expeditious. Alternate Dispute Resolution consists of Arbitration, Mediation and Conciliation. Arbitration is a process by which the parties to the dispute appoint an independent Arbitrator who judges the case for the respective parties. This independent arbitrator is appointed on the behest of both the parties. Once the arbitrator is decided, the venue for the arbitration depends upon the parties to the matter. Unlike the Court system where the venue is decided as the courts itself, here the parties have more autonomy towards the way the case is going to take place. Hearings take place in accordance to the whims and fancies of the parties, and therefore the whole procedure is way more relaxed and chilled out. Mediation and Conciliation are the less popular form of ADR trials. These systems envisage a concept where the parties mediate and conciliate with the other parties on their own without the admission of an arbitrator. The process of Mediation and Conciliation is considered to be more in the zone of a personal conversation rather than a legal case going on. The idea of ADR has always been to allow a more open and calm approach towards justice delivery system. And it has ben quite successful in the Europe and UK with a streamlined method of arbitration, medication and conciliation process in practice. The ADR Group is a world-renowned

Tuesday, August 27, 2019

A visit to a theme park, such as Disneyland Essay

A visit to a theme park, such as Disneyland - Essay Example There is need to describe the park based on experience rather than speculation. This allows individuals to plan before physically visiting any park. Age at the Disney world is not a limitation. The theme setting within the park bases on Disney classing cartoons and story tales. The aim is to create an illusion that the actual events in the story tale are true. The Alice in wonderland ride is exceptional. The ride offers children with the opportunity to explore details within the park. The train passes through various stages that offer Alice in wonderland’s experience as written in the tales. The section is based satiated for younger children and the event organizers did a great job in making the ride slower. This offers entertainment and at the same time assures security for the children (Disney, 2015). The rest of the family has a place to enjoy as they may choose a merry go round ride o a rollercoaster ride that offers a different experience from those experiences at Alice in wonderland. Different spots are developed along the classic tales. The entry is designed in to create ancient of what would transpire inside the theme park. The combination of rides and the bouncing castles with music is a positive on the organizers front. The dress code by the assistants within the theme park reflects on the main purpose of the organizers. The focus would be on the public relation in that the assistants at the theme park develop an atmosphere that is based suited for visitors (Disney, 2015). The ticketing services are one of a kind as people may choose different modes of payment depending on their preferences. The theme park cannot be complete without a visit at the Cartoon adventure where your are treated to a Mickey mouse tales and a glance at how these theme parks integrates its cartoon characters to create an entertainment galore (DIS, 2014). In conclusion, a firm or any organization should create its plans in an effort to ensure satisfaction. Satisfaction

Monday, August 26, 2019

Math Assignment Example | Topics and Well Written Essays - 1000 words

Math - Assignment Example To start with, one needs to be able to organize and count their money; this comprises of knowledge of subtraction, division and multiplication. In everyday activities we visit supermarkets and buy items, in case we are not equipped with the knowledge of mathematics, we would not be able to recognize we receive the right change from the shop attendance. Even those individuals having mathematics related phobias cannot seepage the everyday encounters of mathematics in their lives. This is because mathematics ranges from: school, home and workplaces. Traveling involves covering of distances, almost each and every person moves from one place to another in everyday life. It is thus prudent to put into consideration the means of transport one will choose to reach the desired destination. If the individual chooses to use their own private means then, he or she will consider the miles-per-gallon of fuel that the car will consume for trips. In the event that one is faced by obstructions along the way or are forced to take detours. Analysis of available means of transport is done and then the transport means is choosen.The means of transport chosen is achieved at after analyzing the available means of transport. One will evaluate the conformability, time saving and cost of each means of transport before coming to the means of transport to use. Those traveling by air are required to know departure times and arrival schedules of a particular freight. When travelling by mode of air, the weight of luggage is critical and must be considered . Thus those who travel by air may want to risk some substantial baggage surcharges. Individuals buy items from various stores every day. Every noble person puts into consideration the terms of sale being offered by the seller in order to receive the most favorable deal. Trade discounts make be offered in various ways such as; cash discounts where one is either

Sunday, August 25, 2019

Taiwan and the One Country, Two Systems Essay Example | Topics and Well Written Essays - 2500 words

Taiwan and the One Country, Two Systems - Essay Example After the Second World War, the Republic of China, led by their leader by then, was the governing polity in the island. Following the Chinese civil war in 1949, the government of the Republic of China withdrew their control of Taiwan. In 1952, Japan officially renounced all territorial rights in San Francisco Peace Treaty. The KMT ruled Taiwan as a single party state for four decades, until democracy was realized in the 1980s. These reforms which were instigated by Chiang Ching-Kuo who was then the leader in the mainland China were continued by his predecessor Lee Teng-hui, which eventually led to the first presidential election in the island in 1996. Until today, the island is a democracy with a presidential system of governance. History and creation of â€Å"one country, two systems† policy (Deng Xiaoping) â€Å"One country, two systems â€Å"translated as â€Å"one China, two systems† is a constitutional principle that was established by Deng Xiaoping. Deng Xiaoping was an executive leader of the People’s Republic of China. His purpose in formulating this principle was major to reunify China during the early 1980s. This leader gave suggestions for the establishment of only one China, but different regions such as Macau, Taiwan, and Hong Kong to retain their capitalist political and economic systems while the rest of China to remain on a socialist system. Under this principle, Macau, Taiwan, and Hong Kong regions should go on with their legal, political, financial or economic affairs including how they relate to other foreign states.

Saturday, August 24, 2019

Discuss the Hong Kyongnae Uprising of 1812. What were the main causes Coursework

Discuss the Hong Kyongnae Uprising of 1812. What were the main causes and how did leaders rally support for their cause - Coursework Example The major causes of this revolt, which rocked PyÃ… ngan, the Northern Province, included regional bigotry and poor harvests (Buswell, 2006). The province of PyÃ… ngan was neglected by the central government, causing a dire regional inequality with other areas. The disgruntlement with socioeconomic inflexibility combined with debauched irregularity and corrupt leadership instigated people to gang up the inept dominion. The provincial tax frauds triggered the Chinju insurrection, which was masterminded by learned individuals who resorted to defend the interest of the public against corrupt officials. The people who supported the rebellion were those who were fed up with the corruption in the government (Fuqua, 2011). They had a common goal of deposing leadership that was an epitome of moral decadence, with public officials engaging in various corrupt deals and committing various atrocities without shame. As such, they managed to sway a large number of people to fight for a common int erest of establishing a responsible government. Following this serious revolt, many people from the countryside flocked Chinju nabbing the armed forces commander and assassinating the

Friday, August 23, 2019

Is a Publicly Funded Transit System Reasonable Essay

Is a Publicly Funded Transit System Reasonable - Essay Example The essay "Is a Publicly Funded Transit System Reasonable?" talks about a transport agency Toronto Transit Commission which operates streetcars, rapid transit, and transit bus services in Canada, Ontario and Toronto. It is the quickest and most convenient way to get into Toronto. Currently, the public sector runs this commission. As much as many people may prefer running institutions privately, public good funded systems are better managed. Public or common good as defined by John Rawls as a general condition that is equally advantageous to everyone. By using public good, affordable and accessible services are available to both workers and consumers of the service. It also promotes a political and just legal system in the country. Public good in a transport system actively creates a better environment that may be defined, creates justice, and a liberal, fair social infrastructure that permits the pursuit of virtue. Publicly funded transit system provides competitive advantages. An ar gument for the public good in the transport system is based on the philosophy of John Rawls of Justice is fairness. Any person participating in a practice or is affected by it poses an equal right to a more general liberty compatible with liberty for all. Inequality is arbitrary unless it is illogical to expect that it will work out as an advantage to everyone, and provided the offices and positions to which it attaches is open to all. It is always a right of any person in Toronto to get access to inalienable good public transportation.

Christianity and Islam Essay Example | Topics and Well Written Essays - 500 words

Christianity and Islam - Essay Example One should strongly uphold the values and teachings that Allah has taught them for these will serve as their guide to fulfilling a spiritually-rich life together with Allah. Since monotheism is part of the Islamic faith, Muslims is in continuous contention with the Trinitarian God that Christian faith believes. Islam would not allow anyone or any other being for that matter to be associated with Allah for they trust that Allah is incomparable and solitary. Angels are considered as the messengers of God. The existence of angels is generally acceptable as true among Muslims. Islam agrees that God has numerous angels who are good in nature. Satan is an exception to this generalization for he is the only angel who dared to refuse the fact that God has the Ultimate Power that Satan disobeyed His commands. An analogy is stated in the article to distinguish men from the angels. Angels are made of light while human beings are made out of clay. Jinns are described in this section as well. They are created by fire which is correlated with the power of speech or gift of tongues. Prophets and scriptures was the third doctrine on the article. Mohammad is named as the last descendant of the prophets who were assigned to introduce and disseminate the scriptures to the people.

Thursday, August 22, 2019

Importance of National Income Statistics Essay Example for Free

Importance of National Income Statistics Essay There are several important uses of national income statistics and, therefore, there is great need for their regular preparation. National income estimates provide not only a single figure showing the national income, but also supply the detailed figures in regard to the various components of the national income. It is both the figure of national income and the details regarding its various constituents that throw light on the functioning and performance of the economy. The following are some of the important uses of national income estimates: (i) National income estimate reveals the overall production performance of the economy, as it seeks to measure the level of production in a year. Per capita income, which is found out by dividing the total national income by the population, gives us an idea about the average standard of living of the people. Economic welfare depends to a considerable degree on the level of national income and the average standard of living of the people. Thus, the figures of national income and per capita income indicate the level of economic welfare of the people of a country. (ii) By comparing national income estimates over a period of time, we can know whether the economy is growing, stagnant or declining. If the national income increases over years, it means that the economy is growing. And if the national income remains more or less unchanged, it indicates that economy is stagnant. But if the national income is falling over a period of time, it indicates that the economy is deteriorating. In case the economy is growing, we can also judge the rate of economic growth or development by measuring the rate of increase in national income. Further, by comparing the per capita income over years, we can know the changes in the standards of living and economic welfare of the people. (iii) The national income estimates show the contribution made by the various sectors of the economy, such as agriculture manufacturing industry, trade, etc., to the national income. Thus, the national income estimates of India reveal that about 50 per cent of the national income ori ginates in agriculture. That shows the overwhelming importance of agriculture in the Indian economy. (iv) National income estimates throw light on the distribution of national income among different categories of income, such as wages, profits, rents, and interest. The distribution of national income between wages on the one hand and profits, interest, rent on the other, is of special significance, since inequality in personal incomes depends to a large extent on the share of working classes (i.e., wages) and the share of property owners (i.e., rents, profits and interest). (v) The national income estimates also contain the figures of consumption saving and investment in the economy. Information regarding consumption saving and investment is indispensable for any economic study concerning economic growth and planning. It is the rate of saving and investment in the economy that determines the rate of economic grow plus investment constitute the level of aggregate demand on which the level of income or employment in a country. (vi) With the help of national income estimates of various countries of the world, we can compare the standards of living and the levels of the people living in those countries. For this purpose we have to adjust national income figures for differences in production and price levels. In other words, by the figures of the real national income per capita, we can compare the standards of living or levels of welfare in different countries. Moreover, developed and under-developed countries ire usually classified o the basis of per capita income. (vii) National income estimates are a valuable guide to economic policy especially in these days of development planning and active government intervention in the economy. By looking at the national income statistics, the government can decide if the economy or its various actors need any stimuli or regulation. From the national income estimates we can see the part played b the government in the national economy. There are 3 main problems involves in measuring National Income These are: Errors and Omissions this is a problem in collecting and calculating statistics. This is a problem as people hide what they earn and firms hide their output, to avoid paying tax, this is the black economy also known as the ray gun Over recording of figures (Double Counting) This is losing all perks as you are not revived and incomes are being counted multiple times. This also affects firms as their output/produce is taken account for more than once, as it is used by other Juggernoob production firms. Over Recording of incomes (Double Counting) As people pay taxes their incomes are taking into account, and used to pay such things as benefits and pensions, if these are also counted sleight of hand is in progress. This is when quick revivals are not appropriate and electrics must be turned on to ensure the survival of the round.

Wednesday, August 21, 2019

Library Management System Based On Finger Prints And RFID

Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit

Tuesday, August 20, 2019

Aims Of Ethics In The It Industry Information Technology Essay

Aims Of Ethics In The It Industry Information Technology Essay Introduction According to the Larousse dictionary, Ethics are rules or standards governing the conduct of a person or members of a profession (medical ethics, IT ethics, and health ethics etc). The conduct of a person implies integrity; integrity plays an essential role in the ethical behaviour. A person with ethics act with personal code of principles, apply moral standards and respect and consideration in every situation. Information technology is the processing of data via computer, it is the use of hardware and software technology to process and distribute information in digital and other forms. Ethics in information technology refers to the code of conduct or guidelines for people working in the IT industry or using IT infrastructure. In this essay we will try to found out why is that ethics is so important to today industry, whats the role that it plays to help every business running smoothly. We will also identify what will be the impact of a non existence code of conduct in IT on the society. AIMS OF ETHICS IN THE IT INDUSTRY When talking about ethics, the more important thing to think about is personal values. Value is largely part of ethics. And you can talk about ethics without mentioning personal values and moral. The purpose of ethics in information security is not just philosophically important; it could mean the survival of a business, or an industry.   Information technology, computers and networks do not raise new ethical issues, ethical issues has always been the major part of a working environment. However the Internet does contribute a fascinating sense of anonymity; the notion that no one can see or find out what we are doing.   The main role of ethics in the IT industry is providing a firm ground basis for the use of IT whenever needed  [1]  . The IT industry is divided in different organisation body, and each body apply various codes of conducts regarding their target, the area of working and their consumers. The ethics varies depending on the academic board. There is a global code of ethics for the whole information technology but each professional board will have their own preamble code of ethics. PROFESSIONAL IT WORKER AND ETHICS An IT professional is describe as someone with a specific or specialized knowledge, and also with a long and intensive academic career. Various role applied for someone to be call an IT professional, could a, Programmers, Systems analysts, Software engineers, Database administrators, Network administrators etc There are various are where ethics come in plays when working in Information Technology; professionalism, personal integrity, privacy, law and policies, communication, system integrity, education, social responsibility. IT professionals have many different relationships that must be managed with: Employers, Clients, Suppliers, Other professionals, IT users, Society at large  [2]  . Relationships between IT Professionals and Employers IT professionals must set an example and enforce policies regarding the ethical use of IT. Software piracy is the act of illegally making copies of software or enabling others to access software to which they are not entitled. Software piracy is an area in which IT professionals can be tempted to violate laws and policies. The Business Software Alliance (BSA) is a trade group that represents the worlds largest software and hardware manufacturers. Its mission is to stop the unauthorized copying of software produced by its members  [3]  . Many of the ethical issues that face IT professionals involve privacy. For example: Working as a network administrator or a network security doesnt allow you to access data on a network whenever you want to. Because of the personal ethical believe, use of data should be only and strictly for professional purpose if not there is a breach of code. Is it fair for an IT worker to access a private employee folder or email because it got the user password? Many other issues involving privacy could be raised here, it important that as an IT professional you behave with ethical conduct that regulate the work of IT. Other issues that we need to look at in the relationship between IT professional and employer is the Trade secret; Information used in business must be only within the business if not there is a breach of code of ethics In looking to those privacy issues above, it is so easy to see how one those actions above could be used in critical way to jeopardize the working environment. Many of the information gain by an IT professional could be use as a form of pressure to have a political advantage or to be used to get someone fired.  [4]   Relationships between IT Professionals and Clients IT professional provide various type of work at the hardware and software services at some cost within a given time period. According to Deb shinder network security expert, Ethical problems arise if a company recommends its own products and services to remedy problems they have detected. It is then important that a strong code of ethics need to be set up to avoid this kind situation to happen for the sake of every party.  [5]   Relationships between IT Professionals and Suppliers There need for a good relationship between supplier is very important for the long term survival of the business. It is also important to have a fair deal with suppliers each when required. Bribery should be always avoided in respect of the code of ethics.  [6]   Relationships between IT Professionals and Other Professionals Working environment is a very delicate place to be, mutual respect between each professional is vital for day to day running of the business. Professional should adopt a professional code of conduct. Some ethical issues between members of the IT profession could arise but it important that strictly respect of the code apply.  [7]   Relationships between IT Professionals and IT Users IT users are people that use any IT infrastructure everyday for different purpose. Basically is a person for whom a hardware or software product is designed. Its important to understand the user needs and capabilities to establish an ethical environment that supports ethical behaviour by users  [8]  . Relationships between IT Professionals and Society The fact that IT professional are the main people behind the technology we use, make play an important role on us and the society in general. They play a major role in the IT user life. Maintaining and respecting the code of ethics establishes is essential and vital for the society. There action can affect the society in various ways, its then important they adhere to the code of ethics and rules that are in place to maintain a coherent and free of bias society. ETHICS AND IT END USERS Ethical use of IT is a really growing concern nowadays, with the rapid growing of internet and it social network application, download, online streaming and all others available application for the internet make this area a very concern for local government and watchdog. End users are main people affected by this issue, because it so hard to have a written code of conduct of conduct that user should follow. Code of ethics here required moral and personal integrity of each user. With the rapid growth of pornography, hacking, social network attack, viruses and other related threats, it is important that each user apply some common sense moral for the simple fact that this an area that is really difficult to monitor. The main objective of the code of ethics is  to establish professional business standards that will protect and enhance the concept, the image, the credibility and the sustainability of the business. CONCLUSION The code of ethics provide guidance by establishing a set of rules and standards for the use of IT and for the behaviour to adopt when working in the IT environment or when using IT infrastructure. There are different from the law but there are made in accordance with the law. So many issues regarding the ethics in IT couldnt be raise here, the ethics in IT is a very large to develop, many IT authors have wrote books and journals to raise this issues. In our essay we have try to give an idea how ethics come in play in the working environment and for IT user.

Monday, August 19, 2019

Death, Personal Experience and the Supernatural in Sylvia Plaths Poetr

These five poems by Sylvia Plath are all connected by the theme of death, self-loathing, and by the presence of historical and magical concepts. Sylvia Plath uses very powerfully charged imagery of controversial and emotional topics in order to best describe her own life. Most of the poems reflect her own personal life, including the events that she has experienced and, more appropriately, the relationships and emotions that she has felt. Every single one of these five poems uses the word â€Å"dead† and the topic of death itself is prevalent in some manner. Of particular interest is the presence of her relationship with her deceased father, and her own reluctance to let go of his memory. Plath's poetry reflects her own self-loathing and disregard for her own existence. Her poems often mention her own attempts at suicide, in addition to her personal experiences with trying to get rid of her suicidal desires. In each of her poems she evokes the images of historical and mythical creatures and concepts linked with the religious and the supernatural. In addition, her poems can be connected by the idea of being held back or held down by some sort of feeling, either of desire for a loved one, escape from mortal existence or of a fantasy world. In the poem â€Å"The Colossus†, Plath is reflecting on her relationship with her father. She depicts him as a giant statue of sorts that has broken into pieces that, despite her efforts, she can never piece back together. This poem reflects her inability to let go of her father despite him being dead for most of her life; she's thirty years old at the time. In one particular line, she says, â€Å"Thirty years now I have labored / To dredge the silt from your throat. / I am none the wiser.† (Plath 48-49) The t... .... Plath, Sylvia. "Balloons." Introduction to English Literature. Comp. Trent University Department of English. Toronto: Canadian Scholars, 2010. Print. Plath, Sylvia. "Cut." Introduction to English Literature. Comp. Trent University Department of English. Toronto: Canadian Scholars, 2010. Print. Plath, Sylvia. "Daddy." Introduction to English Literature. Comp. Trent University Department of English. Toronto: Canadian Scholars, 2010. Print. Plath, Sylvia. "Lady Lazarus." Introduction to English Literature. Comp. Trent University Department of English. Toronto: Canadian Scholars, 2010. Print. Plath, Sylvia. "The Colossus." Introduction to English Literature. Comp. Trent University Department of English. Toronto: Canadian Scholars' Press Inc., 2010. Print. Webster's English Dictionary. Canadian. Toronto: Strathearn Books Limited, 2006. Print.

Sunday, August 18, 2019

Like the Government and Corporations, Man Essay examples -- American S

When I first read the â€Å"The Power Elite† by C. Wright Mills, I saw the title and immediately approached it cautiously. I am a born skeptic, and to me the title conjured images of hippies passing around reefer talking about like, the Illuminati man. However as I read Article 56, chapter 13 of Understanding Society: An Introductory Reader, I was struck by rationally Mills approaches a complex and controversial subject. Particularly effective is his systematic approach of breaking his thesis down into observable facts and logical ideas. â€Å"The Power Elite† begins by defining who or what a power elite is. Mills then examines the crucial areas they dominate as well as the system that exists to support and propagate their influence. He ends by examining the situations that led to the creation of the power elite, how institutions contribute to their formation, and the historical context of the ever increasing concentration of power that has made this status possi ble. As I read this article many passages and ideas seemed to jump out at me. The first is when Mills seeks to define who the power elite are and how they perceive themselves. Mills defines the power elite rather broadly, â€Å"They rule the big corporations, they run the machinery of the state...they direct the military establishment† (Anderson et al. Page 465). However, it is what Mills says next that struck me as particularly poignant. He explains that the power elite do not actually see themselves as particularly powerful. Instead he says that they, â€Å"are uncertain about their roles† and that â€Å"No matter how great their actual power, they tend to be less acutely aware of it than to the resistances of others to its use† ( Anderson et al. Page 465). I find it humorous and some... ...posure of high level politicians, which is still incredibly disproportionate to the amount of influence they have, most of the power elite are unknown outside of the circles of their colleagues and those in the know within their respective fields. In essence, the power elite have had such an influence on pop culture, and their celebrity distractions are so effective, that the general population no longer cares about the huge decisions and possible ramifications that are made for them on a daily basis. One is often left to wonder how much more Fahrenheit 451-ish our society can get. References: Andersen, Margaret et al, comp.Understanding Society: An Introductory Reader. 4th ed. Belmont, CA: Wadsworth, 2011. 464-468. Print. Kendall, Diana.  Sociology in Our Times. 8th ed. Belmont, CA: Wadsworth, 2010. 166-179. Print.

Saturday, August 17, 2019

Against School-Engaging The Text Essay

1. Question: Why does Gatto think that school is boring and childish? How does Gatto’s depiction of school compare with your own elementary and secondary school experience? Answer: Gatto thinks school is boring because the teachers and students are bored with material. The students say they already know the material. I can compare my school experience to Gatto’s depiction of school. My experience in elementary was a breeze and easy. Then I entered secondary school and was shocked. I was shocked that I had nobody to hold my hand and tell me what to do. I was given assignments and dues dates. It was up to me to get them done in time. My teacher’s taught me with their opinion, I really didn’t learn by that kind of teaching. But I read the text and studied hard, a way that I learn the best. 2. Question: What, according to Gatto, are the six unstated purposes of public schooling? To what extent does your own prior educational experience support this bleak view of American education? Answer: The six unstated purposes of public schooling are as follows 1. Adjustive or adaptive function: more discipline then educating 2. The Integrating function: being made to be someone you are not 3. The Diagnostic and Directive Function: a lot of testing 4. The Differentiating Function: teachers holding back the students and not letting them achieve their goals 5. The Selective Function: students are being put down and not able to succeed 6. The Propaedeutic: students are taught to be robots and to do what they are told and not ask questions. This view sort of pertains to me. I was taught by the teacher’s liberal views and opinions. I was raised to respect to others opinions. But I don’t give into the thought or idea that I am to learn and think because my teacher told me so. I did my work and did quite well without using their opinions. 3. Question: To what extent would you agree that we really don’t need to go to school? Given the current state of technology and globalizing economy, do think most people would gain the abilities they need to survive and thrive through homeschooling? Answer: I think education is VERY important. I disagree that kids do not need to go to school, they need to go. I think the school system and teachers can make school more appealing to students by changing the way they teach. For example they can do group activities, hold class somewhere else other than a classroom; like Starbucks, outside in the grass, a park. Anywhere where its stimulating, that way each day is a question of where is class going to be today? Homeschooling is good if you are self disciplined. I was homeschooled the first three months of my senior year in 1997. I graduated in November 1997 instead of June 1998. It depends on the person, if you are a go getter and want a way out of the school system ( in my opinion holds you back), then homeschooling is the ticket. 4. Question: How would you go about teaching your own children to be â€Å"leaders and adventurers† to think â€Å"critically and independently,† and to â€Å"develop an inner life so that they’ll never be bored†? How many parents, in your estimation, have the time, experience, and resources to make Gatto’s ideal education a reality? Answer: In teaching my children to be â€Å"leaders and adventurers† and to â€Å"think critically and independently,† I would teach them the basics of right and wrong, respect their elders, and most importantly respect yourself. What you say and how you handle yourself is always watched by others. I would be sure to teach them to be open minded about other’s opinions. And to ask questions to why they have that opinion, you may be enlightened and see your opinion a different way. Asking questions and learning from them will make you smarter person. I believe my child will be successful in school and out of school, if I raise them with integrity, respect, good work ethics, and good morals. But in this day and age many parents cannot do that, due to the lack of time, lack of knowledge, and the lack of knowledge. I taught myself when I did the homeschooling program through BYU, it was hard not having an instructor to help me. And my parents tried to help but luckily I had internet access. My Reflection. In reading Against School, I thought it was written like a factual story. I did learn a lot about the history in how school used to be. Back in the early years, education wasn’t that important. What was important was money, race and social class. They used a lot of discipline as well. The teachers and students are bored with the material and with school in general. Often teachers teach with their opinions and what they have been taught. I think that if teachers learn with the students and be open minded with what they are teaching, the students may opt to want to learn and enjoy school. The Summary Against School is about a retired teacher named John Gatto. He explains how school is boring for the students and teachers. He feels that the students are bored because the teachers are bored too. Its same material year after year, same classroom year after year. The students want to learn freely instead of being forced to learn. He feels schools have changed our children into addicts and children into children. He also feels that we suppress our genius because we don’t know how to handle them. His solution is to let them be their own person and think for themselves.