Wednesday, September 2, 2020

Locke’s teachings on economic growth and material prosperity Essay

As indicated by Locke, God gave man normal responsibility for under the sun (10). God simultaneously gave man the explanation, which He proposed him to utilize in order to change over what was possessed mutually into exclusively. Man proceeded in utilizing his natural explanation and he contemplated that he can place in some work †which is his by right, and in this manner, he joined the regular property with his own property (understanding work) and in the process changed over the possession from collective to individual’s (Locke12). Man made possession to make what is publicly claimed valuable and simultaneously keep away from the way toward picking up assent of the various proprietors. One was possibly viewed as a legitimate own if the thing in his ownership was for his satisfaction and not to be spoilt. This doesn't make a difference to plants and creatures alone, however the equivalent can be placed practically speaking when managing land. To stay away from strife between men, God gave each man capacity to work, so the land parcel one improved through work was his for the taking, and the constraint of the amount one can possess was to be dictated by the amount he can work and the quantity of his needs. Work became something significant in that, it was through it that the estimation of land was estimated against and furthermore the more one toiled the more his expectation for everyday comforts improved. That is the explanation with respect to why Locke suggested that the England day workers lived well than American King, on the grounds that the previous realized how to expand the estimation of land through work and this meant a superior life. Locke is featuring that, among the three: land, nature and work, the last goes ahead top of the previous two (16). Aptitudes and developments are the branches of work and they came to make life considerably progressively comfortable. With the expansion in number of individuals and creature and the utilization of cash, shortage of land rose which drove the estimation of the land up. Man chose to put a few strategies in order to keep away from strife that would have emerged because of shortage of the land a similar pretended by industry and work there previously (17). To maintain a strategic distance from wastage, man thought of exchanging of things which would some way or another ruin if not devoured quick and during the time spent searching for something solid and significant. This is the manner by which cash came in being. The characteristics of valuability toughness and shortage brought in cash to be much more significant than work and it did what the last couldn't have done: empowering man to extend his assets. So it is consistent with state that arrived at his objective of monetary development and material flourishing through the advert of cash. Be that as it may, this isn't the main fixing. As from the above conversation, land, government strategies, nature and work are other prerequisite. For one to be determined to the method of riches creation, it is foremost to adjust every one of these variables. I do concur with all of Locke contentions for he is catching the truth of today. The main significant fixing that he has not explained in a point by point way is showcase, which is another significant mainstay of riches creation. Without the above fixings, riches creation will remain however an unrealistic fantasy. Every one of these variables have added to inconsistent responsibility for. This circumstance has delivered a few difficulties, one of it being the development of social classes: working classes, bourgeoisies and blue-bloods which are all in consistent clash. This adds to horror rates, prostitution, debasement just to specify however a couple of indecencies. Works Cited Locke, John. Second Treatise of Government. 9 Mar. 2008. 11 Aug. 2010. http://www. earlymoderntexts. com/f_rights. html

Saturday, August 22, 2020

Morality and The Holy Bible :: Holy Bible Essays

Profound quality and the Bible  Both the legitimate and salvation methods of reasoning of the Old and New Testaments mirror those of the way of life around them, because of much duplicating and getting of laws and thoughts. Besides, all social orders far and wide have comparable good and lawful codes - which is absolutely not a mishap.  Strangely enough, the ethical codes of the world's religions look somewhat like one another, with just minor varieties. Religions as various as Hinduism, Islam, and Buddhism all have banishments against murdering, lying, cheating, taking, and so on. This isn't a mishap, for reasons we will investigate beneath.  Christians may then object that that there is something novel about the Bible that makes it an unrivaled good code. Tragically for Christians, there is in reality almost no law in the Bible - either Old Testament or New - that is unique. Think about the Torah of the antiquated Jews. The laws of the Babylonians, Assyrians, Sumerians, Hammurapi, Eshnunna, Hittites, Mishnah, and Israelites all look to some extent like one another, because of far reaching replicating of laws. Common social standards delivered indistinguishable laws against magic, grabbing, offer of a stole individual, bogus observer, business deceitfulness, paying off adjudicators, property right infringement, stopping water system trenches utilized by others, and so on. The total rundown of indistinguishable laws and customs is very broad.  Nor is the New Testament's way to deal with the law special. Most Christians can likely consider nothing more one of a kind than the Apostle Paul's way to deal with the law, however any understudy of antiquated Greece knows in any case. A large number of the subjects that fill Paul's compositions were lifted from his Greco-Roman foundation. During New Testament times, the Greco-Roman world was loaded up with Mystery Cults, donning such names as Eluesinian Mysteries, the Orphic Mysteries, the Attis-Adonis Mysteries, the Isis-Osiris Mysteries, Mithraism, and numerous others. A typical component of these mystery factions was a faith in a courageous savior, a radiant being who might visit earth in human structure, fight underhanded, kick the bucket a conciliatory demise, become alive once again and rise to paradise, offering salvation from death to all who tail him.  Another impact on the New Testament was Greek way of thinking. Specifically, Greek dualism instructed that the world was strongly separated into alternate extremes: great and insidiousness, body and soul, man and lady, hot and cold, life and demise, and so forth. Presently, the Greeks from Plato on had trained that the body is detestable, however the spirit is unadulterated.

Friday, August 21, 2020

How to Accept Payments With WordPress (2 Easy Options Explained)

Hoping to acknowledge installments with WordPress? Regardless of whether youre propelling an all out web based business store or simply hoping to list a couple of items or administrations available to be purchased, WordPress has a lot of usefulness to assist you with doing only that.Two of the best choices to getting that going are WooCommerce and PayPal Buy Now Button â€â bothâ are simple to set up and use and they give two distinct degrees of intricacy to suit your remarkable needs. In the event that you simply need a lightweight arrangement appropriate for posting few items or administrations, PayPal Buy Now Button is for you. What's more, if youd like an increasingly intricate and adaptable arrangement, you may incline toward going with WooCommerce. In any case, were going to show you how!Introducing PayPal Buy Now Button PayPal Buy Now Button Author(s): Scott PatersonCurrent Version: 1.7.2Last Updated: June 3, 2019wp-online business paypal.1.7.2.zip 92%Ratings 128,892Downlo ads WP 3.0+Requires The PayPal Buy Now Buttonâ pluginâ is a clear apparatus to assist you with tolerating installments with WordPress. You can utilize it to embed a catch †or a few of them †anyplace on your site, and that catch will empower clients to pay you through PayPal. This module is extraordinarily easy to introduce, and designing it shouldnt take in excess of a couple minutes.Before we hop into the directions, you might be intrigued to realize that PayPal does empower you to include installment fastens physically, without the utilization of a module. You dont need a record to do it either †simply adhere to PayPals guidelines and youll get a code scrap that you can add to a page or post.If youre watchful about managing code, notwithstanding, PayPal Buy Now Button is a strong elective that additionally will spare you some time on the off chance that you have to make an enormous number of installment catches. Peruse on to discover how to utilize it.How to utilize PayPal Buy Now Button to acknowledge online paymentsAfter introducing and initiating the module, youll see another PayPal Button alternative under Settings onâ your dashboard. Tapping on this choice will send you to the modules fundamental settings screen, where you can pick a language and money for your button:If you look over somewhat further down, youll discover a choice to enter your PayPal Merchant ID (a special identifier for those of you who have dealer accounts) or a normal email address. Youll need at any rate one of theseâ to begin getting payments:Finally, you can likewise pick from among a few catch styles at the base of this page, just as demonstrate whether PayPal should open in a similar window or another one when a client taps on the button.After sparing your settings, distinguish the page or post where you need to incorporate your first PayPal button and openâ its proofreader. Youll locate another PayPal Button choice right close to Add Media:Click on it , and afterward you should simply demonstrate a name, cost, and arrangement for your button:Once youre done, click on Insert and the module will add a shortcode to your page. Your catch will presently appear toward the front of your site.Easy as pie, isn't that so? In the event that youre searching for an all the more remarkable choice, nonetheless, read on to find a magnificent elective you might need to take a stab at out.Introducing WooCommerce Author(s): AutomatticCurrent Version: 3.7.1Last Updated: October 9, 2019woocommerce.3.7.1.zip 92%Ratings 77,312,503Downloads WP 4.9+Requires WooCommerce is one of the most mainstream online business alternatives for WordPress clients, and with goodâ reason. This module feels like a characteristic expansion of WordPress directly out of the case, and it packs all the highlights youll need to make and deal with an online store. Besides, there are many helpful augmentations accessible that can add additional usefulness to your site.The center distinction between this one and the PayPal Buy Now Button module is that WooCommerce is a completely fledged internet business store arrangement its a total online store. Though PayPal Buy Now Button is a basic purchase button that just permits you to gather an installment for a particular thing, however isn't associated with any online store functionality.One of WooCommerces coreâ features is, obviously, tolerating installments with WordPress. Itâ enables clients to pay you utilizing either PayPal or Stripeâ †as long as you turn those settings on †yet it additionally gives you an approach to include more decisions. By utilizing augmentations, you can include incorporate pretty much every major online installment door into your store. So if youre searching for a module that lets you keep your alternatives open, this is it.Just as in the past, the primary thing youll need to do isâ install and initiate the module. When youre finished with that, continue to the followi ng section.How to utilize WooCommerce to acknowledge installments with WordPressAs soon as you enact WooCommerce, youll be taken to an arrangement wizard that will help youâ configure your online store without any preparation. At the point when you get to the fourth step,â youll be capable toâ choose the installment portals you need to enable:By default, WooCommerce ships with two famous installment entryways: PayPal and Stripe. You can design each by exploring to WooCommerce â†' Settings â†' Checkout on your dashboard, and finding the relating choice at the highest point of the screen:For model, tapping on PayPal will send you to another page where you can arrange where your installments will go, and alter the various settings youll need:The installment portals youâ selectâ will show up when a client attempts to look at, so you should simply empower and design every one. At that point your store will be prepared to go!As we referenced before, you can likewise utilize W ooCommerce expansions to add greater installment doors to your list. Setting these extensionsâ up works only equivalent to with different WordPress modules, and you can discover themâ in the WooCommerce repository:After empowering theâ extensions you need, youll see new choices show up on your WooCommerce Settings page. You can thenâ configure them utilizing the equivalent methodâ we portrayed previously. At that point, your clients can pick which installment choice they need to use toward the front of your site.Once youâ set up your installment choices, you should simply make WooCommerce items for the things that you need to sell.ConclusionFiguring out the most ideal approach to acknowledge installments with WordPress shouldnt be an untimely idea to setting up your webpage; its a basic advance to ensuring your site succeeds. All things considered, clients will immediately get disappointed in the event that they cannot pay effortlessly, and you wont have the option to concentr ate on developing your webpage in the event that you dont get your cash promptly.If youre searching for the least demanding approach to begin tolerating installments online, PayPal Buy Now Button might be the privilege module for you.On the other hand, if youd like to let your clients utilize more than one installment door, WooCommerce furnishes you with more other options (and accompanies a great deal of other incredible highlights that will assist you with setting up your store). How to effectively acknowledge online installments with #WordPress Click To Tweet Do you have any inquiries concerning how to acknowledge installments with WordPress? Fire away in the remarks area below!Free guide5 Essential Tips to Speed Up Your WordPress SiteReduce your stacking time by even 50-80% just by following basic hints.

Friday, May 29, 2020

Library management system based on finger print and rfid - Free Essay Example

Chapter 1:Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thu s ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Lon Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as transponders. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatenergizes the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements ID Priority Details NR-02-001 1 Delivery: The system development process and deliverable documents shall conform to the process and deliverables defined in the document CIIT-CE-02H Degree Project Students Handbook. NR-02-002 1 Standard: The standard of the final product shall be of undergraduate level or above. 3.2 External requirements ID Priority Details NR-03-001 3 Security: This is a degree project having no strict security requirements. NR-03-002 1 Ethical: The application will not use any type of un-ethical electronic material while project development and execution. NR-03-003 1 Legislative: The application shall not use any private or confidential data, or network information that may infringe copyrights and/or confidentiality of any personnel not directly involved in this product. NR-03-004 3 Safety: the application is safe and not harmful in any case. 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: ID Priority Details FR-01-001 1 PIC18F452 FR-01-002 1 MAX232 FR-01-003 2 NRF905 RF TRANSCEIVER FR-01-004 2 ID20 RFID READER MODULE FR-01-005 2 SM630 FINGERPRINT MODULE 3.3.2 Category 2 ID Priority Details FR-02-001 1 VISUAL STUDIO FR-02-002 1 MYSQL DATABASE APPLICATION FR-02-003 1 PROTEUS 7.6 FR-02-004 2 CCS COMPILER FOR PIC FR-02-005 1 PC EXPRESS FR-02-006 1 CIRCUIT MAKER 2000 FR-02-007 1 EASY PCB 3.3.3 Category 3 ID Priority Details FR-03-001 2 LM7805 REGULATOR IC FR-03-002 2 LM7833 REGULATOR IC FR-03-003 1 7 VOLTS POWER SUPPLY FR-03-004 1 BRIDGE RECTIFIERS Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 1 VCC 2 TRX_CE 3 CPCLK 4 AM 5 MISO 6 SCK 7 GND 8 TXEN 9 PWR 10 CD 11 DR 12 MOSI 13 CSN 14 GND 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 650s Figure 3 This transceiver was used because it has high data rate, long distance and low voltage consumption. Also it has some addition features like address matching, carrier detection alert and high noise immunity. 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 1 Power supply + 2 Module TX 3 Module RX 4 GND 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 1 GND 2 VCC 3 To external antenna and tuning capacitor 4 To external antenna 5 Card present 6 Future 7 Format Selector (+/-) 8 Data 1 9 Data 0 10 3.1 KHz logic 11 DC Voltage Supply 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output 7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. 1 C1+ + connector for capacitor C1 2 V+ output of voltage pump 3 C1- connector for capacitor C1 4 C2+ + connector for capacitor C2 5 C2- connector for capacitor C2 6 V- output of voltage pump / inverter 7 T2out Driver 2 output 8 R2in Receiver 2 input 9 R2out Receiver 2 output 10 T2in Driver 2 input 11 T1in Driver 1 input 12 R1out Receiver 1 output 13 R1in Receiver 1 input 14 T1out Driver 1 output 15 GND Ground 16 VCC Power supply The receivers reduce RS-232 inputs (which may be as high as 25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608 H This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit via RF transceiver for further process. RF transceiver keeps on transmitting until it receives acknowledgment from the main unit that correct data is received. The antitheft unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The RFID reader is operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. 5.4 working of Fingerprint Module The fingerprint module contains four pins connection which are VCC, TX, RX and GND. As PIC 18f452 has only one built-in serial port. CCS C compiler has feature to create software serial ports. So PORT E( E0 , E1) made software serial port for Finger Print Module. TX pin of Finger Print module is pulled up with 10kohm resistor and connected to the PIN_E0 (RX) of PIC 18F452 and RX pin of finger print module is connected to PIN_E1 (TX) of PIC18F452. Syntax for creating software serial port: #use rs232(baud=57600, xmit=PIN_E1, rcv=PIN_E0, parity=N, bits=8, stream=ts) 5.4.1 Steps to add new finger print Syntax: 0x4D + 0x58 + 0x10 + 0x03 +0x40 + high byte of the to be added fingerprint ID + low byte of the to be added fingerprint ID + Check Sum. Response from Fingerprint module: If operation successful: 0x4D + 0x58 + 0x30 + 0x02 + 0x40 + 0x31 + 0x48 If error occurred: 0x4D + 0x58 + 0x30 + 0x02 + 0x40 + 0x34 + 0x4B Flow chart of adding new fingerprint: 5.4.2 Steps to search Fingerprint Syntax0x4D + 0x58 + 0x10 + 0x05 + 0x44 + search high bytes of starting Fingerprint ID + search low bytes of low bytes + high bytes of the number of fingerprints searched + low bytes of the number of fingerprints searched + Check Sum. Response from Finger module: If fingerprint matched:0x4D + 0x58 + 0x30 + 0x04 + 0x44+ 0x39 + high bytes of ID for the found fingerprint + low bytes of ID for the found fingerprint + check sum If fingerprint not matched:0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x3A + 0x55 Flow chart for search fingerprint 5.4.3 Steps to format finger print database Syntax0x4D + 0x58 + 0x10 + 0x01 + 0x46 + 0xFC Response from Fingerprint module: If operation successful: 0x4D + 0x58 + 0x30 + 0x02 + 0x46 + 0x31 + 0x4E Flow chart for Formatting Fingerprint Database: 5.4.4 Steps toDelete fingerprint Syntax: 0x4D + 0x58 + 0x10 + 0x03 + 0x42 + high bytes of the to-be-deleted fingerprint ID + low bytes of the to-be-deleted fingerprint ID Response from Fingerprint module: If operation successful: 0x4D + 0x58 + 0x30 + 0x02 + 0x42 + 0x31 + 0x4A If error occurred: 0x4D + 0x58 + 0x30 + 0x02 + 0x42 + 0x35 + 0x4E Flow chart for deleting fingerprint: 5.5 Working of RF transceivers The RF transceiver used in the system had 14 pins, 2 of ground and 1 VCC. We use built-in SPI interface for transceiver module. SCK pin of RF transceiver is connected with SCK pin of microcontroller. SDI and SDO pins of RF transceiver are connected with SDO and SDI pins of microcontroller, respectively. DR pin of RF transceiver is connected to INT0 pin of microcontroller. TRX_CE, TXEN, PWR, AM, CD and CSN pins of RF transceiver are connected to RA0, RA1, RA2, RA3, RA5 and RC1 respectively. 5.5.1 Steps to Transmit Data: When the microcontroller has data for a transmitting, the address of the receiving node (TX-address) and payload data (TX-payload) are clocked into RF transceiver through the SPI interface. Microcontroller sets TRX_CE pin and TX_EN pin=1 (high), this activates RF transceiver for transmission. Radio is automatically powered up (PWR pin=1). Data packet is completed (CRC calculated, preamble added). Data packet is transmitted (50kbps, GFSK, Manchester-encoded). When data packet transmission is completed it sets Data Ready (DR) pin=1(high). If AUTO_RETRAN pin=1(high), the RF transceiver continuously retransmits the packet until it sets TRX_CE pin=0 (low). When RF transceiver sets TRX_CE pin=0 (low), it finishes transmitting the outgoing data packet and then it sets into standby mode (Sleep mode). Flow chart for transmitting Data through RF transceivers: 5.5.2 Steps to Receive Data 1) Receiving mode is selected by setting TRX_CE=1 (high) and TX_EN=0 (low). 2) After 650s RF Transceiver starts monitoring the air for incoming communication. 3) When the RF Transceiver receive a carrier at the receiving frequency 434 MHz, it sets Carrier Detect (CD) pin=1 (high). 4) When an address matches, it sets Address Match (AM) pin=1 (high). 5) When a valid packet has been received (correct CRC found), RF Transceiver removes the preamble, address and CRC bits from the data packet and sets the Data Ready (DR) pin=1 (high). 6) Microcontroller receives payload data from RF transceivers by SPI interface. 7) Microcontroller sets the TRX_CE pin=0 (low) to enter standby mode. 8) When all payload data is retrieved, RF transceiver sets Data Ready (DR) pin and Address Match (AM) pin = 0 (low) again. Flow chart for receiving data: 5.6 RFID Reader The RFID reader has 4 pins. VCC, TX, RESET, GND. PORT B (B7, B3) made software serial port for RFID reader. TX pin of RFID reader is connected to the PIN_B7 (RX) of PIC 18F452 and RESET pin of RFID reader is connected to PIN_B6 of PIC18F452. Syntax for creating software serial port: #use rs232(baud=9600, xmit=PIN_B3, rcv=PIN_B7, parity=N, bits=8, stream=RFID) RFID reader automatically detects RFID tag and sends its ID to microcontroller for further processing. Microcontroller reset RFID reader after receiving ID from it. Flow chart of RFID reader working: 5.7 Compiler used for microcontroller Microcontroller compiler used is CCS C compiler for PIC. This was used due to professional reasons. It provides a complete integrated tool suite for the debugging and developing embedded system running on Microchip PIC. The heart of this development tools suite is the CCS intelligent code utilizing C compiler which frees designers in order to concentrate on the design functionality instead of need to become an MCU architecture expert. 5.8Software implementation The student form is created in the visual studio tool. Various information is saved in it as per required for a student console. These forms are linked to the database contents. The student form is shown below: Figure 17 This is the form for saving the student record in the database. One the student record has been saved, every time the student places his finger or thumb on the fingerprint reader, its thumb string is compared in the database. Through an automatic system coded in the visual studio tool, the form which appears on the screen of the student login is as follows: Figure 18 In this form, the student information field is read only and cannot be edited. The book record field has the student library status, which has a checkbox for issued or non-issued status. 5.9Database system The data base structure is simple and consists of some details as under: CREATE DATABASE `LibrarySystem`; Table Name: CREATE TABLE student( `txt_name` VARCHAR( 30 ) NOT NULL , `txt_id` VARCHAR( 30 ) NOT NULL PRIMARY KEY, `txt_address` VARCHAR( 60 ) NOT NULL , `txt_library_status` VARCHAR( 20 ) NOT NULL , txt_finger_print` VARCHAR( 60 ) NOT NULL, txt_book_name` VARCHAR( 40 ) NOT NULL txt_book_name` VARCHAR( 60 ) NOT NULL, ) ; Chapter 6: Evaluation We have focused on thorough testing through-out the design and implementation phase. Starting from the theoretical design and ending at the practical implementation. In this procedure there were a lot of hurdles especially regarding the PCB design of the reader. The TRX7960 IC which was being used in the design of the reader was not available in Pakistan. It was imported from china which took a long time and thus shortening our time for the design of the reader. The tinning process required for the PCB design of the reader was quiet expensive and required much time. Thus we switched to the RFID module as it was much compatible with our system and easy to use. The wireless communication between the two units i.e. main and anti-theft unit was our first task successfully completed. Then the register calling of fingerprint module and setting its commands, and finally the code for the RFID module was accomplished. The design of the software side which consisted of the database, the studen ts form, and the interface between the data from the serial port and the database components was quiet an easy task. It was accomplished within few days. Although hundred percent of our system design was not accomplished, hurdles such as non availability of the reader IC in Pakistan and 2-3 months required for the accurate PCB design of the reader circuit, still there was much to learn and acquire. At the end, it is not about the hundred percent success that one gets, its about how much one has learnt from his failure. 6.1 Function Testing Before and after integrating the system, testing was done and the results were as follows: Testing Requirements PIC 18F452 and DC supply Requirement Tested CYCLE 1 CYCLE 2 FINAL STATUS DETAILS FR-03-001 Failed Ok Ok Regulator IC FR-03-002 Ok Ok Ok MAX232 IC FR-03-003 Ok Ok Ok SIP FR-03-004 failed Ok Ok Crystal oscillator FR-01-001 FR-01-002 Failed Failed Ok Serial communication Failed(dead) Failed(dead) Ok transceiver FR-01-005 Ok Ok Ok Fingerprint module 6.2 Results After thorough testing of the components, these were integrated together and the overall system faced failure more than four times. After recovering all the unexpected errors in the system, it started generating correct outputs. Then it was interfaced with the PC through serial communication which also faced much error. Finally all the data was sent to the PC and processed using visual basic and compared with the database components. Chapter 7: Conclusion and Future work 7.1 Conclusion The objective of our project Library Management System Based On Finger Prints And RFID was to design a system based on RFID technology that not only enhances the library security but also covers the idea of library automation. The final design of the project accomplished the idea of multinode environment and it is responsible for issuing books and the security of books through anti theft unit. This design also deals with the issues (reliable data transfer) of multinode environment. This project facilitates the users in numerous ways like time saving in issuing books, security, library management, categorizing and many more. 7.2 Future work Based on the ways in which some businesses are currently using radio frequency identification, people use to say that the world will be very different once readers and RFID tags are everywhere. In an RFID-enhanced future, the benefits would accrue not just to businesses, but also to consumers. Some benefits of RFID to the customers may include: Easy item returns: You might be able to return RFID-tagged items of apparel without a store receipt. The unique identifier in the tag would reference a database record with the time of purchase and the original price and even credit card information, if desired. Smart appliances: Your washing machine could choose its cycle setting based on tag information in the items to be washed. Your smart refrigerator could take inventory automatically, alerting you to expired or recalled foodstuffs, creating shopping lists automatically, and even searching the Internet to find recipes you can prepare with the items in the refrigerator. Your closet could alert you to what clothing it contains and what is out for cleaning and search the Internet for fashion advice Personalization: You might carry an RFID tag that stores (or references) personalization data. When you walk up to a clothing rack in a shop, LEDs might flash on the hangers with items in your size and preferred colours. Easy shopping: You could purchase or rent items by simply walking out of a shop with them. The RFID payment device in your pocket and the RFID tags in the items you carry would allow payment to be made automatically. RFID is said by many in the industry to be the frontrunner technology for automatic identification and data collection. The efficient use of this technology can greatly enhance the library environment and thus prove a technological milestone in the sector.

Saturday, May 16, 2020

The Economic Crisis Of The United States - 1900 Words

The Great Recession, coinciding with the subprime mortgage crisis, lasted from the end of 2007 to the middle of 2009. This downturn became the biggest economic crisis that the United States had faced since the Great Depression. Causing high unemployment rates, a decline in consumer confidence and home values, the recession had a great impact on both Americans and immigrants in the United States. Since the 1990s to a few years before the recession, the number of immigrants entering the United States increased at a constant rate as more and more people came to the country in search for better job and education opportunities. This number dropped, however, when the country entered the economic crisis in 2007. The American Community Survey†¦show more content†¦This recession was a combination of the United States recession, that lasted from December of 2007 to approximately June of 2009, and the global recession in 2009 that proceeded. The recession in the United States was a res ult of the banks’ inability to pay off their accumulated debt. It all began when there were housing booms, which involved mortgage-backed securities (MBSs), or stocks backed by mortgages. Due to the real estate market collapse in 2007, those securities declined in value and jeopardized solvency, or â€Å"the ability of a company to meet its long-term financial obligations†, of banks that were too much in debt. Though there were many major problems that resulted from the recession, the drastic increase in unemployment rates became the biggest negative effect of the economic crisis. According to the statistics from The Encyclopedia of the Great Recession, â€Å"By March 2008, 63,000 jobs were lost, the most in five years†¦Ã¢â‚¬  (Rosenberg, 599: Unemployment). During the period of decline in economy, revenues decreased and businesses stopped expanding. Moreover, when demand was too low to support the businesses, employers needed to reduce their spendings and save money by lowering wages, stop hiring new workers, and firing old ones. The Great Recession, therefore, initiated the mass discharge of employers and reduced job opportunities for immigrants who had come to

Wednesday, May 6, 2020

The Writing Style of Khaled Hosseini in A Thousand...

The writing style of Khaled Hosseini in A Thousand Splendid Suns is both sympathetic and disgusted. He feels pity on those that bear the burden of the war. He shows this mostly through the use of two major literary devices: Symbolism and Imagery. These two literary devices impact the reader because it gives a deeper insight and understanding of the pain and fear these characters were forced into dealing with every day. An example of how Hosseini feels disgusted and sympathetic is when one of the main characters, Mariam Jo, is forced to go live with her father after her mother’s untimely death on page 36, â€Å"suddenly he was standing in front of her, trying to cover her eyes, pushing her back the way they had come saying ‘Go back! No. Don’t†¦show more content†¦Her own band was a little tight, but he had no trouble forcing it over her knuckles†. The symbolism in this quote is with the description of the size of the bands and the force Rasheed used to force the band over her knuckles. Due to the fact that the bands were â€Å"thin† is a portrayal of the future marriage to come. The force Rasheed uses to put the gold band on her finger is an indication of the hidden persona that lies dormant beneath the weight of his current desire. The disgust of the forced marriage is portrayed through the physical description of Rasheed. The third example is on page 104 after Mariam has had multiple miscarriages and has yet to provide Rasheed with a male heir. â€Å"‘CHEW!’ He bellowed. A gust of smoky breath slammed against her face. Mariam chewed. Something in the back of her mouth cracked. ‘Good.’ Rasheed said. His cheeks were quivering. ‘Now you know what your rice tastes like. Now you know what you’ve given me in this marriage. Bad food and nothing else.’ Then he was gone, leaving Mariam to spit out pebbles, blood and the fragments of two broken molars†. Hosseini’s symbolism in this passage is in the location of the teeth and the blood spit out. The fact that the teeth were in the front indicated and hidden emotional pain that she will then learn to hide easily. The blood is just a representation of the physical pain to come. Reading this imagery makes us very sympathetic for Mariam and was gain a great disliking of Rasheed. The fourthShow MoreRelated1000 Splendid suns1913 Words   |  8 Pages A Thousand Splendid Suns Research Paper The People of Afghanistan have struggled with invaders in there country for many decades. The intrusion of the soviets in 1979 was the first intrusion on the Afghan people. Many people were affected by the manifestation of the soviets and either ran away or lived in fear and war. Luckily, famous author Khaled Hosseini and his family were moved out of Kabul a few years before the Soviets invaded. Khaled Hosseini and his novel, A Thousand Splendid Suns, showsRead MoreAnalysis Of A Thousand Splendid Suns By Khaled Hosseini953 Words   |  4 PagesIt is Wednesday morning at Varina High School. 10:40 to be exact. I am in Pre-AP English. There are approximately 12 students in the classroom. â€Å"Good morning class† said Mrs. Martin. â€Å"To complete our style unit, we will be reading A Thousand Splendid Suns by Khaled Hosseini.† After learning the fact that we will once again be reading another book, many of the students had the usual reaction after receiving another inte nse assignment. â€Å"Ugh we just read a book by this guy already, the storyline is

Tuesday, May 5, 2020

AP World History Chapter free essay sample

Expansion Integration All classical civilizations expanded New challenges: How did they cooperate? O Seminal thinkers brought central values; Confucius, Laozi, Buddha, Socrates Unity attempts O China= Centralize the government S Royal citizens - resettlement around the government S Language promotion S Confucian hierarchy S India= Hierarchy society S Caste system S Hinduism O Mediterranean S Local autonomy (freedom in life for their people; High tolerance) S Laws S Citizenships S Economic interdependence 2. Non classical Developments Africa S Kush - Axum - Ethiopia Later foundation of Ghana C] Writing, religious conversion Oudaism Christianity), iron, divine rule of Kings Japan S Writing, agriculture, Shintoism, Iron, Divine rule Europe S Little independent development, Regional ruling, polytheistic, interaction with Rome Central America S Olmecs Monuments; Corn, potato, Few domesticated animals, Calendar, Writings S Mayans Foundation on the Olmecs S Incas Similar to Maya and Inca, built cities religious monuments S Lacked benefits of interaction (wheel and irons were scarce) Polynesians (In Pacific) S Fiji, Samoa, Hawaii C] Outrigger canoes , caste system (particular in Hawaii), Divine rule (king based) Central Asia S Nomadic Herders, Trade route intermediaries (middleman ,Whole sale people), technologies (stirrups) S Invasion of civilization - population pressure spoils 3. Decline (and Fall or Revival) of Civilizations S 3 century of chaos (Similar to Era of Warring States) C] Fall because

Friday, April 17, 2020

Kodak Essays - Digital Photography, Kodak, Picture CD, Film Stock

Kodak INTRODUCTION Team Commander was tasked with providing a case analysis on Case 8, Kodak: Taking Pictures-Further. In doing so, Team Commander has provided a summary of the important case facts, current history and trends, strategic position, strategic plan, implementation plan, and the anticipated outcome. CASE SUMMARY In the fall of 1998 Kodak entered the digital camera market. Their goal was to change the clarity, usability, and life of Kodak moments- to make them bigger, better, and more enduring. Kodak set out to achieve this goal by supplying the digital camera market with its Digital Photograph Kit. The kit provided the home user with everything they need to take and share digital pictures. The kit included a Kodak DC20 Digital Camera, easy-to-use software packages, and paper for making quality prints. Also, as part of the processing the consumer received a CD, called Photo CD, which contained pictures that could be loaded onto a computer. Kodak hoped its package would be simple and attractive to consumers. However, sales were disappointing. Kodak found consumers reluctant to move away from their familiar and functional traditional cameras. In addition, this form of picture taking required the user to be wired (connected to a computer). Kodak had not anticipated the magnitude of these problems. In an effort to bridge the gap between traditional and digital cameras. Kodak teamed with Intel. The result was digitization, the ability to convert traditional film to digital format through the standard photographic processing method. By checking Picture CD on the envelope containing the regular roll of film to be developed, consumers can receive their prints and a CD containing digital images. The CD also contains all the software necessary for viewing and altering the images. The processing cost is $8.95 to $10.95. In order to fine-tune the CD marketing program, Kodak and Intel conducted hundreds of one-on-one interviews with individual consumers and conducted test markets in Salt Lake City and Indianapolis. As a result of this effort, Kodak and Intel developed advertising and promotional campaigns for Picture CD. Kodaks advertisements showed the benefits of digital imaging and emphasized that people did not have to change their picture-taking habits. While, Intel followed with advertisements that primarily focused on computer users and Pentium II processors. Kodak intended to use collaborative advertising to communicate the simplicity of digital imaging that resulted from using Kodak Picture CD and to establish a strong connection between the product and high performance PCs. In moving to digitization, Kodak has extended well beyond its initial core competencies in cameras and film. Few consumers connected the Kodak brand with computers and computer technology. Thus, Kodak linked up with computer hardware and software firms, such as Intel, Microsoft, Adobe Systems, and Hewlett-Packard. This creates a whole new product category in the consumers mind, and combining the Kodak brand with those of its computer technology partners lends digital credibility and forges a quality image. Managing its brand name is important to Kodak. However, its chief competitor, Fuji, is making this difficult. In the mid-1990s, Fuji began aggressively pursuing the U.S. market, primarily through price-cutting. Fujis price war cut into Kodaks margins at the same time that Kodak was investing heavily in digital imaging and digitization. The result was a lot of red ink for Kodak. Kodak responded by cutting more than 7,600 jobs. This boosted the 1998 second quarter operating profit margin from 14.3 percent to 18.5 percent, which far exceeded Wall Streets expectations. That is the good news. The bad news is that the red ink kept flowing in the digital imaging division. In this division alone Kodak suffered a 5 percent sales decline in the quarter and a $64 million loss, following a $400 million loss in 1997. To withstand the continuing onslaught by Fuji, Kodak intends to cut another 12,300 jobs and reduce cost by another $1 Billion. Kodak understands that cost reductions will carry the firm only so far. However, Kodak stays committed to growing its digital imaging business and feels increased revenues will be the result of this commitment. To make it there, Kodak will have to sell consumers on digital imaging and digitization. In emphasizing digital, Kodak has been criticized for not paying enough attention to such basic problems in its core camera and film

Friday, March 13, 2020

Chalchiuhtlicue - Aztec Goddess of Rivers and Oceans

Chalchiuhtlicue - Aztec Goddess of Rivers and Oceans Chalchiuhtlicue (Chal-CHEE-ooh-tlee-quay), whose name means She of the Jade Skirt, was the Aztec goddess of water as it collects on the earth, such as rivers and oceans, and so was considered by the Aztecs the patroness of navigation. She was one of the most important deities, as protector of childbirth and newborns. Chalchiuhtlicue was linked to the rain god Tlaloc, in some sources as his wife and feminine counterpart. In others, she is Tlalocs sister and some scholars suggest she was Tlaloc himself in a separate guise. She was also associated with the Tlaloques, Tlalocs brothers or perhaps their children. In some sources, she is described as the wife of the Aztec god of fire god Huehueteotl-Xiuhtecuhtli. She is also associated with different mountains in different Aztec communities. All rivers come from the mountains in the Aztec universe, and the mountains are like jars (ollas) filled with water, that spring from the womb of the mountain and wash down to water and protect the people. A Watery Rule According to the Spanish conquistador and priest Fray Diego Duran, Chalchiuhtlicue was universally revered by the Aztecs. She governed the waters of the oceans, springs, and lakes, and as such she appeared in both positive and negative guises. She was seen as a positive source who brought full irrigation canals for growing maize  when she was associated with the corn goddess Xilonen. When displeased, she brought empty canals and drought and was paired with the dangerous snake goddess Chicomecoatl. She was also known for creating whirlpools and big storms making water navigation tricky. She was also the goddess who ruled over and destroyed the previous world, known in the Aztec mythology as the Fourth Sun, the Mexica version of the Deluge Myth. The Aztec universe was based on the Legend of the Five Suns, which said that before the current world (the Fifth Sun), the various gods and goddesses made four attempts to create versions of the world and then destroyed them in order. The fourth sun (called Nahui Atl Tonatiuh or 4 Water) was ruled by Chalchiutlicue as a world of water, where fish species were marvelous and abundant. After 676 years, Chalchiutlicue destroyed the world in a cataclysmic flood, transforming all the humans into fish. Chalchiuhtlicues Festivals As the partner of Tlaloc, Chalchiuhtlicue pertained to the Aztec group of gods supervising water and fertility. To these deities was dedicated a series of ceremonies called Atlcahualo, which lasted the entire month of February. During these ceremonies, the Aztecs performed many rituals, usually on the mountain tops, where they sacrificed children. For the Aztec religion, the tears of children were considered good omens for abundant rain. The festival month of February dedicated to Chalchiuhtlicue was the sixth month of the Aztec year called Etzalcualiztli. It took place during the rainy season when the fields were beginning to ripen. The festival was conducted in and around the lagoons, with some objects ritually deposited within the lagoons. The festival involved fasting, feasting, and auto-sacrifice on the part of the priests, and the human sacrifice of war captives, women, and children some of which were dressed in the costume of Chalchiuhtlicue and Tlaloc. Offerings included maize, the blood of quail birds and resins made of copal and latex. Children were also sacrificed to Chalchiuhtlicue at the height of the dry season just before the rains were due; during the festivals dedicated to Chalchiuhtlicue and Tlaloc, a young boy would be sacrificed to Tlaloc on a mountaintop outside of Tenochtitlan, and a young girl would be drowned in Lake Texcoco at Pantitlan, where whirlpools were known to occur. Chalchiuhtlicues Images The goddess Chalchiuhtlicue is often illustrated in the pre-Columbian and colonial period books called codices as wearing a blue-green skirt, as her name illustrates, from which flows a long and abundant stream of water. Sometimes new-born children are portrayed floating in this water flow. She has black lines on her face and usually wears a jade nose-plug. In Aztec sculpture and portraits, her statues and images are often carved out of jade or other green stones. She is occasionally shown wearing Tlalocs mask. The allied Nahuatl word chalchihuitl means drop of water and sometimes refers to jade. The word is also used in connection with Tlalocs goggles, which may themselves be a symbol of water. In the Codex Borgia, Chalchiuhtlicue is wearing a serpent headdress and dress ornaments with the same markings as Tlaloc, and her half-moon nose ornament is the serpent itself, marked with stripes and dots. Sources Edited and updated by K. Kris Hirst. Almere Read K, and Gonzalez JJ. 2000. Mesoamerican Mythology: A Guide ot the Gods, Heroes, Rituals, and Beliefs of Mexico and Central America. Oxford: Oxford University Press.Berdan FF. 2014. Aztec Archaeology and Ethnohistory. New York: Cambridge University Press.Brundage BC. 1983. The Fifth Sun: Aztec Gods, Aztec Worlds. Austin: University of Texas Press.Carlson JB. 2015. The Maya Deluge Myth and Dresden Codex Page 74. In: Dowd AS, and Milbrath S, editors. Cosmology, Calendars, and Horizon-Based Astronomy in Ancient Mesoamerica. Boulder: University Press of Colorado. p 197-226.Garza Gà ³mez I. 2009. De Calchiuhtlicue, Diosa de rà ­os, lagunas y manantiales. El Tlacuache: Patrimonio de Morelos 2009:1-4.Heyden D. 1983. Water symbols and eye rings in the Mexican codices. Indiana 8:41-56.Leon-Portilla M, and Davis JE. 1963. Aztec Thought and Culture: A Study of the Ancient Nahuatl Mind. Norman: University of Oklahoma Press.Taube K. 1993. Aztec and Maya Myths. Fourth Edition. Universi ty of Texas Press, Austin, Texa.s Van Tuerenhout DR. 2005. The Aztecs. New Perspectives, ABC-CLIO Inc. Santa Barbara, CA; Denver, CO and Oxford, England.

Wednesday, February 26, 2020

Pulp Fiction Movie Review Example | Topics and Well Written Essays - 750 words

Pulp Fiction - Movie Review Example The most obvious break from traditional film noir that Pulp Fiction makes is by being shot in color. The iconic image of this style of filmmaking is a perception arrived at through its very name. Film noir means dark film and one of its visual hallmarks is the symbolic use shadows and key lighting. Pulp Fiction introduces a new genre and closes the gap between itself and traditional. A film noir without a femme fatale is hardly a film noir at all. Mia Wallace fulfills the role of femme fatale from the start by almost literally acting as a siren who calls forth Vincent Vega into her lair. The classic femme fatale is a dangerous temptress within whose trap a not-terribly-bright man falls and Mia is certainly seductive enough toward Vince to get him trapped almost to the point of devastation once they return back home. It is exactly at this point that the standard conventions of film noir begin to fall apart. Film noir has a foundation of uncertainty and doubt that gives way to the darker impulses of the human mind. Upon returning back to Mia's house Vincent goes to the bathroom and engages in an interior debate over the intelligence of having sex with his boss' wife. In a standard film noir, any doubt naturally gives way to impulse rather than rationality. Vincent makes the decision to leave with a goodbye and it is only through the action of having doubts and that interior monologue that the subsequent events of the story take place and Mia goes into overdose. Film noir differs from conventional gangster, mobster, and detective movies through the introduction of shadows on the fringes of expected behavior; crooks can show goodness and law enforcement officers can become corrupt. The end is forecast equally well for both: destruction, probably in a violent way. Vincent's decision to give up the satisfactions of giving into the attraction with Mia can be read as a foreshadowing of what eventually becomes the thematic power of the film. Pulp Fiction's narrative is a distinctly non-linear manner shot out of chronological order. Jules seems balanced to become an important character only to disappear entirely for an hour and then make reappearance in exactly the same scene with which he was introduced. That scene includes something rarely found in the dark world of film noir: a reference to the Holy Bible. Jules likes to quote from the Bible before he assassinates and there is in this custom a link back to the wrath of God against sinners. The absence of Jules from the middle section of the film is a necessity that accounts for the non-linear construction. Vincent breaks with film noir tradition by rejecting the advances of a femme fatale, which is something that never happens in a classic noir film. Vincent's rejection is an indication of a more optimistic tone to be found in Pulp Fiction; a tone that contradicts the very root of film noir mechanics. Vincent's rejection of Mia is then compounded by the decision of Jules to reject his lifestyle. The middle part of the film of Pulp Fiction takes places after Jules has come to his decision to take his inexplicable escape from death in the opening of the film as a sign from God that it is time to walk away from his life as a hired assassin. If arranged chronologically the power of the scene in the diner would be taken away because it would become

Monday, February 10, 2020

Running Economy Essay Example | Topics and Well Written Essays - 1250 words

Running Economy - Essay Example Unfortunately the authors did not report the extent of the improvements in running performance. Yet it is well known that even a small increase in running economy dramatically improves running performance. Secondly in a study by Paavolainen et al, (1999) found that 9 weeks of explosive resistance training (plyometrics) improved running economy by 8.1% and this resulted in a 3.1% improvement in 5km running time without an increase in VO2max. The authors claim improved neuromuscular characteristics lead to this improvement. Running economy can be improved with resistance training and all endurance athletes studied performed resistance training without causing a reduction in VO2max or other endurance measures, thereby dispelling the myth that resistance training will hinder aerobic performance. However more studies are needed in this area to support these observations in already highly trained runners. All future studies should also always include a measure of performance e.g. Improved race time or time trial performance. It is well documented that the main physiological prerequisites for success in endurance events are VO2max, lactate threshold and running economy (in running events). In elite athletes, the VO2max has been found to be the dominant factor of success in endurance events. Traditionally, the training in endurance events such as long distance running and cross-country skiing has been targeted to improve the function of the cardio respiratory system to increase the VO2max, aerobic and anaerobic thresholds. There has been little attention to the anaerobic performance ability in endurance events. It is well documented that explosive strength and speed training cause specific adaptation to the neuromuscular system improving explosive force production ability such as rate of force development, increased rate of activation of motor units, improved anaerobic energy production and neural adaptation. When endurance athletes (runners, cross-country skiers) have engaged in explosive strength and sp eed training, it has been found that the endurance performance was improved significantly. Also, it has been noted that endurance athletes performing well in explosive strength tests outperformed their fellow athletes in endurance tests. Paavolainen et al. (1991) reported that national level cross-country skiers who engaged in explosive type strength training in addition to their normal training, were able improve their force-times i.e. improve their ability to produce a given amount of force in shorter time. This was also described by a significant improvement of jump heights in both static and counter movement jumps, whereas their counterparts in control group did not. The authors concluded that the explosive type strength training is beneficial to the cross-country skiers, which improves their force production ability without reduction in aerobic capacity. In another study, Paavolainen et al. (1999) studied the effects of explosive-strength training on 5-km running performance. In this study, the endurance athletes were able to improve their 20-m sprint time, 5-jumps and maximal isometric force in leg extensors as a result of explosive-strength type training. What was interesting, these athletes were also able to improve t

Thursday, January 30, 2020

Mentorship Meeting Worksheet Essay Example for Free

Mentorship Meeting Worksheet Essay Please complete this sheet with your mentor and submit it to your instructor. Date of Meeting: Meeting Duration: 1. Meeting notes – what was discussed during your meeting? Discipline in your work environment, being responsible with yourself and your coworkers and help the best possible way to help work get done in a moderate time. 2. What issues have you encountered since the last meeting and how did you address them? Sexual harassment in a work environment, 0 tolerance to this issue. You should always listen to both ends no matter what is the circumstance and always give the benefit of the doubt. 3. Discuss a change your mentor implemented and what types of challenges he or she encountered. What were some of the successful and unsuccessful points during the implementation? My mentor told me of a big issue she encounter at her company that lasted for a while, miscommunication between management. Each manager or supervisor was following their own taught and ideas there was no organization and accurate communication with each other. It got to a point where she was thinking of putting her resignation. She took a stand and made some changes and brought to the company professional team from outside, they started to create new policies, laws and regulations for all employees to follow. The success at the end was better communication especially between the managers and at the end the rest of the personnel new what guides and goals to follow to success.

Wednesday, January 22, 2020

socio-economic development and health Essay -- essays research papers

Question One There are a number of ways in which the increasing socio-economic development of a nation can help improve the health of the population. 1.  Ã‚  Ã‚  Ã‚  Ã‚  There is a correlation between mortality rates in the developing countries, especially amongst children, and the level of education of the parents of the children. For example, in Morocco, a mother who has completed 4-6 years of schooling, their child is 45% less likely to have died by the age of 2, compared with child’s mother who has had no school (Book 3, Page 54). Education improves the overall knowledge of looking after oneself and others, but also enables people to gain higher income levels, and thus, acquire purchasing power to buy the goods (if available), which will help them improve their quality of life. 2.  Ã‚  Ã‚  Ã‚  Ã‚  Food provisions are a necessity to maintaining a healthy population. There are many facets to food, mainly the distribution and supply of food, and the quality and nutritional ingredients of food. Food needs to be of good, sustainable quality so that it provides people with the basic supply of vitamins and minerals to live, and has to be easily accessible so that everyone in the nation can benefit. Developed countries have pioneered the way of preserving food for longer (i.e. use of plastics), and developing countries have benefited from this, but the developed world has also introduced new fear factors regarding food such as contamination (BSE, Salmonella etc) and additives, and, the long term effects of such advancements is beginning to materialise (Book 3, Page 306-307). Developing nations need to maintain a balance of growth, by producing enough food for the nations own consumption, but also growing food for exportation, which will improve their GNP and thei r overall growth as a nation. 3.  Ã‚  Ã‚  Ã‚  Ã‚  Reducing the gap between the social classes will provide a better overall health and wealth of a nation. Those living in the lower social classes have a lower life expectancy than those in higher social classes (Book 3, Page 216). There are many tools and precautions that may be used to bridge the gap. Occupations within the social classes tend to be more manual and risk-based occupations such as mining or engineering. In recent times, Acts of Law have been passed by Governments to protect employees, and as such... ... in further research. The developed world cannot be complacent in its attitude towards communicable diseases. As more and more people are able and free to roam from country to country, so it becomes harder to ensure that adequate strategies can be enforced and that the appropriate vaccines have been administered. Therefore, there still has to be concerted efforts from the developed and the developing world that a multi-disciplinary strategy can be adopted and enforced, and only by such mechanisms can the long-term goal of eradicating communicable diseases be achieved. References Szreter,S (1998) ‘The importance of social intervention in Britain’s mortality decline c. 1850-1914: a re-interpretation of the role of public health.’ in Davey, B, Gray, A and Seale, C (eds) Health and Disease: A Reader, Open University Press, Buckingham. U205 Health and Disease Book 3 (2001) World Health and Disease, Gray,A, Open University Press, Buckingham. U205 Health and Disease Book 1 (2001) Medical Knowledge: Doubt and Certainty, Seale, C. Pattison, S. and Davey, B. (eds), Open University Press, Buckingham. VC 1265, Video 1, ‘South Africa: Health at the crossroads’ Open University.

Tuesday, January 14, 2020

Tasks in Market Segmentation

Tasks in Market Segmentation 1. Analyze consumer product relationship 2. Investigate segmentation bases 3. Develop product positioning 4. Select segmentation strategy 5. Design marketing mix strategy The first task in segmenting the market is Analyze consumer product relationships—this entail the analysis of the affect and cognition, behaviour, and environments involved in the purchase/consumption process. 3 general approaches to this task— 1. Marketing managers may brainstorm the product concept and consider what types of consumers are likely to purchase and use the product and how they differ from those less likely to buy. . Focus groups and other types of primary research can be used for identifying differences in attributes, benefits, and values of various potential markets 3. Secondary research may further investigate differences in potential target markets, determine the relative sizes of those markets, and develop a better understanding of consumers of this or si milar products Investigate segmentation bases. There are no simple way to determine the best bases for segmenting markets. Benefit segmentation. The benefits people seek in consuming a given product are the basic reasons for the existence of true market segments.Psychographic segmentation. Differences on consumer lifestyles. Activities(work, hobbies, vacations), interests (family, job community), opinions9social issues, policitcs, business) Person/situation. Market can be divided on the basis of usage situation. Example: clothes and footwear—market are divided on the basis of sex, size, usage situation or social events Geodemographic segmentation. Identifies specific households in market focusing on local neighbourhood geography (such as zip codes) to create classifications of actual addressable, mappable neighbourhood where consumers live and shop.Develop product positioning. Positioning the product relative to competing products in the minds of consumers. Objective: to form a particular brand image in consumers’ minds 5 approaches to positioning strategy: 1. Positioning by attribute. Most common positioning strategy associating a product with an attribute, a product feature, or a customer feature. Example: toothpaste –fights cavity, whitens teeth 2. By use or application. Represents a 2nd or 3rd position designed to expand the market. Example: Cellphone—texting, 2nd videocam, 3rd–email 3. By product user or class user.Associating with a specific lifestyle profile. Example: alcohol—pampamilya na pangsports pa 4. By product class. Example: camay—beauty soap, safeguard—family soap, ivory-mild soap for sensitive skin 5. By competitors. To convince consumers that a brand is better than the market leader or another well-accepted brand on important attributes. Commonly done in advertisement where competitor is compared. Example: tide compared with brand x and brand y Positioning Map. A visual depiction of cons umers perceptions of competitive products, brands, or models.It is done by surveying consumers about various product attributes and developing dimensions and graph indicating the relative positions of competitors. Select Segmentation Strategy Four Basic Alternatives 1. The firm may decide not to enter the market. This may mean there are no viable market niche for the product or brand or model. 2. The firm may decide not to segment but to mass marketer. This may be appropriate in three situations— a. When the market is so small that marketing to portion of it is not profitable b.When heavy users make up such a large proportion of the sales volume that they are the only relevant target. c. When the brand is dominant in the market and targeting to a few segments would not benefit sales and profits. 3. The firm may decide to market to only one segment 4. The firm may decide to market to more than one segment and design a separate marketing strategy each. Three Important Criteria to Base Segmentation Strategy Decisions: 1. Measurable. Be able to measure size and characteristics. Example: income 2.Meaningful. Segment is large enough to have sufficient sales and growth potential to offer long-run profits. 3. Marketable. Can be reached and serve profitably. Consumer Behavior and Product Strategy Product affect and cognition: Satisfaction and dissatisfaction. Consumer satisfaction is critical in marketing thought and consumer research. Satisfied more likely to purchase the product; dissatisfied more likely to switch products or brand. Expectancy disconfirmation with performance approach is a current approach in studying satisfaction.This approach views consumer satisfaction as the degree to which a product or service provides a pleasurable level of consumption-related fulfilment. It is a degree to which a product performance exceeds the consumers expectations. Prepurchase expectations are consumers beliefs about anticipated performance of the product. Postpurcha se perceptions are consumer’s thoughts about how well the product performed. Disconfirmation refers to difference between the two perceptions. 3 types of disconfirmation: 1. Positive disconfirmation occurs when product performance is better than expected.This lead to satisfaction or a pleasurable level of fulfilment. 2. Negative disconfirmation occurs when product performance is lower than expected. This thought lead to dissatisfaction. 3. Neutral disconfirmation occurs when performance perceptions just meet expectations. Product Behavior Major objective of marketing is to increase the probability and frequency of consumers coming into contact with products, purchasing and using them and repurchasing them. Two classes of consumer behavior: 1. Product Contact. Involves behavior such as locating the product in the store, examining it, and taking it to the check out counter.A consumer may receive free sample in the mail, or on the doorstep on be given sample in the store, borrow product from a friend and use it, receive a product as a gift, or simply see someone else sue the product and experience it vicariously. 2. Brand Loyalty/Variety Seeking. For consumers to be brand loyal, they must not only purchase the same brand repeatedly but also has cognitive commitment to do so. Brand must have sufficient meaning for them that they purchase it not because of convenience or deals but because the brand represents important benefits or values to them.Brand loyalty is an intrinsic commitment to repeatedly purchase a particular brand. It is differentiated from repeat purchase behaviour because it focuses only on the behavioural action without concern for the reasons for the habitual response. Variety seeking is a cognitive commitment to purchase different brands because of factors such as the stimulation involved in trying different brands, curiosity, novelty, or overcoming boredom with the same old thing. Useful strategies for loyal customers: 1. If the only profi table segment is the brand loyal heavy user, focus on switching consumer loyalty to the firm’s brands 2.If there is sufficient number of brand loyal light users, focus on increasing their usage of the firm’s brand 3. If there is a sufficient number of variety-seeking heavy users, attempt to make the firm’s brand name a salient attribute and/or develop a new relative advantage. 4. If there is a sufficient number of variety-seeking light users, attempt to make the firm’s brand name a salient attribute and increase usage of the brand among consumers, perhaps by finding sustainable relative advantage. Product Environment Refers to product-related stimuli that consumers attend and comprehend.Majority of this stimuli are received through the sense of sight. Example: How a cloth feels so smooth influences consumer affect, cognition, and behavior. Two types of environmental stimuli: 1. Product attributes. Major stimuli that influence consumer affect, cognition, a nd behavior. Consumers may evaluate these attributes in terms of their own values, beliefs, and past experiences. 2. Packaging. Element of the product environment on which marketers spend billions annually. Packaging objectives: 1. Should protect the product as it moves through the channel to the consumer. 2.Should be economical and not add undue cost to the product 3. Should allow convenient storage and use of the product by consumer 4. Can be used effectively to promote the product to the consumer. Package sizes can influence not only which brands consumers choose but also how much of a product they use on particular occasions. Package colors are thought to have an important impact on consumers affect, cognition, and behavior. Colors can connote meaning and can be used strategically. Brand identification and Label Information on the package provide additional stimuli for consideration by the consumer.It simplifies purchase and for the consumer and make the loyalty development proc ess possible. Label information includes instructions, contents, lists of ingredients or raw materials, warnings for use and care of the product. Product Strategy. Designed to influence consumers in both the short and long run. In the short-run, new product strategies aim to influence consumers to try the product; in the long run, product strategies are designed to develop brand loyalty and obtain large market shares. A critical aspect of designing product strategies involves analyzing consumer-product relationships.This means consumer product-related affect, cognition, behavior, and environments should be carefully considered in new-product life cycle. Characteristics of Consumers; 1. Innovators 2. Early adopters 3. Early majority 4. Late majority 5. Laggards Characteristics of Products 1. Compatibility. How will does this product fit consumers’ current affect and cognitions, and behaviours? –degree to which product is consistent with consistent with consumers current affect, cognition and behavior. 2. Trialability. Can consumers try the product on a limited basis with little risk? -degree of which product can be tried on a limited basis or divided into small quantities for an inexpensive trial. 3. Observability. Do consumers see or otherwise sense this product? –degree to which products or their effects can be sensed by other consumers.4. Speed. How soon do consumers experience the benefits of the product? –refers to how rapid consumers experience the benefits of the product. 5. Simplicity. How easy it is for consumers to understand and use the product? –the degree to which a product is easy for a consumer to understand and use. 6. Competitive advantage. What makes this product better than competitive offerings? -the degree to which an item has sustainable competitive advantage over other product classes, product forms, and brands. 7. Product symbolism. What does this product mean to consumers? –refers to what the pr oduct or brand means to the consumer and what the consumer experiences in purchasing and using it. Consumer researchers recognize that some products possess symbolic features and that consumption of them may depend more on their social and psychological meaning than on their functional utility. 8. Marketing strategy. What is the role of other marketing mix elements in creating a functional or image-related relative advantage?Favorable image is created through the other elements of the marketing mix. Promotion in the form of advertising is commonly used to create a favorable image for the brand by pairing it with positively evaluated stimuli such as attractive model. Price. Create brand images as well as provide functional competitive advantage. Consumers perceived a relationship between price and quality. Price can position a brand as a good value for their money. Distribution. Good site locations and a large number of outlets are important advantage esp in the food markets