Monday, December 30, 2019

Sample Resume College Internship - 2939 Words

HIP FINAL PAPER Internships are extraordinary opportunities to learn and grow. Internships are mostly designed to expand the depth and the breadth of the academic learning in the particular areas of the study. Internship is an opportunity to receive experience in applying all formulas, methods, theories in the classroom to specific experiences in the real world and to see how it actually works. I had set some goals for my internship- to earn experience from it, to earn 3 credits from it, to learn to work in the team, to gain confidence, and gain valuable understanding of the accounting field and will be able to better grasp the things how my coursework is preparing me to enter my chosen career and to strengthen my CV. An internship can also heighten the awareness of community issues, motivates to create opportunities, embrace new ideas, and give direction to positive change. A successful internship can provide valuable information in making decisions about the direction of future studies or employment. An internship is an opportunity to not only use and develop industry-related knowledge and skills, but also to enhance some of the skills that are transferable to any professional work setting. For some people, the internship is the first introduction to the world of work. No matter where the skills and understanding of professionalism lie, internship is a chance to develop them even further. I did my internship as an Accounts Executive in the McKlein Company, Chicago. AndShow MoreRelatedThe Career Development Center Counsels Students1164 Words   |  5 Pagescounselor about topics such as internship or job opportunities, resume critiquing and developing an intended career path. A majority of the students who come in through walk-ins have no prior experience of applying for internships/jobs and and are often conflicted about immediately going to graduate school or working once they graduate. More often than not, these students are accompanied by self-defeating attitudes such as feeling inadequate for a job or internship due to a lack of experience, doubtingRead MoreInternship-HR Job Assessment : Posting Assessment1022 Words   |  5 Pages Job Posting Assessment Job Description Internship-HR Talent Acquisition - Summer 2018 Description Under general supervision provides essential support for departmental functions that include a wide range of activities and initiatives. Primary responsibilities include: †¢Perform operational and administrative functions as it relates to academic major †¢Work on special projects as assigned by functional leader †¢Assist in implementing functional strategies and supportRead MoreA Career as a Computer Programmer Essay1093 Words   |  5 Pagesbig company. Programmers have and are creating the future for computers. Computer programmers have a wide range on what they can do. Computer programmers write the detailed list of instructions the computer will follow in the software (Great Sample Resume). This is also called â€Å"coding.† Programmers test their software, or other peoples, to see if it works properly (Career Cruising). Programmers study the tasks that the program will need to complete while being used (Career Cruising). If programmersRead MoreEmployments Hunting Website941 Words   |  4 PagesPart 4: Examine recruitment The web is the best asset for work hunt and career growth, regardless of whether youre endeavouring to locate another stable situation or a graduate employment after finishing college. Beyond finding job listings and applying for jobs, you can access sample resumes, learn interviewing skills, and research career development strategies. These are the best employments hunting websites for working experts in Australia: 1. Seek: It was established in 1997, SEEK has turnedRead MoreCareer Journey For Success : My Career Path941 Words   |  4 Pages Career Journey to Success My career path was rerouted after the birth to my son. I was managing a 24-hour Alarm Monitoring Call Center with two years of college education in Psychology. Due to an inconsistent work schedule and difficulty locating Psychology courses that worked around my schedule, I decided to change my career path to Business Management, since I already had nearly 8 years experience in supervision and management. My mentor introduced me and made me familiarRead MoreAdie2312 Words   |  10 PagesFive benefits of completing an internship Internships are where higher education meets employment; they allow students to gain experience working in an organization while studying at university. They can be paid or unpaid and allow you to work in an organization for a set period, which could be anything from one intensive week, to interning once a week for twelve months. In some courses, such as medicine, nursing and education, which require access to hospitals and schools, industry placements areRead MoreThe Field Of Journalism And Education1320 Words   |  6 Pagesjournalism as a potential career can enhance their skills through hands-on experiences in the field by applying for available internships. Furthermore, as a aspiring undergraduate journalist myself, it is critical that I, along with others in my position, understand the procedure, requirements, deadlines, and other factors when choosing to pursue graduate school and internships. The field of journalism is, in essence, the art of communication, but on a mass scale. Mass communicating and reporting breakingRead MoreUsing The Mixed Method For College Graduates Of Sports Administration Programs Face While Searching For A Job1855 Words   |  8 Pagesroadblocks recent college graduates of sports administration programs face while searching for a job. The most common roadblocks to obtaining a job in the sports industry will be identified, the conceptual framework developed has outlined the information for the intended focus group. The focus group consist of recent college graduates, male and female, who have found it hard obtaining a job in their area of interest with in the sports industry. It is predicted that most recent college graduates aren’tRead MoreA New Framework For Training And Placement Services Using Mobile1405 Words   |  6 Pagespreparation seminars, interview schedule, etc. Keywords: Automation, Online authentication, Smart phone, Placement and Training (PAT). 1. Introduction Modern technologies have given numerous ways in which for creating advances in numerous fields. Recent samples of these are computers, laptops and smart phones which may do any advanced work simply. The overall use of internet and applications in Smartphone has enhanced enormously. Smart phones can run on variety of platforms like iOS of Apple, Android ofRead MoreDifferent Point Of Views On Parenthood After College Life1980 Words   |  8 Pageson parenthood after college life. This research is conducted with varies of sample and their own opinion on what they want to and work based on after finishing their careers. In this paper will have additional research based on other sources that will relate to it. This will have varies sample of answers and how they feel is effective in their life. Keywords: college, parenthood, employment, work Planning Your Future Will Vary When it comes to people who are attending college, the next step is what

Sunday, December 22, 2019

Essay on Mexican Economic Crisis - 862 Words

After nearly a decade of stagnant economic activity and high inflation in Mexico, the Mexican government liberalized the trade sector in 1985, adopted an economic stabilization plan at the end of 1987, and gradually introduced market-oriented institutions. Those reforms led to the resumption of economic growth, which averaged 3.1 percent per year between 1989 and 1994. In 1993 inflation was brought down to single-digit levels for the first time in more than two decades. As its economic reforms advanced, Mexico began to attract more foreign investment, a development helped by the absence of major restrictions on capital inflows, especially in the context of low U.S. interest rates. Indeed, large capital inflows began in 1990, when a†¦show more content†¦The financial sector was liberalized: lending and borrowing rates were freed, the forced channeling of credit was abolished, and bank reserve requirements were eliminated. 2. Banks were hastily privatized, in some instances with no due respect to ``fit and proper criteria, either in the selection of new shareholders or top officers (see Honohan 1997: 13, and Ort z 1997). It must be noted, however, that on average the banks remained in government hands for half of the expansionary period. 3. Several banks were purchased without their owners proceeding to their proper capitalization. Shareholders often leveraged their stock acquisitions, sometimes with loans provided by the very banks bought out or from other reciprocally collaborating institutions. 4. The expropriation of the commercial banks in 1982 contributed to their loss of a substantial amount of human capital during the years in which they were under the government. With these officials institutional memory migrated as well. 5. Moral hazard was increased by the unlimited backing of bank liabilities. 6. There were no capitalization rules based on market risk. This encouraged asset-liability mismatches that in turn led to a highly liquid liability structure.Show MoreRelatedEssay on The Economic Impact of the Mexican Peso Crisis1568 Words   |  7 Pagessaw the decline of the Mexican Peso, leading to what is now considered as the Mexican Peso Crisis. The crisis was characterized by the drastic decline in the value of the Mexican Peso. The Mexican Peso Crisis is considered significant because of its impact on other parts of the region, including Brazil. The following is a discussion of the causes and impact of the Mexican Peso Crisis. The events/causes that led up to the devaluation of the peso The Mexican Peso Crisis can be traced to the decisionRead More The Mexican Peso Crisis Essay1602 Words   |  7 PagesThe Mexican Peso Crisis This paper argues that the Mexican peso crisis of December 20 should have been expected and foreseeable. In the year preceding the crisis, there were several indicators suggesting that the Mexican economy and peso were already under extreme pressure. The economy bubble was ballooning to burst so much so that it was simply a crisis waiting to happen. Evidences Signaling the Crisis 1.  Ã‚  Ã‚  Ã‚  Ã‚  Decreasing Current Account Deficit versus Increasing Capital Account Balance Read MoreCauses Of The Mexican Peso Crisis965 Words   |  4 Pageslittle mistakes to bring Mexico’s economy down. The Mexican peso crisis started because of the U.S. influence towards Mexico’s currency. The U.S. dollar has a significant value, and after the huge increased it had during the end of the year of 1994, the Mexican economy went down. People were choked and panicking, and investors were flying out of the country, making things even worse. What is the Peso Crisis? To begin with, the peso crisis started in December 1994 because of the sudden devaluationRead MoreSocioeconomic Aftermath Of The Crisis1883 Words   |  8 PagesSOCIOECONOMIC AFTERMATH OF THE CRISIS Despite the overall success of the International Monetary Fund and the United States to prevent additional contagion from the Mexican peso crisis throughout the broader global financial systems, the crisis nevertheless proved devastating to the Mexican economy and its population. The devaluation of the peso and capital flight plunged the Mexican economy into a deep recession, national GDP dropped by 6.2% throughout 1995, and multiple banks collapsed as poorRead More1994 Mexican Currency Crisis4565 Words   |  19 Pagesimpact of, and the measures taken in response to the Mexican currency crisis of 1994-1995. The first objective is to assess the reasons for the crisis. Why did Mexico, a once immensely desirable investment destination become the bain of the international financial community following December 1994? The second and chief objective is to assess the impact of the crisis on the foreign exchange and stock markets. The report answers why the crisis adversely affected the Latin American market indicesRead MoreThe Mexican Peso Crisis2721 Words   |  11 Pagesthe currency into a downward spiral over the succeeding months in what became known as the Mexican Peso Crisis. A currency crisis is defined by a sharp and unexpected decrease in the value of the currency. This was precisely the case in Mexico, losing over 60% of its value in less than four months. The drastic nature of the crisis came as a surprise to many because of the unprecedented success of the Mexican economy in the years before. Mexico had curbed its inflation, posted very impressive growthRead MoreEssay on Mexican Peso Crisis: Irregularities of Deregulation2897 Words   |  12 PagesMexican Peso Crisis: Irregularities of Deregulation It is one thing to liberate an economy or a market; it is another to lift all regulations on such market. Economic liberalization should be done in an appropriate, intelligent manner. The lack of proper regulation can lead to a snowballing effect where a seemingly trivial matter can lead up to a terrible outcome. This was the case of Mexico in 1994 where birth was given to the â€Å"Tequila Effect†. What were the conditions in the country thatRead MoreThe Mexican Peso Crisis2040 Words   |  9 Pagesexternal value to plummet. In this paper I will analyze the build up leading to the Mexican peso crisis â€Å"Tequila crisis† of 1994. Explaining the cause and effect of the crisis as well as the economic and political impact; emphasizing on its interactions with the International Monetary Fund (IMF). To understand the Mexican peso crisis with regard to the domestic economy one must understand the history that led to the crisis. In the 1960s the economy was structured around industrialization. Mexico’s economyRead MoreInternational Monetary Fund Role : Imf1275 Words   |  6 Pagestheir website (www.imf.org), the International Monetary Fund (IMF) is an organization of 188 countries, working to foster global monetary cooperation, secure financial stability, facilitate international trade, promote high employment and sustainable economic growth, and reduce poverty around the world. The organization was created in 1945 and is governed by and accountable to the 188 that make up its near-global membership. Some notable countries that are part of the IMF are the United States, JapanRead MoreThe Procter Gamble Company3911 Words   |  16 Pagesand name: GRA 6544 – Multinational Corporate Finance Hand out date: 11.09.2012 Hand in date: 25.09.2012 Study place: BI Oslo Table of Contents Abstract: ii 1. Mexican economic conditions 1 a. Change in Mexican economic and political conditions during the 1970s and 1980s 1 b. Mexico’s economic and political climate in 1991 2 2. Financing options 2 3. Financing risk, foreign exchange risk and business risk 8 4. Attractiveness of Mexico’s capital market 9 5. Conclusion:

Friday, December 13, 2019

The terms color blind and diversity Free Essays

The terms color blind and diversity are widely used in affirmative action but they are not synonymous. Applied properly, color blind should be taken to mean without distinction to color. This means that the policies such as affirmative action should neither advance nor protect the interests of any race. We will write a custom essay sample on The terms color blind and diversity or any similar topic only for you Order Now As compared to diversity, this is understood to provide the necessary preferential treatment in order to advance the interests of all races, being color blind is not related to racial relations but instead advocates the lack of any racial undertones. To arrive at a better understanding of how these terms work it is important to briefly discuss affirmative action. Affirmative action has been praised and pilloried as the answer to racial inequality. First introduced by President Kennedy in 1961, â€Å"Affirmative action† was designed as a method of reducing the discrimination that had remained despite the civil rights laws and constitutional guarantees. It was a method that was put in place as a â€Å"Temporary Measure to Level the Playing Field† through the offering of the same opportunities to all Americans. As the video shows, the struggle for racial equality has taken different paths in American history. For some, it has mean equal opportunity and righting of a wrong long since committed, for others it remains a constant struggle not only for survival but for recognition. There have been several violations that have disenfranchised many but this clear violation of the Constitution prompted many to create a landmark law that will turn the tide once and for all. It was â€Å"Affirmative Action† that was supposed to save America from the evils of racism and discrimination but this directive failed and in fact it even backfired and instead of helping the oppressed it made them look less worthy of respect as ever before. As such, it is clear that being color blind, while different from encouraging diversity, is oftentimes interchanged and can have disastrous results. These concepts, however, are not mutually exclusive and may co-exist under the proper circumstances. It must be remembered that in order for Civil Rights plans such as Affirmative Action to work there must be a fine balance to encourage racial diversity but at the same time not lead to discrimination of other races. How to cite The terms color blind and diversity, Papers

Thursday, December 5, 2019

Maybe the Hills are White Elephants Essay Example For Students

Maybe the Hills are White Elephants? Essay In Ernest Hemingway’s â€Å"Hills Like White Elephants,† we find two people outside of a pub/tavern waiting for a train drinking a few beers and enjoying their times. As the story goes on we see that the man is somewhat of a protagonist of the story because we see him start multiple unnecessary arguments with her throughout the story. When she says that the hills resemble white elephants and the man seems uninterested and argues with her whether or not he has seen a white elephant. Noticing that Hills Like White Elephants was written in the 1920s, the topic of the story continues to be a controversial subject because not once does neither say what they’re actually talking about. The word abortion is never used throughout the story, but it is clear to the reader that the man is persuading the woman he calls â€Å"Jig† to undergo the procedure. First off she does not want to do this because she feels if she does her reputation as a lady will perish away. He pretends to be concerned with her thoughts and tries to diminish the difficult operation she is about to undergo, but he is actually more concerned with his own happiness (as it seems). As the story goes one Jig seems to have a low self-esteem and that the American as he is called uses her emotional weakness to his advantage. He knew that she was in love with him and that she would do anything to satisfy him. He promises her love and happiness while talking about the abortion but when Jig has no part of it and tries to needlessly switch topics, the man becomes very angry with her and begins to start immediately argue with her. We see this happen over and over again because she doesn’t want it and he does. Now looking at the other aspect of the situation is if they are even a couple or not? The man is called the American throughout the story and nothing else. While the name Jig is given to the lady. Now a jig I know from today’s culture is some sort of dance if I remember. I’m not totally sure why the name Jig is so significant. It hit me along the way, I began to think the man had a wife and that Jig did not know he was married. Since Jig’s ethnicity was really never shown, we won’t really know if she is the spouse of this man. It is almost as if the man traveled a lot and that he had impregnated a lady when he was away from home. I came to my own conclusion that this wasn’t the Americans first rodeo ride, Meaning, I feel he’s done this one more than one occasion because as we approach the end of the story, it’s as if all the conflict and worry dies down because Jig finally says â€Å"And if I do it you’ll be happy and things wi ll be like they were and you’ll love me?† And â€Å"I know. But if I do it, then It will be nice again if I say things are like white elephants, and you’ll like it?†(130) We notice that she has great love for this man but towards the end the American doesn’t show much sympathy for her and says how about a couple more beers. He begins to ease off of her rejecting all of what she saying about loving him forever and that they can have everything taking me back to the conclusion of how this isn’t the Americans first ride. To conclude, noticing how short the story was says so much of how much detail and context Hemingway puts into his words and lines. He did not once say the word abortion at all and knowing that it has been such a huge topic since those days and in today’s new culture. It’s tough to put that into a paper and describe the deep feeling of two people just simply talking about it. He did a masterful job of explaining it very thoroughly but yet leaving readers as myself on a ledge wondering if she went through with it or not. The American was the bad guy in the story id say. This is a good read for everyone and I recommend it to everyone man or women.

Thursday, November 28, 2019

Beauty Is in the Soul Essays

Beauty Is in the Soul Essays Beauty Is in the Soul Essay Beauty Is in the Soul Essay Beauty is in the soul A beautiful heart is better than a beautiful face. The phrase you hear all the time while you’re growing up, especially if you’re a girl. Audrey Hepburn said â€Å"The beauty of a woman is not in a facial mole, but true beauty in a Woman is reflected in her soul. † That is the theme I see in both â€Å"Snow White and the Seven Dwarfs† and â€Å"Cinderella†. In both poems the person that had a beautiful heart always prevailed. These two poems and this theme basically reiterate what people have been saying for years. Through the use of fairytales and satirical ideas, Sexton demonstrates that beauty is internal not physical. Snow white is beautiful and the stepmother is also beautiful but her stepmother cannot bear someone to be more beautiful than she is â€Å"Suddenly, the mirror replied, Queen, you are full fair, ‘tis true, but Snow White is fairer than you†¦So she condemned Snow White to be hacked to death†. The queens Jealousy and narcissistic ways drive her to attempt to kill her stepdaughter. The queen attempts to kill her on several occasions, first asking the hunter to bring her Snow Whites heart so that she could eat it, showing how serious she was. The mirror told her that Snow White was still the prettiest, this time she came to the dwarf house and wrapped her up and left her there, the dwarfs saved her and the mirror told again. Even after the dwarfs warned her that the queen was trying to kill her Snow White still had the heart to open the door for her stepmother, this time she put scorpion in her hair. The dwarfs saved her and warned her again but Snow White still opened the door, the last time the queen fed her a poisonous apple. But because Snow White had a beautiful heart, when the prince carried the coffin they dropped it and the apple chunk flew out of her mouth and she lived. The queen had a horrible heart and in the end she dies a horrible death and Snow White ends up with the prince. Just like in â€Å"Snow White†, In â€Å"Cinderella†, Cinderella is beautiful and has a beautiful heart but her Stepsisters, Stepmother and father treat her horribly. Sexton says â€Å"the man took another wife who had two daughters, pretty enough but with hearts like black jacks. Cinderella was their maid. † When it came time for the Royal Ball and the prince was looking for someone to marry, Cinderella was dying to go. She did everything they asked to do before going and even after completing those tasks the stepmother and stepsisters found a reason she could not go. She had nothing to wear and she couldn’t dance. Cinderella went to the tree at her mother’s grave and cried and begged for her to be able to go to the ball, she received a dress and slippers. When she arrived at the ball no one recognized her and the prince was in love with her. After dancing all night with the prince and him walking her home, she went back to her old life. Three days later the prince came looking for her, the stepmother cut off her big toe to fit into the slipper. The stepsister cut off her heel to fit into the slipper, the prince was ready to give up but then he found Cinderella, whos foot fit into the slipper, as sexton says â€Å" like a love letter, fit into its envelope. At their wedding the sister came and a dove pecked their eyes out, the prince and Cinderella lived happily ever after. In both poems two beautiful women with beautiful hearts were treated poorly for simply being beautiful. This reflects off of real life because every day there is a girl treated badly simply because she is beautiful. I believe Sexton is showing the real life aspect of these two traditional fairytales. She is also showing the idea that a beautiful face is not nearly worth as much as a beautiful heart and that the person with a beautiful heart will always prevail in the end.

Monday, November 25, 2019

Chinese Customs essays

Chinese Customs essays China is a land with unique traditional customs. Through the late early twentieth century China was fairly isolated which hindered cultural diffusion from the rest of the world. This meant that its culture was very distinct. Chinas distinct traditional customs included birth and birthday, wedding, and death customs. Birth traditions played an important role in Chinese life. When a child turned one month old, his or her parents would notify the gods. It was also though of that the birth of a girl was unlucky while the birth of a boy was lucky. The Chinese also celebrated birthdays with special customs. The birthdays that they thought were important were twenty-one, thirty-one, fifty-one, sixty-one, seventy-one, and ninety-one. At the age of fifty-one, it is a tradition for a person to receive, from his children, a multipaneled wood screen decorated with symbols of longevity. At the age of sixty-one, a person was to receive the prized gift of a coffin, from his children. When a person reached the age of seventy-one, he was permitted to wear an official robe and cap affixed with a copper button. At this age they are also allowed to use a special walking cane featuring a dove or pigeon carved into its jade handle. When a person turned eighty-one, which was very rare, the village elder notified th e emperor, who ordered the construction of a memorial arch in the honor of the person. An even rarer occasion was the reaching the age of ninety-one, when a person was honored with greetings four times a year by the district magistrate (Traditional). Marriages were arranged by a persons family, usually before they reach the age to marry. The families arranged the marriages with the matchmaker through negotiation, exchanging birth information in the process. The father of the groom wrote a formal proposal of marriage to the father of the bride, which the matchmaker delivered, along with gifts and things such as cakes....

Thursday, November 21, 2019

Critical Assessments of Two Archaeology Articles Essay

Critical Assessments of Two Archaeology Articles - Essay Example The study that Churchill makes on the adaptive possibilities is intended to narrow the many theories that exist on discovering why there is an equafinality of agents that might be given value for the production of adapted traits within Neanderthals. The argument within the paper contends that without discovering ways in which to evaluate the various hypotheses there is nothing preventing the equal consideration of those hypotheses that are ‘untenable’. In other words, some hypotheses are so ridiculous that there must be a way to dispute them, but without a methodology for verifying hypotheses that have some validity, there is no recourse to dispute any hypothesis. Therefore, it appears that the main focus of the paper is to find a way to evaluate hypotheses on agents of traits through exploration of one specific trait. Churchill (2008) suggests that â€Å"The study of the flow of energy through the Neanderthal’s world holds the promise of a solution to some of th e conundrums that exist in functional morphology or adaptive studies of these archaic humans† (p. 115). ... However, through further exploration, the idea was refuted, thus providing for an assessment that suggested that perhaps Neanderthals had less of a capacity to tolerate cold temperatures than did humans. In addition, the nature of the energy required to heat the bodies that they had developed was such that the high levels of calories were needed to make it function properly and that during the time of year when food was most difficult to obtain, higher levels of calories would be needed in order to supported additional efficiency in maintaining body temperature. The primary purpose of the paper was to find and use methods of research that could verify suppositions about the adaptive agents that provided for the development of traits in Neanderthals. In working with multiple levels of biologically sound and rational discovery, Churchill manages to make a reasonable discussion about the topic, even if a firm conclusion was not possible. The problem that exists within this concept is th at another researcher may find ways in which to manipulate data to support his or her hypothesis while ignoring the variations that would refute it. The purpose of the paper brings to light the problem without genuinely discovering a responsive solution. Works Cited Churchill, S. E. Bioenergetic Perspectives on Neanderthal Thermoregulatory and Activity Budget: A Review. pp. 113–134. Found in K. Harvati and T. Harrison (eds.), Neanderthals Revisited: New Approaches and Perspectives. New York: Springer, 2008. Print. Clients Name Name of Professor Name of Class Date Skin Deep: A Critical Assessment Nina G. Jablonski and George Chaplin discuss the development

Wednesday, November 20, 2019

Population Growth Case Study Example | Topics and Well Written Essays - 750 words

Population Growth - Case Study Example It is also important in that it helps determine the dependency ratio. High population growth rate is usually a problem especially with limited resources in a society whereas low population growth rate is a problem in the society given that the society may face workforce shortages in the future. The paper discusses the population size of all US citizens as depicted by data from 1900 to 2000 census. Data used in this paper was retrieved from the US census database. The reason for selecting this data was because of availability of data online, the convenience of the data source and to show how a developed country manages its population size through its policies and also to determine the expected population size in the next census. US Census data was retrieved for the year 1900 to 2000 from the US census website. The following is an analysis of the data. From the year 1900 to 2000 the population increased by 205,628 thousand, the mean increase in population is for the ten year period from 1900 to 2000 is 20,563 thousand, the standard deviation of this increase in population 7064.3. We, therefore, expect that the population size will increase by 20563 thousand in 2010. The composition of the population is an important measure in a society given that it helps determine the dependency ratio. The following chart shows the composition of the population as at the 1990 census From the above chart, it is evident that the majority of individuals during the 1990 census were aged 15 to 34 years while only 21.06% were aged 55 years and above. Total workforce, therefore, was 57.4% and this means that approximately 42.6% of the population was dependent on the workforce. From the above chart, it is evident that the majority of the individuals in this year were aged between 35 and 54 years and only 21.06% were aged above 55 years.

Monday, November 18, 2019

Advanced Manufacturing Processes I( Laser Manufacturing ) Assignment

Advanced Manufacturing Processes I( Laser Manufacturing ) - Assignment Example This is in the aim of supporting the dental prosthesis i.e. denture, bridge, crown, or facial prosthesis in addition to acting as an orthodontic anchor (Graf, 2014). Usually made of titanium, these are implanted through the biological process of osseointegration, aiding in the formation of an intimate bond to the bone. In general, such a biomedical implant usually comprises of a metal base structure, and a deposit (comprising of a first metal and an anti-microbial material) formed onto a metal base structure wherein the formed deposit is not derived by either electro-plating or anodization. Apart from titanium, the metallic dental prostheses are also made of platinum, stainless steel, gold, tantalum and cobalt-chrome amongst other alloys (Pompa, et.al 2015:1). Typically, implants and dental prostheses consist of a titanium (tooth-root resemblance) screw, having either a smooth or a roughened surface. Notably, most of the dental implants used are manufactured using commercially unalloyed titanium that is available in four different grades. The grades are differentiated by the amount of iron, oxygen, nitrogen and carbon contained. The cold work toughened CP4, containing maximum impurity levels of 0.50% of Fe (Iron), 0.40% Oxygen, 0.015% Hydrogen, 0.10% Carbon, and 0.05% Nitrogen, is the most widely utilized titanium for various bio-medical implants. An auxiliary component such as the Grade 5 Titanium (6AL-4V), which is a bit harder than the CP4; contains 4% vanadium alloy and 6% aluminium. It is mainly utilized in the manufacture of abutments and abutment screws that aid in the implantation process, as well as holding the prostheses in place. The importance of Titanium in bio-medical dental prostheses amongst other functionalities is influenced by core characteristics, which make it highly durable (Gu, Meiners,

Friday, November 15, 2019

Quantitative Determination of Atrazine

Quantitative Determination of Atrazine The objective of this study is to develop a simple and economic spectrophotometric method for the quantitative determination of atrazine. This method is based on the complexation of atrazine derivatization (dechlorinated atrazine [DA]) with a mixture of formaldehyde and ketone compound, as described by Mannich reaction. The complex was determined by UV-Vis absorption measurement and the ketone compound used was the uranine due to its high coefficient absorption. The UV spectrum of the complex shows maxima of absorption at 207 nm and at 227 nm. An internal standard was used to quantify the atrazine. There is a good linearity between the absorbance and the concentration in the range of 0.1 10 ÃŽ ¼g.mL-1 of atrazine. The recovery value was 97 % and the limit of detection was 0.01 µg.mL-1. Real samples collected from irrigation local area were analyzed using this method and the estimated concentration of atrazine found in the mentioned river is 0.29  ± 0.011 ÃŽ ¼g.mL-1. Keywords: Atrazine, dechlorination by zero valent iron, Mannich reaction, Spectrophotometer, quantification, internal standard, real samples measurements. Introduction Atrazine are widely used in agriculture, and their heavy use has resulted in the environmental pollution. Their persistent presence had been a serious problem, especially in surface and ground water systems. Atrazine herbicides were often used especially in Europe and the United States (1, 2), as important atrazine and simazine have been greatly used in maize cultivation and forestry. Their solubility in soil is low, and then can migrate along the food chains, and their intense use and presence in the environment have created a health threat to human beings. Recently, they have been considered as a group to be endocrine disrupting chemicals (3). The European Union Drinking Water Directive sets official regulations on the maximum admissible concentrations in drinking water as 0.1 mg.L-1 for an individual herbicide and 0.5 mg L-1 for total pesticides (4) whereas in surface water the alert and alarm threshold values are typically 1 and 3 mg.L-1 (5). Hence, the development of sensitive a nd economic analytical methods is very crucial for screening the presence and amounts of atrazine and preventing toxicological risks. In general, gas chromatography (GC) and high performance liquid chromatography (HPLC) are the techniques popularly used for the determination of atrazine and simazine (6-9). Gas chromatography-mass spectrometry (GC-MS), amperometric immunosensor, and adsorptive stripping voltammetric determination were developed for the analysis of atrazine and simazine, (10-13). In general, these techniques are expensive and involve time-consuming separation steps. These methods are unsuitable for field testing, for continuous monitoring or for screening high numbers of samples as required in mapping pesticide pollution in time and space. The objective of this work is to analyse the atrazine by a economic and rapid method. The proposed method in this work is based on the dechlorination of atrazine [DA] by zero valent iron powder (ZVIP), according to the reference fourteen (14) and using the [ DA] obtained in the Mannich reaction in order to give rise a by product having an extinction coefficient absorption more intense than atrazine compound. Materials and methods Chemicals and reagents All chemicals and solvents used were of analytical grade or of a higher grade when available. Formaldehyde, hydrochloric acid were purchased from Fisher, (MA, USA). Atrazine was purchased from Rodel-dehein, zero valent iron powder (350 mesh) was purchased from Sigma Aldrich Ultra pure water was prepared using a multi-Q filter system (Millipore, MA, USA). Instruments The UV absorption measurements were performed on a Shimadzu UV- 1650 PC. With 10 mm quartz cells were used for spectrophotometric measurements. The pH values are measured using METTLER TOLEDO pH-meter. Standard Solutions Stock solution of atrazine was prepared into a volumetric flask at a concentration of 10 ÃŽ ¼g.mL-1, 10 mL of this solution were mixed with 20 mL of acidified di-ionized water (pH = 4) and transferred into a flask of 100 mL. 2.5 g of zero valent iron powder were also added into the flask and shacked for 15 minutes. A complete dechlorinatation of atrazine must be achieved according to the previous work (14). This solution was in the Mannich reaction. Calibration Curves Samples for analysis were prepared by mixing uranine , formaldehyde and dechlorinated atrazine solutions. De-ionized water was transferred into each sample to reach a final volume of 10 mL. Calibration curves were built for quantitative measurements using the samples prepared according the table 1. Composition of samples used to build regression curve of the absorbance of the complex obtained by Mannich reaction and atrazine dechlorinated [DA] Internal standard curve addition and Recovery Atrazine dechlorinated was added as an internal standard for the calibration of the measurement, according to the method described in (Muel and Lacroix, 1960; Rima, Lamotte and Joussot-Dubien, 1982) (16, 17). Determination of the pH was done using a Mettler Toledo (OH, USA) pH-meter. Samples for analysis were prepared by mixing 0.5 ml of uranine (10 ÃŽ ¼g.mL-1), 1mL of pure formaldehyde and different volumes of dechlorinated atrazine stock solutions diluted to [0.75 ÃŽ ¼g.mL-1] (1-1.5 -2- 2.5 and 3 mL). De-ionized water was transferred to each sample to reach a final volume of 5 mL. Table 2 describes the preparation of the standard curve. Recovery experiments were performed by standard addition method: 0.15 ÃŽ ¼g.mL-1 of Atrazine dechlorinated was added to samples and percentage of recovery (R%) was calculated as follows: R% = [(Cr-Cf)/Cr] 100 Cr = Real concentration of atrazine in the fortified samples Cf = Concentration of atrazine obtained by the internal standard addition curve River water analysis The water analyzed was collected from River in the north of Lebanon.[agricultural area] 100mL of the polluted water were treated by zero valent iron powder according to the protocol mentioned above. The samples were fortified by solutions of dechlorinated atrazine having an initial concentration of 0.75 ÃŽ ¼g.ml-1 in order to build the internal standard curve. Table 3 summarizes the volumes of different solutions used in the mixtures. Results and Discussion Mechanism of the dechlorination of atrazine Most halogenated hydrocarbons, RX, can be reduced by iron metal. The overall reaction (Equation 1) results in dehalogenation of RX. Three general pathways by which this process may occur have been proposed (Matheson and tratnyek,) (18). The first involves direct reaction of the metal surface, in which case equation (A) alone adequately represents the pathway of reduction. The other two possible pathways do not involve the metal surface directly. Instead, Fe2+ and H2, which are products of corrosion by water, serve as the reductants that are directly responsible for dehalogenation of RX equation B and C. Fe0 + RX + H+ ↔ Fe2+ + RH + X- A 2Fe2+ + RX + H+ ↔ 2Fe3+ + RH + X- B H2 + RX ↔ RH + H+ + X- C More specifically the atrazine can be written as RX ( X = Cl ). With zero valent iron powder in the acidic aqueous solution the chlorine can be replaced by the hydrogen. According the following reaction: Effect of the dechlorination of atrazine on its extinction coefficient absorption. UV absorption spectra of atrazine in aqueous solution (1.5ÃŽ ¼g.mL-1) were recorded and compared to the spectra of the by-product obtained by the treatment of atrazine as shown in figure 1. Atrazine was dechlorination by zero valent iron powder according to the method described by Matheson, L.J et al (18). The extinction coefficient of the atrazine at the 220 nm (maximum of absorption) was estimated the value of 35200 M-1.L; whereas the extinction coefficient of the dechlorinated atrazine which give a maximum at 210 nm was found equal to 169000 M-1.L. Figure 1. The experimental observations revealed that by the removal of the chlorine atoms an hyperchromic and hypsochromic effects were observed. An increasing of the extinction coefficient and a blue shift from 220 nm to 210 nm of the maximum of absorption were detected. According to the table 4 , the proton that accompanies the formation of the free amine in Equilibrium 1 is available to protonate other reactants in the solution (Equilibria 2 and 3). Addition of the free amine to a protonated molecule of formaldehyde leads to the formation of the iminium ion shown at the right of (Equilibria 4). The enol of acetone then adds to the carbon atom of the iminium ion in (Equilibrium 5). In the equilibrium 1 as shown in the table 1, the nitrogen is enriched by electrons of the CH3 group and this nitrogen will react with H+ as base/acid reaction. However, when the electrons of the nitrogen, are deprived under the influence of the electron affinity of chlorine, this nitrogen will lose its basic character, then the à ©quilibre1 should be disturbed .In the other hand the nitrogen of the Equilibrium 4 play a nucleophilic role and ,if this nitrogen is disadvantaged by a chlorine attractive effect; it will lose the nucleophilic characteristics and the reaction with the carbon of the aldehyde in the Equilibrium 4. cannot be obtained In the case of atrazine it well known that the chlorine plays the role of the electrons donor to the nitrogen of the cycle and the electrons attractive of the aliphatic nitrogen. Since the Mannich reaction must take place at the aliphatic nitrogen not at the aromatic nitrogen and when the chlorine was removed by dechlorination process, the electrons at the aliphatic nitrogen become more dense and then it will be more able to play the role of nucleophilic atoms as mentioned in Mannich reation. In conclusion when the chlorine is removed from atrazine, the Mannich reaction can be observed as we demonstrated experimentally. Identification of the complex obtained in the mixture atrazine dechlorinated-formaldehyd and uranine The Mannich reaction is an organic reaction which consists of an amino alkylation of an acidic proton placed next to a carbonyl functional group with formaldehyde and ammonia or any primary or secondary amine. The final product is a ÃŽ ²-amino-carbonyl compound also known as a Mannich base. Reactions between aldimines and ÃŽ ±-methylene carbonyls are also considered Mannich reactions because these imines form between amines and aldehydes. Equation D (15). We hypothesized that the reaction between uranine, formaldehyde and dechlorinated atrazine must be similar to reaction E. The mechanism of the reaction is the following: Equation E Atrazine compound presents a UV spectrum with a maximum absorbance at 220 nm whereas dechlorinated atrazine presents a maximum of absorption at 210 nm Spectra of atrazine and dechlorinated atrazine are presented in Figure 1. The mixture of dechlorinated atrazine, formaldehyde and uranine give rise to the formation of a complex described by the Mannich reaction. It is obviously that formaldehyde does not have any UV spectrum. The UV spectra of the complex give rise to a spectrum with two maxima at at 207 nm and 227 nm respectively. Figure 2 presents the spectra of atrazine. dechlorinted atrazine and the complex obtained by Mannich reaction. Atrazine 2 ÃŽ ¼g.ml-1 (A) (DA  : dechlorinated atrazine by zero valent iron powder), (DA+ H2CO : dechlorinated atrazine by zero valent iron powder with formaldehyde) (DA+ H2CO + uranine : : dechlorinated atrazine by zero valent iron powder with formaldehyde) Regression curve between the complex formation A calibration curve of the complex was built to examine the linearity of the complex absorbance and atrazine concentrations. The least square method was used to calculate the regression equation. A strong linear correlation was obtained between the absorbance of the complex and the concentrations of atrazine. Figure 4 shows the regression curve of complex absorbance in function of atrazine concentrations. Correlation coefficients were higher than 0.99 in a concentration range of 0.15 ÃŽ ¼g.mL-1 to 0.75ÃŽ ¼g.mL-1.The precision of the method was evaluated with relative standard deviations (RSD) of atrazine determination in five samples. RSD was 3 %. The limit of detection of the method was 0.01 µg.mL-1 as defined by a signal-to-noise ration of 3:1 (19). Spectrophotometric method for quantification of atrazine e using the internal standard addition model A spectrophotometric method using the internal standard addition was examined to quantitatively determine melamine concentrations in samples. A calibration curve was described by the following equation: A*= aC + b, which is equivalent to A* = (A0* /C0) x Cadd + A0*, with A* = (A/ A0) normalized absorbance intensity (arbitrary values), is equal to the ratio of the absorbance intensity after adding the internal standard A to the absorbance intensity before adding the internal standard (A0) C0: solute concentration to be estimated. C0 is determined by the negative intercept of the curve with the abscissa axis (16, 17). A0*: normalized absorbance intensity of the starting solution Cadd: known added concentrations. The plot of A* vs. Cadd is shown in Figure 5. The internal standard used in this method was the atrazine that we would like to determine (C0). To this initial solution, different known concentrations (Cadd) were added. The average recovery for five samples spiked with melamine as described above in Table 1 was estimated to be 97%  ± 3. Table 5 summarizes the validation parameters of this method. Spectrophotometric method for the quantification of atrazine in a sample taken from an agricultural zone, using the internal standard method. Samples taken from a water source contaminated with atrazine, are processed by zero valent iron powder for the dechlorination of atrazine molecules. A definite volume of this solution is mixed with the same concentrations of formaldehyde and uranine. Different volumes of standard solution of dechlorinated atrazine were added to the solutions to be analyzed. The composition of these solutions are summarized in Table 3. The UV-Vis spectra of the solutions were recorded to follow the evolution of the complex obtained after the mixture called Mannich mixture. Using the evolution of UV-Vis spectra, an internal standard curve could be constructed and the intersection of this curve with the axis of abscises gives the concentration of atrazine in the waters of Agriculture . The concentration of atrazine in these waters is estimated at 0.29 ± 0.011 ÃŽ ¼g.mL-1 (n = 5). Conclusion The spectrophotometric method used to analyse the atrazine in agriculture water was based on Mannich reaction .This new method is a specific and simple method for the quantitative determination of atrazine in the contaminated water. Often the determination of atrazine is measured by sophisticated and expensive methods like HPLC, GC/MS. However the proposed method is easy to use, rapid and economic and it showed high accuracy, but it was restricted by the potentiality of the spectrophotometer which reaches a limit of detection of 0.01 ÃŽ ¼g.mL-1 as described in the manuscript.

Wednesday, November 13, 2019

Definition of Command Economy :: essays research papers

THE COMMAND ECONOMY A command economy is one in which a central authority has control of the resources of the economy and makes most of the economic decisions. TODAY : DICTATORSHIPS OR CUBA OR CHINA IN THE PAST: NEW FRANCE & THE WARTIME ECONOMY OF THE 1940'S NEW FRANCE New France was discovered by accident while explorers were searching for shorter trade routes to India and China, where they hoped to find rich sources of gold and spices. By accidentally discovering central and South America they did discover gold and silver produced by the Aztec civilization. In Canada the first resources to be exploited were - FISH & FURS. New France, as a colony, was to serve 2 purposes. 1. a source of NATURAL RESOURCES for the people of France. 2. A place where the FINISHED MANUFACTURED GOODS could be sold. The King had ABSOLUTE POWER until 1663, then he appointed officials. The main one was the INTENDANT, who ran the economy of the colony the way the King wanted it. The industry was AGRICULTURE & FUR TRADING. Furs, fish and other raw materials were sent back to France. In New France, LAND = WEALTH. Land was given to the Lords (Seigneurs) of the King in return for Taxes and a promise to settle the land. The Lords got farmers (habitants) who paid the Lord taxes and if the farmer didn't pay the taxes the Lord would take his land. GOODS PRODUCED = WHEAT, TOBACCO, OATS, HEMP (a plant used for making sails). THE BRITISH COLONIES OF THE TIME WERE RUN IN MUCH THE SAME MANNER. WHAT WAS THIS TYPE OF ECONOMIC ACTIVITY CALLED? CANADA'S WARTIME ECONOMY OF THE 1940's. The entire economy of Canada was involved in the WAR EFFORT. North America became a very important resource area for the Allies. 1941 - The WARTIME PRICES AND TRADE BOARD set maximum prices that goods could be sold for in Canada. 1942 - Goods were rationed such as food and fuel. THE GOVERNMENT HAD ABSOLUTE POWER There was an increased demand for resources to supply the war effort such as materials for PLANES, SHIPS, TANKS, BOMBS. The war was destroying economic resources in Europe. 1. soldiers, as well as others were killed 2. factories, roads and rail lines were being destroyed 3. dams and oil tanks were bombed 4. bridges were destroyed 5. land and crops were burnt or otherwise destroyed

Monday, November 11, 2019

Network Security Analysis Essay

This article is concerned about network security. It mentions about the present situation of network security and an analysis of the reason that lead to unsafe network environment. Then the article introduces two frequently used protocols in network security: HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), then compare them and give a brief conclusion. On the other side, the article introduces how firewall protects network security in hardware aspects. Keywords: Network; Security; Analysis; Countermeasures 1. Introduction As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed. 1.1 Situation of Computer Network Security With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters â€Å"cloud security† center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security. The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the trumpets; Internet fraud and extortion; Through the network business platform money laundering profit, etc. Attackers need technical level gradually decrease, means more flexible, joint attacks increase rapidly. Trojan viruses, Trojan virus writers, professional hack personnel, sales channels, professional players have been formed complete gray industrial chain. 1.2 Threats to Computer Network Security The threat to computer network security includes attacks by hackers and computer virus. It mostly presents in the following aspects. Firstly, send fake E-mails to users. It is a common way to cheat the account and password by posing as legitimate websites. Secondly, damage caused by viruses is also a common phenomenon. For e.g. when virus gets into computer, it will cover our hard disk with useless data. Thirdly, it’s about unauthorized accessing. This mainly refers to the normal use or oversteps their authority to use the network equipment and information resources. Fourthly, damage the integrity of the database. Fifthly, interfere with the normal running of the systems. Finally, communication lines are tapped and people are not familiar about safety of network security. The first situation doesn’t occur in common. However, awareness of maintain computer network security is really important. In the article, it mainly analyzes several common situations and introduces what the threat is and how it works. 1.3 Countermeasures of Network Security As network security has a lot of loopholes, people create a lot of methods to protect network. On the side of hardware, people begin to use firewall to protect network. On the side of software, a lot of tools and technologies have been used in this area, such as router filtering. The article introduces how firewall works and two similar protocols: HTTP and HTTPS. By comparing these two protocols, we will find the development of technology. 1.4 Importance of the Study of Network Security It’s important for securing ones computer, keeping important data and profile information protected. Careful web surfing habits may keep you from being a victim of virus attacks and malware, however this is an intensely risky activity and very often people may end up with an infected computer. Some good anti-virus programs will help to keep your computer protected and safe, but users must remember to keep this updated regularly for better protection over new viruses. 2. Related Work 2.1 Network Security Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and over seeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. 2.2 ISO/OSI model The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computer’s network interface card, and the wires that connect the cards together. People develop a lot of protocols to each layer. Such as PPTP/L2TP to linked layer, IPSEC to network layer, TLS/SSL to transfer layer. Each protocol includes security information that helps network transfer safer and safer. 2.3 IPV4 protocol The protocol contains a couple aspects which caused problems with its use. These problems do not all relate to security. They are mentioned to gain a comprehensive understanding of the internet protocol and its shortcomings. The causes of problems with the protocol are: 1. Address Space 2. Routing 3. Configuration 4. Security 5. Quality of Service The lack of embedded security within the IPv4 protocol has led to the many attacks seen today. Mechanisms to secure IPv4 do exist, but there are no requirements for their use. IPsec is a specific mechanism used to secure the protocol. IPsec secures the packet payloads by means of cryptography. IPsec provides the services of confidentiality, integrity, and authentication. This form of protection does not account for the skilled hacker who may be able to break the encryption method and obtain the key. 2.4 Types and Sources of Network Threats Denial-of-Service, unauthorized access, executing commands illicitly, confidentiality breaches and destructive behavior are common type of threats to network security. The sources of network threats include 3 aspects. Firstly, the invasion of bad information and pollution. Network is open, even borderless space information network of people in the rich cultural life, but also to the illegal dissemination of information or indecent information provided soil British Middlebury Seck Griffith University, Professor Di Mulai study found that in non-academic information on the Internet, 47% of pornography on These content without restriction for people feel free to browse, not only seriously jeopardize the health of young people, and poison the social atmosphere and hinder the building of a harmonious society in China. In addition, the network’s openness and freedom are often some criminals use, or dissemination of endangering national security, to subvert the government, disrupting social order and security of information, or information network organizing rallies and other anti-social activities. Secondly, Internet ‘hackers’ and computer crime. Hacker wanton rampage information networks, technology and the consequences of its invasion of escalating their use of technical means, or attacks on government sites or military organization’s Web site and endanger national security interests, undermine government image; or steal business, financial institutions, business information to profit illegally, endangering the economic order; or steal personal confidential information, violation of privacy or stolen cash. These acts seriously impede the normal operation of information networks. In addition to outside hackers the use of the Internet, the rampant crime and tort. The use of computer information network system to implement theft, fraud or corruption, embezzlement and other crimes than the traditional criminal methods and tools more subtle complexity, and violation of trade secrets with the network, electronic communications freedoms, civil Privacy and damage the reputation of others and other events are also frequent. Online pyramid schemes, online fraud, etc. These crimes have been on the network posed a serious threat to network security. Thirdly, the existence of their own network security vulnerabilities and risks. Freedom to share and open spirit of the Internet, but also the charm of the Internet The Internet is based on TCP / IP protocol, network devices, operating systems with networking capabilities and openness about the existence inherent vulnerability In addition, the software in the design, it is inevitable there are some defects or flaws, which has become a prime target for hackers, while software programmers deliberately left the ‘back door’ has become a major network security risks network These weaknesses of their own existence, to bring the work of anti-hacker considerable difficulty: on the one hand difficult for scientists to develop a common and effective network security for the protection of technical means on the other hand the lack of implementation of these measures sufficient to protect the social environment. 3. Methods 3.1 Analysis of Network Security System and network technology is a key technology for a wide variety of applications. Security is crucial to networks and applications. Although, network security is a critical requirement in emerging networks, there is a significant lack of security methods that can be easily implemented. There exists a â€Å"communication gap† between the developers of security technology and developers of networks. Network design is a well-developed process that is based on the Open Systems Interface (OSI) model. The OSI model has several advantages when designing networks. It offers modularity, flexibility, ease-of-use, and standardization of protocols. The protocols of different layers can be easily combined to create stacks which allow modular development. The implementation of individual layers can be changed later without making other adjustments, allowing flexibility in development. In contrast to network design, secure network design is not a well-developed process. There isn’t a methodology to manage the complexity of security requirements. Secure network design does not contain the same advantages as network design. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and re-insert a false message. Securing the network is just as important as securing the computers and encrypting the message. When developing a secure network, the following need to be considered: 1. Access – authorized users are provided the means to communicate to and from a particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say they are 4. Integrity – Ensure the message has not been modified in transit 5. Non-repudiation – Ensure the user does not refute that he used the network Here we mainly discuss fake websites. Fake websites means phishing. Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted website’s own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 3.2 Firewall’s Protection A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network’s firewall builds a brigade between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. In general, some functions that can be done by the firewall are: 1. Doing a packet filter firewall can make the decision whether to accept or reject the incoming data packets. 2. Hiding Network Address (NAT) IP addresses can be used on the internet is a public IP. So to create a client that uses private IP can be translated into public IP. These functions are performed by a firewall, known as NAT. 3. Monitoring and Logging to improve network security and logging on the terms monitoring by a firewall. 3.3 Protocols of Network Security Network security protocols are used to protect computer data and communication in transit. The primary tool used to protect information as it travels across a network is cryptography. Cryptography uses algorithms to encrypt data so that it is not readable by unauthorized users. Generally, cryptography works with a set of procedures or protocols that manage the exchange of data between devices and networks. Together, these cryptographic protocols enhance secure data transfer. Without cryptographic network security protocols, Internet functions such as e-commerce would not be possible. Secure communication is necessary because attackers try to eavesdrop on communications, modify messages in transit, and hijack exchanges between systems. Some of the tasks networks security protocols are commonly used to protect are file transfers, Web communication, and Virtual Private Networks (VPN). The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in clear text, meaning that they are sent unencrypted and therefore able to be compromised. For example, many webmasters update their sites using FTP; an attacker using a packet sniffer and the website’s IP address can intercept all communications between the webmaster and the site’s server. Here we mainly discuss two similar protocols: HTTP and HTTPS. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a multi-linear set of objects, building a network by using logical links (the so called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext. The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the SSL/TLS protocol. It provides encrypted communication to prevent eavesdropping and to securely identify the web server with which you are actually communicating. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and browsing history private.

Friday, November 8, 2019

Free Essays on The Book Of Job

â€Å"Naked I came from my mother’s womb, and naked I will depart. The Lord gave and the Lord has taken away; may the name of the Lord be praised† (Job 1:21). The book of Job is significant to both secular and non-secular groups as a pillar for many fundamental truths. The story of Job’s extensive amount of torment he faced, and persevered through, serves as a prime example for many to follow. Although the book is chiefly considered a model for Christian ethics, it has been explored by both secular and non-secular groups. Contrary to popular belief, the book of Job is not only about the Lord’s servant and the many ways he suffered. This essay will identify why many believe that this book is only concerned with Job’s sufferings, and in contradiction show that there is an abundance of issues within, with many lessons to be learned. Job was a man with what the public viewed as a perfect life. He had a wife, seven sons, and three daughters. In addition to having a well rounded family, his wealth continued in his possessions that included seven thousand sheep, three thousand camels, one thousand oxen, and five hundred donkeys. While Job was a family man, he was also known very well in his community, and sometimes even considered the greatest man of the East. More important than all of this, Job feared God and shunned evil. The Lord said to Satan in chapter one, â€Å"Have you considered my servant Job? There is no one on earth like him; he is blameless and upright, a man who fears God and shuns evil.† Satan was sure that no matter how much Job loved the Lord, if Job were to lose everything he had, surely he would curse the name of the Lord. The Lord proceeded to tell Satan that everything Job has is in his hands, but he was not aloud to touch the man himself. Satan proceeded in attempting to destroy Job, allowing his oxen and donkeys to be stolen, burning his sheep and servants, having his camels carried away, kill... Free Essays on The Book Of Job Free Essays on The Book Of Job â€Å"Naked I came from my mother’s womb, and naked I will depart. The Lord gave and the Lord has taken away; may the name of the Lord be praised† (Job 1:21). The book of Job is significant to both secular and non-secular groups as a pillar for many fundamental truths. The story of Job’s extensive amount of torment he faced, and persevered through, serves as a prime example for many to follow. Although the book is chiefly considered a model for Christian ethics, it has been explored by both secular and non-secular groups. Contrary to popular belief, the book of Job is not only about the Lord’s servant and the many ways he suffered. This essay will identify why many believe that this book is only concerned with Job’s sufferings, and in contradiction show that there is an abundance of issues within, with many lessons to be learned. Job was a man with what the public viewed as a perfect life. He had a wife, seven sons, and three daughters. In addition to having a well rounded family, his wealth continued in his possessions that included seven thousand sheep, three thousand camels, one thousand oxen, and five hundred donkeys. While Job was a family man, he was also known very well in his community, and sometimes even considered the greatest man of the East. More important than all of this, Job feared God and shunned evil. The Lord said to Satan in chapter one, â€Å"Have you considered my servant Job? There is no one on earth like him; he is blameless and upright, a man who fears God and shuns evil.† Satan was sure that no matter how much Job loved the Lord, if Job were to lose everything he had, surely he would curse the name of the Lord. The Lord proceeded to tell Satan that everything Job has is in his hands, but he was not aloud to touch the man himself. Satan proceeded in attempting to destroy Job, allowing his oxen and donkeys to be stolen, burning his sheep and servants, having his camels carried away, kill...

Wednesday, November 6, 2019

Isochoric Process Definition and Use

Isochoric Process Definition and Use An isochoric process is a thermodynamic process in which the volume remains constant. Since the volume is constant, the system does no work and W 0. (W is the abbreviation for work.) This is perhaps the easiest of the thermodynamic variables to control since it can be obtained by placing the system in a sealed container which neither expands nor contracts. First Law of Thermodynamics To understand the isochoric process, you need to understand the first law of thermodynamics, which states: The change in a systems internal energy is equal to the difference between heat added to the system from its surroundings and work done by the system on its surroundings. Applying the first law of thermodynamics to this situation, you find that: delta-Since delta-U is the change in internal energy and Q is the heat transfer into or out of the system, you see that all of the heat either comes from internal energy or goes into increasing the internal energy. Constant Volume It is possible to do work on a system without changing the volume, as in the case of stirring a liquid. Some sources use isochoric in these cases to mean zero-work regardless of whether there is a change in volume or not. In most straightforward applications, however, this nuance will not need to be considered- if the volume remains constant throughout the process, it is an isochoric process. Example Calculation The website  Nuclear Power, a free, nonprofit online site built and maintained by engineers, gives an example of a calculation involving the isochoric process. Assume an  isochoric heat addition  in an ideal gas. In an  ideal gas, molecules have no volume and do not interact. According to the  ideal gas law,  pressure  varies linearly with  temperature  and quantity, and inversely with  volume. The basic formula would be: pV nRT where: p  is the absolute pressure of the gasn  is the amount of substanceT  is the absolute temperatureV  is the volumeR  Ã‚  is the ideal, or universal, gas constant equal to the product of the Boltzmann constant  and the Avogadro constantK is the scientific abbreviation for  Kelvin In this equation the symbol R is a constant called the  universal  gas constant  that has the same value for all gases- namely, R   8.31  Joule/mole  K. The isochoric process can be expressed with the ideal gas law as: p/T constant Since the process is  isochoric,  dV   0, the  pressure-volume work is equal to zero. According to the  ideal gas model, the internal energy can be calculated by: ∆U m cv  Ã¢Ë†â€ T where the property  cv  (J/mole K)  is referred to as  specific heat  (or  heat capacity) at a constant volume because under certain special conditions (constant volume) it relates the temperature change of a system to the amount of energy added by heat transfer. Since there is no work done by or on the system, the  first law of thermodynamics  dictates  Ã¢Ë†â€ U ∆Q.  Therefore: Q   m cv  Ã¢Ë†â€ T

Monday, November 4, 2019

Human cloning and animal cloning Essay Example | Topics and Well Written Essays - 750 words

Human cloning and animal cloning - Essay Example Haugen (2007) asserts that, though human cloning has not been extensively expounded on like the animal cloning, it has been researched that it is going to have a number of benefits to human: To start with, human cloning eliminates defective genes. Today genetic illness is not a number one killer disease but this could be in the near future. As humans frequently reproduce, damage to their genes goes high. This creates mutations and malfunctioning of the genes. Down’s syndrome that affects women can be avoided by cloning. Tay-Sachs disease which is an autosomal recessive genetic disorder could be prevented through cloning.Therefore; elimination of these problems could only be done by cloning of healthy human cells. Secondly, cloning enhances faster recovery from traumatic injury. Accidents sometimes, cause a lot of pain and injury to humans. For instance an athlete who gets injured and the recovery process is slow, true healing could only be done by cloning of their own cells to help a faster recovery process. Thirdly, it helps in solving out infertility problems. A lot of couples now days go through difficult times trying to solve out their infertility issues. Without successfully having children, the couples run out of time and money. Human cloning has made it achievable for these couples to have children. In addition, human cloning reverses heart attacks- Heart disease is a number one killer in the U.S and other industrialized countries. Scientists believe that heart attack victims can be treated by cloning their healthy heart cells and injecting them into the areas of the heart that have been damaged. Plastic, reconstructive and cosmetic surgery is another advantage. Human cloning has made it possible for breast implants and other cosmetic procedures to be a success. With the new technology of human cloning doctors are able to manufacture fat, bone, connective tissue or cartilages

Friday, November 1, 2019

Ladership in customer service Article Example | Topics and Well Written Essays - 750 words - 1

Ladership in customer service - Article Example Leaders are flexible and adaptable unlike rules that are fixed and stiff. Leadership allows employees to be leaders for their customers in terms of decision making skills that makes customer feel more comfortable that benefits both customers and the company. Within the context of this paper is the role of leadership in customer service industry. What is takes to be a good leader and how it can benefit every stakeholder in return (Harris, 2002, p. 122). Leadership begins in oneself, to be an effective leader is to recognize oneself as a leader. A leader must be aware of own strength and weaknesses to be able to use these strengths as starting points and to overcome weaknesses. Identifying self strengths and weaknesses can provide a person self knowledge of leadership skills. A good leader is a change agent that entails changes that starts from oneself (Harris, 2002, p. 123). Also a good leader is confident and is open for criticism. Criticisms are analysed to change and become stronger as a leader (Harris, 2002, p. 124). There are several types of leaders. Formal leaders have the official authority of the position chosen by organization. Formal leaders may be formed through special trainings and have high accountability due to specific and defined responsibilities tasked upon the position. On the other hand informal leaders are an assumed role and have no official authority but have the ability to influence others. Informal leadership can affect formal leadership in an organization due to influence over people that can generate support or resistance within an organization. Both formal and informal leaders are essential in the success of customer service. Formal leaders can create a culture that empowers employees to serve as positive examples in the company performance. Informal leaders on the same context can create customer friendly culture, motivate co-workers, boost morale and can relate to co-workers in areas that a formal leader may

Wednesday, October 30, 2019

Analysis of P&G 2010 Annual Report Term Paper Example | Topics and Well Written Essays - 1750 words

Analysis of P&G 2010 Annual Report - Term Paper Example They were encouraged by their father-in-law to do a business together which they finally pursued and agreed to a joint venture after some years. Procter brought with him, his candle-making expertise while Gamble who was an experienced soap-maker offered his services. The company started off by selling candles and soap in the Ohio area. It became more of a family business when Procter’s eldest son went on to become the president of the corporation in 1890. Gamble’s eldest son, inducted the first ever laboratory in the company’s history giving it its first ever Ivory soap. As of 2010, the company is manufacturing and selling 81 different brands. They range from budget and household items for instance detergents and pampers to designer lines for instance Dolce and Gabbana and Burberry 5. As of 2009, the company garnered $79 billion in revenue. Of this $13 billion was in net earnings and this gave the company an earning margin of 14.3%. In 2008, the net revenues were 81.7 billion dollars. Procter and Gamble had also been in the news recently for their acquisition of Ambi Pur from the Sar Lee corporation for 320 million Euros. Procter and Gamble provides consumer packaged goods. Its products are sold in more than 180 countries through mass merchandisers, grocery stores, drug stores, high frequency stores, neighborhood stores and membership club stores. These stores different consumer in developing marketings. P & G conducts on-ground operations in approximately 80 countries. As of June 30, 2010, the company had three Global Business Units: Beauty and Grooming, Health and Well Being and Household care. 16% of its total revenue comes from sales to Wal-Mart. The company takes pride in focusing on strategies that they believe are right for the long-term health of the Company. They plan on increasing their organic sales from 1% to 2% faster than the market growth in categories in which they compete.

Monday, October 28, 2019

The first experiment Essay Example for Free

The first experiment Essay In the three experiments, we see how different objects fall. We should take note that the experiments are employed with the presence of air (and thus, air friction). In the first case, the quarter dollar coin is bigger and heavier than the penny; therefore, it will drop faster because its gravitational force is greater than that of the penny. Even if there is an air friction which is opposite the direction of gravity, it only has a minimal effect on the coins. In the second case, the crumpled paper falls faster than the uncrumpled one. This is because the presence of air friction acts greater with the uncrumpled paper as its surface is greater, hence creating a bigger space for air friction to occur. The crumpled paper, on the other hand, falls faster because of its compacted state. Its gravitational pull acts greater than the opposing air friction. Thirdly, the case of the coin dropped from the index card accounts for the coin to fall faster. This is because it has greater mass (and therefoe, greater gravitational force) tan the index card. Generally, the mass and weight of an object are major characteristics to consider in predicting its rate of fall. The greater the mass or weight, the faster will it fall. This is primarily due to the fact that gravitational force is mass (m) times acceleration die to gravity (g = constant at 9. 8 m/s2). In the same way, the shape and surface of an object also contribute to its rate of fall. The more compact or solid the object, the faster it will fall; the bigger the surface area, the more slowly it will fall. The frictional force is responsible for this slow down. 2. Describe the difference (in both what happens and why) between a person who jumps from an airplane with a parachute and one who jumps without a parachute. If a parachute is used, what would be the difference when the same size parachute is used on a person and then used on an elephant? In the first instance where a person jumps from an airplane with a parachute (say, person A), as compared to the person without a parachute (person B), person A will be able to land in a safer manner since the chute provides for a decrease in the person’s acceleration towards the ground. As person A drops down, the chute slows down his velocity by adding the oppositely directed air friction; meaning, as the downward velocity increases (or as person A accelerates downward), an upward force (which is the air friction sifted by the parachute) reduces the acceleration, thus creating less impact on person A’s landing. Contrastingly, person B will drop downwards in an accelerating manner, where the increased velocity will account for a less safe landing. In the second instance, the size is given focus with regard to the velocity and acceleration of the falling person/animal. Given the same sizes of parachutes used, a person (say, person C) and an elephant (say, Dumbo) are dropped down from an altitude. The effect would be that Dumbo will fall faster than person C despite the same sizes of chutes. Dumbo’s size accounts for the increase in velocity, as it has been established that mass is a factor for acceleration according to Newton’s First Law of Motion (F = ma or a = F / m). Person C will then fall more slowly as compared to Dumbo’s acceleration. The parachute may provide a decrease in acceleration, but this is more observable in person C’s experience.

Saturday, October 26, 2019

Another Chance Of Life Essay -- essays research papers

Another Chance of Life Can there be another you? The answer is no, but by human cloning you can reproduce an offspring that grows into an exact genetically double of you. All of us want to prolong the lives of our loved ones and have a healthy newborn baby. Many infertility couples wanted to have a baby that is genetically theirs, not from adopting a child from a different family background. In the cloning technology, eggs or sperms would not be needed to be conceived by a person because any cell would do. One parent contributes DNA, making the child almost an identical twin. He or she would differ from the parents much more than identical twins differ from each other. In many parts of the world, human cloning is banned. For example, Canada's new Human Reproductive and Genetics Technologies Act made it illegal to clone human embryos, research on human embryos later than 14 days after conception, and the creation of embryos for research purposes alone. This act will make it more difficult for the estimated 280,000 infertile couplesin Canada to obtain domestic assistance in having a genetic child of their own. Human cloning should not be banned because it has many promising benefits to infertility couples and to the basic research for treatment of various diseases. Most people would not want to clone themselves. Those people think a human clone resembles the person it is made from. The genes do not form our character and so identical twins would never get 100 percent ident...

Thursday, October 24, 2019

The Holocaust Essay -- History, Nazy

For most people, the Holocaust evokes feelings of empathy for the victims, and anger toward the persecutors. The Holocaust, defined as â€Å"the systematic annihilation of six million Jews by the Nazi regime,† began with the rise of Nazi Germany (â€Å"A Historical Summary†). When the Germans lost World War One, the Jews received the blame. Anti-Semitism, or the hatred toward Jews, spread like wildfire throughout the nation. Hitler came to power with ideas of a master race, resulting in the persecution of many across Europe in what became known as the Holocaust. Although many contributed to the Holocaust, Adolf Hitler remains viewed as the main catalyst. Born in Austria, Hitler originated from humble roots and poor parents (Byers, Overview 23). Adolf decided at an early age to become an artist, due to the fact that he received the best grades in his primary school art class. Soon after entering secondary school, Hitler dropped out due to poor grades. After his rejection from art school, Hitler continued to live with his mother until her death. At age nineteen Hitler lacked an education, but needed money so he traveled around picking up any job available. At this low point in his life, Adolf Hitler decided to become an anti-Semite (24). With the start of World War One, Hitler became a German soldier at age twenty-five (23-25). His time in the army led Hitler to pursue a career in politics. With Hitler’s newfound goal of politics, he joined the Nazi party. Quickly working his way to the top, Hitler soon became elected the â€Å"Fà ¼hrer† or leader of the party. Adolf first attempted to gain power in the â€Å"Beer Hall Rebellion.† He led supporters to Berlin where the uprising was quickly crushed. With the charge of treason, Hitler s... ...y innocent lives were lost in vain including 5 million non-Jews (â€Å"Holocaust†). When Adolf Hitler came to power, Europe became entangled in chaos as millions of Jews and other groups endure persecution from Germans. Works Cited Altman, Linda J. The Holocaust, Hitler, and Nazi Germany. Berkeley Heights, NJ: Enslow Publishers, Inc., 1999. Print. Byers, Ann. The Holocaust Camps. Berkeley Heights, NJ: Enslow Publishers, Inc., 1998. Print. - - - . The Holocaust Overview. Berkeley Heights, NJ: Enslow Publishers, Inc., 1998. Print. â€Å"Holocaust.† Compton’s by Britannica. 01 Aug. 2011: n.p. SIRS Discoverer. Web. 19 February 2012. â€Å"The Holocaust: A Historical Summary.† Beyond the Wall of Remembrance. Nov. 1993: 5-10. SIRS Discoverer. Web. 19 February 2012. Yeatts, Tabatha. The Holocaust Survivors. Berkeley Heights, NJ: Enslow Publishers, Inc., 1998. Print.

Wednesday, October 23, 2019

Control The Speed Of The DC Motor Engineering Essay

Direct current ( DC ) motor is applied in a broad scope of applications peculiarly in mechanization engineering due to minimum electromotive force ingestion. In the proposal DC motor plays an effectual function in Hardware execution. The chief rule behind the undertaking is to utilize the cascade control to run the DC motor ; it ‘s one of best feedback accountants. For gauging the speed and the armature current of the DC motor with 24 Vs and a dsPIC Microcontroller is programmed.The above all operation is done in a closed control cringle map. Table of Contentss 1.2 Objective 2. Specific Aims of the undertaking Chapter 1 1. Introduction 1.1 Background Brushed DC Motor DC motor theoretical account Digital control of District of Columbia motor Advantages of District of Columbia with regard to rush control Analogue control of District of Columbia motor 2.1 Dss PIC dsPIC30f 3010 2.2 MPLAB IDE 3. Design and Research Cascade control Currentloop kineticss Speed cringle kineticss 3.1 Components for commanding 24v brushed Dc motor 3.1. Flexible upside-down board 3.2.1 Generating PWM moving ridge signifiers 3.1.2 H-Bridge convertor 3.2 Software techniques used in DC motor Programing microcontroller in Flexible inverted board 4. Consequences and Discussion 5. Decision 6. Appendix List of Figures FIGURE 1: Operation of BRUSHED DC Motor FIGURE2: General block diagram of velocity cringle and current cringle of DC Motor FIGURE3: H-bridge convertor with different electromotive force VI ± & A ; VI?Chapter 11. Introduction1.1 ObjectiveThe chief map of the undertaking is to command the velocity of the DC Motor utilizing a dsPIC30f3010 microcontroller. For that implement a separate hardware to fulfill the chief map of the undertaking.1.2 Specific Aim of the undertakingIn order to accomplish the chief nucleus of the undertaking, concept Hardware for commanding the velocity control of DC motor. The chief hardware demands are Ds PIC microcontroller ICD interface & A ; connection for system interface DC power supply MOSFET Current detectors The above constituents are required to build a hardware called Flexible Inverted Board [ 4 ] .1.3 OUTLINE OF PROJECTStep1 In this paper a flexible upside-down board is constructed with the series of hardware constituents Step2 Then pass on the Flexible inverted board with system utilizing MPLAB IDE package with ICD-3 interface [ 4 ] .the linguistic communication used in the MPLAB package is C-language. Step3 The velocity cringle and the current cringle are the two of import maps for commanding the velocity of the Dc motor. In our undertaking the cardinal point is to command both the cringles by C-programming linguistic communication utilizing MPLAB ICD-3. The velocity cringle of the microcontroller is called velocity accountant and the current cringle of the microcontroller is called current accountant.Chapter 2THEORITICAL TECHNIQUES AND THEIR REVIEWS2 Background2.1 Brushed DC MotorIn automotive industries DC motor is used widely in â€Å" fuel pump control, electronic maneuvering control, engine control and electric vehicle control † [ 6 ] for its cost effectual and it is used in many applications like â€Å" mush and paper industries, fan pumps, imperativeness, winder motors † [ 2 ] , † place contraptions, washers, driers and compressors † [ 6 ] are some of the best illustrations. DC motor is one of the of import hardware employed in this paper, it consists of a rotor and stator, and the parts are placed in a lasting magnetic field. Commutator and coppice are placed in between the rotor and stator. Positioning the coppice at a peculiar way in the rotor is classified into some classs and they are â€Å" rad ial, trailling or taking † [ 3 ] places. When the rotor rotates the commutator and C coppice interface at a point, which produces an tremendous sum of magnetic field from the coppice of the motor and it produces current to the armature twist of the Dc motor. FIGURE 1: Operation of BRUSHED DC Motor [ a ]2.2 DC Motor theoretical account [ 8 ]Each motor will hold different specification and demands. Harmonizing to motor demands and inside informations the theoretical account can be designed. The purpose of motor theoretical account, trades with commanding the applied electromotive force of both velocity and current. The basic theoretical account for a Dc Motor is shown below FIGURE2: DC Motor theoretical account The above diagram is a simple RL circuit. RL circuit is called opposition induction circuit and a 24v DC Motor. All these constituents combine to organize RL circuit. Now the derivation portion of the RL circuit is explained below T ( T ) = J tungsten is the Angular speed J is the minute of inactiveness B is the clash T is the armature Torque T ( T ) = ( T ) is the Torque invariable is Armature current Harmonizing to Kirchhoff ‘s jurisprudence ( T ) – ( T ) = ( T ) + and are the induction and opposition for the armature current ( Iowa ) The electromotive of the motor can be determined by multiplying the back voltage with velocity The relationship for the electromotive force is shown below ( T ) = The province theoretical account for any DC motor utilizing Iowa and tungsten ( velocity ) is mentioned below.= +2.3 ds PIC -microchip Ds PIC stands for Programmable Interface Controller or programmable intelligent computing machine, which act as an of import controlling unit for full system. The chief aim of this undertaking is to do the Ds PIC to bring forth 6PWM wave form. In an ideal status the wave form from the pulsation width transition can command the H-bridge convertor. It non merely serves as an interface accountants but besides plays a function of a programmable logic accountant ( PLC ) . [ 16,20 ] Ds movie has a memory of 16bit microcontroller that has two major maps. Firstly it can move as a package portion functioning package maps and the other is a hardware portion functioning hardware maps. The input signals that are attain from the feedback service system are received by the package portion which in bend utilizes the codifications that are written on the bit on C – linguistic communication to analyse the input and run the hardware. Finally the package makes certainly the hardware runs based on the package maps to derive the needed end product. [ 18, 20 ] Our undertaking concentrated on working experiments that were run at lab conditions. Since a twosome of systems have certain differences from the stimulation that have been run in existent conditions compared to ideal conditions. This in bend is the working of the microcontroller. dsPIC30F 3010, 2010 4011 and 3012 are the series of french friess that have been available in the Lab. The missive ‘F ‘ in ds PIC30F and such bit provinces that the bit contains brassy memory. The ground for sing this brassy memory merchandise is because 30F has an ex-ordinary public presentation when compared to EPROM ( Effaceable Programmable Read-Only Memory ) and one clip programmable french friess ( OTP ) . This has been a major demand for the running of this undertaking to acquire the needed end product. 16-bit modified Harvard architecture has been added to the CPU incorporating Ds PIC30F for using the information and upgrading the set of usher lines for running digital signal processing ( DSP ) [ 14 ] . There is a drawn-out flexible opcode field which has been installed in the CPU that has a 24 spot broad user coder memory country and the entire turn toing velocity can travel up to 4MA-24 spot. This programming theoretical account has sixteen 16bit working registries in Ds PIC30F bit. There are two categories of debut commanding unit that have been integrated and used for executing they are integrated and used for executing [ 2 ] .2.3.1 dsPIC30F 3010This subdivision is about the pin constellation and the constituents available in dsPIC30F3010 microcontroller. Normally the memory allotment in dsPIC30F 3010 can classified in to three classs they are SRAM in Bytes EEPROM in Bytes Programmable memory in Bytes/instruction2.3.1.1 SRAMSRAM stands for inactive RAM ( Random Access Memory ) . Harmonizing to the tabular matter shown below the informations bound for inactive RAM should non transcend 1024 bytes. The memory in the map can sort in two types they are X – Datas RAM Y – Datas RAM The inactive RAM uses X -RAM and Y_RAM for hive awaying informations.2.3.1.2EEPROMThe memory allotment for EEPROM is same as inactive RAM. In read merely memory one of the of import types of ROM used to hive away memory is EEPROM. The chief map of this ROM is based on two parametric quantities they are endurance and keeping [ 2 ] . Endurance is to retain the informations even after the ROM fails. Therefore the informations ca n't be deleted at any instant. Time period is required to hive away informations that is taken attention by keeping [ 2 ] .2.3.1.3Program memoryIn a peculiar plan Ds PIC30f microcontroller has a separate memory allotment for hive awaying both the reference and information. The memory bound for the plan memory is 24K. plan reference infinite anda informations reference infinite Table 1: Tabulation for memory allotment in Ds PIC30f3010 The pin constellation of dsPIC30f3010 is described below FIGURE 3: Pin constellation of dsPIC30F 3010 [ 2 ] Pin descriptions ( PWM1L and PWM1H ) , ( PWM2L and PWM2H ) & A ; ( PWM3L and PWM3H ) [ 2 ] these are six different types PWM channels used in the pin constellation. In which each PWM brace generates three responsibility rhythms with one high end product ( H ) and one low end product ( L ) . INT0, INT1 & A ; INT2 are the interrupt buffers used in the PIC. VSS and VDD [ 2 ] are the supply electromotive force and land in the PIC accountant. U1RX & A ; U1TX, U1ARX & A ; U1ATX [ 2 ] are the series of pins used for pass oning PIC microcontroller with Personal computer, in other system interface operation can be done by UART map. In that RX stands for receiving system and TX stands for sender. The above pin map plays an of import in our undertaking.Chapter 3Methodology3.1 Components for commanding 24v brushed Dc motorSince the undertaking is to the full based on difficult ware so many constituents are available and how they work in that operation.3.1.1Cascade control operation in Dc Motor:The below operation is done by utilizing Double cascaded layout, it consists of two cringles they are current accountant with current mention and velocity accountant with velocity mention [ 5 ] as shown in. FIGURE4: General block diagram of velocity cringle and current cringle of DC Motor [ B ] The current cringle is covered by the velocity cringle, in the block diagram it has the two circles interior circle is called interior cringle and the outer circle is called outer cringle since the interior circle operation is ever quicker than the outer circle. In other words interior circle public presentation is multiple of 10 times faster than the staying 1. The cascade control rule is chiefly used in our undertaking to keep the velocity of the motor at a changeless degree and the current cringle in the cascade control is the armature current and it is otherwise called as torsion. Sometimes armature current may transcend the bound to avoid this state of affairs in cascade control, it has limiter, and the chief map of the clipper is to restrict the values of the armature current. For illustration To restrict the armature current to 64volt i.e. 1 ampere. So that the armature wo n't transcend those bounds since the clipper is available in cascade control. The velocity accountant in the cascade control used to bring forth demand current ia* . The motor runs to get the better of the demand current values. The demand current value will ever higher than the normal current values. So that the velocity motor bit by bit increases. PI accountant ( relative Integral accountant ) Current accountant Speed accountant The above all constituents construct a cascade accountant and the map each constituent is described below 3.1.1.1PI accountant ( relative and built-in accountant ) In cascade accountant map assorted accountants are used for observing the velocity and control of the motor, but PI accountant is recommended as high efficient accountant because it consist to constant addition Kip and Kid. By manually tuning the addition of both Kii and Kpi will cut down the steady province mistake and the stableness of the system will be increased. In recent study more than 70 % cascade accountant used PI accountant for commanding the velocity control DC Motor. In order to cut down the steady province mistake in the closed cringle system, bit by bit increase the relative addition changeless Kp. As the addition of the Kp increases the steady province mistake in the system decreases. But the stableness of the system will non be stable. To do the system stable, built-in term Ki is introduced in the system. When both the proportional and built-in term amount each other to cut down the steady province mistake and do the system stable.the above two maps can be done at th e same time in the PI accountant. The mathematical look for PI accountant is explained below. FIGURE 5: PI accountant of a closed cringle map [ 1 ] Kp-proportional addition Ki-Intergral addition Y- Output of the PI accountant Err-Error in the PI accountant At the get downing mistake ( Err ) will go through through both Kp and Ki. For relative addition the end product is Kp Err y1= Kp Err eqn1 [ 1 ] y2 = eqn 2 [ 1 ] Y = y1 + y2 eqn 3 [ 1 ] eqn 4 [ 1 ] The cardinal point in this PI accountant is the mistake Err in intergral addition Ki will be integrated. so that the steady mistake will be reduced and the system will be stable.3.1.1.2Current accountantThe current accountant in the closed cringle maps of the cascade control. The current cringle is besides called as current accountant. It is used to protect cascade circuit from harm. The chief map of the cascade map is to command the velocity. Before commanding the velocity the current of the accountant should be controlled. The current obtained from the closed cringle map is from armature circuit of the DC Motor [ 7 ] .the input in the current accountant is the back voltage ( ia* ) . Power convertor is chiefly used to better the control in the system. It has high exchanging frequence, since the power convertor in the current cringle is really speedy. The end product of the convertor is armature electromotive force ( Va ) . ( -E ) is the perturbation occurred in the current cringle, in order avoid the perturbation -E Iowa ia* RL CIRCUITT Power Converter Pi FIGURE 6: Functional block diagram of Current accountant The perturbation is added along with RL circuit, and the equation is shown below Va = ( S La + Ra ) ia + Tocopherol The map of the RL circuit is cut down complexness Va is Armature electromotive force. Iowa is armature current ( seeking to command ) Ra is Armature opposition Tocopherol is Disturbance RL = 1/ ( S La + Ra ) Current cringle is carried out by conveying the from Iowa ( armature current ) to ia* ( demand armature current ) . As speedy as possible without doing the over shoot acquiring so high. If the over shoot is high it creates job to the convertor. Similarly when the addition values ( Kp and Ki ) increases in PI controller the over shoot value reduces, but the same clip there is more sum of oscillation which may impact the system. Care should be taken in taking both Kp and Ki values. T Iowa ia** FIGURE 7: graph for armature current V subsiding clip ia – Armature current ia* – Demand armature current ts – Settling clip3.1.2 Flexible inverted boardThe major hardware has been designed and implemented as Flexible inverted board. It consists of many constituents they are dsPIC30F3010 microcontroller, H-bridge convertor and District of Columbia motor. The maps of these hardware constituents are explained earlier. The above all operation is implemented in a individual hard ware called flexible inverted board. FIGURE 8: Functional block diagram of Flexible inverted board3.1.2.1 IR2130 gate thrust circuit:There are three input signal generator blocks which are capable of supplying two end products each gives the inputs to the six end product drivers. L1, L2 and L3 are signal generators which drive exactly the three low-side end product drivers although H1, H2 and H3 signal generators must be flat shifted before it is fed to the high-side end product drivers. The drifting points of the driver, gate charge demands of the power switch and the maximal power switch â€Å" ON † times receives power from three bootstrap capacitances C1, C2 and C3. Bootstrap capacitances besides feed supply to the internal natation driver current. Once these energy demands are met there must be considerable sum of charge still on the 8.3V nominal to forestall halting. D7, D8 and D9 should be super-fast. VCC degree seen by an under-voltage sensor circuit gives an input to criminalize six end products of the signal generator circuits. Current detector R1 derives the ITRIP signal in the chief power circuit of the motor when it is segregated with a 0.5 V mention to criminalize the six signal generator end products. ITRIP inputs sets up a mistake logic circuit which in bend gives unfastened drain TTL end product for system gesture. FIGURE 9: Circuit diagram for IR2130 gate thrust circuit3.1.2.2Trim port map with PWMTrim port are little in size and they are really little in size.it is chiefly used in many PCB building board since it ‘s occupies less infinite. The spare port act like a potentiometer and it is otherwise called as pruner [ ] . By tuning the spare port, opposition value can be minimized or maximized. For illustration if a 50ohm opposition can be tuned by spare port from 0 – 50. The two leg of H-bridge convertor produce two pulse wave form one with low end product ( 1L ) and another 1 with high end product ( 1H ) . The responsibility ratio of the PWM wave signifier can set utilizing spare port.3.1.2.3DC MOTOR ENCLOSED WITH A ENCODERThe best methods of ciphering the velocity of the DC motor is utilizing optical encoder method. It consists of a disc, Light Emitting Diode ( LED ) and optical detector [ 6 ] . The disc is fitted with the rotor, as the rotor rotates the disc starts whirling along with the rotor and it is placed in between the LED beginning and the light detector. Once the rotary motion starts the disc passes through the LED beginning and the optical detector gets started, from which the velocity of the motor can be calculated because the optical detector Acts of the Apostless like a tachometer. In other words the encoder in the DC motor is otherwise called as velocity observing detectors. [ 6 ]3.1.2.4 H-Bridge convertorDC motor runs differential v elocity, but the applied electromotive force of the motor varies at every interval of clip. Since the electromotive force is straight relative velocity, as the electromotive force increases the velocity of the motor besides increases. Speed can be calculated by tachometer which is in physique in the DC motors, the applied electromotive force can be supplied and controlled by a convertor called h-bridge convertor. Soman GD – Gate Drive Circuit FIGURE 10: H-bridge convertor with different electromotive force VI ± & A ; VI? [ c ] In this H-bridge circuit it produces two unipolar pulsation breadth transitions because it has two leg inverter. Effective transition takes topographic point merely in the first half of the inverter. As a consequence two variable electromotive forces are generated on either side of the armature twist. In H-bridge, transition index is represented as ( +mi ) and the reciprocal of transition index is represent as ( -mi ) .the motor in our undertaking really sing two pulse breadth. Both the pulsations are reciprocally relative to each other bring forthing a unipolar PWM. The two legs in the convertor are called the shift signals or exchanging frequence. Bigger convertor comparatively has lower frequence and smaller convertor has higher frequence. If the frequence in the leg1 is high in contrast the frequence in the leg2 will be low. In our undertaking see VI ± and VI? are the exchanging channels of the H- span convertor. they are reciprocally relative to each other. The bearer signal is called the input frequence. the bearer frequence used in our undertaking is 10khz. Harmonizing to the bearer frequence the clip period of VI ± and VI? differs. In C coding VI ± and VI? is mentioned as PDC1and PDC2 from the below graph FIGURE 11 graphical representation of PWM signals in H- Bridge convertor. The end product electromotive force of the h-bridge convertor can be obtained both negative and positive electromotive force distribution [ 1 ] . Pulse width transition in the h-bridge convertor helps to command the armature circuit of the DC motor [ 1 ] . Maximal armature current ( torsion ) can be obtained by comparing clip invariable of both field twist and the armature weaving [ 1 ] . Since the motor is connected straight to the field twists supply electromotive force in the field twist is more when compared with the armature weaving. To keep equal clip invariable in both field and armature weaving [ 1 ] , the applied electromotive force in the armature twist should be increased, as the armature current increases the torsion end product is maximized [ 1 ] .3.1.3 Generating PWM moving ridge signifiersAs the torsion end product gets maximized, pulse breadth transition is introduced in the H-bridge system to avoid the perturbation in the armature current.it can be done by increasing the frequence degree of the H-bridge convertor at a higher scope. As the torsion end product gets maximized, pulse breadth transition is introduced in the H-bridge system to avoid the perturbation in the armature current.it can be done by increasing the frequence degree of the H-bridge convertor at a higher scope. FIGURE 12: Diagrammatic representation of the pulsation breadth transition is shown below [ 6 ] The below specification is referred from [ 6 ] Ton – Time is ON ( applied electromotive force ) Toff – Time OFF ( applied electromotive force ) T – Time period. Duty rhythm = . The mean electromotive force of the DC motor can be shown in an equation below Average = Duty rhythm A- Vin [ 6 ] When the motor is running at a changeless velocity the back voltage of the motor is besides remain changeless. As the back voltage remain the same the motor running at changeless velocity and the armature current ( Ia ) is zero. PWM is one chief portion that is required for the operation of cascade control.4. Software used to drive the Motors4.1 Programing microcontroller in Flexible inverted board utilizing C-languageIn the flexible inverter board PIC microcontroller plays a major place in directing the pulsation breadth transition. The Ton clip in the pulsation breadth transition ( PWM ) signal can be modulated or controlled by the microcontroller, as the microcontroller varies the clip, the speed of the motor alterations with regard to clip. The Programing linguistic communication used in microcontroller is embedded C. The scheduling codifications are downloaded in the microcontroller bit, the downloading attack can be done by a package development tool called MPLAB, this package exists in supervising the systems, this package should be foremost installed in the Personal computer, the code rs will compose the codifications to modulate the PI accountant to get Applicable beginning from the current cringle of the cascade control map. Once the codifications are accepted harmonizing to the current cringle [ 1 ] , the plans can be downloaded in the microcontroller through cosmopolitan consecutive coach or in circuit Debugger ( ICD ) ; ICD is a coach which interfaces Personal computer system and the flexible inverter Board. [ 6 ] In order to plan the microcontroller examine whether the hardware constituents are interfaced with the accountant. The scheduling linguistic communication used for programming the accountant is C linguistic communication. In c-language the information ‘s are classified in to input informations and end product informations. The microcontroller direct the information in linear signal, where the C-language wo n't accept linear signals.To avoid the state of affairs ADC convertor and encoder interface are introduced in the system. ADC stands for parallel to digital convertor ; it converts the linear signal in to digital signals. Then the digital signals get received by the C-program as input informations. In turns c-program will direct the end product informations to the PWM unit. UART communicating system is a bidirectional so that microcontroller and Personal computer can pass on at the same time. UART stands for cosmopolitan asynchronous receiving system sender. The basic diagram matic representation for system communicating with C-language is shown below FIGURE 13: System communicating in C – Programing Language. In C-language foremost initialise all the maps required for the velocity control of motor.4.1.1Current detector input:The current in the motor spiral is one of import parametric quantity in the effectual running of the motor. So it is indispensable to mensurate the value of this current. The measuring of the current is performed by utilizing particular detectors call Hall Effect Sensors. The scope of the current is determined by the evaluation of the motor. Any over current in the motor can severely damage the motor. The Hall Effect detectors produce a electromotive force matching to the stage current. This is fed to the ADC inputs of the micro accountant where it is converted into the digital signals. This is so fed into the microcontroller plan. Hence the current demands to be limited within specific limits.CL1, CL2 and CL3 are the three current detectors variables used in this cryptography. The spot ratio of the ADC input is 10 so the input informations scopes from 0 to 1023. The maximal informations bound for the current detector is 1023.so the current detector value in the C- codification is initiated as CL1 = 511 ; CL2 = 511 ; CL3 = 0 ;4.1.2 Encoder input:For any velocity accountant, the existent velocity of the rotor forms the footing for the control signals. The velocity control signal can be changed merely if there is an mistake between the existent velocity of the rotor and the coveted velocity of the rotor. If the measured velocity is less than the coveted velocity so the PWM pulsations are changing consequently to increase the velocity. To execute this action a shaft encoder is used. The shaft encoder uses an opto-mechanical system to bring forth pulsations. These pulsations so are used to deduce the velocity of the rotor. A mention pulsation is used as an index to number the pulsation. This information is fed to the microcontroller, which so uses a particular timing circuit that processes these encoder pulsations. The motor velocity to be accessed by the microcontroller needs to be stored in a variable within the micro accountant codification. The variable used in this plan is a variable called revolutions per minute. This variable is accessed to cipher all maps related to the motor velocity.4.1.3 Pulse Width Modulation:The MOSFET ‘s in the circuit is used as switches. These MOSFET ‘s are switched harmonizing to a PWM. To drive these MOSFETs ‘ a gate driver circuit is required. The gate thrust signal generates the electromotive force required for the operation of these MOSFET ‘s. The PWM is generated by the microcontroller harmonizing to the plan and is supplied to the gate thrust circuit. The PWM signals are sep arate for each if the 3 legs of the MOSFET inverter. Each of the PWM requires a transition index to bring forth the signal. These transition indexes are stored in a registry. The registries are named as PDC1, PDC2, and PDC3. These variables are really important in bring forthing the PWM signals for the MOSFET drivers. Since informations bound is 1023.4.1.4 Initializing the codification in C – linguistic communicationBefore executing any map in C-language, it requires an low-level formatting. It is of import to initialising the variable of a map. Some the maps are initialized below.Init PORT ( )This map initialise the digital input and end product port or parallel input and parallel end product of the microcontroller.Init UART ( )It is one of pin in the microcontroller.The chief map of the UART is used for bidirectional communicating with Personal computer. Since UART can able to observe the transmittal velocity in informations transportation between the microcontroller and Pe rsonal computer. The maximal transmittal velocity is around 19200.the informations transportation wo n't transcend the bound.Init PWM ( )The input frequence of our PWM signal is 10kHz.the clip bound for the transition index is around 0-1474.in the h-bridge convertor has two legs so each leg produces a PWM signal with a maximal clip bound of 0-737. Hence the Ton clip of PWM signal will be in 1:1 responsibility ratio.Init ADC ( )It is used to change over the parallel signals in to digital signals. In the microcontroller there are five pins reserved for the ADC inputs. During the informations transmittal ADC maps plays a of import function in disrupting the signal. An low-level formatting is required for the interrupt to execute any map in C- linguistic communication.Init CAPTURE ( )The gaining control map is chiefly used to mensurate the frequence and clip period of the PWM wave signifier generated from the two legs J30 and J31 pins of the H-bridge convertorInitTimer3 ( ) and InitTime r1 ( )To put initial clip in the microcontroller for the gaining control map and timer 1 set the starting clip for the interrupt map happened in the UART communicating system.Interrupts:Interrupts are occurred merely during the informations transportation, when the transmittal velocity that is the baud rate is known means the interrupts can be added to the system easily.in our undertaking the baud rate is 19200.the chief map of the interrupt is used synchronize clip period of PWM with the velocity cringle and the current cringle of the motor. In our undertaking four different type of interrupt service modus operandi are used. They are ISR_ADCInterput ( ) This interrupt is triggered when the ADC finishes its transition and hence its get synchronized to the microcontroller PWM clip base. From this all the application control codification to be implemented in this interrupts service modus operandi.ISR_T1Interput ( )The assorted information to the Personal computer is transferred by utilizing the UART communicating nexus in this interrupts service modus operandi. All the variables that are needed to be mentioned in this everyday utilizing standard C map dash ( ) .ISR_U1RXInterput ( )Assorted information is transferred from the Personal computer in to the C plan. This everyday concedes us to modulate the facets of the plan when it is running.ISR_IC1Interput ( )It measures the velocity value from clocking informations that are attained in the input gaining control faculty. FIGURE 14 The connexion diagram for the velocity control of Dc motor is shown above Chapter 55 Consequences and treatmentAs discussed earlier the assorted maps of hardware constituents in this undertaking, this subdivision discusses the inside informations sing how the undertaking deals with comparing and measuring the consequences. Undertaking has a series of stairss ; each measure is assigned with different operation techniques to put to death the concluding consequences. 5.1 Initial connexion trial between MPLAB IDE and Flexible inverted Board Initially the system needs to be interfaced utilizing the flexible inverter board. This operation is performed by linking the Personal computer to the flexible upside-down board. To link the Personal computer to the flexible upside-down board, ICD 3 interface port is used to finish the connexion. Since the informations transmittal velocity in ICD 3 is high when compared with ICD 2, the power supply to the inverted board is supplied through the Dc power supply generator. The Initial conditions were set to the power supply generator where the electromotive force bound and current bound is zero. For the Dc motor maximal electromotive force supply is 24voltage in VDC and a current of 0.5 ampere is set in the power supply generator which is so connected to the inverter board. Once the initial conditions are set, the power generator is fitted with a path button which needs to be held and at the same time the end product button needs to be pressed. Once the end product button is turned ON, the power is applied to the inverted board. On the other manus MPLAB IDE package is opened in the system, where a new file demands to be created so the needed compiler for this undertaking needs to be selected. Once these scenes are done the debugger option in the MPLAB ICD 3 is chosen, the package will initialise the tool and a verification message was displayed on the screen which says â€Å" ICD 3 is connected † . The codifications for this were designed in the MPLAB package and burnt in the Ds PIC microcontroller by ICD 3 interface. 5.2 Measure 3, 4 & A ; 5 One of the ADC input pin in the PIC microcontroller demands to be initialize as ADCBUF0. The maximal input scope of ADC interrupt is 1023 since ADC input is initialized as IN1. When IN1 is initialized as ADCBUF0 in C-language it can be written as{IN1 = ADCBUF0 ; PDC1 = IN1 ; IFS0bits.ADIF = 0 ;}Here IN1 is the informations value for the spare port in the flexible upside-down board. The maximal IN1 value is 1023. As mentioned earlier PDC1 is initialized as one leg portion H-bridge convertor, where PDC1 is 1474 and a unipolar pulsation breadth transition was generated. If IFS0bits.ADIF is zero, it means that the chief used to initialise ADIF value is 0 in other words it is the default value. PDC1 = 2*IN1 ; Similarly in measure 4 multiply the spare port input value with 2. Then the PDC1 input scope will transcend so ‘if ‘ statements are used to restrict the value of PDC1 from 0 to 1474. To restrict the values of PDC1 the codification in C-language can be implemented as ; PDC1 = 2*IN1 ; If ( PDC1 & gt ; 1474 ) PDC1= 1474 ; 5.3 Step6 & A ; 7 The flexible upside-down board consists of a gate triggered circuit in other words they are known as MOSFETS. Wholly 6 MOSFETS are available in the flexible upside-down board. In our undertaking two MOSFET are used and both of them are connected to the legs of the H-bridge convertor. The MOSFETS that are connected to H-bridge convertor are ‘U10 and U13 ‘ & As ; ‘U11 and U14 ‘ . To supervise and look into if the MOSFETS are triping the pulsation or non it can be done by analyzing the trial points available in the flexible upside-down board. This is done utilizing the CRO where the trial points are connected via investigations as a consequence triping pulsation is produced. The diagrammatic representation of Square wave signifier is shown below. FIGURE 15The above diagram represents the general pulsation wave form Depending on the transition index value produced by the ADC input the responsibility ratio of the pulse fit transition varies consequently. In other words the transition index is straight relative to the responsibility ratio. Using appropriate C plan the ensuing wave form from the three different responsibility ratios was observed to be in the square form. When the CRO is connected to the trial point J30, three different per centums were obtained due to the different responsibility rhythms. The C codifications that were used to obtain the wave forms are mentioned below: C codification for 50 % responsibility rhythm: PDC1 = MI + 737 ; PDC2 = MI – 737 ; Manual computation for 50 % responsibility rhythm Since PDC1 = 1474 If PDC1/2 = 1474/2 = 737. Resulting wave form for 50 % responsibility rhythm is shown below FIGURE 16 moving ridge from for 50 % responsibility rhythm C codification for 25 % dutycycle: PDC1 = MI + 1105.5 ; PDC2 = MI – 1105.5 ; Manual computation for 25 % dutycycle: ( PDC1 and PDC2 ) value for 50 % responsibility rhythm is 737 ( PDC1 and PDC2 ) value for 75 % responsibility rhythm is 368.5 For 25 % responsibility rhythm add both 737 + 368.5 = 1105.5 Resulting wave form for 25 % dutycycle: FIGURE 17 moving ridge signifier for 25 % responsibility rhythm Code for 75 % dutycycle: PDC1 = MI + 368.5 ; PDC2 = MI – 368.5 ; Manual computation for 75 % responsibility rhythm For PDC1 and PDC2 is 737 Divide PDC1 and PDC2 by 2 The solution for for PDC1 and PDC2 is 368.5. Resulting wave signifier for 75 % dutycycle FIGURE 18 moving ridge signifier for 75 % responsibility rhythm 5.4 Measure 7 The last operation is based on linking the CRO with the trial point J30 in the flexible upside-down board, likewise the same operation is performed in another trial point J31. The triggered pulsation obtained from the MOSFETS is shown below for the different responsibility rhythm ratio as already mentioned in measure 6. Resulting wave form for 25 % responsibility rhythm: FIGURE 19 Resulting wave signifier for 25 % responsibility rhythm in trial point J31 Resulting wave signifier for 50 % responsibility rhythm is shown below FIGURE 19 Resulting wave signifier for 50 % responsibility rhythm in trial point J31 FIGURE 20 Resulting wave signifier for 75 % responsibility rhythm: From above three wave signifiers each differs in their responsibility ratio. Then compare the wave form of J30 & A ; J31. The different is happened because of hold or mistake occurred during the informations transmittal. 5.5 Measure 10 In the initial status of the spare port is set as nothing. Then the responsibility rhythm of the PWM 1 is high and PWM 2 will be low.In other words PWM1 is reciprocally relative to PWM2. Similarly in the ulterior status when the spare port is turning toward the higher terminal. Now the responsibility rhythm of PWM 2 is found to be more than 95 % . The end product of the PWM is determined from the CRO. Since the value of PDC1 and PDC2 will be 1474.due to 1:1 responsibility ratio. The input informations values are every bit shared by both PDC1 and PDC2. In some conditions when the PDC1 = 2*IN1.the value of IN1 is 1023, and so value of PDC1 is 2046. As per the conditions mentioned earlier the value should non transcend the input informations bound 1474. Such state of affairs are handled with aid of if statements. Using if statement how the status is satisfied in C cryptography PDC1 = 737+MI ; PDC2=737-MI ; If ( PDC1 & gt ; 1474 ) PDC1 = 1474 ; If ( PDC2 & gt ; 1474 ) PDC2=1474 ; This codification C2=1474-PDC1 makes the motor to revolve at rearward way. When the above codification is compiled and executed the electric resistance value increased or decreased by manually tuning the spare port in the flexible upside-down board. Harmonizing to the opposition value in the microcontroller the amplitude and the current flow can be controlled. 5.6 Measure 11 Ripple current and RL Load Now connect the RL burden with the connection of the flexible upside-down board to cipher the ripple current. In the connection of the flexible inverted board has two points. They are sing as point A and point B. Ripple current can be calculated by a device called current investigation. First connect the current investigation to the point A of the connection and view the mean value of the ripple current in the CRO. The wave form for the mean ripple current value for point A is shown below. FIGURE 21 moving ridge signifier for responsibility cycle1 with 1H and duty rhythm 2 1L ( indicate A ) 1H – High End product 1L – Low End product In this wave form the conditions are wholly reversed when compared with the above wave form. The responsibility rhythm 1 with 1L and duty rhythm 2 with 1H ( indicate A ) FIGURE 22 moving ridge signifier for responsibility cycle1 with 2L and duty rhythm 2 1H ( indicate A ) Once the rippling currents are calculated in point A. the similar operation is performed by the current investigation in point B. the wave forms are shown below FIGURE 23 wave form for responsibility cycle1 with 1H and responsibility cycle2 with 1L ( point B ) FIGURE 24 wave form for responsibility cycle1 with 2L and responsibility cycle2 with 2H ( point B ) 5.7 Measure 12 This measure deals with ciphering the beginning and derive value of ripple current through current investigation as discussed earlier. These values are chiefly used for trying the input informations ‘s from the microcontroller. In order to cipher the beginning and addition value the values need to be identified as shown in the tabular matter below they are ; ADC electromotive force, current detector, PDC1 and PDC2. Initially the interface needs to be reloaded with the flexible upside-down board. The PDC1 and PDC2 value can be determined by the ticker option in MPLAB IDE package. The current detector in the flexible inverted board has a trial point J43. Then the current detector value was measured by multi metre through the trial point. For this a 24 electromotive force Dc motor the maximal current detector value gettable will be 2.57voltage. Initially set the spare port value to zero, so look into the current detector value by a multi metre where it showed 2.57. By increasing the electric resistance of the spare port the current detector and ADC electromotive force will be bit by bit decreased nevertheless at one phase the ADC electromotive force bit by bit decreases to zero. Later the ADC electromotive for ce value increased easy but the current detector invariably decreased as shown in the tabular matter. These values were recorded in the tabular matter. Subtracted ADC electromotive force value from PDC1 value and the mean value consequence was recorded in the new column. Then the mean value for the new column is calculated. Table 2 Tabular column for ciphering beginning and addition values ADC electromotive force Current detector PDC1 PDC2 PDC2 – ADC electromotive force Spot 27.51 2.569 41 1433 13.49 4.46039 25.43 2.559 143 1331 117.57 21.79 2.544 283 1191 261.21 20.51 2.527 444 1030 423.49 17.79 2.517 546 928 528.21 0.0007 2.497 757 717 756.9993 3.72 2.478 960 514 956.28 4.07 2.462 1123 351 1118.93 18.4 2.43 1431 43 1412.6 5588.7793 620.9754778 Manual computation for the above tabular matter is shown below Offset spot = ( PDC1 – ADC electromotive force ) / entire figure values ( PDC1- ADC electromotive force ) = 13.49 + 117.57 + 261.21 + 528.21 + 756.9993 + 956.28 + 1118.93 + 1412.6 = 5588.7793 PDC1-ADC electromotive force = 5588.7793 Entire figure of values = 9 Average ( PDC1 – ADC electromotive force ) = 5588.7793/9 = + 620.9754778. Calculate the entire ADC electromotive force Entire ADC electromotive force =27.51 + 25.43 + 21.79 + 20.51 + 17.79 + 0.0007 + 3.72 + 4.07 + 18.4 = 132.5 Offset spot = + 620.9754778./ 132.5 = 4.4602 spot 5.8 Measure 13 In this subdivision connect 24 volt Dc motor to the flexible upside-down board. When the power supply is turned ON the motor rotates at a peculiar velocity and this velocity of the motor rotates harmonizing to the responsibility ratio produced by the H-bridge convertor. Initially test all the conditions to verify the on the job status of the motor. The motor used here is fitted with an encoder that is attached together. Since the flexible inverted board has an encoder sensor the encoder portion of the motor was connected to the encoder sensor, therefore the motor satisfies the conditions mentioned above.5.9 Measure 14In this measure, J14 pin of the flexible upside-down board is interfaced together with the system through a overseas telegram. Using Lab position package ‘s the Tacho scope, RPM can be determined. PDC1, PDC2 and their corresponding responsibility rhythm per centum are viewed. Like this similar operation Table 3 Tabular column for ciphering electromotive force Vs velocity Tacho Vdc Revolutions per minute PDC1 PDC2 Duty 1 % Duty 2 % 1 -18.1 1776 150 1324 89.2 11.2 2 -14.5 1416 270 1204 81.1 19.9 3 -10.71 1047 388 1087 73.3 27.1 4 -7.46 727 482 992 66.5 35.5 5 -3.42 334 596 878 58 42 6 0 95 714 760 50 49.6 7 1.69 165 826 648 45.6 54.4 8 5.5 538 941 532 38.2 62.2 9 9.33 919 1049 423 29.8 70.1 10 12.9 1265 1155 320 22.3 72.9 11 16.1 1578 1256 219 15.5 85.5 12 19.6 1919 1374 97 9 92 RPM = K To cipher the value of the K K = Vdc12 – Vdc1/RPM12 – RPM1 K = 19.6-18.1/1919 – 1776 K = 0.0104 As per the demands from the tabular matter secret plan the graph for Vdc ( electromotive force ) V RPM The graph representation is shown below FIGURE 25 Voltage Vs Speed5.10 Measure 155.10.1Current cringleOnce the mean value of the ripple current and the beginning values are calculated, to command the velocity of the motor, foremost the applied electromotive force of the motor should be controlled. Interestingly the applied electromotive force can be determined from the current cringle of the relative and Built-in accountant in other words as PI accountant. Since the operation of PI accountant is explained before itself. In the PI accountant current plays the interior cringle, and it is 10 times faster than the outer cringle. So the interior cringle is executed foremost. A measure input given to the PI accountant. The consequence expected from the end product of the PI accountant as a measure end product with extremum over shoot. This extremum over shoot increases the steady province mistake besides increases. In bends steady province mistake produces a electromotive force bead in the motor. So the velocity of the motor bit by bit decreases. This state of affairs can be overcome by seting the addition of both relative and built-in. The maximal extremum over shoot degree is 7.5 % . If the degree exceeds, the end product of the current cringle is non in a stable status. If the system is non stable, it is hard to command the velocity of the motor. the graphical representation of the expected current cringle is shown below. FIGURE 26 measure response end product for current cringle In the above measure response the ia* and Iowa are the demand current and the armature current. Since the current detector value 1023. Two current detectors are used. They CL1 and CL2 The armature current Iowa = 511 Demand current ia* = 511 Tocopherol is the mistake E = demand current – armature current E = ia* – Iowa E = 511 – 511 = 0 ; Harmonizing to the computation shown above.The codification is compiled in C-language for the current cringle. In the cryptography First originate the addition values of the PI accountant as kpi and kii. int kpi, kii ; kpi=10 ; kii=0 ; Then initialise the mistake, armature current and demand current as i_error, Iowa and ia_demand int Iowa, ia_demand, i_error ; Iowa = CL1 ; ( initialise current detector 1 as armature current of the motor ) CL1 = 511 ; ( initialise the value of current detector 1 as 511 ) ia_demand = 511 ; ( demand armature current ) i_error = ia_demand – CL1 ; ( Error in the armature current can be determined by deducting the armature currenr ( Iowa ) from the demand armature current ( ia* ) . The expected mistake should be zero. when the above codification is executed in MPLAB package. In the get downing the mistake is non zero. Some clip the current detector value differs. As per the codification the expected CL1 value should 511. In this status, a new set of codification is implemented. In this codification, if statements are used for the CL1 value. Then the current detector value will be within the scope. if ( 510 & lt ; CL1 & A ; & A ; CL1 & lt ; 517 ) the value CL1 ranges from ( 511 to 517 ) The manual tuning of kpi and kii alterations CL1 from 511 to some other value. As a consequence mistake occurs in the extremum over shoot. For illustration if CL1 is 514, which is displayed on the ticker of MPLAB Since the expected CL1 is 511 but CL1 is 514 The mistake difference between the expected and the present value is 3. The avoid the mistake difference in CL1 a simple codification is designed below CL1 = CL1 -3 ; ( if CL1 is 514, 514 – 3 is 511 ) . The mistake is zero but the extremum over shoot is still high. This is due built-in air current up map because the built-in added with kii in PI accountant. To avoid this mistake separate codification is executed in C cryptography. The variable zi is initialized as built-in collector and its value is 737. if ( zi & gt ; 737 ) zi=737 ; if ( zi & lt ; -737 ) zi=-737 ; the above codification keeps the zi value within the scope. Since i_error = 511 zi = 737 + 511 zi = zi+i_error ; ( anti air current up codification added with an mistake ) In order to avoid the built-in mistake multiply built-in collector with built-in addition ( kii ) . kii * zi ( eqn 1 ) Multiply the mistake with the addition of proportional. kpi * i_error ( eqn 2 ) add both the eqn to acquire the concentrated transition index. This map will cut down the steady province mistake and extremum over shoot. myocardial infarction = ( kpi*i_error ) + ( kii*zi ) ; From this codification the expected extremum over shoot is obtained with zero steady province mistake. The expected current cringle moving ridge signifier implemented from the codification is shown below In this moving ridge signifier over shoot is high. To cut down the over shoot and stead province mistake manually tune the kpi and kii value. Manual tuning is like a loop method to acquire a peculiar solution after many comparings take topographic point between kpi and kii values. The expected end product is non yet determined. So the expected end product is still under procedure.Mention[ 1 ] D.J.Atkinson, â€Å" Control of Electric thrusts, † EEE 8014 talk notes, School of electrical, electronic and Computer technology, Newcastle University,2011. [ c ] [ 2 ] R.Roberge, â€Å" Carbon coppice public presentation and application in the mush and paper environment † , National Electrical Carbon Products, 2001. [ 6 ] E.A.CHOON, â€Å" DCmotor velocity control utilizing microcontroller pic16f877a † , 2005, pp. 1-64. [ 3 ] K.Hameyer, R.J.M.Belmans, â€Å" Permanent magnet excited brushed DC motors † Dept. of Electrical. Engineering. Katholieke University, Vol. 43, 1996, pp. 247-255 [ a ] CONDIT, R. ( 2004 ) Brushed DC Motor Fundamentals Microchip Technology Inc. [ 5b ] P.Chevrel, L.Sicot, S.Siala, â€Å" Switched LQ accountant for DC Motor Speed and Current Control: a comparing with cascade control † , 1996. [ 4 ] G.J.Atkinson, â€Å" Electrical Power and Control Project, † EEE8075 ( Semester 1 ) talk notes, School of electrical, electronic and Computer technology, Newcastle University, 2011. [ 7 ] M.V.Ramesh, J.Amarnath, S.Kamakshaiah, G.S.Rao, â€Å" SPEED CONTROL OF BRUSHLESS DC MOTOR BY USING FUZZY LOGIC PI CONTROLLER † ARPN Journal of Engineering and Applied Sciences.Vol.6, NO. 9, 2011. [ 8 ] R. K. Munje, M. R. Roda, B. E. Kushare, â€Å" Speed Control of DC Motor Using PI and SMC † IPEC, 2010 Conference Proceedings, 2010, pp.945- 950. DS movie mention [ 2 ] . ( 2010 ) dsPIC30f3010 Data Sheet. Microchip Technology Inc. [ 16 ] .D'SOUZA, S. ( 2004 ) detector less BLDC Motor Control Using dsPIC30f2010. Microchip Technology Inc. [ 18 ] . ELLIOTT, C. & A ; BOWLING, S. ( 2004 ) Using the dsPIC30F for mindless BLDC control. IEEE Inc. [ 20 ] . HUDDLESTON, C. ( 2007 ) Intelligent detector design utilizing the micro chip Ds PIC [ electronic resource ] / by Creed Huddleston. , Elsevier/News. Tabulation J. Plantier, H. Aziza, J.M. Portal, C. Reliaud, A. Regnier, J.L. Ogier, â€Å" EEPROM tunnel oxide life-time dependability anticipation based on fast electrical emphasis trials † ELECTRONICS LETTERS Vol. 46 No. 23, 2010. Tang Yiliang, Cui Wenjin, Xie Xiaorong, Han Yingduo, Man-Chung Wong â€Å" 80Cl96MC Microcontroller-based Inverter Motor Control and IR2130 Six-output IGBT Driver † Department of Electrical Engineering and Faculty of Science and Technology, 1999, pp.665-667. [ FIGURE9 and 3.1.2.1 ] David Cook â€Å" CHAPTER 14 Variable Resistors ROBOT Building FOR BEGINNERS † , 2010, pp 173-191. [ trimport ]