.

Monday, September 30, 2019

Paranormal Activity

Paranormal Activity: An Evaluation Movies are images of a certain character’s life; it depicts the character’s environment, the weather, and all the necessary ingredients that make up the movie that is being watched. There are many types of movies: comedy, drama, documentary, and sci-fi; but there is one type of genre of movie, that most people have the pleasure of watching. The scary movies; they are the best kind, they scare, yet the audience cannot turn away. Watching the movie Paranormal Activity, it really scared me.But the things that had grasped my attention were the actors, plot, scenes, sound, and cinematography. The actors were extremely well in portraying the part of a stricken girlfriend with a demon in her home with her caring boyfriend. They were very nice in screaming in all of the parts that were needed to be screamed at. But not only did it cause her, but also will cause the viewers to scream in terror and fear. Micah is this manly sort of man who feels that he can take care of the demon and his girlfriend.Katie becomes extremely annoyed by the antics of Micah and tries to find help in other ways. Another reason why I enjoyed the actors was because they made everything seem so real. They made the sleeping, the arguments, and the existence of demons real. You also see the change inMicah, he goes from unafraid, and not disturbed by her past, to a complete 360. He becomes fearful, and gets mad and try to take out the demon. All the scary movies start out the same way, everything is always normal, and something drastic happens, which makes the main character afraid of her surroundings.But in the movie, Paranormal Activity, it was always with her. It never seems to leave her alone. She was haunted by the ghost. In the end of the scary movie, nothing good ever comes out of it, something that is dramatic always plays out, in order to scare the viewers out. It is always assumed that the plot is bound to have a good twist because it is a f rightening movie, while waiting for the twist in the movie; it ended, and realized that there was no twist. It is the same old boring type of scary movie as previously seen before.It is a pretty straightforward movie, with no twist and no excitement, just a lot of scary faces. When the scene of a haunting movie takes place there is always that one scary building that has people talking about it, creating rumors, and scaring people. The only difference is that instead of a scary building it is a nice two bedroom apartment. Instead of the community creating rumors about the house, it is the girlfriend. The scenes of the movie could be established by the days of nights that they had stayed in the place.It was fairly nice as to the scenes could be distinguished from each other. It caused the viewer to establish a certain timeframe as to when and where the haunting is taking place. The scene is also great because in the woods or a big house all to youself, everyone knows what is bound to happen. The audience realizes the danger of the woods, or the mansion Yet this house is similar to your own house or one you have lived in for a while. No one really suspect any scary things to be happening in a place where you are surrounded by people in every direction.I also love the scenes because in the beginning there is no opening credit or the title of the movie, it seems like two normal happy couples with a small problem. It makes the movie really believable and scares you from even standing up in a dark room. One scene that made me think was when Micah was mad at his girlfriend for not telling him that she had a demon that came to her from time to time. It shows his concern for his safety, and his anger at her omitting some information from him.The sound in every scary movie is always the same, and so, it is true with this one as well. First the sound begins, getting you ready to be spooked, yet you let all the anticipation get hyped up, only for a door swinging back and forth. They keep on using the same sounds over and over again conditioning you, to get all scared for no particular reason. It was very well played in the sense that it had a warning bell in order for your attention. But the sound really does create a sense of urgency in you to close your eyes, run away or even take the disc out.The reoccurring sound shows that it is meant to be scary as with the night time style camera. Since the sound was played in almost every scene, it adds more horror to the film. But just when you get tired and bored of hearing the same noises over and over again each and every couple of night, you get taken aback. Shock takes over instead boredom and surprise instead tiredness. You start to rise back up into your seat, and get sucked in by what is happening, all because of the sound. The cinematography reeled me in from the start.The movie is not some guy who is a professional at handling cameras; it is the same guy that is the main character. It is done extr emely well also because it is not bumpy, nor shaky; it is held by a really steady hand. In the start you see the character and their change between Micah and Katie. They make it seem like a normal day with their normal life and nothing out of the ordinary. It is shown as a life just like you and me but at night is where the real fun begins. He puts the camera on a tripod and the night vision is turned on so we can see all that is going on.There was really good visuals on the nights, and the days, and also on the mundane activities that were going on like her making jewelry, or her talking to her friend. It sparked your interest because you wanted to know when the scary part was going to take place. Any scary movie can be scary if you throw in a demon or a ghost in the mix, but if you include all of the right mixture then you may truly scare any individuals. It may either be by the plot, scenes, actors, or even the cinematography. Overall, while the movie was a bit of a cheap thrille r, it made you flinch and your heat lurch and everyone needs a good thrill now and again.

Sunday, September 29, 2019

A Summary of Robert Harris’ Pompeii Essay

The novel â€Å"Pompeii† is basically about one of the most famous natural calamities in known history, the explosion of Mount Vesuvius. Robert Harris should be commended for the immense research that he had infused in the text, both on history and engineering. Readers are treated to a blast to the past particularly during the time of the Romans. The timeline of the narrative is set a few days before the infamous eruption of Mount Vesuvius, an explosion said to be more powerful than the atomic bombs of Hiroshima, an explosion that lasted for a whole day and a whole night. The book is rich in vivid description of the setting, tension between characters, and subtle twist and turns. These elements amalgamate to produce an effect of heavy build-up which would make the novel as explosive as an angry volcano, and yet at the same time undeniably stunning. Throughout the text, enriching history and impressive engineering details are interwoven. This aspect of the novel was particularly interesting because readers would realize and appreciate the importance of aqueducts. The novel shared that it was the ingenious water supply that enabled the Romans to prosper amidst the hot climate. The novel was also written in a modern tone that made it easy to follow. And just like the effect of â€Å"Titanic†, the readers of â€Å"Pompeii† already knew that the volcano is about to explode, but the characters do not. This aspect of the novel is one effective technique to keep the readers turning the pages. Characters Attilius – is the hero of the story. A young engineer from a family of aqueduct engineers. An intelligent person who actions are always guided by reason. He still mourns the death of his wife. Pliny the elder- leader of the fleet who helped Atillius to get to Pompeii. The character in the novel is actually a real figure in history. Revered as a person of knowledge and leadership. Corelia – the young daughter of Ampliatus. The object of affection Attilius. Reminded him of his deceased wife. Exomnius – The aquarius who mysterious vanished without notice. Later in the plot, it would be revealed that Exomnius was a corrupt aquarius in connivance with the more corrupt Ampliatus. Ampliatus – The main antagonist of the story. A former slave turned rich through claiming the properties of his dead master. A greedy and self-righteous businessman. Could only be described as selfish and detestable. Corax – Subordinate of Attilius whose job is overseer. Looks down on Ampliatus probably because of he is older. Brebix – A strong hardworking man who respects Attilius’ position Massavo – a porter with a large head. He posses a cheery attitude. Plot The protagonist of the story is Marcus Attilius Primus. He was assigned to be the aquarius of major aqueduct, the Agua Agusta, which was sixty mile aqueduct. This was an important task because the Agua Agusta is the source of water to all the cities in the Bay of Naples. Even though the task at hand is tremendous, Attilius was determined to do the job. It seems that aqueduct engineering is running through the veins of Attilius. He came from a family of aqueduct engineers. He is a quite a young engineer, even his physical appearance does not lie about his young age. He is viewed by his subordinates as too young to be an aquarius at his age of 27. The term â€Å"aquarius† pertains to the title given to the main engineer of the aqueduct, the one who responsible for the aqueduct. An aquarius could translate to hydraulics engineer. His youth made it difficult for him to gain the respect that he deserve from his work gang. With Attilius in command, his subordinates acted and did their job underperforming, as if it was against their will. One of his subordinates heckled â€Å"boys should stick to their books† (Harris 3). But of all his subordinates, it was Corax, the overseer, who had given him a difficult time. The plot would gain momentum when Attilius received a new assignment. A stack of mystery would build up in the plot. From this point on, the novel would have a detective-story-like taste to it. Attilius reasoning and his talent in problem solving is put to the test. Then comes a mystery that would make Attilius wonder. The previous aquarius of the aqueduct (named Exominus) had mysteriously disappeared. In addition, the area, which the aqueduct is suppose to supply water, is experiencing drought. And as additional concern, fishes die because of the water. Attilius investigates the mystery of why the fishes had been dying. He soon discovers that there was sulfur on the water and the substance was killing the fishes. During this point of the text, Numerius Popidius Ampliatus, the main antagonist, enters the scene. He was a former slave who was liberated when his master died in an earthquake. Ampliatus accumulated his riches by claiming the properties of his deceased master. He seemed to got away with his mischief because no relative came to claim the properties. Actually, it was Ampliatus who was the owner of the fishery where the fishes were killed due to the sulfur contamination. He blamed the slave responsible for the fishery. It should be noted that the fishes that were killed were of the expensive kind. And in a truly villanous act, he fed his own slave to eels. He even seemed to enjoy the sight of the slave being devoured by the eels. As he himself were not born as a slave. Then Corelia tried to save the poor slave. Corelia was a charming, young, and kind woman. The irony in her character is that she is the daughter of the detestable Ampliatus. When Attilius saw Corelia, the woman immediately reminded him of his deceased wife. And from there on, their romance would bloom gradually. Readers would soon witness what Ampliatus is really planning. The villain wants to be the provider of water to Pompeii. In his evil plan, he was in connivance with Exomnius, the aquarius who disappeared. Exomnius was actually corrupt and was stealing from the imperial treasury. Amidst all of these mysteries, the receding flow of water to the Bay of Naples had entirely stopped flowing from the aqueduct. And because he was the aquarius, Attlius had to find a the source of the problem. He concluded that there must have been a blocked section of the aqueduct. Attilius would receive some help from Pliny the Elder. Pliny the Elder was the commander of the fleet that was docked in Misenum. From then on, Attilius organized an expedition to go to Pompeii with the mission of clearing of the blocked section of the aqueduct. During this part of the narrative, Pliny the Elder’s characteristics seemed to mirror that of Attilius. The former was a man of knowledge and of good leadership. The same goes for the latter, but he seemed a little bit unrefined probably because of his young age. The line â€Å"Pliny never had difficulty in issuing for it was the essence of his command† is in contrast to how Attilius was treated by his subordinates during the initial portion of the novel (173). Attilius and Pliny the Elder discovered that there were thousands of Roman coins (or sesterces) at the bottom of the aqueduct. They also realized that Exomnius was plotting to retrieve the coins for himself. Then the complications stated earlier in the novel had started to resolve themselves. Corelia brings Attilius documents that would put a stop to his father’s wrong doings. Then the highlight of the novel would be of course the eruption of Vesuvius. Pompeii and neighboring was completely ravaged. Ampliatus died because he did not want to leave his property. He was truly a greedy man until the very end. Pliny the Elder also died while helping other people to safety. Attilius went back to save Coreliia not mind the risk. The two somehow managed to locate each other. And even though they had tried, escape was seemingly impossible. Fortunately, Attilius knows the underground passageways below the aqueduct. Water was already filling in, they decided to dig even though they know they could be either drowned or buried alive. The book concluded with Attilius and Coreila managing to dig their way through the aqueduct. It was not cleared as to whether the two had survived. However, the last sentence says that there was a man and a woman who came forth the ruined aqueduct after the explosion. Conclusion The complications that Attilius had to face became microscopic when it was compared to the eruption of Vesuvius. The story is derived from one of the most famous natural calamities in history. Fortunately, the novel was far from being a disaster but rather a stunning showcase of how could nature silence us in our petty concerns. Work Cited Harris, Robert. Pompeii. NY: Random House. 2003

Saturday, September 28, 2019

A Telephone Based Wireless Remote Controller

Data processing stages of the transmitter and receiver modules have been implemented using digital components, thereby avoiding possible use of conventional devices like monostable multivibrators. Due to the fully digital nature, the proposed design is less complex and hence the implementation is cost effective. I. INTRODUCTION With the advancement in science and technology, human beings have developed a tendency to make their everyday life amply luxurious with the aid of technology. This has led to the development of many sophisticated gadgets and equipments that assist them partially/fully in their daily activities. Operating all such electronic/electrical instruments in a modern house might be difficult for the elderly as well as disabled people. Our primary motivation to build a simple and low cost system which remotely operates all the home appliances stems from this point. We integrate our system with a standard telephone set so that the telephone can be used for the dual purpose of telephony and remote controller for various home appliances. The proposed system mainly consists of 3 modules, viz. , telephone interface circuit, transmitter and receiver. The transmitter module is in turn made up of a digital data processing block and a wireless (infrared) transmitter block and the eceiver module is made up of a wireless (infrared) receiver block, digital data processing block and a decoding block. In the scheme, a telephone receiver acts as a remote terminal to provide input Dual-Tone Multi-Frequency (DTMF) signals to the telephone interface circuit which converts them to corresponding 4 bit Binary Coded Decimal (BCD) codes. The transmitter generates an 8 bit frame using this BCD code to facilitate asynchronous communication . The receiver decodes the received signals after checking for any transmission errors (single bit) in the frame. These decoded bits act as control signals for the operation of home appliances. The system employs an asynchronous type of communication [1] in which the transmitter and receiver clocks are independent. The receiver clock does not have any prior information regarding the phase of the transmitter clock [2]. This leads to the problem of choosing the correct sampling instants at the receiver [3]. Hence the data is transmitted in the form of frames instead of individual bits. Each such frame consists of start bits, information bits, and stop bits [1]. This is explained in detail in the subsequent sections. When the system is idle, the data processing block of he transmitter gives constant logical high output. Since the transmitter consumes more power in transmitting logical high than logical low, the output of data processing block is negated before transmission to save power in the idle state. The receiver module also senses this and remains idle whenever the transmitter is transmitting continuous logical low. The reception of a start bit changes the state of the r eceiver from an idle to an active state. It then has to sample the remaining data bits in the frame at proper sampling instants. Most of the standard hardware schemes involve the use of monostable ultivibrators at the receiver to recover the data bits following the start bit. The monostable multivibrators commonly rely on variable components such as resistance and capacitance values, as well as they often account for a major part of the propagation delays associated with the receiver. We have extended this treatment to a fully digital design that presents more challenging tasks including a digital output feedback. Moreover, use of all digital components in the data processing stages reduces the propagation delay considerably. The complete design outline of all the modules of the roposed system is presented in Section II. Results and discussions are given in Section III. Finally, we present our conclusions in Section IV. II. DESIGN OUTLINE The block diagram of the proposed telephone based wireless remote control system is shown in Fig. 1. In the proposed system, the telephone set performs the dual functions of telephony and remotely controlling various devices. The remote control mode of the telephone can be activated by pressing ‘#’ from the keypad of the telephone. After the desired tasks are accomplished, ‘#’ should be pressed again to deactivate the control system. This is one of the functions of the telephone interface circuit, which is discussed next. A. Telephone Interface Circuit The telephone interface circuit integrates the designed system with the standard telephone system. As shown in Fig. 2, it basically performs the job of receiving the signals from the local loop and converting them to the standard digital signals in the BCD format. When any telephone button is pressed, a unique DTMF signal is produced for a short duration [4] which is converted to corresponding BCD code by a standard DTMF to BCD converter (KT-3170) [5]. The dual tone frequencies and the BCD codes associated with each dialed digit are shown in Table 1. The system remains in the idle state until ‘#’ button is pressed which sets the telephone to remote control mode. This mode remains activated until ‘#’ button is pressed again. This is realized in the hardware by using the BCD code corresponding to ‘#’ as the clock to toggle the J-K flip-flop (74112). The flip-flop output toggles whenever the ‘#’ button is pressed and this is directly used to control the mode of operation of the telephone. The DSO output of KT-3170 [5] is used to generate a start it for the system as it is logical high whenever a received tone pair has been registered and the output latch is updated. As the latched 4-bit BCD code is directly available at the output of KT-3170, it is given as such to the data processing block of the transmitter. These data bits are then processed to facilitate asynchronous communicatio n as explained below. B. Transmitter The 4-bit output of KT-3170 can not be directly transmitted as individual bits as the proposed system employs asynchronous mode of communication. The 4-bit BCD code is thus transmitted as frames for proper reception [1]. We have chosen an eight bit frame for our system which consists of a start bit followed by four data bits, a parity bit and two stop bits. Parity bit enables the system to detect any single bit error during transmission. Stop bits mark the ending of the frame. The frame is then transmitted using infrared (IR) transmitter. As shown in Fig. 2, the transmitter mainly consists of two blocks which are explained below. 1) Fully Digital Data Processing Block: This block performs the function of converting individual bits to 8-bit frames in order to carry asynchronous communication. First bit of the frame is the start bit (taken as 0) which is generated when any of the buttons is pressed. The succeeding 4 bits are the data bits (BCD code) generated by the telephone interface circuit as explained before. Next bit is taken as parity check bit generated by XORing the first 5 bits of the frame. Last 2 bits, termed as stop bits, are taken as 1. Following the generation of the start bit, the data bits are loaded in the parallel to serial converter (74165) using a D-type flip-flop (7474) and the frame is transmitted serially. 2) IR Transmitter Block: This module transmits the frames enerated in the previous section using an IR emitting diode. The data to be transmitted is modulated using Amplitude Shift Keying (ASK) with a carrier square wave of 38 kHz. The transmission range of the system is thus highly improved over the case when data is transmitted without modulation. As the data processing stage gives logical high output in the idle state, it is negated before tran smission to save power. Thus, a logical low is actually transmitted whenever the system is in idle state. C. Receiver The receiver also has 2 working states, viz. , idle and active. It remains in the idle state until it detects a start bit. It then receives the frame starting from the start bit and checks for a single bit error. If error is detected, no action is taken and the information has to be transmitted again by the user. The received data bits are then decoded which act as control signals for the operation of various appliances. As is evident from Fig. 3, receiver circuit can be subdivided into 3 blocks which are explained below. 1) IR Receiver Block: This block receives the transmitted frames and converts the signal back to Transistor Transistor Logic (TTL) levels. A standard 38 kHz IR receiver (TSOP 1738) [6] is used for this purpose. 2) Sampling Clock Generator: The main function of this block is to generate a sampling instant at approximately the middle of the transmitted bit interval. The start bit activates this block and loads counter 1 (4-bit up-counter) with value ‘0’. The clock frequency of this counter is 16 times the bit rate. When the output of this counter changes from 7 to 8, the most significant bit changes from ‘0’ to ‘1’ and this rising edge is used as the sampling instant for the data. Start bit also loads the counter 2 (4-bit down-counter) with the frame size i. e. , 8. When this reaches the value ‘0’, the whole block is disabled and is reactivated only when next start bit arrives. 3) Data Sampler and Decoder: The serial input data is sampled according to the sampling instant generated in the previous stage and is converted to parallel form using serial to parallel converter (74164). This data is then checked for any 1-bit errors by XORing the bits. If error is found, no action is taken and the data has to be retransmitted. If no errors are found, the data is decoded using 4-16 decoder (74154) and he signal is given to the appliance for the completion of the corresponding task. III. RESULTS AND DISCUSSIONS The proposed system has been fully implemented and successfully tested in the standard telephone local loop. The transmitter, kept near the telephone set, taps the DTMF signal from the local loop and transmits the corresponding data frame wirelessly . This signal is received by the receiver installed at the switch board. It decodes the data and takes the corresponding action. At least ten control signals, corresponding to each digit from 0 to 9, can be generated using a standard telephone set. The transmitter was previously implemented without a modulator where the IR LED was kept ON for transmitting logical high and OFF for transmitting logical low. This limited the distance between the transmitter and receiver to a maximum of 30 cms for proper reception. The range of the wireless system has increased to several meters after modulating the data using 38 kHz square wave. This range also depends on the current flowing through the infrared diode which has to be properly tuned to maximize the range. A standard TSOP 1738 receiver is used in the proposed ystem, which requires a minimum burst length of 10 cycles for proper detection. This puts an upper limit on the data rate supported by our system which is practically observed to be 2. 8 kbps [5]. The IR transmitter is highly directional and requires the receiver to be in line of sight of the transmitter. The reception angle of the receiver is observed to decrease with increasing distance between the transmitter and receiver. T his is because of the fact that the power is not uniformly distributed and is concentrated in narrow transmission angle. Moreover, the signal power reduces when the distance between the transmitter and the receiver is increased. So, the receiver has to be highly aligned with transmitter when operating at some substantial distance from it. This problem is of not much concern for our system because the transmitter and receiver, being static in nature, can be properly aligned at the time of installation. The data processing blocks of both the transmitter and the receiver are fully digital in nature. This comprehensively reduces the propagation delays involved and increases the rate at which data can be processed in these blocks. Though, data rate is not very important in the present application but this feature makes the design of our data processing blocks suitable for high data rate applications which are commonly seen in wired communication. IV. CONCLUSIONS A wireless system has been proposed to operate the home appliances remotely using a standard telephone set. This has been successfully tested and is found to be working satisfactorily within a distance of 10 meters. The telephone receiver performs a dual-function of telephony and remotely controlling various devices with the help of its ‘#’ button on the keypad. The telephone interface circuit is easily integrated with the standard local loop thus avoiding any changes in the telephone set. Hence, the proposed system is compatible with any type of telephone working on standard local loop. The system employs asynchronous mode of communication which avoids the need to synchronize the transmitter and receiver clocks, thus making our system less complex and hence cost effective. The proposed fully digital innovative design of the data processing blocks reduces the propagation delay and makes them useful for even high data rate applications. Moreover, the system is capable of detecting the single bit errors occuring during transmission. The proposed system can be used in a wide range of practical applications such as speed control of motors, switching of appliances, control of robots, etc. The above discussed characteristics like simple design, high practical utility and easy installation makes our system highly marketable. REFERENCES [1] Gorry Fairhurst. Asynchronous Communication [Online]. Available: http://www. erg. abdn. ac. uk/users/gorry/course/phy-pages/async. html. [2] D. Comer, Computer Networks and Internets with Internet Applications. Upper Saddle River, NJ: Prentice-Hall, 2004. [3] A. Subramanian, V. P. S. Makh and A. Mitra, â€Å"A New Digital Transceiver Circuit for Asynchronous Communication†, Enformatika Trans. , vol. 8, pp. 237-241, Oct. 2005. [4] DTMF Background [Online]. Available: http:// www. ece. utexas. edu/mason/codesign/dtmf. html. [5] Samsung Electronics Datasheet. KT3170 Low Power DTMF Receiver [Online]. Available: http://www. ortodoxism. ro/datasheets/SamsungElectronic/mXuusvq. pdf. [6] Vishay Semiconductors Datasheet. Photo Modules for PCM Remote Control Systems [Online]. Available: http://www. vishay. com/docs/82030/82030. pdf A Telephone Based Wireless Remote Controller Data processing stages of the transmitter and receiver modules have been implemented using digital components, thereby avoiding possible use of conventional devices like monostable multivibrators. Due to the fully digital nature, the proposed design is less complex and hence the implementation is cost effective. I. INTRODUCTION With the advancement in science and technology, human beings have developed a tendency to make their everyday life amply luxurious with the aid of technology. This has led to the development of many sophisticated gadgets and equipments that assist them partially/fully in their daily activities. Operating all such electronic/electrical instruments in a modern house might be difficult for the elderly as well as disabled people. Our primary motivation to build a simple and low cost system which remotely operates all the home appliances stems from this point. We integrate our system with a standard telephone set so that the telephone can be used for the dual purpose of telephony and remote controller for various home appliances. The proposed system mainly consists of 3 modules, viz. , telephone interface circuit, transmitter and receiver. The transmitter module is in turn made up of a digital data processing block and a wireless (infrared) transmitter block and the eceiver module is made up of a wireless (infrared) receiver block, digital data processing block and a decoding block. In the scheme, a telephone receiver acts as a remote terminal to provide input Dual-Tone Multi-Frequency (DTMF) signals to the telephone interface circuit which converts them to corresponding 4 bit Binary Coded Decimal (BCD) codes. The transmitter generates an 8 bit frame using this BCD code to facilitate asynchronous communication . The receiver decodes the received signals after checking for any transmission errors (single bit) in the frame. These decoded bits act as control signals for the operation of home appliances. The system employs an asynchronous type of communication [1] in which the transmitter and receiver clocks are independent. The receiver clock does not have any prior information regarding the phase of the transmitter clock [2]. This leads to the problem of choosing the correct sampling instants at the receiver [3]. Hence the data is transmitted in the form of frames instead of individual bits. Each such frame consists of start bits, information bits, and stop bits [1]. This is explained in detail in the subsequent sections. When the system is idle, the data processing block of he transmitter gives constant logical high output. Since the transmitter consumes more power in transmitting logical high than logical low, the output of data processing block is negated before transmission to save power in the idle state. The receiver module also senses this and remains idle whenever the transmitter is transmitting continuous logical low. The reception of a start bit changes the state of the r eceiver from an idle to an active state. It then has to sample the remaining data bits in the frame at proper sampling instants. Most of the standard hardware schemes involve the use of monostable ultivibrators at the receiver to recover the data bits following the start bit. The monostable multivibrators commonly rely on variable components such as resistance and capacitance values, as well as they often account for a major part of the propagation delays associated with the receiver. We have extended this treatment to a fully digital design that presents more challenging tasks including a digital output feedback. Moreover, use of all digital components in the data processing stages reduces the propagation delay considerably. The complete design outline of all the modules of the roposed system is presented in Section II. Results and discussions are given in Section III. Finally, we present our conclusions in Section IV. II. DESIGN OUTLINE The block diagram of the proposed telephone based wireless remote control system is shown in Fig. 1. In the proposed system, the telephone set performs the dual functions of telephony and remotely controlling various devices. The remote control mode of the telephone can be activated by pressing ‘#’ from the keypad of the telephone. After the desired tasks are accomplished, ‘#’ should be pressed again to deactivate the control system. This is one of the functions of the telephone interface circuit, which is discussed next. A. Telephone Interface Circuit The telephone interface circuit integrates the designed system with the standard telephone system. As shown in Fig. 2, it basically performs the job of receiving the signals from the local loop and converting them to the standard digital signals in the BCD format. When any telephone button is pressed, a unique DTMF signal is produced for a short duration [4] which is converted to corresponding BCD code by a standard DTMF to BCD converter (KT-3170) [5]. The dual tone frequencies and the BCD codes associated with each dialed digit are shown in Table 1. The system remains in the idle state until ‘#’ button is pressed which sets the telephone to remote control mode. This mode remains activated until ‘#’ button is pressed again. This is realized in the hardware by using the BCD code corresponding to ‘#’ as the clock to toggle the J-K flip-flop (74112). The flip-flop output toggles whenever the ‘#’ button is pressed and this is directly used to control the mode of operation of the telephone. The DSO output of KT-3170 [5] is used to generate a start it for the system as it is logical high whenever a received tone pair has been registered and the output latch is updated. As the latched 4-bit BCD code is directly available at the output of KT-3170, it is given as such to the data processing block of the transmitter. These data bits are then processed to facilitate asynchronous communicatio n as explained below. B. Transmitter The 4-bit output of KT-3170 can not be directly transmitted as individual bits as the proposed system employs asynchronous mode of communication. The 4-bit BCD code is thus transmitted as frames for proper reception [1]. We have chosen an eight bit frame for our system which consists of a start bit followed by four data bits, a parity bit and two stop bits. Parity bit enables the system to detect any single bit error during transmission. Stop bits mark the ending of the frame. The frame is then transmitted using infrared (IR) transmitter. As shown in Fig. 2, the transmitter mainly consists of two blocks which are explained below. 1) Fully Digital Data Processing Block: This block performs the function of converting individual bits to 8-bit frames in order to carry asynchronous communication. First bit of the frame is the start bit (taken as 0) which is generated when any of the buttons is pressed. The succeeding 4 bits are the data bits (BCD code) generated by the telephone interface circuit as explained before. Next bit is taken as parity check bit generated by XORing the first 5 bits of the frame. Last 2 bits, termed as stop bits, are taken as 1. Following the generation of the start bit, the data bits are loaded in the parallel to serial converter (74165) using a D-type flip-flop (7474) and the frame is transmitted serially. 2) IR Transmitter Block: This module transmits the frames enerated in the previous section using an IR emitting diode. The data to be transmitted is modulated using Amplitude Shift Keying (ASK) with a carrier square wave of 38 kHz. The transmission range of the system is thus highly improved over the case when data is transmitted without modulation. As the data processing stage gives logical high output in the idle state, it is negated before tran smission to save power. Thus, a logical low is actually transmitted whenever the system is in idle state. C. Receiver The receiver also has 2 working states, viz. , idle and active. It remains in the idle state until it detects a start bit. It then receives the frame starting from the start bit and checks for a single bit error. If error is detected, no action is taken and the information has to be transmitted again by the user. The received data bits are then decoded which act as control signals for the operation of various appliances. As is evident from Fig. 3, receiver circuit can be subdivided into 3 blocks which are explained below. 1) IR Receiver Block: This block receives the transmitted frames and converts the signal back to Transistor Transistor Logic (TTL) levels. A standard 38 kHz IR receiver (TSOP 1738) [6] is used for this purpose. 2) Sampling Clock Generator: The main function of this block is to generate a sampling instant at approximately the middle of the transmitted bit interval. The start bit activates this block and loads counter 1 (4-bit up-counter) with value ‘0’. The clock frequency of this counter is 16 times the bit rate. When the output of this counter changes from 7 to 8, the most significant bit changes from ‘0’ to ‘1’ and this rising edge is used as the sampling instant for the data. Start bit also loads the counter 2 (4-bit down-counter) with the frame size i. e. , 8. When this reaches the value ‘0’, the whole block is disabled and is reactivated only when next start bit arrives. 3) Data Sampler and Decoder: The serial input data is sampled according to the sampling instant generated in the previous stage and is converted to parallel form using serial to parallel converter (74164). This data is then checked for any 1-bit errors by XORing the bits. If error is found, no action is taken and the data has to be retransmitted. If no errors are found, the data is decoded using 4-16 decoder (74154) and he signal is given to the appliance for the completion of the corresponding task. III. RESULTS AND DISCUSSIONS The proposed system has been fully implemented and successfully tested in the standard telephone local loop. The transmitter, kept near the telephone set, taps the DTMF signal from the local loop and transmits the corresponding data frame wirelessly . This signal is received by the receiver installed at the switch board. It decodes the data and takes the corresponding action. At least ten control signals, corresponding to each digit from 0 to 9, can be generated using a standard telephone set. The transmitter was previously implemented without a modulator where the IR LED was kept ON for transmitting logical high and OFF for transmitting logical low. This limited the distance between the transmitter and receiver to a maximum of 30 cms for proper reception. The range of the wireless system has increased to several meters after modulating the data using 38 kHz square wave. This range also depends on the current flowing through the infrared diode which has to be properly tuned to maximize the range. A standard TSOP 1738 receiver is used in the proposed ystem, which requires a minimum burst length of 10 cycles for proper detection. This puts an upper limit on the data rate supported by our system which is practically observed to be 2. 8 kbps [5]. The IR transmitter is highly directional and requires the receiver to be in line of sight of the transmitter. The reception angle of the receiver is observed to decrease with increasing distance between the transmitter and receiver. T his is because of the fact that the power is not uniformly distributed and is concentrated in narrow transmission angle. Moreover, the signal power reduces when the distance between the transmitter and the receiver is increased. So, the receiver has to be highly aligned with transmitter when operating at some substantial distance from it. This problem is of not much concern for our system because the transmitter and receiver, being static in nature, can be properly aligned at the time of installation. The data processing blocks of both the transmitter and the receiver are fully digital in nature. This comprehensively reduces the propagation delays involved and increases the rate at which data can be processed in these blocks. Though, data rate is not very important in the present application but this feature makes the design of our data processing blocks suitable for high data rate applications which are commonly seen in wired communication. IV. CONCLUSIONS A wireless system has been proposed to operate the home appliances remotely using a standard telephone set. This has been successfully tested and is found to be working satisfactorily within a distance of 10 meters. The telephone receiver performs a dual-function of telephony and remotely controlling various devices with the help of its ‘#’ button on the keypad. The telephone interface circuit is easily integrated with the standard local loop thus avoiding any changes in the telephone set. Hence, the proposed system is compatible with any type of telephone working on standard local loop. The system employs asynchronous mode of communication which avoids the need to synchronize the transmitter and receiver clocks, thus making our system less complex and hence cost effective. The proposed fully digital innovative design of the data processing blocks reduces the propagation delay and makes them useful for even high data rate applications. Moreover, the system is capable of detecting the single bit errors occuring during transmission. The proposed system can be used in a wide range of practical applications such as speed control of motors, switching of appliances, control of robots, etc. The above discussed characteristics like simple design, high practical utility and easy installation makes our system highly marketable. REFERENCES [1] Gorry Fairhurst. Asynchronous Communication [Online]. Available: http://www. erg. abdn. ac. uk/users/gorry/course/phy-pages/async. html. [2] D. Comer, Computer Networks and Internets with Internet Applications. Upper Saddle River, NJ: Prentice-Hall, 2004. [3] A. Subramanian, V. P. S. Makh and A. Mitra, â€Å"A New Digital Transceiver Circuit for Asynchronous Communication†, Enformatika Trans. , vol. 8, pp. 237-241, Oct. 2005. [4] DTMF Background [Online]. Available: http:// www. ece. utexas. edu/mason/codesign/dtmf. html. [5] Samsung Electronics Datasheet. KT3170 Low Power DTMF Receiver [Online]. Available: http://www. ortodoxism. ro/datasheets/SamsungElectronic/mXuusvq. pdf. [6] Vishay Semiconductors Datasheet. Photo Modules for PCM Remote Control Systems [Online]. Available: http://www. vishay. com/docs/82030/82030. pdf

Friday, September 27, 2019

Foreign Policy in Libya Assignment Example | Topics and Well Written Essays - 500 words

Foreign Policy in Libya - Assignment Example So far, the United States has engaged her Air and Naval Forces in the Libyan war. The involvement of the United States in the Libyan War has been a subject of intense debate between the United States Congress and the President Obama Administration. Indeed, the United States operation in the Libya has attracted mixed reactions within the American political landscape with the Republicans challenging the Obama administration of unconstitutionally dragging the United States to a foreign war and the White House countering the criticisms by arguing that the United States military campaign in Libya â€Å"fell short of full-blown hostilities† (Savage A1). In fact, Republican John A. Boehner, House Speaker, requested the Obama administration to provide a legal justification for engaging the United States in a foreign war beyond 60 or 90 days without notifying Congress. Even some Democrats such as Dennis J. Kucinich, has join side with Republicans to file a lawsuit to order Obama to pul l out of Libya (Steinhauer A16). These oppositions, notwithstanding, Mr. Obama enjoys the support of some Republicans and Democrats. For instance, Senator John MaCain, a Republican, teamed up with Senator John Kerry, a Democrat to support the Obama involvement in Libyan War by sponsoring legislation that will officially authorize the Libyan operation (Smith).

Thursday, September 26, 2019

Cyber Security and Cyber Crime Annotated Bibliography

Cyber Security and Cyber Crime - Annotated Bibliography Example This publication done for Deloitte by DeZabala and Baich, the National Managing Principal and Principal respectively acknowledge the rampant increase in cyber crimes in organizations following its CSO Cyber Security Watch Survey in 2010. It unearths some of the stealth techniques used by cyber criminals today. It points to future indicators with a disclaimer of the severity and complexity expected in future. The authors sum up this publication by giving a risk based approach and how to have an effective intelligence system to gather the necessary intelligence information. This is a law book aimed at giving the reader information on career opportunities in private security. In Part II of the book, Dempsey discusses the problem of computer crime, used interchangeably with cyber crime in the society and businesses. This book would be useful to that scholar seeking supportive surveys as the author documents surveys on cyber crime as conducted by the FBI and National Cyber Security Alliance, NCSA in the US. The book discusses most of the basic security procedure followed so as to mitigate cyber crime but is inclined more towards use of biometrics. The discussion on how to investigate cyber crimes has been used to market the various career opportunities that are a consequence of the same. This source would be important for citing examples of the effects of cyber crimes. It gives an example of how Russian crime gangs and civilians caused internet traffic in Georgia to stop by use of America’s software companies and websites. Though it lacks technical explanation as to the crime, it gives the needed information to document cyber crime as a potential national risk. This paper is an extension of the author’s earlier research paper on current challenges in cyber security and advocates for law to react proportionately to the rapid changes in internet usage and cyber crime. It advocates for an inclusion of various professions, both technical and non-technical in

Evaluation of Slum Dog Millionaire Film Movie Review

Evaluation of Slum Dog Millionaire Film - Movie Review Example The story is heartbreaking how he and his brother led an adventurous life, their hardships, their frequent encounters with local gangs. To everyone’s surprise each chapter of the story reveals the key to the answer of each question. The introduction of the character is extremely unexpected. The seven year old boy is listening to the howling of the crowd welcoming the stupendous actor Amitabh Bachan. He was destined to move through the dirt to get an autograph of Mr Bachan. Orphaned by the killing of his own mother in a Hindu Muslim riot, the seven-year-old boy of Dev Patel tries to make his living by joining in the gangs of professional beggars and at one time he turns traitor on his sibling. The chai-wala who sells fragrant tea to call centre workers in Mumbai who after a series of hardships and adventures, at last seated on the television game, is now at the moments of grabbing the big prize. The struggle of the lower caste in economically developing Mumbai is well depicted through the life of the street boys. The screenplay by Simon Beaufoy which is slightly adapted from a novel by Vikas Swarup captures the flow of time and space, the childhood time and the grown-up times etc. The flow of life is exactly portrayed. Cast in to the friendless world with another orphan Latika the three children make their way fighting against the reality of life. The story of his short but rich life unfolds in a series of flashbacks. It may be brutal to some foreign audience. But the events drag the spectators to the edge of appalling. After doing the roles as pickpockets, vendors, dishwashers and even guides to the tourists, it is Jamal that insists Salim return to Mumbai to find Latika. The young actors have done their roles beautifully. They are appealing and sympathetic. The most remarkable thing about Slum Dog Millionaire is it a Bollywood film which has the sense of a typical Indian Cinema. It was shot on the street of Mumbai, the typical thickly populated place wi th full of tin-roofed huts.  

Wednesday, September 25, 2019

Applied Immunology...subunit vaccines Essay Example | Topics and Well Written Essays - 750 words

Applied Immunology...subunit vaccines - Essay Example In Subunit Vaccines, as the name suggest, only the specific fragment of a microbe or an infectious agent (Thecochranelibrary.com, 2014). These fragments might be epitopes which are specific parts of an antigen that are easily recognizable to the antibodies or T cells. Subunit vaccines consist of about 1-20 or sometimes even more antigens, whereas it is an intense task to specify which antigen would prove the most efficient stimulator (Flower and Perrie, 2013). There are two ways of manufacturing these vaccines once the appropriate antigen has been identified: All vaccines go through careful evaluation to make sure that they are safe for consumption; however, there are some flaws in the structure of traditional vaccines that were illuminated with the creation of subunit vaccines. Usually, inactive pathogens are introduced into the immune system of a human being as a vaccine; being inactive means that the pathogen can no longer cause a disease because the viral fragment has been deactivated. The one problem with this procedure is the chance or reversion. Reversion is the process by which a microbe undergoes genetic changes, converting it into an even deadlier threat to the human body (Vaccine-safety-training.org, 2014). This risk if eradicated in the case of subunit vaccines because only the structural fragments of a pathogen are used, which means that there can be no genetic changes, hence no damage to the human body may occur (Stratton, Wilson, and McCormick, 2002). Another shortcoming of traditional live vaccines is that they cannot be used by certain groups of people, such as the elderly above 65 or even pregnant women. This is because even attenuated viruses can pose a threat to the health of these people, making it fatal for them to use these vaccines. Similar to the case before, subunit vaccines are introduced in the body as small fragments rather than a whole microbe so

Tuesday, September 24, 2019

Human Resource Management Essay Example | Topics and Well Written Essays - 2000 words

Human Resource Management - Essay Example Flanagan was the firm’s vice chairman in the corporate offices of Chicago (Blitstein 2008). According to the article, Flanagan, ‘repeatedly lied about his trading in annual written certifications’ (Blitstein 2008). I’ve made a research on the literature related to business ethics and came to the conclusion that employees in all firms need to follow the ethical rules set by their organization, as these rules are aligned with the laws regulating trade and commerce. In the specific case, Deloitte had failed in identifying early the violation of business ethics by its vice president; moreover, it seems that this failure has been a common phenomenon for the specific organization, meaning especially the problems in the firm’s audits in 2009 and 2010, as identified by the Public Company Accounting Oversight Board (PCAOB) (Lynch and Byrnes 2011). In accordance with Tittle (2000, p.67) ‘employees need to be loyal to their company’; however, this loyalty has limits. ... It is implied that the activities of employees within organizations need to be lawful and that no violation of law in the context of business activity is permitted. In accordance with a survey developed in 1990, a high percentage of organizations, about 90%, tend to develop a corporate code of ethics (Trevino and Weaver 2003). In this context it would be expected that the phenomena of corporate fraud would be limited worldwide. The case of Deloitte, as of other well-known firms, such as Enron, revealed that the rules of corporate code of ethics are often ignored within modern organizations. I decided to explore all aspects of the Deloitte’s case, meaning its problems related to business ethics, in order to identify the failure of the organization to promote business ethics among its employees: was these failure related to specific employees or to the organization’s strategic framework? Log Entry 2 February 15, 2012 At a first point, Deloitte’s practices in regard to the control of fraud in the internal organizational environment can be considered as quite ineffective. In accordance with the firm’s website, the Board has a key role in ‘overseeing the organization and ensuring that it operates in the best interests of its shareholders’ (Deloitte, The role of the board, 2012). It is further explained, that the Board has the power to develop a regular control on the firm’s value drivers and set the firm’s targets, including the systems required for ‘monitoring managers’ accountability’ (Deloitte, The role of the board, 2012); the above powers are part of the Board’s responsibility to check the level at which the corporate governance rule are applied (Deloitte, The role of the board, 2012). In other words, the firm’s Board is primarily

Monday, September 23, 2019

Reasons for Choosing to Become a WGU Student Essay

Reasons for Choosing to Become a WGU Student - Essay Example Not only I worked intensely, but I also had to pay the bills and take all kinds of loads an independent man does. I conducted a thorough research and found that no college’s classes matched my schedule. I had to leave the work in order to pursue further education, which was clearly not a practicable option for me. Therefore, I started searching for courses in online education. Distance education was increasingly being adopted as a way to advance the academic career. I also thought about doing the same, though I had mixed feelings about it. I knew it would allow me to acquire a bachelors degree as I felt convenient, but doubted whether such a degree would be valued by the employers. Besides, choosing the best online university from among a myriad of options was another challenge confronting me. I started browsing ads online and checking people’s opinions and suggestions both online and otherwise. My research led me to the conclusion that most of the online universities l acked regional accreditation, were quite expensive for the students and their graduates were still not liked at large. Finally, a friend of mine suggested me to search about the Western Governors University (WGU), saying that WGU was not only accredited regionally, but was also quite affordable and suitable for me considering the situation I was in. Initially I took it as a regular advice and didn’t expect much. But as I conducted a little research, I happened to find that the Northwest Commission on Colleges and Universities had accredited WGU, which was itself accredited by CHEA. A number of other schools were accredited by the same organization. Such schools included but were not limited to Brigham Young, Lewis & Clark, and the University of Oregon. While reviewing the bachelor’s degree in IT at WGU, I found that WGU offered nine certifications many of which were more than sufficient for an individual to acquire a high-paying job of a technician in my area. As my fr iend had said, WGU was really affordable. All I had to pay was $5780 a year in two installations, each of which was for six months. Therefore, WGU not only provided me with a way to attend the school as per my convenience, but also have more time for leisure activities as it saved me a lot of money that would otherwise have been consumed in paying the fee of another school. The most fascinating characteristic feature of WGU was that it offered classes at 3am, unlike any brick and mortar school I knew. Message for my friend Just like one very sincere friend of mine solved this issue for me, I would like to introduce WGU to you so that the positive message is spread and more and more people can benefit from the tremendous opportunities WGU has to offer. If you are looking for a reputable degree from a regionally accredited school, and also want to continue your full time job with it without having to bear too large a cost in the name of fee, WGU is one school that can provide you with all of these. By recommending you WGU, I am saving you all the headache and waste of time that I had incurred while searching for a good school. I assure you that you will not regret to choose to study in WGU. You may look for the kind of certificates WGU issues in the discipline of your interest and see if they suffice the requirements for job eligibility in your area, which they most probably would! It is a complete package for the ones looking for a practicable option to advance their career

Saturday, September 21, 2019

Effects of Industrialization on Artist Essay Example for Free

Effects of Industrialization on Artist Essay The countries of the world have largely embraced the goal of industrialization which explains the reason why there is the label of developing and developed countries. The implications of the 19TH century has put the developed western world as the model of industrialization on the planet (Masten, 2008). The face of industrialization affected a number of fields in the scientific attempt to improve the economies and subsequently, raise the overall standards of living . Art was one of the disciplines that benefited from the effects of industrialization, and it came as a hope for many artists around the world (Locker, 1999). This paper therefore attempts to compare and contrast whether the rise changed the modern world leaving the natural world as the sole object of fascination to artists. Industrialization as a process sought to promote social and economic changes with the human societies transforming from pre industrial to industrial(Davis,2000). It saw the wider apart of modernization leading to overall social changes and economic developments mostly related to technological advancement. More cities were development following the rise modernity, as a result of large scale metallurgy and energy production (Basye and Holt, 2000). Philosophical changes also marked the emergence of industrialization leaving people in the western world with a more yearning to obtain different attitudes towards nature and artistic orientation (Novello, 2000). Accordingly, there is substantial research on the prevailing effects of industrialization on modernization and enterprise development . Artists have got an opportunity of expanding their careers following the expansion of commerce and the prevalence of skills that helps them in the exploitation of the abundant natural resources (Shields, 2006). This somehow happens at a relatively low cost, adaptability of labor and continual supply of their products to a wide range of market (Plaura, 2001). The radical changes in the 19th century involve the production of the electric power: an element that is succinctly fundamental to the continuous growth of economy as well as advancing the skills required for a particular job (Basye and Holt, 2000). In a survey done in some countries in Africa, middle East and Latin America, it was found out that there is relative open trading systems that can stimulate industrial innovation and cost efficiency across the board, leading to the readily available markets and free and flexible labor (Novello, 2000). As a result, positive work ethics mixed with skills, effectively used scientific discoveries and technological in boosting the production and subsequent increase in income levels. It is true that a number of major cities in the western world were widely modernized bringing about the effects of urbanization. To serve this house working populations, urbanization facilitated the concentration of labor (Davis, 2000). Artists therefore found themselves without splendid natural resources for them to exploit because of the population upsurge in cities. Consequently, they resorted to the natural worlds which had hitherto not felt the effects of industrialization for their resources (Masten, 2008). Another impact that followed industrialization was change in family structures and effects on the environment. Environmental stressors such as noise, water pollution, impersonal lifestyles and a myriad of health problems set into play (Locker, 1999). Many artists in the present world continue to grow in terms of their careers simply because, they have been able to advance all their artistic orientations (Shields, 2006). Prior to the 19th century, many paintings in America often dealt with the serene landscapes, idealized craftspeople and a host of other people. However, after the effects of industrialization had taken place, the whole scope of photographs and painting changed. Art was basically the reaction to the social and industrial conditions that prevailed (Masten, 2008). Later on, artists was obliged to create art for two audiences. Generally, artists of this important period in the history of mankind avoided painting many scenes portraying the new outfit of modernization and as such, this did not imply that they failed to create an art about the industry. Moreover, the deep enjoyment of art became the pastime for both the upper and middle class people (Davis, 2000). These were the people who essentially, preferred not to clutch over the hard work that may have been done by the lower class, let alone hanging any artistic socials commentary on their walls. Instead there was mere need for a picturesque that portrayed a neutral political landscape (Plaura, 2001). According to (Basye and Holt, 2000), several literatures enabled artists to access a medium where many of their engravings were published but the controversy that followed saw many middle class people opposing the view of the artists and eventually disapproving their works. Irrespective of the upper and middle class reaction against the artistic package of social commentary, many artists continued experiencing the strong urge for expressing themselves through art (Locker, 2000). They then resorted to the natural world where they found a lot of fascination for their works because of two major reasons. Depending on the specific needs of a particular artist, the natural word provided an avenue for artists to explore a host of untapped resources or aptly, got a ready and uncritical audience for their art (Masten, 2008). This basically strengthened their ambitions leading to affair ground for art. For instance, majority of the artistic collections portrayed the hard work of ordinary rural folks giving hem the urge to continue doing even better in their pursuit for economic survival. With this regard, several portraits were painted. They involved persons sewing a dress or a blacksmith hammering a horseshoe. particulrtly, such portraits depicted a blacksmith as possibly the man in charge of an enterprise. It showed a young man in the back, presumably an apprentice or the blacksmith’s assistant. Both were posed with their tools, with drops of sweat other cheeks seemingly proud of their trade. A factor like this one often encourage the general population because, despite the conditions for working being harsh, the portrait depicts clean, bearable and inviting scenario that give the people enthusiasm and pride altogether (Novello, 2000). In addition, the views of American urban life as well as industrialization were manifested through the channel of photography. Using a succinct comparison of the rural life, city life was pictured using sky crappers mushrooming everywhere (Shields, 2006). In this scenario, a chaotic combination of people and carriages filled the city street eliciting a feeling that city life is eventually becoming more foreboding for life and work hence, underscoring the importance of rich environmental conditions found in the rural life. Overly, the dawn of industrialization saw a marked reduction of human working conditions to unacceptable level. Active artists and photographers aligned to politics used art to comment on the industrial progress to their audience. However, there was stiff competition that forced some artists not to make enough fortune or just find a satisfactory audience for their works. They were therefore attracted to move to the rural world, where they got audience and commercial benefits for their activities. Somehow, they used the modern mechanized age to obtain a source of creativity which is paramount to the work of art. Without a creatively compelling work, their will be audience to stand all sorts of unattractive, and redundancy even if your work has the very best of the message (Plaura, 2001). There is a general history of artist getting more fascinated to the natural world. With the advent of industrialization, many artistic movements sprang up each with a unique reaction to the feeling of the movement it took after and time (Davis, 2000). Neoclassic which had taken lead form the Greek and Roman art, paved way for a more parallel period called romanticism. At this level, many artists became more imaginative with the rise of individualism, emotional intensity, and freedom describing the underlying the perceptual shift from the modern life to getting oriented to the natural world (Masten, 2008). Realism which followed brought about the realist artists who created artistic works that captured objectives and figures as they appear in real life. Artists found the natural world more ideal in portraying truthful visions of everyday life; an idea tat was much welcome to rural folks that the modern ones (Novello, 2006). Many artists felt the need to explore their relationship with nature by traveling through a wilderness. But because urban life had less or no fascinating wilderness, artists resorted for the rural world and found it more fascinating in delivering the exploration objective through a natural world (Plaura, 2001). For example, Mark Catesby, as English artist moved to the rural Northern America and found that it was the most true immersion into the American seaboard and other areas still unexploited and unknown to many Americans. He began photographing and drawing natural and social sceneries that had not suffered any natural disintegration, and hence, his works attracted a large scale audience (Shields, 2006). Another artist and explorer, Karl Bodmer, is a testament to the reason moving to natural world. he says that the most fascinating factor in the so regarded lost world is the boundless enthusiasm that artists get when they venture into worlds unknown to many, because there seem to be abundant opportunity and astonishment in those lands (Locker, 1999). The overall benefit is the reminder these places give in acknowledging that at some point, they had stopped at the crossroad of horrible, natural and sacred phenomena. They somewhat develop a relationship with the earth, facilitated by the nature, culture and their sense of fulfillment (Davis, 2000). Furthermore, the natural world is more attracting to artists because; it provides the ground that satisfy the curiosity and creativity of many artists. At the heart of every artistic symbol lies the expression of meaning. Artists tend to search for lager meaning in small aspects of life (Basye and Holt, 2000). According to the documentations in archives, the significance of artistic history is logged in the fissure between wilderness and civilization and this point out the primary focus of artists on rural worlds. Notwithstanding, rural world represents culture and nature and how it is reconciled with the modernization. Therefore, the imaginative role of art pulls out the existing radiance in capturing double meaning encased in the metaphors. When they finally take their products to urban setups, they somehow manage to prompt the city residents into the world of imagination embedded in the images formed in their minds as a resulted art (Masten, 2008). Moreover, artists use the natural worlds to find sources that subsequently define the unique artistic identities. This is clearly captured in the sentiments of a German poet, Rainer Maria. He believes that as a primary condition for writing a captivating verse, it is imperative that they see a myriad of cities, nature, men and several other things. Accordingly it is perquisite that one should know different flights of birds, animals, not forgetting gestures that flowers make especially when they open and close. The fundamental role of all this condition is to portray the accounts as creative as possible with the unique ability to come up with the work of art that suits in the context of everyday life. The only available source of the adventure is the natural world that is least affected by industrialization (Novello, 2000). Similarly, there is more attraction to the natural world. Artists think that by going there they provide a link between city life and rural life. All the opportunities of industrialization are made open to village folks giving them a chance to keep a breast with what is happening across the world (Plaura, 2001). For example, there was a painting in rural Indiana which showed an angel looking as though he is about to walk away from something he is acutely contemplating. It depicted the angel staring with his mouth wide open and the wings flung spread. This is the way artists presents issues in varying worlds and the serenity found in natural world promotes the efficient delivery of the message (Shields, 2006). The painting reinforces the religious teaching that God watches over us and somehow, strengthens the spirituality; an aspect that is under the threat of industrialization. Conclusion From the foregoing discussion, it is evident that the dawn of industrialization in the 19th century was accompanied by the sharp shift in the economical, social and ideological differences that paved way for new lifestyles. Individualism, which became rife as a result of urbanization, left artist with a host of intellectual orientation in terms of creativity. It is evident that the market for their art products got strained obliging them to get attracted to the rural world that had hitherto not adversely suffered from the effects of industrialization. Bibliography Basye, E and Holt, G 2000. Art and Architecture: The Advent of Industrialization, Yales, Yales University Press. Davis, A. 2000. A Social History of Graphic Art and Works Industry. New York, McGill-Queens Press. Locker, N. 1999. Science and Nature: An International Journal of Science. Vol. 23 Issues 56, London, Macmillan Publishers. Masten, A. 2008. Artwork in the Nineteenth Century. Pennsylvania, Pennsylvania University Press Novello, A. 2000. The Face of Art in the Nineteenth Century. London, Prentice Plaura, N. 2001. Art and Nature: Interelationship, Oxford, Oxford University Press Shields, S. 2006. Artists at the Continents End: The Peninsula Art Colony. Michigan, Routledge

Friday, September 20, 2019

Hackers And Ethical Hackers

Hackers And Ethical Hackers Cyber security is one of the most critical aspects of security that any organization in the modern world must be concerned with. Why? Mostly because of Black-hat Hackers. The following review is a general discussion about hackers and its best countermeasure, Ethical Hacking. The reason I chose this topic is because it is of great interest to me, as I someday want to be an Ethical hacker as well. Review The word hacker in the past was defined as a person who loves playing a around with software or electronic systems. They wanted to discover new things on how computers operate. Today the term hacker has a different meaning altogether. It states that a hacker is someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers). Crackers break into (crack) systems with malicious intent. They are out for personal gain: fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable. (Kevin Beaver, Stuart McClure 2004, p10) Most of the literature I read give the definition of the word hacker as previously stated or to mean mostly the same thing. The history of hacking dates back to the 1960s when a group of people in MIT hack the control systems of model trains to make them run faster, more effectively or differently than they were designed to. (Peter T. Leeson, Christopher J. Coyne, 2006). Because of such activity by these individuals computer owners and supervisors took away their access to computers. As a result the hacking community came up with their own code known as the hacker ethic: 1. Access to computers -and anything which might teach you something about the way the world works should be unlimited and total. Always yield to the Hands-On Imperative! 2. All information should be free. 3. Mistrust Authority Promote Decentralization. 4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position. 5. You can create art and beauty in a computer. 6. Computers can change your life for the better. (Paul A Taylor, 2005) The above code is still followed today and not only by hackers but by others as well. Not all hackers today have the same level of expertise. Depending on the psychology and skills of a hacker they can be put into four groups.(M.G. Siriam) Old School Hackers is one group and they believe that the internet should be an open system. Script kiddies is another and they are computer novices that use tools created by professional hackers to hack systems. Most of the hackers today fit into this group. The next group is professional criminals or crackers. They break into systems for the purpose of stealing and selling information they gathered.. The final group is coders and virus writers. They are elite individuals with a very high skill in programming and operating systems that write code and use other people in charge of releasing their code to the wild. Organizations and institutions today are under a lot of stress to protect their information from external as well as internal security threats to their computer systems. As such most of them have come up with the solution of hiring Ethical Hackers. To catch a thief, you must think like a thief. Thats the basis for ethical hacking. Knowing your enemy is absolutely critical (Kevin Beaver, Stuart McClure, 2004, p13). In other wards Ethical hackers (white-hat hackers) are experienced security and network experts that perform an attack on a target system with permission from the owners, to find loop holes and vulnerabilities that other hackers could exploit. This process is also known has Red Teaming, Penetration Testing or Intrusion Testing. (www.networkdictionary.com) The end goal of ethical hackers is to learn system vulnerabilities so that they can be repaired for community self-interest and as a side-product also the common good of the people.(Bryan Smith, William Yurcik, David Doss, 2002) Every Ethical hacker should follow three important rules as follows: Firstly Working Ethically. All actions performed by the ethical hacker should support the organizations goals that he works for. Trustworthiness is the ultimate tenet. The misuse of information is absolutely forbidden. Secondly Respecting Privacy as all information that an ethical hacker gathers has to be treated with the utmost respect. Finally Not Crashing Your Systems. This is mostly due to no prior planning or having not read the documentation or even misusing the usage and power of the security tools at their disposal. (Kevin Beaver, Stuart McClure, 2004, p16-17) The main attacks or methods that an ethical hackers or even hackers perform are of as follows: Non Technical Attacks: No matter how secured an organization is in terms of software and hardware, it will always be vulnerable to security threats because securitys weakest link are people or its employees. Social engineering is a type of non technical attack where hackers exploit the trusting nature of human beings to gain information for malicious purposes. Other attacks can be of physical nature such as stealing hardware equipment or dumpster diving. Operating-System Attack: Hacking an operating system (OS) is a preferred method of the bad guys. OS attacks make up a large portion of hacker attacks simply because every computer has an operating system and OSes are susceptible to many well-known exploits.(Kevin Beaver, Stuart McClure, 2004, p15) Distributed denial of service attacks(DDoS): This is the most popular attack used by many hackers to bring down systems. Its a type of attack that overloads the network or server with a large amount of traffic so that it crashes and renders any access to the service. Internet Protocol (IP) spoofing: It is a way of disguising the hackers real identity. This method allows a hacker to gain unauthorized access to computers by sending a message to a computer with an IP address showing that the message is from a trusted host. To accomplish this, a hacker must use different tools to find an IP address of a trusted host, and then alter the packet headers so it appears that the packets are coming from the host. (Tanase 2003). The process of ethical hacking contains many different steps. The first thing that is done is to formulate a plan. At this stage getting approval and authorization from the organization to perform the penetration test is extremely important. (Kevin Beaver, Stuart McClure, 2004, p15). Next the ethical hacker uses scanning tools to perform port scans to check for open ports on the system. Once a cracker scans all computers on a network and creates a network map showing what computers are running what operating systems and what services are available, almost any kind of attack is possible (Bryan Smith, William Yurcik, David Doss, 2002) This method is used by hackers as well but for mainly for malicious purposes. After scanning has been done the ethical hacker selects the tools that are going to be used to perform certain tests on the target system. These tools can be used for password cracking, planting backdoors, SQL injection, sniffing etc. The tests need to be carefully performed bec ause if they are done incorrectly they could damage the system and could go unnoticed. (Bryan Smith, William Yurcik, David Doss, 2002) Finally the plan needs to be executed and the results of all the tests then need to be evaluated (Kevin Beaver, Stuart McClure, 2004, p22) Based on the results the ethical hacker tells the organization about their security vulnerabilities as well as how they can be patched to make it more secure. A grey hat hacker is a type of hacker that has the skills and intent of a ethical hacker in most situations but uses his knowledge for less than noble purposes on occasion. Grey hat hackers typically subscribe to another form of the hacker ethic, which says it is acceptable to break into systems as long as the hacker does not commit theft or breach confidentiality. Some would argue, however that the act of breaking into a system is in itself unethical.(Red Hat, Inc, 2002) Grey hats are also a form of good hackers that usually hack into organizations systems without their permission, but then at a later stage send them information on the loop holes in their system. They also sometimes threaten to release the holes they find unless action has been taken to fix it. (Peter T. Leeson, Christopher J. Coyne, 2006) Conclusion Testing the security of a system by breaking into it is not a new idea but is something that is practised in all aspects of industry. For example if an automobile company is crash-testing cars, or an individual is testing his or her skill at martial arts by sparring with a partner, evaluation by testing under attack from a real adversary is widely accepted as prudent.(C.C. Palmer, 2001) Since the security on the Internet is quite poor at present, ethical hacking is one of the only ways to ways to proactively plug rampant security holes. Until such time a proper social framework is founded, to differentiate the good guys (white hats) from the bad guys (black hats), a law must not be brought into effect, as this may risk taking away our last hope of stabilizing defense and not realize it until it is too late. In the end, it is up to the society to consider the social and ethical standards to apply to the ever-changing technology, so valuable information does not fall into the wrong han ds for the wrong purposes.

Thursday, September 19, 2019

The Scarlet Letter Freely Adapted as a Movie :: Movie Film comparison compare contrast

The Scarlet Letter Freely Adapted as a Movie      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The gods and goddesses of Greek mythology had temples erected in their names. They were worshipped and most times adored. The people brought offerings to these gods in the form of food, drink, and gold. Today’s gods and goddesses don’t sit high on Mount Olympus. They sit high on or behind the movie screen. We visit their temples in record numbers and bring food, drink, and the mighty dollar. But what do they offer us in return? Voyeurism, titillation, narcissismà ·all in a rebirth of classical American literature, which through their filters becomes sappy love stories with politically correct happy endings. In this way, their gifts are made more palatable for an audience they feel is not quite ready for films dealing with bitter social controversy, such as sin, hypocrisy, spiritual crisis, and guilt.    Nathaniel Hawthorne’s The Scarlet Letter is one of the classics that is experiencing this renaissance. Director Roland Joffe has enlisted the aid of writers Michael Mann and Christopher Crowe to produce a body of work also entitled The Scarlet Letter. The effort to introduce the American audience to this classical piece of literature was undertaken, as the film’s star Demi Moore asserts, because "not many people have read the book" (qtd. in Mr. Showbiz, par. 4). However, in doing so, Joffe has taken away the essence of Hawthorne. "It [is] sorrowful to think how many days and weeks and months and years of toil [have] been wasted on these musty papers [of Hawthorne’s] never more to be glanced at by human eyes. But, then, what reams of other manuscripts - filled [ ·] with the thought of inventive brains and the rich effusion of deep hearts - [have] gone equally to oblivion" (Hawthorne 46; The Custom House).    In film, the viewer sees a story from the director’s perspective. When experiencing a novel, the reader is drawn into the authorà ¢s story and relates to the characters and events created by the author. He is allowed to bring forth his own imagination to recreate the characters and events by visualizing what the writer describes. He chooses the voice of each character, pictures how the character looks, and brings his own personal experiences forth to enhance the written word. He has an opportunity to be one-on-one with the author, hear his words, and experience for myself the charactersà ¢ emotions.

Licensed Drinking Is Wrong Choice :: Argumentative Persuasive Papers

Licensed Drinking Is Wrong Choice On October 27, 2004, I will finally cross the bridge from my teenage years to adulthood. Along with the celebration of my 21st birthday, new rights, and responsibilities will shape my life. One of the biggest milestones in young adulthood is the freedom to purchase, and drink alcohol. There are few rules attached to this freedom, except for drinking and driving, which is of course illegal. With new drinking privileges comes an implication that I must take on personal responsibility for how much alcohol I chose to consume at any given period. Everyone over the age of 21 has the right to chose when, and how much they drink. This age restriction is a preventative measure intended to decrease underage drinking due to poor decision making, or irresponsible behaviors. Although these laws are established, they don’t stop underage drinking or the development of alcoholism. It is evident that the current laws aren’t working, because every weekend I hear of several underage drinkers getting ticketed. Because MIP (minor in possession of alcohol), tickets are so prominent show that underage drinkers don’t pay attention to the laws. The age restriction isn’t anything, and everyone knows the law. However, there will always be those who simply do what they please regardless of the consequences, and those who wish to drink will do so at any cost. Brake’s License Proposal In the essay, â€Å"Needed: a license to drink,† Mike Brake argues the freedom to drink should be regulated by a license. Much of Brake’s argument stems from his experiences both professionally and personally. He spent two years as a counselor in a chemical-dependency treatment center, and lost four family members in alcohol-related-deaths. Brake reminds the reader that alcohol is the root of many evils in this world: divorce, child and spousal abuse, suicide, homicide, assault, and other crimes. There is also numerous health problems related to the consumption of alcohol: failure of the liver, kidneys, heart, pancreas, and central nervous system (Brake, 1998, p. 135). Because of those statistics, Blake feels a license to drink would be the solution. Brake’s major claim is geared towards alcohol offenders, â€Å"A national system of licensing with appropriate penalties will do more.† In other words, he believes a license would more effectively confront the alcoholics or problem drinkers. A license for alcohol will go hand in hand with the right to hunt, fish, and drive.

Wednesday, September 18, 2019

My Country Armenia :: History

My Country Armenia Everybody loves to go to different places.On weekends people enjoy going out of town.I like to visit my country Armenia. You and your freinds are going to take a trip to Armenia. Armenia is a small European country that was part of the Soviet Union. However, you will have to make some preparations and do some research so as to make the best of use of your time and money.So, my country Armenia has a lot of interesting and attractive places to visit for tourist. Now I want to introduce some of the beautiful places in my country Armenia. They are Yerevan, Echmiadzin and Lake Sevan. One fantastic place to visit in my country is Yerevan. Yerevan, the capital of Armenia is a big and beautiful city. It has a population of about one million people; also, it is a mixture of ancient old, and new. Yerevan was built on tragedy and dreams. The heart of Yerevan of the city is Republic Square. In the centre of the square towering over it stands a magnificent building. It houses the Museum of History of Armenia and the National Art Gallery. They are all built in the style of national architecture. In front of the National Gallery there is a beautiful fountain where the townspeople like to walk in hot summer evenings. This fountain is continued by a series of fountains in the park across the square. Also, Republic Square is the hub of major avenue and streets. The city is climb to the top of the hills, you will see a sweeping panorama. One of them is the Swallow's Fortress park. In the same park you can see the pride of the townspeople-Sports and Concert gall that graces the hill. It is a modern construction latest in architecture. Moreover, the cultural centre of the city is Theatre square on the site of which Opera-House is located. It is an impressive building with a beautiful collonade. The Opera-House overlooks a green are of parks, too. In one of the parks of Yerevan in a quiet corner is the Pantheon of the distingnished people of Armenia. In addition, Yerevan is a city of students. There are more than 20 higher educational institutions. Above all, Yerevan is a very hospitable city. Nowhere in the world you find such traditions of receiving guests as in Transcaucasia. Another fantastic place to visit in my country Armenia is Echmiadzin.

Tuesday, September 17, 2019

Program Evaluation and Review Technique/Critical path method Essay

Project management triangle is the symbol that represents the money, time and scope items in a project, which has been modeled by Harold Kerzner. Given the wide range of project management tools available, the key to selecting the right one is to understand that different tools are needed along the different stages of a project life cycle. Graphical displays such as gantt-charts usually make the information easy to identify; and we can easily use it for tracking cost, schedule and performance. Gantt charts are used for exhibiting program progress or defining specific work required to accomplish an objective. They often include such items as listing of activities, activity duration, schedule dates, and progress-to-date. PERT also is used which stands for â€Å"Program evaluation and review technique†. It is also called â€Å"critical path method†. It is an event-oriented planning aid, usually computerized used to estimate project duration when there is uncertainty in estimates of duration times for individual activities. It helps the project team to order the activities that must be completed to implement a decision. A Work Breakdown Structure is a results-oriented family tree that captures all the work of a project in an organized way. WBS breaks down project into major modules by breaking down into activities and, finally, into individual tasks. Identifies activities, tasks, resource requirements and relationships between modules and activities. The prime benefit of WBS is its effective aid in the planning process. As WBS evolves, it becomes easier to revise and update plans. Responsibilities can be assigned at different points of the WBS hierarchical tree, both managerial and technological. The main rationale behind crashing activities is to analyze the normal activity costs and costs under maximum crashing and to find the shortest times with crashing. And we must realize that new paths may become critical and make sure that all of the alternatives are true. And the main rationale to use PERT or CPM is the approach of timing. With CPM, we define that activities have certain completion times with minimal deviations. With PERT approach, we assume that activities have average completion times with a standard deviation, therefore time is an uncertainty.

Monday, September 16, 2019

Books and e-books Essay

In time of technical progress e-books are getting more popular day by day, but still most of the people prefer hard copy of books and do not support new fashion wave. Book has always been the best present for any kind of occasion, it is something that does not have an expiration date and it will always be in fashion. However, you cannot give e-book as present, of course you can send my e-mail, but you cannot put your sign and it sort of loosing meaning as a present, because you cannot touch it. On the other hand prices for e-books are lower and you can get a variety of free e-books, so everyone can enjoy literature from all of the world, but you should have special gadget to read e-books, and it is additional expanses for reading. In contrast, printed books are sort of pricy, and you cannot buy as much books as you want, as a result you are not trying to read new authors whose creations had not become bestsellers. Spending money on books is good investing, because you can collect a library and after you can leave it for next generations, as I mentioned before book is the product that does not have an expiration date. Having your library in an electronic devise it is a risky business, by reason on viruses that attacking devises every day and deleting all information from them or you can just loose an e-reader with all your book collection. Also hard copy book does not need to be charged and you can read as much as you want and wherever you want, unlike e-book is charging from electricity.

Sunday, September 15, 2019

Review of Literature Essay

2.1Introduction This chapter reviewed the available literatures written on this topic and in other related areas in this chapter. This was made possible by the identification, collection and review of these literatures from various sources such as text books, journals, reports and the internet. 2.2The Concept of ATM ATM is typically made up of the CPU for controlling the user interface and transaction devices, magnetic or Chip card reader for identifying the customer, display which is used by the customer for performing the transaction, function buttons usually close to the display or a Touch screen used to select the various aspects of the transaction and a record printer which provides the customer with a record of a transaction (Cronin and Mary, 1997). Most ATMs are connected to inter bank networks, enabling people to withdraw and deposit money from machines not belonging to the bank where they have their account or in the country where their accounts are held thus enabling cash withdrawals in local currency (Maxwell, 1990). They are often identified by signs above them indicating the name of the bank owning them. 2.2.1Evolution of ATM ATM is said to have evolved from early cash dispenser and is said to have first been introduced in the early 1970’s. The dispensers were operated by a token inform of a punch card. This enables a customer to withdraw as sachets of suitable values of bank notes. These sachets processes and then return the card to the customers. Another source has it that ATM concept was started around 1967, and that it was first installed in Endfield town, on the London Borough of Endfield by Barclays Bank. Thomas (1996). This is said to have been accredited to John Shepherded Baron, although George Simon registered patent in New York and Don Wetzel and two other Engineers from Docatel Company also registered patent in June/ April 1973. Brendan (1996). This in the second generation was improved to the extent that made it possible to count proved money. 2.2.2Operation of ATM ATMs typically connect directly to their ATM Controller via either a dial-up modem over a telephone line or directly via a leased line. Leased lines are preferable because they require less time to establish a connection. Musiime and Biyaki, (2010). It is observed that, most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip that contains a unique card number. Security is provided by the customer entering a personal identification number (PIN). For one to access ATM service, he/ she (the card holder) has to insert the card (magnetic strip card) into the machine (ATM), which then reads the strip and makes contact with the central computer to confirm the genuity of the card which is either accepted rejected depending on whether it is valid or not. When accepted, the customer then punches his/ her PIN number which is then verified according to its compatibility with the information stored in the card. After w hich it then perform the service requested of like (issuing cash, accepting cash/ cheque deposit, balance enquiry, mini-statement) etc, and finally ejects the card. 2.3Effectiveness of ATM Without usage of technology the banking sector cannot provide customers with effective services (Patricio et al., 2003). Effective service delivery is a new or significantly improved service concept that is taken into practice (Drake, 2001). Customer expectations concerning service encounter experiences and service delivery mechanisms as well as the entire concept of what constitutes quality service are therefore key issues that need to be considered prior to the implementation of any structural change. Patricio et al. (2003). Effective service delivery is a service product or service process that is based on some technology or systematic method. It can be a new customer interaction channel, a distribution system or a technological concept or a combination of them. (Kelley et al. 1990). Kumbhar (2011). Observed that effectiveness of service provision have a significant relationship with overall customer satisfaction. Effective service delivery is positively related to customer satisf action in that, when a customer perceives that the delivery mode of the transactions that the bank is supposed to offer is quite good, the more the customers will be satisfied with the bank services. The Concept of Customer Satisfaction Cacioppo (2000) defines Customer satisfaction as the state of mind that customers have about a company when their expectations have been met or exceeded over the lifetime of the product or service as quoted by MALCOLM (2008). Increased customer expectations have created a competitive climate whereby the quality of the relationship between the customer and bank has taken on a greater significance in some cases than the product itself. (Musiime and Biyaki, 2010). Krishnan et al (1999). Point out that, the banking industry strives to succeed by putting the topic of rapid and changing customers needs to their agenda. This can be achieved through good customer care and offering attractive services or products that other competitors may not offer. Therefore, customer satisfaction is seen as a key performance indicator within business. The concept of customer satisfaction occupies a central position in marketing and practice (Cardozo, 1965). Customer satisfaction is a person’s feelings of pleasure or disappointment resulting from comparing a product’s perceived performance or outcome in relation to his or her expectations. (Musiime and Biyaki, 2010). In summary, Customer Satisfaction is the actual meeting of customer’s expectation after he or she has completed consuming a product or service. 2.4.1 Who is a Customer A customer is the most important visitor on our premises. He is not dependent on us. He is not an interruption to our work. He is the purpose for it. He is not an outsider on our business rather he is part of it, we are not doing him favor by serving him rather he is doing us favor by giving us an opportunity to do so. Wasswa, (2003). Pg 35. He further described a customer as one that enables the organization exists. They are the purpose of our business. In my own view, I believe that, customers are the heart, the life and the soul of our businesses, without whom we can’t hold even for a second to exist in business. Hence they should be accorded utmost respect and care when rendering service to them. 2.4.2Importance of Customer satisfaction Khirallah (2005) defines customer satisfaction as; a customer’s perception that his or her needs, wishes, expectations, or desires with regard to products and service have been fulfilled. Consumer satisfaction in short can therefore be defined as an evaluative process that contrasts pre-purchase expectations with the actual perceptions of performance during and after consumption experience. In summary, Customer Satisfaction is the meeting or even exceeding of a customer’s expectation after the use product. The outcomes of satisfying a customer are:- Customer loyalty- LOYAL customers are those who have the enthusiasm about the brands or products they use. The more enthusiastic a customer is, the higher the profit contributed to the brand. (MALCOLM 2008). Musiime and Biyaki,(2010). Loyalty is a combination of intentional repurchase behavior and psychological attachments of a customer to a particular service provider. The fundamental assumption of all the loyalty models is that keeping existing customers is less expensive than acquiring new ones. In summary, Loyalty is customer’s demonstration of faithful adherence to an institution despite the occasional errors. Thus satisfying a customer is very paramount to organizations existence. Customer retention- Customer Retention is the ability to hold on to customers over time. Joseph and Stone (2003). Customer retention is the activity that the selling organization undertakes to reduce customer account defections. It can also be described as a series of actions that the selling organization undertakes to reduce defections. Musiime and Biyaki, (2010). Ganesh et al., (2000)., observed that, long-term, customers become less costly to serve due to the bank’s greater knowledge of the existing customer and to decrease serving costs. They also tend to be less sensitive to comparative marketing activities (Czepiel, 1990). Loosing customers not only leads to opportunity costs because the reduced sales, but also to an increased need for attracting new customers which is five to six times more expensive than customer retention (Joseph and Stone, 2003). 2.4.3The relationship between ATM use and Customer satisfaction Earlier research by Brownlie (1989) has recommended that some consumers have positive attitudes towards ATMs based on dominant perceptions of convenience/accessibility/ease of use. As observed by Malcolm (2008). On the other hand, Reichheld and Sasser (1990) have recognized the benefits that customer satisfaction delivers to a bank. For instance, the longer a customer stays with a bank the more utility the customer generates. This is a result of a number of factors relating to the time the customer spends with a bank. Without usage of technology the banking sector cannot provide customers with a satisfactory service (Patricio et al., 2003). Effective service delivery is a new or significantly improved service concept that is taken into practice. Musiime and Biyaki,(2010). According to, Patricio et al. (2003) customers will use different service delivery systems dependent on their assessment of each channel and how it contributes to the overall service offering. Hence service satisfaction will not merely be based on isolated service encounters and experiences but rather on the overall feelings of satisfaction. With automated teller machines networks already in place in most of the urban areas, the drive is now focused towards the rural areas where the use of automated teller machines is still uncommon. Musiime and Biyaki,(2010). 2.5Conclusion From the review of literature, it can be observed that the operation and use of ATM services in the financial sector, has contributed a lot in changing the way in which financial services and products are being delivered to the banks clients. As the say goes that, for every step forward (development), a lot of challenges must have been faced, fought and overcome. Thus the development of ATM saw the emergency of some challenges for the industry as customers keep demanding for better service, while the financial institutions are very busy searching for the most efficient way by which they can improve on their service provision.