Wednesday, July 31, 2019

Concept Comparison and Analysis Across Theories Paper Essay

The core concepts of nursing theories are the building blocks of any nursing theory model, which include the fundamentals views of person, environment, health and nursing. Incorporating the general ideologies of nursing principles and practice, the four concepts display the way nursing examines and treat persons within the nursing continuum. While these four concepts are interdepended with one another, each one stems from the formation of the idea that comes before. These concepts guides nurses in their everyday practices. According to Brilowski and Wendler (2005), nurses embody the ideas as they assess, plan, and deliver care. This paper will identify the core concepts from theorist Jean Watson and Sister Callista Roy, as well as comparing the two theories and how nursing’s implication and application to nursing practice is based on them. Nursing has been based on the practice of delivering care, insuring the welfare of humans and assisting them in meeting their needs whilst providing education on how to care for themselves. Accountability lies with the nursing profession that they promote good health, disease prevention, and providing care to the ill and dying patient. Nursing has been known to be an art as well as a science that is ever evolving. Science, theories and nursing practice has been the foundation to elevating nursing as a profession. Sister Callista Roy’s Adaptation Model (RAM) implies that nursing is a scientific discipline that focuses on practice (Andrews & Roy, 1991). RAM describes nursing as the promotion of adaptation and health that involves intervention; the fifth step of the nursing process that describes the best method to support the patient in reaching their goals. According to Andrews and Roy (1991), Roy’s nursing objective is â€Å"the promotion of adaptation in each of the four modes, thereby contributing to the person’s health, quality of life and dying with  dignity†. Nurses need to discover ways to maintain a compassionate practice regardless of the professional difficulties and Jean Watson’s caring theory is key to obtaining this goal. Jean Watson (1988) shares nursing as a social science of human health and disease experiences adjudicated by scientific, professional, personal, esthetic, and ethical personal care communications. According to Watson (1988), working as an artist is characteristic of the nurse’s role, and is a crucial part of providing care to patients and their families. The goal of nursing is health promotion, disease prevention, caring for the sick and the restoration of health (Watson, 1988). Watson goes on to say that holistic care is crucial to the practice of the caring nurse. Jean Watson’s Theory of Human Caring also known as The Caring Model has gone through revisions since its origination in 1979. Watson’s principles of theory are the carative factors, which include the transpersonal caring relationship, and the caring moment (2001). Watson constructed the model in order to define nursing as a well-developed profession, which emphasizes on quality and caring. She proceeds to introduce seven assumptions about the science of caring and theorizes that caring encompasses carative factors with the intent sequel to be fulfilling to specific personal needs, which support s health, and personal/family growth. According to Watson (1988), the science of caring compliments the science of curing in which the practice of caring is fundamental to nursing. According to Watson (2014), transpersonal caring relationships are the foundation and send a â€Å"concern for the inner life world and subjective meaning of another who is fully embodied†. Watson (2014), â€Å"transpersonal seeks to connect with and embrace the spirit or soul of the other through the process of caring and healing and being in authentic relation, in the moment†. Transpersonal caring calls for the nurse to be genuine, and in the moment and have the ability to focus on caring, healing and wholeness rather than on the disease and illness (Watson, 2014). The link between nursing and caring can heal due to increased knowledge, experience and purposeful contact. This contact describes how the nurse transcends a neutral evaluation, and the expression of interest towards an individual’s personal and profound essence relating to his/her own personal health. According to Watson (2001) the providing person and the person receiving care connect in support of pursuing meaning, wholeness, and possibly for the spiritual  existence of suffering. The focus of transpersonal caring is to conserve, improve, and sustain the morality of an individual’s humanism, integrity and tranquility. Watson uses the carative factors as a standard for nursing’s concentration and applies the expression carative factors to differentiate from traditional medicine’s curative factors. The emphasis of her carative factors is to â€Å"honor the social dimensions of nursing’s work and the inner life world and subjective experiences of the people we serve† (Watson, 1997b). â€Å"Whereas curative factors aim at curing the patient of disease, carative factors aim at the caring process that helps the person attain (or maintain) health or die a peaceful death† (Watson, 1985, p. 7). Watson’s framework on the science of caring is constructed around ten carative factors, and benefits nurses with the delivery of care to patients. Jean’s first three Caritas sets the theoretical tone for the science of cari ng and lays the foundation for the remaining seven processes. The humanistic-altruistic system of values is crucial to the nursing process and toward the maturation of nurses. Instilling hope and faith to the patient is a vital component to the caring and curing model. When a patient education has run its course, what is left is instilling hope and faith in order to cultivate a sense of wellness, which may become instrumental to them. The nurturing of information to oneself and others examines the nurses’ need to initiate experiences and emotions as it displays. When nurses practice sensitivity, it brings on a more genuine and trustworthy impression, which motivates self-maturity and self-actualization. So as nurses who articulate person-to-person relationships, health and sophisticated behavior is promoted. Good communication skills which entails verbal and non-verbal as well as listening, exhibits a caring personality and creates caring and rapport with the patient. The ability to acknowledge affirmative and negative connotations increases level of understanding and the awareness of such emotions helps understand the behavior that is being conveye d. Watson (1990) insinuates that feelings modify thoughts and behaviors for deliberation and allowance in a caring connection. She continues to elevate the individual character of nursing and advocates the necessity to evaluate and formulate further methods of practice to implement a holistic approach. The caring nurse should also include an emphasis on the learning process in addition to teaching. When a nurse can accept and understand a person’s  attitude regarding his/her status, it lends the ability of the nurse to create a cognitive plan. While considering the requirements for a caring, protecting, and curative emotional, physical, socio-cultural, and spiritual environment, Watson segregates the factor into two variables; internal and external interdependent. Nurses utilize these variables in an effort to gain support and protection for the person’s emotional and physical well-being. Offering assistance of fulfilling the human need is a hierarchy of need that is com parable to Maslow. Watson constructed a hierarchy that is important to the science of caring and for the quality of nursing care whilst promoting optimal health. The way in which human existence comprehends each other allows the nurse to incorporate and reconcile inconsistencies of how the perception of the person as a holistic being, while focusing on the hierarchical arrangement. This enables the nurse to assist the patient in discovering strengths and courage when facing life or death. At the moment of caring, the nurse and the patient connect in such a way that creates an opportunity for humanistic caring (Watson, 1985). Both persons connect exclusively in a person-to-person interaction. Watson (1999) eludes to the fact that caring time becomes transpersonal when it affirms the appearance of the spirit of both and the opportunity to expand the confines of openness and personal capabilities transpires. An individual is identified as a person who has biophysical, psychophysical, psychosocial and intrapersonal needs that requires respect and care. Watson (1988) lends an explanation that a person is an existence within the world that embraces three realms of being, mind, body, and soul that is inspired by the self-concept, and who is free to make choices. Spirituality upholds a leading importance in the nursing profession and ascertains that the care of the soul is the most prominent characteristic in the art of nursing (Watson, 1997a). In conclusion, the concept of nursing as a science that is the culmination of personal behaviors, practices, proficiency, and experiences through a holistic approach. This approach enables the nurse to develop an approach that is effective in providing optimal care. Implementation of The Roy Adaptation Model enhances the role of nurses by clarifying and increasing interdisciplinary involvement. Watson’s theory encourages nurses to base their nursing process on her caring model and implement the art of caring by providing compassionate care. Caring out the delivery of Watson’s theory  will augment the nursing process and the delivery of care that are both gratifying and stimulating. References Andrews, H., & Roy, C. (1991). The Adaptation Model. Norwalk, CT: Appleton & Lange. Brilowski, G., & Wendler, M. (2005). An evolutionary concept analysis of caring. Journal of Advance Nursing, 50(6), 641-650. Watson, J. (1985). Nursing: Human Science and Human Care, a Theory of Nursing. Norwalk, CT: Appleton-Century-Crofts. Watson, J. (1988). Nursing: Human Science and Human Care. A Theory of Nursing (2nd printing). Norwalk, CT: Appleton-Century-Crofts. Watson, J. (1990). Caring knowledge and informed moral passion. Advances in Nursing Science, 13(1), 15-24. Watson, J. (1997a). Artistry of caring: Heart and soul of nursing. In D., Marks-Maran & P. Rose (Eds.), Nursing: Beyond art and sciences. Boulder, CO: Colorado Associated University Press. Watson, J. (1997b). The theory of human caring: Retrospective and prospective. Nursing Science Quarterly, 10(1), 49-52. Watson, J. (2001). Jean Watson: Theory of human caring. In M.E. Parker (Ed.) Nursing theories and nursing practice. Philadel phia, PA: Davis. Watson, J. (2014). Caring Science Theory and Research. Retrieved from http://watsoncaringscience.org

Tuesday, July 30, 2019

Market Equilibrating Process Paper

Market Equilibrating Process Paper Economics helps to understand how our efforts to produce goods and the products themselves are related, including the monetary aspects. On the national level this is macroeconomics and on a more personal level it is microeconomics. According to McConnell, Brue and Flynn â€Å"The market system permits consumers, resource suppliers, and businesses to pursue and further their self-interest. In competitive markets, prices adjust to the equilibrium level at which quantity demanded equals quantity supplied.The equilibrium price and quantity are those indicated by the intersection of the supply and demand curves for any product or resource. An increase in demand increases equilibrium price and quantity; a decrease in demand decreases equilibrium price and quantity. An increase in supply reduces equilibrium price but increases equilibrium quantity; a decrease in supply increases equilibrium price but reduces equilibrium quantity. † Microeconomics an d Macroeconomics According to Investopedia â€Å"The field of economics is broken down into two distinct areas of study: microeconomics and macroeconomics.Microeconomics looks at the smaller picture and focuses more on basic theories of supply and demand and how individual businesses decide how much of something to produce and how much to charge for it. People who have any desire to start their own business or who want to learn the rationale behind the pricing of particular products and services would be more interested in this area. Macroeconomics, on the other hand, looks at the big picture (hence â€Å"macro†). It focuses on the national economy as a whole and provides a basic knowledge of how things work in the business world. Personal Economics According to www. bls. gov â€Å"Accountants and auditors help to ensure that firms are run efficiently, public records kept accurately, and taxes paid properly and on time. They analyze and communicate financial information for various entities such as companies, individual clients, and Federal, State, and local governments.Beyond carrying out the fundamental tasks of the occupation—providing information to clients by preparing, analyzing, and verifying financial documents—many accountants also offer budget analysis, inancial and investment planning, information technology consulting, and limited legal services. † I like my career, I am Accountant and I have been married for 7 years with 2 kids, I see how economics impact commerce; from small businesses, like mini markets or restaurants, to big businesses like Wal-mart or Target, each price variation reflects in a home having less acquisition power of products or services, this is the main reason why studying economics is very important and useful to companies and to myself.According to McConnell, Brue and Flynn â€Å"When price changes, total revenue will change in the opposite direction if demand is price-elastic, in the same direct ion if demand is price-inelastic, and not at all if demand is unit-elastic. Price elasticity of demand is greater (a) the larger the number of substitutes available, (b) the higher the price of a product relative to one’s budget; (c) the greater the extent to which the product is a luxury; and (d) the longer the time period involved. Summary Economics is useful tool for companies and people because we can understand our acquisition power in the market and the companies can make decisions about their future.References: McConnell, Brue and Flynn (2009). Economics: Problems and Policies (18th ed. ). McGraw-Hill http://www. investopedia. com/terms/m/microeconomics. asp, Retrieved April12, 2010. http://www. bls. gov, Retrieved April11, 2010.

Monday, July 29, 2019

Narayan's argument is stronger and more valid than Rushdie's Essay

Narayan's argument is stronger and more valid than Rushdie's - Essay Example While, Narayan’s argument is based on the premise that the writers who are no longer a part of their homelands, tend to lose their cultural identity and tend to become â€Å"cultural† orphans. However, the view point of Rushdie is tangentially different and emphasizes on the other extreme. This one is based on the fact that the writers attain a broader understanding of culture. Having carefully seen both the arguments, let us try to analyze the basis of these arguments. In order to understand the basis of these arguments, it is vital to comprehend the meaning of culture. Culture has a lot of dimensions, which have a residual impact on the functional element of the basic understanding of one’s surroundings. Fundamental premise Culture has a number of definitions that is used across contexts. However, the primary definition of culture can be seen as a pattern of shared behaviors and their interactions, the use of cognitive kind of constructs, and the effective kind of understanding that is learned through the process of socialization. It also consists of s shared set of customs, norms and beliefs. The culture is not a singular entity and may have other kinds of dimensions as well (Andrew 96). This may comprise of a definitive culture being present in one part of a country and the absence in another. Together, they form a part of the common understanding of culture. From the point of view of the debate at hand and the two contrasting opinions, we can draw up a form of comprehension of different kinds of factors that can be used to explain all of these. Now, let us take each of the points and understand the factors that shall be helpful in defining the context of this discussion. Narayan has mentioned about the fact that the individuals who live away from the homeland tend to suffer from a cultural disconnect. Let us comprehend the definition of culture in a more refined manner and de-construct the argument. The definition of culture shall help in explaining the finer points of this argument. Culture is an amalgam of shared patterns. This implies that the formation of the initial belief structure is fomented by the exposure to indigenous culture. But, for any individual living in foreign land or an adopted country, the patterns of shared behavior tend to become diffused in nature. There is an enforced behavior that gains prominence when compared to the generic behavior. The cultural patterns of shared behavior in any country are different from the others leading to a change in the perception. Each culture has a distinctive style of imparting a means of understanding the needs of a society. It channelizes the different forms of behavior in humans as a part of the society. The levels of cognition are varied according to the learning as different parts of the society. This forms an essential degree of difference among the various elements. The cognitive understanding of culture varies among different countries. So, in case o f any individual has lived away from their homeland or their ancestral land, they tend to develop a dissociated sense of cognitive construct (Keleman 233). According to Parsons, the social construct of any individual consists of the following components. They are as follows- The process of biological needs that are defined by the behavioral system of any culture or place. The â€Å"personality system†

Sunday, July 28, 2019

Human resource in public sector Research Paper Example | Topics and Well Written Essays - 2000 words

Human resource in public sector - Research Paper Example It would also highlight the performance management programs in the organization followed by recommendations in places of shortcomings. Finally, the study would be concluded with an insight into the overall facts and findings of the project. Introduction Emirates Airline is one of the airlines located in Dubai, United Arab Emirates. It is a subsidiary company of ‘The Emirates Group’. The airline is entirely owned by Government of ‘Dubai's Investment Corporation’. It is one of the largest airlines in Middle East which accommodates more than 3400 flights in a week from Dubai International Airport to almost one hundred and fifty cities in more than seventy four countries all over the world. It ranks as one of the top ten carriers in respect of the total passenger kilometers and is the biggest airways in the entire Middle East in terms of the fleet size, sales revenue and number of passenger carried. In the year 2012, it had become the fourth biggest airline in r espect of the total number of international travelers and the scheduled passenger kilometers carried. ... It has achieved a number of awards where it had ranked eighth as the ‘Airline of the Year’ in 2012. It has been awarded on the basis of recognition of the commitments to operational excellence, financial condition inclusive of 25 years of consecutive annual profit and customer service trendsetter. It has been rated as a four star airlines by Skytrax, an aviation consultancy group. Moreover, it was voted as the ‘Airline of the Year’ in 2013. Human Resource Management Department Recruitment and Selection in Emirates Airlines GAP Analysis and Recommendations Step 1: The candidates should apply online for viewing the job vacancies to access the list of employment opportunities provided by the Emirates Group (The Emirates Group, 2013a). The online application form would help the candidates to apply for the relevant jobs online. Step 2: If any candidate receives a favorable response i.e. he or she is short listed for the applied position, then he or she would be a sked to attend the selection program held in Dubai. After the selection or assessment procedure, the line manager as well as the recruitment staff requires discussing and identifying the best suitable candidate for the particular job designation. They also take into consideration whether the chosen candidate would be able to adapt to the culture of Emirates Airlines. Step 3: If the candidate is also selected in the interview, then he or she would be receiving an email, letter or phone call from the recruitment staff informing about the outcome. There are many pre-joining clearances that are required to be done in this particular step. Step 4: After all the approvals have been processed, the candidate

Saturday, July 27, 2019

Book review of Night by Elie Wiesel Essay Example | Topics and Well Written Essays - 2750 words

Book review of Night by Elie Wiesel - Essay Example Elie later found out later that both his mother and sister were killed at the camp they were transported to. Elie and his father were sent to Auschwitz, a work camp, then from Auschwitz to Buna, and on to Buchenwald. While he and his father were in the concentration camp in Buchenwald, shortly before the war was over and the prisoners released. Elie’s father passed away from dysentery. There were many times when the young boy could think of no reason to survive the agony and pain of his life, yet his father’s memory and words kept him going. At a young age he was made to deal first with the death of his family, secondly with the death of his own childish innocence, and thirdly, and perhaps most importantly, he was made to deal with the temporary death of the God he had always known and believed deeply in. His father begged him many times not to lose the faith of his religion as it would keep him strong, yet in the midst of his pain the young Elie wondered how there could be a God that allowed so much suffering. He started to doubt his own faith, and wonder just where God was, and why he could not hear the cries of the masses of tortured people. Elie begins his story by describing the ghetto where he and his family, along with many others from their community were held captives. Even at this juncture, after having been dragged from their homes and herded like cattle into an area surrounded by barbed wire, somehow these Jewish people were still hopeful for their futures, still believed their lives would be normal again one day soon. Elie notes that â€Å"Most people thought that we would remain in the ghetto until the end of the war, until the arrival of the Red Army. Afterward, everything would be as before. The ghetto was ruled by neither German nor Jew; it was ruled by delusion.† (Wiesel 12). These delusions appeared to be all-consuming; perhaps the alternative of thinking what might be about to happen to themselves,

Accounting Class, pick topic below Essay Example | Topics and Well Written Essays - 2000 words

Accounting Class, pick topic below - Essay Example While some individuals intend to work for as long as they can, particularly because idleness and loss of accustomed status can bring depression, illness, and even early death, it is always pleasant to contemplate that one has a nest egg to fall back on when a contingency or extreme need for money arises. "Whatever your situation - even if you want to continue working - youll need to do some planning for the future." (Shwab-Pomerantz & Schwab, 2002). Thus everyone should begin to plan for retirement even during the first few years of employment or starting a business. Retirement planning, according to the Small Business Encyclopedia, describes the financial strategies individuals employ during their working years to ensure that they will meet their goals for financial security upon retirement. This applies to self-employed persons, small business owners, and employees of companies large and small (Retirement planning, SBE) Retirement planning was unknown prior to the twentieth century because the US national economy and presumably the economies in other parts of the world were still predominantly agrarian. Farmers toiling in the fields continued to work until they could no longer do physical labor, and transferred ownership and management of their properties to their eldest children in return for services to them during their old age (US History Encyclopedia). Even with the onset of industrialization, there were still a limited number of employees, and farming continued to dominate as a means of livelihood. As workers aged, they continued to work using their skills and wisdom in lieu of strength and stamina to remain employed in their later years. (Retirement planning, US) Later, because of concerns about productivity and efficiency in the workplace, it was deemed necessary to replace aging workers with young and strong ones. There was concern and apprehension about these

Friday, July 26, 2019

The requirement of a commercial building is that it is low Essay

The requirement of a commercial building is that it is low maintenance. This requirement could have a major influence on material selection and design - Essay Example The efficiency of a building is directly related to the integration of the numerous elements. The orientation of the building, the window/wall ratio and visible/thermal properties, the efficiency of the components of each element, the choice of materials and their ventilation requirements, and the balancing of the heating and cooling requirements of each element. Commercial buildings should consider the needs to address early in the process the integration of the building orientation and envelop components with the heating, cooling, ventilating and lighting requirements. The size, location and properties of the windows have a direct effect on the lighting requirements and heating and cooling loads of the building. According to (Cohen, 1994), the choice of certain windows can enhance the equality and quality of the lighting system while reducing the cooling and heating loads. The cost of low quality windows can increase the cost of the light system and the heating/cooling components such that these items will cost less or have less impact to the construction budget. Most often, the building design and construction process needs not to address and control the infiltration of the outside air. A complete understanding of all these elements and aspects of a building is important in building, including commercial builders. The requirements as stated above have major influen... These are low materials that are not durable as regards wall and floor finishes, the fixtures, and the equipment. The products selected will affect the energy plug loads, the water consumption, and other goods and services. The environmental concerns include but are not limited to recycled contents, locally and regionally produced; renewable, local and state environmental goals and targets, and the ability to be reused or recycled are not mostly considered. Design for good air quality, efficient and effective lighting and comfortable temperatures should be of a great importance. CONSTRUCTUION ADMINISTRATION The construction phase is critical to the success of a performance building in order for the design intent to be realized it is necessary that the site be managed to reduce water win-off, to control dust migration, to control construction waste, and limit other environmental impacts which most commercial buildings lack. To control construction waste, construction materials need to be organized extract reusable items, recyclable items. Compact items and hazardous items depending on the experience of the contractors, firms new to high performance buildings will require education on all aspects of site management, waste collection, verification of installed items, collection of material data on all items, and their importance to the final quality of the building. In as much as commercial buildings are known for low maintenance, the occupant's condition of mind which expresses satisfaction with the thermal environment is very important (ISO, 1994). Thermal comfort therefore describes person's psychological state of mind about their thermal climate and is usually described simply in terms of

Thursday, July 25, 2019

North Korea and the South Korean Economy Research Paper

North Korea and the South Korean Economy - Research Paper Example Countries that have the same historical and cultural background are likely to progress in the same manner. This is because generally the same culture exists in similar geographic locations. This makes the countries to have access to similar economic resources. The population of such countries also share similar skills and are able to do particular kinds of tasks generally. The system of distribution and allocation of resources might be the same too. In short, countries with the same history and culture are expected to have similar economic policies and are likely to advance in the same manner. However, this might not always be the case. North and South Korea are the prime examples of the countries that, despite having similar ethnographical backgrounds, have different economic performances. South Korea, because of an emphasis on world trade have adopted politics that are aimed at world cooperation while North Korea has adopted stringent political policies that has made it suffer econ omically and led to increased poverty and starvation.Before moving on to discuss the different economic performances of both the countries, it is important to discuss the major events that shaped the history of both North and South Korea. The economic history of Korea can be divided into three broad categories, the Malthusian stagnation to 1910 when Japan annexed the country, the colonial period from 1910 and 1945 when Korea was considered as a mandate by countries of the West, and the post colonial period where North and South Korea performed in different ways.

Wednesday, July 24, 2019

Full-time Faculty Criteria Essay Example | Topics and Well Written Essays - 250 words

Full-time Faculty Criteria - Essay Example Professors that are charismatic are better able to connect with their students. Another important criterion that candidates must have is excellent credentials. The minimum educational attainment a college professor must have is a master’s degree, even though a doctorate degree is preferable. The reason that college professors must have a graduate degree is because these individual have to be experts in their fields in order to be able to teach young aspiring students about a subject matter. The third most important criterion that universities look for in college professor candidates is their professional experience. In order for a college professor to be able to teach students about how the knowledge obtained in a course can be applied to the real world the professor must have extensive industry experience. The experience gained in the field can help the professor formulate examples of how different concepts, ideas, and theories can be used in the workplace. A fourth factor th at is considered by universities when hiring a new college professor is the person’s research abilities. Most universities received millions of dollars in research grants that can only be obtained if they have professors on staff that can perform the required research studies.

Tuesday, July 23, 2019

Ken Frazier Case Study Essay Example | Topics and Well Written Essays - 500 words

Ken Frazier Case Study - Essay Example In this effect, Ken single gave the company its modern status by redeeming it from a possible pit that it would not rescue itself. A learning organization depends on initiative and innovation as its greatest and valuable assets. In addition, it embraces employee empowerment, creativity and takes risks in a desire to achieve its objectives. Based on this explanation, the Merck Company is a learning organization based on the risk it takes in appoints Ken as its CEO (Lussier & Christopher, 2013). Furthermore, it prioritizes innovation and creativity in its scientific application and the process of drug manufacturing. Specifically, this is through investing millions of dollars in a drug process whose certainty is unclear. Enhancing innovation is imperative for its success. In that accord, there are several actions that the CEO should eliminate or put in place to facilitate this practice. First, he should avoid the creation of rules on how activities are carried out (Lussier & Christopher, 2013). Instead, he should create a possibility box that can contain all the ideas of the workers and other essential stakeholders. Additionally, he eliminates fears of failure, making mistakes, and the fear of looking foolish and assumes an active personality. Frazier has articulated a strategy that gives the customers a center stage by carrying out market research and analysis to determine the requirement in the market. As confirmed by a board member William B. Harrison, Ken has the strategic vision, operational experience, and passion for leading the company in achieving its goals (Lussier & Christopher, 2013). Among the supporting factors that lead to the appointment of Ken as the CEO is the talent he displayed in handling a crisis in defending the Vioxx drug. Additionally, he carried out a market research in a special way that gave the firm its competitive edge

Monday, July 22, 2019

Fundamentals of Microeconomics Essay Example for Free

Fundamentals of Microeconomics Essay Macroeconomics defined as â€Å"the study of the economy as a whole, which includes inflation, unemployment, business cycles, and growth† (Colander, G-5). There are many fundamentals that affect the economy in both a good and bad way. These fundamentals affect the economy, and they also show the growth of the economy. The fundamentals are gross domestic product (GDP), real gross domestic product, nominal gross domestic product, unemployment rate, inflation rate, and interest rate. Defining the fundamentals Gross Domestic Product is â€Å"the total market value of all final goods and services produced in an economy in a one-year period† (Colander, G-3). GDP calculation is very important because it calculates the growth, decline, or stand still have the economy. When the GDP is calculate, it is base on previous numbers not future numbers. For example, the GDP is +2%, which means a growth of 2% for the previous year. Real Gross Domestic Product (GDP) is â€Å"the market value of final goods and services produced in an economy, stated in the prices of the giver year† (Colander, G-7). Real GDP is an inflation measure of the production of goods and services in the economy. It reflects price changes throughout the year. The real GDP is base more on realistic numbers instead of a guess. The calculation is more accurate concerning the gross domestic product for the previous year. Nominal gross domestic product is calculate at existing prices. Nominal GDP does not reflect inflation and is known as â€Å"current dollar GDP.† Nominal GDP can either be higher or lower than the GDP. When nominal GDP is calculate without reflecting inflation, which can show a higher growth in the economy when it is lower or at a standstill. Unemployment rate is â€Å"the percentage of people in the economy who are willing and able to work but who are not working† (Colander, G-9). The unemployment rate is calculate every month, and it shows the people who are looking for work. This rate does not include individual like the elderly, people working only a few hours a week or people who do not send resumes into different business. The unemployment rate shows that based on the number of people in the United States, a certain percentage is actively looking for work but has not found work. Inflation Rate is the percentage rate of change in price over a certain period usually a year. The inflation rate is calculate using last year price for a particular item to determine how much it will cost. Inflation rate determines the price of many things that include the price of the dollar. When individual calculates the inflation rate, it can help others determine if it is better to buy certain products today or later. Interest Rate is â€Å"the price paid for the use of financial asset† (Colander, G-4). Interest rate is a certain percentage that an individual has to pay on borrowing money or purchasing something. The interest rate is base on the credit score and the item purchase. The rate can go from being a very low number to as high as 10 percent. Purchasing of Groceries The purchase of groceries affects government, households, and business daily. The government determines the tax placed when household purchase groceries. Every household in the United States purchase groceries to survive. The businesses are affected by grocery purchase through the purchase. The business is affected by the purchases made because it shows what is being purchase more and what is being purchase less. The flow of resources take place in continues circular motion. The groceries are receive by the business from the local food processing plants. The employees at the local business placed the items on the shelves and groceries are ready for sell. The household members purchase the groceries from the business and pay the taxes government placed on the items. This continues to take place daily and will always continue. Massive layoff of employees The flow of resources takes place, and it affects businesses in both good and bad ways. Most business can employee the previous laid-off employees to allow taxes to be paid. When businesses are not able to employ more employees, unemployed do not demand good and services. When employees are layoff, there is no income coming into the household. The household is affected because there is no income, which in return means less good and service that can be purchase. When massive layoffs of employees take place in the economy, it affects government because they are paying unemployment benefits, Medicaid, and giving food stamps and more welfare to those eligible. Decrease in taxes When the government decides to decrease tax, it affects everyone differently. Government is affected in a good way, but it occurs in the long-run supply and demand curve. The government is losing more because taxes are lower but more money is being receive. In the long-run supply and demand, the government receives more money because the household is purchasing more good and services. The household is excite because more money is coming into the household because taxes are lower. The lower the tax, the more income, which mean more good and services are being purchase. Businesses are excite because more goods and services are being purchase. The flow of resources occurs and is affected in the long-run supply and demand curve. References Colander, D.C. (2010). Macroeconomics (8th ed.) Boston, MA: McGraw-Hill/Irwin.

Innovation and creativity evaluation of Apple Corporation Essay Example for Free

Innovation and creativity evaluation of Apple Corporation Essay Economic growth and development of any country depends upon a well-knit financial system. Financial system comprises, a set of sub-systems of financial institutions financial markets, financial instruments and services which help in the formation of capital. Thus a financial system provides a mechanism by which savings are transformed into investments and it can be said that financial system play an significant role in economic growth of the country by mobilizing surplus funds and utilizing them effectively for productive purpose. The financial system is characterized by the presence of integrated, organized and regulated financial markets, and institutions that meet the short term and long term financial needs of both the household and corporate sector. Both financial markets and financial institutions play an important role in the financial system by rendering various financial services to the community. They operate in close combination with each other. Financial System The word system, in the term financial system, implies a set of complex and closely connected or interlined institutions, agents, practices, markets, transactions, claims, and liabilities in the economy. The financial system is concerned about money, credit and finance-the three terms are intimately related yet are somewhat different from each other. Indian financial system consists of financial market, financial instruments and financial intermediation Role/ Functions of Financial System: A financial system performs the following functions: * It serves as a link between savers and investors. It helps in utilizing the mobilized savings of scattered savers in more efficient and effective manner. It channelises flow of saving into productive investment. * It assists in the selection of the projects to be financed and also reviews the performance of such projects periodically. * It provides payment mechanism for exchange of goods and services. * It provides a mechanism for the transfer of resources across geographic boundaries. It provides a   mechanism for managing and controlling the risk involved in mobilizing savings and allocating credit. * It promotes the process of capital formation by bringing together the supply of saving and the demand for investible funds. * It helps in lowering the cost of transaction and increase returns. Reduce cost motives people to save more. * It provides you detailed information to the operators/ players in the market such as individuals, business houses, Governments etc. Components/ Constituents of Indian Financial system: The following are the four main components of Indian Financial system 1. Financial institutions 2. Financial Markets 3. Financial Instruments/Assets/Securities 4. Financial Services. Financial institutions: Financial institutions are the intermediaries who facilitates smooth functioning of the financial system by making investors and borrowers meet. They mobilize savings of the surplus units and allocate them in productive activities promising a better rate of return. Financial institutions also provide services to entities seeking advises on various issues ranging from restructuring to diversification plans. They provide whole range of services to the entities who want to raise funds from the markets elsewhere. Financial institutions act as financial intermediaries because they act as middlemen between savers and borrowers. Were these financial institutions may be of Banking or Non-Banking institutions. Financial Markets: Finance is a prerequisite for modern business and financial institutions play a vital role in economic system. Its through financial markets the financial system of an economy works. The main functions of financial markets are. To facilitate creation and allocation of credit and liquidity; 2. to serve as intermediaries for mobilization of savings; 3. to assist process of balanced economic growth; 4. to provide financial convenience Financial Instruments Another important constituent of financial system is financial instruments. They represent a claim against the future income and wealth of others. It will be a claim against a person or an institutions, for the payment of the some of the money at a specified future date. Financial Services: Efficiency of emerging financial system largely depends upon the quality and variety of financial services provided by financial intermediaries. The term financial services can be defined as activites, benefits and satisfaction connected with sale of money, that offers to users and customers, financial related value. Pre-reforms Phase Until the early 1990s, the role of the financial system in India was primarily restricted to the function of channeling resources from the surplus to deficit sectors. Whereas the financial system performed this role reasonably well, its operations came to be marked by some serious deficiencies over the years. The banking sector suffered from lack of competition, low capital base, low Productivity and high intermediation cost. After the nationalization of large banks in 1969 and 1980, the Government-owned banks dominated the banking sector. The role of technology was minimal and the quality of service was not given adequate importance. Banks also did not follow proper risk management systems and the prudential standards were weak. All these resulted in poor asset quality and low profitability. Among non-banking financial intermediaries, development finance institutions (DFIs) operated in an over-protected environment with most of the funding coming from assured sources at concessional terms. In the insurance sector, there was little competition. The mutual fund industry also suffered from lack of competition and was dominated for long by one institution, viz. , the Unit Trust of India. Non-banking financial companies (NBFCs) grew rapidly, but there was no regulation of their asset side. Financial markets were characterized by control over pricing of financial assets, barriers to entry, high transaction costs and restrictions on movement of funds/participants between the market segments. This apart from inhibiting the development of the markets also affected their efficiency. Financial Sector Reforms in India It was in this backdrop that wide-ranging financial sector reforms in India were introduced as an integral part of the economic reforms initiated in the early 1990s with a view to improving the macroeconomic performance of the economy. The reforms in the financial sector focused on creating efficient and stable financial institutions and markets. The approach to financial sector reforms in India was one of gradual and non-disruptive progress through a consultative process. The Reserve Bank has been consistently working towards setting an enabling regulatory framework with prompt and effective supervision, development of technological and institutional infrastructure, as well as changing the interface with the market participants through a consultative process. Persistent efforts have been made towards adoption of international benchmarks as appropriate to Indian conditions. While certain changes in the legal infrastructure are yet to be effected, the developments so far have brought the Indian financial system closer to global standards. The reform of the interest regime constitutes an integral part of the financial sector reform. With the onset of financial sector reforms, the interest rate regime has been largely deregulated with a view towards better price discovery and efficient resource allocation. Initially, steps were taken to develop the domestic money market and freeing of the money market rates. The interest rates offered on Government securities were progressively raised so that the Government borrowing could be carried out at market-related rates. In respect of banks, a major effort was undertaken to simplify the administered structure of interest rates. Banks now have sufficient flexibility to decide their deposit and lending rate structures and manage their assets and liabilities accordingly. At present, apart from savings account and NRE deposit on the deposit side and export credit and small loans on the lending side, all other interest rates are deregulated. Indian banking system operated for a long time with high reserve requirements both in the form of Cash Reserve Ratio (CRR) and Statutory Liquidity Ratio (SLR). This was a consequence of the high fiscal deficit and a high degree of monetisation of fiscal deficit. The efforts in the recent period have been to lower both the CRR and SLR. The statutory minimum of 25 per cent for SLR has already been reached, and while the Reserve Bank continues to pursue its medium-term objective of reducing the CRR to the statutory minimum level of 3. 0 per cent, the CRR of SCBs is currently placed at 5. 0 per cent of NDTL. As part of the reforms programme, due attention has been given to diversification of ownership leading to greater market accountability and improved efficiency. Initially, there was infusion of capital by the Government in public sector banks, which was followed by expanding the capital base with equity participation by the private investors. This was followed by a reduction in the Government shareholding in public sector banks to 51 per cent. Consequently, the share of the public sector banks in the aggregate assets of the banking sector has come down from 90 per cent in 1991 to around 75 per cent in2004. With a view to enhancing efficiency and productivity through competition, guidelines were laid down for establishment of new banks in the private sector and the foreign banks have been allowed more liberal entry. Since 1993, twelve new private sector banks have been set up. As a major step towards enhancing competition in the banking sector, foreign direct investment in the private sector banks is now allowed up to 74 per cent, subject to conformity with the guidelines issued from time to time. Conclusion: The Indian financial system has undergone structural transformation over the past decade. The financial sector has acquired strength, efficiency and stability by the combined effect of competition, regulatory measures, and policy environment. While competition, consolidation and convergence have been recognized as the key drivers of the banking sector in the coming years

Sunday, July 21, 2019

Drama Essays West End Production

Drama Essays West End Production In the West End production of The Woman in Black, assess the skills of the two male performers when performing their role(s). Essay Outline: ‘As Alfred Hitchcock noted, suspense and atmosphere are more potent than scary events themselves’ Part 1 Introduction Introduction: ‘The Woman in Black,’ West end mainstay and classic enjoyed by many people since 1989, is a remarkable adaptation of a superb horror novel. Stripped down to a minimal cast by the impressive Stephen Mallatrat who has fitted a cunning theatrical frame around it, the play, which has seen many different duos taking the roles involved in the drama and ‘always bringing something new to it’ , is still to this day a massive hit. Undoubtedly talented, the two actors on stage, Brian Miller and William Rycroft, handled their varied roles superbly and brought the tension and terror inherent in the adaptation forth, using the limited props, large amount of space and excellent writing, to scare the audience witless.     Ã‚  Ã‚   Part 2 – Physical appearance and specific actor traits Physical and vocal qualities – Vital in creating the characters and expressing the different contexts of the change within the play, in a wonderfully orotund, flamboyant and self confident way, Rycroft educates the storyteller in the ways of theatre and the techniques of acting. Coaching the older ‘Kipps,’ clearly portrayed as a less confident and able man, his magnificent vocal expressions display him as the stereotypical Victorian actor. Especially with a two man cast, it is vital that the ranges of vocal abilities in the two men are expressive and changeable, and there is no doubt that through the different characters portrayed this is in evidence. Range of facial expressions and other actor skills– Perhaps the most dynamic and vivid use of a facial expression for me, was Rycroft’s reaction to the final twist in which he is asked about providing the ‘woman in black’ as part of the performance. Twisting in horror, his abject terror contrasts beautifully with the perceived ‘pale, wasted face and expression of desperate, yearning malevolence’ of the woman in black. Elsewhere throughout the play, his confident, expressive features work well in expressing the slightly woebegone look of Kipps, the actor who has slipped a little too far into the horrors of his past but still manages to become more adept at ‘performing’ throughout the play. From the self conscious, withdrawn character at the opening, through to his improved attempt at reading Shakespeare and finally onto his ability to switch characters, his facial expressions, and indeed whole character, seems to evolve. Creation of emotion – In a ‘two hand’ minimalist play, creating base, thrusting emotions within the hearts and minds of the audience is vital in place of spectacular effects, impressive sets or big choral numbers. Indeed, the raw fear and suspense (as well as dark humour) produced by the two actors is extremely well done. Using many of the devices discussed within this essay, and manipulating the vulnerability of the stark setting, they are able to, and carry off a wide range and evolving set of personal movements, expressions and speeches. Coupled with this, the fact that there are only two of them, makes their dialogues, and emotion fuelled actions, paramount to the audience’s concentration span, as they focus on these two purveyors of this simple, chilling and edgy tale. Part 3: Interaction Rapport with audience and response/ Use of Black Comedy – Again, I was very impressed with the skills of the two actors in terms of their ideas of audience participation. From the moment that Rycroft came striding up the aisle of the theatre talking about the need to really make the morbid tale ‘live in performance to an audience of family and friends,’ one immediately felt a part of this close knit group. It was as if he was striving to please and perform admirably directly for the benefit of the audience in the theatre itself, and lift the moribund tale for our immediate benefit. The occasional smattering of black comedy in this piece is also beautifully dealt with, Rycroft’s cool delivery of amusing lines giving the audience an element of relief to hold onto, before the actors deliver them once more into the unfurling horror. Interaction with other performers – The use of the two narrators within the performance allows an additional dimension to be added to the play, with the very process of storytelling and its purpose being investigated, as well as the chilling tale itself. Rycroft is magnificent in portraying the vessel, for which Miller (as Kipps) can relay his tale, and the heated discussions between the two talented performers split the mind away from the horrors somewhat, to concentrate on the issue of truth within a story that may be lost to the ideas of excitement within storytelling. Rycroft is also effective in moulding his reaction subtly differently to each of the different characters that Miller plays, making sure that the changing of characters does not seem stilted. Part 4 Setting Costume – The use of varied costume between the two actors, offers an almost surreal twist to the play, and while Miller is spectacular in manipulating his acting talents to drift between his roles, the occasional modern costume mixed with Victorian imagery does a lot to distort the mind of the already shaky audience. Less really does mean more in this production, and the fact that a mere change of coat can transport the two actors into entirely different roles, speaks volumes of the performances of the two men and the level of versatile performance required to suitably mix up their acting characters. Space – The key to this play, and inspiration for much of the horror generated by the stark atmosphere, is the power of immense space that setting the adaptation inside an empty Victorian theatre conveys. The feeling of spiritual goings on outside the main two characters is paramount, and Miller and Rycroft are able to exist all over the theatre, bringing the realism and terror to life within a large, empty setting. They have room to build their characters and through use of facial expressions and extravagant posture, utilize it widely. Part 5 – Interpretation of the on stage atmosphere Directorial interpretation of play – Mr Mallatratt adds ‘deliberate environmental anachronisms’ so claimed the Times review in 1989, and so it seems, much to the mystical improvement of the production. Set in a Victorian theatre, yet at no particular, specified time, modern touches (such as electric torches and sound effects) are used, allowing the audience to become uneasy with the setting and allowing the actors to spread their story in a setting that cannot be entirely tied down to anything specific within the mind. Form and production aims/ Sensitivity to style – Apparently, the original aim in performing ‘The Woman in Black’ with only two authors was to save money, and while a magnificent job has been done to use minimal output to produce such a thriller, one cannot help to wonder how a big budget production may handle this play. Mallatrat himself admits that ‘there are scenes he would have loved to have included but simply couldn’t,’ but I feel the actors have taken on board the necessity to make this appear a ‘classic ghost story’ and have taken the necessary steps to provide the exuberant and expressive performances within the stark setting that are required. Part 6 – Conclusion and Bibliography – The Woman in Black is undoubtedly a very tense and exciting script reaped from a ‘classic style’ horror tale in the vein of Henry James, and requires two excellent actors to take on the roles, engage an entire audience with their characters internal struggles, and essentially build up a horrific tale and ghostly presence. In my opinion, Miller and Rycroft both performed excellently using a wide variety of styles, stage devices and a mixture of expression and clever use of scenery, stage play and setting to grip the audience into what is a very compelling tale. Of course, with a story so moreish, it could be claimed that their jobs were easier than those of someone acting out a more complex and ‘slow’ narrative, but the fact they were able to mould their acting techniques to fit the changing of characters, lack of physical prop stimulus and slightly eclectic timeframe of the events taking place, shows the p resence of great skill. I am only interested to see how the next two actors can deal with the roles!  Ã‚     Ã‚  Ã‚   http://www.cix.co.uk/~shutters/reviews/00191.htm Review of former actors http://www.londontheatre.co.uk/londontheatre/reviews/womaninblack.htm Reviews of The Woman in Black performed by other actors http://www.thewomaninblack.com/pdf/wib_pack.pdf Interview with Susan Hill describing her reaction to the on stage version Irving Wardled, The Times, January 1989 Susan Hill The Woman in Black (Vintage: 1998) http://www.susan-hill.com/pages/books/the_books/the_woman_in_black.htm Interview with Susan Hill

Saturday, July 20, 2019

Essay --

Pride and Prejudice, by Jane Austen, is a popular 18th century novel that illustrates the complex relationship between characters and the society in which they live in. In order to clearly show the audience the value of literary realism, Austen presents two characters that are so extreme, and â€Å"distorted†, in terms attitude, arrogance and opinion, that they help her justify Elizabeth's rational. Elizabeth's mother, Mrs. Bennet, and cousin, Mr. Collins, are perhaps the most overdramatic characters in the entire novel. Mrs. Bennet, though some claim to be simply a concerned mother, is in fact a foolish, and boisterous woman whose one and only intention is to marry off her daughters. Austen created her to be obnoxious so that it would seem as though Elizabeth’s decisions would be rationale. Throughout the entire novel Mrs. Bennet lets her shallow side shine. A prime example of this is when the great Mr. Collins arrives. At first, the entire Bennet family, including Mrs. Bennet agreed that Mr. Collins was a â€Å"disagreeable† man. However, as soon as Mrs. Bennet picks up the hint from Collins that he has the intention of marrying one of her daughters, Austen explains â€Å"Mrs. Bennet treasured up the hint, and trusted that she might soon have two daughters married; and the man whom she could not bear to speak of the day before was now in her good grace† (49). Even though Mr. Collins was bothersome less than a day before, as soon as Mrs. Bennet realized one of her daughters wo uld be married and wealth would be instilled into their lives, she immediately put away her previous regards. As Mrs. Bennet stated in the beginning of the novel, â€Å"The business of her life was to get her daughters married† (6). Even though, this is typical of mothers at... ... show how Elizabeth is against the status quo of marriage. Back then, women were automatically supposed to accept the proposal, because it benefitted her family. By having Elizabeth reject this proposal, Austen is able to convey her feelings of disapproval for the conventional marriage through her. In order to convey her true feelings towards marriage, Jane Austen shows them through Elizabeth, the main character. Yet in order to truly make her feelings clear, Jane Austen also creates distorted and extreme minor characters, such as Mrs. Bennet and Mr. Collins. These two characters influence the novel greatly, in that they are so extreme, that they help rationalize Elizabeth’s decisions. If it were not for them, Elizabeth would have been seen as a selfish character and Jane Austen scorn for the conventional marriage of the time would not have been clear.

Friday, July 19, 2019

Successfully Teaching Mathematics Essay -- Teaching Education Philosop

Successfully Teaching Mathematics The classroom is a widely diverse environment with many topics to discuss, many discoveries to make, and many different ways to learn. This wide palette of knowledge potential is a blessing and a curse to teachers, challenging them to reach each mind, to convey to everyone an understanding of the world that will improve their lives. The ever-increasing importance of mathematics in the computer age draws attention to the methods with which we teach it. I think that the most successful tool that I might have to teach mathematics is the mastery learning method, because it allows students to move through the many facets of math with great understanding and confidence, allows heavy use of the powerful tools in computers, and ensures that no one lacks the skills necessary to live easily in today’s rapidly advancing intellectual world. As a student, I found that one of the biggest problems my peers encountered in math was that they had very little confidence in their skills, affecting their ability to learn more complex ideas. I also found tha...

College Fraternities :: essays research papers

College Fraternities College fraternities have always struck me as being an organization of guys who spend their time drinking beer and having their "social gatherings" (parties). Just moving to Austin recently (which is by no doubt a "college city") has made me want to know more about the sole purpose of these fraternities. For these reasons I chose to select this culture for my essay. The definition of a fraternity is defined as " chiefly social organization of male college students, usually designated by Greek letters". (Morris 1982:523) This definition is not true to all where most fraternity members are seen as drunks who accomplish nothing scholastically or socially . Unfortunately, the definition and portrayal of the people fails to mention the fact that membership in a fraternity is a life-long experience that helps its members develop social, organizational, and study skills, and also teaches true, everlasting friendship. As a matter of fact most of our presidents were members of a Greek organization. "The first fraternity was founded for literary and social purposes at The College of William and Mary in Williamsburg, Virginia on December 5th 1776." (Klepper 1937:24) Throughout the nineteenth century many new fraternities were founded, but none of these were permanent. By the end of the nineteenth century there were over thirty general fraternities in the country. Today's fraternities still have the characteristics of past fraternities. These characteristics include "a ritual, oaths of fidelity, a grip, a motto, a badge , friendship and comradeship (Klepper 1937:56) . During membership one must learn leadership skills. For this reason fraternities embrace these offices held by members: President, Vice-president, Treasurer, Scribe, etc. Since membership is seen as a great achievement by other organizations, every brother must be able to uphold that office at any time. Organization is a must for every member. Fund raising activities and community service are priority in every chapter, and each member is required to take part in these activities as an act of pledge, and a brother. This helps a member to develop organization and planning. Living together in what is known as a fraternity house adds to the development of social skills and being able to live with different kinds of people in different situations. Fraternities are famous for their social gatherings (parties) which requires all members to be socially active and also develop social skills. It is normal for fraternities to organize study groups during the school year and before exams. Most fraternities keep test files and other study aids available for the benefit of their members. A lot of members are able to receive scholarships and awards based on academic excellence, leadership and

Thursday, July 18, 2019

Electronic Voting Machine

International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 A Preview on Microcontroller Based Electronic Voting Machine Diponkar Paul and Sobuj Kumar Ray, Member, IACSIT Abstract—Voting is most pivotal process of democratic society through which people determine it’s government. Governments around the world are increasingly considering the replacement of traditional paper-based voting schemes with electronic voting systems.Elections of Bangladesh are conducted most exclusively using electronic voting machines developed over the past three years. In this paper we describe the design, construction and operation of a digital voting machine using a microcontroller profoundly. Again we also portray counting system of votes, market survey and cost analysis. Index Terms—Voting system, atmega16l microcontroller, voting analysis, security of EVM. I. INTRODUCTION Voting is a crucial device to reveal the opinion of a group on an issue that i s under consideration. Based on the promise of greater e? iency, better scalability, faster speed, lower cost, and more convenience, voting is currently shifting from manual paper-based processing to automate electronic-based processing. The term â€Å"electronic voting† characteristically depicts to the use of some electronic means in voting and ensure the security, reliability, guarantee and transferency[1],[2]. Now a day the wide range of application of voting include its use in reality student body elections, shareholder meetings, and the passing of legislation in parliament. Perhaps the most important, in? ential, publicised, and widespread use of voting is its use in national elections. Compared to its traditional paper-based counterpart, electronic voting is considered to have many greater potential bene? ts. These bene? ts include better accuracy by eliminating the negative factor of human error, better coverage for remote locations, increased speed for tally computat ion, lower operational cost through automated means, and the convenience of voting from any location Whether or not electronic voting is a necessary replacement for the traditional paper-based method, it is irrefutable that the conduct of voting as been shifting to the use of electronic medium. To date, electronic databases are used to record voter information, computers are used to count the votes and produce voting results, mobile devices are used for voting in interactive television shows, and electronic voting machines have been used in some national elections. Generally, the term â€Å"electronic voting† refers to the de? nition, collection, and dissemination of people’s opinions with the help of some machinery that is more or less computer supported. Despite Manuscript received August 15, 2012; revised October 12, 2012.The authors are with the Department Electrical and Electronic Engineering, World University of Bangladesh, Dhaka, Bangladesh (e-mail: [email  pr otected] com, [email  protected] edu. sg) the transition from traditional paper-based systems to electronic medium, the purpose and requirements for voting remain. Voting is a decision making mechanism in a consensus-based society and security is indeed an essential part of voting. The critical role in determining the outcome of an election, electronic voting systems should be designed and developed with the greatest care.However, a number of recent studies have shown that most of the electronic voting systems being used today are fatally defective [3], [4], [5] and that their quality does not match the importance of the task that they are supposed to carry out. Flaws in current voting systems, which were discovered through testing and other analysis techniques, have stimulated a number of research efforts to mitigate the problems in deployed voting systems. These efforts focused on ameliorating security primitives, such as the storage of votes [6], [7] and auditing [8], and on fo rmally assessing and making procedures more effective [9], [10].Finally, the standards that set the functional and performance requirements against which the systems are developed, tested, and operated have often been found to be inadequate [11], [12], [13]. Among the reasons for concern, critics include vague and incomplete security guidelines, insufficient documentation requirements, and inadequate descriptions of the configuration of commercial software. An electronic voting machine has been designed by a microcontroller for which the code is written in assembly language.Various code protection schemes specified by the manufacturer of the microcontroller are used to prevent inadvertent or deliberate reading and reproduction of the code contained in the microcontroller. The election data contained in the EEPROM of the microcontroller can download into a central computer for tabulations. The security of data in this computer is enforced by generating digital signatures for each dat a file created. This process makes it impossible for anyone to substitute wrong or deliberately altered data files at any intermediate stage between the capturing of voter’s intent by the machine and the final results tabulations.Prior to the election, all con? guration data is set up on the counting server. The con? guration is then transferred to the ballot-box server. Con? guration data include: candidate names, polling station identity, and a list of barcodes. During the voting period, voters are authenticated as per the traditional paper-based voting, and asked whether they wish to vote electronically or use the traditional paper-based method. A voter choosing to use the traditional paper-based method proceeds by being given a ballot paper, casting the vote on the ballot paper, and placing the ballot paper in a ballot-box.On the other hand, a barcode is chosen at random and is given to the voter choosing to use eVACS. Voter authorisation on the electronic voting booth co mputer is by 185 DOI: 10. 7763/IJIEE. 2013. V3. 295 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 using the barcode. The electronic voting booth computer communicates the barcode to the ballot-box server for validation and to inform that the voting process is initiating. Upon validation of an invalid barcode, the ballot-box server returns an error message to the voting booth computer.Otherwise, the ballot-box server returns the equivalent of a ballot-paper containing the names of candidates to the voting booth computer. The voter may select the candidates in a particular preference ordering, and restart or complete their selection afterwards. The selection is displayed on the screen forcon? rmation, and the voter is allowed to change or con? rm their selection. The voting booth computer returns a warning given invalid selection or informal vote, however casting invalid or informal vote is allowed. The voter con? ms the selection by using the barcode, and both the vote and a log of key sequence pressed are then communicated to the ballot-box server. The ballot-box server checks that the same barcode is used to initiate the server counts the votes, and produces a voting result. II. HARDWARE DEVELOPMENT OF ELECTRONIC VOTING MACHINE Fig. 1. Block diagram of digital voting system Fig 2. Circuit diagram of the digital voting system A. Circuit Description The high level digital voting machine built with ATmega16 Micro controller. The Micro controller port D uses for LCD display and port C. (pin 22) uses for voting power or presiding officers button. The candided button input from Port C. 1 – C. 4 (pin 23 to 26; 4 candided). The output LED and buzzer uses Micro controller port C. 5 and C. 6. The LCD backlight also connected to port C. 7 via a transistor. At the starting of voting the election commission offices setup the machine at the centre. Then power on the switch and sealed it that nobody can power off. The pre siding officer identifies the original voter of that particular area and pushes the voting power button. The voting power LED glow then and continue it until once press the candided buttons.The voter then goes to the secret room where Voting unit placed and press button beside his candided symbol. Voter can watch success of voting by glowing confirmation LED and beep indication. The presiding officer can also hear beep sound watch a confirmation LED. Same time the voting power goes down and nobody can vote again. Mainly when presiding officer press voting power button, Micro controller start scanning from pin 23 to pin 26. When get response from a specific pin, increase the counter one of that candided and stop scanning. So it is not possible to voting twice or more.All the counter result store at Micro controller EEPROM. When the voting is under process it will showed at display â€Å"Voting under Process†. At the end of voting we need to know result. Then election commissio n or presiding officer presses the secret key (password). Now the Micro controller shows the result and supply the power to LCD backlight that it illuminated. If it needs to return voting process again one should press another secret key. There uses a transistor to operate buzzer and confirmation LED with proper current. There also uses a voltage regulator (7805) to supply 5v continuously.Here uses a dry cell 9V battery as power source. The power consumption of the system is very low (50mW150mW varying). After collected data and need erase recorded data from EEPROM just broken the sealed on power button and power off the system. Now the system is ready for next election. This measurement System includes the following components: †¢ Voting Unit †¢ Control Unit †¢ Confirmation Unit †¢ Display Unit (LCD) †¢ Power Supply Unit B. Voting Unit Fig. 3. Output circuit diagram of the digital voting system Fig. 4. Voting 186 International Journal of Information and Ele ctronics Engineering, Vol. 3, No. 2, March 2013Fig. 5. Confirmation unit In this Voting unit we have been used five button switch and five 2. 2K? resister which connected to the five button switches. C. Buzzer A buzzer or beeper is an audio signaling device, which may be mechanical, electromechanical or piezoelectric. Typical uses of buzzers and beepers include alarm devices. These devices are output transducers converting electrical energy. As power is applied this mechanical device will energize and by doing so interrupt the power source and the cycle continue until the power is removed. The frequency of oscillation is strictly dependent on mechanical inertia.The piezo buzzer produces sound based on reverse of the piezoelectric effect. The generation of pressure variation or strain by the application of electric potential across a piezoelectric material is the underlying principle. These buzzers can be used alert a user of an event corresponding to a switching action, counter sign al or sensor input. They are also used in alarm circuits. The buzzer produces a same noisy sound irrespective of the voltage variation applied to it. It consists of piezo crystals between two conductors. When a potential is applied across these crystals, they push on one conductor and pull on the other.This, push and pull action, results in a sound wave. Most buzzers produce sound in the range of 2 to 4 kHz. The Red lead is connected to the Input and the Black lead is connected to Ground. D. Light Emitting Diode (LED) A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices and are increasingly used for other lighting. Introduced as a practical electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet, and infrared wavelengths, with very high brightness.When a light-emitting diode is forward-biased (switched on), electrons are able to recombine with electron holes within the device, releasing energy in the form of photons. This effect is called electroluminescence and the color of the light (corresponding to the energy of the photon) is determined by the energy gap of the semiconductor. LEDs are often small in area (less than 1 mm2), and integrated optical components may be used to shape its radiation pattern. LEDs present many advantages over incandescent light sources including lower energy consumption, longer lifetime, 187 mproved robustness, smaller size, and faster switching. LEDs powerful enough for room lighting are relatively expensive and require more precise current and heat management than compact fluorescent lamp sources of comparable output. Light-emitting diodes are used in applications as diverse as replacements for aviation lighting, automotive lighting (in particular brake lamps, turn signals, and indicators) as well as in traffic signals. LEDs have allowed new text, video displays, and sensors to be developed , while their high switching rates are also useful in advanced communications technology.Infrared LEDs are also used in the remote control units of many commercial products including televisions, DVD players, and other domestic appliances E. Controller Unit A control unit in general is a central part of the machinery that controls its operation, provided that a piece of machinery is complex and organized enough to contain any such unit. One domain in which the term is specifically used is the area of computer design. In this work Microcontroller ATMEGA 16L is used as the controller unit which controls the sensed signal.A single highly integrated chip that contains all the components comprising a controller. Typically this includes a CPU, RAM, some form of ROM, I/O ports, and timers. Unlike a general-purpose computer, which also includes all of these components, a microcontroller is designed for a very specific task — to control a particular system. As a result, the parts can be simplified and reduced, which cuts down on production costs. Microcontrollers are sometimes called embedded microcontrollers, which just mean that they are part of an embedded system that is, one part of a larger device or system.F. Power Supply Unit Power supply is a very important part of electronic circuit this circuit required fixed +5 V supply so to fix this voltage we needed voltage regulator. In this work used 7805 Voltage regulator which output fixed +5 volt. A voltage regulator generates a fixed output voltage of a preset magnitude that remains constant regardless of changes to its input voltage or load conditions. There are two types of voltage regulators: linear and switching. A linear regulator employs an active (BJT or MOSFET) pass device (series or shunt) controlled by a high gain differential amplifier.It compares the output voltage with a precise reference voltage and adjusts the pass device to maintain a constant output voltage. G. Display Unit Display device sho wn the result of the measuring instrument. A observer can see the result and observe the temperature of electrical machine. In this work we used a 2Ãâ€"16 character LCD (LM016L) display. A liquid crystal display (LCD) is a thin, flat electronic visual display that uses the light modulating properties of liquid crystals. H. Printed Circuit Board A printed circuit board, or PCB, is used to mechanicallyInternational Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 support and electrically connect electronic components using conductive pathways, tracks or signal traces etched from copper sheets laminated onto a non-conductive substrate. It is also referred to as printed wiring board (PWB) or etched wiring board. A PCB populated with electronic components is a printed circuit assembly (PCA), also known as a printed circuit board assembly (PCBA). Printed circuit boards are used in virtually all but the implest commercially produced electronic devices. PCBs ar e inexpensive, and can be highly reliable. They require much more layout effort and higher initial cost than either wire wrap or point-to-point construction, but are much cheaper and faster for high-volume production; the production and soldering of PCBs can be done by automated equipment. Much of the electronics industry's PCB design, assembly, and quality control needs are set by standards that are published by the IPC organization. Pin descriptions of ATmaga16L Microcontroller VCC: Digital supply voltage.GND: Ground. Port B (PB7†¦ PB0) Port B is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for each bit). The Port B output buffers have symmetrical drive characteristics with both high sink and source capability. As inputs, Port B pins that are externally pulled low will source current if the pull-up resistors are activated. The Port B pins are tri-stated when a reset condition becomes active, even if the clock is not running. Port B also serves th e unction’s of various special features of the ATmega16. Port C (PC7†¦PC0) Port C is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for each bit). The Port C output buffers have symmetrical drive characteristics with both high sink and source capability. As inputs, Port C pins that are externally pulled low will source current if the pull-up resistors are activated. The Port C pins are tri-stated when a reset condition becomes active, even if the clock is not running. If the JTAG interface is enabled, the pull-up resistors on pins PC5 (TDI), PC3 (TMS) and PC2 (TCK) will be activated even if a reset occurs.Port C also serves the functions of the JTAG interface and other special features of the ATmega16. Port D (PD7†¦ PD0) Port D is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for each bit). The Port D output buffers have symmetrical drive characteristics with both high sink and source capability. As inputs, Po rt D pins that are externally pulled low will source current if the pull-up resistors are activated. The Port D pins are tri-stated when a reset condition becomes active, even if the clock is not running. Port D also serves the functions of various special features of the ATmega16.Port A (PA7†¦ PA0) Port A serves as the analog inputs to the A/D Converter. Port A also serves as an 8-bit bi-directional I/O port, if the A/D Converter is not used. Port pins can provide internal pull-up resistors (selected for each bit). The Port A output buffers have symmetrical drive characteristics with both high sink and source capability. When pins PA0 to PA7 are used as inputs and are externally pulled low, they will source current if the internal pull-up resistors are activated. The Port A pins are tri-stated when a reset condition becomes active, even if the clock is not running.RESET Reset Input. A low level on this pin for longer than the minimum pulse length will generate a reset, even if the clock is not running. Shorter pulses are not guaranteed to generate a reset. AVCC Fig. 6. Printed circuit board (pcb) of this voting system I. Pin Configurations Discription Fig. 7. Pin configuration of Atmega16L microcontroller[14] AVCC is the supply voltage pin for Port A and the A/D Converter. It should be externally connected to VCC, even if 188 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 he ADC is not used. If the ADC is used, it should be connected to VCC through a low-pass filter AREF AREF is the analog reference pin for the A/D Converter. III. SOFTWARE DEVELOPMENT FOR ELECTRONIC VOTING MACHINE Flowchart of Program: user. In both of the systems that we analyzed, we found major security vulnerabilities that could compromise the confidentiality, integrity, and availability of the voting process. The results of our study suggest that there is a need for a drastic change in the way in which electronic systems are designed, deve loped, and tested.Researchers, practitioners, and policy makers need to define novel testing approaches that take into account the peculiar information flow of these systems, as well as the combination of computer security mechanisms and physical procedures necessary to provide a high level of assurance. Electronic voting software is not immune from security concerned. Here we describe Hack-a-vote, a simplified DRE voting system that we initially developed to demonstrate how easy it might be to insert a Trojan horse into a voting system.In case of a discrepancy, there either must be a row with the fresh random number. But without a mark of the voter or the alignment information on the ballot and on the receipt must differ. The proof consists either of a row containing the fresh random number but no mark without revealing which row this is or the proof consists of the two differing alignment bar codes without showing the mark at all. After the publication of the receipts the situatio n is analogous to the paper based schemes above as the voter possesses a correct receipt as electronic evidence.In addition to using unforgivable receipts with a special paper one can assume a trusted printer containing a chip card this printer could have the chip card and print the signature to the receipt. Having two in dependent ways to proved receipt to be not a forgery is a big advantage. REFERENCES D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, R. A. Kemmerer, W. Robertson, F. Valeur, and G. Vigna, â€Å"An Experience in Testing the Security of Real-World Electronic Voting Systems,† IEEE Transactions on Software Engineering, vol. 36, no. 4, 2010. [2] A. Villa? orita and K. Weldemariam, and R. Tiella, â€Å"Development, Formal Veri? ation, and Evaluation of an E-Voting System with VVPAT,† IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, 2009. [3] Y. D. Wagner, M. Bishop, T. Baker, B. D. Medeiros, G. Tyson, M. Shamos, and M. Burmester, â₠¬Å"Software Review and Security Analysis of the ES I Votronic 8. 0. 1. 2 Voting Machine Firmware,† Technical report, Security and Assurance in Information Technology Laboratory, 2007. [4] T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach, â€Å"Analysis of an Electronic Voting System,† in Proc. of IEEE Symp. Security and Privacy, pp. 27-40, 2004. [5] E. Proebstel, S. Riddle, F. Hsu, J.Cummins, F. Oakley, T. Stanionis, and M. Bishop, â€Å"An Analysis of the Hart Intercivic DAU eSlate,† in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2007. [6] D. Molnar, T. Kohno, N. Sastry, and D. Wagner, â€Å"Tamper-Evident, History Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract),† in Proc. of IEEE Symp. Security and Privacy, pp. 365-370, 2006. [7] J. Bethencourt, D. Boneh, and B. Waters, â€Å"Cryptographic Methods for Storing Ballots on a Voting Machine,† in Proc. o f Network and Distributed System Security Symp, 2007. 8] S. Garera and A. Rubin, â€Å"An Independent Audit Framework for Software Dependent Voting Systems,† in Proc. of ACM conf. Computer and Comm. Security, pp. 256-265, 2007. [9] J. Hall, â€Å"Improving the Security, Transparency and Efficiency of California’s 1 Percent Manual Tally Procedures,† in Proc. of Usenix/ Accurate Electronic Voting Technology Workshop, 2008. [10] K. Weldemariam and A. Villafiorita, â€Å"Modeling and Analysis of Procedural Security in (e) Voting: The Trentino’s Approach and Experiences,† in Proc. of Usenix/Accurate Electronic Voting Technology Workshop, 2008. [11] R.Hite, â€Å"All Levels of Government are needed to Address Electronic Voting System Challenges,† Technical report, GAO, 2007. [1] Fig. 8. Flowchart of program IV. RESULTS AND ANALYSIS This work contributed to three very basic research questions arising: in the context of verifiable elections. First, we discussed the problem of keeping ballot secrecy to a certain extent in the case of a corrupted doting machine or voting authority. Our contribution to this is an approach where all secret information is encapsulated in the voting machine. Second, we considered the attack of receipt stealing and manipulation of the corresponding votes.Here we proposed a novel approach of linking all receipts by a hash chain such that each single receipt guards the integrity of all receipts issued previously. Together with a display in the polling place this approach shortens the time window in which an adversary can perform the ballot stealing attack without almost zero risk. Third, we discussed in detail the possibility of contesting an election based on the evidence provided by the verifiable election scheme. We compared the situation for Bingo Voting to the evidence provided by paper based schemes.We shortly sketched an approach to prove an error or a manipulation in the voting booth without vi olating ballot secrecy. However, this was only a proof of concept and for a practical application the usability of this approach needs to be further improved. V. CONCLUSION As part of these exercises, we devised a testing methodology, developed new tools that are specifically tailored to the security analysis of these systems, and learned a number of lessons, all of which should be of use to other 189 International Journal of Information and Electronics Engineering, Vol. 3, No. 2, March 2013 [12] M. Gondree, P. Wheeler, and D. D.Figueiredo, â€Å"A Critique of the 2002 FEC VSPT E-Voting Standards,† Technical report, Univ. of California, 2005. [13] R. Mercuri. Voting System Guidelines Comments. [Online]. Available: http:// www. wheresthepaper. org/VVSGComment. pdf, 2005. [Online]. Available: [14] Atmel. http://www. atmel. com/Images/doc2466. pdf Mr. Diponkar Paul is currently working as Assistant Professor in the department of Electrical and Electronic engineering at World Uni versity of Bangladesh, Dhaka, Bangladesh (www. wub. edu. bd ). After passing his master degree from March 2008 he was serving as Assistant Professor, EEE at Bangladesh University upto July 2010.He is having qualifications: B. Sc. Engg. , DISM (software engineering), M. Sc. Engg. His research interests are in the area of energy conversions, power system modeling and advanced control theories covering the application of IT. From 0ct 2004 to July 2006, he was working as Lecturer in department of computer science and engineering at Pundra University of science & technology, Bogra. In Singapore during his master dgree at Nanyang technological university, he was involved in financial service operation integrated to IT system administration jobs from Dec 2006 to February 2008.Mr. Sobuj Kumar Ray was born in 1987, Bogra, Bangladesh. Mr. Ray received his Bachelor degree in Electrical and Electronic Engineering from the Rajshahi University of Engineering and Technology (RUET), Rajshahi, Bangl adesh in April 2010. He is now Assistant Manager (Technical) in DESCO. Mr. Ray worked at Internal University of Business Agriculture and Technology in the department of Electrical and Electronic Engineering, Dhaka, Bangladesh (www. iubat. edu) from 12th July 2010 to 1st October, 2012. He is enthusiastic on researcher on control system and Power System. 190 Electronic Voting Machine Project Outline In general the EVM consists of two units that can be inter linked. A ballot unit, which a voter uses to exercise his vote. And the other, a control unit used by the polling officials. But the EVM prepared by us is totally automated. MCU is acting as the Polling Officer in this EVM. Ballot Unit It consists of a 16Ãâ€"2 LCD and IR LEDs. LCD displays the name of the post and candidate for which voting is going on IR LEDs are used as touch switches. For anything which you have to select, put your figure just above the option where it is being displayed on the LCD. Control UnitIt consists of a MCU and a 7 keys keypad. MCU stores the program, run it and also stores the data given by voters. We have made keypad, which can be used to input the name of Posts and the Candidates. By using this we will not have to program the machine each time before any election. One can enter the name of posts and candidates just before the election. This can also prevent programming the EVM t o favour any particular candidate. 1. 1 The Electronic Voting Mach ine – An Electronic Marvel. Electronic Voting Machine (EVM) retains all the characteristics of voting by ballot papers, while making polling a lot more expedient.Being fast and absolutely reliable, the EVM saves considerable time, money and manpower. And, of course, helps maintain total voting secrecy without the use of ballot papers. The EVM is 100 per cent tamper proof. And, at the end of the polling, just press a button and there you have the results. 1. 2Description: Electronic voting machine has now days become an effective tool for voting. It ensures flawless voting and thus has become more widespread. It ensures people about their vote being secured. It avoids any kind of malpractice and invalid votes.Also such kind of system becomes more economical as consequent expenditure incurred on manpower is saved. It is also convenient on the part of voter, as he has to just press one key whichever belongsto his candidates. Voting machinesare the total combination ofmechanical,electromechanical, or electronic equipment (includingsoftware,firmware, and documentation required to program control, and supportequipment), that is used to define ballots; to cast and count votes; to report or display election results; and to maintain and produce any audit trail information.The first voting machines were mechanical but it is increasingly more common to use electronic voting machines. A voting system includes the practices and associated documentation used to identify system components and versions of such components; to test the system during its development and maintenance; to maintain records of system errors or defects; to determine specific changes made after initial certification; and to make available any materials to the voter (such as notices, instructions, forms, or paper ballots).Traditionally, a voting machine has been defined by the mechanism the system uses to cast votes and further ca tegorized by the location where the system tabulates the votes. Voting machines have different levels of usability, security,efficiency and accuracy. Certain systems may be more or less accessible to all voters, or not accessible to those voters with certain types of disabilities. They can also have an effect on the public's ability to oversee elections. SUMMARY Electronic voting machine has now replaced the traditional mechanism of voting due to several advantages like security, automatic counting etc.This project presents a way to develop an electronic voting machine which displays the count of votes on a 16Ãâ€"2 LCD interface. A user can get his/her vote register through a set of switches (one for each candidate). After every cast of vote, the subsequent count can be seen on LCD. The circuit uses AT89C51 microcontroller and the code for the project has been written in C. DESCRIPTION This LCD based electronic voting machine is designed for four candidates. The input part consists of a set of six tactile switches. The switches and 16Ãâ€"2 LCD are interfaced to microcontroller AT89C51 for various operations and displays.The provision of casting votes for the candidates has been provided through four of these switches. These switches are made active high and connected to pins 2-5 (P1^1 – P1^4) of the controller. The remaining two switches (both active low) are to start and stop the voting procedure. They are connected to pins 1 and 6 (P1^0 and P1^5) respectively. The Init (start) switch initializes the voting system when pressed, while the Stop switch ends the voting and displays the poll results on LCD screen. For more details on working with LCD, refer LCD interfacing with 8051.The data pins of the LCD (pins 7-14) are connected to the output port P2 of the microcontroller. The control pins (RS, R/W and EN) are connected to port P3 pins P3^0, P3^1 ; P3^6 respectively. Working: The voting is started by pressing the Init switch after which the user is p rompted to vote. The count of votes is stored in four different variables. As soon as the user votes for a candidate by pressing one of the switches, the value of the corresponding variable is increased by one. After this a Thank you message is displayed on LCD to acknowledge the registration of user’s vote.The message stays on the screen until the next user either presses the Init button to cast another vote or Stop switch is pressed get the poll results. When the stop button is pressed, the names of the candidates are displayed along with their vote counts. After some delay, the result is displayed which could be either declaration of the winner candidate or the candidates with a clash of their number of votes. PRESET | | A preset is a three legged electronic component which can be made to offer varying resistance in a circuit.The resistance is varied by adjusting the rotary control over it. The adjustment can be done by using a small screw driver or a similar tool. The res istance does not vary linearly but rather varies in exponential or logarithmic manner. Such variable resistors are commonly used for adjusting sensitivity along with a sensor. The variable resistance is obtained across the single terminal at front and one of the two other terminals. The two legs at back offer fixed resistance which is divided by the front leg. So whenever only the back terminals are used, a preset acts as a fixed resistor.Presets are specified by their fixed value resistance. | | AT89C51 MCAT89C51 is an 8-bit microcontroller and belongs to Atmel's 8051 family. ATMEL 89C51 has 4KB of Flash programmable and erasable read only memory (PEROM) and 128 bytes of RAM. It can be erased and program to a maximum of 1000 times. In 40 pin AT89C51, there are four ports designated as P1, P2, P3 and P0. All these ports are 8-bit bi-directional ports, i. e. , they can be used as both input and output ports. Except P0 which needs external pull-ups, rest of the ports have internal pul l-ups.When 1s are written to these port pins, they are pulled high by the internal pull-ups and can be used as inputs. These ports are also bit addressable and so their bits can also be accessed individually. Port P0 and P2 are also used to provide low byte and high byte addresses, respectively, when connected to an external memory. Port 3 has multiplexed pins for special functions like serial communication, hardware interrupts, timer inputs and read/write operation from external memory. AT89C51 has an inbuilt UART for serial communication.It can be programmed to operate at different baud rates. Including two timers & hardware interrupts, it has a total of six interrupts. Pin Diagram:  Pin Description:     Pin No|   Function|   Name| 1| 8 bit input/output port (P1) pins| P1. 0| 2| | P1. 1| 3| | P1. 2| 4| | P1. 3| 5| | P1. 4| 6| | P1. 5| 7| | P1. 6| 8| | P1. 7| 9| Reset pin; Active high| Reset| 10| Input (receiver) for serial communication| RxD| 8 bit input/output port (P3) pins| P3. 0| 11| Output (transmitter) for serial communication| TxD| | P3. 1| 12| External interrupt 1| Int0| | P3. 2| 3| External interrupt 2| Int1| | P3. 3| 14| Timer1 external input| T0| | P3. 4| 15| Timer2 external input| T1| | P3. 5| 16| Write to external data memory| Write| | P3. 6| 17| Read from external data memory| Read| | P3. 7| 18| Quartz crystal oscillator (up to 24 MHz)| Crystal 2| 19| | Crystal 1| 20| Ground (0V)| Ground| 21| 8 bit input/output port (P2) pins/High-order address bits when interfacing with external memory  |   P2. 0/ A8| 22| |   P2. 1/ A9| 23| |   P2. 2/ A10| 24| |   P2. 3/ A11| 25| |   P2. 4/ A12| 26| |   P2. 5/ A13| 27| |   P2. 6/ A14| 28| |   P2. 7/ A15| 9| Program store enable;  Read from external program memory| PSEN| 30| Address Latch Enable | ALE| | Program pulse input during Flash programming| Prog| 31| External Access Enable;   Vcc for internal program executions| EA| | Programming enable voltage; 12V (during Flash program ming)| Vpp| 32| 8 bit input/output port (P0) pins  Low-order address bits when interfacing with external memory  |   P0. 7/ AD7| 33| |   P0. 6/ AD6| 34| |   P0. 5/ AD5| 35| |   P0. 4/ AD4| 36| |   P0. 3/ AD3| 37| |   P0. 2/ AD2| 38| |   P0. 1/ AD1| 39| |   P0. 0/ AD0| 40| Supply voltage; 5V (up to 6. V)| Vcc| | | LCD (Liquid Crystal Display) screen is an electronic display module and find a wide range of applications. A 16Ãâ€"2 LCD display is very basic module and is very commonly used in various devices and circuits. These modules are preferred over seven segments and other multi segment LEDs. The reasons being: LCDs are economical; easily programmable; have no limitation of displaying special & even custom characters (unlike in seven segments), animations and so on. A 16Ãâ€"2 LCD means it can display 16 characters per line and there are 2 such lines.In this LCD each character is displayed in 5Ãâ€"7 pixel matrix. This LCD has two registers, namely, Command an d Data. The command register stores the command instructions given to the LCD. A command is an instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position, controlling display etc. The data register stores the data to be displayed on the LCD. The data is the ASCII value of the character to be displayed on the LCD. Click to learn more about internal structure of a LCD.Pin Diagram:  Pin Description:     Pin No|   Function|   Name| 1| Ground (0V)| Ground| 2| Supply voltage; 5V (4. 7V – 5. 3V)|   Vcc| 3| Contrast adjustment; through a variable resistor|   VEE| 4| Selects command register when low; and data register when high| Register Select| 5| Low to write to the register; High to read from the register| Read/write| 6| Sends data to data pins when a high to low pulse is given| Enable| 7| 8-bit data pins| DB0| 8| | DB1| 9| | DB2| 10| | DB3| 11| | DB4| 12| | DB5| 13| | DB6| 14| | DB7| 15| Backlight VCC (5V) | Led+| 6| Backlight Ground (0V)| Led-| | | APPLICATIONS & ADVANTAGES Fast track voting which could be used in small scale elections, like resident welfare association, panchayat level election and other society level elections. It could also be used to conduct opinion polls during annual share holders meeting. It could also be used to conduct general assembly elections where number of candidates are less than or equal to eight in the current situation. It could be used at places where there is no electricity as the thing is operational with the help of a simple 5 volt battery.It could well become a fine example of using environment friendly resources as there is no need for having lakhs of ballot papers as was used in older system of voting. It involves very less time for a voter to actually cast its vote unlike conventional method where it becomes very cumbersome to handle ballot papers. It is more fast and reliable. FUTURE SCOPE Number of candidates could be increased by using ot her microcontroller or an 8255 IC. It could be interfaced with printer to get the hard copy of the result almost instantly from the machine itself.It could also be interfaced with the personal computer and result could be stored in the central server and its backup could be taken on the other backend servers. Again, once the result is on the server it could be relayed on the network to various offices of the election conducting authority. Thus our project could make the result available any corner of the world in a matter of seconds In days of using nonpolluting and environment friendly resources of energy,it could pose a very good example.REFRENCES AND BIBLOGRAPHY 1. Muhammad Ali Mazidi , Janice Gillispie Mazidi, Rolin D. Mckinlay. Second edition, THE 8051 MICROCONTROLLER AND EMBEDDED SYSTEM 2. K. J. Ayala. Third edition, The 8051 MICROCONTROLLER 3. Millman & Halkias. INTEGRATED ELECTRONICS. 4. http://www. wikipedia. com 5. http://www. 8051microcontrollerprojects. com 6. www. datas heet4u. com 7. www. rickeya„? sworld. com Reference: http://seminarprojects. com/Thread-electronic-voting-machine-project-full-report#ixzz2RD8Xd1cO