Wednesday, September 2, 2020

Analyze the given scenario Essay Example for Free

Investigate the given situation Essay Investigate the given situation and play out a K.T issue examination to distinguish the reason for the issue. Shining mineral water is the essential result of Bubbles, Inc. This firm, which is situated in France, serves three significant markets†Europe, North America, and Australia. It gathers water from a characteristic spring; the water is then sifted through an equal cluster of three channel units, each containing two charcoal channels. The filtration procedure expels follow measures of normally happening contaminants. The sifted water is put away in discrete tank ranches, one for each market, until it is moved by big hauler truck to one of the three packaging plants that serve the companys markets. At the point when the water shows up at the packaging plant, it is briefly positioned in 3500 m3 stockpiling tanks until it very well may be carbonated to give the bubbling that is the trademark of the maker. A portion of the water is additionally enhanced with lemon, cherry, and raspberry added substances. Next, the shimmering water is bundled in an assortment of container sizes and materials, going from 0-ounce glass jugs to 1-liter plastic jugs. The European market gets its shipments legitimately by truck, as a rule inside three days. Items headed for North America or Australia are transported first by truck to the waterfront and afterward by tankers to their abroad goals. Business has been useful throughout the previous a while, with the North American and European markets requesting as much shimmering water as can be created. This circumstance has necessitated that Bubbles contract with extra plastic contain providers to keep with the expanded interest. It has likewise constrained routinely planned support for the Australian and North American tank ranches to be postponed and rescheduled as a result of the appeal for the item. There is likewise, obviously, a bigger interest put on the spring that provisions the mineral water for the process.Unfortunately, the news isn't all useful for Bubbles. The packaging plant for the Australian market is right now a little while bogged down inferable from a shipment that was lost adrift. This disaster has necessitated that water from the companys save springs, which are found numerous miles from the packaging plant, be utilized to enlarge the water provided by the customary spring so the packaging plant can work at a significantly more elevated level of creation. The accessibility of water from the hold springs is obstructed by their remote areas, butâ the water from these springs doesn't require filtration. What's more, contract dealings are going gravely and it shows up there will be a strike at all of the packaging plants. Late climate gauges show that alleviation from the progressing dry spell, which has just kept going three months, is n ot likely. To top it all off, clients in the North American and Australian markets are grumbling that all shipments of the shimmering water over the most recent a month and a half have contained benzene in inadmissibly high fixations. You realize that benzene is regularly utilized as a modern dissolvable but on the other hand is found normally. A speedy study of the packaging plant administrators shows that the North American-bound items that are right now bundled and anticipating shipment have benzene focuses in abundance of satisfactory fixations. In any case, the directors of the packaging plants that administration the Australian and European markets report that no huge degree of benzene was recognized in the jugs that are as of now put away. Experts in the North American and Australian markets have just started reviewing the item, with experts in the European market constraining Bubbles for a snappy arrangement and taking steps to review items as a prudent step. Data adjusted from the accompanying journal:American Chemical Society. (1992). At the point when the air pocket burst: The company’s reaction demonstrated as the first sullying.

Saturday, August 22, 2020

Types of Life Insurance: Advantages and Disadvantages

Kinds of Life Insurance: Advantages and Disadvantages Diagram Extra security is one of the most famous sorts of protection that individuals buy. Extra security is fundamentally protection that you buy and will pay cash to your recipients in the event that you bite the dust. One of the fundamental reasons why individuals buy life coverage is to secure their family monetarily. Life coverage will help pay for entombment costs, obligation, contracts, and some other pay misfortunes that will happen on the off chance that somebody bites the dust. Life coverage is paid for simply like car protection is. It very well may be paid by a month to month, quarterly, or every year premium for whatever length of time that the strategy goes for (Types of Insurance Policies, 2011). There are a few distinct sorts of life coverage strategies that individuals can buy that will best suit their requirements. The principle types are term disaster protection, entire extra security, variable life coverage, and all inclusive life coverage. In this examination paper, I wi ll clarify the favorable circumstances, burdens, time lengths, and how every one of the sorts of life coverage fit various individuals. It is critical to see how these insurance agencies figure premiums for various individuals. Their principle objective is to survey the danger of somebody kicking the bucket during the approach. Much the same as different kinds of protection, the more hazard you have, the higher your top notch will be. A portion of the components that are utilized to decide premiums are sexual orientation, age, occupation, tallness, weight, clinical history, way of life, and on the off chance that you smoke (Types of Insurance Policies, 2011). As of late I needed to do a task in class where you needed to discover distinctive premiums on life coverage. Some different things that I was inquired as to whether I as of late had any DUIs, if any family members have passed on before the age of 60, in the event that I have as of late been hospitalized, and if any ailments run in my family. These variables do give the insurance agencies a superior comprehension of someones chance, however it is about difficult to have the option to decide the odds of somebody dying. It is likewise hard to appraise the expense of every one of the various kinds of disaster protection since it is diverse for each person. Term disaster protection is truly moderate, and that is the reason it is developing in fame. Term disaster protection is fundamentally a life coverage strategy that covers an individual in the event that they pass on during the length of their protection. Term life coverage arrangements can be somewhere in the range of 1 to 30 years. These strategies are known as impermanent in light of the fact that once the approaches are finished, you are not, at this point secured. For instance, in the event that you buy a multi year term disaster protection arrangement, and you bite the dust the year after your strategy lapses, your recipients wont get any cash. This additionally implies in the event that you quit paying your premiums, you will never again be secured. There are a wide range of reasons how individuals settled on to what extent they need their disaster protection strategy to cover their family. A ton people that buy term life coverage choose to cause their agreement until they to resign. Another famous way individuals settle on their term is to stay secured until their kids have turned 18. This is an extremely savvy approach to safeguard that your kids will be monetarily ensured until they are grown-ups (Life Insurance Wiz, 2006). Another valid justification to buy term disaster protection is on the off chance that you are associated with hazardous or possibly deadly exercises. Despite the fact that these elements will expand your top notch, it is as yet justified, despite all the trouble in the event that something horrendous occurs. The expense of term extra security all relies upon a people chance and the length of the strategy. There are a few distinct kinds of term extra security, and it is essential to know the distinctions while choosing the best sort. Yearly sustainable term life coverage implies that every year an individual may restore their term life coverage. In any case, every year you restore your term life coverage, the excellent will go up in cost on account of your age. Inexhaustible term life coverage implies that after your particular term is up, you are permitted sign another term disaster protection contract. Level premium term protection implies that your top notch won't change all through the length of the agreement. This kind of term protection is acceptable in light of the fact that as you get more seasoned, you dont need to pay more cash for your extra security. Convertible term protection implies that you are permitted to change over your term protection into another sort of extra security, similar to all inclusive or entire (Life Insurance Wiz, 2006). There are focal points and detriments to term life coverage. A few points of interest are that you get the chance to pick to what extent you need to be secured for, most arrangements can be changed or reestablished to different strategies, and your recipients are paid a particular sum upon your passing which is chosen when you start your approach. A few disservices are that in the event that you die after your term extra security approach, no advantages are providing for your family, and it doesnt offer as much assurance as other life coverage strategies offer (Life Insurance Wiz, 2006). Entire Life Insurance Entire extra security is actually what it seems like, a life coverage arrangement that keep going for someones entire life. Upon death, the recipient gets the estimation of the record. Entire extra security is otherwise called lasting life coverage. The principle distinction between entire life and term life is that entire extra security develops in an incentive after some time. Entire life coverage is like a retirement account where you are putting cash toward the future, with the exception of for this situation it is toward your demise. An intriguing reality about entire extra security is that you can really get cash out of your record, which you can't do with term protection (Life Insurance Wiz, 2006). To have the option to get cash out of your record, there must be a set least of cash previously put into the record. Most entire life coverage strategies develop when an individual turns 100 years of age, so if that individual is as yet alive they will get the assumed worth of their record (My Life Insured, 2007). The fundamental motivation behind why individuals pick entire life coverage over term disaster protection is on the grounds that they need to be guaranteed for a mind-blowing remainder. Therefore, entire life coverage is more costly than term protection. There are a few distinct sorts of entire life coverage. Non taking an interest entire extra security implies that you don't get profits for your arrangement. Then again, taking an interest entire life coverage implies that you do get profits. Level premium entire extra security is much the same as level term protection, where you pay a similar premium all through the length of the approach. Buying a disaster protection arrangement with a fixed premium is an incredible decision in light of the fact that once you resign, you wouldnt need your premium to expand each year because of the misfortune in salary. Single premium entire extra security is where you pay a huge total of cash in the asking of your approach, which than wipes out paying premiums. This sort of strategy isn't exceptionally famous because of the explanation that you would require a ton of cash in advance. Middle of the road entire extra security implies that your premiums change after some time contingent upon your stat us (New York State Insurance Department, 2011). In the past couple years, a lot of individuals lost their homes as a result of flexible home loans, so I believe that this sort of entire disaster protection is certainly not a decent decision. A few favorable circumstances of Whole life coverage are that they are typically fixed premiums, the recipients will get cash at whatever point the arrangement holder passes on, there are tax breaks, and a large portion of the cash will be returned if the approach is dropped. The cash that gathers in your approach is tax exempt, which pulls in many individuals to buy an entire life coverage strategy over a term disaster protection arrangement. A few detriments of entire life coverage is that it is exorbitant contrasted with term protection, and it is significantly more muddled than term extra security (New York State Insurance Department, 2011). On the off chance that you are keen on buys an entire life coverage strategy, it is essential to realize which type it is so you realize you will have the option to manage the cost of it for a mind-blowing remainder. All inclusive Life Insurance All inclusive disaster protection is fundamentally the same as entire extra security. A widespread extra security strategy will cover somebody for as long as they can remember, so it is additionally viewed as a changeless disaster protection arrangement. All inclusive life coverage approaches additionally develop in real money after some time, which is charge conceded. The loan costs increment and abatement like the currency advertise, so there is an opportunity to rake in tons of cash in this kind of extra security (My Life Insured, 2007). The principle advantage that all inclusive extra security has over entire disaster protection is that there is greater adaptability in the approach. The money esteem and the demise benefits portions of your approach are separated, so an individual can choose the amount of their cash will go in each part (Life Insurance Wiz, 2006). The arrangement holder can likewise increment and lessening their premium relying upon their circumstance. In any case , the insurance agencies do have an objective premium, so on the off chance that you pay short of what it, you might be punished (Life Insurance Wiz, 2006). This sort of life coverage strategy would be best for somebody who needed to be secured for a mind-blowing remainder, and would need to have the option to change their approach to be suit their necessities. Focal points of Universal disaster protection are it is the most adaptable, you can take out credits, you can change your premiums because of your circumstance, and the money you win in premium can be utilized toward your installments. A few hindrances are that your money esteem isnt ensured like it is with entire disaster protection and it more expensive than term and all inclusive extra security approaches (Life Insurance Info, 2011). Variable Life Insurance Variable disaster protection is likewise viewed as a perpetual kind of life coverage. It is viewed as an unadulterated venture arrangement in light of the fact that the safeguarded has finished control of how their cash is contributed (My Life Insured, 2007). They can choose to put away their money acco

Friday, August 21, 2020

Surveys

Acquaintance According with Babbie (2009), overviews start from antiquated occasions in Egypt. Egyptian rulers utilized overviews during the hour of Christ through statistics. Today, overview explore assists with gathering data for study report.Advertising We will compose a custom research paper test on Surveys explicitly for you for just $16.05 $11/page Learn More Survey, in business examine, enables the representative to realize his objective market, comprehend and meet the customers’ needs. Studies likewise help in getting input from the clients concerning the items or administrations that a business substance offers. As indicated by Babbie (2009), examine assists with investigating subjects, depict circumstances and clarify an event or circumstance. The most effective method to develop a survey Questionnaires help in finding valuable data that could help in an exploration venture. They help in gathering information and bringing out shifted perspectives. Babbie (2009), stat es that the design and configuration that one decides to use in a survey are vital corresponding to the data he needs to get and dissect in the business look into. A poll ought not make the respondent miss or misconstrue the inquiry since this will prompt an off-base reaction. The wording utilized in a poll ought to have the option to energize snappy understanding and right reaction. Troublesome surveys could be tossed mindful or overlooked by the respondent. The inquiries in a poll ought to be very much spread out to guarantee that they show up in a sorted out way. Association causes the respondent to have a simple method for addressing questions and giving a legitimate reaction to the inquiries. This data will likewise enable the specialist to make an efficient system that will help other people comprehend the exploration well. As indicated by Babbie (2009), the inquiries ought not be bunched. The utilization of contractions and fuse of a few inquiries in a solitary line isn't pru dent in a survey. This is on the grounds that a few respondents may confound the contraction and offer an off-base response to the inquiry. Joining a few inquiries to frame one long inquiry will make the respondent unsettled. This is on the grounds that; individuals incline toward responding to many short inquiries to not many long inquiries. This move could make the respondent abandon addressing the inquiries or offer wrong responses. Long inquiries are hard for the respondent to comprehend. The handling of these bunched inquiries during information examination is likewise an intense undertaking for the interviewer.Advertising Looking for investigate paper on instruction? How about we check whether we can support you! Get your first paper with 15% OFF Learn More The manner in which the analyst states his inquiries in the poll could affect emphatically or contrarily to the exploration venture. A poll that has efficient inquiries, for example, will make it simple for the respondent t o offer right responses. A poll with convoluted expressions is hard for the respondent to comprehend. The survey, in this manner, ought to incorporate immediate, all around organized inquiries that help to get realities and not befuddle the respondent. Straight-forward inquiries help the respondents to offer right responses that will make it simple for the specialist to break down and process. As per Babbie (2009), reaction choices ought to likewise be very much sketched out in the survey. The specialist could decide to have open-finished inquiries (for example addresses that require the respondent to record the appropriate response in a sentence structure) and close finished inquiries (for this situation the respondent picks an answer from the decisions given). Close finished inquiries are constantly a rule for the questioner to help his exploration venture. Now and again, the decisions given could be; indeed, no or perhaps. The inquiries, for this situation, are in every case dire ct and the data given matches the speculation that the specialist has remembered for his exploration. Close-finished inquiries use boxes to offer the decisions that bring out required responses. One can estimated the measures of the cases that are to be joined by the utilization of sections. One would then be able to proceed to make the cases utilizing Microsoft word processor. A scientist could utilize the reaction choices to cause the respondent to pick answers that help his exploration contention. This should be possible by stating the inquiries in a way that the respondent picks the appropriate responses that the analyst needs. As per Babbie (2009), the arrangement of inquiries is an imperative thought recorded as a hard copy a poll. The inquiries ought to be masterminded from the least difficult to the troublesome one. This game plan encourages the respondent to be mindful in addressing the inquiries. This is on the grounds that the respondent thinks that its simple to address resulting inquiries in the wake of getting the first right. This will urge him to complete the rest of the inquiries. Troublesome inquiries, toward the start of the survey, could make the respondent forsake the poll. The inquiries in the survey ought to likewise be appropriately masterminded. There ought to be a deliberate progression of inquiries to guarantee assortment of right data. The main inquiry ought to be identified with the second. This game plan helps the respondent utilize the primary inquiry to answer the next.Advertising We will compose a custom research paper test on Surveys explicitly for you for just $16.05 $11/page Learn More The poll should begin by a presentation articulation. In the presentation, the analyst acknowledges the eagerness by the respondent to help in the exploration by noting the survey. The scientist further expresses that the survey assists with noting the business look into point introduced. This aides in the starting of the respondent into the p oll and causes them to feel increased in value. Segment addresses help the scientist comprehend the respondent even without knowing his name. These inquiries help the analyst to know how the reactions given contrast among the different classifications of individuals. This methodology helps in making the poll less cruel and clamorous. They likewise help set up the respondent for the remainder of the inquiries. Segment questions could go from the age of the respondent, ethnic direction, calling or scholastic level. By and large, the respondent doesn't give his name, and in the event that he does, it is secret and thus the name could be changed or overlooked when gathering the examination report. Various hypotheses can be utilized to decide an exploration theme. The utilization of hypotheses encourages the scientist to make a rule that he will use to complete the examination. The hypotheses likewise help in making the exploration bona fide and trustworthy since it includes alluding to different inquires about done by past creators. Exceptional directions and rules ought to be spread out in a survey. The inquiries ought to likewise be built such that they bolster the examination venture. A decent survey, consequently, as per Goddard and Melville (2001) is finished; short, plots just significant inquiries, objective, fuses shut inquiries and gives clear guidance. Research Methodology According to Goddard Melville (2001) there are different wellsprings of data that could be utilized in an examination. These sources incorporate course readings, organization reports, the web, articles in diaries, gathering continuing, papers and magazines. Scholarly examinations could likewise be utilized. For example, an analyst could decide to utilize primer artistic examination so as to be side by side with the issues in the investigation. This is a groundwork for the primary research. A full abstract examination, in any case, is the principle look into and not part of the preparat ion.Advertising Searching for explore paper on training? How about we check whether we can support you! Get your first paper with 15% OFF Find out More There are a few obstructions that an analyst could look during his study. An analyst thinks that its hard to speak with individuals of an alternate language. For example, when one needs data from a local network, he needs to compose the inquiries in a language that they will comprehend. This could include understanding of the inquiries from the first language to a local language to suit the respondent. Unavailability of certain examination territories could likewise make it hard for the scientist to get the data he needs. These zones could likewise be without phones or web frustrating the utilization of elective information assortments techniques. By and large, the result of a review, for example a business overview, could cause the organization to comprehend the clients well and, in this way, address their requirements. This move regularly prompts improved client connection and expanded deals and benefits. The data from an overview ought to be in accordance with the exploration subj ect. From the exploration theory delineated, the scientist ought to make a poll that will assist him with gathering just pertinent data. This data should enable the scientist to fortify his contention in the exploration and show that what he is introducing is right. In business investigate for example, one should get significant business data that will bolster his contention. The data gathered, along these lines, ought to be legitimate and help draw out the unmistakable picture that the specialist plans. Study is the best type of information assortment since it guarantees adaptability in the social occasion of data. For this situation, the questioner picks the inquiries that he pose. Overviews likewise guarantee the assortment of various data that could be utilized to get touchy data. An overview should be possible by means of email or relational level creation it quick and successful. A legitimate overview to approve my exploration isn't available right now. A portion of the diffic ulties that are available in building up a review incorporate the test of protecting the security of the respondent. At times, this activity is unimaginable s

Tuesday, May 26, 2020

Social Issues Topic - How to Maximize Your Internet Marketing Efforts

Social Issues Topic - How to Maximize Your Internet Marketing EffortsSocial issues topic is always a key element for online marketers. In this age of social networking, there are a number of forums and blogs to focus on. The niche of social issues comes in handy with its ability to bring thousands of people and talk about issues that affect them. Here are a few examples of forums that talk about social issues topics.There are many niche groups out there. They cover everything from parenting, health, travel, fashion, politics, etc. These are the niches where social issues topics come in handy. For example, there are parents who are concerned about the amount of time it takes to raise their children. And there are some hot issues around obesity and diabetes.Topics of this kind are not only necessary but they also have the potential to make a huge impact on the online community. Since the topics cover a broad range of subjects, this has the potential to expand the online community to di fferent countries and even to other continents. This is because when someone talks about issues related to a different country, they can talk to people in that other country and raise awareness about their issues.This is the biggest advantage of online communities that cover social issues topics. It helps to raise awareness and understanding about issues that concern various groups. Whether it is trying to create a cause for a company or a cause for a country, this is the way to go.Since there are a number of websites that cover unique topics on a daily basis, getting on these sites is fairly easy. However, having a catchy title or an attractive design is not always enough. The best way to get noticed is to ensure that you are well thought out and have the right amount of content.The key is to include good content that is backed up by links to relevant blogs, forums, and sites. Articles should be written in clear and simple language so that the reader can easily understand the topic . Also, you need to avoid spelling mistakes and grammatical errors. The content should also be well-written and captivating.What makes for a good article? It should contain the following common themes: - - Finding inspiration from the situations that others are facing. - People are always looking for ways to improve their lives. They want to find out how to do this and the best way to do it.

Saturday, May 16, 2020

The Marketing Handbook Critique - 762 Words

The Marketing Plan Handbook Written by Alexander Chernev In The Marketing Plan Handbook, Chernev gives a simplified approach to writing marketing plans. It outlines the basic principles of writing a marketing plan and it puts emphasis on marketing as a value-management process. It incorporates the relevant aspects of the business, such as the financial, operational, technological and organizational aspects. Chernev states that marketing plans do not have to be lengthy but should contain need-to-know information and not so much nice-to-know information which is not directly related to the decision at hand and is rarely actionable. He breaks down the marketing plan in eight parts: executive summary, situation analysis, goal, strategy,†¦show more content†¦This section will focus on customers’ needs, identifying collaborators and their strategic goals and identifying the competition that provides similar products. The tactics part of the marketing plan defines relevant product and service characteristics. It will also inclu de the pricing of the product and how the information is communicated to its target market, stakeholders and company personnel. The implementation section outlines the organizational structure of the business unit and its relationship with collaborators. It will define the business processes involved in implementing the strategies and tactics of the company. It will also outline the implementation schedule. The control portion of the marketing plan identifies the criteria for evaluating the company’s performance and progress toward its goals and the metrics for evaluating the environment in which the company operates. The exhibits in the marketing plan provide additional information that illustrates particular aspects of the marketing plan. It will consist of various types of information which can include marketing research data, financial data, and project management. This can come in the form of tables, charts and appendixes. The Marketing Plan Handbook Written by Alexander Chernev Criticized by Desiree Williams Even thoughShow MoreRelatedMattel s Target Customers Range851 Words   |  4 Pagestoddler fans through marketing strategies aimed at new parents. Because Mattel has been a top toy-making company for over 50 years, many of the company’s customers are returning fans looking to collect old toys that would remind them of their childhood. Mattel developed the Hotwheels Collectors and Barbie Collectors line for those loyal customers looking to hold onto their childhood memories (NY Times). Mattel Toys Inc. is the global leader in the design, manufacture and marketing of toys and familyRead MoreTheo 510 Journal Article Critique Essay1103 Words   |  5 PagesJOURNAL ARTICLE CRITIQUE of Gangel, Kenneth O. â€Å"Marks of a Healthy Church.† Bibliotheca Sacra vol.158 no.632 (October - December 2001): 467-477. THEO 510 LUO (fall 2012) Survey of Theology Liberty Baptist Theological Seminary October 22, 2012 CONTENTS INTRODUCTION3 BRIEF SUMMARY3 CRITICAL INTERACTION4 CONCLUSION5 SELECTED BIBLIOGRAPHY6 Introduction In the New Testament, the church can be referred to as the â€Å"local† church or the â€Å"universal† church. The local churchRead MoreWhy I Want Pursue A Career For Public Relations1684 Words   |  7 PagesEvery company needs someone to help promote and sell their image, the job market for public relations specialist is diverse and can lead to greater job opportunities. To better understand this market I will reference to the occupational Outlook Handbook (OOH) online, O* Net Online, a related professional organization, related newspaper article, a possible current employer, and a current job positon. The career field I am attracted to is a conglomeration of social media campaigning, public transparencyRead MoreAn Organizational Structure Based on Risk and Quality Fundamentals641 Words   |  3 Pagesadverse conditions and deficiencies) or from the threats (external factors and hazards). Under this concept any process scoping to positive changes either in the management level (e.g. the allocation of financial resources, the recruiting policy, the marketing of products and services etc.), or in the production level (e.g. the productivity, the manpower management, the shifts scheduling, the equipment maintenance etc.), or in the quality performance (final product technical characteristics, meet of customerRead MoreStandardization in International Marketing Strategy Is Doomed to Failure: Literature Review and Methodological Critique1577 Words   |  7 PagesStandardization in International Marketing Strategy is doomed to failure: Literature review and methodological critique. The literature on standardization of international marketing strategy has rapidly increased in amount since Levitt (1983) suggested the main concept that business strategies and their influences on firm performance should be universal through national markets which are very much alike culturally, economically and politically, in spite of limited empirical evidence focusedRead MoreDescription of Conjoint Analysis1257 Words   |  5 Pagesfindings can then be used to identify the combination of attributes that consumers would likely most prefer (Calantone Di Benedetto, 1990). According to Orme (2009), Conjoint analysis has become one of the most widely-used quantitative methods in marketing research. When used properly, it provides reliable and useful results (p. 1). Although there are a number of different conjoint analytical methods that employ different pairings of example products, the general goal is to measure the perceivedRead MoreAssignment Case Study Honda1227 Words   |  5 PagesAssignment Case study Honda Marketing [pic] Introduction: This individual assignment will be assessed by means of a 3,500  ± 10% word report. The assignment has been designed to allow you to develop and use your knowledge and skills in understanding key strategic issues relating to the Global Automobile Industry. You will be required to apply the strategic concepts and analytical techniques studied in this module. All the learningRead Morehuman relations1085 Words   |  5 Pagesachieve this and one of them is marketing and advertisements. This will open up new markets and allow it to compete with other brands in the world. The founder states the company will continue to develop the unique safari shoes designs that have stitches on the outside, an old African tradition (Bushe, G.R. (2011). Deliver phase One of the ways the company is delivering in its ambition to grow its market share is by shooting of this video itself which acts as a marketing tool (Barrett Fry, 2005).Read MoreThe Safety And Peace Promotion Research1293 Words   |  6 Pagesevents and data that need to be taken into account in understanding the Railton context? This study also involved elven phases, along with the main activities. Phase one was preparation, which focused on the ethics process, research team training, marketing and initial interviews. The second phase was the contextual analysis, which was the document analysis, school essays, and elder’s workshop. Third part of the phase was key informant interviews that where the workshop interviews with twenty-nine keyRead MoreEvaluation Of The Canadian Cancer Society Website Cancer2157 Words   |  9 Pagesstandards for written information on treatment choices (DISCERN Handbook). The NHS is an organization that provides health care of all citizens in the United Kingdom regardless of their ability to pay (NHS Website). DISCERN was the first standardized index of quality of consumer health information to help end-users of health information access the quality of treatment information on the Internet through the use of 16 questions (DISCERN HANDBOOK). Treatment information is defined as â€Å"a course of action

Wednesday, May 6, 2020

Operation Management - 3821 Words

operation management †¢ Executive Summary Operation management is defined as the design, operation, and improvement of the systems that create and deliver the firm’s primary products and services. Somerset furniture company’s global supply chain was getting lose its competitive edge and even faced shipments delayed by as much as 40%. The company prides itself on customer service and fears that late deliveries to its customers would harm its credibility and result in lost customers and excessive inventories. Somerset set up new strategy and tactics to meet the goals and improve the global supply chain. First, Somerset found out where the problems are and focused on its core competences that improve productivities and reduce†¦show more content†¦Thus, Somerset needs to more focus on improving quality and reducing time and then we can define Somerset’s business strategy is providing exceptional higher quality, faster delivery. †¢ The detailed tactics to meet the goals or solve problems Operation managers are discovering that global supply chains have additional complexities that were either negligible or nonexistent in domestic operations. These complexities include language and cultural differences, declare customs, currency fluctuations, armed conflicts availability of trucking, increased transportation costs, and crucial lead times, and the increased need for trust and cooperation among supply chain partners. Furthermore, managers must be able to identify and analyze factors that differ from country to country that can impact the success of the supply chain, including local capabilities: financial, transportation, and communication infrastructures: governmental, environmental, and regulatory issues: and political issues. Somerset has to develop not only technology information system, sourcing supplies, materials but also relationship with suppliers such as Chinese workers, Chinese managers, truckin g availability and customs inspection etc. There are several considerations to improve Somerset’s inefficiency in aspects of quality controls and time reduction, flexibility and cost. †¢Show MoreRelatedOperations Management : Operation Management1355 Words   |  6 PagesOperations Management Introduction Operations management is the activity of managing the resources that create and deliver services and products. The operations function is the part of the organization that is responsible for this activity. Every organization has an operations function because every organization creates some type of services and/or products. However, not all types of organization will necessarily call the operations function by this name. Operations managers are the people who haveRead MoreOperation Management - Cadburyworld2493 Words   |  10 Pagestechnology to streamline the operation process) and facility costs (old and outdated facilities) at lowest possible. In return, they have to compromise low costs with their other objectives. The unskilled staffs and outdated facilities are compromised with the quality in the core process. For example, the brief video (facility) in the packaging plant is outdated and requires commentary notes from some guides. However, the unskilled guides are not familiar with the operations so they need to read fromRead MoreOperation Management And Operations Management2148 Words   |  9 PagesOperation management Introduction Being an operations manager is not an easy task, it involves good control and responsibilities for the major activities within the organisations in order to achieve goals that might be in form of services or in form of goods. The operation management roles may be different from business to business depending on the size and resources available, each organisation has its own operations functions, and in order to produces goods or services they have to convert theRead MoreImportance Of Production And Operations Management2317 Words   |  10 Pagesthe production and operation of enterprises. In order to remain competitive, companies in different countries have different factors of competitive advantage. A clear competitive advantage is the key to gain success in production and operation management. An effective operations management is the foundation of enterprise competitive advantage and the fundamental guarantee to realize corporate strategy. This essay deals with the importance of production and operations management in the enterprise,Read MoreOperations Management : Operation Management Essay2171 Words   |  9 PagesOperation Management Operations administration concentrates on precisely dealing with the procedures to create and circulate items and administrations. Operations administration is the procedure, which joins and changes different assets utilized as a part of the creation/operations subsystem of the association into quality included item/benefits in a controlled way according to the arrangements of the association. In this way, it is that part of an association, which is worried with the changeRead MoreOperation Management2751 Words   |  12 PagesTABLE OF CONTENTS 1. OPERATION MANAGEMENT 3 1.1. DEFINITION OF OPERATION MANAGEMENT 3 1.2. THE ROLE OF OPERATION MANAGER 3 1.3. RELATIONSHIP OF OPERATION MANAGEMENT WITH OTHER CORE FUNCTIONS 3 2. CASE STUDIES 3 2.1. HEATHROW INTERNATIONAL AIRPORT 3 2.2. NESTLÉ UK CHOCOLATE FACTORY 3 3. MAJOR UNDERSTANDINGS OF THE STUDY 3 4. CONCLUSIONS 3 REFERENCES 3 1. Operation Management For the success of an organization, the management crew plays a major role. An organizational structure is based on differentRead MoreOperations Management986 Words   |  4 PagesOPERATIONS MANAGEMENT Select two organisations that you are familiar with – one with a service output and one with a product output, and compare and contrast these organisations with respect to the following aspects: 1.1 The process of transformation of inputs to outputs 1.2 Process and Capacity design 1.3 Supply Chain management 1.4 Scheduling Operations Management refers to the management of the production system that transforms inputs into finished goods and services, (http://csuponomaRead MoreOperation Management2436 Words   |  10 PagesOPERATION MANAGEMENT IS IMPORTANT TO ALL BUSINESS To be able produce specialized managers capable of fulfilling strategic tasks within business and government enterprises the need for the practice of operations management cannot be forgone. Operations management is very significant in business operations since it forms the heart of the organisation by controlling the system of operation. Operations management deals with the design, operation, and enhancement of the systems that generate and deliverRead MoreOperations Management Chapter 18 Manual1950 Words   |  8 PagesChApter 18 Management of Waiting Lines Teaching Notes Some of the math and calculations can be left out in order to focus more clearly on the concepts of waiting lines. For example, all infinite source problems, including single channel (except constant service time) can be handled using the infinite source queuing table. In the past, queuing presented students with a good bit of computational requirements, and because of that, students frequently lost sight of the underlying concepts. WithRead MoreOperations Management1791 Words   |  8 PagesQUESTION 1 Operations management must be managed properly in order to improve an organization’s productivity and profitability. In the Cadbury World case, several micro and macro processes are involved and those processes bring some impacts to Cadbury World. Thus, Cadbury World must possess a sustainable micro and macro processes to achieve the best outcome and performance. Micro processes that involved are easily to manage compared to macro processes because macro processes are hard to manage

Tuesday, May 5, 2020

Intelligent Spy Robo free essay sample

INTELLIGENT SPY ROBO-VER-02 INTRODUCTION This is one of the version of spy robot which we designed in this academic period. Intelligent spy robot project has been designed for the spying purpose . it is radio controlled and can be operated at a radial distance of 50 yards. Many time our army jawan need to venture into the enemy area just to track their activities. Which is often a very risky job, it may cost precious life. Such dangerous job could be done using small spy robot all the developed and advance nations are in the process of making combat robot design, a robot who can fight against enemy. Our robot us just a step towards similar activity. This robot is radio operated , self powered , and has all the controls like a normal car. A laser gun has been installed on it so that it can fire on enemy remotely when required, this is not possible until a wireless camera is installed. Wireless camera will send real time video and audio signals which could be seen on a remote monitor and action can be taken accordingly. Being in size small will not be tracked by enemy on his radar. It can silently enter into enemy canopy or tent and send us all the information through its’ tiny camera eyes. It can also be used for suicide attack, if required. DESCRIPTON OF COMPONENT USING THIS PROJECT Transmitter circuit explanation: six keys are connected in four by two matrix to the microcontroller ic1 at2051. Key data is transmitted through the 433mhztransmitter module through its pin no 3 of the microcontroller which is tx pin of the inbuilt UART of the microcontroller and works on 1200bits/sec. X1 gives the required clock input to the microcontroller c1 and r1 forms the reset circuitory connected to pin no 1 of the microcontroller. Key pressed value is transmitted through antenna Construction: Solder all the parts provided in the kit properly. First connect the jumper wires(links) before you solder the IC sockets. Donot solder integrated circuits directly on the circuit board, it may damage the ic since you may not be experianced soldering person. So solder the ic sockets first on the circuit board. Solder smaller components first like resistance and disk capacitors, assemble the complete kit one by one. Please make sure that there are no short circuits left on to the circuit board. Check the power supply at all the sockets mounted on circuit board it should be 5 to 5. v dc. FLOW CHART OF TRANSMITTER BLOCK DIAGRAM OF RECEVIER FLOW CHART OF RECEIVER AT89C2051 8-bit Microcontroller with 2K Bytes Flash Features †¢ Compatible with MCS-51â„ ¢ Products †¢ 2K Bytes of Reprogrammable Flash Memory – Endurance: 1,000 Write/Erase Cycles †¢ 2. 7V to 6V Operating Range †¢ Fully Static Operation: 0 Hz to 24 MHz †¢ Two-level Program Memory Lock †¢ 128 x 8-bit Internal RAM †¢ 15 Programmable I/O Lines †¢ Two 16-bit Timer/Counters †¢ Six Interrupt Sources †¢ Programmable Serial UART Channel †¢ Direct LED Drive Outputs †¢ On-chip Analog Comparator Low-power Idle and Power-down Modes Description The AT89C2051 is a low-voltage, high-performance CMOS 8-bit microcomputer with 2K bytes of Flash programmable and erasable read only memory (PEROM). The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry-standard MCS-51 instruction set. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C2051 is a powerful microcomputer which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89C2051 provides the following standard features: 2K bytes of Flash,128 bytes of RAM,15 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, a precision analog comparator, on-chip oscillator and clock circuitry. In addition, the AT89C2051 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters,serial port and interrupt system to continue functioning. The power-down mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. Pin Configuration BLOCK DIAGRAM Pin Description VCC: Supply voltage. GND: Ground. Port 1 Port 1 is an 8-bit bi-Directional I/O port. Port pins P1. 2 to P1. 7 provide internal pullups. P1. 0 and P1. 1 require external pullups. P1. 0 and P1. 1 also serve as the positive input (AIN0) and the negative input (AIN1), respectively, of the on-chip precision analog comparator. The Port 1 output buffers can sink 20 mA and can drive LED displays directly. When 1s are written to Port 1 pins, they can be used as inputs. When pins P1. 2 to P1. 7 are used as inputs and are externally pulled low, they will source current (IIL) because of the internal pull-ups. Port 1 also receives code data during Flash programming and verification. Port 3 Port 3 pins P3. 0 to P3. 5, P3. 7 are seven bi-irectional I/O pins with internal pullups. P3. 6 is hard-wired as an input to the output of the on-chip comparator and is not accessible as a general purpose I/O pin. The Port 3 output buffers can sink 20 mA. When 1s are written to Port 3 pins they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pullups. Port 3 also serves the functions of various special features of the AT89C2051 as listed below: Port 3 also receives some control signals for Flash programming and verification. Reset input. All I/O pins are reset to 1s as soon as RST goes high. Holding the RST pin high for two machine cycles while the oscillator is running resets the device Each machine cycle takes 12 oscillator or clock cycles. XTAL1 Input to the inverting oscillator amplifier and input to the internal clock operating circuit. XTAL2 Output from the inverting oscillator amplifier. Figure 1. Oscillator Connections Important: C1, C2 = 30 pF  ± 10 pF for Crystals = 40 pF  ± 10 pF for Ceramic Resonators Figure 2. External Clock Drive Configuration Oscillator Characteristics XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed. Special Function Registers A map of the on-chip memory area called the Special Function Register (SFR) space is shown in the table below. Note that not all of the addresses are occupied, and unoccupied addresses may not be implemented on the chip. Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect. User software should not write 1s to these unlisted locations, since they may be used in future products to invoke new features. In that case, the reset or inactive values of the new bits will always be 0. Restrictions on Certain Instructions The AT89C2051 and is an economical and cost-effective member of Atmel’s growing family of microcontrollers. It contains 2K bytes of flash program memory. It is fully compatible with the MCS-51 architecture, and can be programmed using the MCS-51 instruction set. However,there are a few considerations one must keep in mind when utilizing certain instructions to program this device. All the instructions related to jumping or branching should be restricted such that the destination address falls within the physical program memory space of the device, which is 2K for the AT89C2051. This should be the responsibility of the software programmer. For example, LJMP 7E0H would be a valid instruction for the AT89C2051 (with 2K of memory), whereas LJMP 900H would not. 1. Branching instructions: LCALL, LJMP, ACALL, AJMP, SJMP, JMP:These unconditional branching instructions will execute correctly as long as the programmer keeps in mind that the destination branching address must fall within the physical boundaries of the program memory size (locations 00H to 7FFH for the 89C2051). Violating the physical space limits may cause unknown program behavior. CJNE [ ], DJNZ [ , JB, JNB, JC, JNC, JBC, JZ, JNZ With these conditional branching instructions the same rule above applies. Again, violating the memory boundaries may cause erratic execution. For applications involving interrupts the normal interrupt service routine address locations of the 80C51 family architecture have been preserved. 2. MOVX-related instructions, Data Memory: The AT89C2051 contains 128 bytes of internal data memory. Thus, in the AT89C2051 the stack depth is limite d to 128 bytes, the amount of available RAM. External DATA memory access is not supported in this device, nor is external PROGRAM memory execution. Therefore, no MOVX [ ] instructions should be included in the program. A typical 80C51 assembler will still assemble instructions,even if they are written in violation of the restrictions mentioned above. It is the responsibility of the controller user to know the physical features and limitations of the device being used and adjust the ins t ructions used correspondingly. Program Memory Lock Bits On the chip are two lock bits which can be left unprogrammed (U) or can be programmed (P) to obtain the additional features listed in the table below: Table 1. AT89C2051 SFR Map and Reset Values Lock Bit Protection Modes Note: 1. The Lock Bits can only be erased with the Chip Erase operation. Idle Mode In idle mode, the CPU puts itself to sleep while all the onchip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset. P1. 0 and P1. 1 should be set to â€Å"0† if no external pullups are used, or set to â€Å"1† if external pullups are used. It should be noted that when idle is terminated by a hardware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory. Power-down Mode In the power down mode the oscillator is stopped, and the instruction that invokes power down is the last instruction executed. The on-chip RAM and Special Function Registers retain their values until the power down mode is terminated. The only exit From power down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize. P1. 0 and P1. 1 should be set to â€Å"0† if no external pullups are used, or set to â€Å"1† if external pullups are used. Programming The Flash The AT89C2051 is shipped with the 2K bytes of on-chip PEROM code memory array in the erased state (i. e. , contents = FFH) and ready to be programmed. The code memory array is programmed one byte at a time. Once the array is programmed, to re-program any non-blank byte,the entire memory array needs to be erased electrically. Internal Address Counter: The AT89C2051 contains an internal PEROM address counter which is always reset to 000H on the rising edge of RST and is advanced by applying a positive going pulse to pin XTAL1. Programming Algorithm: To program the AT89C2051,the following sequence is recommended. 1. Power-up sequence: Apply power between VCC and GND pins Set RST and XTAL1 To GND 2. Set pin RST to â€Å"H† Set pin P3. 2 to â€Å"H† 3. Apply the appropriate combination of â€Å"H† or â€Å"L† logic levels to pins P3. 3, P3. 4, P3. 5, P3. 7 to select one of the programming operations shown in the PEROM Programming Modes table. To Program and Verify the Array: 4. Apply data for Code byte at location 000H to P1. 0 to P1. 7. 5. Raise RST to 12V to enable programming. 6. Pulse P3. 2 once to program a byte in the PEROM array or the lock bits. The byte-write cycle is self-timed and typically takes 1. 2 ms. 7. To verify the programmed data, lower RST from 12V to logic â€Å"H† level and set pins P3. 3 to P3. 7 to the appropriate levels. Output data can be read at the port P1 pins. 8. To program a byte at the next address location, pulse XTAL1 pin once to advance the internal address counter. Apply new data to the port P1 pins. 9. Repeat steps 5 through 8, changing data and advancing the address counter for the entire 2K bytes array or until the end of the object file is reached. 10. Power-off sequence:set XTAL1 to â€Å"L† set RST to â€Å"L† Turn VCC power off Data Polling: The AT89C2051 features Data Polling to indicate the end of a write cycle. During a write cycle, an attempted read of the last byte written will result in the complement of the written data on P1. 7. Once the write cycle has been completed, true data is valid on all outputs, and the next cycle may begin. Data Polling may begin any time after a write cycle has been initiated. Ready/Busy: The Progress of byte programming can also be monitored by the RDY/BSY output signal. Pin P3. 1 is pulled low after P3. 2 goes High during programming to indicate BUSY. P3. is pulled High again when programming is done to indicate READY. Program Verify: If lock bits LB1 and LB2 have not been programmed code data can be read back via the data lines for verification: 1. Reset the internal address counter to 000H by bringing RST from â€Å"L† to â€Å"H†. 2. Apply the appropriate control signals for Read Code data and read the output data at the port P1 pins. 3. Pulse pin XTAL1 once to advance the internal address counter. 4. Read the next code data byte at the port P1 pins. 5. Repeat steps 3 and 4 until the entire array is read. The lock bits cannot be verified directly. Verification of the lock bits is achieved by observing that their features are enabled. Chip Erase: The entire PEROM array (2K bytes) and the two Lock Bits are erased electrically by using the proper combination of control signals and by holding P3. 2 low for 10 ms. The code array is written with all â€Å"1†s in the Chip Erase operation and must be executed before any nonblank memory byte can be re-programmed. Reading the Signature Bytes: The signature bytes are read by the same procedure as a normal verification of locations 000H, 001H, and 002H, except that P3. 5 and P3. 7 must be pulled to a logic low. The values returned are as follows. (000H) = 1EH indicates manufactured by Atmel (001H) = 21H indicates 89C2051 Programming Interface Every code byte in the Flash array can be written and the entire array can be erased by using the appropriate combination of control signals. The write operation cycle is selftimed and once initiated, will automatically time itself to completion. All major programming vendors offer worldwide support for the Atmel microcontroller series. Please contact your local programming vendor for the appropriate software revision. Flash Programming Modes Importance: 1. The internal PEROM address counter is reset to 000H on the rising edge of RST and is advanced by a positive pulse at XTAL 1 pin. 2. Chip Erase requires a 10 ms PROG pulse. 3. P3. 1 is pulled Low during programming to indicate RDY/BSY. Figure 3. Programming the Flash Memory Figure 4. Verifying the Flash Memory Flash Programming and Verification Characteristics TA = 0 °C to 70 °C, VCC = 5. 0  ± 10% Important: 1. Only used in 12-volt programming mode. Flash Programming and Verification Waveforms Absolute Maximum Ratings IMPORTANT: Stresses beyond those listed under â€Å"Absolute Maximum Ratings† may cause permanent damage to the device. This is a stress rating only and functional operation of the device at these or any other conditions beyond those indicated in the operational sections of this specification is not implied. Exposure to absolute maximum rating conditions for extended periods may affect device reliability. DC Characteristics TA = -40 °C to 85 °C, VCC = 2. 0V to 6. 0V (unless otherwise noted) IMPORTANCE: 1. Under steady state (non-transient) conditions, IOL must be externallylimited as follows: Maximum IOL per port pin: 20 mA Maximum total IOL for all output pins: 80 mA If IOL exceeds the test condition, VOL may exceed the related specification. Pins are not guaranteed to sink current greater than the listed test conditions. 2. Minimum VCC for Power-down is 2V. External Clock Drive Waveforms External Clock Drive Serial Port Timing: Shift Register Mode Test Conditions VCC = 5. 0V  ± 20%; Load Capacitance = 80 Pf Shift Register Mode Timing Waveforms ? AC Testing Input/Output Waveforms IMPORTANCE: 1. AC Inputs during testing are driven at VCC 0. 5V for a logic 1 and 0. 45V for a logic 0. Timing measurements are made at VIH min. for a logic 1 and VIL max. for a logic 0. Float Waveforms IMPORTANCE: 1. For timing purposes, a port pin is no longer floating when a 100 mV change from load voltage occurs. A port pin begins to float when 100 mV change frothe loaded VOH/VOL level occurs. AT89C2051 TYPICAL ICC ACTIVE (85 °C) FREQUENCY(MHz) AT89C2051 TYPICAL ICC IDLE (85 °C) FREQUENCY (MHz) AT89C2051 TYPICAL ICC vs. VOLTAGE- POWER DOWN (85 °C) Vcc voltage Notes: 1. XTAL1 tied to GND for ICC (power-down) 2. P. 1. 0 and P1. 1 = VCC or GND 3. Lock bits programmed Ordering Information Packaging Information 20P3, 20-lead, 0. 300 Wide, Plastic Dual Inline Package (PDIP) Dimensions in Inches and (Millimeters) 0S, 20-lead, 0. 300 Wide, Plastic Gull WIng Small Outline (SOIC) Dimensions in Inches and (Millimeters) WAVE CAMERA This is definitely the smallest wireless color video camera and transmitter of its kind! This is the very latest technology Transmitter Specifications: Battery operated: 9 Volt only Current consumption 30 mA (65 mA for 80 mW unit) Smallest size 0. 6 x 0. 6 x 0. 7 Range 1000 line-of-sight (3000 for 80 mW unit) Range can be increased with high-gain receiver antennas Built-in antenna Broadcast quality B/W or color picture NTSC, PAL or SECAM systems Frequency modulation TECHNICAL CHARACTERISTICS OF RECEIVER CKT: Vcc = 9~12V Frequency of reception: 88~108MHz Consumption: 100mA Materially: The resistances are 1/4W. R1-47K R2-22K R3-100K R4-39K R5-100k R6-r12 7,5K Optionally R13-r21 15K Optionally P1-10K-Logarithmic potentiometer P2-100K-Linear potentiometer C1-39pF-Ceramic C2-47pF-Ceramic C3-2,2nF Polyester C4- c14 220nF Polyester C5-22nF Polyester C6-10nF Polyester C7- c18 180pF Ceramic C8-150pF Ceramic C9-100nF Polyester C10- c13 330pF Ceramic C11-220pF Ceramic C12- c16 3300pF Ceramic C15- c17 1800pF Ceramic C19- c21, c22 10mF/16V electrolytic C20-10nF Polyester C21 -47nF Polyester C22, c25 470mF/16V electrolytic L1,-l2 5 Coils linked with internal diameter 4mm from cupreous isolated wire 0,6mm. IC1-TDA7000 with base DIL18 IC2-LM7805 IC3-LM386 with base DIL 8 D1 BB329 or BB105 or other than old tuner televisions. SPEAKER Loudspeaker 8W/1W. S1 Switch of catering. AERIAL 50cm isolated wire CONNECTOR DB25 Fastener of 25 pin parallel door PC (LPT) -Optional REGULATIONS: A) With the P1 we regulate the intensity of sound. B) With the P2 we regulate the frequency of reception. C) Optionally: If you want to check the frequency with your PC it will be supposed you make the following energies: You assemble and the circuit that is in the blue frame. You cut the driver djpla in point A, as it appears in the circuit and you connect points A,V . If you know some language of programming as C ++, PASCAL, VISUAL BASIC, DELPHI etc you can write a program which will send in the parallel door (378 I) of PC a number from 0 until 255 checking thus the tendency of expense of simple D/A of converter (that it is in blue frame) and consequently and frequency of radio via passage VARICAP. Receiver A radio receiver is an electronic circuit that receives its input from an antenna, uses electronic filters to separate a wanted radio signal from all other signals picked up by this antenna, amplifies it to a level suitable for further processing, and finally converts through demodulation and decoding the signal into a form usable for the consumer, such as sound, pictures, digital data, measurement values, navigational positions, Today AV receivers are a common component in a high-fidelity or home-theatre system. The receiver is generally the nerve centre of a sophisticated home-theatre system providing selectable inputs for a number of different audio components like turntables, compact-disc players and recorders, and tape decks ( like video-cassette recorders) and video components (DVD players and recorders, video-game systems, and televisions). With the decline of vinyl discs, modern receivers tend to omit inputs for turntables, which have separate requirements of their own. All other common audio/visual components can use any of the identical line-level inputs on the receiver for playback, regardless of how they are marked (the name on each input is mostly for the convenience of the user. ) For instance, a second CD player can be plugged into an Aux input, and will work the same as it will in the CD input jacks. Some receivers can also provide signal processors to give a more realistic illusion of listening in a concert hall. Digital audio S/PDIF and USB connections are also common today. The home theater receiver, in the vocabulary of consumer electronics, comprises both the radio receiver and other functions, such as control, sound processing, and power amplification. The standalone radio receiver is usually known in consumer electronics as a tuner. Some modern integrated receivers can send audio out to seven loudspeakers and an additional channel for a subwoofer and often include connections for headphones. Receivers vary greatly in price, and support stereophonic or surround sound. A high-quality receiver for dedicated audio-only listening (two channel stereo) can be relatively inexpensive; excellent ones can be purchased for $300 US or less. Because modern receivers are purely electronic devices with no moving parts unlike electromechanical devices like turntables and cassette decks, they tend to offer many years of trouble-free service. In recent years, the home theater in a box has become common, which often integrates a surround-capable receiver with a DVD player. The user simply connects it to a television, perhaps other components, and a set of loudspeakers. SN54/74LS245 OCTAL BUS TRANSCEIVER OCTAL BUS TRANSCEIVER The SN54/74LS245 is an Octal Bus Transmitter/Receiver designed for 8-line asynchronous 2-way data communication between data buses. Direction Input (DR) controls transmission of Data from bus A to bus B or bus B to bus A depending upon its logic level. The Enable input (E) can be used to isolate the buses. †¢ Hysteresis Inputs to Improve Noise Immunity †¢ 2-Way Asynchronous Data Bus Communication †¢ Input Diodes Limit High-Speed Termination Effects †¢ ESD 3500 Volts LOGIC AND CONNECTION DIAGRAMS DIP (TOP VIEW) FAST AND LAST TTL DATA SN54/74LS245 DC CHARACTERISTICS OVER OPERATING TEMPERATURE RANGE Note 1: Not more than one output should be shorted at a time, nor for more than 1 second. AC CHARACTERISTICS (TA = 25 °C, VCC = 5. 0 V, TRISE/TFALL 3 6. 0 ns) FAST AND LAST TTL DATA L293D QUADRUPLE HALF-H DRIVER FEATURE †¢ 600-mA Output Current Capability Per Driver †¢ Pulsed Current 1. 2-A Per Driver †¢ Output Clamp Diodes for Inductive Transient Suppression †¢ Wide Supply Voltage Range 4. 5 V to 36 V †¢ Separate Input-Logic Supply †¢ Thermal Shutdown †¢ Internal ESD Protection †¢ High-Noise-Immunity Inputs †¢ Functional Replacement for SGS L293D logic symbol This symbol is in accordance with ANSI/IEEE Std 91-1984 and IEC Publication 617-12. Logic diagram FUNCTION TABLE (each driver) H = high-level, L = low level, X = irrelevant, Z = high-impedance (off) †¡ In the thermal shutdown mode, the output is in the high-impedance state regardless of the input levels. DESCRIPTION The L293 D is a quadruple high-current half-H driver designed to provide bidirectional drive currents of up to 600-mA at voltages from 4. 5 V to 36 V. It is designed to drive inductive loads such as relays, solenoids, dc and bipolar stepping motors,as well as other high-current/high-voltage loads in positive-supply applications. All inputs are TTL-compatible. Each output is a complete totem-pole drive circuit with a Darlington transistor sink and a pseudo-Darlington source. Drivers are enabled in pairs with drivers 1 and 2 enabled by 1,2EN and drivers 3 and 4 enabled by 3,4EN. When an enable input is high, the associated drivers are enabled, and their outputs are active and in phase with their inputs. Externalhigh-speed output clamp diodes should be usedfor inductive transient suppression. When the enable input is low, those drivers are disabled, and their outputs are off and in a high-impedance state. With the proper data inputs, each pair of drivers form a full-H (or bridge) reversible drive suitable for solenoid or motor applications. A VCC1 terminal, separate from VCC2, is provided for the logic inputs to minimize device power dissipation. The L293D is designed for operation from 0 °C to 70 °C. L293D QUADRUPLE HALF-H DRIVER schematics of inputs and outputs: EQUIVALENT OF EACH INPUT TYPICAL OF ALL OUTPUTS absolute maximum ratings over operating free-air temperature range (unless otherwise noted) Logic supply voltage range, VCC1 (see Note 1) . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 V Output supply voltage range, VCC2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 V Input voltage range, VI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 V Output voltage range, VO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . –3 V to VCC2 + 3 V Peak output current (nonrepe titive, t 3 100 ms) . . . . . . . . . . . . . . . . . . . . . . . . . .  ±1. 2 A Continuous output current, IO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600 mA Continuous total dissipation at (or below) 25 °C free-air temperature (see Notes 2 and 3) . . . . . . . 2075 mW Continuous total dissipation at 80 °C case temperature (see Note 3) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5000 mW Operating case or virtual junction temperature range, TJ . . . . . . . . . . . . –40 °C to 150 °C Storage temperature range, Tstg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . –65 °C to 150 °C Lead temperature 1,6 mm (1/16 inch) from case for 10 seconds . . . . . . . . . . . . . . 260 °C IMPORTANT: 1. All voltage values are with respect to the network ground terminal. . For operation above 25 °C free-air temperature, derate linearly at the rate of 16. 6 mW/ °C. 3. For operation above 25 °C case temperature, derate linearly at the rate of 71 . 4 mW/ °C. Due to variations in individual device electrical characteristics and thermal resistance, the built-in thermal overload protection may be activated at power levels slightly above or below the rated dissipation. Recommended operating conditions †  The algebraic convention, in which the least positive (most negative) value is designated minimum, is used in this data sheet for logic voltage levels. lectrical characteristics, VCC1 = 5 V, VCC2 = 24 V, TA = 25 °C switching characteristics, VCC1 = 5 V, VCC2 = 24 V, TA = 25 °C Figure 1. Test Circuit and Voltage Waveforms PARAMETER MEASUREMENT INFORMATION TEST CIRCUIT VOLTAGE WAVEFORM IMPORTANT: A. The pulse generator has the following characteristics: tr 3 10 ns, tf 3 10 ns, tw = 10 ms, PRR = 5 kHz, ZO = 50 W. B. CL includes probe and jig capacitance. RX-1 RECEIVER MODULE MANUAL 1. Introduction: This is the radio frequency receiver module, which can facilitate the OEM designers to design their remote control a pplications in remote control in the quickest way. The circuit is designed with SMD components and the module size is small enough to be able to be fitted in almost any application. Super-regenerative Version W/O Decoder (AM): RX-3304 44mm 2. PIN DEFINITION: PIN 1: GND PIN 2: Digital Output PIN 3: Linear Output (For Testing) PIN 4: VCC (5V DC) PIN 5: VCC (5V DC) PIN 6: GND PIN 7: GND PIN 8: ANT Dimension of RX-3304: 44 mm X 11 mm: Specification Table: IMPORTANT: SR: Super-Regenerative; AM: Amplitude Modulation expensive, you can get the rolling code algorithm programmed in other low cost microcontrollers. In this approach, an EEPROM is strongly recommended so that the system’s important parameters can be stored even after power off. On the PCB layout of your control board, be very careful in the following point so that no data loss can happen: During PCB layout stage, be sure that the ground of the CPU and the external reset IC and the nonvolatile EEPROM should go to one common point first and then go to the power ground. Keep the ground line as short as possible. It is important to test if data loss happens using power noise simulator before starting the mass production. Note that transmitter codes are normally stored in the non-volatile EEPROM memory. If powerloss happens, then this means that the transmitter codes are lost from the memory and the user has to relearn the transmitter again. This is the key checkpoint before approving a design. Check with our Sales People for your requirements of Fixed Code Encoder /Decoders or Rolling Code Encoder/Decoders or Software Decoders and Low Cost Wireless Development kits and Antenna. We can use it remort. Two-Phase Motor Driver APPLICATION INFORMATION Two-phase electrical power was an early 20th century polyphase alternating current electric power distribution system. Two circuits were used, with voltage phases differing by 90 degrees. Usually circuits used four wires, two for each phase. Less frequently, three wires were used, with a common wire with a larger-diameter conductor. Some early two-phase generators had two complete rotor and field assemblies, with windings physically offset by 90 electrical degrees to provide two-phase power. The generators at Niagara Falls installed in 1895 were the largest generators in the world at the time and were two-phase machines. The advantage of two-phase electrical power was that it allowed for simple, self-starting electric motors. In the early days of electrical engineering, it was easier to analyze and design two-phase systems where the phases were completely separated. It was not until the invention of the method of symmetrical components in 1918 that polyphase power systems had a convenient mathematical tool for describing unbalanced load cases. The revolving magnetic field produced with a two-phase system allowed electric motors to provide torque from zero motor speed, which was not possible with a single-phase induction motor (without extra starting means). Induction motors designed for two-phase operation use the same winding configuration as capacitor start single-phase motors. Two-phase circuits typically use two separate pairs of current-carrying conductors. Alternatively, three wires may be used, but the common conductor carries the vector sum of the phase currents, which requires a larger conductor. Three phase can share conductors so that the three phases can be carried on three conductors of the same size. In electrical power distribution, a requirement of only three conductors rather than four represented a considerable istribution-wire cost savings due to the expense of conductors and installation. Two-phase power can be derived from a three-phase source using two transformers in a Scott connection. One transformer primary is connected across two phases of the supply. The second transformer is connected to a center-tap of the first transformer, and is wound for 86. 6% of the phase-to-phase voltage on the 3-phase system. The se condaries of the transformers will have two phases 90 degrees apart in time, and a balanced two-phase load will be evenly balanced over the three supply phases. Three-wire, 120/240 volt single phase power used in the USA and Canada is sometimes incorrectly called two-phase. The proper term is split phase or 3-wire single-phase. BLOCK DIAGRAM Figure 2. Two-Phase Motor Driver CIRCUIT DIAGRAM Heart of our robo is intel’most power family of microcontroller 8051,we are using At89c2051 Two microcontrollers ic2 is first microcontroller which acts as master controller ,decodes all the commands received from the transmitter and give commands to slave microcontroller ic3. Slave microcontroller is responsible for executing all the commands received from the master and also generating PWM pulses for the speed control . Ic4 is ld293 motor driver ic which drives two nos motors m1 and m2. Two no bumper switch are added bmp 1 and bmp2 so that in case of accident our battery dose not drains out. both the motors will stop instantly and after few second robot will move in opposite direction take turn to left or right direction and stops and stop . Circuit operation: RF433-RX is 433mhz radio receiver which receives the transmitted coded from the remote place these codes are converted to digital format and out put is available to the pin no 2 of the ic2 master microcontroller, this is the rx pin of inbuilt UART of the microcontroller. We are using UART to receive our codes at 1200 boud rate.. Based on the input codes master will give command to slave microcontroll and robo will behave as follows. a. moves in forward direction b. moves in reverse direction, c. speed controls in both the direction d. it can even turn left or right while moving forward or in reverse direction. e. Instent reverse or forward running without stopping f. In case of bump,moves reverse turn left or right and wail for the next instruction . g. On the spot left or right turn to pass through the nerrow space h. We have also added head light, back light and turing lights to left a right . These lights automatically comes on while robot is in movement. Laser gun can be fired at any time irrespective of robot stopped or moving. Bmp1 and bmp2 (forward and fterward)bumpers are connected to pin no 6 of the ic2 when ever this pin becomes low robot will stop instantly and will move few steps in reverse direction turn left or right and stops. Pin no 11,12,13,15. 16 and 17 of the master microcontroller are connected to the slave microcontroller ic3 to give the following pulses to the slave microcontroller 1. Start /stop 2. Increase speed 3. Increase speed 4. Direction change 5. Turn left 6. Turn right Slave microcontroller ic3 pins 15,16,17,18,19 are connected to ic4 motor driver ic, pin17 of the slave gives the pulse width modulation pulse which is connected to pin 1 and 9 of ic4 this is en pin of ic 4 Pin 18 and 19 controlls one motor m1 and pin 15 and 16 of the slave controller controls the m2 moto When one of the pin becomes high and other pin becomes low motor will turn in one direction reversing the polarity of pin motor will turn other direction. When forward command is received ,both the motors will run in forward direction. When reverse command is received both the motors will run in reverse direction. while moving in forward or reverse direction if left or right command is received one of the motor stops and other keeps moving this action gives left or right turn. For example if left motor is stopped , robot will turn in right direction, and when right motor is stopped robot will torn in left direction. hen fire command is received, pin no 14 of ic2 will go high and transistor Q1 will become ON and laser diode d9 will get forward biasing through d7,d8 and it will glow. R2 r3, r15 and r16 are pull up resistor connected to pin no 12 and 13 of ic2 and ic3 Crystal X1,X2 and apair of 33pf capacitor gives the required clock pulse to both the microcontroller. Capacitor r1 and c 1 and c8,r14 gives the required reset pulse to microcontroller pin no 1 datasheets. these can be downloaded free from the manufacturers site . robo is powered by five non rechargable 7. 2v 1200ma battery pack which gives 7. v dc out put. IC1 7805 is a regulator ic gives 5v regulated supply. Unregulated 7. 2 is used to drive the motor circuit and 5v regulated power is for the rest of the circuit. Capacitor c11 and c12 are for spark quench. C4, C5 c9,c10 are filter capacitors. Capacitor c5 and c10 are to noise supperession. resistance r12 is for pullup. R5,r13,r6,r7,r8,r9,r10. r11,r13 r17,r18,r19 ,r20 and r21 are for current limiting purpose. COMPLETE PHOTOGRAPH OF THE ASSEMBLED ROBT closup look of new improved connection diagram of battery and other connection of 7805 regulator( red wire +line black wire- line. CLOSE LOOK OUT AFTER CONNECTION OF BUMPER ASSEMBLY COMPLETE BUMPER ASSEMBLY DIAGRAM OF ROBOTIC CAR DIAGRAM OF ROBOT CONTROL REMOTE ? PCB BOARD OF DIFFERENT COMPONENT PCB BOAR D OF ROBOTIC CAR WITOUT LABELAING PCB BOARD OF ROBOTIC CAR AFTER LABELAING ? COMPLETE OVERVIEW OF PCB OF ROBOTIC CAR WITH TRANSMITTER RECEIVER ? COMPLETE PCB AND OVERVIEW OF REMOTE ALSO CIRCUIT DIAGRAM RESPECTIVELY Fig: (a) (b) Fig:(c) 3. Noise Immunization This RF receiver is sensitive to RF noise in the pass band because the desired transmitter signals are at very low power levels. Some common noise sources are microprocessors, brush-type motors and high-speed logic circuits. If the rise time and fall time of the clock in a microprocessor are fast enough to produce harmonics in the frequency range of the receiver input and the harmonics fall within the pass band of the receiver, then special care must be taken to reduce the level of the harmonic at the antenna port of the receiver. Based on above analysis, the following actions have to be taken: A. Microprocessor choice: Choose those microprocessors which has lowest rise time and lowest fall time,if available. B. Brush-type motor choice: Choose those brush-type motors, which has spark suppression built in or better not to use such type of motors. C. Logic circuits choice: High-speed logic circuits generate noise similar to microprocessors. Thus better to choose those circuits with the lowest rise time and the lowest fall time, if available. D. Place the receiver and its antenna as far from the noise source as possible. E. During PCB layout, keep line lengths at a minimum that carry high-speed logic signals or supply brush type motors. Such lines work like antennas that radiate the unwanted noise. F. If possible, enclose the noise source in a grounded metal box and use RF-decoupling on the input/output lines. G. It is advisable to use separate voltage regulator for the RF receiver. If the same voltage regulator has to be used for cost purpose, then a decoupler circuit is recommended so that high frequency noise can be screened. H. The ground path from the receiver module should go directly to the power ground, in between, no other ground paths can join in, otherwise, noise will be introduced in and receiver function will be greatly influenced. ? 4. Recommended Antenna Suitable antennas are required to the success of low-power wireless application. There are some key points on applying the antennas: A. Antenna should be placed on the outside of the product. And try to place the antenna on the top of the product. B. Antena cannot be placed inside a metal case because of its shielding effect. C. Antenna design involves expensive test equipments such as vector network analyzer and calibrated test antenna. Unless you have access to these equipments, the use to an antenna consultant is recommended. D. In most indoor locations, dead spots can be found where reception is difficult. These dead spots are due to multiple transmission paths existing between two points because of reflections off metal objects such as steel beams or metal doors. They happen when the path lengths effectively differs by an odd half-wavelength. This explains the phenomenon when you find that at some locations the reception effect is very poor, but beyond that the reception becomes normal. E. 50-Ohm antenna is recommended for the best matching. F. For 433. 92MHz application, antenna length = 17 cm. ? WIRELESS TRANSMITTER MODULE TX1-433. 92MHZ-S SPECIFICATION ROBOTX. HEX 1000000001430000000000000000000000000000AC :100010000000000000000000000000C0E0758DE856 :10002000758BE8E533700DD2A6D532148534328550 :100030003533800CC2A6E5336006D53303853432F0 :10004000D0E03275A0007535087533087532087533 :100050003408758920758DE8758BE8D2ABD2AF3046 ::1000F000340535853432853533D28E016775340148 :10010000D28E01672087FDD2A0D2A4D2A1D2A5C2EF :100110008E01439007D07530C8000000D530FA1525 :1001200082E582B4FF021583458 370EA2200000055 :00000001FF TYPICAL APPLICATION REMARK Antenna length about:23 cm for 315 MHz :17 cm for 434 MHz ? ROBORX. HEX :1000000001430000000000000000000000000000AC 100010000000000000000000000000C0E0758DE856 :10002000758BE8E533700DD2A6D532148534328550 :100030003533800CC2A6E5336006D53303853432F0 :10004000D0E03275A0007535087533087532087533 :100050003408758920758DE8758BE8D2ABD2AF3046 :1000600087FD2087FDD28E20801820841F20823AB1 :1000700020854120835120816B20870280E9310453 :1000800080E5C2A0C2A4C2A1D2A580DBC2A1C2A544 :10009000C2A0D2A480D1C2A1C2A5D2A0C2A480C74E :1000A000C2A0C2A4D2A1C2A580BDC2A1C2A0D2A535 :1000B000D2A480B3D2A1D2A0C2A5C2A480A9C2A159 :1000C000C2A5C2A0C2A4222083FDC28EE534640F63 :1000D000600E05341535853432853533D28E01678F :1000E000D28E01672081E0C28EE535640F600E1567 1000F000340535853432853533D28E016775340148 :10010000D28E01672087FDD2A0D2A4D2A1D2A5C2EF :100110008E01439007D07530C8000000D530FA1525 :1001200082E582B4FF021583458370EA2200000055 :00000001FF ? CONCLUSION APPLICATION S OF SPY ROBOT †¢Automotive remote entry systems †¢Automotive alarm systems †¢Gate and garege door openers †¢Wireless data transmission †¢Electronics door lock †¢Burglar alarm systems †¢ADVANTAGES:- †¢Small in size †¢Low cost †¢High energy †¢Efficiency. DISADVANTAGES:- †¢Handling is difficult. †¢If hump is came there is a chance for taking lot of charge from battery to move. We hope that this project is helpful to our juniors who are interested in this field REFERENCE RELATED WEBSITE:- 1. www. spykeeworld. com2. www. extremeElectronics. com 3. www. robotsrule. com4. www. smartrobots. com 5. www. spykeestore. com6. www. robotstxt. com 7. www. spyreview. co. uk RELATED BOOKS:- 1. Amphibionics (Karl Williams) 2. Build your own robots (Karl Lunt) 3. Combat robots (Chris Hannold) 4. Robot inventors workshop (Greg Vogt) 5. Artificial intelligence and mobile robots (David Kortenkemp) 6. Spy vs spy (Antonio Prohias) 7. Robots magazine.