Monday, December 30, 2019

Discrimination Women s Oppression Essay - 996 Words

Name: Tutor: Course: Date Due: Discrimination of women in workplace The issue of Ladies discrimination in the work environment has been around for a long time. Despite the fact that women currently have more money and power than ever before, there is still a considerable measure of work to be completed to guarantee that supreme uniformity turns into reality for all ladies all through the world. This essay covers the issue of gender discrimination in the workplace, male states of mind towards ladies at work, pay holes, sex discrimination in workplaces, labour, ethnic and country issues, ladies attempting to achieve top official positions and fairness in the working environment. It also describes various measures different organizations are taking to improve the issue. Finally, I have recommended personal measures I would take to manage the issue. Women’s oppression in the work place. The study done by L. Wirth hurled some intriguing information related to the issue of women discrimination. It shows that: †¢ Women hold 1 to 3 for every penny of top official occupations in the biggest organizations, around the world. †¢ Only eight nations have ladies heads of state around the world. †¢ Only 13.8% of the world s parliamentarians are ladies. †¢ Only 1 for every penny of exchange union pioneers are ladies; however, ladies are right around 40% of their participation, universally. (Wirth, 2002, 3). According to Coyle s book, from the 1950s up until the 1980s, ladies have beenShow MoreRelatedInvisible Distrimination in The Yellow Wallpaper by Charlotte Gilman669 Words   |  3 PagesDid you know that discrimination can take many forms from race, gender, religion and sexuality and that â€Å"40% of Canadian workers experience bullying on a weekly basis† (Canadian Bullying Statistics)? One of the biggest example of discrimination is female oppression. Even today, women are perceived and shaped generally as fragile and caring. During the 1900’s, and many years before, women were oppressed; some were even hospitalized for wanting to expand their knowledge. The Yellow Wallpaper by CharlotteRead MoreSociology and Disabilities1187 Words   |  5 PagesIf the technology became available for the deaf to hear completely, would you want your deaf child to have this technology? It is every parent s dream for their child to grow up healthy and happy. There are so many child ren in the world that do not have the ability to hear, and it is a horrible thing. Many would think it wrong for a parent to not want to give their child the gift of sight. If I had a child that was deaf, I would do everything in my power to help them get their hearing. IfRead MoreLiberation Ideology Essay1235 Words   |  5 PagesLiberty and Equality for All Oppression and discrimination has existed and continues to exist in the past, present, and future history of the United States. The mistreatment of particular groups infringe on the idea that all individuals are free and equal. Liberation ideology strives to eliminate external and internal oppression of particular groups in both a formal and informal method in our legal system and society. This ideology believes in the freedom and equality of the individual. SimilarRead MoreThe Legal Framework Within The Area Of Equal Opportunities1399 Words   |  6 Pagesform of discrimination and its causes, it supports and puts in place progressive awareness of equality in the community. The law requires people to be given equal opportunities regardless of their personal characteristics and backgrounds. The Equal Opportunities Act 2010, brought together some anti discriminatory laws to make it simple for people to understand their rights and duty to society as well as the enforcement of fair treatment for all including targeting and fighting discrimination againstRead MoreBlack Feminist1005 Words   |  5 PagesAccording to Oxford English Dictionary, Black Feminist can be defined as a movement consisting of African American women advocating social, political, legal, and economic rights for women equal to those of men (Oxford English Press). Black feminism argues that sexism, social class oppression, and racism are inseparably bound together (Collins). The feminist movement has been around since the 1880s when the word â€Å"Feminism† appeared in the French language (Collins). The word found traction in BritainRead MoreShort Story : The Borderlands 1395 Words   |  6 Pagesinner workings of the groups working against them, while also knowing everything from outside the gr oup. They are given the â€Å"outsider looking in† advantage that neither side would have if not for those within the borderlands. Throughout Gloria Anzaldà ºa s Borderlands: La Frontera, she gives multiple example of situations in which people are situated into the Borderlands. One such example is in the case of religion. Anzaldà ºa grew up with Catholicism being the predominant religion. Even though CatholicismRead MoreThe Critical Race Theory ( Crt )921 Words   |  4 PagesRace theory, is a modern take on the subtle racism and discrimination in institutional society and our American law, and is one of the theories that construct the ideas relating race, gender and social class to American society† (Healey, O Brien, 2014). In Episode 2 of the PBS Latino Americans Series (2013) the topic of immigration from Mexico to the US was heavily discussed, including the Latinos battle with discrimination, oppression, and even segregation. During the Mexican Revolution oneRead MoreWomen s Movement During The 1970 S1275 Words   |  6 Pagessignificant movements that depicted the representation of women in a patronizing way. Whether it began in the 1970’s or the 1990’s these decades both held its own on the matters of oppression and the exploitation of women. Rape culture as well as women’s clothing options were twisted into making these decades some of the most influential for women of all times. From the way women were dressed, to celebrities standing out, rape culture, or movements for women, controversy was created throughout these decadesRead MoreGender Discrimination And Patriarchal Oppression In Mahesh769 Words   |  4 Pages Gender discrimination and Patriarchal oppression in Mahesh Dattani’s plays Tara and Bravely Fought the Queen. R.Mythili, Lecturer,DIET, Dharmapuri. Introduction Mahesh Dattani’s plays mostly deal with the problems of the women and the marginalized. â€Å"Feminism† is probably the most popular and the most complex one. It refers to the prolonged struggle against the â€Å"tyranny of the patriarchal state† and it is based on the urge for the equality of women in every walks of life. It attempts to fight againstRead MoreLiberal Feminists Vs Liberal Feminism992 Words   |  4 PagesLiberal feminists are not so concerned with justice, or true equality, however. Although they encourage women to challenge a male dominated society for acceptance as an equal, they do not believe that everyone possesses equal ability or an equal right to societal resources (Freidman et al., 20111, p. 5), ergo ‘justice’. Equality for liberal feminists means equal opportunity to work for what they want - to compete with men on equal terms in both professional and political arenas (Freidman et al.,

Sunday, December 22, 2019

Essay on Parkinson Disease (PD) - 2171 Words

Introduction Parkinson disease (PD) is a progressive neurodegenerative disorder characterized mainly by physical and psychological disabilities. This disorder was named after James Parkinson, an English physician who first described it as shaking palsy in 1817 (Goetz, Factr, and Weiner, 2002). Jean- Martin Charcot, who was a French neurologist, then progressed and further refined the description of the disease and identified other clinical features of PD (Goetz, Factr, and Weiner, 2002). PD involves the loss of cells that produce the neurotransmitter dopamine in a part of the brain stem called the substansia nigra, which results in several signs and symptoms (Byrd, Marks, and Starr, 2000). It is manifested clinically by tremor,†¦show more content†¦Although many theories and hypotheses were raised as to why this happens, there is no solid information supporting the physiological cause of this, but it is surely one of various factors that may lead to the development of PD. Neuroanatomy of the Basal Ganglia It has been known that PD is a disorder affecting the basal ganglia. The term basal ganglia is generally applied to a collection of nuclei situated deep within the cerebral hemispheres, lying laterally to the thalamus (Gazzeniga, George, and Mangun, 2008). The basal ganglia are important subcortical structures. They are composed of five nuclei: caudate, putamen, globus pallidus, subthalamic nucleus, and substantia nigra. These nuclei are not thought of a single anatomical entity; rather, they form a functional unity whose contribution is greatly to motor control. Interestingly, this system does not influence movement through spinal cord pathways, but rather acts as part of a feedback loop to all areas of the cerebral cortex, with primary input into motor areas (Aird, 2000). A number of excitatory and inhibitory neurotransmitters are what control this whole process, and a balance of both is required to ensure that smooth, purposeful movement takes pla ce. In order to understand the pathways of which the basal ganglia take part in, it is essential to know the input and output connections of the basal ganglia. The inputShow MoreRelatedParkinson Disease ( Pd )1350 Words   |  6 Pages Parkinson disease (PD) is one of the most common neurologic disorders. and it affects approximately 1% of individuals older than 60 years old. Parkinson’s disease is a condition that progresses slowly by treatment. In addition, loss of pigmented dopaminergic neurons of the substantianigra pars compacta and the presence of Lewy bodies and Lewyneurites are the two major neuropathologic findings in Parkinson disease (Hauser, 2016). The cause of Parkinson disease, defined by Robert Hauser, who isRead MoreParkinson Disease ( Pd )929 Words   |  4 PagesParkinson Disease (PD) is a neurodegenerative disease symptomized by tremor, muscular rigidity, and slow imprecise movements. Typically, the disease affects middle-aged and elderly individuals. PD is associated with degeneration of the basal ganglia of the brain causing a deficiency of the neurotransmission of dopamine. (1). Given what you know about the members of the family, analyze and comment on the potential effects this condition/illness might have on them. Since Mr. Olsen (Frederic) hasRead MoreParkinson s Disease ( Pd )1361 Words   |  6 PagesParkinson’s disease (PD) is a neurodegenerative disease which is progressive, incurable and debilitating. The disease is caused by a loss of dopamine producing neurons in the brainstem which leads primarily to motor deficits. In Australia, 1 in 350 people live with PD and the prevalence is quickly growing (Parkinson s Queensland, 2014). While most of the people diagnosed with PD are over 65 years old, people as young as 30 can develop the condition (Parkinson s Queensland, 2014). Currently, thereRead MoreThe Parkinson s Disease ( Pd )1058 Words   |  5 PagesIntroduction The Parkinson s disease (PD) is the second most common neurodegenerative disorder after Alzheimer s disease (Lang and Lozano, 1998). It affects about 1% of the population with different ethnic backgrounds throughout the world over the age of 65 (Tanner and Goldman, 1996). The aetiology of Parkinson s disease is not well understood; however, genetic and environmental factors are thought to play a role (Checkoway and Nelson, 1999). Pathologically, PD is characterised by mitochondrialRead MoreAnalysis Of Parkinson s Disease ( Pd )725 Words   |  3 Pages Introduction Parkinson s disease (PD) is the second world s major neurological disease (Laut Breteler, 2006) affecting 6 million people globally (Schapira, 1999). PD is a progressive and long term disorder of the central nervous system (CNS) activity with the following traits including bradykinesia, rigorousness, involuntary muscular contraction and unstable postural alignment (O Sullivan Schmitz, 2007). Basal ganglia are located in the CNS have large nerve fibers and neurotransmittersRead MoreAnalysis Of Parkinson s Disease ( Pd )1890 Words   |  8 Pagesthe salient characteristics associated with Parkinson’s disease (PD) are most commonly linked to motor deficits, including tremor and rigidity, a majority of individuals with PD also experience a variety of sensorimotor speech deficits. While listeners often describe the speech of individuals with PD as unnatural or unintelligible, reflecting many of the phonatory, articulatory, and prosodic deficits linked to the disorder, in dividuals with PD tend to minimize or even deny their speech differencesRead MoreParkinson s Disease ( Pd )1326 Words   |  6 Pages Parkinson’s disease (PD) is one of the most frequent neurodegenerative diseases, falling second to Alzheimer’s disease. It is stated that there are roughly 5 million individuals worldwide and 1 million individuals in the U.S. that suffer from PD. PD arises from the lack of dopamine in the brain along with the degradation of dopaminergic neurons, particularly in the substantia nigra pars compacta.1 The degradation of the dopamine neurons increases the number of free radicals in the substantia nigraRead MoreParkinson s Disease ( Pd )822 Words   |  4 PagesParkinson’s disease (PD) is a neurodegenerative disorder characterized by aberrant ÃŽ ±-synuclein aggregates within neurons causing damage or neuronal death in different regions of the brain with most disease development occurring in the substantia nigra (NIH.PARK). ÃŽ ±-synuc lein positive Lewy bodies are another hallmark of PD development (NIH.PARK). Damage or death of neurons leads to a decrease in dopamine production which is required for smooth control of muscle movement (NIH.PARK2, NIH.PARK). ClinicallyRead MoreParkinson s Disease ( Pd )951 Words   |  4 PagesParkinson’s disease (PD) is a neurodegenerative debilitating movement disease which gets worse over time (Medscape, 2015). After much research and study no known cause has yet been determined and experts have hypothesized that it is a mix of inherited and environmental factors (Medscape, 2015). However, regardless of the unspecific cause, it is characterized by a significant loss in dopamine transportation to the basal ganglia which manifests itself in the three following physiologic signs: restingRead MoreEarly Parkinson s Disease ( Pd ) Through The Characteristics Of Finger Movement During Typing Essay5181 Words   |  21 Pagesresearch into detecting early Parkinson’s Disea se (PD) through the characteristics of finger movement during typing. It begins with a discussion of PD and its symptoms, and then provides an overview of the current and emerging diagnostic strategies for early detection of the disease, with particular emphasis on those involving human-computer interaction (HCI) and the relationship with keystroke biometrics. The scope of the review is to focus on the motor symptoms of PD, rather than the causes, pathogenesis

Saturday, December 14, 2019

Nokia and the RFID student attendance monitoring system Free Essays

Abstract: RFID student attendance monitoring system is a system that will take students attendance by using RFID technology. This system mainly comprises of Nokia 6212 NFC mobile which is used as RFID reader, RFID tags which are embedded to the students ID cards and Server machine which is likely computer. This system records student’s attendance to an attendance database server. We will write a custom essay sample on Nokia and the RFID student attendance monitoring system or any similar topic only for you Order Now The system is included with other additional system module for students and lecturers. The information in the attendance database is used by the university administration to better manage the class room statistics, warning for unattended students via letters or e-mails, reminder for students, report for parents and students can also track their performance. RFID student attendance monitoring system is developed using java programming language. The database support for this software is oracle 10g. In order to have complete system functionality, the software application is needed to be integrated with the RFID technology. The software application on the computer is needed with the attendance details which would come from the RFID reader in to order to take attendance and persist in the database. The software application on the computer is deployed in Apache Tomcat 6.0 server and can be viewed by the user by using any internet browsers such as Mozilla Firefox or Google Chrome. Introduction: The research is proposed to investigate the requirements of automatic students’ attendance monitoring system. The requirements which has been identified and modelled are represented in the form of structure for students’ attendance system. In order to obtain requirements, some of the methods have been applied such as observation and literature research related to current RFID monitoring systems. We have an existing system like taking attendance manually. For example professors take attendance of their students by taking signatures on an attendance sheet. The main problem with this system is that students will sign occasionally for their friends who are not present to the class. The purpose of this project is to automate tracking of the presence of students in the class room, with the intention of bringing transparency and reducing number of errors that usually happen in such tasks. The another problem is counting each student attendance for the total semester will be difficult if the professor got 100 or more students which leads to time consuming and error prone. In order to make taking attendance simpler I got a thought to make this application automatic with the existing identification technologies like automated finger print identification system, barcode system and radio frequency identification system. In my project I am using radio frequency identification (RFID) technology for security and attendance purposes. Identification means the ability to find, retrieve, report, change or delete specific data without having any doubt. These problems can be eliminated by using RFID technology. The main advantage of RFID based student attendance monitoring system is, 1. It saves time for taking attendance during the class. 2. More authentic attendance system 3. Reduces paper based system 4. It provides interaction between student, course leaders and lecturers. Student attendance monitoring system is an exclusive software solution. It can be integrated with RFID technology. In order to implement this project we require RFID reader, RFID tags and web interface. The card reader should positively identify student’s ID cards and provide consistent class attendance logs for the benefit of students, lecturers and university. The attendance logs must be stored in the central database in order to generate reports. The device must capable to communicate with the central database server. Professors should be able to view attendance and be capable to add information to the system. 1. This application tracks each student’s classroom attendance for any number of students. 2. It provides a software set up to monitor information about scanned cards against a database and provides detailed statistics to the lecturer’s about the students. The software set up must include adequate administration capabilities. 3. Provide a wireless interface between the reader and database server. 4. It also provides facility to the course leaders, professors to monitor student attendance at regular intervals. 5. It monitors the attendance of students for each course. Radio frequency identification (RFID) consists of a transmitter chip/IC and a receiving antenna. Each chip has a unique identification number generally referred to as a RFID Tag, which is attached to the object that we want to discover. Now the RFID tags are detected and identified using an antenna or a scanning device known as transceiver, which with the help of radio signals identifies the tag, the object. In this project, the RFID tags will be associated, to the students (by attaching the RFIDs to student’s university cards) and the transceivers will be placed on the entry points of the classrooms. Software at the back end will keep and manage the records, relating to the student’s entry to the classroom. All the use-cases will be accomplished using software having application and databases layers. Concepts of Object orientation will be followed in the design of the system. Aim: This research is aimed to develop a student attendance monitoring system using RFID technology. Objectives: The main objective of the project is to automate the student attendance recording system using RFID technology. To study on data transfer between RFID system and Graphical user interface (GUI). The application should be able to display the student attendance percentage in each of the modules and the overall semester attendance. The application should be capable to generate attendance reports for the authorized party which we would be helpful for university administration to have better database record. To test the application using testing techniques. Deliverables: 1. A review of RFID readers and methods for programming them including a demonstration application running on the Nokia 6212 that can read the unique information from an RFID label. 2. A Nokia 6212 application for tutors to take to classes to capture students’ id data from RFID labels. 3. A review of techniques for communicating between mobile phones and PCs accompanied by a demonstration application for transferring id card data from a Nokia 6212 to a PC. 4. A PC application for downloading and collating register data from a Nokia 6212 and storing it in a central database. 5. An application for generating reports for personal tutors and admin staff. Research question(s): How RFID Technology used for monitoring student attendance What are the best techniques for storing and processing the data What are the techniques and technologies for getting data from the phone to PC Problem Statement According to Wang. (2005), Automatic student attendance using RFID technology comprises of multiple devices work together. The devices include RFID reader, RFID tag, system interfaces and databases. This system needs a good system design to make sure that the devices can capture accurate data and can interact with the information system accurately and efficiently. In order to obtain good system design, developers should have clear idea, knowledge and able to understand the requirements and convert them in to useful information. It is very important to represent the necessary information in to a meaningful data model suitable for application level interactions, including monitoring, tracking and application integration. Therefore a structure is needed to present plans for developing automatic student attendance monitoring system using RFID Technology. Why Automation? To save on time spent for daily roll calls. To avoid manual errors. To obtain accurate attendance means exact IN time. To avoid record search time, when we want to see any student’s attendance performance. To avoid reporting time used for preparing the attendance percentage reports at the end of the year. Finally to have professional and global look of the organization. Scope: The scope of this project is mainly based on the following things. I selected university of Wolverhampton as a case study to acquire requirements. Web-based technology is used to develop the application. Unified modelling language is used as a requirement modelling technique. Significance: The structure of the student attendance monitoring system is planned to provide strategy for developing automatic student attendance system using RFID technology. Need to know the project requirements for developing the application. Technical knowledge is required on RFID technology and software tools to develop the application. System functionality: Components used for the system RFID reader RFID tags Bluetooth connection Power supply Software on the computer Description: The students old ID cards will be replaced with RFID ID cards which means the RFID tags are embedded on the ID cards. The card looks similar to their old cards having photo, name and other details. The sufficient number of RFID readers will be installed at the entrance of each and every class room. All the RFID readers are networked to the computer via Bluetooth connection. The students enter the class room by showing their ID cards to the RFID reader from the maximum of 3cm. The RFID reader reads the card data that is RFID tag reference number and sends the data to the computer via Bluetooth connection. As soon as the card is read by the reader, the tag reference numbers will be streamed in the newly created excel sheet in the computer and waits for other card get scanned. The RFID reader reads a card within less than a second. The software application in the computer uses the data in the excel sheet for taking students attendance and maintains the data for generating reports. Summary: The RFID technology has been used by many sectors for automated tracking of objects like chain management, retailing, security and health care applications. The RFID student attendance monitoring system utilizes the existing RFID based applications technology which gives advantages to the users in the term of feasibility while recording their attendance. This application combines multiple devices which work together as a complete system. This system consists of readers, tags, user interfaces and databases to keep and manage user’s data. Designing multiple devices system is a great challenge. The developer needs to have a clear understanding of the system from different perspectives to ensure the successful of the system. Therefore this research investigates the requirements of the system and suggests a structure for it. Resources required: The following resources are required to develop the application. Processor1 GHz processor is recommended RAM256 MB RAM is recommended Operating SystemWindows XP Service Pack 2, Windows Vista or Windows 7 is recommended IDEEclipse Pulsar 1.3.2 DatabaseOracle 10g Java ToolsJDK and JRE 1.6 is needed to run java files Web ServerJakarta tomcat 6.0 is necessary to host the application on the web and to test the application. HardwareNokia 6212 NFC Mobile is used as a RFID reader and RFID tags and Server machine MS – Office 2007MS-Excel 2007 is recommended. Literature Review: Automatic Identification and Data Capture Technology: This chapter mainly describes the introduction to automatic capture of data for the purpose of user identification. Definition of User Identification Devices (UIDS): User Identification devices are used to describe a physical object or a process that discovers the attributes of the consumer or producer and attempts to exclusively organize that entity. The main objective of the UIDs is to maintain accountability and access control. Currently the UIDs are supported by the business people because it making them more convenient, continuing efforts to make them smaller, easier to transport and maintain, and more efficient with respect to data throughput. Many of the UIDs are currently in usage they are plastic cards or badges with a picture on it, barcodes, magnetic strips, embedded microchips also known as smart cards, biometrics and passwords. The latest identification technology which is being advanced is the use of radio frequency. The radio frequency identification is a noncontact transmission method. The main objective method is to automatically capture the data for accurate identification. Firstly these UIDs need to improve the security and int egrity of UIDs. Automatic Identification and Data Capture (AIDC): The Automatic Identification and Data Capture (AIDC) can be referred as a worldwide industry term. AIDC explains the identification and direct collection of information into a computer system, programmable logic controller (PLC) or other microprocessor-controlled device without using keyboard. The ability of recognizing and accessing the information in secured places within the business world and without the use of keyboards has directed to the use of contact and non contact badges and cards. Smart Card Technology: In the early 1950’s the concept of plastic cards was first appeared in the USA. They introduced plastic credit cards and it was first being issued by Diners club in 1950s. Later integrated technology was developed which made it possible to integrate data memory and processing logic on to a single silicon chip. The desire for the ease of a smaller transaction tool caused the two to merge in to what is known as the â€Å"smart card†. RFID technology background: According to Ching-Hsien Hsu. et al. (2009), RFID technology is one of the most commonly used technologies for identification nowadays. It is an automatic technology which helps the machines or computers to identify, record, or control the individual target through radio waves. Typically an RFID system consists of two components namely RFID reader and RFID tag. Generally RFID reader electronics uses outside power resource to generate a signal to drive the reader’s antenna and turn into radio wave. The radio wave will be accepted by the RFID tag and reflects the energy in the way signalling its identification and other related information. In order to access the reflection from the RFID tag, the RFID reader works as a receiver on sensing and decoding the signal from the RFID tag. In simple RFID system, RFID tag is passive and powered by the energy of the reader’s signals. In some systems, the RFID reader radio frequencies instruct the memory to be read or write from the associated RFID tag. RFID Reader According to Johansson (2004), The RFID readers continuously send the interrogating radio signals in search for the responding tags. These radio signals are sent at fixed frequency bands. The tag discovers this radio energy signals and sends the tag’s serial number and any other information to the reader. In addition to reading the data from the tag, some readers can write data to the tag. The distance from which a reader can set up a contact with a tag is called read range and the read rate can be defined as the maximum rate at which the data can be read from the tag (bits or bytes per second). The high frequency signal and the stronger powered examination signal for communication increases the range of communication. According to Simson (2005), Historical RFID readers were designed to read only a particular type of tag but multimode readers can read different type of tags and are becoming popular. Similar to tags, RFID readers come in many sizes. The largest reader consists of a desktop computer with a special card and multiple antennas connected to the card through shielded cable. These type readers in general hold a network connection, so that it could report tags that it reads to other computers. The smallest readers are of postage stamp size and are designed to embed in mobile telephones. RFID tags: According to Mark (2010), An RFID tag is sometimes referred as a transponder. It contains the identifying data of the object where it is sited on and it generates a signal containing that relevant information. There are four different types of tags available based on the power sources. They are: Passive tags Semi Passive tags Active tags Semi Active tags Passive tags: These tags usually get their power to transmit the signal from the magnetic field created by the RFID reader. These tags can transmit up to a range of 10 meters. These tags are smaller and cheaper because they don’t have batteries. Semi Passive tags: This tag consists of onboard battery which is used to power the onboard circuitry but it doesn’t produce any signal but it still uses magnetic field produced by the reader to produce a signal. These tags have a maximum transmission range of 100 meters. Active tags: This tag consists of an onboard battery which is used to communicate and send signals to the reader and power the onboard circuitry. The onboard battery allows it to transmit up to a maximum range of 1000 meters. Semi Active tags: These tags are very much similar to active tags with a small difference of they remain in sleep mode until they receive a signal from the reader. Which means the tag activates when it receives a signal from the reader. The communication between the reader and tag is possible through the radio frequencies. Tag detection: According to Bogdon (2008), Signals from the RFID readers activates the tags which are likely within their examination zone. The examination zone can be referred as the area around the reader where the tags can receive the readers signal, process it and sends back the response that can be decoded by the reader. The information that is decoded by the reader is passed to the host computing systems for processing according to the application. RFID reader-writers have the capability to send back the data to the read/write-capable tags in order to append or replace data. The RFID reader usually locates, activates, and receives transmissions from RFID tags. Readers can be fixed or portable. Fixed readers are typically attached to antenna to notice the tag within particular area. These readers usually collect the data from the products that are travelling through conveyor belt, gates and doorways etc. Portable readers can be moved to detect remote tags. In today’s market readers with wireless communication capabilities exists such as SkyeTech’s SkyeRead reader is attuned with Mica Motes and IDBlue is a handheld Bluetooth 13.56MHz reader with High Frequency is compatible with devices ranging from PDAs to PCs. Now a day’s major mobile phone manufacturers providing phones with embedded RFID readers e.g. Nokia 6131 and Nokia 6212 NFC. RFID Frequencies: According to Ali (2008), Different RFID systems drive at a variety of radio frequencies. Each range of frequencies offers its own power requirements, operating range and performance. Each of the ranges may have different restrictions that limit based on the applications they can be used for. The detection range may vary from few centimetres to 100 meters. RFID systems are currently operating in the Low frequency (LF), High Frequency (HF), Ultrahigh Frequency (UHF) and Super High Frequency bands. RFID operation frequency ranges and related applications shown in the below table: Frequency RangeDescriptionTypical Applications 135 KHzLow Frequency, Inductive CouplingAccess Control OEM applications 13.56 MHzHigh Frequency, Inductive CouplingAccess Control and Library Books 868 – 870 MHz902 – 928 MHzUltra High Frequencies (UHF), Backscatter couplingSupply chain tracking 2.40 t – 2.483 GHzSHF, Backscatter couplingAsset tracking Highway toll tags Vehicle tracking Elements of an RFID System: Basically RFID system consists of four elements: RFID Readers RFID tags Antennas and radio characteristics Computer network (if any) which is used to connect the readers Antennas and Radio: The physical layer of the RFID system comprises of antennas and radios used to connect the reader to the tag which allows the devices to share the information. The RFID tag antenna is the conductive element that allows the tag to send and receive data. In order to form a magnetic field, the passive, low (135 KHz) and high frequency (13.56 MHz) tags consists of a coiled antenna that couples with the coiled antenna of the reader. UHF antennas come in different shapes. Readers consist of antennas which releases radio waves. The Radio Frequency energy from the reader antenna is harvested by the antenna and this energy is used to power up the microchip, which leads to change the electrical load on the antenna to reflect back its own signal. http://www.rfidjournal.com/glossary/antenna Near Field Communication: According to Raine (2009), Near Field Communication (NFC) and Radio Frequency Identification (RFID) terms are often confusing as the RFID acronym holds multiple standards. NFC and RFID are used inaccurately as transferable terms. This means that the RFID readers might be able read the RFID tags which are implemented with the same standard. Near Field Communication (NFC) technology is used for remote identification and data transfer at reading ranges up to a few centimetres. It means it reads the tags which are close in range. NFC can be considered as a division of more common RFID technology. NFC operates in different communication modes when compared to traditional RFID reader/RFID tag combination. It is more likely for the two NFC devices communicate each other and NFC devices are also capable to imitating definite RFID smart cards. The emulation mode enables the NFC devices to use the existing reader infrastructure. NFC is complaint with some smart card ISO (International Organiza tion for Standardization) standards: ISO 14443A, 14443B, and 15693 along with Sony’s FeliCa Standards and MiFare. NFC was initiated from a joint project of Philips and Sony for developing a short range communication technology in 2002 and it resulted as a Ecma Standard (ECMA 340) and later it was a accepted as ISO Standard 18092 in 2003. Nokia, Philips and Sony founded the NFC forums and been promoting the NFC technology. According to Raine (2009), Basically NFC operates in three different modes. The first operational mode is read/write mode. In this mode, the NFC device reads/writes data to or from an NFC complaint tag and in read/write mode the NFC device acts as an initiator and the tag acts as a target. In this mode it transfers the data at a maximum rate of 106 kilo bits per second. The second operation mode is peer to peer mode. In this mode it allows the two NFC devices to interact to each other and the maximum data transfer rate is 424 kilo bits per second. The third operational mode is emulation mode which allows the NFC device to emulate as a smart card. In this mode the built-in smart card chip is integrated in the NFC device and connected to the NFC antenna. Technical capabilities of Mobile interaction with NFC: According to Khoovirajsingh (2009), in these days mobile phones are increasingly used for storing pictures, videos, documents and Personal Information Management (PIM) data. In addition to this there is often need to copy these files from mobile phone to a computer or vice versa. In this process the user first need to find file, then need to select the method for transferring file (e.g. Bluetooth), after wards the user need to perform the device discovery process, then select the target device. After having the file on the other device, the user has to decide what to do with it. This will be an awkward process to the user. In order to avoid this process. Some of the basic interaction techniques are available to make things simple. According to Gregor (2011), Dynamic NFC-displays can be used for a wide range of applications at private e.g. home, semi-public e.g. pubs and public places like stations and shopping malls etc., including information retrieval, interactive advertisements, maps or games. NFC enabled mobile phones provide interaction with the diverse content of dynamic NFC-displays, including pictures, texts, links, maps and custom widgets. The design, implementation and performance of interaction techniques for dynamic NFC-displays rely on the technical capabilities of reading devices, tags and physical UIs. Basically NFC displays depends on the size of the tags, target items and mobile devices. Some of the NFC enabled mobile phones are available in the market e.g. the Nokia 6212 NFC classic. This mobile can read only tag a time and cannot identify multiple tags as they block during the interaction with one or several items. NFC enabled devices need a considerable amount of time to read a tag say abou t 0.5 seconds and tag should be placed very nearer to the device. These types of issues are seen in the currently available devices like Nokia 6212 mobile. Basic interaction techniques: These types of techniques can be used for simple interactions like the selection of items, triggering actions or activating links. Touch-select: This is the most basic interaction technique. In this technique the users touch a tag with a mobile phone and take out from it after the tag has been recognized. This tiny interaction can be varied through the combination with input from keyboard, joysticks or sensors. Click-select: This technical can also be referred as touch-select method. This method is pursued by pressing the pressing dedicated key on the mobile device to confirm the selection of the tag. Touch and Hold: This technique needs users to touch a tag for a certain amount of time which is longer than the normal touch-select e.g. 2 seconds. Double-touch: In this technique users have to touch the tag twice in a row. Contactless Cards (tags) Mifare 1k or 4k: According to NXP, (2007), The read/write mode of NFC needs two devices to communicate, one is NFC reader/writer and the other one is NFC tag. The NFC technology permits to access standard ISO 14443A card products as the Mifare family. In the NFC forum, the specification to store data for any kind of service or application is currently specified and it is known as NFC Data Exchange Format (NDEF). In order to store NDEF formatted data which is also called as NDEF data or NFC forum data inside a contactless tag product a mapping model is required. The Mifare 1k/4k tag product is a contactless card presently available in market with 1k byte and 4k byte of EEPROM memory. The Mifare standard 1k/4k supports mutual three pass authentication, file data transfer up to 106 kbit/s, data encryption of RF-channel with replay attack protection and CRYPTO1 stream cipher for secure data exchange. Mifare 1k tag: A Mifare 1k tag is able to store up to 1024 bytes of information. These 1024 bytes are organized as 16 different sectors numbered as Sector 00, Sector 01†¦..Sector 0E and Sector 0F. Each sector comprises 16 bytes of data blocks named as blocks and numbered as Block 0, Block 1, Block 2 and Block 3. Block 0 of the Sector 00 contains IC manufacturer’s data. In every sector Block 3 is called as trailer and is used for sector authentication serving the security purposes. The first six bits of the authentication block are known as Code A, the next four bits are known as access bits and finally the last six bits are known as Code B. Code A and Code B are typically password keys which can be programmed for reading and writing protection. Fig: Mifare 1k Mifare 4k: The memory area of Mifare 4k is organized in numbered sectors from 0 to 39. It can store 4096 bytes of information. The organization of the first 32 sectors follows the similar structure of blocks and sectors of Mifare 1k. The last eight sectors are quadrupled in capacity. Depending on the settings of the access bits the reader device has to carry out an authentication with key A or key B to read or write the sector. Nokia 6212 NFC Classic Mobile in focus: According to Nokia Corporation (2008), The device which i focussed of this paper is Nokia 6212 NFC classic. This device comes with an RFID module which functions as RFID tag and reader operating at 13.56 MHz. It also supports features like read write, card emulation and peer to peer communication. According to product specification, the Nokia 6212 NFC device is capable of Tag reading and writing as native NFC functionality. Contactless communication API (JSR-257) with extensions for java applications on the phone. It gives support for all NFC Forum defined tags. This phone is compatible with non-battery powered tags (passive tags) which are: a) MIFARE (Standard, Standard 4K, Ultralight and DESFire) b) Sony FeliCa (non-secure) c) Innovision (Jewel read only and Topaz) d) ISO 14443-4 complaint tags or cards. Compatible with ISO/Global platform smart card for service providers to install application specific data e.g. payment and ticketing applications. Compatible with existing contactless reader infrastructure (payment and ticketing). The main features of Nokia 6212 NFC include different connectivity options like Bluetooth, GPRS, USB and NFC with read, write and sharing capabilities. Graphic display with 2† QVGA 240 x 320 display supporting up to 16 million colours and contains user storage of 22 MB and microSD format for removable flash cards. Fig: Nokia 6212 NFC Mobile Nokia 6212 provides some settings to configure NFC functionality. NFC detection: To switch NFC on or off we need to select Menu NFC NFC settings. To use NFC switch on the mobile and activate the NFC setting, if disabled. With the phone touch the service tag or other NFC device with in the discovery area. Typically the reading range is 0-3 centimetres. When a tag or device is discovered the corresponding information is displayed on the mobile. Share to device: Select Menu NFC Share to device and select the required option. When the sharing is enabled you can send a bookmark, business card, call request, alarm alert calendar note, gallery item, profile, radio station, note, or to-do note. Service tags: A service tag may hold a shortcut such as URL of an internet based service, business card, SMS based service and phone number of a telephone service. Share or read service tags: Select Menu NFC Share to tag. Scroll to select desired option. Select share and touch a service tag. In order to read a service tag, need to touch a tag with the phone. Touch a service tag with your device to allow video streaming or Bluetooth connection or receive a business card, SMS message, call request, bookmark, calendar note etc. NFC received items or card applications can be accessed by selecting Menu NFC Inbox or Cards. The device memory restricts the amount of tag data that can be stored. In order to free up memory space delete the received files from the NFC Inbox. We can share the same information repeatedly to different service tags. Bluetooth: According to Cynthia et.al. (2007), Bluetooth is a Personal Area Networking standard based on short range radio. Devices like phones, printers, modems and headsets use Bluetooth technology to communicate between themselves. Bluetooth technology is mainly useful for communication when two or more devices are in close proximity and need reserved bandwidth. A Bluetooth device either acts as a â€Å"master† or â€Å"slave†. At most a master can communicate with seven slave devices, and a Bluetooth consisting of one master and it slaves is called a piconet. The master acts as a controller to control all the timings of all Bluetooth connections on piconet. Bluetooth pairing can be defined as a process of adding new slave device to the Bluetooth piconet. Bluetooth simple paring is a set of security improvements to the Bluetooth pairing mechanism. The target of the Bluetooth simple pairing is to set up authentication credentials between the Bluetooth master and the slave device s. Bluetooth simple pairing encourages four different pairing models. Those are: Numeric comparison Just Works Out of Band and Passkey Entry Numeric Comparison Method: The Numeric Comparison model is proposed when both the devices are able to display a six digit number and both provide â€Å"Yes† and â€Å"No† buttons. Numeric Comparison For example, A PDA can use the pairing scheme with a PC. During the process of pairing, each of the devices displays a six digit number matched from the pairing protocol. The user of each device is believed to compare the two numbers and select â€Å"Yes† if they match and â€Å"No† if they mismatch. The numeric comparison is executed over Bluetooth, which is in the in-band channel in the standard model for authentication. Just Works Method: The Just Works model is proposed when at least one of the devices has no display or â€Å"Yes/No† buttons. This model is commonly used when pairing a Bluetooth headset with a cell phone. This method is similar to numeric comparison model but it does not display the six digits for comparison it uses numeric comparison internally. Even if one of the device displays numbers it won’t be compared on the putatively paired device because the Just Works model lacks any out-of-band channel required by the standard model. This model does not provide security against active attack. Out of Band Method: The â€Å"Out-of-Band† method is used when an alternate communication medium exits on both the devices, such as Near Field Communication (NFC). The alternate communication medium transfers a key between the proposed devices and functions as the Out-of-Band channel in the standard model. Passkey Entry Method: The Passkey Entry method is proposed when one of the devices has a display and the other device should have a key pad. The device which has got display randomly generates a six-digit number and the user enters this number on the other device using keypad. Like the numeric comparison an attacker can negotiate the six digit pass key with a probability of at least 2-20. The protocol which divides the passkey in to 20 bits and unveils one bit over 20 rounds of exchange. Each bit of the passkey can be computed by an eavesdropper after it has been sent. A passkey can be used securely only once. Pass key Entry Why attendance should be taken? According to Melchiorre, et. al. (2003), To verify the accuracy of attendance records, the research team visited Southwest Community Center three times on different days of the week at different times. During their visits the research team conducted random head checks, looked at the attendance and registration records. They discovered the flow of passage throughout the Southwest Community Center. During the head checks, the number accounted on the attendance sheet was compared with the number of members present. While these attendance sheets do not contain time in and time out and the head checks could not show whether the attendance recorded correctly or not. This results inaccurate attendance. Finally we could not know how many persons were present during the entire hours of operation. Problems with the attendance can be recognized as unclear understandings of job responsibilities. According to Mary. (2005), A small California startup called InCom has developed a radio frequency identification (RFID) system called Inclass which is used automate student attendance in elementary and secondary schools. This system uses ultra-high frequency (UHF) readers which are mounted at the entrance of the class rooms and passive RFID tags are embedded to student ID cards. This InClass system was tested at Brittan Elementary School in Sutter, but the use of RFID in schools was protested by the parents of Brittan students. The Brittan school administrators were interested in the product in part because California bases school assist upon attendance numbers. The InClass product working scenario: Each of the students ID card comprises of unique 15 digit ID number written to each tag and associated with name of the student. When the student pass through the reader interrogation area at the class room entrance, the reader immediately sends the tags unique ID numbers to a central server. Software program was developed by the InCom and it is installed on the server where it collects the tag data and uploads a list of present, absent and tardy (based on when they enter the classroom) students to the PDA which is issued to the teachers. The upload can be done wirelessly over an 802.11b Wi-Fi protocol. Now the teacher would perform a visual check on the InClass generated attendance list by examining the class quickly to compatible what the list says with class room present number. Once the attendance was confirmed, the list is sent to the school administrators via PDA. School administrators need to file attendance records to the board of educati on. Later school administration tested the InClass product to see whether it could decrease the amount of time taken by the teachers to take attendance manually. Contactless communication API: According to Enrique (2008), the contactless communication API java specification specifies a set of proximity, contactless-based communication. These specifications are defined under the java community process as JSR-257 and led by Nokia. JSR 257 Packages: Out of all these packages mainly we use javax.microedition.contactless API. The contactless communication API permits us to Discover and Exchange data with contactless targets such as NDEF tags, RFID tags, and external smart cards. This API also provides support for visual tags. The following diagram demonstrates the relationships between the different API classes and interfaces. Fig: Contactless Communication API Relationships Source: http://java.sun.com/developer/technicalArticles/javame/nfc/ Applications using Contactless Communication API usually follow the flow demonstrated below. Fig: Typical flow of a Contactless Communication Application Each of the steps are explained below. The first step is basically for the application to query the implementation to discover the supported targets by the device. Here the application registers a target listener to receive activity notifications for each of the supported targets. On the other hand the application registers with the PushRegistry for the activation due to target activity. The supported target activities are NDEF and secure element in card emulation method activities. When the targets come in to proximity they are discovered by the implementation, which notifies the application by invoking the right activity listeners. On the other hand PushRegistry activates the MIDlet. The application can learn the target properties for each of the discovered target. The application can be connected to read, write, exchange data with the discovered agent. When the job is done the application releases the resources. Design This phase will produce outline of the system architecture and the prototype of the application that will satisfy all requirement analysis. In this stage all the necessary input, user interface and process will be identified. This phase also determines the application architecture which will show how to transform the logical design in to basic system coding to generate the first prototype of the system. The result of this phase is application interface and system design specification. This research proposed an outline for student’s attendance monitoring system using RFID technology. Implementing this kind of system will maximize lecture time and provide convenience to them. This application uses Nokia 6212 NFC mobile as a RFID reader and are placed at the entrance of the classroom. The MIFare RFID tags are attached to the student ID cards. A unique ID number is written to the tag. When the student scans the ID card through the reader range at the classroom, the reader sends the tags unique ID numbers to the computer via Bluetooth. Description: A framework includes the hardware of the system, and describes how it works. However, the reader must be placed at the entrance of the classroom to read the student ID cards (Tags) of every student who attends classes. This proposed research mainly contains four components which are discussed below. The reader: RFID reader is responsible for communicating with the tag and it uses radio waves to retrieve data from the tag. The tag: RFID tag is an integrated circuit which is embedded on the student ID cards. This research proposes to use passive tag, which does not need any battery. This type of tags gets it power from the reader. Software Development process: This software application uses Contactless Communication API (JSR-257) which comes with Software Development Kit for Nokia 6212 NFC mobile phones. Nokia 6212 NFC SDK allows the users to develop Java applications (MIDlets) for Nokia 6212 NFC mobile phones. The contactless communication API mainly gives access to many contactless cards and communicates with them. Some of the use cases of Contactless Communication are calling a taxi by touching tag given by the taxi company and linking to a web page by touching a smart poster. In order to discover and communicate contactless targets, the applications should use classes and interfaces of this API. The contactless cards which pass through in the radius of NFC device can be recognized by any instance of DiscoveryManger class to receive notification. Then the device can set up a target particular connection defined in the subpackages with the detected target. The link required to open connection to the target device is given in the TargetPr operties parameter. For example, for an external smart card it can be ISO14443Connection. Access and modification of data is provided by the methods of this connection. The data exchange format (NDEF) allows communication between an NFC device and another NFC device or with a tag which is defined in the NFC forum. Any device that supports NDEF data formatting is capable to communicate by using APDU (Application Protocol Data Unit) commands given by the Contactless Communication API. Record Type Definitions (RTD) which is supported by the NDEF defines the rules and formats for creating standard record types to be used by NFC Forum application definitions and offers users to create fully compatible applications. The four specific RTDs defined by NFC Forum are: NFC Text RTD: In this method by using NDEF format and RTD mechanism which allows storing text strings in multiple languages. An example of using this specification is integrated in the Smart Poster RTD. NFC URI RTD: Like the above method this technique also uses NDEF format and RTD mechanism to Uniform Resource Identifiers (URI). An example of using this specification is included in the Smart Poster RTD. NFC Smart Poster RTD: This method allows SMSs, URLs, phone numbers on an NFC tag, or to transport them between the devices. The Smart Poster RTD establishes on the RTD mechanism and NDEF format and uses the URI RTD and Text RTD as building blocks. NFC Generic Control RTD: This method offers a simple way to request a specification to an NFC device (destination device) from another NFC device, tag or card (source device) trough NFC communication. The class diagram that shows the relationships of Contactless Communication API. Application Development: Programming Languages and Software Tools: Development Environment: Microsoft Windows XP (SP2) Eclipse pulsar 1.3.2 JDK 1.6 Nokia 6212 NFC mobile phone Mifare 1k or 4k tags Nokia connectivity frame work 1.2 Nokia 6212 NFC SDK 1.0 Apache Tomcat Server 6.0 Developing Application Tools: Java: According to Gosling, et. al. (2005), Java is a high-level object-oriented language produced by Sun Microsystems. Java is operating system independent since it uses Java Virtual Machine to interpret and execute the previously compiled code in different environments producing the same output. I have chosen Java technology as programming language to carry out this project. I have chosen Java technology as programming language to carry out this project. During this project i have used Java Standard Edition Development Kit 6 (JDK 1.6), the Java Standard Edition Runtime Environment (JRE 1.6) and Java Micro Edition with the Software Development Kit 3.6 (Java ME SDK 3.6) which also includes Java Wireless Toolkit 2.5.2. J2ME: According to Shenbagaraj, (2011), J2ME is called as Java to Micro Edition. It is an advance technology in java, developed with the help of Java Community Process Program. J2ME is specifically designed to operate within the limited resources available in the embedded computers and microcomputers and it is a low version of Java API and Java Virtual Machine. The J2ME mainly targeted the developers of small computing devices and intelligent wireless devices who want to incorporate cross-platform functionality in their products. The main advantage of using J2ME is compatible with all java enabled devices. The java enabled devices are Nokia, Motorola and Panasonic. J2ME application acts as a balanced application between local and server-side processing. MIDlet: According to Shenbagaraj, (2011), A MIDlet is a J2ME application which operates on an MIDP. A MIDlet can be defined with at least a single class that is derived from javax.microedition.midlet.MIDlet abstract class. A MIDlet can be called as a event-based application. All the routines that are executed in the MIDlet are initiated in response to an event reported to the MIDlet by the application manger. The application manger invokes startApp() method when the MIDlet is started. The startApp() method in a MIDlet contains a statement holds a statement that displays a screen of information and informs the user to enter a selection from the list of the list of options provided. A Command object is used to inform the user with a selection of options to opt from when the screen is displayed. Each screen should have a CommandListener. A CommandListener follows the user events with a screen and makes the right code to execute on the current event. Java Libraries: According to Sun. (2006), A java library can be referred as a set of resources required by a project. Typically a library contains one or more JAR files containing compiled classes, the source file required to debug the classes, and java documentation for the classes. A project can reference one or more libraries for the purpose of compiling java files or additional JAR files in the deployed application. In IDE the Library Manager allows you edit and create libraries. I have used few libraries which are downloaded from internet and added to the code to fulfil the requirements of the application. These libraries or APIs that communicate with some of the specific elements or implementations that have been used during the project development. They are BlueCove (JSR-82): According to BlueCove, (2008), BlueCove is a Java library for Bluetooth (JSR-82 implementation). This library currently interfaces with the WIDCOMM, BlueSoleil and Microsoft Bluetooth stack found in Windows XP SP2 or Windows Vista and WIDCOMM and Microsoft Bluetooth stack on Windows Mobile. BlueCove offers JSR-82 java interface for the following profiles: SDAP – Service Discovery Application Profile RFCOMM – Serial Cable Emulation Protocol L2CAP – Logical Link Control and Adaptation Protocol OBEX – Generic Object Exchange Profile (GOEP) profile on top of RFCOMM and TCP UploadBean: This API simply reads and stores the uploaded files sent the browser. It is a technical component that can be integrated in any Java/JSP/Servlets application. Servlet: According to Stephanie. (2002), A servlet is a java programming class which is used to extend the facilities of servers that hosts applications accessed through request-response programming tool. The servlets give response to any type of request and these are normally used to extend the applications hosted by the web servers. Java servlet technology usually defines HTTP specific servlet classes. JSP: According to Stephanie. (2002), Java Server Pages (JSP) technology is used to create web content that has both static and dynamic components. JSP technology provides a normal approach to create static content. JSP presents all the dynamic capabilities of Java Servlet. The main advantages of JSP technology are: A language for developing JSP pages, which are text based documents that illustrate how to process a request and construct a response. Techniques for defining extensions to the JSP language. Constructs for accessing server side objects. Developing platform: Eclipse: According to Bob, (2008). Eclipse is a software development platform developed in java and mainly used to develop java applications. It provides an IDE and a complete set of plug-ins. In eclipse except the eclipse kernel, everything is treated as a plug-in. This plug-ins expand the application features and permits the developers to program in different languages like C, C++, and COBOL etc. This also includes management of databases, extending network capabilities, creating web services etc by using eclipse’s interface. In total the Eclipse Plug-in central has gathered more than 1200 different plug-ins for eclipse, some of them are developed by third parties and released to the community. In this project, I have used EclipseME plug-in which helped in developing J2ME Midlets and Suite projects, supports J2ME emulators and offers JAD editor as well as connecting to the already installed wireless toolkits. Apache Tomcat Server: Apache Tomcat Server is free open-source software from Apache Software Foundation (ASF). It can be defined as a container where java Servlets and Java Server Pages (JSP) files are placed and afterwards invoked. In this project i have used Tomcat 6.0 version and made use of configurations. Management Console: The management console offers a web interface where the parameters of the developed application can be configured. It consists of JavaServer pages, which are hosted in the Tomcat server. The web interface comprises of four different tabs through which the user can be capable to establish the parameters’ values. Nokia PC Suite: Nokia PC Suite is a group of applications that permit connecting Nokia mobile phones to computers. Basically it is used to transfer pictures, music or applications. This application is used in the project in order to send the developed Midlets to the NFC-enabled phones through Bluetooth. References: Ching, H.- H., Shih, C.-C., Chia, H.-Y., Jong, H. –P. (2009)Alleviating reader collision problem in mobile RFID networks. Proceedings at Springer-Verlag London Limited, pp.489-497. Johansson, B.(2004) An Introduction to RFID – Information Security and Privacy Concerns, TDDC03 Projects. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.111.5602rep=rep1type=pdf Simson. G, and Henry, H.(2005) UNDERSTANDING RFID TECHNOLOGY. garfinkel.book, 15-36. [Online] [Assessed on 2nd June 2005] Available from: http://ptgmedia.pearsoncmg.com/images/0321290968/samplechapter/garfinkel_ch02.pdf Raine. K, Tommi. K, and Jouni I.(2009) Remote Identification and Information Processing with a Near Field Communication Compatible Mobile Phone. Proceedings at International Conference on Computer Systems and Technologies – CompSysTech’09 Mark. M and Elmarie. B. (2010) Integrated Security Framework for Low Cost RFID Tags. ACM 978-1-60558-950-3/10/10 Al-Ali, A.R. Fadi, A. Nada, R. Amin, A. Al-Zarouni, Nassar, H. (2008) Mobile RFID Tracking System. Available from: http://www.aloul.net/Papers/faloul_ictta08.pdf Khoovirajsingh. S, Enrico. R, Robert. H, Paul. H. (2009) Touch Connect and Touch Select: Interacting with a Computer by Touching it with a Mobile Phone. Computing Department, Lancaster University, UK: ACM 978-1-60558-281-8. [Accessed 15th September 2009]. Available at: http://delivery.acm.org.ez-proxy.unv.wlv.ac.uk/10.1145/1620000/1613905/a36 seewoonauth.pdf?key1=1613905key2=1417853031coll=DLdl=ACMip=134.220.2.101CFID=17640379CFTOKEN=61603121 Gregor, B. Wolfgang, R. Paul, H. Matthias, W. (2011) Design and Evaluation of Techniques for Mobile Interaction with Dynamic NFC-Displays. ACM 978-1-4503-0478-8/11/01. [Accessed 26th January 2011]. Available at: http://delivery.acm.org.ez-proxy.unv.wlv.ac.uk/10.1145/1940000/1935743/p205-broll.pdf?key1=1935743key2=6866853031coll=DLdl=ACMip=134.220.2.101CFID=17640379CFTOKEN=61603121 Enrique, C. (2008) An Introduction to Near-Field Communication and the Contactless Communication API. Available at: http://java.sun.com/developer/technicalArticles/javame/nfc/ Bogdan, C. Murali, R. Mehmet, K. Suresh, J. (2008) Efficient tag detection in RFID systems. J. Parallel Distrib. Comput. 69 (2009) 180_196. [Accessed 8th July 2008]. Available at http://compbio.case.edu/koyuturk/publications/carbunar_jpdc09.pdf Nokia Corporation, (2008) Nokia 6212 classic user guide. Available at: http://nds1.nokia.com/phones/files/guides/Nokia_6212_classic_UG_en.pdf Cynthia, Kuo. Walker, J. and Perrig, A. â€Å"Low-cost Manufacturing, Usability, and Security: An analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup,† 2007 [Online]. Available at: http://sparrow.ece.cmu.edu/group/pub/kuo_walker_perrig_simple.pdf [Accessed: Sep 7, 2009] Melchiorre, G. Pishvazadeh, Y. Wechter, J. Zarit, M. (2003). ‘Community Benchmarks Program The Maxwell School of Syracuse University’. Available at: http://www.maxwell.syr.edu/uploadedFiles/paf/benchmarks/Southwest.pdf?n=3275 Wang, F. Liu, P. (2005). ‘Temporal management of RFID data’, Proceedings at: 31st VLDB Conference, Trondheim, Norway, 2005. Nokia Corporation, (2008) Nokia 6212 Classic: Brings together Visa and Nokia for RFID enabled services. Available at: http://www.rfidweblog.com/50226711/nokia_6212_classic_brings_together_visa_and_nokia_for_rfid_enabled_services.php Mary, C. (2005) RFID Takes Attendance—and Heat. Available at: http://www.rfidjournal.com/article/articleview/1408/1/1 Shenbagaraj, (2011) Introduction to J2ME. Available at: http://www.javabeat.net/articles/27-introduction-to-j2me-1.html James, G. Bill, J. Guy, S. Gilad, B. The Java Language Specification Third Edition. Available at: http://java.sun.com/docs/books/jls/download/langspec-3.0.pdf BlueCove, (2008) BlueCove. Available at: http://bluecove.org/ http://www.javazoom.net/jzservlets/uploadbean/uploadbean.html Stephanie, B. (2002) The J2EE Tutorial. Available at: http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/Servlets.html Stephanie, B. (2002) The J2EE Tutorial. Available at: http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/JSPIntro.html Bob, K. (2008) Eclipse: Java EE Applications Made Easy. Available at: http://www.spidertg.com/cmsv5/images/stories/eBook_Libarary/Developer/Java%20EE%20Applications%20Made%20Easy.pdf NXP, (2007) NXP Type MF1K/4K Tag Operation. Available at: http://www.nxp.com/documents/application_note/AN130411.pdf How to cite Nokia and the RFID student attendance monitoring system, Essay examples

Friday, December 6, 2019

Finance Assignment

Questions: Calculate the Net Present Value and Internal Rate of Return relative to the purchase of a new widget making machine. Machinecost $3,400,000 Useful life: 7 years For tax purposes a 30 per cent reducing balance depreciation would be used. Maintenance cost per annum: $75,000. Maintenance technician salary per annum: $125,000 Operators salary: $90,000, plus 35 per cent on-costs. Restructuring cost (First year only): $180,000. Employee training costs are projected as follows: First Yearà ¢Ã¢â€š ¬Ã¢â‚¬ ¹Ãƒ ¢Ã¢â€š ¬Ã¢â‚¬ ¹$35,000 Second Yearà ¢Ã¢â€š ¬Ã¢â‚¬ ¹Ãƒ ¢Ã¢â€š ¬Ã¢â‚¬ ¹$25,000 Third Yearà ¢Ã¢â€š ¬Ã¢â‚¬ ¹Ãƒ ¢Ã¢â€š ¬Ã¢â‚¬ ¹$10,000 Increase in working capital required: $60,000. Salvage value: $75,000. Manufacturing cost savings per annum: $1,200,000. Sale of now obsolete equipment over the next two years. Answers: Calculation for Depreciation Present Value Depreciation Amount Value After Depreciation $ 3,400,000.00 $ 1,020,000.00 $ 2,380,000.00 $ 2,380,000.00 $ 714,000.00 $ 1,666,000.00 $ 1,666,000.00 $ 499,800.00 $ 1,166,200.00 $ 1,166,200.00 $ 349,860.00 $ 816,340.00 $ 816,340.00 $ 244,902.00 $ 571,438.00 $ 571,438.00 $ 171,431.40 $ 400,006.60 $ 400,006.60 $ 120,001.98 $ 280,004.62 For the Cash Flow Series NPV= $-1,661,329.48 IRR = 0% Cash Flow Stream Detail Period Cash Flow Present Value 0 -3,400,000.00 -3,400,000.00 1 -416,500.00 -378,636.36 2 139,500.00 115,289.26 3 368,700.00 277,009.77 4 528,640.00 361,068.23 5 633,598.00 393,414.51 6 707,069.00 399,122.02 7 1,113,503.00 571,403.10 NPV -1,661,329.48 IRR 0%

Monday, November 25, 2019

After the Civil War essays

After the Civil War essays Everybody was wondering what the national government is going to do about the seven Lower States. But, of course the President (Buchanan) did nothing at all. Politicians were thinking about a compromise with the South, but a lot of people supported compromise that much anymore. The South needed a recommendation to allow them to gain peace. Northern business people feared the South for leaving the Union. For what would the Union be if people could come and go as they pleased. Stephen Douglas supported this option. Lincoln thought what the South was doing was wrong. He felt the need to go by his responsibility to the United States to enforce the laws. And in this responsibility, Lincoln took an oath of office, swearing, to Apreserve, protect, and defend the constitution of the United States.@ A federal fort in the harbor of Charleston, South Carolina Fort Sumter caught the nation=s attention. Major Robert Anderson and a several dozen federal soldiers were running out of supplies from a federal supply ship that out turned around by Confederate forces. Thanks to Lincoln, the fort did not have to surrender for he resupplied the fort. Lincoln, on April 6, was sending provisions (extras) to the fort. Confederate president Davis ordered General P.G.T Beauregard to take over Fort Sumter before the supplies got there. April 12, 1861, Anderson refuesd to surrender. Beauregard started shotting. After 24 hours, Anderson surrendered Fort Sumter. Lincoln felt he had a responsibility to respond, and he called out for volunteers. Southerners saw it as a treat to war. Virginia, North Carolina, Tenesse, and Arkansas were the Upper South. Between the borders of the Upper South and the Lower South were torn between two nations. Second War for Independence was the name of the war to some Southerners. This war didn=t win Independence in the South. Neither the North or the South could of predict what would happen. They both thought they were going to teach...

Thursday, November 21, 2019

Explain a paragraph from Ciceros Invention Essay - 1

Explain a paragraph from Ciceros Invention - Essay Example In narration, the arguments to be developed in court are properly articulated through bring out the vulnerability of Sextus Roscius and how the court has the obligation to protect him from further abuse by the society. In confirming the case, Cicero indicates the importance of his arguments when he highlights the need of protecting innocent men fort the good of the society. In chapter 149 Cicero is able to use rhetorics to create relationship between emotions and justice. His rhetorics is morally grounded and incorporates the moral problems that emanate from society’s emotional manipulation (Cicero 126). As a lawyer, his choice of words is aimed at making and directing the audiences minds and emotions towards a certain conclusion. Ability to apply Sextus Roscius plight to the entire community indicates flexibility of the course of justice he wishes to pursue. The final sentiments in the chapter are emotional arouse sympathy and motivate the audience when he speaks of the harm the society would be exposed to if justice was to be taken into peoples

Wednesday, November 20, 2019

Understanding School Business Management Essay Example | Topics and Well Written Essays - 4500 words - 1

Understanding School Business Management - Essay Example ate motivation and desire to work; and (6) exhibiting strong conformity to abide by policies, procedures, standards, and codes of conduct (CPD Framework, n.d.). However, there apparently were areas of improvement in the following facets: (1) responding and reacting to unexpected behavior; (2) resolving conflicts and challenging problems; and (3) taking into account the need to provide feedback to assist in improving work-related concerns. After undertaking the learning styles diagnostic, the results revealed that I exhibit the accommodating style, consistent with Kolb’s learning theory (Honey & Mumford, 2006). Said style is a collaboration of two preferred styles, concrete experience (CE) and active experimentation (AE). As described, â€Å"the accommodating learning style is hands-on, and relies on intuition rather than logic. These people use other peoples analysis, and prefer to take a practical, experiential approach. They are attracted to new challenges and experiences, and to carrying out plans† (Honey & Mumford, 2006, p. 1). Results of the suitable time management diagnostic assessment revealed that I am a competent time manager (Business Training Works, Inc., 2015). I am aware of schedules and abide by complying with reports on time. Likewise, I am also cognizant of the tasks and responsibilities of others and try to adapt to their schedules when seeking assistance or accommodations. I am a disciplined person who needs little supervision, Moreover, I rarely procastinate and know how to prioritize tasks according to urgency and relevance. I also rarely miss deadlines and I anticipate the needs to aptly prepare for undertaking endeavors. Concurrently, there are weaknesses in terms of evaluating time spent on addressing crises, conflicts, and challenges. From the diagnostic tools on managing self and personal skills, learning styles, and time management, it was evident that I possess the following strengths: (1) competence in time management, (2)

Monday, November 18, 2019

Life of a Prisoner in the Soviet Gulag and Nazi Death Camp Systems Essay

Life of a Prisoner in the Soviet Gulag and Nazi Death Camp Systems - Essay Example One of the notable things about Solzhenitsyn’s work is that there is little that truly occurs in the book. The novel tells the details of a day, slowly and methodically, so that the mundane nature of life in a prison is revealed. Although there is some discussion of punishment and the cruelty of living in the Gulag, it is the monotony and the long day that has the most impact. Through the oppressive atmosphere and the indignity of being given no trust through constant searches and counting of the inmates, there is a sense of being held in place, that feeling permeating the whole work in a way that portrays a realistic feeling of being in prison. In contrast, the life that Levi Primo describes is filled with hardships that are terrible and not mundane. Each new indignity pushes him toward the next lowered level in which he must re-establish some sense of humanity into his life. The strongest concept that creates the biggest differences in the experiences that are described is t hat in the Gulag, while life is harsh, there does seem to be some hope that the next day will come, and that finally the protagonist will be released from his imprisonment. In Auschwitz, on the other hand, there is the pervading sense that there will be only death at the end of the journey. Hope is a much more precious commodity as the descriptions of the daily life is defined by the knowledge. The low level of human conditions emphasized the lack of respect for basic human existence that was provided in this terrible place.

Saturday, November 16, 2019

Agritourism And Rural Development Economics Essay

Agritourism And Rural Development Economics Essay There are several evidences for agritourisms contribution for rural development from various countries. Not only in developed countries, researches in developing countries have also discovered many findings regarding this phenomenon as agritourism has the ability to open up alternative income sources for the farmers as well as for the surrounding community. As it is a people-oriented industry, agritourism can offer many jobs which can help to revive rural economies. Agritourism has different ways and means of assisting rural development and has ability to influence the economic, socio-cultural and environmental enhancement of some societies. 3.3.1 Agritourism and rural development in developed countries There are many significant studies in developed countries related to agritourism and rural development. As per the study of Haghiri and Okech (2011) on role of the agritourism management in developing the economy of rural areas in the province of Newfoundland and Labrador, Canada, in rural development, agritourism acts as a solution for the problem of poverty by giving economic opportunities for the farmers. They have mentioned that the promotion of tourism and agritourism activities is one way to help develop the economy of rural areas in the province that is facing a series of challenges, such as small internal markets; shifting socio-demographics; lack of sufficient investments; the high rate of out-migration; diseconomies of scale; and the underdeveloped economic infrastructure for the time being. Further, they have identified three alternatives as starting the production of new products; organic fruits and vegetables, specialized livestock products like sheep, goats, fur, emu, r abbits, etc., farm-based food products, such as bread, jams and jellies, and handmade crafts and enhancing the existing tourism products and also developing new markets in Newfoundland and Labrador, other provinces of Canada, and international countries. In Bahamas, agritourism use forward linkages with agriculture and tourism by direct selling of agricultural products and services to the visitors and also backward linkages such as indirect approach using an intermediary to provide products to the tourism sector. These activities improve the income of farmers and finally helping for the rural development (Hepburn, 2008). Schmitt (2010) has done a study on the farming womens agency, coping strategies, visions and wishes against the dynamic changes of the agricultural sector in the Franconian Jura in northern Bavaria, Germany. While agritourism has become an important permanent livelihood strategy for some farming families, it remains an additional income for others. Either way, it has turned out to be a source of womens growing self-confidence as well as a sustainable ingredient of regional development. (Refer Mortan 2006 See End note) Agritourism in Italy has been able to conduct broad and innovative product range, sophisticated Marketing systems and most importantly, extensive government supports. The Italian system was developed with a clear objective in mind: To halt rural out-migration by keeping farmers on the land (Porcaro, 2009). As per Choo, (2012) agritourism can give farmers an opportunity to generate additional income and to be an avenue for direct marketing of the farm products to consumers. It can also help counteract social and economic problems of the farms and local residents (loss of income, increased expenses, globalization, and others (associated with the decline of traditional agriculture industries). While the financial advantages with respect to employment and wages are clear, agritourism development can also enhance the local quality of life. It can serve as an important source of tax revenues, which may lead to higher public services and lower local tax rates. Agritourism can also support conservation of local culture and traditions, helping to maintain the viability of small-scale agriculture (Choo, 2012). In Turkey it was declared that agritourism is strongly supported as one of the rural development strategies. A number of agritourism enterprises are developing at local level with volunteer initiatives using the desires of local people and local administrations that want to benefit from the facilities of agritourism in Turkey. For example in, Karaburun and Ankara Villages, agritourism services such as accommodation, tasting and buying local foods by the urban people and administration to find extra income for them (Topcu-2007). Also, the BuÄÅ ¸day Associations Ecological Farm Holidays project (Ta-Tu-Ta Project) in Turkey is a cooperative project conducted by volunteer farmers and non-governmental organization targeting to encourage ecological lifestyle. This project stated that farmers benefit from agritourism by producing and selling of organic products to the visitors. Agritourism aids rural economic development by providing alternative use of farmland, increasing revenue of on-farm activities, improving business sustainability, and bringing economic revenue to rural areas both on-site and near the operation. Agritourism also has the potential for informal agricultural education between the owner/operator and the general population which has little to no direct contact with agriculture (Jolly and Reynolds, 2005). A study of Nasers, (2009) in Iowa UAS found that the promotion of agritourism provides a beneficial relationship for local food systems as it helps to enhance the appeal of local foods. In order to challenge and rearrange the modern agri-food system, Local food has become the social movements unifying theme. In contrast, the local food paradigm highlights the importance of food quality and freshness, environmental protection, an individual connection to family and small scale farms, economic multiplier effects which occur when making local purchases and community self-reliance (Ostrom, 2006, p. 66). The demand for fresh produce continues to grow, offering producers the opportunity to increase their profits through direct marketing. Direct marketing provides a link between consumers seeking high-quality produce and producers who are seeking an opportunity to compete in the produce industry (Kuches et al.). In addition to linking the consumer to the producer, direct marketing allows th e producer to bypass the traditional distribution network and earn a greater share of profits (Kuches et al.). As a form of direct marketing, agritourism creates opportunities for the producer to link with their consumer and directly market their products. Moreover, Agritourism is increasing rural vitality and stimulating new economic opportunities through the diversification of farm operations and increased revenue on-site and near the operations in Iowa (Norby and Retallick, 2012). Twe (2010) have reported that agritourism is increasingly being adopted in the United States as it gives a myriad of economic and intrinsic benefits to farmers, visitors and communities, keeps family farms in business and preserving American agricultural heritage, maximizing the productivity of farmland resources through their recreational use, and even improve the economic situation of local communities. Also agritourism is suggested to increase farm revenues and serve other farmer goals (Ollenburg and Buckley, 2007; McGehee and Kim, 2004; Nickerson et al., 2001). Farms that diversify into agritourism are likely to utilize existing resources or other low-input options (Fisher, 2006). Additional economic support for the farm business is especially important in the current time due to increased land values and agricultural input costs (Salamon, 2003; Busby and Rendle, 1999; Ilbery, 1991). Agritourism generally activates as a small family enterprises, so its both socially and economically profitable. Also Agritourism assists to mitigate emigration from remote areas and generate profit by diversifying economy. The cultural exchange of development with urban and rural areas adds quality to their life (Monica Iorio and Andrea Corsale, 2010). According to Gale, (2006) rural tourism enterprises provide novel sources of income for families living in remote areas. 2002, Sharpley (2002) has said that agritourism can offer job opportunities for rural people in local crafts and wine making sectors to provide additional income. Agritourism helps repopulation of rural areas, improvement of the public services, revitalization of local crafts and to increase opportunities for social contacts and exchange. Developing and organizing agritourism requires a significant investment though potential investment is less. (Sharpley, 2002). Agritourism positive educational force stimulates a thirst for knowledge of the outside world, encouraging entrepreneurial activity, providing extra income, generating new forms of employment, creating new patterns of travel or setting up potentially negative demonstration effects, modifying culture and major economic leakages through transnational involvement (Hall, 1998). A study of Beglaryan, (2011) on Development of Agro tourism in Armenia, agritourism provides the opportunity to increase the potential for  higher  margin,  on-farm  sales  and value  added  products  and  services.   Because most Armenian farms are operated by small landowners, there is great o pportunity for customization and uniqueness in agritourism attractions. Theoretically there is a strong relationship between agritourism and rural development. It is believed that agritourism can contribute for the agriculture rural development in several ways (Wicks and Marret 2003; Bruch, 2008). However, to fulfill this condition, several other requirements and conditions are crucial. For example, Danish Food Industry Agency, has paid attention on barriers and structural shortcomings exist before focusing towards the potentials of development of farms which are in need of diversifying the business, and their economic support possibilities. Most importantly, the advices from the consultancy structures of the agricultural associations and from regional and national tourism development bodies and possible networks for green/farm/rural tourism operators are needed in order to gain the full potential of Denmarks rural tourism. (Nielsen,Aae Nissen and Just, 2010). With most agricultural producers in Miami-Dade County experiencing increased pressure by developers to sell their lands, rising operating costs, and stagnant or declining profit margins for most of the major agricultural commodities, agritourism is a possible way to assist with preserving agriculture and open space and contributing to the longer- term economic variability of farm operations. Moreover, while the benefits of agritourism are vital to the individual producers, the benefits go much further with multiplier effects can have major impacts on the local economy (Evans and Hodges, 2006). The literature review indicates that agritourism can provide farm operators and rural communities with many benefits such as: Generating secondary income for farm operators Preserving the visual and cultural rural landscape (Williams and Shaw, 1996; Luloff et al., 1 995; Turner and Davis, 1993); Reducing out migration by providing jobs (Friesen; 1995; Ryan, 1995; Turner and Davis, 1993; Demoi, 1983).; Bringing a transfer of ideas from urban to rural areas (Oppermann, 1996); Providing urban people with an experience of rural living (Lowry, 1996; Reid et al., 1993); Diversifying the rural economy (Lowry, 1996; Ryan, 1995; Maude and van Rest, 1985); Creating eventual market contacts with urban centers (Agricultural Land Commission, 1997; Bowen et al., 1991 ; Demoi, 1983); Making provisions for certain infrastructure (Bowen et al., 1991); and Enhancing the rural identity of communities and emphasizing the importance of agriculture in local areas (Luloff et al., 1995; Ryan, 1995). Therefo re, it is significant that most of the evidences are from developed countries and only a few are from developing countries. Agritourism is accepted by various countries in the world as a rural policy to create rural viability. Agritourism is one of the most diversifying tourism types and the entrepreneurship is highly in need of its success since it plays a major role there. This diversification has converted the agritourism into a strong sector in its rights from being an auxiliary commercial activity (Busby and Rendle 2000; Clarke J. 1998). 3.3.2 Agritourism and rural development in developing countries When agritourism studies of Asia is concerned, only a few can be identified. For example, Utama (2007) has studied on economic, social and environmental benefits the local community enjoys from agritourism and the demand for this industry among tourists in Bali, Indonesia. The aim of the study was to formulate the best strategies to innovate and build up agritourism on Bali. Based on the study, he has found that increase in income of agritourism farmers and job opportunities for local residents, creating networks to strengthen regional or local structures, multiplier effects for small-scale direct investments, diversity increment of economic activities, stimulating physical infrastructure development, increasing the awareness of the importance and value of an area, such as its nature and culture, landscape and the economic potencies and also developing the infrastructure in order to bring about opportunities for other economic development activities. Furthermore, creation of working fields for the local communities through generating related tourism businesses, enhancing the values of the village that contributes for the forms of agricultural product improvements, stimulation of development of other related tourism enterprises such as restaurants, accommodations and handicraft shops, uplifting the social statuses of the local communities in order to reduce poverty, decrease unemployment and also to diminish urbanization though environmental conservation are sustainable tourism development indicators that contributed towards the development of agritourism in Bali. Increasing the arrival of tourists and creating economic incomes are some other contributions that play the key roles of agritourism in applying the sustainable tourism development in Bali. Furthermore, agritourism has contributed lots to the improvement of economy lives of the local communities in the forms of agricultural products sales, various of hand-made souvenirs or handicrafts sold for the tourists, chances to establish food stalls or restaurants and certain types of accommodation such as home-stay, bungalow, villa, and hotel, as well as village development. With respect to economy improvement, the stakeholders predominantly agree that increasing agricultural products are the most contribution generated from agritourism development with mean of 3.97. Moreover, agritourism has contributed toward improvement of social situation. There are three indicators which empower the potency of agritourism development such as poverty alleviation, decreasing the number of unemployment, and declining the urban. The stakeholders mostly agree that the Agritourism enables to alleviate poverties and decrease the unemployment since it provides work opportunities which can help to i mprove the quality of the villagers lives. Not only that, Agritourism has highly played a role in applying sustainable tourism development in Bali. Stakeholders predominantly have agreed that the agritourism development contributes toward nature conservation as one of the important goals of sustainable tourism (sustaining nature, social life, and culture, as well as generating income for the local societies) (Utama, 2007).   In Malaysia, according to the study of Tiraieyari and Hamzah, (2011) on Agritourism: Potential opportunities for farmers and local communities, agritourism has made a vital economic contribution to rural areas and communities though providing local residents with additional sources of income, diversifying the economy and lending prestige to rural life. It enables many to experience a novel form of travel and leisure, to gain new awareness and a positive attitude towards other worlds, towards the environment and towards local people and their culture. According to Said et al (2012) at Kampung Semarang village in Malaysia, agritourism is helped to enhance the agricultural value of the farms and livestock. It is also to promote the village as a new agri-based tourism destination, which would boost the standard of living amongst the farmers and villagers contributing for the local development. Also, Hamzah et.al., (2012) in their study on socio-economic impact potential of agritouris m activities on Desa Wawasan Nelayan community living in Peninsular, Malaysia have concluded that agritourism has the potential of rising the consciousness of the community about sustainable development as agritourism is helping to enhance the social empowerment, strengthen the community, diversify and intensify economic activities, provide job opportunities and alleviate poverty in that community. Agritourism has arisen as an important rural development strategy in Korea. The rural development program named rural theme village in is mainly based on agritourism activities. Seong-woo and Sou-yeon (2006) have studied on this program and found out that agritourism has enabled to rediscovering the values of rural resources that have been disregarded in the modernization procedure of the national economy. And also, it has given insights to both farmers and policymakers to adopt a broader perspective than hither to agricultural product oriented attitude of rural development. In Thailand, Srisomyong (2010) found out that agritourism operators have revaluated and tried to utilize all their resources to be fully of benefit from the growth of tourism. Some activities were rejuvenated or even invented. A main opportunity for agritourism operators appears to be agritourism brings a market to their site of production. It could also suggest that the significance of agritourism is most agritourism operators are local people. Revenue generated from them tends to be in a community, thus there has a small leakage of income. A study in the state of Haryana (India) has discovered that agritourism help to get employment opportunities, put hoarding on roadsides, sustainability for agriculture proper, various sources of income, help farmers to enhance their knowledge. As it is a new enterprise with less competition it is business activity as compared to traditional farming less land with low productivity can give more returns maintain natural resources as nutrient mining is less and soil conservation is good deforestations should be avoided no pollution problems to environment, improve health and it protects local heritage and culture (Shehrawat, 2009). Furthermore, Joshi and Bhujbal, (2012) in Pune in India have discovered that agritourism as an innovative form of rural tourism, in the context of rural market as it can positively influence regional development through generating large scale employment and additional income sources to the skilled and unskilled. Developing tourism in rural areas increases participation of the poor and brings wider benefits for the whole community. Also, it is a sustainable revenue generating product for rural market via inflowing resources from urban to the rural economy. It can prevent migration of rural people to urban by implementing this specialized form of rural tourism in rural market. According to Murangwa (2010) in India, agritourism is recognized as an essential part in the process of sustaining the economies. Agritourism is a key element of social and environmental responsibility of rural tourism which leads to rural diversification of economy in terms of development of infrastructure such as tourism facilities like restaurants and accommodation, water, electricity, roads, telecommunication and health centers as well as creating occupations in order to increase income of the local community As all these informations are taken into consideration, it can be concluded that agritourism is playing an important role in tourism sector and it has able to contribute for rural development in significant level in many contexts. The developing countries should therefore consider agritourism as emerging form of tourism that would undoubtedly lead to rural development as well as complementing other forms of tourism existing in their countries (Murangwa, 2010). Furthermore, in literature review, it was noted that agritourism is in a position to give better results under the favorable conditions especially where appropriate policies and programs are available. Therefore, suitable strategic plans are essential to minimize the negative impacts and optimize the positive impacts and to reach sustainable development in future. 3. 4. Chapter Summary Rural development is one of the main targets of many countries. Agriculture had been played a significant role in the rural development in the past. However, due to several reasons such as open economic policies and globalization and liberalization of agricultural trade, now agriculture sector of several countries have gone down. Moreover, lots of other problems like high cost of production, low productivity, lack of modern technology, marketing problems are also in the sector. Owing to this situation for a certain period of time, rural development was expected through modernization approach paying emphasis on rural industries. By now, it has failed and a latest rural development is again pay attention highly on agricultural development in a sustainable way. In this background, the main challenges are to find ways and means of save the agriculture sector and get the contribution of it for the rural development as agriculture is the main resource available in rural areas. Many studies have identified agritourism as an important alternative in this regard due to its special characters to rejuiniail the agriculture sector and the rural development. Therefore, research on agritourism and rural development will be important for Sri Lanka as it is an agricultural country.