Free Essay

Accident Avoidance and Victim Locating System

In:

Submitted By prashantmp
Words 4200
Pages 17
Abstract
In this technological revolution world, there is no time for anyone to know what is happening around them. They keep on moving without any care as they give importance to their work rather than others. Due to reduce in moral values one cannot get proper help when they need. This can be solved by this technology itself. Due to time laps many lives are in risk. To reduce this risk factor automatic accident detection and victim analysis plays an important role. Reducing the time laps will reduce the death rate. As reducing the time taken to take first aid will reduce the effect of accident on the victim. Probability of victim security will be more. As now a days mobile is common electronic gadget that is present with everyone and this problem can be solved by it only. By the short message service (SMS) on of the fetcher of mobile will help to solve this problem. By this embedded system we can know the place of accident, status of the victim etc. By this information rescue team will be easily help the victim. By using technologies GPS and GPRS one can easily locate the position of the accident. This project say the technologies that how an accident is detected and victim status. As prevention is better than cure, The main motive of this project is to reduce the accident rate and reduce the time for first aid. The proposed system ensures that to reduce the human death ratio by accidents.

Chapter 1
Introduction
In India, the World Health Organization (WHO) has revealed in its first ever Global Status Report on Road Safety that more people die in road accidents in India than anywhere else in the world, including the more populous China. Calling road fatalities an "epidemic" that will become the world's fifth biggest killer by 2030, the report said while rich nations had been able to lower their death rates, these were sharply on the rise in the third world. It said 90% of deaths on the world's roads occur in low and middle-income countries (21.5 and 19.5 per lakh of population, respectively) though they have just 48% of all registered vehicles. The statistics for India are chilling. At least 13 people die every hour in road accidents in the country, the latest report of the National Crime Records Bureau reveals. However, road safety experts say the real numbers could be higher since many of these accident cases are not even reported. "There is no estimate of how many injured in road accidents die a few hours or days after the accident," points out RohitBaluja, member of the UN Road Safety Collaboration and Commission of Global Road Safety representing Asia. Based on the records, India will become the world number 1 in Road Deaths due to the poor record of average 13 die every hour, which is 1.14 lakh per year. This will make India to be the first place. This causative information about the accidents is the intent to develop the proposed technology as scientific traffic engineering wings to reduce the fatalities due to accidents.

Objectives

The main objectives of this work are,
1. To Reduce the Human Death Ratio due to Road Accident in India. 2. If accident takes place, quick transmission of message to preconfigured contacts to intimate the victims.
3. To provide maximum assistance even in unpopulated area. 4. To incorporate the technology and make more versatile applications of defense& war fields.
This proposed methodology is the automatic system which will provide the solution for identifying the accident location. The physiological parameter is the vital information transmitted to the saved contacts spontaneously when the accidents occurred.

Motivation

When a traffic accident takes place, assisting injured passengers as soon as possible is crucial to minimize the negative effects on their health. Mortality from traffic accidents can be classified into three phases: Stage-1: It involves casualties in the first few minutes or seconds after an accident (about 10% of all deaths).

Stage-2: It is the first hour after the accident, the so called golden hour, has the highest mortality (75% of all deaths) and is the phase during which the highest death rate can be avoided by proper initial health care.

Stage-3: Happens days or weeks after the traumatic incident, has 15% of mortality, and takes hard work and a high amount of resources to reduce mortality As can be observed, the phase where more benefits can be achieved by reducing rescue response time is the second one. A fast and efficient rescue operation during the hour after a traffic accident significantly increases the probability of survival of the injured and reduces the injury severity.

Chapter 2
Literature Survey
The major problem in existing airbag systems have explosive firing, and have high contact forces resulting in head and neck injuries. Front bumper sensors can be used for both airbag deployment and pedestrian protection systems [1].
The work carried by Acharya D suggest, [2] the objective of their work is to develop a general purpose automatic emergency notification system for vehicles using various sensors that will monitor the vehicle and in the event of a crash, automatically report all possible information to the EMS providers.
Paper [3] reports the use of an automated collision notification device in vehicles that can greatly reduce the time between crash occurrence and notification of emergency medical services. An interpolated map of the sampled RSSI values suggests that cellular coverage in Erie County is adequate to support the automated collision network technology [3] & [4].
The work done by Hampton C. Gabler [5] reports on a research effort which seeks to dramatically reduce Emergency Medical Services response time by developing and testing an Automated Crash Notification System which automatically transmits the location and severity of a crash to EMS personnel. Dr. Chan Lee proposed a wireless token ring MAC protocol [6] for platoon vehicle communication, in which all participating vehicles formed a group and drove cooperatively.
Prof. Zing Xu [7] discusses a vehicle to vehicle Location- Based Broadcast communication protocol, in which each vehicle generates emergency messages at a constant rate. Message forwarding can help warning message reach vehicles beyond the radio transmission range. The authors propose a multi-hop broadcast protocol based on slot reservation MAC. Motion properties of vehicles are used to help with message relay. Two protocols to reduce the amount of forwarding messages were proposed. Rajesh Kannan Megalingam [8] suggested a method by using Accident Detection and Reporting System which can be placed in any vehicle used a sensor to detect the accident. The sensor output was monitored and processed by the PIC16F877A microcontroller. The microcontroller took decision on the traffic accident based on the input from the sensors. The RF transmitter module which was interfaced with the microcontroller would transmit the accident information to the nearby Emergency Service Provider. This information was received by the RF receiver module at the `service provider' control room in the locality. The service provider could use this information to arrange for ambulance and also inform police and hospital.
There are active efforts involving wearing special equipment when driving to detect driver distraction has been developed. Further, Kutila et al. proposed a camera vision system. The system is more suitable for in-vehicle environments compared to its predecessors; it did not take the presence of hand-held devices into account. The adverse effects of using a phone on driver’s behavior have been identified. These systems include Quiet Calls, Blind Sight, Negotiator, and Lindqvist’s systems. They assumed context information of the device and prior knowledge of the phone used by the driver [9].

Chapter 3
Hardware Description
3.1 P89V51RD2 Microcontroller :-

Fig 3.1.1 P89V51RD2 Microcontroller Development Board
3.1.1 Description
The main center part of the project is the microcontroller. Here we are using the 8051 based Philips P89V51RD2 microcontroller.
The P89V51RD2 are 80C51 microcontrollers with 64kB flash and 1024 B of data RAM. A key feature of the P89V51RD2 is its X2 mode option. The design engineer can choose to run the application with the conventional 80C51 clock rate (12 clocks per machine cycle) or select the X2 mode (six clocks per machine cycle) to achieve twice the throughput at the same clock frequency.
The flash program memory supports both parallel programming and in serial ISP. Parallel programming mode offers gang-programming at high speed, reducing programming costs and time to market. ISP allows a device to be reprogrammed in the end product under software control. The capability to field/update the application firmware makes a wide range of applications possible.

3.1.2 Block Diagram

Fig 3.1.2 P89V51RD2 Microcontroller Block Diagram 3.1.3 Schematic Diagram

Fig 3.1.3 Schematic Diagram
3.1.4 Features * 80C51 CPU with 5V operating voltage from 0 to 40 MHz * 64 kB of on-chip flash user code memory with ISP and IAP. * SPI and enhanced UART. * Four 8-bit I/O ports with three high-current port 1 pins. * Three 16-bit timers/counters. * Programmable watchdog timer. * Eight interrupt sources with four priority levels. * Second DPTR register * Low EMI mode (ALE inhibit) * TTL- and CMOS-compatible logic levels * Brownout detection * Low power modes * Power-down mode with external interrupt wake-up * Idle mode

3.2 Sim300 Modem With RS232 :-

Fig 3.2 Sim300 Modem With RS232

3.2.1 Description
This is a plug and play GSM Modem with a simple to interface serial interface. Use it to send SMS, make and receive calls, and do other GSM operations by controlling it through simple AT commands from micro controllers and computers. It uses the highly popular SIM300 module for all its operations. It comes with a standard RS232 interface which can be used to easily interface the modem to micro controllers and computers.

The modem consists of all the required external circuitry required to start experimenting with the SIM300 module like the power regulation, external antenna, SIM Holder, etc.

3.2.2 Features * Uses the extremely popular SIM300 GSM module * Provides the industry standard serial RS232 interface for easy connection to computers and other devices * Provides serial TTL interface for easy and direct interface to microcontrollers * Power, RING and Network LEDs for easy debugging * Onboard 3V Lithium Battery holder with appropriate circuitry for providing backup for the modules’ internal RTC * Can be used for GSM based Voice communications, Data/Fax, SMS,GPRS and TCP/IP stack * Can be controlled through standard AT commands * Comes with an onboard wire antenna for better reception. * Board provides an option for adding an external antenna through an SMA connector * The SIM300 allows an adjustable serial baud rate from 1200 to 115200 bps (9600 default) * Modem a low power consumption of 0.25 A during normal operations and around 1 A during transmission * Operating Voltage: 7 – 15V AC or DC (board has onboard rectifier).

3.3 ADXL335 :-

Fig 3.3 ADXL335

3.3.1 Description

The ADXL335 is a small, thin, low power, complete 3-axis accelerometer with signal conditioned voltage outputs. The product measures acceleration with a minimum full-scale range of ±3 g. It can measure the static acceleration of gravity in tilt-sensing applications, as well as dynamic acceleration resulting from motion, shock, or vibration.
The user selects the bandwidth of the accelerometer using the CX, CY, and CZ capacitors at the XOUT, YOUT, and ZOUT pins. Bandwidths can be selected to suit the application, with a range of 0.5 Hz to 1600 Hz for the X and Y axes, and a range of 0.5 Hz to 550 Hz for the Z axis.
The ADXL335 is available in a small, low profile, 4 mm × 4 mm × 1.45 mm, 16-lead, plastic lead frame chip scale package (LFCSP_LQ).

3.3.2 Features

* 3-axis sensing * Small, low profile package 4 mm × 4 mm × 1.45 mm LFCSP * Low power : 350 μA (typical) * Single-supply operation: 1.8 V to 3.6 V * 10,000 g shock survival * Excellent temperature stability * BW adjustment with a single capacitor per axis * RoHS/WEEE lead-free compliant.

3.3.3 Applications

* Cost sensitive, low power, motion- and tilt-sensing applications * Mobile devices * Gaming systems * Disk drive protection * Image stabilization * Sports and health devices.

3.4 Vibration Sensor :-

Fig 3.4 Vibration Sensor

3.4.1 Description

This sensor buffers a piezoelectric transducer. As the transducer is displaced from the mechanical neutral axis, bending creates strain within the piezoelectric element and generates voltages.

3.4.2 Specifications
The Vibration Sensor Detector is designed for the security practice When Vibration Sensor Alarm recognizes movement or vibration, it sends a signal to either control panel Developed a new type of Omni-directional high sensitivity Security Vibration Detector with omni-directional detection. * Sensitivity: Height adjustable * Consistency and Interchangeability: Good * Reliability and Interference: Accurate triggering strong anti-interference * Automatic Reset: Automatic reset is strong * Signal Post-processing: Simple * Output Signal: Switch signal * No External Vibration Analysis of Plates: Product design vibration analysis of the internal amplifier circuit * Detection Direction: Omni-directional * Signal Output: Switch signals * Operating Voltage: 12VDC (red V + shield V-) * Sensitivity: Greater than or equal 0.2g * Frequency Range: 0.5HZ ~ 20HZ * Operating Temperature Range: -10 ? ~ 50 ?

3.5 ADC0809 :- Fig 3.5.1 ADC0809 Board Fig 3.5.2 ADC0809

3.5.1 Description

The ADC0808, ADC0809 data acquisition component is a monolithic CMOS device with an 8-bit analog-to-digital converter, 8-channel multiplexer and microprocessor compatible control logic. The 8-bit A/D converter uses successive ap- proximation as the conversion technique. The converter features a high impedance chopper stabilized comparator, a 256R voltage divider with analog switch tree and a successive approximation register. The 8-channel multiplexer can directly access any of 8-single-ended analog signals.

The device eliminates the need for external zero and full-scale adjustments. Easy interfacing to microprocessors is provided by the latched and decoded multiplexer address inputs and latched TTL TRI-STATE outputs.

The design of the ADC0808, ADC0809 has been optimized by incorporating the most desirable aspects of several A/D conversion techniques. The ADC0808, ADC0809 offers high speed, high accuracy, minimal temperature dependence, excellent long-term accuracy and repeatability, and consumes minimal power. These features make this device ideally suited to applications from process and machine control to consumer and automotive applications.

Block Diagram Pin Diagram

Fig 3.5.3 ADC0809 Block Diagram Fig 3.5.4 ADC0809 Pin Diagram

3.5.2 Features

* Easy interface to all microprocessors * Operates ratiometrically or with 5 VDC or analog span adjusted voltage reference * No zero or full-scale adjust required * 8-channel multiplexer with address logic * 0V to 5V input range with single 5V power supply * Outputs meet TTL voltage level specifications * Standard hermetic or molded 28-pin DIP package * 28-pin molded chip carrier package * ADC0808 equivalent to MM74C949 * ADC0809 equivalent to MM74C949-1

3.5.3 Key Specifications * Resolution 8 bits * Total unadjusted error ±1/2 LSB and ±1 LSB * Single Supply 5V DC * Low Power 15mW * Conversion Time 100us

3.6 LM7805 Positive Voltage Regulator :-
3.6.1 Description
The LM78XX series of three terminal positive regulators are available in the TO-220 package and with several fixed output voltages, making them useful in a wide range of applications. Each type employs internal current limiting, thermal shut down and safe operating area protection, making it essentially indestructible. If adequate heat sinking is provided, they can deliver over 1A output current. Although designed primarily as fixed voltage regulators, these devices can be used with external components to obtain adjustable voltages and currents.

IN OUT 7805 GND
IN OUT 7805 GND

Fig 3.6.1 Schematic Diagram Fig 3.6.2 Pin Diagram
3.6.2 Features * Output current in excess of 0.5A * No external components * Internal thermal overload protection * Internal short circuit current-limiting * Output transistor safe-area compensation * Available in TO-220, TO-39, and TO-252 D-PAK packages * Output voltages of 5V, 12V, and 15V.

3.7 L298 Stepper Motor Drive :-

Fig 3.7 L298 Stepper Motor Drive

3.7.1 Description
The L298 is an integrated monolithic circuit in a 15-lead Multiwatt and PowerSO20 packages. It is a high voltage, high current dual full-bridge driver designed to accept standard TTL logic levels and drive inductive loads such as relays, solenoids, DC and stepping motors. Two enable inputs are provided to enable or disable the device independently of the input signals. The emitters of the lower transistors of each bridge are connected together and the corresponding external terminal can be used for the connection of an external sensing resistor. An additional supply input is provided so that the logic works at a lower voltage.
3.7.2 Features * Operating supply voltage of up to 46V * 4.5-7VDC logic supply voltage * Total DC current of up to 4A * Low saturation voltage * Over-temperature protection * Logical ‘0’ input up to 1.5V (high-noise immunity).

3.8 Motors :-

NR-DC-ECO is high quality low cost DC geared motor. It contains Brass gears and steel pinions to ensure longer life and better wear and tear properties. The gears are fixed on hardened steel spindles polished to a mirror finish. These spindles rotate between bronze plates which ensures silent running. The output shaft rotates in a sintered bushing. The whole assembly is covered with a plastic ring. All the bearings are permanently lubricated and therefore require no maintenance. The motor is screwed to the gear box from inside.

Fig 3.8 12v 100 rpm DC Geared Motor

3.9 Alpha-Numeric LCD Display :-

Fig 3.9.1 Schematic Diagram

3.9.1 Description
A liquid crystal display is a thin, flat electronic visual display that uses the light modulating properties of liquid crystals (LCs). LCs does not emit light directly.
In liquid crystal displays (LCDs) of liquid crystal technology is the most common applications. An advanced VGA computer screen from the pervasive wrist watch and pocket calculator, this type of display has evolved into an important and ambidextrous interface.
Consist of a liquid crystal display, an array of tiny segments (called pixels) and to present the information that can be manipulated. This basic common idea is to all displays, alienate from simple calculators to a full color LCD television.

The primary factor was size, an LCD consisting of primarily with some liquid crystal material between them of two glass plates. There is no bulk amount picture tube. This gives LCDs practical for applications where size (as well as weight) is necessary.
In general, LCDs uses very low power than the cathode-ray tube (CRT) counterparts. Many LCDs are ruminative, means that they use only atmosphere light to illuminate the display. Even displays that do consume much less power than CRT devices require an external light source (i.e. computer displays).

3.9.2 LCD Command Codes

Fig 3.9.2 LCD Command Codes

Chapter 4
Software Description
4.1 KEIL C51 C Compiler :-

4.1.1 Description
The Keil C51 C Compiler for the 8051 microcontroller is the most popular 8051 C compiler in the world. It provides more features than any other 8051 C compiler available today.
The C51 Compiler allows you to write 8051 microcontroller applications in C that, once compiled, have the efficiency and speed of assembly language. Language extensions in the C51 Compiler give you full access to all resources of the 8051.
The C51 Compiler translates C source files into relocatable object modules which contain full symbolic information for debugging with the µVision Debugger or an in-circuit emulator. In addition to the object file, the compiler generates a listing file which may optionally include symbol table and cross reference information.

4.1.2 Features

* Nine basic data types, including 32-bit IEEE floating-point, * Flexible variable allocation with bit, data, bdata, idata, xdata, and pdatamemory types, * Interrupt functions may be written in C, * Full use of the 8051 register banks, * Complete symbol and type information for source-level debugging, * Use of AJMP and ACALL instructions, * Bit-addressable data objects, * Built-in interface for the RTX51 Real-Time Kernel, * Support for dual data pointers on Atmel, AMD, Cypress, Dallas Semiconductor, Infineon, Philips, and Triscend microcontrollers, * Support for the Philips 8xC750, 8xC751, and 8xC752 limited instruction sets, * Support for the Infineon 80C517 arithmetic unit.

4.2 Android :-

4.2.1 Description
Android is an open source software stack that includes the operating system, middleware, and key applications along with a set of API libraries for writing mobile applications that can shape the look, feel, and function of mobile handsets.
“Android was built from the ground-up to enable developers to create compelling mobile applications that take full advantage of all a handset has to offer. It is built to be truly open. For example, an application could call upon any of the phone's core functionality such as making calls, sending text messages, or using the camera, allowing developers to create richer and more cohesive experiences for users.” This is true, as a developer you can do everything, from sending short messages with just 2 lines of code, up to replacing even the HOME-Screen of your device. One could easily create a fully customized operating system within weeks, providing no more of Google’s default application to the user. “Android is built on the open Linux Kernel. Furthermore, it utilizes a custom virtual machine that has been designed to optimize memory and hardware resources in a mobile environment. Android will be open source; it can be liberally extended to incorporate new cutting edge technologies as they emerge. The platform will continue to evolve as the developer community works together to build innovative mobile applications.”

Android is made up of several necessary and dependent parts including the following * A hardware reference design that describes the capabilities required of a mobile device in order to support the software stack * A Linux operating system kernel that provides the low-level interface with the hardware, memory management, and process control, all optimized for mobile devices * Open source libraries for application development including SQLite, WebKit, OpenGL, and a media manager * A run time used to execute and host Android applications, including the Dalvik virtual machine and the core libraries that provide Android specific functionality. The run time is designed to be small and efficient for use on mobile devices. * An application framework that agnostically exposes system services to the application layer, including the window manager, content providers, location manager, telephony, and peer-to-peer services * A user interface framework used to host and launch applications * Preinstalled applications shipped as part of the stack * A software development kit used to create applications, including the tools, plug-ins, and Documentation

4.2.2 Android SDK Features
The true appeal of Android as a development environment lies in the APIs it provides.
As an application-neutral platform, Android gives you the opportunity to create applications that are as much a part of the phone as anything provided out of the box.
The following list highlights some of the most noteworthy Android features: * No licensing, distribution, or development fees * Wi-Fi hardware access * GSM, EDGE, and 3G networks for telephony or data transfer, allowing you to make or receive calls or SMS messages, or to send and retrieve data across mobile networks * Comprehensive APIs for location-based services such as GPS * Full multimedia hardware control including playback and recording using the camera and microphone * APIs for accelerometer and compass hardware * IPC message passing * Shared data stores * An integrated open source WebKit-based browser * Full support for applications that integrate Map controls as part of their user interface * Peer-to-peer (P2P) support using Google Talk * Mobile-optimized hardware-accelerated graphics including a path-based 2D graphics library and support for 3D graphics using OpenGL ES * Media libraries for playing and recording a variety of audio/video or still image formats * An application framework that encourages reuse of application components and the replacement of native applications.

4.3 Flash Magic :-

NXP Semiconductors produce a range of Microcontrollers that feature both on-chip Flash memory and the ability to be reprogrammed using In-System Programming technology. Flash Magic is Windows software from the Embedded Systems Academy that allows easy access to all the ISP features provided by the devices.

Features * Erasing the Flash memory (individual blocks or the whole device) * Programming the Flash memory * Modifying the Boot Vector and Status Byte * Reading Flash memory * Performing a blank check on a section of Flash memory * Reading the signature bytes * Reading and writing the security bits * Direct load of a new baud rate (high speed communications) * Sending commands to place device in Bootloader mode.
Flash Magic provides a clear and simple user interface to these features. Under Windows, only one application may have access the COM Port at any one time, preventing other applications from using the COM Port. Flash Magic only obtains access to the selected COM Port when ISP operations are being performed. This means that other applications that need to use the COM Port, such as debugging tools, may be used while Flash Magic is loaded.

Similar Documents

Free Essay

Human Development Quizzes

...Week 2, Chapter 2 1. Why are males more likely to have a sex-linked trait than females? Answer Men have only one X chromosome which makes the poor schleps chances of x linked traits bigger than women, who have two X chromosomes. Having two X chromosomes means that the trait can be cancelled out by the opposing X. 2 Characteristics such as hair color and height are called Answer 2 answers * phenotypes. * chromosomes. * genotypes. * zygotes. 3 A genotype Answer 3 answers * is a rodlike structure in the cell nucleus that transmits genetic information. * reflects an individual's physical and behavioral characteristics, determined both by environmental and genetic factors. * refers to the genetic makeup of an individual. * is a directly observable characteristic. 4 The DNA of humans and chimpanzees is between __________ percent identical. Answer 4 answers * 75 and 80 * 20 and 25 * 50 and 55 * 98 and 99 5 A person whose 23rd pair of chromosomes is XY Answer 5 answers * has PKU. * is male. * has Down syndrome. * cannot be a fraternal twin. 6 A zygote that separates into two clusters of cells instead of just one produces ...

Words: 17501 - Pages: 71

Premium Essay

Widows and Widowhood Inheritance

...CHAPTER ONE INTRODUCTION AND BACKGROUND OF THE STUDY 1.1 Introduction Stripping widows of property is a huge social problem in Zimbabwe especially with the escalating death toll due to Human Immunodeficiency Virus (HIV) and Acquired Immunodeficiency Syndrome (AIDS). Customary laws have been unable to address the problem which suggests that extra- legal interventions might be necessary. Social work intervention is necessary to preserve the widow’s worth and dignity as a human being, which is the principal value of social work. A widow is a woman who has lost a husband by death and has not remarried, according to The South African Concise Oxford Dictionary. Property stripping refers to depriving someone of acquired or inherited movable or immovable possessions that rightfully and legally belong to that person (The South African Concise Oxford Dic tionary; Kuenyehia 2003). This study uses stripping and grabbing interchangeably as refer ring to the same act. Basing their studies in Ikot Idem in Nigeria, Okunmadewa, Aina, Ayoola, Mamman, Nweze, Odebiyi, Shedu and Zacha (2002:106) maintain: [W]omen’s wellbeing often deteriorates quickly after the loss of their husbands, when they suffer threats of both their physical security and property. A widow often loses her husband’s property to the in-laws in accordance with family traditional rules. This study proposes to explore the widows’ experiences of property inheritance in the Binga District, in the North West of Zimbabwe...

Words: 67340 - Pages: 270

Premium Essay

Uae Devolopment

...HISTORICAL BACKGROUND Early Years: The United Arab Emirates (UAE) was formed from the group of tribally organized Arabian Peninsula sheikhdoms along the southern coast of the Persian Gulf and the northwestern coast of the Gulf of Oman. This area was converted to Islam in the seventh century and for Library of Congress – Federal Research Division Country Profile: United Arab Emirates, July 2007 centuries afterward was embroiled in dynastic disputes. Most UAE nationals are descended from two tribal groupings, the Qawasim and the Bani Yas, which emerged as leading powers in the eighteenth century. The Qawasim, mainly land and sea traders, dominated what are today the emirates of Ras al Khaymah and Sharjah. The Bani Yas, who were agricultural and pastoral, lived in what are today the emirates of Abu Dhabi and Dubai. From the seventeenth to the nineteenth century, the area became known as the Pirate Coast, as both European and Arab pirates attacked foreign ships. The British mounted expeditions against the pirates during this period, culminating in an 1818 campaign against the pirate headquarters of Ras al Khaymah and other harbors along the coast. This action ostensibly was taken to safeguard British maritime routes, particularly those of the British East India Company, but some historians have noted that the war was in fact motivated by the British desire to establish supremacy in the region against the claims of other European powers. British Rule: In 1820 Britain...

Words: 14263 - Pages: 58

Premium Essay

Closing the Gap

...No Peace WiThouT Justice Closing the gap The role of non-judicial mechanisms in addressing impunity Closing the gap The role of non-judicial mechanisms in addressing impunity No Peace WiThouT Justice No Peace Without Justice Copyright 2010 © No Peace Without Justice Via di Torre Argentina 76, I-00186, Roma, Italy www.npwj.org Permission to reproduce and distribute this document is hereby granted provided that this notice is retained on all copies, that copies are not altered and that No Peace Without Justice is credited. This publication is also available at www.npwj.org. No Peace Without Justice is an international non-profit organisation founded by Emma Bonino and born of a 1993 campaign of the Transnational Radical Party that works for the protection and promotion of human rights, democracy, the rule of law and international justice. NPWJ undertakes its work within three main thematic programs: International Criminal Justice; Female Genital Mutilation; and Middle East and North Africa Democracy, including specific work on Iraq. NPWJ is a Member of the TRP Senate, a Member of the Steering Committee of the NGO Coalition for the International Criminal Court and the Italian civil society partner in the Democracy Assistance Dialogue. This publication has been produced with the assistance of the European Union. The contents of this publication are the sole responsibility of No Peace Without Justice and can in no way be taken to reflect the views of the European...

Words: 86821 - Pages: 348

Premium Essay

Engineering

...Production: Matt Ballantyne Creative Director: Rob Hugel Art Director: Cate Barr Print Buyer: Paula Vang Permissions Editor: Mardell Glinski-Schultz Production Service: Aaron Downey, Matrix Productions Inc. Copy Editor: Dan Hays Cover Designer: RHDG/Tim Heraldo Cover Image: SuperStock/Henry Beeker Compositor: International Typesetting and Composition  c 2009, 2005 Wadsworth, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit...

Words: 48169 - Pages: 193

Premium Essay

Child Issue

...SCaring for Kids After Trauma, Disaster and Death: A GUIDE FOR PARENTS AND PROFESSIONALS SECOND EDITION The New York University Child Study Center is dedicated to the understanding, prevention and treatment of child and adolescent mental health problems. The Center offers expert psychiatric services for and intervention. The Center’s mission is to bridge training supported by the resources of the worldclass New York University School of Medicine. children and families with emphasis on early diagnosis the gap between science and practice, integrating the finest research with patient care and state-of-the-art For more information, visit www.AboutOurKids.org. Changing the Face of Child Mental Health Caring for Kids After Trauma, Disaster and Death: A GUIDE FOR PARENTS AND PROFESSIONALS SECOND EDITION DEVELOPED BY: The faculty and staff of the New York University Child Study Center Harold S. Koplewicz, M.D., Director & Founder Marylene Cloitre, Ph.D., Director of the Institute for Trauma and Stress REVISED SEPTEMBER 2006 under the direction of Joel McClough, Ph.D., Director of the Families Forward Program, Institute for Trauma and Stress by Anita Gurian, Ph.D. Dimitra Kamboukos, Ph.D. Eva Levine, Ph.D. Michelle Pearlman, Ph.D. Ronny Wasser, B.A. Permission is granted for reproduction of this document by parents and professionals © 2006 1 C A R I N G F O R K I D S A F T E R T R A U M A , D I S A S T E R A N D D E A T H ...

Words: 33045 - Pages: 133

Premium Essay

Docx

...THE NERVOUS SYSTEM  The nervous system allows the animal to quickly detect, communicate and co-ordinate information about its external and internal environment so it can make efficient appropriate responses for survival and/or reproduction. The two major parts of our nervous system are the central nervous system (CNS) and peripheral nervous system (PNS). The CNS is made of the brain and spinal cord.   The cranial nerves, spinal nerves and ganglia make up the PNS. The cranial nerves connect to the brain. The cranial and spinal nerves contain the axons (fibres) of sensory and motor nerve cells.   Nerve cells areas are also known as neurons. Neurons are the basic unit of the nervous system. They carry information or impulses as electrical signals from one place to another in the body. There are 3 types of neurons: Sensory Neurons- Sensory neurons carry electrical signals (impulses) from receptors or sense organs to the CNS. Sensory neurons are also called afferent neurons. The cell body of sensory neurons is outside the CNS in ganglia.   Motor Neurons- Motor Neurons Carry Impulses From The CNS To Effector Organs Motor Neurons Are Also Called Efferent Neurons. The Cell Bodies Of Motor Neurons Are Inside The CNS.   Interneurons- These are also called intermediate, relay, or associative neurons. They carry information between sensory and motor neurons. They are found in the CNS.  TOP The Structure of Neurons A Neuron consists of THREE MAIN PARTS:     A. CELL...

Words: 50148 - Pages: 201

Premium Essay

The Social

...animal Books by Elliot Aronson Theories of Cognitive Consistency (with R. Abelson et al.), 1968 Voices of Modern Psychology, 1969 The Social Animal, 1972, 1976, 1980, 1984, 1988, 1992, 1995, 1999, 2004; (with J. Aronson), 2008 Readings About the Social Animal, 1973, 1977, 1981, 1984, 1988, 1992, 1995, 1999, 2004; (with J. Aronson), 2008 Social Psychology (with R. Helmreich), 1973 Research Methods in Social Psychology (with J. M. Carlsmith & P. Ellsworth), 1976 The Jigsaw Classroom (with C. Stephan et al.), 1978 Burnout: From Tedium to Personal Growth (with A. Pines & D. Kafry), 1981 Energy Use: The Human Dimension (with P. C. Stern), 1984 The Handbook of Social Psychology (with G. Lindzey), 3rd ed., 1985 Career Burnout (with A. Pines), 1988 Methods of Research in Social Psychology (with P. Ellsworth, J. M. Carlsmith, & M. H. Gonzales), 1990 Age of Propaganda (with A. R. Pratkanis), 1992, 2000 Social Psychology, Vols. 1–3 (with A. R. Pratkanis), 1992 Social Psychology: The Heart and the Mind (with T. D. Wilson & R. M. Akert), 1994 Cooperation in the Classroom: The Jigsaw Method (with S. Patnoe), 1997 Nobody Left to Hate: Teaching Compassion After Columbine, 2000 Social Psychology: An Introduction (with T. D. Wilson & R. M. Akert), 2002, 2005, 2007 The Adventures of Ruthie and a Little Boy Named Grandpa (with R. Aronson), 2006 Mistakes Were Made (But Not By Me) (with C. Tavris), 2007 Books by Joshua Aronson Improving Academic Achievement, 2002 The Social Animal To...

Words: 208005 - Pages: 833

Premium Essay

Mba Hrm Paper Solutions

...Human Resource Management IIBM INSTITUTE OF BUSINESS MANAGEMENT DISTANCE LEARNING PROGRAM HUMAN RESOURCE MANAGEMENT ( IIBM - B102 ) www.iibmindia.in www.iibmonline.com Author: VSP Rao Copyright © 2010, VSP Rao All Rights Reserved Produced and Printed by EXCEL BOOKS PRIVATE LIMITED A-45, Naraina, Phase-I, New Delhi-110 028 For IIBM Institute of Business Management Meerut - 250002 Distance Learning Education, IIBM Institute of Business Management The ultimate vision of this Institute is to ensure that all working executives and each young manager must possess the requisite research-oriented-business-acumen and the competitive managerial excellence in successfully tackling the new emerging management-related-problems of the country in the changing global scenario. Individuals who look upon education as a continuing activity and wish to enhance their knowledge in an existing discipline or acquire proficiency in a new area are sure to benefit from the offered Programs. Distance Education is an attempt to make education accessible beyond the close confines of a classroom and to make it available to those who aspire and endeavor. The pedagogy used is interactive with cutting-edge techniques and innovation. This has gone long way to strengthen skills and expertise students to meet much-needed requirement of management students; in industry or society. The Institute pioneered and offers more than 40 programs in the field of Management, Computer, Six Sigma and SAP Training...

Words: 92421 - Pages: 370

Free Essay

Traffic School

...I. THE COMMON SENSE OF DRIVING Keeping a point off your DMV record is not the only thing that occurs when you successfully complete this Traffic Violator Course. You will increase your knowledge of California's driving laws as well. Why is that important? When your safety is at risk, raising your driving consciousness is always beneficial. The unfortunate truth is many drivers get tickets simply because they are not paying attention or have forgotten some rule of the vehicle code. In other words, what you are about to read can save you money by helping you to avoid breaking the law, receiving a traffic citation, and having to pay the penalty. But more important, what you are about to read can easily save your life… or someone else's. A. THE SERIOUS RESPONSIBILITY OF OPERATING A MOTOR VEHICLE When you get behind the driver seat, you’re not just driving a car. You are driving a 2,000 pound plus piece of machinery. The lives of your passengers and all other drivers and pedestrians around you on the road are at risk. Driving is the most dangerous thing you do on a daily basis. One little mistake at any speed, whether at 65 mph or 35 mph, can be deadly. As a driver, your responsibility is not only to respect the law but also to appreciate the risks when you operate your vehicle, risks both to yourself and to the other drivers with whom you share the road. Yes, the key word here is SHARE. 1. MOTOR VEHICLE IS A WEAPON You don‘t believe that? Any object that weighs...

Words: 49757 - Pages: 200

Premium Essay

Business Continuity and Disaster Recovery Planning for It Professionals

...you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our solutions@syngress.com Web pages. There you may find an assortment of valueadded features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. Contact us at sales@ syngress.com for more information. CUSTOM PUBLISHING Many organizations welcome the ability...

Words: 189146 - Pages: 757

Premium Essay

Study Guide

...Center ................... 34 AER - Army Emergency Relief ............................ 37 Army Sexual Assault Prevention and Response Program ........... 40 EO - Equal Opportunity ................................ 44 AFAP - Army Family Action Plan .......................... 48 ARC - Army Red Cross ................................. 50 Army Reenlistment / Retention Program ...................... 51 Army Safety Program .................................. 53 Army Sponsorship Program .............................. 55 QOLP - Army Quality of Life Program ....................... 56 BOSS - Better Opportunities for Single Soldiers ................. 57 CHAMPUS / TRICARE ................................ 58 DEERS - Defense Enrollment Eligibility Reporting System .......... 59 NCODP - Noncommissioned Officer Development Program ......... 60 Weight Control ....................................... 62 Physical Training ...................................... 66 Weapons ............................................ 70 M136 AT4 - Rocket Launcher ............................ 120 M16/A2 - 5.56 mm Semiautomatic Rifle ..................... 123 M4 - 5.56 mm Semiautomatic Rifle ........................ 130 M18A1 - Antipersonnel (Claymore) Mine .................... 137 M2 - .50 Caliber Machine Gun ........................... 140 M203 - 40 mm Grenade Launcher ......................... 144 M240B - Machine Gun ................................ 147 M249 - Machine Gun ................................. 150 M60 - Machine...

Words: 85951 - Pages: 344

Premium Essay

Human Resources Information Syatem

...Human Resource Information system UNIT:1 Introduction: Data & Information needs for HR Manager; Sources of Data; Role of ITES in HRM; IT for HR Managers; Concept, Structure, & Mechanics of HRIS; Programming Dimensions & HR Manager with no technology background; Survey of software packages for Human Resource Information System including ERP Software such as SAP, Oracles Financials and Ramco‘s Marshal [only data input, output & screens]; Learning Objectives: After reading this chapter, you should be able to understand  The meaning and definition of HRIS  The importance of HRIS  Data and information needs for HR manager  Sources of data  Concept structure and mechanics of data  Survey of software packages for HRIS  Basic knowledge of ERP software such as SAP, Oracles Financials and Ramco‘s MArshal Introduction Many well-known examples of the use of information technology for competitive advantage involve systems that link an organization to suppliers, distribution channels, or customers. In general, these systems use information or processing capabilities in one organization to improve the performance of another or to improve relationships among organizations. Declining costs of capturing and using information have joined with increasing competitive pressures to spur numerous innovations in use of information to create value. The ideas do not constitute a procedure leading inexorably to competitive advantage...

Words: 75858 - Pages: 304

Free Essay

Current Affairs

...www.ibpsexamguru.in Content: Current Affairs 2013 (December 2012,January 2013,febraury 2013,March 2013, April 2013 ) Howdy ! friends . we are providing Five months current affairs for all competitive exam preparation .. Source : Various Location on Web Portal . Contains : 1. International Awareness 2. National Awareness 3. States News 4. Confrences 5. Sports and News 6. Awards and honors 7. Persons In News 8. Important dates 9. Books and Authors 10. Science and technology 11. Economy News INTERNATIONAL Mahama Re-elected as Ghana’s President : On 10 December Ghana’s incumbent President John Dramani Mahama of the ruling National Democratic Congress (NDC) has won the country’s presidential election.Mahama took 50.70 percent of the total valid votes cast, while his closest challenger, Nana Addo Dankwa Akufo-Addo of the New Patriotic Party (NPP) obtained 47.74 percent.With his re-election, Mahama becomes the fourth president to be elected under the Forth Republic.He had served as Ghana’s vice president since 2009. UN, Pakistan Launched ‘Malala Fund’ : Pakistan joined forces with the United Nations on 10 December 2012 to launch a fund aimed at boosting girls’ education throughout the world.The fund is named for Malala Yousafzai, the 15-year-old Pakistani girl. Pakistan’s President Asif Ali Zardari also announced a $10-million donation for a global war chest to educate all girls by 2015 set up in the name of Malala Yousafzai for campaigning for girls’ education. Shinzo Abe Elected...

Words: 52705 - Pages: 211

Free Essay

Case Study

...Workplace Harassment and Violence Report Jacquie Carr, Community Researcher Audrey Huntley, Community Researcher Barbara MacQuarrie, Centre for Research on Violence Against Women and Children, University of Western Ontario Sandy Welsh, Department of Sociology, University of Toronto Names are listed in alphabetical order and reflect varied, but equal contributions to the overall project and report. We are grateful to Status of Women Canada for funding this project and for the continued sponsorship of the Ontario Coalition of Rape Crisis Centres. We also thank the members of our Advisory Committee for pushing and challenging us throughout this project. We thank the women who facilitated focus groups and helped us contact the women in this study. Finally, this report would not be possible without the contributions of the women who told us about their experiences. © 2004 Centre for Research on Violence Against Women and Children ISBN# 0-9688655-3-4 1 “To understand violence, we have to examine both the personal experience and the terrain of that experience.” Dr. Yasmin Jiawani This report is built on the personal experiences of women who have experienced workplace harassment, but their stories are also about the “terrain” or the context of those experiences. In drawing out the commonalities of their experiences, we have begun to shed light on the terrain. We must transform the terrain if women are to have equality and safety in their workplaces...

Words: 63386 - Pages: 254