Monday, September 30, 2019

Spirit Bound Chapter Twenty-Six

MAYBE IT WAS SOMEONE'S SICK sense of humor, but I ended up in Dimitri's now-vacated cell. I had come quietly after that guardian laid the charges before me. In fact, I'd become comatose because too much of what he'd said was impossible to process. I couldn't even really get to the part about me. I couldn't feel outrage or indignation over the accusation because I was still stuck on the part about Tatiana being dead. Not just dead. Murdered. Murdered? How had that happened? How had that happened around here? This Court was one of the most secure places in the world, and Tatiana in particular was always guarded–by the same group that had descended on Dimitri and me so quickly. Unless she'd left Court–and I was pretty sure she hadn't–no Strigoi could have killed her. With the constant threats we faced, murder among dhampirs and Moroi was almost unheard of. Sure, it happened. It was inevitable in any society, but with the way ours was hunted, we rarely had time to turn on each other (shouting in Council meetings aside). That was part of why Victor had been so condemned. His crimes were about as bad as things got. Until now. Once I got past the impossible idea of Tatiana being dead, I was able to ask the real question: Why me? Why were they accusing me? I was no lawyer, but I was pretty sure calling someone a sanctimonious bitch was not hard evidence in a trial. I tried getting more details from the guards outside my cell, but they remained hard-faced and silent. After making my voice hoarse from shouting, I slumped onto the bed and went to Lissa's mind, where I was certain I'd get more information. Lissa was frantic, trying to get answers from anyone she could. Christian was still with her, and they stood inside the foyer of one of the administrative buildings, which was filled with a flurry of activity. Dhampirs and Moroi alike ran everywhere, some frightened of this new government instability and others hoping to take advantage of it. Lissa and Christian stood in the midst of it all, like leaves swept along in a storm's fury. While Lissa was now technically an adult, she had still always been under the wing of some older person at Court–usually Priscilla Voda, and occasionally even Tatiana. Neither of them was available now, for obvious reasons. While many royals respected her, Lissa had no real source to turn to. Seeing her agitation, Christian clasped her hand. â€Å"Aunt Tasha will know what's going on,† he said. â€Å"She'll turn up sooner or later. You know she won't let anything happen to Rose.† Lissa knew there was a bit of uncertainty in that statement but didn't mention it. Tasha might not want anything to happen to me, but she certainly wasn't all-powerful. â€Å"Lissa!† Adrian's voice caused both Lissa and Christian to turn around. Adrian had just entered, along with his mother. Adrian looked as though he had literally gone straight from my bedroom to here. He wore yesterday's clothes, slightly rumpled, and his hair was styled with none of his usual care. By comparison, Daniella looked polished and put together, the perfect picture of a businesswoman who hadn't lost her femininity. At last! Here were people who might have answers. Lissa rushed over to them gratefully. â€Å"Thank God,† Lissa said. â€Å"No one will tell us what's happened†¦ except that the queen is dead and Rose is locked up.† Lissa looked up at Daniella's face pleadingly. â€Å"Tell me there's been some kind of mistake.† Daniella patted Lissa's shoulder and gave as comforting a look as she could manage, given the circumstances. â€Å"I'm afraid not. Tatiana was killed last night, and Rose is their main suspect.† â€Å"But she would never have done that!† exclaimed Lissa. Christian joined her in righteous fury. â€Å"Her yelling at the Council that day isn't enough to convict her for murder.† Ah, Christian and I had the same line of reasoning. It was almost scary. â€Å"Neither is crashing the Death Watch.† â€Å"You're right. It's not enough,† agreed Daniella. â€Å"But it doesn't make her look good either. And apparently, they have other evidence they say proves her guilt.† â€Å"What kind of evidence?† Lissa demanded. Daniella turned apologetic. â€Å"I don't know. That's still part of the investigation. They'll have a hearing to present the evidence and question her whereabouts, possible motives†¦ that kind of thing.† She glanced around at the people rushing by. â€Å"If they even get that far. This kind of thing†¦ it hasn't happened in ages. The Council gains absolute control until a new monarch is elected, but there's still going to be chaos. People are afraid. I won't be surprised if the Court goes under martial law.† Christian turned to Lissa, hope on his face. â€Å"Did you see Rose last night? Was she with you?† Lissa frowned. â€Å"No. I think she was in her room. The last time I saw her was the day before yesterday.† Daniella didn't look happy about that. â€Å"That's not going to help. If she was alone, then she has no alibi.† â€Å"She wasn't alone.† Three sets of eyes turned in Adrian's direction. It was the first time he'd spoken since first calling to Lissa. Lissa hadn't focused on him too much yet, meaning I hadn't either. She'd only observed his superficial appearance when he arrived, but now she could see the little details. Worry and distress had left their marks, making him look older than he was. When she tuned in to his aura, she saw the usual gold of a spirit user, but it and its other colors were muddied and tinged with darkness. There was a flickering there too, a warning of spirit's instability taking hold. This had all come about too quickly for him to react, but I suspected he'd hit the cigarettes and liquor as soon as he had a free moment. It was how Adrian coped with this sort of thing. â€Å"What are you saying?† Daniella asked sharply. Adrian shrugged. â€Å"She wasn't alone. I was with her all night.† Lissa and Christian did a good job of maintaining neutral expressions, but Daniella's face registered the shock that any parent would have upon hearing about her child's sex life. Adrian noticed her reaction as well. â€Å"Save it,† he warned. â€Å"Your morals, your opinions†¦ none of it matters right now.† He gestured toward a group of panicked people running by, screaming about how Victor Dashkov must have surely come to Court to kill them all. Adrian shook his head and turned back to his mother. â€Å"I was with Rose. That proves she didn't do it. We'll deal with your motherly disapproval about my love life later.† â€Å"That's not what worries me! If they do have hard evidence and you get mixed up in this, you could be under suspicion too.† The composure Daniella had entered with was beginning to crack. â€Å"She was my aunt,† cried Adrian incredulously. â€Å"Why on earth would Rose and I kill her?† â€Å"Because she disapproved of you dating. And because Rose was upset over the age ruling.† This came from Christian. Lissa glared, but he merely shrugged. â€Å"What? I'm just stating the obvious. Someone else would if I didn't. And we all heard the stories–people have been making up things that are extreme even for Rose.† A strong comment indeed. â€Å"When?† asked Daniella, clutching Adrian's sleeve. â€Å"When were you with Rose? When did you get there?† â€Å"I don't know. I don't remember,† he said. She tightened her grip. â€Å"Adrian! Take this seriously. This is going to make a huge difference on how things proceed. If you got there before Tatiana was killed, then you won't be tied to it. If you were with Rose afterward–â€Å" â€Å"Then she has an alibi,† he interrupted. â€Å"And there's no problem.† â€Å"I hope that's true,† murmured Daniella. Her eyes didn't seem focused on my friends anymore. The wheels in her head were spinning, her thoughts jumping ahead as she tried to think how best to protect her son. I had been an unfortunate case for her. He was, understandably, a red-alert emergency for her. â€Å"We're still going to have to get you a lawyer. I'll talk to Damon. I have to find him before the hearing tonight. And Rufus will have to know about this too. Damn.† Adrian arched an eyebrow at that. I had the impression Lady Ivashkov didn't swear very often. â€Å"We have to find out what time you were there.† Adrian still wore his distress around him like a cloak and looked as though he might fall over if he didn't get nicotine or alcohol soon. I hated to see him like that, particularly over me. There was strength within him, no question, but his nature–and the sketchy effects of spirit–made coping with this hard. Yet, through his agitation, he managed to pull up a memory to help his frantic mother. â€Å"There was someone in the building lobby when I came in†¦ a janitor or something, I think. No one at the front desk, though.† Most buildings usually kept a staff member around for emergencies or concierge services. Daniella's face lit up. â€Å"That's it. That's what we'll need. Damon will find out the time you were there so that we can get you free and clear of this.† â€Å"And so he can defend me if things turn bad?† â€Å"Of course,† she answered swiftly. â€Å"What about Rose?† â€Å"What about her?† Adrian still looked ready to fall apart, but there was seriousness and focus in his green eyes. â€Å"If you find out Aunt Tatiana was killed before I was there, and Rose is thrown to the wolves alone, will Damon be her lawyer?† His mother faltered. â€Å"Oh, well, darling†¦ Damon doesn't really do that sort of thing†¦.† â€Å"He will if you ask him to,† said Adrian sternly. â€Å"Adrian,† she said wearily, â€Å"you don't know what you're talking about. They say the evidence against her is bad. If our family's shown supporting–â€Å" â€Å"It's not like we're supporting murder! You met Rose. You liked her. Can you look me in the eye and say it's okay for her to go in with whatever half-assed defense they dredge up for her? Can you?† Daniella blanched, and I swear, she actually cringed away. I don't think she was used to such fierce resoluteness from her devil-may-care son. And though his words were perfectly sane, there was kind of a crazy desperation in his voice and attitude that was a little scary. Whether that was caused by spirit or just his own emotion, I couldn't say. â€Å"I†¦ I'll speak to Damon,† Daniella said at last. She'd had to swallow a few times before actually getting the words out. Adrian let out a deep breath and some of that fury went with it. â€Å"Thank you.† She scurried away, melting into the crowd and leaving Adrian alone with Christian and Lissa. The two of them looked only a little less stunned than Daniella had. â€Å"Damon Tarus?† Lissa guessed. Adrian nodded. â€Å"Who's that?† asked Christian. â€Å"My mom's cousin,† said Adrian. â€Å"The family lawyer. A real shark. Kind of sleazy too, but he can pretty much get anyone out of anything.† â€Å"That's something, I suppose,† mused Christian. â€Å"But is he good enough to fight this so-called hard evidence?† â€Å"I don't know. I really don't know.† Adrian absentmindedly reached for his pocket, the usual cigarette spot, but he had none today. He sighed. â€Å"I don't know what their evidence is or how Aunt Tatiana even died. All I heard was that they found her dead this morning.† Lissa and Christian exchanged grimaces. Christian shrugged, and Lissa turned back to Adrian, taking on the role of messenger. â€Å"A stake,† said Lissa. â€Å"They found her in bed with a silver stake through her heart.† Adrian said nothing, and his expression didn't really change. It occurred to Lissa that in all this talk about innocence, evidence, and lawyers, everyone had kind of overlooked the fact that Tatiana had been Adrian's great-aunt. He hadn't approved of some of her decisions and had made plenty of jokes about her behind her back. But she was still his family, someone he'd known his entire life. He had to be feeling the pain of her death on top of everything else. Even I felt a little conflicted. I hated her for what she'd done to me, but I'd never wanted her dead. And I couldn't help but remember that she'd occasionally spoken to me like I was a real person. Maybe it had been faked, but I was pretty sure she'd been sincere the night she'd stopped by the Ivashkovs'. She'd been weary and thoughtful, mostly just concerned about bringing peace to her people. Lissa watched Adrian go, sympathy and sorrow flooding through her. Christian gently tapped her arm. â€Å"Come on,† he said. â€Å"We've found out what we needed to know. We're just in the way here.† Feeling helpless, Lissa let him lead her outside, dodging more panicked crowds. The orange of a low sun gave every leaf and tree a golden, warm feel. There had been a lot of people out when we returned from the warehouse with Dimitri, but it was nothing compared to this. People were buzzing with fear, hurrying to pass the news. Some were already in mourning, clad in black, with tears on their faces. I wondered how much of that was real. Even in the midst of tragedy and crime, royals would be scrambling for power. And each time she heard my name, Lissa would grow more and more angry. It was the bad anger too, the kind that felt like black smoke in our bond and often made her lash out. It was spirit's curse. â€Å"I can't believe this!† she exclaimed to Christian. I noticed, even if she didn't, that he was hurriedly taking her somewhere where there weren't people. â€Å"How could anyone think that about Rose? It's a set up. It has to be.† â€Å"I know, I know,† he said. He knew spirit's danger signs too and was trying to calm her down. They'd reached a small, grassy area in the shade of a large hazelnut tree and settled onto the ground. â€Å"We know she didn't do it. That's all there is to it. We'll prove it. She can't be punished for something she didn't do.† â€Å"You don't know this group,† grumbled Lissa. â€Å"If someone's out to get her, they can make all sorts of things possible.† With only the faintest awareness, I drew a little of that darkness from her into me, trying to calm her down. Unfortunately, it just made me angrier. Christian laughed. â€Å"You forget. I grew up around this group. I went to school with this group's kids. I know them–but we're not panicking until we know more, okay?† Lissa exhaled, feeling much better. I was going to take too much darkness if I wasn't careful. She gave Christian a small, tentative smile. â€Å"I don't remember you being this reasonable before.† â€Å"It's because everyone has different definitions of ‘reasonable. ‘ Mine's just misunderstood, that's all.† His voice was lofty. â€Å"I think you must be misunderstood a lot,† she laughed. His eyes held hers, and the smile on his face transformed into something warmer and softer. â€Å"Well, I hope this isn't misunderstood. Otherwise, I might get punched.† Leaning over, he brought his lips to hers. Lissa responded with no hesitation or thought whatsoever, losing herself in the sweetness of the kiss. Unfortunately, I was swept along with it. When they pulled away, Lissa felt her heart rate increase and her cheeks flush. â€Å"What exactly was that the definition of?† she asked, reliving how his mouth had felt. â€Å"It means ‘I'm sorry,'† he said. She looked away and nervously plucked at some of the grass. Finally, with a sigh, she looked back up. â€Å"Christian†¦ was there ever†¦ was there ever anything between you and Jill? Or Mia?† He stared in surprise. â€Å"What? How could you think that?† â€Å"You spent so much time with them.† â€Å"There is only one person I have ever wanted,† he said. The steadiness of his gaze, of those crystal blue eyes, left no question as to who that person was. â€Å"No one else has ever come close. In spite of everything, even with Avery–â€Å" â€Å"Christian, I'm so sorry for that–â€Å" â€Å"You don't have to–â€Å" â€Å"I do–â€Å" â€Å"Damn it,† he said. â€Å"Will you let me finish a sent–â€Å" â€Å"No,† Lissa interrupted. And she leaned over and kissed him, a hard and powerful kiss that burned through her body, one that told her there was no one else in the world for her either. Well. Apparently Tasha had been right: I was the only one who could bring them back together. I just somehow hadn't expected my arrest to play a role. I pulled away from her head to give them some privacy and save myself from watching them make out. I didn't begrudge them their moment. There was nothing either could do for me right now, and they deserved their reunion. Their only course of action was to wait for more information, and really, their method of passing time was a lot healthier than whatever Adrian was probably doing. I lay down on the bed and stared up at the ceiling. There was nothing but plain metal and neutral colors around me. It drove me crazy. I had nothing to watch, nothing to read. I felt like an animal trapped in a cage. The room seemed to grow smaller and smaller. All I could do was replay what I'd learned via Lissa, analyzing every word of what had been said. I had questions about everything, of course, but the one thing that stuck with me was Daniella mentioning a hearing. I needed to know more about that. I got my answer–hours later. I'd fallen into sort of a numb haze by then and almost didn't recognize Mikhail standing in front of my cell door. I leapt from my bed to the bars and saw that he was unlocking the door. Hope surged through me. â€Å"What's going on?† I asked. â€Å"Are they letting me go?† â€Å"I'm afraid not,† he said. His point was proven when, after opening the door, he promptly put my hands in cuffs. I didn't fight it. â€Å"I'm here to take you to your hearing.† Stepping into the hall, I saw other guardians gathered. My own security detail. A mirror of Dimitri's. Lovely. Mikhail and I walked together, and mercifully, he spoke along the way instead of maintaining that awful silence that seemed to be common treatment for prisoners. â€Å"What's the hearing exactly? A trial?† â€Å"No, no. Too soon for a trial. A hearing decides whether you're going to trial.† â€Å"That sounds kind of like a waste of time,† I pointed out. We emerged from the guardians' building, and that fresh, damp air was the sweetest thing I'd ever tasted. â€Å"It's a bigger waste of time if you go to a full-fledged trial, and they realize there was no case to stand on. At the hearing, they'll lay out all the evidence they have, and a judge–or, well, someone acting as a judge–will decide if you should have a trial. The trial makes it official. That's where they pass the verdict and dole out the punishment.† â€Å"Why'd they take so long for the hearing? Why'd they make me wait in that cell all day?† He laughed, but not because he thought it was funny. â€Å"This is fast, Rose. Very fast. It can take days or weeks to get a hearing, and if you do go to trial, you'll stay locked up until then.† I swallowed. â€Å"Will they move fast on that too?† â€Å"I don't know. No monarch's been murdered in almost a hundred years. People are running wild, and the Council wants to establish order. They're already making huge plans for the queen's funeral–a giant spectacle that'll distract everyone. Your hearing is also an attempt to establish order.† â€Å"What? How?† â€Å"The sooner they convict the murderer, the safer everyone will feel. They think this case against you is so solid, they want to rush it through. They want you to be guilty. They want to bury her knowing her killer is moving toward justice, so that everyone can sleep easy when the new king or queen is elected.† â€Å"But I didn't–† I let my denial go. There was no point. Ahead of us, the building that housed the courtroom loomed. It had seemed forbidding the first time I'd been here for Victor's trial, but that had been owing to fear of the memories he sparked in me. Now†¦ now it was my own future on the line. And apparently not just my own future–the Moroi world was watching and waiting, hoping I was a villain who could be safely put away forever. Swallowing, I gave Mikhail a nervous look. â€Å"Do you think†¦ do you think they'll send me to trial?† He didn't answer. One of the guards held the door open for us. â€Å"Mikhail?† I urged. â€Å"Will they really put me on trial for murder?† â€Å"Yes,† he said sympathetically. â€Å"I'm pretty sure they will.†

Sunday, September 29, 2019

The Guilty Conscience Is As Bad As A Guilty Act

Ladies and Gentlemen of the Jury, I've come here today to present you with a man who wants to justify the murder of his wife. I will show you how unjustified his act and his thoughts were in this not so spontaneous crime. Othello is on trial for murder and I would like to remind you that he has admitted full and absolute blame for this and you should not heed that lightly. Under the circumstances his mental state will come into account, but do not be bewildered by his claims of psychosis as any man could have had these thoughts befallen upon him and not taken action. This act of murder was premeditated, therefore making it first-degree murder. In a passing conversation earlier with Iago, Othello suggests that Desdemona â€Å"shall not live†. (Othello, 4. 1. 170) He goes on to describe how he should murder her as a passing thought. As Othello has stated here â€Å"Hang her! – I will chop her into messes. – Get me some poison, Iago, this night. † (Othello, 4. 1. 174,184,188) Iago goes on to suggest that Othello shouldn't poison his wife but rather strangle her in bed. Othello continued to speak with Iago about how he was going to strangle his wife because of her supposed adultery against him. Even though Iago is an accessory to this crime for his manipulation of Othello's thoughts and his suggestions on how to kill Desdemona, Othello is still at fault for the proceeded crime. Mens rea suggests that Othello knew murdering his wife was wrong and yet he did so out of spite. His actus reus suggests that in killing his wife he was distraught and did act in the heat of passion, yet still mens rea proves him guilty of this act and his malice aforethought. His psychological state is that of every other man with a jealous, green monster on his back. He is not warranted to any plea of insanity as he acted on a conscious and well planned thought, which does not concede in insanity. Othello once more admits to his guilty consciousness of this crime in his words just before he murdered Desdemona: â€Å"Yet I'll not shed her blood. Nor scar that whiter skin of hers than snow and smooth as monumental alabaster. Put out the light, and then put out the light. If I quench thee, thou flaming minister, I can again thy former light restore, should I repent me. But once I put out thy light, thou cunning'st pattern of excelling nature, I know not where is that Promethean heat that can thy light relume. When I have plucked the rose, I cannot give it vital growth again, it needs must wither. I'll smell it on the tree. Ah, balmy breath, that dost almost persuade justice to break her sword! One more, one more. Be thus when thou art dead, and I will kill thee, and love thee after. One more, and this the last. So sweet was ne'er so fatal. † (Othello, 5. 2. 3-20) He suggests that he will not mar her as to ruin her skin, and yet he wishes to â€Å"put out her light† metaphorically saying he wishes she were dead. He goes on to contemplate his actus reus by comparing her to a flame and a rose that can not be restored after its eradication. Othello planned the murder of his wife with his inferior soldier, he knew what he was doing was wrong, and he continued to smother her as she pleaded for her life. Desdemona begged for her life shortly before her death: â€Å"Oh banish me, my lord, but kill me not! – Kill me tomorrow, let me live tonight! – But half an hour! – But while I say one prayer! â€Å". She was unjustifiably murdered for an act she knew she had not committed. Othello acted on his jealousy and thoughts of malice rather than his love and faith in his wife, does this not make him a guilty man? Should Othello be acquitted of this crime or convicted of this horrendous act of murder as it is? That is for you to decide. Perrine's Literature: Structure, Sound, and Sense, Eleventh Edition. Thomas R. Arp, Greg Johnson. Senior Publisher: Lyn Uhl. Publisher: Michael Rosenberg. Development Ed: Helen Triller. Assistant Ed: Erin Bosco. Boston, Ma. Years Published: 2006, 2009, and 2012. Shakespeare, William. Othello. Pages 1276-1369.

Saturday, September 28, 2019

Spirit Bound Chapter One

THERE'S A BIG DIFFERENCE BETWEEN death threats and love letters–even if the person writing the death threats still claims to actually love you. Of course, considering I once tried to kill someone I loved, maybe I had no right to judge. Today's letter had been perfectly timed, not that I should have expected any less. I'd read it four times so far, and even though I was running late, I couldn't help but read it a fifth time. My dearest Rose, One of the few downsides to being awakened is that we no longer require sleep; therefore we also no longer dream. It's a shame, because if I could dream, I know I'd dream about you. I'd dream about the way you smell and how your dark hair feels like silk between my fingers. I'd dream about the smoothness of your skin and the fierceness of your lips when we kiss. Without dreams, I have to be content with my own imagination–which is almost as good. I can picture all of those things perfectly, as well as how it'll be when I take your life from this world. It's something I regret having to do, but you've made my choice inevitable. Your refusal to join me in eternal life and love leaves no other course of action, and I can't allow someone as dangerous as you to live. Besides, even if I forced your awakening, you now have so many enemies among the Strigoi that one of them would kill you. If you must die, it'll be by my hand. No one else's. Nonetheless, I wish you well today as you take your trials–not that you need any luck. If they're actually making you take them, it's a waste of everyone's time. You're the best in that group, and by this evening you'll wear your promise mark. Of course, that means you'll be all that much more of a challenge when we meet again–which I'll definitely enjoy. And we will be meeting again. With graduation, you'll be turned out of the Academy, and once you're outside the wards, I'll find you. There is no place in this world you can hide from me. I'm watching. Love, Dimitri Despite his â€Å"warm wishes† I didn't really find the letter inspiring as I tossed it onto my bed and blearily left the room. I tried not to let his words get to me, though it was kind of impossible to not be creeped out by something like that. There is no place in this world you can hide from me. I didn't doubt it. I knew Dimitri had spies. Since my former instructor-turned-lover had been turned into an evil, undead vampire, he'd also become a sort of leader among them–something I'd helped speed along when I killed off his former boss. I suspected a lot of his spies were humans, watching for me to step outside my school's borders. No Strigoi could have stayed on a twenty-four-hour stakeout. Humans could, and I'd recently learned that plenty of humans were willing to serve the Strigoi in exchange for the promise of being turned someday. Those humans considered eternal life worth corrupting their souls and killing off others to survive. Those humans made me sick. But the humans weren't what made my steps falter as I walked through grass that had turned bright green with summer's touch. It was Dimitri. Always Dimitri. Dimitri, the man I'd loved. Dimitri, the Strigoi I wanted to save. Dimitri, the monster I'd most likely have to kill. The love we'd shared always burned within me, no matter how often I told myself to move on, no matter how much the world did think I'd moved on. He was always with me, always on my mind, always making me question myself. â€Å"You look like you're ready to face an army.† I shifted out of my dark thoughts. I'd been so fixated on Dimitri and his letter that I'd been walking across campus, oblivious to the world, and hadn't noticed my best friend, Lissa, falling into step with me, a teasing smile on her face. Her catching me by surprise was a rarity because we shared a psychic bond, one that always kept me aware of her presence and feelings. I had to be pretty distracted to not notice her, and if ever there was a distraction, it was someone wanting to kill me. I gave Lissa what I hoped was a convincing smile. She knew what had happened to Dimitri and how he was now waiting to kill me after I'd tried–and failed–to kill him. Nonetheless, the letters I got from him every week worried her, and she had enough to deal with in her life without my undead stalker to add to the list. â€Å"I kind of am facing an army,† I pointed out. It was early evening, but late summer still found the sun up in the Montana sky, bathing us in golden light as we walked. I loved it, but as a Moroi–a peaceful, living vampire–Lissa would eventually grow weak and uncomfortable in it. She laughed and tossed her platinum hair over one shoulder. The sun lit up the pale color into angelic brilliance. â€Å"I suppose. I didn't think you'd really be all that worried.† I could understand her reasoning. Even Dimitri had said these would be a waste of my time. After all, I'd gone to Russia to search for him and had faced real Strigoi–killing a number of them on my own. Maybe I shouldn't have been afraid of the upcoming tests, but all the fanfare and expectation suddenly pressed in upon me. My heart rate increased. What if I couldn't do it? What if I wasn't as good as I thought I was? The guardians who would challenge me out here might not be true Strigoi, but they were skilled and had been fighting a lot longer than me. Arrogance could get me into a lot of trouble, and if I failed, I'd be doing it in front of all the people who cared about me. All the people who had such faith in me. One other thing also concerned me. â€Å"I'm worried about how these grades will affect my future,† I said. That was the truth. The trials were the final exam for a novice guardian like me. They ensured I could graduate from St. Vladimir's Academy and take my place with true guardians who defended Moroi from the Strigoi. The trials pretty much decided which Moroi a guardian would be assigned to. Through our bond, I felt Lissa's compassion–and her worry. â€Å"Alberta thinks there's a good chance we can stay together–that you'll still be my guardian.† I grimaced. â€Å"I think Alberta was saying that to keep me in school.† I'd dropped out to hunt Dimitri a few months ago and then returned–something that didn't look good on my academic record. There was also the small fact that the Moroi queen, Tatiana, hated me and would probably be going out of her way to influence my assignment–but that was another story. â€Å"I think Alberta knows the only way they'd let me protect you is if I was the last guardian on earth. And even then, my odds would still be pretty slim.† Ahead of us, the roar of a crowd grew loud. One of the school's many sports fields had been transformed into an arena on par with something from Roman gladiatorial days. The bleachers had been built up, expanded from simple wooden seats to luxuriously cushioned benches with awnings to shade the Moroi from the sun. Banners surrounded the field, their bright colors visible from here as they whipped in the wind. I couldn't see them yet, but I knew there would be some type of barracks built near the stadium's entrance where novices waited, nerves on edge. The field itself would have turned into an obstacle course of dangerous tests. And from the sound of those deafening cheers, plenty were already there to witness this event. â€Å"I'm not giving up hope,† Lissa said. Through the bond, I knew she meant it. It was one of the wonderful things about her–a steadfast faith and optimism that weathered the most terrible ordeals. It was a sharp contrast to my recent cynicism. â€Å"And I've got something that might help you out today.† She came to a stop and reached into her jeans pocket, producing a small silver ring scattered with tiny stones that looked like peridots. I didn't need any bond to understand what she was offering. â€Å"Oh, Liss†¦ I don't know. I don't want any, um, unfair advantage.† Lissa rolled her eyes. â€Å"That's not the problem, and you know it. This one's fine, I swear.† The ring she offered me was a charm, infused with the rare type of magic she wielded. All Moroi had control of one of five elements: earth, air, water, fire, or spirit. Spirit was the rarest–so rare, it had been forgotten over the centuries. Then Lissa and a few others had recently surfaced with it. Unlike the other elements, which were more physical in nature, spirit was tied into the mind and all sorts of psychic phenomena. No one fully understood it. Making charms with spirit was something Lissa had only recently begun to experiment with–and she wasn't very good at it. Her best spirit ability was healing, so she kept trying to make healing charms. The last one had been a bracelet that singed my arm. â€Å"This one works. Only a little, but it'll help keep the darkness away during the trial.† She spoke lightly, but we both knew the seriousness of her words. With all of spirit's gifts came a cost: a darkness that showed itself now as anger and confusion, and eventually led to insanity. Darkness that sometimes bled over into me through our bond. Lissa and I had been told that with charms and her healing, we could fight it off. That was also something we had yet to master. I gave her a faint smile, moved by her concern, and accepted the ring. It didn't scald my hand, which I took as a promising sign. It was tiny and only fit on my pinky. I felt nothing whatsoever as it slid on. Sometimes that happened with healing charms. Or it could mean the ring was completely ineffectual. Either way, no harm done. â€Å"Thanks,† I said. I felt delight sweep through her, and we continued walking. I held my hand out before me, admiring the way the green stones glittered. Jewelry wasn't a great idea in the kind of physical ordeals I'd be facing, but I would have gloves on to cover it. â€Å"Hard to believe that after this, we'll be done here and out in the real world,† I mused aloud, not really considering my words. Beside me, Lissa stiffened, and I immediately regretted speaking. â€Å"Being out in the real world† meant Lissa and I were going to undertake a task she'd–unhappily–promised to help me with a couple months ago. While in Siberia, I'd learned there might be a way to restore Dimitri back to being a dhampir like me. It was a long shot–possibly a lie–and considering the way he was fixated on killing me, I had no illusions that I would have any other choice but to kill him if it came down to him or me. But if there was a way I might save him before that happened, I had to find out. Unfortunately, the only lead we had to making this miracle come true was through a criminal. Not just any criminal either: Victor Dashkov, a royal Moroi who had tortured Lissa and committed all sorts of other atrocities that had made our lives hell. Justice had been served, and Victor was locked away in prison, which complicated things. We'd learned that so long as he was destined for a life behind bars, he saw no reason to share what he knew about his half-brother–the only person who had once allegedly saved a Strigoi. I'd decided–possibly illogically–that Victor might give up the information if we offered him the one thing no one else could: freedom. This idea was not foolproof, for a number of reasons. First, I didn't know if it would work. That was kind of a big thing. Second, I had no idea how to stage a prison break, let alone where his prison even was. And finally, there was the fact that we would be releasing our mortal enemy. That was devastating enough to me, let alone Lissa. Yet as much as the idea troubled her–and believe me, it did–she'd firmly sworn she would help me. I'd offered to free her from the promise dozens of times in the last couple months, but she'd stood firm. Of course, considering we had no way to even find the prison, her promise might not matter in the end. I tried to fill the awkward silence between us, explaining instead that I'd really meant we'd be able to celebrate her birthday in style next week. My attempts were interrupted by Stan, one of my longtime instructors. â€Å"Hathaway!† he barked, coming from the direction of the field. â€Å"Nice of you to join us. Get in there now!† Thoughts of Victor vanished from Lissa's mind. Lissa gave me a quick hug. â€Å"Good luck,† she whispered. â€Å"Not that you need it.† Stan's expression told me that this ten-second goodbye was ten seconds too long. I gave Lissa a grin by way of thanks, and then she headed off to find our friends in the stands while I scurried after Stan. â€Å"You're lucky you aren't one of the first ones,† he growled. â€Å"People were even making bets about whether you'd show.† â€Å"Really?† I asked cheerfully. â€Å"What kind of odds are there on that? Because I can still change my mind and put down my own bet. Make a little pocket money.† His narrowed eyes shot me a warning that needed no words as we entered the waiting area adjacent to the field, across from the stands. It had always amazed me in past years how much work went into these trials, and I was no less impressed now as I saw it up close. The barrack that novices waited in was constructed out of wood, complete with a roof. The structure looked as though it had been part of the stadium forever. It had been built with remarkable speed and would be taken down equally quickly once the trials were over. A doorway about three people wide gave a partial glimpse onto the field, where one of my classmates was waiting anxiously for her name to be called. All sorts of obstacles were set up there, challenges to test balance and coordination while still having to battle and elude the adult guardians who would be lurking around objects and corners. Wooden walls had been constructed on one end of the field, creating a dark and confusing maze. Nets and shaky platforms hung across other areas, designed to test just how well we could fight under difficult conditions. A few of the other novices crowded the doorway, hoping to get an advantage by watching those who went ahead of them. Not me. I would go in there blind, content to take on whatever they threw before me. Studying the course now would simply make me overthink and panic. Calm was what I needed now. So I leaned against one of the barrack walls and watched those around me. It appeared that I really had been the last to show up, and I wondered if people had actually lost money betting on me. Some of my classmates whispered in clusters. Some were doing stretches and warm-up exercises. Others stood with instructors who had been mentors. Those teachers spoke intently to their students, giving last-minute words of advice. I kept hearing words like focus and calm down. Seeing the instructors made my heart clench. Not so long ago, that was how I'd pictured this day. I'd imagined Dimitri and me standing together, with him telling me to take this seriously and not to lose my cool when I was out on the field. Alberta had done a fair amount of mentoring for me since I'd returned from Russia, but as captain, she was out on the field herself now, busy with all sorts of responsibilities. She had no time to come in here and hold my hand. Friends of mine who might have offered comfort–Eddie, Meredith, and others–were wrapped up in their own fears. I was alone. Without her or Dimitri–or, well, anyone–I felt a surprising ache of loneliness flow through me. This wasn't right. I shouldn't have been alone. Dimitri should have been here with me. That's how it was supposed to have been. Closing my eyes, I allowed myself to pretend he was really there, only inches away as we spoke. â€Å"Don't worry, comrade. I can do this blindfolded. Hell, maybe I actually will. Do you have anything I can use? If you're nice to me, I'll even let you tie it on.† Since this fantasy would have taken place after we'd slept together, there was a strong possibility that he would have later helped me take off that blindfold–among other things. I could perfectly picture the exasperated shake of his head that would earn me. â€Å"Rose, I swear, sometimes it feels like every day with you is my own personal trial.† But I knew he'd smile anyway, and the look of pride and encouragement he'd give me as I headed toward the field would be all I needed to get through the tests– â€Å"Are you meditating?† I opened my eyes, astonished at the voice. â€Å"Mom? What are you doing here?† My mother, Janine Hathaway, stood in front of me. She was just a few inches shorter than me but had enough fight in her for someone twice my size. The dangerous look on her tanned face dared anyone to bring on a challenge. She gave me a wry smile and put one hand on her hip. â€Å"Did you honestly think I wouldn't come to watch you?† â€Å"I don't know,† I admitted, feeling kind of guilty for doubting her. She and I hadn't had much contact over the years, and it was only recent events–most of them bad–that had begun to reestablish our connection. Most of the time, I still didn't know how to feel about her. I oscillated between a little girl's need for her absent mother and a teenager's resentment over abandonment. I also wasn't entirely sure if I'd forgiven her for the time she â€Å"accidentally† punched me in a mock fight. â€Å"I figured you'd have, you know, more important things to do.† â€Å"There's no way I could miss this.† She inclined her head toward the stands, making her auburn curls sway. â€Å"Neither could your father.† â€Å"What?† I hurried toward the doorway and peered out onto the fields. My view of the stands wasn't fantastic, thanks to all the obstacles on the field, but it was good enough. There he was: Abe Mazur. He was easy to spot, with his black beard and mustache, as well as the emerald green scarf knotted over his dress shirt. I could even barely make out the glint of his gold earring. He had to be melting in this heat, but I figured it would take more than a little sweat for him to tame down his flashy fashion sense. If my relationship with my mother was sketchy, my relationship with my father was practically nonexistent. I'd met him back in May, and even then, it wasn't until after I'd gotten back that I found out I was his daughter. All dhampirs had one Moroi parent, and he was mine. I still wasn't sure how I felt about him. Most of his background remained a mystery, but there were plenty of rumors that he was involved with illegal business. People also acted like he was the kneecap-breaking type, and though I'd seen little evidence of this, I didn't find it surprising. In Russia, they called him Zmey: the serpent. While I stared at him in astonishment, my mom strolled over to my side. â€Å"He'll be happy you made it in time,† she said. â€Å"He's running some big wager on whether you'd show. He put his money on you, if that makes you feel any better.† I groaned. â€Å"Of course. Of course he'd be the bookie behind the pool. I should have known as soon as–† My jaw dropped. â€Å"Is he talking to Adrian?† Yup. Sitting beside Abe was Adrian Ivashkov–my more-or-less boyfriend. Adrian was a royal Moroi–and another spirit user like Lissa. He'd been crazy about me (and often just crazy) ever since we first met, but I'd had eyes only for Dimitri. After the failure in Russia, I'd returned and promised to give Adrian a shot. To my surprise, things had been†¦ good between us. Great, even. He'd written me up a proposal of why dating him was a sound decision. It had included things like â€Å"I'll give up cigarettes unless I really, really need one† and â€Å"I'll unleash romantic surprises every week, such as: an impromptu picnic, roses, or a trip to Paris–but not actually any of those things because now they're not surprises.† Being with him wasn't like it had been with Dimitri, but then, I supposed, no two relationships could ever be exactly alike. They were different men, after all. I still woke up all the time, aching over the loss of Dimitri and our love. I tormented myself over my failure to kill him in Siberia and free him from his undead state. Still, that despair didn't mean my romantic life was over–something it had taken me a while to accept. Moving on was hard, but Adrian did make me happy. And for now, that was enough. But that didn't necessarily mean I wanted him cozying up to my pirate mobster father either. â€Å"He's a bad influence!† I protested. My mother snorted. â€Å"I doubt Adrian will influence Abe that much.† â€Å"Not Adrian! Abe. Adrian's trying to be on good behavior. Abe will mess everything up.† Along with smoking, Adrian had sworn he'd quit drinking and other vices in his dating proposal. I squinted at him and Abe across the crowded stands, trying to figure out what topic could be so interesting. â€Å"What are they talking about?† â€Å"I think that's the least of your problems right now.† Janine Hathaway was nothing if not practical. â€Å"Worry less about them and more about that field.† â€Å"Do you think they're talking about me?† â€Å"Rose!† My mother gave me a light punch on the arm, and I dragged my eyes back to her. â€Å"You have to take this seriously. Keep calm, and don't get distracted.† Her words were so like what I'd imagined Dimitri saying that a small smile crept onto my face. I wasn't alone out here after all. â€Å"What's so funny?† she asked warily. â€Å"Nothing,† I said, giving her a hug. She was stiff at first and then relaxed, actually hugging me back briefly before stepping away. â€Å"I'm glad you're here.† My mother wasn't the overly affectionate type, and I'd caught her off guard. â€Å"Well,† she said, obviously flustered, â€Å"I told you I wouldn't miss this.† I glanced back at the stands. â€Å"Abe, on the other hand, I'm not so sure of.† Or†¦ wait. An odd idea came to me. No, not so odd, actually. Shady or not, Abe had connections–ones extensive enough to slip a message to Victor Dashkov in prison. Abe had been the one to ask for info about Robert Doru, Victor's spirit-wielding brother, as a favor to me. When Victor had sent back the message saying he had no reason to help Abe with what he needed, I'd promptly written off my father's assistance and jumped to my prison-break idea. But now– â€Å"Rosemarie Hathaway!† It was Alberta who called me, her voice ringing loud and clear. It was like a trumpet, a call to battle. All thoughts of Abe and Adrian–and yes, even Dimitri–vanished from my mind. I think my mother wished me good luck, but the exact wording was lost on me as I strode toward Alberta and the field. Adrenaline surged through me. All my attention was now on what lay ahead: the test that would finally make me a guardian.

Friday, September 27, 2019

Julio Le Parc Case Study Example | Topics and Well Written Essays - 750 words

Julio Le Parc - Case Study Example 501). For instance, the design of the exhibition played on the disparity between dark and bright spots, with some works hanging in openings to produce a sensory experience. The sensory experience was the true identification of the kinetic art since its mixed light, energy and movement in one perspective. The experiment also had a revolving mirrored discs and simple apparatus with small unsteady motors operating at different speeds to reflect and project light into the space. The notion was to play with the audiences’ perception and attract their concentration in the hall (Ruhrberg & Walther 2000, p. 501). As a result, the light’s movement over the setting and the audiences’ motion in reaction to them generated the work of art. To achieve the light and movement result, the arrangement had to be in a dark hall where light is perceived as both image and refraction. The significance of this research is that it led to the discovery of modern light and movement art works in architecture (Grabes 2008, p. 33). For instance, the designs of voids in buildings use concepts by Le Parc’s experiments to produce adequate lighting in houses. This art was about light and vibration of objects using optoelectronic properties. It concerned the use of light in different materials to illustrate space and movement frequency ranges. This work of art had simple elements adjusted in various ranges to show the light movements around the wall. A notable application of this project is used in Toyko museum where light movements were replicated in enclosed places. It was first exhibited in the French museum during an art show where light movement was put against mirrors (Herzog & Le Parc 2005, p. 58). This finding showed that light movement can actually operate under the influence of spectators within the environment. It also had discs that reflected the light during vibration from the surrounding systems. This was produced by putting a box in the middle of projects, which were

Thursday, September 26, 2019

Globalization Research Paper Example | Topics and Well Written Essays - 250 words - 1

Globalization - Research Paper Example Although the term ‘globalization’ is widely used and assumed to be crucially important across the globe, most people are unaware of the exact meaning of this term, as they have only a scant idea about this process. As Jan Aart Scholte (2000) maintains, â€Å"globalization is a distinctive and significant feature of recent world history. Moreover, the dynamics of globalization involve several of the core forces of modern social life: rationalist knowledge, capitalist production, automated technology, and bureaucratic governance.† (Scholte, 2000, p. 3). Therefore, a critical introduction to the concept of globalization confirms that it is a vital process involving almost all levels of social system of current world, although the discussions of globalization are generally muddled, redundant, unsubstantiated, and hyped due to the context of the world today. It is fundamental to recognize that globalization as a concept refers to the compression of the world as well as the intensification of consciousness of the world as a whole. Significantly, the processes and actions connected with globalization have been proceeding from the past over a long period and it is probable that it will go on to be the most engaging concept of discussion in the socio-political and economic spheres for long.

Ethnographic Comparison Essay Example | Topics and Well Written Essays - 1000 words

Ethnographic Comparison - Essay Example The discussion focuses on studying human behavior and culture using multiple ethnographic accounts. The three societies taken for comparison are the southern Ethiopian society, Chinese society, and Cherokee, a Native American society. The analysis provides background information of all the three societies along with discussing the specific aspect of cultural change within these societies. A vivid comparison and contrast between the societies is done in relation to the cultural change among women and standard of living. The realities of life and human behavior in relation to the cultural change in these societies are also addressed. Furthermore, the discussion also examines some of the social problems and public policy issues that are apparent in these societies. Ethiopia, a sub-Saharan country in Africa, is considered to be home to one of the oldest known human societies. During the prehistoric period, Hamitic people from Asia Minor and Semitic traders from Arabia migrated to this region. Being a multi-cultural and multi-ethnic society, it comprised of different cultural and geo-political boundaries, but with the Orthodox Church mainly dominating the cultural, political, and social life of the population. From the ancient times, the Chinese society is one with rich traditions. The countrys civilization is home to around 55 ethnic minorities including 14 Taiwanese aborigine groups, Shaoshu Minzu, RPC nationals, and the Han majority (Johnson, 2014). With the recent economic reforms and policies, China has transformed into a stronger economy. The Cherokee Indians, one among the tribes of Native Americans, are expected to have lived in and around the Eastern Band of Cherokee Indians Island. Ethnographers have recorded that these tribes migrated to south in ancient times from the Great Lakes region along with the Iroquoian people. The comparison of culture among these three societies provides valuable

Wednesday, September 25, 2019

Japan's recession Essay Example | Topics and Well Written Essays - 500 words

Japan's recession - Essay Example The government of Japan in May 2009 approved a stimulus of 2 trillion packages for Japanese corporations that were weak as well as less stable. It is ordinary for Japanese government to help weaker companies. Nevertheless, Japan’s latest recession cannot actually be attributed to a singular occurrence, experts, however believe that one of the leading reasons could be associated to a fourteen year high for the Yen in comparison to the dollar. The effect of Japan’s recession greatly altered the country’s market values on nearly all goods and their property market. Nevertheless, Japan was not the only nation that experienced the effect of recession, other countries like the US and Britain also lost a great amount of exports that were being traded to Japan, in addition to several other imports. Additionally, several Japanese stocks trading in foreign markets also plunged because traders feared losing totally especially the ones who had invested in Japan’s secu rities market (Koo, 2011). The Japanese government apart from organizing money for stimulus package also set up a system of strategies to assist in ensuring that the finances were being utilized efficiently. The government of Japan also spoke on how they were planning to assist those who recession had affected by providing various steps aimed at bringing the economy back to usual national standards. These steps included offering reduced mortgage interest rates, decreased requirements especially for businesses doing application for subsidies, extended subsidies by 6 months for energy efficient vehicles, extended subsidies for appliances that were energy-efficient, expanded government supported protection for corporations that needed funding from the government and finally offered incentives for freshly built houses as well as the ones renovated with appliances that were energy

Tuesday, September 24, 2019

LAND LAW Essay Example | Topics and Well Written Essays - 1750 words

LAND LAW - Essay Example The Law Commission in its Report No. 271 which gave way to the 2002 Act stated that the aim of the 2002 Act was to create a conveyancing climate in which: â€Å"...the register should be a complete and accurate reflection of the state of the title of the land at any given time, so that it is possible to investigate title to land on-line, with the absolute minimum of additional enquiries and inspections.†3 Section 70(1) of the Land Registration Act 1925 contained what can be described as a comprehensive list of property rights that could possible bind a bona fide purchaser. The greatest difficulty for a potential purchaser under the Land Registration Act 1925 was that although an overriding interest was not registered, it could bind the purchaser if the interest could be discovered by a reasonable investigation of title and inspection of the property. The list of these overriding interests under the Land Registration Act 1925 can be summarised as follows: 3- The rights of persons in actual occupation of the land in question or the rights of persons entitled to the receipt of profits and/or rents in respect of the land except where reasonable inquiries are made and the right of these persons are not discovered. 4- ‘Leases granted for a term not exceeding 21 years.’4 The Land Registration Act 2002 narrowed the list of these overriding interest as contained under Section 70(1)(g) of the Land Registration Act 1924 and goes on to function in such a way as to encourage the voluntary registration of these rights.. The revised list of overriding interests under the Land Registration Act contains a proviso that the rights are overriding upon first registration and by doing so expanded the list of those interest that are capable of registration. The new list of overriding interest include leases that terminate at the expiration of a seven

Monday, September 23, 2019

Describe and evaluate the multi-store model of memory Essay

Describe and evaluate the multi-store model of memory - Essay Example This essay will focus on the â€Å"multi-store model of memory developed by Richard Atkinson and Richard Shiffrin in the year 1968† (Kipp & Shaffer, pp. 300, 2009). Multi-store memory model revolves around three basic types of memories, namely, â€Å"sensory memory, short-term memory and long-term memory† (Nash & Bernstein, pp. 209, 2006). Therefore, it is essential to understand the types in detail. Many a times, one realizes that they have seen an object and have a picture of it in their mind. However, within a fraction of a second, it fades away. Other times, one asks another to repeat a certain thing just to realize they know it already. These instances depict the sensory memory. According to an experiment, when subjects are asked to report all the three letters they can see in a brief flash of a letter array, they usually can report only four of five letters. The number of reported letters is independent of the number of displayed letters. However, according to demonstration of a partial-report procedure, subjects are able to store a dozen or more items in a very short-term memory" (Gegenfurtner & Sperling, pp. 1, 1999). Another type of memory is the short-term memory. Whenever a person is thinking about a certain situation, their short-term memory begins its functioning. At any one time, the short-term memory may get its input from the external environment i.e. the surroundings of a person or from the long-term memory of that individual. An example of the former case may be a thought process of a conversation a person is into while the example of the latter may be the thoughts occurring about an event that happened in the distant past, which may be stored in the long-term memory. The short-term memory of any individual may show increment by recoding information. â€Å"Miller (1956) summarized evidence that people can remember about seven chunks in short-term

Sunday, September 22, 2019

Bleep Test Essay Example for Free

Bleep Test Essay Power is strength and speed together. A good example of this is sprinting. Coordination is the ability to use your limbs effectively. This would be used in sports like tennis and cricket. Flexibility is the amount of movement at a certain area of your body. This can be seen when doing gymnastics. Agility is the ability to move and change direction on your feet, changing your body position. Squash is a good example of this. Balance is the ability to keep an upright position. This would be used a lot in ballet. Body Composition is the build up of your body e. g. the amount of muscle/fat/bone you have. Reaction Time is how quickly you respond to a stimulus. A good example of this would be sprinters waiting for the shot to start. Endurance is the ability to keep going for long periods, like a long distance runner doing the 1500m Speed is how quickly you can put your body into action and how quickly you can cover a distance. 100m sprinters need this component. Strength is the maximum weight you can lift or the muscular endurance you can endure. This can be seen in a body builder lifting their maximum weight. The components of fitness I am hoping to improve on are: Strength Muscular and Cardiovascular endurance Composition To improve on my strength I am going to use resistance training. This will involve lifting 10kg weights every night and increasing the amount of repetitions I do. To improve on my muscular and cardiovascular endurance I am going to use continuous training. This will mean doing long distance running and a sit up bleep test. I will slowly increase on the distance covered when running. The overall effect of this training should improve my body composition, adding to my muscle and reducing the amount of fat. Heart Rate During my P. E. P I will record my heart rate at several key points during the activity. Resting Heart Rate Working Heart Rate Recovery Rate Resting Heart Rate is the number of beats whilst resting e. g. whilst reading Working Heart Rate is the number of beats after you have performed an exercise e. g. after you have just played in a rugby match Recovery Rate is the time it takes for your heart to return to its resting heart rate. Target Zones 205 Anaerobic training zone (Insufficient o2) 200 170 Aerobic training zone (Sufficient o2) 130 Resting heart rate 70 I will take my resting heart rate before I do any kind of warm up or activity. I will then do the warm up and main activity and take my heart rate immediately after, every minute for five minutes before doing a warm down. I will be looking for an increase in my recovery rate and a possible decrease in my resting heart rate. Performing the Activity It is essential that, when I am performing my main activity that I execute a sufficient warm up and warm down. A Warm Up: When exercising you need to do a sufficient warm up to warm the muscles. A warm up should not be a strenuous task, it should be something that takes little effort but gets your muscles warm, a slow job is a good example of this. After you have warmed your muscles you should proceed to stretching them. When stretching it is vital that you dont force the stretch as this could lead to various injuries. A stretch should be held for roughly ten seconds before proceeding to the next. If a sufficient warm up is not properly done or not done at all then you risk serious injury. A Warm Down: A warm down should be down after any main activity. It is done to remove the lactic acid from your muscles. Again it should not be strenuous, a light jog (or even a slow walk) is sufficient for a warm down. You should also stretch your muscles (in the same fashion as mentioned above). Failure to do this could result in fatigue and soreness for a few days after. Main Activity: When doing a main activity you need to be aware of what your limits are. Pushing yourself too far can result in serious injury. Although testing your limits is advised breaking them is something that should always be avoided. Stretches Stretches need to be performed before and after any activity. This is done to avoid serious injury during the activity and to decrease fatigue after the activity. These are the basic stretches used. It is important to stretch each muscle properly without straining or forcing the stretch as this could cause serious injury. A stretch should be held for 10-15 seconds. The main ones I will be using are the Abdom Abductor Lower Back Calf Hamstring Chest as these will be the most used areas during my P. E. P. My Activity: For my activity I am going to firstly make sure I have done a sufficient warm up. This will consist of a steady jog of about 300m then stretching the main muscle groups, then a steady jog back to the starting point. After doing so I will have a short rest period then do a sit up multi level fitness test. This is where you do sit ups to a recorded bleep which speeds up as the levels increase. After doing this I will do a warm down. This will be a slow walk then doing the standard stretches and a slow walk back. When at home every night I will do 15 repetitions of my 10kg weights. For this I will first stretch my arms then proceed to doing the repetitions. Once completed I will stretch my arms again. This exercise should not be performed alone so I will always have someone with me when executing it. I will also be doing 100 sit ups. Both of these exercises will progress over time. Technique: When performing my main activities I need to make sure I am using the right technique. When doing the long distance running I need to pace myself and remain at that pace for the duration of the run otherwise I will tire quickly. For the sit ups I need to keep my arms crossed across my chest and have a downward pressure on my feet, doing this every time will allow fair results to come through. For the weightlifting I have a poster that tells me the correct ways to lift the weights, this will help me use the proper technique and reduce the risk of injury. None of these tasks should be performed if I sustain an injury as it will only make it worse and prolong its effects. Equipment: For my main activities I am going to need several pieces of equipment. For the long distance run I dont particularly need anything but for the sit ups I need a stereo with tape playing capabilities and a tape of the multi level fitness test. I also need a mat to lye on to support my back. For the weight lifting I need my 10kg weights and the poster which tells me the correct technique. Fitness Level Before starting the 6 week training program I tested my fitness levels through a bleep test and a circuit. This is how we test the components of fitness. Power: Standing long jump Coordination: Bouncing a tennis ball off a wall alternating the catching and throwing hands Agility: Slalom through cones Reaction Time: Dropping a ruler and seeing at what measurement it was caught Endurance: Bleep test Speed: Shuttle run Strength: Throwing a 3kg ball as far as possible from a sitting position using a chest pass. My results are as follows: Power: 180cm Coordination: 18 catches Agility: 8:20 seconds Reaction Time: 15cm Endurance: 7. 5 Speed: 5. 20 seconds Max Reps: 15 Highest Level On Sit Up Bleep Test: 5. 4 When I performed the bleep test I was suffering from a minor flu which has affected my score on the activity so this will undoubtedly improve on the second time around. As for the other results they should improve after my training period, mainly my targeted components. If they do not then my 6 week plan hasnt been sufficient enough and I will have to look back at the frequency, intensity etc of the activities done. My P. E. P For my 6 week training period I am going to be doing a sit up bleep test every G. C. S. E lesson as well as a 100 sit ups at home every Monday, Tuesday, Wednesday and Thursday. Every night I will do 15 reps of 10kg weights. I will progressively build up the amount of sit ups and reps I do as well as trying to progress to higher levels on the sit up bleep test. On top of this I will be doing my usual schedule of rugby training. These training sessions are done on Monday, Tuesday and Sunday. If for any reason I feel I am not capable of performing an activity due to risk of injury then I will leave it for that session and see how I am feeling on the next session.

Saturday, September 21, 2019

Library Management System Based On Finger Prints And RFID

Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit