Wednesday, August 26, 2020

Analysis of A Jury of Her Peers free essay sample

This story is given through the point of view of two females which assists with depicting the perspectives on the essayist. All through this story we are given foundation on Minnie yet in addition given knowledge on how her life is presently, and with this left to choose if she is liable of the wrongdoing that was submitted. While Minnie is the primary focal point of the story we can see the subject happened through two of different characters, and furthermore through a contention of a choice that these ladies must make. The primary topic of â€Å"A Jury of Her Peers† is that of sisterhood, ladies staying standing for one another regardless of the circumstance. All through the start of the story Mrs. Solidness is placed in a circumstance where she can identify with Minnie, not of the resentment or of the disregard, however of her home the manner in which it was left, and being looked downward on for that. Not long after going out and showing up at the location of the wrongdoing she is grieved by knowing how close Minnie was and that she had never connected or visited her in longer than a year, and can’t help to think on the off chance that she would have visited what may have been extraordinary. As the story proceeds with Mrs. Robust is helped to remember what a sweet young lady Minnie was, the manner by which she used to sing so flawlessly in the ensemble, and rich and sharp looking she used to be (Glaspell 154). From simply these initial couple of seconds in the story Mrs. Solidness is demonstrated having sympathy for Minnie and recalling her as a decent young lady who ought to be taken a gander at as honest. As the story keeps on investigating the character of Mrs. Robust she is seen relating her own life to Minnie’s and how hard it more likely than not been for her to not to have any youngsters and a spouse that isn't the mindful sort, yet additionally so distant from any other person. Again the regret for Minnie is indicated when Mrs. Robust sees her organic product demolished (153) and the fix of blanket that is so fixed (156) and one can begin to understand that Mrs. Sound is placing herself in Minnie’s place. Towards the finish of the story the winged creature is discovered dead enveloped with a case subsequent to being choked (159); uncovering that Minnie had executed her significant other. Rather than taking this proof to the men who might have no sympathy for Minnie, Mrs. Robust takes the container and conceals it in her jacket (162) demonstrating how she is thinking about and going to bat for Minnie. As this is appeared through the entire story Mrs. Sound is eager to conceal the proof with the goal that the master plan of women’s solidarity can be appeared. Another character that assists with uncovering the subject of this story is Mrs. Diminishes who is the sheriff’s spouse and is alluded to as being hitched to the law (161). As the story starts she is depicted as a little lady that hushes up. While the story proceeds with she begins to become more friendly and like Mrs. Sound identify with Minnie, with all the work that should be done and the pressure of being a lady. It is appeared through her eagerness to first take in quite a while for Minnie (158) yet additionally by her interest of the winged animal confine (157) and what may have happened to Minnie’s just companion. To some degree this shows empathy for Minnie and shows Mrs. Peter’s opening up into her own individual that can think all alone. The topic keeps on being appeared through Mrs. Peter’s character after the dead feathered creature is found and she chooses to keep it avoided her better half and the lawyer (161). At that point the last appearing of her mindful and remaining by Minnie is the point at which she permits Mrs. Robust to have the case and shroud it demonstrating that the two ladies were never going to talk about this feathered creature again, yet in addition that she was happy to go behind her husband’s back so that Minnie had a superior possibility of being liberated (162). This shows the consideration she has for another lady despite the fact that she has never at any point met her it is significant that these ladies remain together all through life and post for each other. Again the subject is appeared all through this story in a contention. The entire story depends on a contention of what occurred and who had murdered Mr. Wright, yet the genuine clash lies with the two women that went to the house. What might they do when confronted with the choice of staying standing for a kindred lady which battles they could identify with or surrender the proof that would bolt her away for good. At the point when the story starts it is demonstrated that neither of these lady have profound associations with Minnie one possibly knows her from when she was a kid while the other not in any way. From this it tends to be seen that the ladies initially are unnerved by what has occurred however don't really need to be included. Proceeding with anyway the likenesses of these women’s lives with Minnie’s are appeared, and the thinking about another ladies or the security for her is brought out in their choice to hold the proof that would demonstrate her blameworthy so she can ideally be free. In conclusion, the mind-set ought to be perceived as an immense piece of demonstrating the topic of this story. From the earliest starting point it is a bleak state of mind that is attached to the demise of Mr. Wright however as the story proceeds with we can see the state of mind change over to mindful and empathetic because of the ladies relating their lives to Minnie’s. Towards the finish of the story the disposition is appeared as a greater amount of quiet or serene in light of the fact that the ladies can arrive at the finish of concealing the proof to spare Minnie. The general subject can be appeared as sisterhood, or the ladies ready to remain standing for each other regardless of what the conditions. Through these two characters we can see their thinking about another ladies and the compassion they put towards her. Additionally through the contention that emerges in whether to show the proof they found and their official conclusion in that assists with showing the topic to the perusers. At long last through the disposition of this story the topic is depicted in the ladies meeting up to settle on a choice that assists with helping the temperament. This story gives an incredible delineation of the meeting up of ladies and the consideration they have for one another.

Saturday, August 22, 2020

The Recovery Rate Of The Male Is Significantly Faster Thna The Female :: essays research papers

THE RECOVERY RATE OF THE MALE IS SIGNIFICANTLY Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â FASTER THAN THAT OF THE FEMALE. Â â â â â Conceptual: Â Â Â Â Â This analyze is intended to test whether sex is a significant contributing element to the recuperation pulse in people. Most would expect that the male pulse would be extensively quicker in recuperation time than that of the female. This investigation assists that supposition by disposing of uncontrolled factors, for example, age, manufacture, and wellbeing conditions. Presentation: Â Â Â Â Â The male human has consistently had certain physical favorable circumstances over the female human, for example, expanded bulk, bigger bones, and sublime forcefulness in times where considered fundamental. Be that as it may, is recuperation rate (or, to what extent it takes for the pulse to come back to its resting rate) a bit of leeway controlled by guys moreover? The inquiry presented in this examination is whether the pulse of the male will recuperate quicker than that of a female. The speculation tried was that the male's pulse would fall significantly quicker than the female's following one moment of exceptional physical movement. Â Â Â Â Â It is known as of now that guys command females in the physical world by and large. Guys have a lot bigger regular bulk, less muscle to fat ratio, and a build that is intended for prevalence in the physical world. In this manner it must be accepted that the most significant muscle of all (the heart) would likewise be predominant in its presentation. Mariotti 2 Â Â Â Â Â Many components can impact the aftereffects of testing this speculation. The sum total of what factors have been controlled with the exception of the variable sexual orientation. Both the male and female subjects are close in age (< two years distinction), both are nonsmokers, both have little body works for their separate sexual orientation, and both have no weakening ailments (e.g., asthma, diabetes, heart condition). Controlling these variables took into consideration the testing of the theory, which is centered carefully around sexual orientation. Materials and Methods: Â Â Â Â Â The materials utilized: one wristwatch (with second hand), two dynamically unconcerned people (one male, one female), and a standard flight of stairs at CCC. The strategy was straightforward: two guineas pigs were presented to two preliminaries including one moment of physical action and x minutes required for the recuperation of the pulse. Before the test started, each subject's resting pulse was taken. This would turn into the controlled variable. Next, each subject ran up one lot of steps at CCC, each step in turn, for one moment. Following one moment of movement, the subjects halted and started taking their pulse.

Friday, August 14, 2020

Should GCSEs Get Harder

Should GCSEs Get Harder The OE Blog Exams watchdog Ofqual has announced plans to toughen up GCSE examinations in four key subjects; maths, English literature, history and geography. The move comes after claims that GCSEs are getting too easy and teachers are simply training pupils to jump through examination hoops, rather than really taking students through the whole syllabus. With exam results improving every year, many fear that teaching to the test is taking over in UK schools and Ofqual claims that the new requirements will make it more difficult for schools to focus only on the specific parts of the curriculum necessary to pass the examination. In one example, the Department for Education pointed out that almost all the questions on one common GCSE English literature paper focussed on just three novels, allowing students to study just those books over their two year course and still emerge with excellent grades. If the syllabus is supposed to cover other genres or time periods, Ofqual argues, students ought to be studying them â€" whether they come up in the exam or not. But some fear that just making the exams even harder is not the way forward. One dedicated GCSE maths tutor from London, who helps prepare individual students for the exam, said “the GCSE maths paper is hard enough already. If they want to tinker with the paper, it would be much more useful to include more practical maths for application in everyday circumstances as the SAT papers do…I don’t think that just adding harder and harder topics or a wider range of topics is going to help prepare students for professional life”. Many fear a risk that changes to exams and syllabuses are being carried out for the sake of appearances and manipulating the figures, rather than with the students’ educational needs in mind. Others have raised concerns that it is illogical and unfair to raise the difficulty level of an arbitrary selection of subjects whilst leaving others as they are. This could prejudice candidates against choosing geography and history, which are optional subjects at GCSE, or lead to them gaining a less impressive roster of grades than those doing different subjects. The changes come after several recent undercover operations by the Daily Telegraph, which showed chief examiners explaining to teachers at an examination conference how they could avoid teaching a whole chunk of the syllabus by tailoring lessons to cover only the bare essentials necessary for the actual exam. The report also yielded footage of an Edexcel chief examiner assuring an undercover journalist that the company’s geography GCSE was less challenging than that of other exam boards. To truly fix the ailing UK examination system, which is suffering from allegations of ever-increasing simplicity, league table obsession and teaching to the test, it will surely take more than a few quick changes to a select number of subject papers.

Sunday, May 24, 2020

Global Warming And Its Effects On The Environment Essay

Some people say global warming is caused by human activity, others say global warming doesn’t even exist. Some people claim that the climate is changing for the worse. They believe that humans are the primary cause of these changes, especially the increase in temperature, caused by the burning of fossil fuels. They believe that the temperature changes are causing glaciers to melt. They claim that the melting of ice masses leads to a higher sea level and worsening conditions for Arctic animals, as well as other negative effects on the environment. Others do not agree with this. They say that the climate is not changing at all and that if it is, it is certainly not due to human behavior. The term â€Å"global warming† refers to an abnormal, increasing average temperature of the planet. The average temperature has fluctuated constantly throughout the whole time the Earth has existed, but recently the climate has changed in ways it has not done earlier, as well as more rapi dly than it ever has before. The natural reasons for the climate to change are still occurring, but with an addition of some thought to be caused by human activities. The primary cause behind the increasing temperature is according to NASA large amount of greenhouse gases being released into the air when fossil fuels are being burnt. The higher temperatures are said to cause for example melting glaciers and increased coastal erosion. The melting of ice results in negative changes to the ecosystem of the affectedShow MoreRelatedGlobal Warming And Its Effect On The Global Environment1144 Words   |  5 PagesGlobal warming has emerged as one of the most serious concerns for scientists and environmentalists in the 21st century. This is based on the negative impact of global warming, which is not limited to deforestation, drastic variations in climate, decline in output of global agricultural industry, degradation of ice sheets in Antarctic, decrease in ocean productivity, rise in sea levels, and increase in tornadoes, hurricanes and floods. The primary reason for global warming has been identified asRead MoreThe Effects Of Global Warming On The Environment977 Words   |  4 PagesThe Effects of Global Warming Introduction Global warming has been discussion for many years, but has, in the last decade or two been at the forefront of attention. The enormous effects and potential risks on humanity that can result from rise in global temperatures and the environment must be addressed, because the earth after all is finite. â€Å"Globalization refers to the rise of average temperature of oceans and earth’s atmosphere. Since the beginning of the 20th century, the earth’s average surfaceRead MoreThe Effects Of Global Warming On The Environment1224 Words   |  5 PagesGlobal warming continues to be a huge concern affecting the environment, people and the world. If action to stop this phenomenon is not taken immediately by the global community, the consequences will certainly be catastrophic. Already, some of the consequences of global warming are being felt globally. The frequency and intensity of tropical storms has increased as a result of global warming. Global temperatures continue to rise at rapid and unprecedented rates. According to scientific researchRead MoreGlobal Warming And Its Effect On The Environment1311 Words   |  6 PagesIntroduction Global warming refers to an incremental in earth’s temperature. Some believes this is occurring naturally but the prevailing view attributes climate change to the greenhouse effect. The greenhouse effect refers to the warming resulting from certain gases such as carbon dioxide in Earth s atmosphere trapping heat. These gases traps heat but let light in, similarly to the glass walls of a greenhouse. The general belief is that mankind are chiefly responsible for global warming becauseRead MoreThe Effects Of Global Warming On The Environment1549 Words   |  7 PagesGlobal warming is an increasing in average global temperatures across the planet. This is due to the rising temperatures on the continent. Temperatures continue to rise yearly causing global warming. The greenhouse effect is sun light radiation being driven back to the earth. When solar energy is released into the atmosphere, there is an effect of bouncing back. Solar radiation is bounced back into the atmosphere causing the temperature of the earth to remain steady. However, over time greenhouseRead MoreThe Effects Of Global Warming On The Environment1175 Words   |  5 PagesGlobal warming, according to the United States Environmental Protection Agency, â€Å"refers to the recent and ongoing rise in global average temperature near Earth s surface.† Effects of human influence on the environment has long been a cause of concern regarding the disturbance of the â€Å"natural order.† Although a cycle which results in the periodic increase and decrease of the average global temperature has long been known to exist, due to new data suggesting the substantial and relatively recentRead MoreThe Effects Of Global Warming On The Environment1453 Words   |  6 PagesHuman impact such as industrialization, livestock farming and the increase in recent population have all caused serious environmental impacts that have let to dramatic global climate change. â€Å"Scientists generally agree that the globe has warmed over the past 40 years, due largely to human activities that raise carbon-dioxide levels in the atmosphere† (Clemet). Greenhouse gasses have always existed, but not to the extent that they do in today’s world; they are causing a dramatic change in climateRead MoreGlobal Warming And Its Effects On The Environment928 Words   |  4 Pagesâ€Å"Global Warming†-Th e Biggest Scam of Modern Times Global warming is the steady increase in the Earth’s average surface temperature. There are two sides of this story. Some people believe that global warming is caused by the natural components in the environment and not man-made production of carbon dioxide, while the others believe that it is caused by man-made production of carbon dioxide and not by natural components in the environment. Global warming is due to the increased level in temperatureRead MoreGlobal Warming And Its Effects On The Environment999 Words   |  4 Pagesâ€Å"Global Warming†-TheBiggest Scam of Modern Times Global warming is the steady increase in the Earth’s average surface temperature. There are two sides of this story. Some people believe that global warming is caused by natural components in the environment and not man-made production of carbon dioxide, while the others believe that it is caused by man-made production of carbon dioxide and not by natural components in the environment. Global warming is due to the increased level in temperature ofRead MoreThe Effects Of Global Warming On The Environment767 Words   |  4 PagesHow does the daily action of driving a car contribute to global warming pollution and other air pollutions? Economic growth has triggered an explosion in the automobile industry, but along with that expansion comes consequence. The motor vehicle business has increased air pollution, causing acid rain, and has also contributed to global warming. Global warming is the process of the earth heating up due to increased levels of gases such as carbon dioxide , on the the leading emissions from cars. Most Global Warming And Its Effects On The Environment Essay The world we live in is facing many adverse challenges harming its environment. The environment faces destruction such as pollution caused to carbon emissions caused by fossil fuels and greenhouse gasses, waste, and a host of other pollutants caused by various other human activities. With an ever-growing population, consumer demand is higher than ever, and as consumer demand increases, harmful environmental consequences arise. The world is at a current situation where the ecology of the planet is not coping with all the environment destructions and this paper focuses on the pollution caused due to enormous, continuously increasing, consumer demand. This excessive demand for consumer products has created most of the present ecological imbalances. Consumer products go through a multitude of steps that are required for them to turn into the final product we see in our everyday life. This push towards consumerism entails a push to an exponential increase in the practices that lead to the creation of the pollutants that are contributing to global warming in such adverse ways. These shortcomings will become a much bigger issue than most people imagine it to be. The disparities or imbalances have already caused environmental problems in various regions of the world, and much more are expected to follow. Currently, the consumption rate is on the increase at a very high level, and the trend is alarming. The buying and spending power have increased; an indication that more productsShow MoreRelatedGlobal Warming And Its Effect On The Global Environment1144 Words   |  5 PagesGlobal warming has emerged as one of the most serious concerns for scientists and environmentalists in the 21st century. This is based on the negative impact of global warming, which is not limited to deforestation, drastic variations in climate, decline in output of global agricultural industry, degradation of ice sheets in Antarctic, decrease in ocean productivity, rise in sea levels, and increase in tornadoes, hurricanes and floods. The primary reason for global warming has been identified asRead MoreThe Effects Of Global Warming On The Environment977 Words   |  4 PagesThe Effects of Global Warming Introduction Global warming has been discussion for many years, but has, in the last decade or two been at the forefront of attention. The enormous effects and potential risks on humanity that can result from rise in global temperatures and the environment must be addressed, because the earth after all is finite. â€Å"Globalization refers to the rise of average temperature of oceans and earth’s atmosphere. Since the beginning of the 20th century, the earth’s average surfaceRead MoreThe Effects Of Global Warming On The Environment1224 Words   |  5 PagesGlobal warming continues to be a huge concern affecting the environment, people and the world. If action to stop this phenomenon is not taken immediately by the global community, the consequences will certainly be catastrophic. Already, some of the consequences of global warming are being felt globally. The frequency and intensity of tropical storms has increased as a result of global warming. Global temperatures continue to rise at rapid and unprecedented rates. According to scientific researchRead MoreGlobal Warming And Its Effect On The Environment1311 Words   |  6 PagesIntroduction Global warming refers to an incremental in earth’s temperature. Some believes this is occurring naturally but the prevailing view attributes climate change to the greenhouse effect. The greenhouse effect refers to the warming resulting from certain gases such as carbon dioxide in Earth s atmosphere trapping heat. These gases traps heat but let light in, similarly to the glass walls of a greenhouse. The general belief is that mankind are chiefly responsible for global warming becauseRead MoreThe Effects Of Global Warming On The Environment1549 Words   |  7 PagesGlobal warming is an increasing in average global temperatures across the planet. This is due to the rising temperatures on the continent. Temperatures continue to rise yearly causing global warming. The greenhouse effect is sun light radiation being driven back to the earth. When solar energy is released into the atmosphere, there is an effect of bouncing back. Solar radiation is bounced back into the atmosphere causing the temperature of the earth to remain steady. However, over time greenhouseRead MoreGlobal Warming And Its Effects On The Environment Essay1516 Words   |  7 PagesSome people say global warming is caused by human activity, others say global warming doesn’t even exist. Some people claim that the climate is changing for the worse. They believe that humans are the primary cause of these changes, especially the increase in temperature, caused by the burning of fossil fuels. They believe that the temperature changes are causing glaciers to melt. They claim that the melting of ice masses leads to a higher sea level and worsening conditions for Arctic animals, asRead MoreThe Effects Of Global Warming On The Environment1175 Words   |  5 PagesGlobal warming, according to the United States Environmental Protection Agency, â€Å"refers to the recent and ongoing rise in global average temperature near Earth s surface.† Effects of human influence on the environment has long been a cause of concern regarding the disturbance of the â€Å"natural order.† Although a cycle which results in the periodic increase and decrease of the average global temperature has long been known to exist, due to new data suggesting the substantial and relatively r ecentRead MoreThe Effects Of Global Warming On The Environment1453 Words   |  6 PagesHuman impact such as industrialization, livestock farming and the increase in recent population have all caused serious environmental impacts that have let to dramatic global climate change. â€Å"Scientists generally agree that the globe has warmed over the past 40 years, due largely to human activities that raise carbon-dioxide levels in the atmosphere† (Clemet). Greenhouse gasses have always existed, but not to the extent that they do in today’s world; they are causing a dramatic change in climateRead MoreGlobal Warming And Its Effects On The Environment928 Words   |  4 Pagesâ€Å"Global Warming†-The Biggest Scam of Modern Times Global warming is the steady increase in the Earth’s average surface temperature. There are two sides of this story. Some people believe that global warming is caused by the natural components in the environment and not man-made production of carbon dioxide, while the others believe that it is caused by man-made production of carbon dioxide and not by natural components in the environment. Global warming is due to the increased level in temperatureRead MoreGlobal Warming And Its Effects On The Environment999 Words   |  4 Pagesâ€Å"Global Warming†-TheBiggest Scam of Modern Times Global warming is the steady increase in the Earth’s average surface temperature. There are two sides of this story. Some people believe that global warming is caused by natural components in the environment and not man-made production of carbon dioxide, while the others believe that it is caused by man-made production of carbon dioxide and not by natural components in the environment. Global warming is due to the increased level in temperature of

Wednesday, May 13, 2020

Artificial Intelligence Of Medicine ( Aim ) - 1571 Words

3.1 Artificial Intelligence in Medicine Artificial intelligence in Medicine (AIM) [‎18,‎19] frameworks are expected to help healthcare laborers in the typical course of their obligations, supporting assignments that depend on the control of data and information. An AI framework could keep running inside an electronic therapeutic record system, and alarm a clinician when it identifies a contraindication to an arranged treatment. It could likewise alarm the clinician when it distinguishes situations in clinical information that recommend recognizable changes in a patient s state. Beside, processes that require inferring upon medicinal information, AI frameworks likewise have an altogether different part to play during the time spent in scientific examination. Specifically, AI frameworks have the ability to learn; hence they prompt the disclosure of new Phenotypes and create medicinal knowledge. For instance, AI framework can be utilized to investigate a lot of data, searching for complex relationships inside it that propose sudden correlations. Similarly, with a sufficient model of existing medicinal information, an AI framework can be utilized to show how another arrangement of empirical observations contrast with the current hypotheses. Knowledge-based systems are the most widespread kind of AIM framework in classical clinical use. They contain medicinal knowledge, around a particularly characterized errand, and can prevail upon information from individual patients toShow MoreRelatedA Research On Artificial Intelligence1338 Words   |  6 Pagesand act in a human-like way. Artificial Intelligence has many uses across many fields, especially in the field of Medicine. Early on in the field, many scientists and doctors believed that robots controlled by sophisticated AI would be able to surpass clinicians. â€Å"With such motivations, a small but talented community of computer scientists and healthcare professionals set about shaping a research program for a new discipline called Artificial Intelligence in Medicine (AIM). These researchers had a boldRead MoreThe Benefits of Artifical Intelligence (AI)994 Words   |  4 PagesAs said by Hussein H. Owaied â€Å"Artificial Intelligence (AI) is the study and research f or locating relationships between psychology and computation theories in order to represent these relationships as either data structures, problem solving strategies or representation forms for knowledge and the final goal of AI is to build an intelligent machine, with another benefit which is better understanding of human thinking†. (Owaied, H. M. (2012, March). Other technologies could perform practical characteristicsRead MoreThe Development Of Mass Spectra On Organic Chemical Computers821 Words   |  4 Pagespower of object-oriented programming and of icon-oriented interfaces by developing the Small talk language. The next improvement in the AI field was made in the late-70s, the Stanford University Medical EXperimental computer for Artificial Intelligence in Medicine (SUMEX-AIM) resource was led by Ed Feigenbaum and Joshua Lederberg and demonstrated the use of Advanced Research Projects Agency Network (ARPAnet) for scientific collaboration. In 1979, â€Å"Jack Myers an d Harry Pople at University of PittsburghRead MoreRationalism vs. Irrationalism1607 Words   |  7 Pagesrationalistic perspecive we observe the mind as active, the emotions passive, and the notion that no material thing can cause an nonmaterial idea; however from the viewpoint of irrationality I will prove that: 1) Emotion is in fact not passive and 2) Intelligence can be created materially. Before going into detail on irrationalism I wish to explore the rationalistic perspective. The rationalist tends to believe in the existence of truths that could not be discovered through the senses alone,Read MoreManagement Information System Case Study1251 Words   |  6 PagesQuestion: 1. In the case study, we referred to the systems being developed and used as decision support systems. However, we also identified various artificial intelligence (AI) technologies. How can a decision support system incorporate and use AI technologies such as pattern recognition? Answer: ARTIFICIAL INTELLIGENCE (AI) tools and techniques can aid in the diagnosis of disease states and assessment of treatment outcomes, so AI can be used by a decision support system as pattern recognitionRead MoreManagement Information System Case Study1262 Words   |  6 PagesQuestion: 1. In the case study, we referred to the systems being developed and used as decision support systems. However, we also identified various artificial intelligence (AI) technologies. How can a decision support system incorporate and use AI technologies such as pattern recognition? Answer: ARTIFICIAL INTELLIGENCE (AI) tools and techniques can aid in the diagnosis of disease states and assessment of treatment outcomes, so AI can be used by a decision support system as pattern recognition toRead MoreThe Effects Of Artificial Intelligence On Medical Information On Patient s Privacy1463 Words   |  6 Pagesbeen trying to apply technology in medicine. This seems to have been successful if we consider intelligent computers, which have the ability to store huge amount of information and also assisting medical personnel in various tasks such as diagnosis [1]. Artificial intelligence in medicine has greatly revolutionized this discipline but this benefit is accompanied with certain setbacks. This paper will, therefore, reflect on the impact of using artificial intelligence to analyze medical information onRead MoreThe Is The Best For The Human Condition996 Words   |  4 PagesFor years, scientists and transhumanists have conceptualized and cultivated ways and processes whic h they believe are beneficial to human life. Transhumanists want the best for the human condition by improvements of medical technology, economics, medicine, culture, and mental capacities. There are copious amounts of prototypes and ideas that are currently pushing the movement forward and giving hope to those involved. Though naysayers hold the opinion that transhumanism will separate humans into twoRead MoreAssessment Of The Database Architecture And Design Of Various Clinical Information Systems1680 Words   |  7 Pages1 INTRODUCTION The aim of this report is to present information about assessment of the database architecture and design of various clinical information systems like administrative system, clinical decision making system, electronic health record and computer based health record system, nursing system, ancillary service system, patient numbering systems at master and enterprise level. The assessment will be based on the health and hospital system that includes around 1800 bed hospital and 30 communityRead MoreThe Future of Computer Science Essay946 Words   |  4 Pagesinternational qualifications, enabling people to work globally, and in a very broad variety of roles. There is steady growth in demand for technically adept and flexible IT graduates. Declining student enrollment, while growth continues in law, medicine, biology, economics, and business; the decline among women is particularly alarming (Klawe and Shneiderman 27). Computer science is now a part of everyone’s daily life through the innovations and technologies it enables. From transforming health

Wednesday, May 6, 2020

Computers Are Replacing More and More Jobs Free Essays

Living today in the most advanced age of technologies, humans have benefited from computers. We cannot deny the fact that computers play a crucial role in the various aspects of our lives. We get a lot of help from computers and believe that computers could make people’s lives and jobs easier. We will write a custom essay sample on Computers Are Replacing More and More Jobs or any similar topic only for you Order Now But on the other hand, we forget the other fact that computers would eliminate jobs too. For example, Manufacture of all kinds of office products the computer easily does, like typewriter, adding machine, photocopier or even CD player, DVD player, and radio. In publishing, a lot of jobs are gone, many in layout and production, since computers do layout and design faster and more accurately. Even in hotel and travel industry, there have been significant losses in administration in hotels because of significant advances in the way people book and check in. Nowadays, most bookings for hotels are made through websites instead of phoning up and having your name written in a book. Additionally, management and running of a hotel can now be done all by one person. One person can have a computer with powerful hotel management software on it which can control all functions of a hotel and allocate when and where people will arrive. Moreover, as computers take over people’s jobs, social and economical problems increase. Lack of human interactions can cause social problems. People can do banking and shopping without contacting people. It will bring less bondage between people and less respect for human beings. Furthermore, there are economical problems. Even though low payment job positions disappear quickly, high payment job positions, such as high technology based job positions, are increased. The gap between these two groups will become wider. The economical unbalance can cause a lot of economical problems as well as social problems. How to cite Computers Are Replacing More and More Jobs, Papers

Sunday, May 3, 2020

Weka A Machine Learning Workbench

Questions: Task 1 In WEKA load the data setDIABETES.arff. Perform rule classification using the following methods JRip Ridor For each method produce a summary of the rules produced and comment on the accuracy of the method. Task2 In WEKA load the data set supermarket.arff. Perform association rule learning using the following methods Apriori FPGrowth For each method produce a summary of the rules produced and comment on the accuracy of the method. Task3 In WEKA load the data set breat-cancer.arff. PerformBayesian classification using the following methods AODE BayesNet For each method produce a summaryof the classificationproduced and comment on the accuracy of the method. Answers: Task 1 Diabetes.arff contains points of interest of Pima Indians Diabetes Database gathered by National Institute of Diabetes and Digestive and Kidney Diseases All patients here are females of no less than 21 years of age of Pima Indian legacy. The quantities of Instances are 768 with 9 qualities Number of times pregnant Plasma glucose focus a 2 hours in an oral glucose resilience test Diastolic circulatory strain (mm Hg) Triceps skin fold thickness (mm) 2-Hour serum insulin (mu U/ml) Body mass record (weight in kg/(stature in m)^2) Diabetes family work Age (years) Class variable (0 or 1) Class qualities are 1 then it is tried positive for diabetes and 0 for negative. This is a two-class issue with class esteem 1 being deciphered as "tried positive for diabetes". There are 500examples of class 1 and 268 of class 2. Weka classifier tenets uses a propositional principle learner, which is Repeated Incremental Pruning to Produce Error Reduction (RIPPER), which was proposed by William W. Cohen as a streamlined rendition of IREP. It is situated in affiliation rules with lessened blunder pruning (REP), an exceptionally regular and compelling strategy found in choice tree calculations. In REP for principles calculations, the preparation information is part into a developing set and a pruning set. Initially, an introductory tenet set is framed that over its the developing set, utilizing some heuristic system. This overlarge standard set is then more than once streamlined by applying one of a set of pruning administrators run of the mill pruning administrators would be to erase any single condition or any single principle. At each one phase of improvement, the pruning administrator picked is the particular case that yields the best lessening of slip on the pruning set. Rearrangements closes when applying any pruning administrator would expand lapse on the pruning set. Rehashed Incremental Pruning to Produce Error Reduction (RIPPER) is one of the fundamental and most mainstream calculations. Classes are analyzed in expanding size and a starting set of tenets for the class is created utilizing incremental decreased lapse pruning. In this study, we assessed RIPPER through JRip, a usage of RIPPER in WEKA with the parameters: folds = 10; minNo = 2; enhancements = 2; seed = 1; usePruning = genuine. JRip is moderate classifier with 96.5% exactness. Ridor: It produces a default administer first and after that the exemptions for the default standard with the slightest (weighted) slip rate. At that point it creates the "best" exemptions for every exemption and emphasizes until unadulterated. In this way it performs a tree-like extension of exceptions.The special cases are a situated of tenets that anticipate classes other than the default. IREP is utilized to produce the special cases. Swell down Rules produce models which are simpler to keep up and overhaul than different choices Task 2 à ¢Ã¢â€š ¬Ã¢â‚¬ ¹Apriori Association rule: Apriori is a count for customary thing set mining and association principle adjusting over worth based databases. It pushes forward by recognizing the perpetual individual things in the database and extending them to greater and greater thing sets the length of those thing sets show up sufficiently oftentimes in the database. The unremitting thing sets directed by Apriori can be used to center association rules which highlight general examples in the database. Supermarket.arff this information set portrays the shopping propensities for market clients. A large portion of the qualities stand for one specific thing gathering. The quality is't' if the client had purchased a thing out of a thing range and missing generally. There is one example every client. The information set contains no class quality, as this is not needed for learning affiliation rules. Load the information set "supermarket.arff" and change into the Associate Panel. Select "Apriori" as associator. In the wake of pressing begin Apriori begins to fabricate its model and composes its yield into the yield field. The main piece of the yield ('Run data') depicts the choice that have been set and the information set utilized. Affiliation principles are fundamentally planned to backing exploratory information examination. Use Apriori to create standards and utilization them to say something in regards to the shopping propensities for grocery store clients. The information contains 4,627 occurrences and 217 qualities. The information is denormalized. Each one trait is double and either has a quality ("t" for genuine) or no worth ("?" for missing). There is an ostensible class quality called "aggregate" that shows whether the exchange was short of what $100 (low) or more noteworthy than $100 (high). Output To Apriori The output for Apriori association rule for super market is The rules discovered where: biscuits=t frozen foods=t fruit=t total=high 788 == bread and cake=t 723 conf:(0.92) baking needs=t biscuits=t fruit=t total=high 760 == bread and cake=t 696 conf:(0.92) baking needs=t frozen foods=t fruit=t total=high 770 == bread and cake=t 705 conf:(0.92) biscuits=t fruit=t vegetables=t total=high 815 == bread and cake=t 746 conf:(0.92) party snack foods=t fruit=t total=high 854 == bread and cake=t 779 conf:(0.91) biscuits=t frozen foods=t vegetables=t total=high 797 == bread and cake=t 725 conf:(0.91) baking needs=t biscuits=t vegetables=t total=high 772 == bread and cake=t 701 conf:(0.91) biscuits=t fruit=t total=high 954 == bread and cake=t 866 conf:(0.91) frozen foods=t fruit=t vegetables=t total=high 834 == bread and cake=t 757 conf:(0.91) frozen foods=t fruit=t total=high 969 == bread and cake=t 877conf:(0.91) Standards are displayed in precursor = resulting arrangement. The number connected with the predecessor is irrefutably the scope in the dataset (for this situation a number out of a conceivable aggregate of 4,627). The number by the subsequent is indisputably the quantity of occurrences that match the forerunner and the resulting. The number in sections on the end is the backing for the tenet (number of precursor partitioned by the quantity of matching consequents). You can see that a cutoff of 91% was utilized as a part of selecting principles, specified in the "Associator yield" window and demonstrated in that no tenet has scope under 0.91. Few key perceptions: We can see that all introduced standards have a resulting of "bread and cake". All introduced standards demonstrate a high aggregate exchange sum. "rolls" a "solidified nourishments" show up in a number of the introduce. FP Growth In essential words, this figuring goes about as takes after: first it packs the information database making a FP-tree event to address progressive things. After the first step, it disengages the layered database into a set of prohibitive databases, everybody associated with one constant sample. Finally, every such database is mined autonomously. Using this system, the FP-Growth reduces the journey costs scanning. Apriori, visits each trade when creating an alternate candidate sets; FP-Growth does not can use data s things; Apriori makes contender sets FP-Growth uses more confounded data structures mining Method Task 3 Breast cancer data set Breast disease information set has 699 cases with 10 characteristics. The class conveyance is encircled as Benign and dangerous. There are 1 ward variable and 9 free variables. The qualities for the free variables ranges from 1 - 10 and for class variable 2 for Benign and 4 for dangerous tumor. The base conceivable outcomes for an individual to get breast tumor are 1 and the most extreme potential outcomes are spoken to by the quality 10. Aode Arrived at the midpoint of one-reliance estimators (AODE) are a probabilistic order learning procedure. It was created to address the quality autonomy issue of the mainstream guileless Bayes classifier. It oftentimes creates considerably more exact classifiers than guileless Bayes at the expense of an unassuming increment in the measure of calculation. Bayes Net Results for: Naive Bayes === Run information === Scheme: weka.classifiers.bayes.NaiveBayes Relation: breast Instances: 683 Attributes: 10 Test mode: 10-fold cross-validation Time taken to build model: 0.08 seconds === Summary === Correctly Classified Instances 659 96.4861 % Incorrectly Classified Instances 24 3.5139 % Kappa statistic 0.9238 KB Relative Info Score 62650.9331 % KB Information Score 585.4063 bits 0.8571 bits/instance Class complexity | order 0 637.9242 bits 0.934 bits/instance Class complexity | scheme 1877.4218 bits 2.7488 bits/instance Complexity improvement (Sf) -1239.4976 bits -1.8148 bits/instance Mean absolute error 0.0362 Root mean squared error 0.1869 Relative absolute error 7.9508 % Root relative squared error 39.192 % Total Number of Instances 683 Kappa measurement is utilized to survey the exactness of any specific measuring cases, it is normal to recognize the unwavering quality of the information gathered and their legitimacy. The normal Kappa score from the Bayes Net calculation is around 0.6-0.7. References: Ian H. Witten; Eibe Frank; Mark A. Hall (2011). "Data Mining: Practical machine learning tools and techniques, 3rd Edition" . Morgan Kaufmann, San Francisco. Retrieved 2011-01-19.Holmes; A. Donkin and I.H. Witten (1994)."Weka: A machine learning workbench" . Proc Second Australia and New Zealand Conference on Intelligent Information Systems, Brisbane, Australia. Retrieved 2007-06-25. R. Garner; S.J. Cunningham, G. Holmes, C.G. Nevill-Manning, and I.H. Witten (1995)."Applying a machine learning workbench: Experience with agricultural databases" . Proc Machine Learning in Practice Workshop, Machine Learning Conference, Tahoe City, CA, USA. pp. 1421. Retrieved 2007-06-25. Reutemann; B. Pfahringer and E. Frank (2004)."Proper: A Toolbox for Learning from Relational Data with Propositional and Multi-Instance Learners" . 17th Australian Joint Conference on Artificial Intelligence (AI2004). Springer-Verlag. Retrieved 2007-06-25. "weka - How do I use the package manager?". Retrieved 20 Septem ber 2014. Ian H. Witten; Eibe Frank; Len Trigg; Mark Hall; Geoffrey Holmes; Sally Jo Cunningham (1999)."Weka: Practical Machine Learning Tools and Techniques with Java Implementations" . Proceedings of the ICONIP/ANZIIS/ANNES'99 Workshop on Emerging Knowledge Engineering and Connectionist-Based Information Systems. pp. 192196. Retrieved 2007-06-26.

Friday, March 27, 2020

Bound Morphemes Pg Essay Example

Bound Morphemes Pg Essay Notes from live broadcast 29/07/09 Mrs Masehela made a comment at the beginning of the session that because of a large amount of students receiving their study material late, she would focus only on what is relevant for the exam during this broadcast – I really hope this is the case. The chapters I refer to in these notes are from the prescribed book: Investigating English. Chapter One A system of signs for human communication †¢ there are different modes of linguistic communication- writing signs and oral. †¢ Language is a semiotic system. †¢ Semiotics: the study of signs and symbols and their meanings.Language is a system where the individual elements ‘signs’, take their overall meaning from HOW they are combined with other elements. Think of the English language spelling patterns and compare that with another language you know. Think of the road signs and their meanings or any other sign and its meaning. de Saussure theory of linguistic signs. pg 6 †¢ The signifier – the sequence of sounds (word), which makes up the sign e. g. w/a/t/e/r this is the symbol. †¢ The signified – the mental or physical reality of the sign e. g. water. The properties of language (unique) pg 9 Displacement – talk about things that are not in sight. †¢ Arbitrariness – no natural relationship between a word and it’s meaning. †¢ Discreetness – separate or distinct. Each sound functions as an individual. †¢ Duality – distinct sounds do not convey meaning but carry meaning when combined with other sounds. (ooo, eee, aaa by themselves no meaning). †¢ Productivity – speakers produce and interpret an infinite number of new signals, able to produce a sentence without memorising. †¢ Cultural transmission – language is passed on from one generation to the next (mother tongue).Chapter 4 Words and word formation (the structure of words) Morpheme – pg 63 â⠂¬ ¢ the smallest meaningful unit of a language. e. g. –ful, -er, un-, ive. Free morphemes – pg 65 †¢ independent words, simple can’t be broken down. car, sure, fine, chew, school, a, the, Two kinds – †¢ content/lexical morphemes Open group-new words can be added. They carry meaning – fine, chew. †¢ function/grammatical morphemes Closed group-new words hardly ever added. When attached, work together with content – but, if, this, and. Bound morphemes – pg 67 †¢ can not occur unattached. (not a word on its own) also called affixes. e. g. –ful, un-, -s, -er. †¢ the base or the stem is the morpheme to which prefixes and suffixes are attached. e. g. safe, drive, tangle. Inflectional morphemes- pg 68 †¢ do not change the grammatical status of a word. e. g school (noun), schools (noun), talk (verb), talked (verb) †¢ can change quantities, tenses, plurality. [pic] see page 69 as well. Derivational mor phemes – pg 69 †¢ these change the grammatical class of a word e. g. –ly slowly verb adjective adverb Chapter 7 Language and meanings. Nature of meaning. Language is a conduit/channel along which thoughts are transferred. †¢ Meaning can’t be separated from language. Lexemes. †¢ can have a variety of forms called variant forms. †¢ when change from one to another, meaning changes as well. [pic] Chapter 8 Language acquisition. Acquisition – what we are born with, learn as we grow up to about 13 years of age. Learning – what we are formally taught, from about 13 years. Different theories- †¢ Imitation – child imitates language they hear around them. †¢ Innateness – humans born with a capacity for a language development. Input motherese/caretaker speech, more time spent with. †¢ Cognitive – child develops a concept first, able to remember/make sense of words of language. Chapter 8 cont†¦ Lang uage acquisition – †¢ observe any child between the ages of 1m – 6y. †¢ study the section on stages of language acquisition pg 133-135 of textbook. this is my summary of this section – †¢ not possible to explain but is possible to observe, record and chart. †¢ proceed at own pace, reach different stages at different ages †¢ sequence of stages, generally the same Stage 1 |Stage 2 |Stage 3 |Stage 4 |Stage 5 |Stage 6 |Stage 7 | |Basic biological noises |Cooing |Babbling vocal |Melodic utterances |One word/ |Two word stage |Telegraphic stage | | | |play | |holophrastic | | | | | | | |stage | | | |First 8 weeks-mainly cries|2-3 months |5 -6months |1y – intonation |12-18months |2years – vocab of |2-3years | |to get |consonant followed |Sequences of sound |patterns and rhythms|Recognisable words –|about 50 words |String 3-4 words , | |attention/discomfort |by short vowel |longer then cooing |resembling speech – |rec ognisable objects|combine 2 |nouns- omit the | | | |– high to low |1st real signs | | |am,-ed –ing, | | | | |language development| | | | Chapter 9 English and education 1. What role should English play in your community/country? 2. What role is English playing in your community/country today? 3. The role and importance of the standard variety of English. 1. Unifying language, able to interact with business partners, economically possible to gain recognition and be understood. 2.Kind can come from/various – have varying linguistic backgrounds, multi/mono-lingual – some communities are flooded by people from other parts of the world; English has a role, as a unifier, business partner, feel accepted. Beyond border of country – what is the role there? 3. Is it really important to know standard variety of English or just â€Å"black† English, â€Å"Hispanic† English or must it be standard English. Please correct me here/add in or what ever – I seem to have missed the boat here; however I did write every thing she spoke about? I suspect we need to prepare this for a long question. Exam 2 hours. Ensure you write in paragraphs â€Å"give a critical.. † give own view on topic, -ve and +ve side substantiate. â€Å"discuss† write in paragraphs, your own view is not necessary here.

Friday, March 6, 2020

The Education of a WASP essays

The Education of a WASP essays The idea that racism is a thing of the past is a hard concept to document, from either side of the argument. Today in America there is more opportunity, and more freedom to move from one social class to another than there ever has been. However, just as there is a "glass ceiling" in some career paths that have been traditionally dominated by white males, there also exists evidence in our country that racism is still a problem, and must be addressed in positive, proactive terms in order to create true equality. How we measure and define equality, if there is such a thing, will be the most difficult aspect to developing a strategy to eliminate Written in the mid 1960's, the racial picture in the country was significantly different at that time. While 1963 brought court mandated end to the Separate - but - Equal treatment of black Americans, the attitudes and social prejudices which remained in tact created a significant glass ceiling, and glass walls, fences, and barriers which black Americans were not allowed to cross. In Lois Stalvey's book, she lived in narrow, white anglo saxon protestant neighborhoods for the first years of her marriage. Her life has been cut out of a magazine, which described the typical American family with a couple kids, a father who worked and a mom who enjoyed staying home. However, after becoming aware of some of the prejudices on their Omaha, Nebraska home town, they chose to become active about the racism they saw, and moved to resist its injustices. They developed and nurtured friendships with persons whose racial identity and culture differed from their own. Eventually, their behavior caused a demotion and transfer for Mr. Stalvey. When they resettled, they sought housing that allowed them to live in a neighborhood of varied races and cultures. They sent their children to a school where they were a minority race. Overall, the S...

Wednesday, February 19, 2020

U07a1 Project Personal Case Study Essay Example | Topics and Well Written Essays - 1250 words

U07a1 Project Personal Case Study - Essay Example I allot the one hour to use the club and play else I use the gym for an hour each day. In most cases they alternate each day. My main issue however is that I have a little difficulty in the beginning to speak to people and I take time to open up to others. Although I am a very sociable person my first meetings is generally quite different. People tend to believe that I am a quite person who prefers to keep to self and not involve in any activities. However this is clearly different once they get to know me better. Basing my case with the various studies that have been presented in the past, this paper will deal with understanding me based on two main theories, i.e. Loevinger’s Theory of Ego Development and Erikson’s Theory of Psychological Development. Before moving into these theories, I will discuss my role in the orphanages and an attempt will be made to analyse the anticipated development at the organisation (Carver & Scheir, 2000). As mentioned earlier, I love to spend time at the orphanages and to participate to the best extent to assist the children here. I try to spend at least 2 – 3 days during the evenings (around three to four hours each day) to be with the children and to help them out with their studies, or any other problem that they might have. I have a very strong attachment with these children as they have to go through so much in life at such early stages and need to get through the most crucial ages of life without the love and support of their parents. Hence I try my best to assist them in ways like studies, or simply being there for them to talk too and to assist them get through the various changes that they face without feeling the lack of families. I try my best to assist as much as I can however not in terms of monetary manners but in simple other gestures like being there and being a good friend (McCrae & Costa, 1997). a) Pre Social and Symbiotic Stage: This stage is mostly during the stage of infancy and this kind of ego is

Tuesday, February 4, 2020

Art in America - Abstract Expressionism Research Paper

Art in America - Abstract Expressionism - Research Paper Example The paper "Art in America - Abstract Expressionism" investigates the important style of American style, abstract expressionism. The movement was unregistered but strong. Some of its members included: Jackson Pollock (1912–1956), Willem de Kooning (1904–1997), Franz Kline (1910–1962), Lee Krasner (1908–1984), Robert Motherwell (1915–1991), William Baziotes (1912–1963), Mark Rothko (1903–1970), Barnett Newman (1905–1970), Adolph Gottlieb (1903–1974), Richard Pousette-Dart (1916–1992), Clyfford Still (1904–1980). All these members were committed to the audacious formal inventions in searching for significant substance. Their objective was to break away from normal subject matter and technical conventions. Their artistic works included head stoned scales works that were created to reflect their personal psyches. Doing this helped them to tap into worldwide inner sources. These artists attributed a lot of importa nce to spontaneity and improvisation as process accorded the highest significance. Their works resisted stylistic classifications, but emphasised on dynamism and energetic gesture rather than reflective and cerebral focus on color. Abstracts acted primarily as their imageries. Highly abstracted modern art was favored by the group even when depicting images founded on visual realities. Abstract expressionism is not a specific style within abstract art, but an American group or artists rebelled and formed an independent group which would give them a favorable environment.

Monday, January 27, 2020

Defining Ethical And Moral Standards Philosophy Essay

Defining Ethical And Moral Standards Philosophy Essay Morality is a conveniently flexible term to begin with, one which could be stretched and sculpted according to most anyones ulterior motives. This in turn renders moral standards almost completely irrelevant and they should be regarded with skepticism, especially when it comes to those in power; because what is moral behavior to one person is indignation to another person. I think we can define ethical and moral standards as guidelines for an ethical and moral behavior. And in its turn, ethical and moral behavior of a person (or a group) can be defined as a way of interaction with a society which is the least disturbing, or better, pleasing to the other members of a society. Societies function much more effectively, efficiently, and responsibly when politicians and elected officials are expected to follow the rule of law more so than the rather subjective definition of a higher moral standard. After all, how can so many people glamorize Che Guevara and his noble and moral legacy of fighting for social justice, but turn a blind eye to his ordering the execution by firing squad of hundreds of people, including innocent student protestors, without the due process of law in a single month at La Cabaà ±a prison 50 years ago? And what else other than moral relativity could explain why so many of his T-shirt wearing acolytes claim to be morally outraged by former President George W. Bushs similar crime of the suspension of habeas corpus for Guantanamo Bay prisoners, of which none were executed? Which is why the rhetoric and pseudo-philosophizing of morality is still popular in communist nations such as Cuba whose totalitarian regime continues to push the false and deluded hope that communism will one day triumph again for those with the moral courage to endure needless sacrifice. This morality above reality mindset and rationale is explicitly illustrated in archived film footage where Fidel Castro was asked if he wore a bulletproof vest considering the various attempts on his life. He joked by opening his shirt, proudly displaying his bare chest and belly, bellowing a laugh and responded No, I wear a moral vest. Sure he did. As possibly did other murderous tyrants such as Ho Chi Min, Pol Pot, and Idi Amin to name a few. If their higher moral standards are what people expect to be ruled and led by, we may as well rebuild our collapsing economy by constructing our own concentration camps replete with gas chambers and ovens, and printing our monthly food supply ration booklets, like the ones Cubans carry with them to this day. One would figure they would simply register these via internet nowadays, only they are still not allowed by law to have internet access in their homes. On one hand, we should admit that high ethical and moral standards are probably one of aspects to judge an effective leader. Track back to the history, we can find many famous leaders with high ethical and moral standards. For example, Winston Churchill and Abraham Lincoln they were well known not only because of their marvelous contribution to their nations but also for the good reputation they built. It is the highly ethical manners lead them to serve the people they led in the correction direction. On the contrary, Adolph Hitler, who maybe can also called an effective leader of Germany in World War 2. He conquered half of the Europe and decimated thousands of Jaws with Nazi army, caused great damage to Jaws and the world due to his prejudice and lack of ethical standards. On one hand, we should admit that high ethical and moral standards are probably one of aspects to judge an effective leader. Track back to the history, we can find many famous leaders with high ethical and moral standards. For example, Winston Churchill and Abraham Lincoln they were well known not only because of their marvelous contribution to their nations but also for the good reputation they built. It is the highly ethical manners lead them to serve the people they led in the correction direction. On the contrary, Adolph Hitler, who maybe can also called an effective leader of Germany in World War 2. He conquered half of the Europe and decimated thousands of Jaws with Nazi army, caused great damage to Jaws and the world due to his prejudice and lack of ethical standards. Finally, the effective leaders are also human beings. No human beings could be perfect, everyone makes mistakes from time to time, as a famous saying goes to err is human, and so does the leader. But a few flows such as some personal affairs would not efface the splendid achievements they make as an effective leader. Bill Clinton, the former president of America is the best evidence. Despite the sex scandal and his perjury in court, which nearly resulted in his impeachment, there is no doubt that he is an effective leader in the eyes of American people. He has fight back the economic recession in the U.S. and promoted peaceful progress in Israel-Palestinian relationship. All of these great achievement to U.S. even the world persuasively prove him as an effective leader. Everyone has his/her own pettiness; the leader is not exception either. Hence as long as it is within his/her people tolerance, some flaws on ethic cannot prevent him/her to be an effective leader. It is precisely because of the infinite number of quandaries that a higher moral standard poses that makes such a prerequisite obsolete for elected officials in comparison to their obeying the rule of law. And chances are, if they respect and obey the rule of law to begin with, theyre bound to have higher moral standards that are genuine and socially reciprocal. Most of us, who obey laws, dont just do so because were afraid of being caught if we dont. We do so because they make sense to our survival. Considering how poor a job morality alone has done to ensure our survival, let alone our rights, we need to look further beyond mere moral standards as criteria in electing our leaders. No matter how high a moral standard politicians profess to set for themselves, and much less the rest of us whom they ultimately work for. Finally, the effective leaders are also human beings. None of human beings could be perfect, anyone makes mistakes some times, as a famous saying goes to err is human, and so does the leader. But a few flows such as some personal affairs would not efface the splendid achievements they make as an effective leader. Bill Clinton, the former president of America is the best evidence. Despite the sex scandal and his perjury in court, which nearly resulted in his impeachment, there is no doubt that he is an effective leader in the eyes of American people. He has fight back the economic recession in the U.S. and promoted peaceful progress in Israel-Palestinian relationship. All of these great achievement to U.S. even the world persuasively prove him as an effective leader. Everyone has his/her own pettiness; the leader is not exception either. Hence as long as within his/her people tolerance, some flaws on ethic cannot prevent him/her to be an effective leader. In conclusion, as long as supported by the people he/she serves, the public official does not have to maintain the highest ethical and moral standards, but to do so will make them more admirable. * To be an effective leader, a public official must maintain the highest ethical and moral standards. Finalizing everything Ive said I have to disagree with the original statement. It appears to be not necessary for a public official to maintain highest ethical and moral standards if he wants to be an effective leader. He just have to be able to sufficiently deliver power of organization he represents to the people he suppose to lead.

Sunday, January 19, 2020

Home Security System

ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. For that reason, an effective house security system at low cost is built where user can also program the security system by their own.This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where it’ s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure.Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. Read this  Chapter 2 – Why Security is NeededAs the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system. CHAPTER 1 INTRODUCTION 1. 1 Background Motion detection is the action of sensing physical movement in a given area. Motion can be detected by measuring change in speed or vector of an object in the field of view. This can be achieved either by mechanical devices that physically interact with the field or by electronic devices that quantifies and measures changes in the given environment.There are two device of motion detection which is the mechanical device, and the other one is electronic device. In the mechanical device, a tripwire is a simple form of motion detection. If a moving objects steps into the tripwire's field of view then a simple sound device like bells may alert the user. Mechanical motion detection devices can be simple to implement, but at the same time , it can be defeated easily by interrupting the devices' mechanics like â€Å"cutting the wire†. While in electronic device, the electronic motion sensing such as motion detectors, can prevent such mechanical intervention.The principal methods by which motion can be electronically identified are optical detection and acoustical detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as motion detectors, have sensors that detect movement and send a signal to a sound device that produces an alarm or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network.The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving object which triggers a camera to record subsequent events. The motion det ector is thus a basic idea of electronic security systems. 1. 2 Project objective The objective of this project is to build a house security system using microcontroller Intel 8051 based on active infrared motion detection. 1. 3 Project scope This project concentrates on a development of an active infrared motion detector for house security system.To develop the whole project, it consists of three methods which are the concept of security system, the electrical structure, and the software programming. The concept of security system is on the detection of movement using active sensor to trigger alarm controlled by the microcontroller Intel 8051. The electrical structure consist of two systems which are the active infrared circuit that used to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction sets.It contains a program design ed for a security system as an interaction to operate the electrical structure. 1. 4 Literature review Motion detectors are mainly used in security systems [4]. It is typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations [4]. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal.It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms, and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person enters a monitored area [4].The infrared sensors have basically two forms: active and passive. [4] An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. [4] These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor.This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. [4] Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change of temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. 4] Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms [4]. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector.It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application [4]. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received sig nal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm.Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects.While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use t wo infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor.Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems involved for the development of the active infrared motion detector for house security system.The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project.All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification required on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system.The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit will be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems will built a project called an active infrared motion detector for house security system. 2. 2 Active infrared (IR)Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 µ meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area.In active infrared systems, there are two-piece elements which are consisting of an infrared transmitter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted.It then sends a signal to the controller sys tem, which is wired into the door controls. One variation of this operating mode is called ‘background suppression’. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus causing a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion.An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell.A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly related to burglar or safety alarm system.Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to el icit response. In a new construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission; handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar.Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professional installation.All mode rn alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesn’t get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machine.Its memory is organized in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available: register implicit, direct, indirect or immediate. Operands reside in one of the five memory spaces of the 8051. The five memory spaces of the 8051 are the Program Memo ry, External Data Memory, Internal Data Memory, Special Function Registers and Bit Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings.It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The maximum size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the currently selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes.The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resi des up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space.The Special Function Register space contains all the on-chip peripheral input and output registers as well as particular registers that need program access. The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags.There are specific instructions in the 8051 th at operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 IntroductionThere are several steps to be applied in designing an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware develop ment is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed.This process is just only being proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security systemFigure 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing co ntains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security systemA person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An interruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ‘on’ or ‘off’ the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block diagram for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypa d, and magnetic sensor.The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitterFor the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pul ses at any frequency required. This means that the 555 timer can operate repeatedly; it will switch ‘on’ and ‘off’ continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ‘1’ or low ‘0’ from the output terminal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system ope ration. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller system. Figure 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder.While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load.The octal buffer is used to isolate one device from another by eliminating loading effects. It provides a ‘buffer’ between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 – expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 – expended mode.In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on controlling devices and instruments due to its flexibility, existence of multiple producers. It consists of a simple architecture introduced by Intel in the year of 80’s.It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There ar e various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler.The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose.A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. Thi s binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as ‘1985’ to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition.To deactivate the system where opening door without alarm, user must enter the deactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was correct, green LED will ‘on’ while alarm will ‘off’ condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will ‘on’ where the system is in a warning mode.The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate; the green LED will ‘on’ and the alarm will ‘off’ condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will ‘on’. User must enter the correct deactivation code to turn ‘off’ the alarm system.The activation and deactivate code for this system are ‘1985’ and the ‘enter’ button codes are ‘A’ for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security syste m, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 IntroductionThis chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter circuit and the infrared detector component. 4. 2. 1 The emitter The emitter which also known as infrared transmitter circuit was build as shown in Figure 4. . A probe or the oscilloscope is attached to the infrared LED while the adjustable resistor is varied to calibrate the emitter to transmit 38 kHz square wave. The Figure 4. 1 shows the final configuration of the emitter circuit: Figure 4. 1 The emitter circuit Figure 4. 2 shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit is 38. 67 kHz square wave. At this generated frequency, the voltage maximum produced is 1. 60V and the peak to peak voltage is 1. 16V. Figure 4. 2 The 38 kHz frequency generated by the emitter circuit