Thursday, November 28, 2019

John Donne Essays (1236 words) - Abrahamic Mythology, Fallen Angels

John Donne Purify my heart for I have sinned: An Irony In John Donnes Batter my heart, three-personed God; for You, the moral and religious qualms of the speaker are manifest in a sonnet which seems at first almost like an avowal between lovers. These convictions of guilt, which stem from his sexual emotion, are what induce desire for a creator/creation relationship with God. With further analysis, the violent and sexual slant on the relationship is also revealed. The first expression provides the reader with an initial framework for the mood of the poem. Donne says, Batter my heart, (1) This opening word is the first of an upcoming myriad of terms of violence. The impression given is that the speaker is either a vulnerable and/or masochistic person. However, it becomes evident in the lines ensueing that the speaker is somewhat disconcerted. Batter my heart, three-personed God; for You As yet but knock, breathe, shine, and seek to mend; That I may rise and stand, oerthrow me, and bend Your force, to break, blow, burn, and make me new. (1-4) In lines 1 and 3, he is asking God for torment, to be overcome. In lines 2 and 4, he is requesting to be fixed, mended, made new. The speaker is vascillating between the two; he seems indecisive. The verbs in lines 2 and 4 oddly parallel eachother. They are thematically similar; complementing, but at the same time contradicting. Knock corresponds to break, as breathe does to blow, and so on. Nonetheless these lines allude to the subordinate role that he takes. In line 5, a complication emerges. He is to another due. (5) There is another character in the poem who has seized him by force, like an usurped town. (5) In the appropriation of a town, the usurper must be the new ruler of the town, the authoritative leader who snatches the reins of power from the original leader. This image of an usurped town makes an interesting metaphor for Satans heist of a mans soul from God. It is the Christian belief that the human spirit, originally owned by God, is at a constant battle with the devil, who in turn provides perpetual temptation to which the Christians fall, and want God to mitigate. The speaker says, Labor to admit You, but Oh, to no end! (6) He desires and works to admit God as the beholder, the controller and owner of his spirit, but the Devils seizure is to no end. His defense of the viceroy in him proves weak and untrue. (8) A town is also not quite as unyielding as it appears from the outside. We saw from line 1 that the speaker wants to be taken by God. Since he is betrothed unto Gods enemy, he needs for God to break his tie to Satan, and to imprison him so that he would unsusceptible to the Devils domination. Like someone snared in a defective marriage, he must be divorced or untied from the knot. The manner in which Donne describes this depicts the violent nature of how he wants God to rescue him. He says, Take me to You, imprison me. (12) It is also obvious in his use of harsh verbs- batter, knock, oerthrow, break, blow, burn, usurp, break, imprison. It seems to me that the speaker is so keenly aware of his sins and shortcomings that it is imperative that God not only saves him from his sinful ways, but does so in an intense, brutal manner. It is a role which he wants God to play because he feels the need to be rebuked in two divergent respects; that of the creator and of the restorer. These particular yearnings of treatment demonstate the elevated fervor and passion of his religious conviction, which in this case is accompanied by brutality to recompensate his sins. This passion is implicated with a sexual character. Batter my heart. (1) In laymans terms it would say hurt me. Interestingly, the word heart during Donnes era had a sexual connotation. (A Dictionary of Shakespeares Sexual Puns and their Significance) This definition does not actually come into play until the concluding lines, where he speaks of being raped by God. Except You enthrall me, never shall be free,/ Nor ever chaste, except You ravish me. (13-14) Donnes choice of words is imperative in ascertaining the sexuality of the poem. The word enthrall means to captivate, charm, and hold in slavery. The previous and following phrases, imprison me, and never shall be free, (13) indicate that Donne

Sunday, November 24, 2019

4 Options for Converting Slides to Digital Format

4 Options for Converting Slides to Digital Format Got stacks of slide carousels loaded up with old family photos? Unfortunately, the pictures on those slides are probably fading as you read this. Now is the time to save those memories for future generations by converting them to digital format.   There are  four  major options for digitizing 35mm  slides. Flatbed Scanner Many traditional flatbed scanners do a good job at slide scanning as well. Look for a scanner that is designed to scan negatives and slides in addition to traditional paper photos and documents. The optical (not digital) resolution should be at least 2400 dpi or greater. Many flatbed scanners require an extra transparency adapter attachment for scanning slides- sometimes it comes with the scanner, and sometimes you have to buy it separately. Good bundled scanning software is also a must, to give you control over the final results, although Hamricks VueScan offers an excellent alternative and works with most flatbed scanners. Read user and editorial reviews to find a flatbed scanner that handles slides well before you buy. Dedicated Film Scanner From an image quality standpoint, the best method for digitizing your slides is to use a high resolution dedicated film/slide scanner. They can be fairly expensive, so probably not the best option unless you literally have thousands of slides to scan. Dedicated film scanners do, however, offer excellent resolution, and the control they offer over the final images is something you generally dont have when you opt for a professional scanning service. Slide Duplicator If you own a good digital SLR (single lens reflex) camera, a slide duplicator, or  duper, offers a good, inexpensive option for digitizing your slides. A slide duplicator attaches to your DSLR cameras in place of the lens, using a T-mount adapter ring. The other end of the duper is a sliding gate that holds two slides. The duper also has an internal lens, with a fixed aperture and focusing distance, that focuses the slides image onto your DSLRs imaging plane so that you can then take a picture of the slide. While slide duplicators are  inexpensive and easy to use (they require no electricity or a computer since you can take the pictures directly onto your cameras flash card), dupers do not offer the digital quality you can get from a flatbed or film scanner. In most cases, youll find that some image cropping is unavoidable. Most digital cameras also dont offer the dynamic range (the amount of gradation between light and dark in the photo) of a scanner, which can affect the photos shadow detail. Scanners generally offer a better resolution (a 3200 optical dpi scanner is about equivalent to a 12-megapixel digital camera) as well, so if you want to print larger photos from your slides, this may be a deal breaker. Professional Photo Shop If you dont have too many slides, or if youre not very comfortable with computers and software, then your best bet is probably to opt for a professional service to scan your slides for you. Many such services can be found on the Internet, but you may find more peace of mind by checking with local photo labs. Definitely shop around because pricing and quality control vary widely. Do be sure to ask whether the photoshop cleans and scans each slide individually. If they batch scan, you probably wont be happy with the quality. Tips for Scanning Slides The trick to getting good digital scans of your slides is to start with clean slides. Dust both sides of each slide off with a quick hit of compressed air and be careful not to touch the emulsion. Make sure your computer is fairly new with a fast processor and plenty of memory and hard drive space to store all of the digital images. A plug-in external hard drive is a good option when scanning slides or photos. We highly recommend that you scan directly into a good photo organization/editing program such as Photoshop Elements, which can drastically cut down on the time spent scanning as you can save naming the files, cropping, rotating, etc for later once, the images are all on your computer in the organizer. After scanning, back up your new digital files onto DVDs - and make extra copies to share with your family members!

Thursday, November 21, 2019

Social Animals Essay Example | Topics and Well Written Essays - 2250 words

Social Animals - Essay Example As the research discusses the social conflict theory is thus applicable not only on individual or group level but it is applicable in the political scenario also. The base of the conflict is the power and the money, which one person or group has obtained and other has not. It is true that the power is gained by the individual with the help of money. Many writers, poets have written on the never ending topic of social inequality. The inequality will never be eradicated totally from the world until it does not leave the human mind.Thi paper stresses that exploitation of the lower class is the phenomenon which has been going on since ancient time. There has always been a wide gap between the rich and the poor class. The gap became wider at the advent of industrialization. Exploitation is the major purpose of the powerful class and for attaining this purpose, two methods are used. First method is the brute force and the second method is economics. If we study the entire human history we can realize that the class conflict is one of the major issues in the entire history of human beings.  To discuss on the social conflict theory of Marx, a recent news story has been taken into consideration. The news is about the exploitation of a female senior citizen from lower class. If observed it carefully Marx’s theory of conflict can be explained by using this event. The news can be analyzed on different levels.

Wednesday, November 20, 2019

Juvenile Justice Module 8 Online Essay Example | Topics and Well Written Essays - 500 words

Juvenile Justice Module 8 Online - Essay Example In juvenile justice system parents, social workers and probation officers are involved in the process to achieve positive results and avoid any further crimes by children. The juvenile probation is the centre of juvenile justice system. Probation is the tool used by juvenile justice agencies. It is an informal monitoring of youth and avoiding their involvement in serious crimes. The main responsibility of juvenile probation is safety and protection of public from crimes. The juvenile probation practices must be mission-oriented, performance based and result-oriented. Many probation skills and approaches are used. In this probation practice, the offenders are supervised in their schools. This practice is useful in the sense that the children spend the majority of their time in school. The probation officer finds himself in the position of better monitoring of the juvenile offenders. In this practice he has more contact with the youth and able to see behavior of the offender with his fellows. This practice also will help the youth to become more attentive in school making a good student. A study revealed that school based probation results in better academic performance, less crimes and increase in school attendance. This study was carried on 75 randomly selected offenders. The most important goal of the juvenile justice system is to change the young people. The purpose of this practice is to make the offenders good citizens following laws and regulations. The probation officers play an important role in rehabilitation of the youth. For this purpose the probation officers help in develop the working skills and learning skills. The skills which are needed to make peaceful and useful citizens. The offenders also need to change the way they think and make decisions. Their way of thinking is changed by cognitive interventions. The need is assessed and goals are set accordingly and then the skill building programs are made. It is important for the offenders to

Sunday, November 17, 2019

Amazon.com - transfer pricing, taxation and the role of corporate Research Paper

Amazon.com - transfer pricing, taxation and the role of corporate social responsibility - Research Paper Example tion of these issues are described below Transfer Pricing and taxation Issues for Amazon.com Simply the transfer pricing is the price that is set for the intercompany transactions. Transfer pricing is used when the divisions of an organization need to charge other divisions of the same organizations for the goods and services provide to them. For example as in the case of Amazon.com, it is mentioned earlier that Amazon is operating the variety of departments and websites in many countries. Transfer pricing in this might possible, as a department of Amazon in United Kingdom deals in a component in United Kingdom. The same component is also required by a costumer in China. The transfer of this component form the department in US to department in china will be valued at internal price and will be referred as transfer price. In the context of transfer pricing these some factors can effect on the operations of Amazon.com. Transfer prices are particularly appropriate for profit centers bec ause if one profit center work for another, the size of the transfer price will affect the costs of one profit center and revenue to other. In the case of Amazon, each department has its own products and activities and every department in different counties is responsible to maintain its profit level. So in relation to the prospective of transfer pricing each department can try to work in their own interested segments to increase their profits. Decisions might be taken by a department manager in the best interest of his own part of business, and it may possible that this decision may affect against the interests of other departments. The profit center managers for Amazon tend to put their own profit performance above everything else. Since the profit center performance is measured according... The intention of this study is Amazon.com as a largest cyber selling company in modern cyber environment. Amazon.com started their business by selling their first book in 1995. At that time the main aim of amazon is based on a dream to develop a new trend in e-commerce. After the great success of this business Amazon now have selling every kind of products and have many sites those are serving efficiently in seven countries. The working of Amazon is an art not a science. They are dealing in lots of products. The main art of capturing the cyber market is multi-level e-commerce strategy. Due to this strategy, anyone sell almost anything using the platform of Amazon.com. The another main key factor for the success of Amazon.com is their efficient data based system which has also ranked in the top three world largest Linux data base system in 2005. The purpose of this report is to clear these mentioned issues can affect the Amazon’s performance in material manner. On the other han d, in current modern environment the value of cyber markets is increasing day by day. So it is much necessary for Amazon.com to control the all negative aspects of mentioned factors to win the race. There is also a strong need to control the problems that is stated is the Amazon’s Annual report. In short, by taking account of all these issues Amazon.com can perform in more efficient manner and easily capture the cyber market share in near future.

Friday, November 15, 2019

Effects of humor in advertising

Effects of humor in advertising Humor in advertising is like a gun in the hands of a child. You have to know how to use it. Otherwise, it can blow up on you. (Miller, 1992) According to Marc G. Weinberger and Charles S. Gulas (1992), Humor is by no means a guarantee of better ads, but its effect can be enhanced with careful consideration of the objectives According to Fugate D. (1998), Advertising humor refers primarily to the ability of audiences to respond positively when one or others are portrayed in a playful manner. Employ of humor in advertising propose that as much as 30.2% of prime time television advertising is planned to be humorous (Weinberger and Spotts 1989). Numorous researches conducted by others has also indicated similar high (or still higher) levels of practice of humor in television ads (Kelly and Solomon 1975; Markiewicz 1972; Speck 1987) and in radio (Weinberger and Campbell 1991).whereas the use of humor is high, the effectiveness of humor as a interactions device remains doubtful. In attempts to describe its impact, humor has confirmed to be extremely indefinable. This lack of information has led advertising managers and researchers similar to both honor and criticize the usefulness of humor in advertising as explained in the opening quotes. The truth is that humor is a difficult theme that has been experimentally deliberate by advertisers in numerous dozen studies over the past few years. Humor is a diverse idea that is affected by a wide range of factors. As an outcome of the many contingencies forced by preferred aim, style of humor, medium, placement and viewers , generalizations about the effect of humor are filled with pitfalls (Stewart-Hunter 1985). However the open question of humors usefulness in advertising is unanswerable, we can bring together the accounts of humor research in the perspective of suitable constraints to increase insights about its belongings. For that reason, the more suitable questions to ask are: 1) What communications objectives are mainly expected to be accomplished through the utilization of humor?; 2) What communication factors are likely to influence the result?; 3) For what audience is humor most suitable?; and 4) What product factors advise the use or non-use of a humorous approach? The intention of this paper then is to analytically observe the research that has been conducted to increase insight into the belongings of humor with respect to these questions.The extensive use of humor, attached with the unsettled questi ons regarding it, has drawn the attention of several communication researchers. In a commonly cited analysis of the early literature in the field, Sternthal and Craig (1973) drew some uncertain conclusions about the use of humor on a number of communications objectives. These conclusions must be viewed as uncertain because, although based on a thorough analysis of the existing literature in 1973, this literature base was fairly small and consisted about completely of non-advertising studies as there was merely slight previous work in advertising to review. In the years since the Sternthal and Craig work, humor has established widespread extra analysis in over 30 studies that have appeared in the marketing literature, and a vast many more studies that have appeared in the literature streams of education, communication and psychology. This paper has the relevant aspects of this literature in order to modernize and broaden on the Sternthal and Craig work. Thus, the design to be followe d will be to observe the result of humor as it applies to a variety of communications objectives and then to broaden on this work by including implementation, placement, audience, and product factors that have come to light in the past few years. The nature of the communication objective plays a main role in the suitability of the use of humor. Sternthal and Craig (1973) scheduled advertising objectives and the impact of humor on each of these objectives. Revisited after few years of prevailing research some of these conclusions remain logical, while others come out to be in need of modifications. Humor and Attention Studies have revealed that 94% of advertising practitioners see humor as an useful way to increase attention. Moreover, 55% of advertising research executives find humor to be better to non-humor in gaining attention (Madden and Weinberger 1984). Whereas the special views of advertising executives should not be equated with accurate hypothesis testing, these views do mirror a knowledge base built on years of day to day understanding with proper research outcome. Furthermore in the case of attention, these practitioner views find to be well supported by the available experimental proof. inside studies of real magazine ads (Madden and Weinberger 1982), television ads (Stewart and Furse 1986), and radio ads (Weinberger and Campbell 1991) in average industry ad testing situations, humor has been found to have a positive effect on attention . Likewise, this attention effect has also been verified in the laboratory. In a detailed test of attention effects in the adverti sing field, Speck (1987) compared humorous ads with non-humorous controls on four attention measures: early attention, constant attention, predictable attention and on the whole attention. He found humorous ads to do better than non-humorous ads on each of the attention measures. The attention attracting capability of humor has also been verified in education research (Powell and Andresen 1985; Zillmann et al. 1980). In a review of the education literature, Bryant and Zillmann (1989) conclude that humor has a positive effect on attention, the advisory attitude taken by Bryant and Zillmann is suitable for all the humor attention studies. While the outcome seem to point out a positive impact on attention, and in common the past few years of research mainly supports the conclusion drawn by Sternthal and Craig (1973) , future researchers should be attentive that all humor is not shaped equal. Associated humor, that is, humor directly associated to the product or problem being promoted, appears to be more thriving than unassociated humor (Duncan 1979; Lull 1940; Madden 1982). In detail, controlling for the associated factor makes the result of the investigational studies in advertising undeniable in their support for a positive effect of humor on attention. This explains that the mere inclusion of canned humor into a given ad is not likely to have the same impact on attention as the use of a more incorporated humor cure. Humor and Understanding The literature is assorted on the outcome that humor has on understanding. In a study of 1000 broadcast commercials, Stewart and Furse (1986) found humorous substance to enhance the understanding of an ad. Other studies have found alike positive outcomes (Duncan, Nelson and Frontczak 1984; Weinberger and Campbell 1991; Zhang and Zinkhan 1991). On the other hand, these studies distinguish sharply with the outcomes of other advertising researchers who have found a negative association between humor and understanding (Cantor and Venus 1980; Gelb and Zinkhan 1986; Lammers et al. 1983; Sutherland and Middleton 1983). This negative outlook of the effect of humor on understanding is shared by the group of research executives (64%) at U.S. ad agencies. While findings indeed fail to determine the true effect of humor on understanding, they do call into question the reality of a global negative effect hypothesized by Sternthal and Craig (1973). It is important to look f or factors that may sort out these findings. To this extent, it appears that some other factors seem to explain much of the lack of conformity in the studies. First, there is a lack of a reliable definition of understanding among studies. Depending on the exact measure used, recall may be an signal of understanding or it may merely draw attention. More significantly, the measures engaged may have an impact on the outcomes found. Those studies that use several measures of understanding (Speck 1987; Weinberger and Campbell 1991) are more expected to discover positive or mixed positive effects on understanding than those studies that utilize solitary measures (Cantor and Venus 1980; Lammers et al. 1983), representing that a positive understanding effect may be missed by comparatively narrow measures. Further confirmation of the significance of measures is found in the work of Murphy and his colleagues (Murphy, Cunningham and Wilcox 1979). Their study of framework effects demonstrates t hat diverse measures of recall may create different recall outcomes. Secondly, humor styles may be an important determinant in understanding effects. In one study which directly compared the effects of various humor styles on understanding, Speck (1987) found major differences due to styles. His findings point out that some humorous ads do better, and some do worse than non-humorous ads on expressive and message understanding and that this differential act was attributable to humor styles. Comic wit was found to under perform non-humorous treatments while all other humor styles(i.e., satire, full comedy, sentimental humor and sentimental comedy) out performed the non-humor treatment. Lastly, the nature of product advertised appears to play a vital role in the impact of humor on understanding. This product factor is collected of two dichotomies, high involvement vs low involvement products. Those studies employing high involvement products (Speck 1987; Stewart and Furse 1986; Weinber ger and Campbell 1991; Zhang and Zinkhan 1991) in general indicate a positive effect of humor on understanding. On the other hand, studies employing low involvement products (Cantor and Venus 1980; Gelb and Zinkhan 1986) have found a negative effect of humor on understanding. we believe that these studies do present a thorough test of the association between humor and understanding that can present insight into the impact that humor may have on advertising understanding. An study of the related non-advertising studies shows eight studies that report a positive effect of humor on understanding and eleven studies that indicate a null or mixed effect. None of the non-advertising studies reports a negative effect of humor on understanding, which again challenges the conclusion drawn in 1973 by Sternthal and Craig. Of the education literature, possibly the strongest support for a positive relationship between humor and understanding appears in work conducted by Ziv (1988). This study ind icates that humor can drastically improve learning. Humor and influence Sternthal and Craig (1973) concluded that the interruption effect of humor may lead to influence. However, they note that the influential effect of humor is at paramount no superior than that of serious appeals. These conclusions seem to agree with the opinions of U.S. ad executives. Madden and Weinberger (1984) found that only 26% of these practitioners approved with a statement claiming humor to be more influential than non-humor. whereas U.S. advertising executives mainly agree with the conclusion of Sternthal and Craig (1973), this opinion is in sharp distinction to that of their British counterparts, 62% of whom found humor as more influential than non-humor and only 7% of whom were found to conflict with this claim (Weinberger and Spotts 1989). Audience Factors The majority of practitioners consider that humorous ads are best appropriate to a target audience composed of better educated younger males (Madden and Weinberger 1984). The advertising literature usually supports this faith. Quite a few studies have indicated an communication between gender and humor efficacy (Gorham and Christophel 1990; Lammers et al. 1983; Madden and Weinberger 1982; Stewart- Hunter 1985; Whipple and Courtney 1980,1981). The effect of gender may be moderately explained by obvious differences in humor admiration. In a review of the literature, Whipple and Courtney (1981) conclude that men appear to enjoy aggressive and sexual humor more than women do, and women emerge to have a better admiration for nonsensical humor. However, they warning that the results are not convincing and that these preferences may be shifting as society changes. Additional, the perception of the initiator of the humor may be an key mediator, as will be discussed. Contrary to the hold of the findings in marketing, research in education generally has not found major gender effects on humor response. Both in an broad educational experiment discussed earlier (Ziv 1988), and in other experiments (Davies and Apter 1980; Weaver, Zillmann and Bryant 1988; Zillmann et al. 1980), the positive effect of humor on learning was not found to be different by gender. The dichotomy of outcome of gender effects on humor raises some attention-grabbing issues. Humor is very closely attached into the culture, experiences, and points of suggestion that are shared between the humor creator and the humor receiver. For instance, research has recommended that the gender response to sexual humor is reversed when the creator of the humor is female (Gallivan 1991), and the individuality of the joke may persuade which audiences discover the joke funny (Gruner 1991). If this is certainly the case, then much of the distinction based on gender, and maybe race and age as well, may be explained by different perspectives of the creator of the humorous treatment and the receiver of that treatment. Thus, the shared point of view between the initiator of a humorous ad and the target of the ad is a potentially significant dominant variable in humor effectiveness. This problem has been largely ignored by researchers. In addition to gender, race, and age, other audience factors may impact the competence of humor and are worthy of thought. Humor is a common human practice exhibited by people of all cultures and throughout all of recorded history (Alden, Hoyer and Lee 1993). Though, the research that has examined humor in advertising cross-culturally indicates degree of difference in use of humor among countries, equally in humor types employed and in supreme levels of humor used (e.g. Alden, Hoyer and Lee 1993; Weinberger and Spotts 1989). Moreover, experimental proof indicates that people of diverse cultural backgrounds respond to humor in a different way. In an experi ment that compared Israeli Jews of Eastern and Western descent, Weller and his colleagues found significant differences in the admiration for ridiculous jokes between the two groups (Weller, Amitsour, and Pazzi 1976). They conceive that these differences are due to habits of thought and mental attitudes ingrained in cultural backgrounds. These findings entail that even when language differences are uninvolved, jokes may not be easily exchangeable among cultures. An additional audience factor of note includes audience and product relations such as prior brand attitude. Chattopadhyay and Basu (1989) indicate that humor has better positive effect, with regard to influence, for those audience members with a prior positive brand attitude. These and other audience factors should be reserved in mind in the blueprint of humorous ads and upcoming humor study.

Tuesday, November 12, 2019

Essay --

â€Å"No temptation has seized you except what is common to man. And God is faithful; He will not let you be tempted beyond what you can bear. But when you are tempted, He will also provide a way out so that you can stand up under it.† 1 Corinthians 10:13 Rob & Burgandie Onekea with their two sons Derion (16) and Brandon (13) Rob & Burgandie Onekea with their two sons Derion (16) and Brandon (13) Online purity is a daily battle for many brothers and sisters in Christ. Taking control of your purity is something that is crucial to your spiritual walk with God; indeed, if you are continually losing this struggle, your salvation is at stake. For the Scriptures are forthright, â€Å"But among you there must not be even a hint of sexual immorality, or any kind of impurity or of greed, because these are improper for God’s holy people†¦ For of this you can be sure: No immoral, impure or greedy person – such a man is an idolater – has any inheritance in the Kingdom of Christ and of God.† (Ephesians 5:3-5) Ricardo is moved by his baptism! Ricardo is moved by his baptism! How many of us have been doing great spiritually, when suddenly you receive an email with an inappropriate image inside? Do we easily hit the delete button or are we ensnared the minute that we see the link? David fought a losing battle for purity, as he stood on the rooftop of the palace gazing into the area where Bathsheba was bathing. (2 Samuel 11) David could have chosen to look away, but his sinful desire compelled him to summon her to commit adultery. Sadly, after this affair, Bathsheba told David, â€Å"I am pregnant.† The consequences of David’s sin were many: the death of Uriah the Hittite (Bathsheba’s husband and one of David’s mighty men), the embittering of Ahithophel (Bathsh... ... Net Nanny. Adult websites have a wealth of resources at their disposal, which make it difficult to protect your home from pornography. Therefore, it is key to take things a step further and implement changes on your home computer. We easily spend $60 on the latest version of Halo or taking a family of four to see The Dark Knight, why then the lack of investment for our online purity? Most companies offer trial versions to download for 30 days to see if it works for you. As a brother who is now experiencing the victorious life, I would strongly recommend installing one of these programs. To download a trial version, click here. As our war for online purity continues, let us take up God’s spiritual weapons as well as our modern tools, and fight with everything we have for our salvation, for the salvation of our families and for the salvation of this very lost world.

Sunday, November 10, 2019

The Return: Nightfall Chapter 17

In the first days after she'd come back from the afterlife, Stefan had always put her to bed early, made sure she was warm, and then allowed her to work on his computer with her, writing a diary of sorts, with her thoughts on what had happened that day, always adding his impressions. Now she called up the file desperately, and desperately scrolled to the end. And there it was. My dearest Elena, I knew you would look here sooner or later. I hope it was sooner. Darling, I believe that you're able to take care of yourself now, and I've never seen a stronger or more independent girl. And that means it's time. Time for me to go. I can't stay any longer without turning you into a vampire again – something we both know can't happen. Please forgive me. Please forget me. Oh, love, I don't want to go, but I have to. If you need help, I've gotten Damon to give his word to protect you. He would never hurt you, and whatever mischief is going on in Fell's Church won't dare touch you with him around. My darling, my angel, I'll always love you†¦. Stefan P.S. To help you go on with your real life, I've left money to pay Mrs. Flowers for the room for the next year. Also, I've left you $20,000 in hundred-dollar bills under the second floorboard from the wall, across from the bed. Use it to build a new future, with whomever you choose. Again, if you need anything, Damon will help you. Trust his judgement if you're in need of advice. Oh, lovely little love, how can I go? Even for your own sake? Elena finished the letter. And then she just sat there. After all her hunting, she'd found the answer. And she didn't know what to do now but scream. If you need help go to Damon†¦. Trust Damon's judgment†¦.It couldn't be a more blatant ad for Damon if Damon had written it himself. And Stefan was gone. And his clothes were gone. And his boots were gone. He'd left her. Make a new life†¦. And that was how Bonnie and Meredith found her, alarmed by an hour-long bounce-back of their telephone calls. It was the first time they hadn't been able to get through to Stefan since he'd arrived, at their request, to slay a monster. But that monster was now dead, and Elena†¦ Elena was sitting in front of Stefan's closet. â€Å"He even took his shoes,† she said emotionlessly, softly. â€Å"He took everything. But he paid for the room for a year. And yesterday morning he bought me a Jaguar.† â€Å"Elena – â€Å" â€Å"Don't you see?† Elena cried. â€Å"Thisis my Awakening. Bonnie predicted that it would be sharp and sudden and that I would need both of you. And Matt?† â€Å"He wasn't mentioned by name,† Bonnie said gloomily. â€Å"But I think we'll need his help,† Meredith said grimly. â€Å"When Stefan and I were first together – beforeI became a vampire – I always knew,† Elena whispered, â€Å"that there would come a time when he would try to leave me for my own good.† Suddenly she hit the floor with her fist, hard enough to hurt herself. â€Å"I knew, but I thought I would be there to talk him out of it! He's so noble – so self-sacrificing! And now – he'sgone .† â€Å"You really don't care,† Meredith said quietly, watching her, â€Å"whether you stay human or become a vampire.† â€Å"You're right – Idon't care! I don't care about anything, as long as I can be with him. When I was still half a spirit, I knew that nothing could Change me. Now I'm human and as susceptible as any other human to the Change – but it doesn't matter.† â€Å"Maybe that's the Awakening,† Meredith said, still quietly. â€Å"Oh, maybe him not bringing her breakfast is an awakening!† Bonnie, said, exasperated. She'd been staring into a flame for more than thirty minutes, trying to get psychically in touch with Stefan. â€Å"Either he won't – or he can't,† she said, not seeing Meredith's violently shaking head until after the words were out. â€Å"What do you mean  ¡Ã‚ ®can't'?† Elena demanded, popping back off the floor from where she was slumped. â€Å"I don't know! Elena, you're hurting me!† â€Å"Is he in danger? Think, Bonnie! Is he going to be hurt because of me?† Bonnie looked at Meredith, who was telegraphing â€Å"no† with every inch of her elegant body. Then she looked at Elena, who was demanding the truth. She shut her eyes. â€Å"I'm not sure,† she said. She opened her eyes slowly, waiting for Elena to explode. But Elena did nothing of the kind. She merely shut her own eyes slowly, her lips hardening. â€Å"A long time ago, I swore I'd have him, even if it killed us both,† she said quietly. â€Å"If he thinks he can just walk away from me, for my own good or for any other reason†¦he's wrong. I'll go to Damon first, since Stefan seems to want it so much. And then I'm going after him. Someone will give me a direction to start in. He left me twenty thousand dollars. I'll use that to follow him. And if the car breaks down, I'll walk; and when I can't walk anymore, I'll crawl. But Iwill find him.† â€Å"Not alone, you won't,† Meredith said, in her soft, reassuring way. â€Å"We're with you, Elena.† â€Å"And then, if he's done this of his own free will, he's going to get the bitch-slapping of hislife .† â€Å"Whatever you want, Elena,† Meredith said, still soothingly. â€Å"Let's just find him first.† â€Å"All for one and one for all!† Bonnie exclaimed. â€Å"We'll get him back and we'll make him sorry – or we won't,† she added hastily as Meredith again began shaking her head. â€Å"Elena, don't! Don't cry,† she added, the instant before Elena burst into tears. â€Å"So Damon was the one to say he'd take care of Elena, and Damon should have been the one last to see Stefan this morning,† Matt said, when he had been fetched from his house and the situation was explained to him. â€Å"Yes,† Elena said with quiet certainty. â€Å"But Matt, you're wrong if you think Damon would do anything to keep Stefan away from me. Damon's not what you all think. He really was trying to save Bonnie that night. And he truly felt hurt when you all hated him.† â€Å"This is what is called  ¡Ã‚ ®evidence of motive,' I think,† Meredith remarked. â€Å"No. It's character evidence – evidence that Damondoes have feelings, that he can care for human beings,† Elena countered. â€Å"And he would never hurt Stefan, because – well, because of me. He knows how I would feel.† â€Å"Well, why won't he answer me, then?† Bonnie said querulously. â€Å"Maybe because the last time he saw us all together, we were glaring at him as if we hated him,† said Meredith, who was always fair. â€Å"Tell him I beg his pardon,† Elena said. â€Å"Tell him that I want to talk with him.† â€Å"I feel like a communications satellite,† Bonnie complained, but she clearly put all her heart and strength into each call. At last, she looked completely wrung out and exhausted. And, at last, even Elena had to admit it was no good. â€Å"Maybe he'll come to his senses and start callingyou ,† Bonnie said. â€Å"Maybe tomorrow.† â€Å"We're going to stay with you tonight,† Meredith said. â€Å"Bonnie, I called your sister and told her you'd be with me. Now I'm going to call my dad and tell him I'll be with you. Matt, you're not invited – â€Å" â€Å"Thanks,† Matt said dryly. â€Å"Do I get to walk home, too?† â€Å"No, you can take my car home,† Elena said. â€Å"But please bring it back here early tomorrow. I don't want people to start asking about it.† That night, the three girls prepared to make themselves comfortable, schoolgirl fashion, in Mrs. Flowers' spare sheets and blankets (no wonder she washed so many sheets today – she must have known somehow, Elena thought), with the furniture pushed to the walls and the three makeshift sleeping bags on the floor. Their heads were together and their bodies radiated out like the spokes of a wheel. Elena thought, So this is the Awakening. It's the realization that, after all, I can be left alone again. And, oh, I'm grateful to have Meredith and Bonnie sticking with me. It means more than I can tell them. She had gone automatically to the computer, to write a little in her diary. But after the first few words she'd found herself crying again, and had been secretly glad when Meredith took her by the shoulders and more or less forced her to drink hot milk with vanilla, cinnamon, and nutmeg, and when Bonnie had helped her into her pile of sleeping blankets and then held her hand until she went to sleep. Matt had stayed late, and the sun was setting as he drove home. It was a race against darkness, he thought suddenly, refusing to be distracted by the Jaguar's expensive new-car smell. Somewhere in the back of his mind, he was pondering. He hadn't wanted to say anything to the girls, but there was something about Stefan's farewell note that bothered him. The only thing was, he had to make sure it wasn't just his injured pride speaking. Why hadn't Stefan ever mentionedthem ? Elena's friends from the past, her friends in the here and now. You'd think he'd at least give the girls a mention, even if he'd forgotten Matt in the pain of leaving Elena permanently. What else? There definitely was something else, but Matt couldn't bring it to mind. All he got was a vague, wavering image about high school last year and – yeah, Ms. Hilden, the English teacher. Even as Matt was daydreaming about this, he was taking care with his driving. There was no way to avoid the Old Wood entirely on the long, single-lane road that led from the boardinghouse to Fell's Church proper. But he was looking ahead, keeping alert. He saw the fallen tree even as he came around the corner and hit the brakes in time to come to a screeching stop, with the car at an almost ninety-degree angle to the road. And then he had to think. His first instinctive reaction was: call Stefan. He can just lift the tree right off the ground. But he remembered fast enough that that thought was knocked away by a question. Call the girls? He couldn't make himself do it. It wasn't just a question of masculine dignity – it was the solid reality of the mature tree in front of him. Even if they all worked together, they couldn't move that thing. It was too big, too heavy. And it had fallen from the Old Wood so that it lay directly across the road, as if it wanted to separate the boardinghouse from the rest of the town. Cautiously, Matt rolled down the driver's side window. He peered into the Old Wood to try to see the tree's roots, or, he admitted to himself, any kind of movement. There was none. He couldn't see the roots, but this tree looked far too healthy to have just fallen over on a sunny summer afternoon. No wind, no rain, no lightning, no beavers. No lumberjacks, he thought grimly. Well, the ditch on the right side was shallow, at least, and the tree's crown didn't quite reach it. It might be possible – Movement. Not in the forest, but on the tree right in front of him. Something was stirring the tree's upper branches, something more than wind. When he saw it, he still couldn't believe it. That was part of the problem. The other part was that he was driving Elena's car, not his old jalopy. So while he was frantically groping for a way to shut the window, with his eyes glued to thething detaching itself from the tree, he was groping in all the wrong places. And the final thing was simply that the beast was fast. Much too fast to be real. The next thing Matt knew, he was fighting it off at the window. Matt didn't know what Elena had shown Bonnie at the picnic. But if this wasn't a malach, then what the hell was it? Matt had lived around woods his entire life, and he'd never seen any insect remotely like this one before. Because it was an insect. Its skin looked bark-like, but that was just camouflage. As it banged against the half-raised car window – as he beat it off with both hands – he could hear and feel its chitinous exterior. It was as long as his arm, and it seemed to fly by whipping its tentacles in a circle – which should be impossible, but here it was stuck halfway inside the window. It was built more like a leech or a squid than like any insect. Its long, snakelike tentacles looked almost like vines, but they were thicker than a finger and had large suckers on them – and inside the suckers was something sharp. Teeth. One of the vines got around his neck, and he could feel the suction and the pain all at once. The vine had whipped around his throat three or four times, and it was tightening. He had to use one hand to reach up and rip it away. That meant only one hand available to flail at the headless thing – which suddenly showed it had a mouth, if no eyes. Like everything else about the beast, the mouth was radially symmetrical: it was round, with its teeth arranged in a circle. But deep inside that circle, Matt saw to his horror as the bug drew his arm in, was a pair of pincers big enough to cut off a finger. God – no. He clenched his hand into a fist, desperately trying to batter it from the inside. The burst of adrenaline he had after seeingthat allowed him to pull the whipping vine from around his throat, the suckers coming free last. But now his arm had been swallowed up past the elbow. Matt made himself strike at the insect's body, hitting it as if it were a shark, which was the other thing it reminded him of. He had to get his arm out. He found himself blindly prying the bottom of the round mouth open and merely snapping off a chunk of exoskeleton that landed in his lap. Meanwhile the tentacles were still whirling around, thumping against the car, looking for a way in. At some point it was going to realize that all it had to do was fold those thrashing vine-like things and it could squeeze its body through. Something sharp grazed his knuckles. The pincers! His arm was almost completely engulfed. Even as Matt was focused entirely on how to get out, some part of him wondered: where's its stomach? This beast isn'tpossible . He had to get his arm freenow . He was going to lose his hand, as sure as if he'd put it in the garbage disposal and turned it on. He'd already undone his seat belt. Now with one violent heave, he threw his body to the right, toward the passenger seat. He could feel the teeth raking his arm as he dragged it past them. He could see the long, bloody furrows it left in his arm. But that didn't matter. All that mattered was getting his armout . At that moment his other hand found the button that controlled the window. He mashed it upward, dragging his wrist and hand out of the bug's mouth just as the window closed on it. What he expected was a crackling of chiton and black blood gushing out, maybe eating through the floor of Elena's new car, like that scuttling thing inAlien . Instead the bug vaporized. It simply†¦turned transparent and then turned into tiny particles of light that disappeared even as he stared at them. He was left with one arm with long bloody scratches on it, swelling sores on his throat, and scraped knuckles on the other hand. But he didn't waste time counting his injuries. He had to make it out of there; the branches were stirring again and he didn't want to wait to see whether it was wind. There was only one way. The ditch. He put the car in drive and floored it. He headed for the ditch, hoping that it wasn't too deep, hoping that the tree wouldn't somehow foul the tires. There was a sharp plunge that made his teeth clash together, catching his lip between them. And then there was the crunch of leaves and branches under the car, and for a moment all movement stopped, but Matt kept his foot pressed as hard as he could on the accelerator, and suddenly he was free, and being thrown around as the car careened in the ditch. He managed to get control of it and swerved back onto the road just in time to make a sharp left turn where it curved abruptly and the ditch ran out. He was hyperventilating. He took curves at nearly fifty miles an hour, with half his attention on the Old Wood – until suddenly, blessedly, a solitary red light stared at him like a beacon in the dusk. The intersection with Mallory. He had to force himself to screech to another rubber-burning stop. A hard right turn and he was sailing away from the woods. He'd have to loop around a dozen neighborhoods to get home, but at least he'd stay clear of any large groves of trees. It was a big loop, and now that the danger was over, Matt was starting to feel the pain of his furrowed arm. By the time he was pulling the Jaguar up to his house, he was also feeling dizzy. He sat under a streetlight and then let the car coast into the darkness beyond. He didn't want anyone to see him so rattled. Should he call the girlsnow ? Warn them not to go out tonight, that the woods were dangerous? But they already knew that. Meredith would never let Elena go to the Old Wood, not now that Elena was human. And Bonnie would kick up a huge noisy fuss if anyone even mentioned going out in the dark – after all, Elena had shown her thosethings that were out there, hadn't she? Malach.An ugly word for a genuinely hideous creature. What they really needed was for some official people to go out and clear the tree away. But not at night. Nobody else was likely to be using that lonely road tonight, and sending people out there – well, it was like handing them over to the malach on a platter. He would call the police about it first thing tomorrow. They'd get the right people out there to move that thing. It was dark, and later than he'd imagined. He probably should call the girls, after all. He just wished his head would clear. His scratches itched and burned. He was finding it hard to think. Maybe if he just took a moment to breathe†¦ He leaned his forehead against the steering wheel. And then the dark closed in.

Friday, November 8, 2019

Naked Egg Drop Lab Report Essays

Naked Egg Drop Lab Report Essays Naked Egg Drop Lab Report Paper Naked Egg Drop Lab Report Paper Things we learned that was relevant to the lab were what Potential Energy and Kinetic Energy was. Potential Energy is stored energy due to objects relative position, while Kinetic energy was energy of motion; amount of energy depends on objects mass and velocity. The lab with the roller coaster showed examples of when the coaster was at the highest point that it had more Gravitational Potential energy and that by the time it reached the bottom or the lowest point of the hill it had the most amount of Kinetic Energy. The goal of the lab was to make a contraption that if an egg was dropped from about 18 Ft it wouldnt break or even crack. We tried to absorb the force of the egg so that it wouldnt hot the ground with too much energy. The contraption had a net made of yarn to catch the egg and not have it bounce too much; it was slanted slightly so the egg could roll down into a soft pile of cotton that lined the bottom of the box. The purpose of the lab was to make a contraption that would prevent an egg from breaking if dropped from about 18 feet high. The egg was to land at the highest point of the net and roll gently down into the cotton lining at the bottom of the box. Materials: * Box 22 x 45 x 29 * Net (yarn) * Cotton Balls * Large Paperclips The data does make sense. If someones data was off the way it could affect our results was it could slight miscalculations or false information. Ways we deal with this data is we do at least 2 trials and average up the data to ensure that the data would be a bit more accurate. The way the results relate to the purpose statement is it helped determine the exact height of the drop, how much kinetic energy and gravitational potential energy the egg has at a given point, and how much force and impact the egg lands with. For example I could calculate the height of the drop, too make sure the calculations are accurate, using the d=vi t+1/2 tat; I calculated that the drop should be around 6. 71 meters or about 18 Ft, which is pretty close to the actually height . Errors that could have occurred were miscalculation, incorrect information, wrong time, wrong measurement, etc. We had several timers to make sure we had the timing as accurate as possible and we compared are data to make sure we got the same data. The goal of this lab was to make a contraption that would stop the egg from breaking when dropped from about 18 Ft and to find out how much potential and kinetic energy the egg has at a given time.

Wednesday, November 6, 2019

Nokia and the RFID student attendance monitoring system The WritePass Journal

Nokia and the RFID student attendance monitoring system Abstract: Nokia and the RFID student attendance monitoring system Abstract:Introduction:Aim: Deliverables: Research question(s): Problem StatementScope:Summary:Resources required:Literature Review:Smart Card Technology:RFID technology background:RFID Reader RFID tags:RFID Frequencies:Elements of an RFID System: Technical capabilities of Mobile interaction with NFC:NFC detection:Share to device:Service tags:Share or read service tags:Bluetooth:Numeric Comparison Method: Just Works Method:Out of Band Method:Passkey Entry Method:Contactless communication API:  Ã‚   DesignDescription:References:Related Abstract: RFID student attendance monitoring system is a system that will take students attendance by using RFID technology. This system mainly comprises of Nokia 6212 NFC mobile which is used as RFID reader, RFID tags which are embedded to the students ID cards and Server machine which is likely computer. This system records student’s attendance to an attendance database server. The system is included with other additional system module for students and lecturers. The information in the attendance database is used by the university administration to better manage the class room statistics, warning for unattended students via letters or e-mails, reminder for students, report for parents and students can also track their performance. RFID student attendance monitoring system is developed using java programming language. The database support for this software is oracle 10g. In order to have complete system functionality, the software application is needed to be integrated with the RFID te chnology. The software application on the computer is needed with the attendance details which would come from the RFID reader in to order to take attendance and persist in the database. The software application on the computer is deployed in Apache Tomcat 6.0 server and can be viewed by the user by using any internet browsers such as Mozilla Firefox or Google Chrome. Introduction: The research is proposed to investigate the requirements of automatic students’ attendance monitoring system. The requirements which has been identified and modelled are represented in the form of structure for students’ attendance system. In order to obtain requirements, some of the methods have been applied such as observation and literature research related to current RFID monitoring systems. We have an existing system like taking attendance manually. For example professors take attendance of their students by taking signatures on an attendance sheet. The main problem with this system is that students will sign occasionally for their friends who are not present to the class. The purpose of this project is to automate tracking of the presence of students in the class room, with the intention of bringing transparency and reducing number of errors that usually happen in such tasks. The another problem is counting each student attendance for the total semester will be difficult if the professor got 100 or more students which leads to time consuming and error prone. In order to make taking attendance simpler I got a thought to make this application automatic with the existing identification technologies like automated finger print identification system, barcode system and radio frequency identification system. In my project I am using radio frequency identification (RFID) technology for security and attendance purposes. Identification means the ability to find, retrieve, report, change or delete specific data without having any doubt. These problems can be eliminated by using RFID technology. The main advantage of RFID based student attendance monitoring system is, 1. It saves time for taking attendance during the class. 2. More authentic attendance system 3. Reduces paper based system 4. It provides interaction between student, course leaders and lecturers. Student attendance monitoring system is an exclusive software solution. It can be integrated with RFID technology. In order to implement this project we require RFID reader, RFID tags and web interface. The card reader should positively identify student’s ID cards and provide consistent class attendance logs for the benefit of students, lecturers and university. The attendance logs must be stored in the central database in order to generate reports. The device must capable to communicate with the central database server. Professors should be able to view attendance and be capable to add information to the system. 1. This application tracks each student’s classroom attendance for any number of students. 2. It provides a software set up to monitor information about scanned cards against a database and provides detailed statistics to the lecturer’s about the students. The software set up must include adequate administration capabilities. 3. Provide a wireless interface between the reader and database server. 4. It also provides facility to the course leaders, professors to monitor student attendance at regular intervals. 5. It monitors the attendance of students for each course. Radio frequency identification (RFID) consists of a transmitter chip/IC and a receiving antenna. Each chip has a unique identification number generally referred to as a RFID Tag, which is attached to the object that we want to discover. Now the RFID tags are detected and identified using an antenna or a scanning device known as transceiver, which with the help of radio signals identifies the tag, the object. In this project, the RFID tags will be associated, to the students (by attaching the RFIDs to student’s university cards) and the transceivers will be placed on the entry points of the classrooms. Software at the back end will keep and manage the records, relating to the student’s entry to the classroom. All the use-cases will be accomplished using software having application and databases layers. Concepts of Object orientation will be followed in the design of the system. Aim: This research is aimed to develop a student attendance monitoring system using RFID technology. Objectives: The main objective of the project is to automate the student attendance recording system using RFID technology. To study on data transfer between RFID system and Graphical user interface (GUI). The application should be able to display the student attendance percentage in each of the modules and the overall semester attendance. The application should be capable to generate attendance reports for the authorized party which we would be helpful for university administration to have better database record. To test the application using testing techniques. Deliverables: 1. A review of RFID readers and methods for programming them including a demonstration application running on the Nokia 6212 that can read the unique information from an RFID label. 2. A Nokia 6212 application for tutors to take to classes to capture students id data from RFID labels. 3. A review of techniques for communicating between mobile phones and PCs accompanied by a demonstration application for transferring id card data from a Nokia 6212 to a PC. 4. A PC application for downloading and collating register data from a Nokia 6212 and storing it in a central database. 5. An application for generating reports for personal tutors and admin staff. Research question(s): How RFID Technology used for monitoring student attendance? What are the best techniques for storing and processing the data? What are the techniques and technologies for getting data from the phone to PC? Problem Statement According to Wang. (2005), Automatic student attendance using RFID technology comprises of multiple devices work together. The devices include RFID reader, RFID tag, system interfaces and databases. This system needs a good system design to make sure that the devices can capture accurate data and can interact with the information system accurately and efficiently. In order to obtain good system design, developers should have clear idea, knowledge and able to understand the requirements and convert them in to useful information. It is very important to represent the necessary information in to a meaningful data model suitable for application level interactions, including monitoring, tracking and application integration. Therefore a structure is needed to present plans for developing automatic student attendance monitoring system using RFID Technology. Why Automation? To save on time spent for daily roll calls. To avoid manual errors. To obtain accurate attendance means exact IN time. To avoid record search time, when we want to see any student’s attendance performance. To avoid reporting time used for preparing the attendance percentage reports at the end of the year. Finally to have professional and global look of the organization. Scope: The scope of this project is mainly based on the following things. I selected university of Wolverhampton as a case study to acquire requirements. Web-based technology is used to develop the application. Unified modelling language is used as a requirement modelling technique. Significance: The structure of the student attendance monitoring system is planned to provide strategy for developing automatic student attendance system using RFID technology. Need to know the project requirements for developing the application. Technical knowledge is required on RFID technology and software tools to develop the application. System functionality: Components used for the system RFID reader RFID tags Bluetooth connection Power supply Software on the computer Description: The students old ID cards will be replaced with RFID ID cards which means the RFID tags are embedded on the ID cards. The card looks similar to their old cards having photo, name and other details. The sufficient number of RFID readers will be installed at the entrance of each and every class room. All the RFID readers are networked to the computer via Bluetooth connection. The students enter the class room by showing their ID cards to the RFID reader from the maximum of 3cm. The RFID reader reads the card data that is RFID tag reference number and sends the data to the computer via Bluetooth connection. As soon as the card is read by the reader, the tag reference numbers will be streamed in the newly created excel sheet in the computer and waits for other card get scanned. The RFID reader reads a card within less than a second. The software application in the computer uses the data in the excel sheet for taking students attendance and maintains the data for generating reports. Summary: The RFID technology has been used by many sectors for automated tracking of objects like chain management, retailing, security and health care applications. The RFID student attendance monitoring system utilizes the existing RFID based applications technology which gives advantages to the users in the term of feasibility while recording their attendance. This application combines multiple devices which work together as a complete system. This system consists of readers, tags, user interfaces and databases to keep and manage user’s data. Designing multiple devices system is a great challenge. The developer needs to have a clear understanding of the system from different perspectives to ensure the successful of the system. Therefore this research investigates the requirements of the system and suggests a structure for it. Resources required: The following resources are required to develop the application.    Processor 1 GHz processor is recommended RAM 256 MB RAM is recommended Operating System Windows XP Service Pack 2, Windows Vista or Windows 7 is recommended IDE Eclipse Pulsar 1.3.2 Database Oracle 10g Java Tools JDK and JRE 1.6 is needed to run java files Web Server Jakarta tomcat 6.0 is necessary to host the application on the web and to test the application. Hardware Nokia 6212 NFC Mobile is used as a RFID reader and RFID tags and Server machine MS – Office 2007 MS-Excel 2007 is recommended. Literature Review: Automatic Identification and Data Capture Technology: This chapter mainly describes the introduction to automatic capture of data for the purpose of user identification. Definition of User Identification Devices (UIDS): User Identification devices are used to describe a physical object or a process that discovers the attributes of the consumer or producer and attempts to exclusively organize that entity. The main objective of the UIDs is to maintain accountability and access control. Currently the UIDs are supported by the business people because it making them more convenient, continuing efforts to make them smaller, easier to transport and maintain, and more efficient with respect to data throughput. Many of the UIDs are currently in usage they are plastic cards or badges with a picture on it, barcodes, magnetic strips, embedded microchips also known as smart cards, biometrics and passwords. The latest identification technology which is being advanced is the use of radio frequency. The radio frequency identification is a noncontact transmission method. The main objective method is to automatically capture the data for accurate identification. Firstly these UIDs need to improve the security and int egrity of UIDs. Automatic Identification and Data Capture (AIDC): The Automatic Identification and Data Capture (AIDC) can be referred as a worldwide industry term. AIDC explains the identification and direct collection of information into a computer system, programmable logic controller (PLC) or other microprocessor-controlled device without using keyboard.   The ability of recognizing and accessing the information in secured places within the business world and without the use of keyboards has directed to the use of contact and non contact badges and cards. Smart Card Technology: In the early 1950’s the concept of plastic cards was first appeared in the USA. They introduced plastic credit cards and it was first being issued by Diners club in 1950s. Later integrated technology was developed which made it possible to integrate data memory and processing logic on to a single silicon chip. The desire for the ease of a smaller transaction tool caused the two to merge in to what is known as the â€Å"smart card†. RFID technology background: According to Ching-Hsien Hsu. et al. (2009), RFID technology is one of the most commonly used technologies for identification nowadays. It is an automatic technology which helps the machines or computers to identify, record, or control the individual target through radio waves. Typically an RFID system consists of two components namely RFID reader and RFID tag. Generally RFID reader electronics uses outside power resource to generate a signal to drive the reader’s antenna and turn into radio wave. The radio wave will be accepted by the RFID tag and reflects the energy in the way signalling its identification and other related information. In order to access the reflection from the RFID tag, the RFID reader works as a receiver on sensing and decoding the signal from the RFID tag. In simple RFID system, RFID tag is passive and powered by the energy of the reader’s signals. In some systems, the RFID reader radio frequencies instruct the memory to be read or write from the associated RFID tag. RFID Reader According to Johansson (2004), The RFID readers continuously send the interrogating radio signals in search for the responding tags. These radio signals are sent at fixed frequency bands. The tag discovers this radio energy signals and sends the tag’s serial number and any other information to the reader. In addition to reading the data from the tag, some readers can write data to the tag.   The distance from which a reader can set up a contact with a tag is called read range and the read rate can be defined as the maximum rate at which the data can be read from the tag (bits or bytes per second). The high frequency signal and the stronger powered examination signal for communication increases the range of communication. According to Simson (2005), Historical RFID readers were designed to read only a particular type of tag but multimode readers can read different type of tags and are becoming popular. Similar to tags, RFID readers come in many sizes. The largest reader consists of a desktop computer with a special card and multiple antennas connected to the card through shielded cable. These type readers in general hold a network connection, so that it could report tags that it reads to other computers. The smallest readers are of postage stamp size and are designed to embed in mobile telephones. RFID tags: According to Mark (2010), An RFID tag is sometimes referred as a transponder. It contains the identifying data of the object where it is sited on and it generates a signal containing that relevant information. There are four different types of tags available based on the power sources. They are: Passive tags Semi Passive tags Active tags Semi Active tags Passive tags: These tags usually get their power to transmit the signal from the magnetic field created by the RFID reader. These tags can transmit up to a range of 10 meters. These tags are smaller and cheaper because they don’t have batteries. Semi Passive tags: This tag consists of onboard battery which is used to power the onboard circuitry but it doesn’t produce any signal but it still uses magnetic field produced by the reader to produce a signal. These tags have a maximum transmission range of 100 meters. Active tags: This tag consists of an onboard battery which is used to communicate and send signals to the reader and power the onboard circuitry. The onboard battery allows it to transmit up to a maximum range of 1000 meters. Semi Active tags: These tags are very much similar to active tags with a small difference of they remain in sleep mode until they receive a signal from the reader. Which means the tag activates when it receives a signal from the reader. The communication between the reader and tag is possible through the radio frequencies. Tag detection: According to Bogdon (2008), Signals from the RFID readers activates the tags which are likely within their examination zone. The examination zone can be referred as the area around the reader where the tags can receive the readers signal, process it and sends back the response that can be decoded by the reader. The information that is decoded by the reader is passed to the host computing systems for processing according to the application. RFID reader-writers have the capability to send back the data to the read/write-capable tags in order to append or replace data. The RFID reader usually locates, activates, and receives transmissions from RFID tags. Readers can be fixed or portable. Fixed readers are typically attached to antenna to notice the tag within particular area. These readers usually collect the data from the products that are travelling through conveyor belt, gates and doorways etc. Portable readers can be moved to detect remote tags. In today’s market readers with wireless communication capabilities exists such as SkyeTech’s SkyeRead reader is attuned with Mica Motes and IDBlue is a handheld Bluetooth 13.56MHz reader with High Frequency is compatible with devices ranging from PDAs to PCs. Now a day’s major mobile phone manufacturers providing phones with embedded RFID readers e.g. Nokia 6131 and Nokia 6212 NFC. RFID Frequencies: According to Ali (2008), Different RFID systems drive at a variety of radio frequencies. Each range of frequencies offers its own power requirements, operating range and performance. Each of the ranges may have different restrictions that limit based on the applications they can be used for. The detection range may vary from few centimetres to 100 meters. RFID systems are currently operating in the Low frequency (LF), High Frequency (HF), Ultrahigh Frequency (UHF) and Super High Frequency bands. RFID operation frequency ranges and related applications shown in the below table: Frequency Range Description Typical Applications 135 KHz Low Frequency, Inductive Coupling Access Control OEM applications 13.56 MHz High Frequency, Inductive Coupling Access Control and Library Books 868    870 MHz902 – 928 MHz Ultra High Frequencies (UHF), Backscatter coupling Supply chain tracking 2.40 t – 2.483 GHz SHF, Backscatter coupling Asset tracking Highway toll tags Vehicle tracking Elements of an RFID System: Basically RFID system consists of four elements: RFID Readers RFID tags Antennas and radio characteristics Computer network (if any) which is used to connect the readers Antennas and Radio: The physical layer of the RFID system comprises of antennas and radios used to connect the reader to the tag which allows the devices to share the information. The RFID tag antenna is the conductive element that allows the tag to send and receive data. In order to form a magnetic field, the passive, low (135 KHz) and high frequency (13.56 MHz) tags consists of a coiled antenna that couples with the coiled antenna of the reader. UHF antennas come in different shapes. Readers consist of antennas which releases radio waves. The Radio Frequency energy from the reader antenna is harvested by the antenna and this energy is used to power up the microchip, which leads to change the electrical load on the antenna to reflect back its own signal. rfidjournal.com/glossary/antenna   Near Field Communication: According to Raine (2009), Near Field Communication (NFC) and Radio Frequency Identification (RFID) terms are often confusing as the RFID acronym holds multiple standards. NFC and RFID are used inaccurately as transferable terms. This means that the RFID readers might be able read the RFID tags which are implemented with the same standard. Near Field Communication (NFC) technology is used for remote identification and data transfer at reading ranges up to a few centimetres. It means it reads the tags which are close in range. NFC can be considered as a division of more common RFID technology. NFC operates in different communication modes when compared to traditional RFID reader/RFID tag combination. It is more likely for the two NFC devices communicate each other and NFC devices are also capable to imitating definite RFID smart cards. The emulation mode enables the NFC devices to use the existing reader infrastructure. NFC is complaint with some smart card ISO (International Organiza tion for Standardization) standards: ISO 14443A, 14443B, and 15693 along with Sony’s FeliCa Standards and MiFare. NFC was initiated from a joint project of Philips and Sony for developing a short range communication technology in 2002 and it resulted as a Ecma Standard (ECMA 340) and later it was a accepted as ISO Standard 18092 in 2003. Nokia, Philips and Sony founded the NFC forums and been promoting the NFC technology. According to Raine (2009), Basically NFC operates in three different modes. The first operational mode is read/write mode. In this mode, the NFC device reads/writes data to or from an NFC complaint tag and in read/write mode the NFC device acts as an initiator and the tag acts as a target. In this mode it transfers the data at a maximum rate of 106 kilo bits per second. The second operation mode is peer to peer mode. In this mode it allows the two NFC devices to interact to each other and the maximum data transfer rate is 424 kilo bits per second. The third operational mode is emulation mode which allows the NFC device to emulate as a smart card. In this mode the built-in smart card chip is integrated in the NFC device and connected to the NFC antenna. Technical capabilities of Mobile interaction with NFC: According to Khoovirajsingh (2009), in these days mobile phones are increasingly used for storing pictures, videos, documents and Personal Information Management (PIM) data. In addition to this there is often need to copy these files from mobile phone to a computer or vice versa. In this process the user first need to find file, then need to select the method for transferring file (e.g. Bluetooth), after wards the user need to perform the device discovery process, then select the target device. After having the file on the other device, the user has to decide what to do with it. This will be an awkward process to the user. In order to avoid this process. Some of the basic interaction techniques are available to make things simple. According to Gregor (2011), Dynamic NFC-displays can be used for a wide range of applications at private e.g. home, semi-public e.g. pubs and public places like stations and shopping malls etc., including information retrieval, interactive advertisements, maps or games. NFC enabled mobile phones provide interaction with the diverse content of dynamic NFC-displays, including pictures, texts, links, maps and custom widgets. The design, implementation and performance of interaction techniques for dynamic NFC-displays rely on the technical capabilities of reading devices, tags and physical UIs. Basically NFC displays depends on the size of the tags, target items and mobile devices. Some of the NFC enabled mobile phones are available in the market e.g. the Nokia 6212 NFC classic. This mobile can read only tag a time and cannot identify multiple tags as they block during the interaction with one or several items. NFC enabled devices need a considerable amount of time to read a tag say abou t 0.5 seconds and tag should be placed very nearer to the device. These types of issues are seen in the currently available devices like Nokia 6212 mobile. Basic interaction techniques: These types of techniques can be used for simple interactions like the selection of items, triggering actions or activating links. Touch-select: This is the most basic interaction technique. In this technique the users touch a tag with a mobile phone and take out from it after the tag has been recognized. This tiny interaction can be varied through the combination with input from keyboard, joysticks or sensors. Click-select: This technical can also be referred as touch-select method. This method is pursued by pressing the pressing dedicated key on the mobile device to confirm the selection of the tag. Touch and Hold: This technique needs users to touch a tag for a certain amount of time which is longer than the normal touch-select e.g. 2 seconds. Double-touch: In this technique users have to touch the tag twice in a row. Contactless Cards (tags) Mifare 1k or 4k: According to NXP, (2007), The read/write mode of NFC needs two devices to communicate, one is NFC reader/writer and the other one is NFC tag. The NFC technology permits to access standard ISO 14443A card products as the Mifare family. In the NFC forum, the specification to store data for any kind of service or application is currently specified and it is known as NFC Data Exchange Format (NDEF). In order to store NDEF formatted data which is also called as NDEF data or NFC forum data inside a contactless tag product a mapping model is required. The Mifare 1k/4k tag product is a contactless card presently available in market with 1k byte and 4k byte of EEPROM memory. The Mifare standard 1k/4k supports mutual three pass authentication, file data transfer up to 106 kbit/s, data encryption of RF-channel with replay attack protection and CRYPTO1 stream cipher for secure data exchange. Mifare 1k tag: A Mifare 1k tag is able to store up to 1024 bytes of information. These 1024 bytes are organized as 16 different sectors numbered as Sector 00, Sector 01..Sector 0E and Sector 0F. Each sector comprises 16 bytes of data blocks named as blocks and numbered as Block 0, Block 1, Block 2 and Block 3. Block 0 of the Sector 00 contains IC manufacturer’s data. In every sector Block 3 is called as trailer and is used for sector authentication serving the security purposes. The first six bits of the authentication block are known as Code A, the next four bits are known as access bits and finally the last six bits are known as Code B. Code A and Code B are typically password keys which can be programmed for reading and writing protection. Fig: Mifare 1k Mifare 4k: The memory area of Mifare 4k is organized in numbered sectors from 0 to 39. It can store 4096 bytes of information. The organization of the first 32 sectors follows the similar structure of blocks and sectors of Mifare 1k. The last eight sectors are quadrupled in capacity. Depending on the settings of the access bits the reader device has to carry out an authentication with key A or key B to read or write the sector. Nokia 6212 NFC Classic Mobile in focus: According to Nokia Corporation (2008), The device which i focussed of this paper is Nokia 6212 NFC classic. This device comes with an RFID module which functions as RFID tag and reader operating at 13.56 MHz. It also supports features like read write, card emulation and peer to peer communication. According to product specification, the Nokia 6212 NFC device is capable of Tag reading and writing as native NFC functionality. Contactless communication API (JSR-257) with extensions for java applications on the phone. It gives support for all NFC Forum defined tags. This phone is compatible with non-battery powered tags (passive tags) which are: a)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   MIFARE (Standard, Standard 4K, Ultralight and DESFire) b)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sony FeliCa (non-secure) c)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Innovision (Jewel read only and Topaz) d)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ISO 14443-4 complaint tags or cards. Compatible with ISO/Global platform smart card for service providers to install application specific data e.g. payment and ticketing applications. Compatible with existing contactless reader infrastructure (payment and ticketing). The main features of Nokia 6212 NFC include different connectivity options like Bluetooth, GPRS, USB and NFC with read, write and sharing capabilities. Graphic display with 2† QVGA 240 x 320 display supporting up to 16 million colours and contains user storage of 22 MB and microSD format for removable flash cards. Fig: Nokia 6212 NFC Mobile Nokia 6212 provides some settings to configure NFC functionality. NFC detection: To switch NFC on or off we need to select Menu NFC NFC settings. To use NFC switch on the mobile and activate the NFC setting, if disabled. With the phone touch the service tag or other NFC device with in the discovery area. Typically the reading range is 0-3 centimetres. When a tag or device is discovered the corresponding information is displayed on the mobile. Share to device: Select Menu NFC Share to device and select the required option. When the sharing is enabled you can send a bookmark, business card, call request, alarm alert calendar note, gallery item, profile, radio station, note, or to-do note. Service tags: A service tag may hold a shortcut such as URL of an internet based service, business card, SMS based service and phone number of a telephone service. Share or read service tags: Select Menu NFC Share to tag. Scroll to select desired option. Select share and touch a service tag. In order to read a service tag, need to touch a tag with the phone. Touch a service tag with your device to allow video streaming or Bluetooth connection or receive a business card, SMS message, call request, bookmark, calendar note etc. NFC received items or card applications can be accessed by selecting Menu NFC Inbox or Cards. The device memory restricts the amount of tag data that can be stored. In order to free up memory space delete the received files from the NFC Inbox. We can share the same information repeatedly to different service tags. Bluetooth: According to Cynthia et.al. (2007), Bluetooth is a Personal Area Networking standard based on short range radio. Devices like phones, printers, modems and headsets use Bluetooth technology to communicate between themselves. Bluetooth technology is mainly useful for communication when two or more devices are in close proximity and need reserved bandwidth. A Bluetooth device either acts as a â€Å"master† or â€Å"slave†. At most a master can communicate with seven slave devices, and a Bluetooth consisting of one master and it slaves is called a piconet. The master acts as a controller to control all the timings of all Bluetooth connections on piconet. Bluetooth pairing can be defined as a process of adding new slave device to the Bluetooth piconet. Bluetooth simple paring is a set of security improvements to the Bluetooth pairing mechanism. The target of the Bluetooth simple pairing is to set up authentication credentials between the Bluetooth master and the slave device s. Bluetooth simple pairing encourages four different pairing models.   Those are: Numeric comparison Just Works Out of Band and Passkey Entry Numeric Comparison Method: The Numeric Comparison model is proposed when both the devices are able to display a six digit number and both provide â€Å"Yes† and â€Å"No† buttons. Numeric Comparison For example, A PDA can use the pairing scheme with a PC.   During the process of pairing, each of the devices displays a six digit number matched from the pairing protocol. The user of each device is believed to compare the two numbers and select â€Å"Yes† if they match and â€Å"No† if they mismatch. The numeric comparison is executed over Bluetooth, which is in the in-band channel in the standard model for authentication. Just Works Method: The Just Works model is proposed when at least one of the devices has no display or â€Å"Yes/No† buttons.   This model is commonly used when pairing a Bluetooth headset with a cell phone. This method is similar to numeric comparison model but it does not display the six digits for comparison it uses numeric comparison internally. Even if one of the device displays numbers it won’t be compared on the putatively paired device because the Just Works model lacks any out-of-band channel required by the standard model. This model does not provide security against active attack. Out of Band Method: The â€Å"Out-of-Band† method is used when an alternate communication medium exits on both the devices, such as Near Field Communication (NFC). The alternate communication medium transfers a key between the proposed devices and functions as the Out-of-Band channel in the standard model. Passkey Entry Method: The Passkey Entry method is proposed when one of the devices has a display and the other device should have a key pad. The device which has got display randomly generates a six-digit number and the user enters this number on the other device using keypad. Like the numeric comparison an attacker can negotiate the six digit pass key with a probability of at least 2-20. The protocol which divides the passkey in to 20 bits and unveils one bit over 20 rounds of exchange. Each bit of the passkey can be computed by an eavesdropper after it has been sent. A passkey can be used securely only once. Pass key Entry    Why attendance should be taken? According to Melchiorre, et. al. (2003), To verify the accuracy of attendance records, the research team visited Southwest Community Center three times on different days of the week at different times. During their visits the research team conducted random head checks, looked at the attendance and registration records. They discovered the flow of passage throughout the Southwest Community Center. During the head checks, the number accounted on the attendance sheet was compared with the number of members present. While these attendance sheets do not contain time in and time out and the head checks could not show whether the attendance recorded correctly or not. This results inaccurate attendance. Finally we could not know how many persons were present during the entire hours of operation. Problems with the attendance can be recognized as unclear understandings of job responsibilities. According to Mary. (2005), A small California startup called InCom has developed a radio frequency identification (RFID) system called Inclass which is used automate student attendance in elementary and secondary schools. This system uses ultra-high frequency (UHF) readers which are mounted at the entrance of the class rooms and passive RFID tags are embedded to student ID cards. This InClass system was tested at Brittan Elementary School in Sutter, but the use of RFID in schools was protested by the parents of Brittan students. The Brittan school administrators were interested in the product in part because California bases school assist upon attendance numbers. The InClass product working scenario: Each of the students ID card comprises of unique 15 digit ID number written to each tag and associated with name of the student. When the student pass through the reader interrogation area at the class room entrance, the reader immediately sends the tags unique ID numbers to a central server. Software program was developed by the InCom and it is installed on the server where it collects the tag data and uploads a list of present, absent and tardy (based on when they enter the classroom) students to the PDA which is issued to the teachers. The upload can be done wirelessly over an 802.11b Wi-Fi protocol. Now the teacher would perform a visual check on the InClass generated attendance list by examining the class quickly to compatible what the list says with class room present number. Once the attendance was confirmed, the list is sent to the school administrators via PDA. School administrators need to file attendance records to the board of educati on. Later school administration tested the InClass product to see whether it could decrease the amount of time taken by the teachers to take attendance manually. Contactless communication API:  Ã‚   According to Enrique (2008), the contactless communication API java specification specifies a set of proximity, contactless-based communication. These specifications are defined under the java community process as JSR-257 and led by Nokia.    JSR 257 Packages: Out of all these packages mainly we use javax.microedition.contactless API. The contactless communication API permits us to Discover and Exchange data with contactless targets such as NDEF tags, RFID tags, and external smart cards. This API also provides support for visual tags. The following diagram demonstrates the relationships between the different API classes and interfaces. Fig: Contactless Communication API Relationships Source: http://java.sun.com/developer/technicalArticles/javame/nfc/ Applications using Contactless Communication API usually follow the flow demonstrated below. Fig: Typical flow of a Contactless Communication Application    Each of the steps are explained below. The first step is basically for the application to query the implementation to discover the supported targets by the device. Here the application registers a target listener to receive activity notifications for each of the supported targets. On the other hand the application registers with the PushRegistry for the activation due to target activity. The supported target activities are NDEF and secure element in card emulation method activities. When the targets come in to proximity they are discovered by the implementation, which notifies the application by invoking the right activity listeners. On the other hand PushRegistry activates the MIDlet. The application can learn the target properties for each of the discovered target. The application can be connected to read, write, exchange data with the discovered agent. When the job is done the application releases the resources. Design This phase will produce outline of the system architecture and the prototype of the application that will satisfy all requirement analysis. In this stage all the necessary input, user interface and process will be identified. This phase also determines the application architecture which will show how to transform the logical design in to basic system coding to generate the first prototype of the system. The result of this phase is application interface and system design specification. This research proposed an outline for student’s attendance monitoring system using RFID technology. Implementing this kind of system will maximize lecture time and provide convenience to them. This application uses Nokia 6212 NFC mobile as a RFID reader and are placed at the entrance of the classroom. The MIFare RFID tags are attached to the student ID cards. A unique ID number is written to the tag. When the student scans the ID card through the reader range at the classroom, the reader sends the tags unique ID numbers to the computer via Bluetooth. Description: A framework includes the hardware of the system, and describes how it works. However, the reader must be placed at the entrance of the classroom to read the student ID cards (Tags) of every student who attends classes. This proposed research mainly contains four components which are discussed below. The reader: RFID reader is responsible for communicating with the tag and it uses radio waves to retrieve data from the tag. The tag: RFID tag is an integrated circuit which is embedded on the student ID cards. This research proposes to use passive tag, which does not need any battery. This type of tags gets it power from the reader. Software Development process: This software application uses Contactless Communication API (JSR-257) which comes with Software Development Kit for Nokia 6212 NFC mobile phones. Nokia 6212 NFC SDK allows the users to develop Java applications (MIDlets) for Nokia 6212 NFC mobile phones. The contactless communication API mainly gives access to many contactless cards and communicates with them. Some of the use cases of Contactless Communication are calling a taxi by touching tag given by the taxi company and linking to a web page by touching a smart poster. In order to discover and communicate contactless targets, the applications should use classes and interfaces of this API. The contactless cards which pass through in the radius of NFC device can be recognized by any instance of DiscoveryManger class to receive notification. Then the device can set up a target particular connection defined in the subpackages with the detected target. The link required to open connection to the target device is given in the TargetPr operties parameter. For example, for an external smart card it can be ISO14443Connection.   Access and modification of data is provided by the methods of this connection. The data exchange format (NDEF) allows communication between an NFC device and another NFC device or with a tag which is defined in the NFC forum. Any device that supports NDEF data formatting is capable to communicate by using APDU (Application Protocol Data Unit) commands given by the Contactless Communication API. Record Type Definitions (RTD) which is supported by the NDEF defines the rules and formats for creating standard record types to be used by NFC Forum application definitions and offers users to create fully compatible applications. The four specific RTDs defined by NFC Forum are: NFC Text RTD: In this method by using NDEF format and RTD mechanism which allows storing text strings in multiple languages. An example of using this specification is integrated in the Smart Poster RTD. NFC URI RTD: Like the above method this technique also uses NDEF format and RTD mechanism to Uniform Resource Identifiers (URI). An example of using this specification is included in the Smart Poster RTD. NFC Smart Poster RTD: This method allows SMSs, URLs, phone numbers on an NFC tag, or to transport them between the devices. The Smart Poster RTD establishes on the RTD mechanism and NDEF format and uses the URI RTD and Text RTD as building blocks.    NFC Generic Control RTD: This method offers a simple way to request a specification to an NFC device (destination device) from another NFC device, tag or card (source device) trough NFC communication. The class diagram that shows the relationships of Contactless Communication API. Application Development: Programming Languages and Software Tools: Development Environment: Microsoft Windows XP (SP2) Eclipse pulsar 1.3.2 JDK 1.6 Nokia 6212 NFC mobile phone Mifare 1k or 4k tags Nokia connectivity frame work 1.2 Nokia 6212 NFC SDK 1.0 Apache Tomcat Server 6.0 Developing Application Tools: Java: According to Gosling, et. al. (2005), Java is a high-level object-oriented language produced by Sun Microsystems. Java is operating system independent since it uses Java Virtual Machine to interpret and execute the previously compiled code in different environments producing the same output. I have chosen Java technology as programming language to carry out this project. I have chosen Java technology as programming language to carry out this project. During this project i have used Java Standard Edition Development Kit 6 (JDK 1.6), the Java Standard Edition Runtime Environment (JRE 1.6) and Java Micro Edition with the Software Development Kit 3.6 (Java ME SDK 3.6) which also includes Java Wireless Toolkit 2.5.2.       J2ME:    According to Shenbagaraj, (2011), J2ME is called as Java to Micro Edition. It is an advance technology in java, developed with the help of Java Community Process Program. J2ME is specifically designed to operate within the limited resources available in the embedded computers and microcomputers and it is a low version of Java API and Java Virtual Machine. The J2ME mainly targeted the developers of small computing devices and intelligent wireless devices who want to incorporate cross-platform functionality in their products. The main advantage of using J2ME is compatible with all java enabled devices. The java enabled devices are Nokia, Motorola and Panasonic. J2ME application acts as a balanced application between local and server-side processing.    MIDlet:    According to Shenbagaraj, (2011), A MIDlet is a J2ME application which operates on an MIDP. A MIDlet can be defined with at least a single class that is derived from javax.microedition.midlet.MIDlet abstract class. A MIDlet can be called as a event-based application. All the routines that are executed in the MIDlet are initiated in response to an event reported to the MIDlet by the application manger. The application manger invokes startApp() method when the MIDlet is started. The startApp() method in a MIDlet contains a statement holds a statement that displays a screen of information and informs the user to enter a selection from the list of the list of options provided. A Command object is used to inform the user with a selection of options to opt from when the screen is displayed. Each screen should have a CommandListener. A CommandListener follows the user events with a screen and makes the right code to execute on the current event. Java Libraries: According to Sun. (2006), A java library can be referred as a set of resources required by a project. Typically a library contains one or more JAR files containing compiled classes, the source file required to debug the classes, and java documentation for the classes. A project can reference one or more libraries for the purpose of compiling java files or additional JAR files in the deployed application. In IDE the Library Manager allows you edit and create libraries. I have used few libraries which are downloaded from internet and added to the code to fulfil the requirements of the application. These libraries or APIs that communicate with some of the specific elements or implementations that have been used during the project development. They are BlueCove (JSR-82): According to BlueCove, (2008), BlueCove is a Java library for Bluetooth (JSR-82 implementation). This library currently interfaces with the WIDCOMM, BlueSoleil and Microsoft Bluetooth stack found in Windows XP SP2 or Windows Vista and WIDCOMM and Microsoft Bluetooth stack on Windows Mobile. BlueCove offers JSR-82 java interface for the following profiles: SDAP Service Discovery Application Profile RFCOMM Serial Cable Emulation Protocol L2CAP Logical Link Control and Adaptation Protocol OBEX Generic Object Exchange Profile (GOEP) profile on top of RFCOMM and TCP UploadBean: This API simply reads and stores the uploaded files sent the browser. It is a technical component that can be integrated in any Java/JSP/Servlets application.    Servlet:    According to Stephanie. (2002), A servlet is a java programming class which is used to extend the facilities of servers that hosts applications accessed through request-response programming tool. The servlets give response to any type of request and these are normally used to extend the applications hosted by the web servers. Java servlet technology usually defines HTTP specific servlet classes.    JSP:    According to Stephanie. (2002), Java Server Pages (JSP) technology is used to create web content that has both static and dynamic components. JSP technology provides a normal approach to create static content. JSP presents all the dynamic capabilities of Java Servlet. The main advantages of JSP technology are: A language for developing JSP pages, which are text based documents that illustrate how to process a request and construct a response. Techniques for defining extensions to the JSP language. Constructs for accessing server side objects. Developing platform: Eclipse: According to Bob, (2008). Eclipse is a software development platform developed in java and mainly used to develop java applications. It provides an IDE and a complete set of plug-ins. In eclipse except the eclipse kernel, everything is treated as a plug-in. This plug-ins expand the application features and permits the developers to program in different languages like C, C++, and COBOL etc. This also includes management of databases, extending network capabilities, creating web services etc by using eclipse’s interface. In total the Eclipse Plug-in central has gathered more than 1200 different plug-ins for eclipse, some of them are developed by third parties and released to the community. In this project, I have used EclipseME plug-in which helped in developing J2ME Midlets and Suite projects, supports J2ME emulators and offers JAD editor as well as connecting to the already installed wireless toolkits. Apache Tomcat Server: Apache Tomcat Server is free open-source software from Apache Software Foundation (ASF). It can be defined as a container where java Servlets and Java Server Pages (JSP) files are placed and afterwards invoked. In this project i have used Tomcat 6.0 version and made use of configurations. Management Console: The management console offers a web interface where the parameters of the developed application can be configured. It consists of JavaServer pages, which are hosted in the Tomcat server.   The web interface comprises of four different tabs through which the user can be capable to establish the parameters’ values. Nokia PC Suite: Nokia PC Suite is a group of applications that permit connecting Nokia mobile phones to computers. Basically it is used to transfer pictures, music or applications. This application is used in the project in order to send the developed Midlets to the NFC-enabled phones through Bluetooth. References: Ching, H.- H., Shih, C.-C., Chia, H.-Y., Jong, H. –P. (2009)  Ã‚   Alleviating reader collision problem in mobile RFID networks. Proceedings at Springer-Verlag London Limited, pp.489-497. Johansson, B.(2004) An Introduction to RFID – Information Security and Privacy Concerns, TDDC03 Projects. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.111.5602rep=rep1type=pdf Simson. G, and Henry, H.(2005) UNDERSTANDING RFID TECHNOLOGY. garfinkel.book, 15-36. [Online] [Assessed on 2nd June 2005] Available from: http://ptgmedia.pearsoncmg.com/images/0321290968/samplechapter/garfinkel_ch02.pdf Raine. K, Tommi. K, and Jouni I.(2009) Remote Identification and Information Processing with a Near Field Communication Compatible Mobile Phone. Proceedings at International Conference on Computer Systems and Technologies CompSysTech’09 Mark. M and Elmarie. B. (2010) Integrated Security Framework for Low Cost RFID Tags. ACM 978-1-60558-950-3/10/10 Al-Ali, A.R. Fadi, A. Nada, R. Amin, A. Al-Zarouni, Nassar, H. (2008) Mobile RFID Tracking System. Available from: aloul.net/Papers/faloul_ictta08.pdf Khoovirajsingh. S, Enrico. R, Robert. H, Paul. H. (2009) Touch Connect and Touch Select: Interacting with a Computer by Touching it with a Mobile Phone. Computing Department, Lancaster University, UK: ACM 978-1-60558-281-8. [Accessed 15th September 2009]. Available at: http://delivery.acm.org.ez-proxy.unv.wlv.ac.uk/10.1145/1620000/1613905/a36 seewoonauth.pdf?key1=1613905key2=1417853031coll=DLdl=ACMip=134.220.2.101CFID=17640379CFTOKEN=61603121 Gregor, B. Wolfgang, R. Paul, H. Matthias, W. (2011) Design and Evaluation of Techniques for Mobile Interaction with Dynamic NFC-Displays. ACM 978-1-4503-0478-8/11/01. [Accessed   26th January 2011]. Available at: http://delivery.acm.org.ez-proxy.unv.wlv.ac.uk/10.1145/1940000/1935743/p205-broll.pdf?key1=1935743key2=6866853031coll=DLdl=ACMip=134.220.2.101CFID=17640379CFTOKEN=61603121 Enrique, C. (2008) An Introduction to Near-Field Communication and the Contactless Communication API. Available at: http://java.sun.com/developer/technicalArticles/javame/nfc/ Bogdan, C. Murali, R. Mehmet, K. Suresh, J. (2008) Efficient tag detection in RFID systems. J. Parallel Distrib. Comput. 69 (2009) 180_196. [Accessed 8th July 2008]. Available at http://compbio.case.edu/koyuturk/publications/carbunar_jpdc09.pdf Nokia Corporation, (2008) Nokia 6212 classic user guide. Available at: http://nds1.nokia.com/phones/files/guides/Nokia_6212_classic_UG_en.pdf Cynthia, Kuo. Walker, J. and Perrig, A. â€Å"Low-cost Manufacturing, Usability, and Security: An analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup,† 2007 [Online]. Available at: http://sparrow.ece.cmu.edu/group/pub/kuo_walker_perrig_simple.pdf [Accessed: Sep 7, 2009] Melchiorre, G. Pishvazadeh, Y. Wechter, J. Zarit, M. (2003). ‘Community Benchmarks Program The Maxwell School of Syracuse University’. Available at: maxwell.syr.edu/uploadedFiles/paf/benchmarks/Southwest.pdf?n=3275 Wang, F. Liu, P. (2005). ‘Temporal management of RFID data’, Proceedings at: 31st VLDB Conference, Trondheim, Norway, 2005. Nokia Corporation, (2008) Nokia 6212 Classic: Brings together Visa and Nokia for RFID enabled services. Available at: rfidweblog.com/50226711/nokia_6212_classic_brings_together_visa_and_nokia_for_rfid_enabled_services.php Mary, C. (2005) RFID Takes Attendance- and Heat. Available at: rfidjournal.com/article/articleview/1408/1/1 Shenbagaraj, (2011) Introduction to J2ME. Available at: javabeat.net/articles/27-introduction-to-j2me-1.html James, G. Bill, J. Guy, S. Gilad, B. The Java Language Specification Third Edition. Available at: http://java.sun.com/docs/books/jls/download/langspec-3.0.pdf BlueCove, (2008) BlueCove. Available at: http://bluecove.org/ javazoom.net/jzservlets/uploadbean/uploadbean.html Stephanie, B. (2002) The J2EE Tutorial. Available at: http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/Servlets.html Stephanie, B. (2002) The J2EE Tutorial. Available at: http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/JSPIntro.html Bob, K. (2008) Eclipse: Java EE Applications Made Easy. Available at: spidertg.com/cmsv5/images/stories/eBook_Libarary/Developer/Java%20EE%20Applications%20Made%20Easy.pdf NXP, (2007) NXP Type MF1K/4K Tag Operation. Available at: nxp.com/documents/application_note/AN130411.pdf