Friday, December 27, 2019

US Imperialism on Panama - Free Essay Example

Sample details Pages: 6 Words: 1671 Downloads: 10 Date added: 2019/04/15 Category Politics Essay Level High school Tags: Imperialism Essay Did you like this example? Faith Ann Hawkins Mr. Collins World History and Geography 3 November 2018 In history, it is a common theme to see that sacrifices must be made, but can some be too drastic? Many people today know of the vital waterway called the Panama Canal. Opened in 1914, the Panama Canal was one of the greatest engineering achievements in the world.(Alfaro, 2018). Don’t waste time! Our writers will create an original "US Imperialism on Panama" essay for you Create order It was first a project started by France in 1881, but they quit due to engineering problems and a high worker mortality rate. The U.S took over the project in 1904. This canal cuts through the Isthmus of Panama with a 51-mile long waterway, turning a ship ride around a continent into an 8-10 hour cruise through the canal. This canal has seen many owners, including Columbia, France, and the United States. Though, the way America got this canal is still a controversy. Was it right for Americans to do whatever it took to make this strategic waterway? The wrongdoing of this is summed up in the word imperialism. Though the Panama Canal is very important, how the U.S obtained it was not right. Imperialism is quite a strong word. At the time the canal was built, most countries sought to imperialism others for power. Imperialism is the control of one nation over another. Though, in this time era, the late eighteenth century, there was a different form of imperialism, New imperialism. This started when countries wished to have complete control over colonies instead of just setting up trading ports and such. America, even though people dont hear it much, was an imperializing nation too. What was so wrong with imperialism? There are many periods in history that are strong examples of to why imperialism is corrupt and wrong. There were three continents in which imperialism was very popular, Africa, India, and Asia. In southeast Asia, Great Britain was the first to start imperializing using the concept of new imperialisation. They wished to take Burma but failed. Instead, there constant influence in Burma caused the monarchy to fall and they took over. Many countries soon heard of this and started following so they wouldnt fall behind. New ways to rule an area appeared such as indirect rule, direct rule, and making protectorates. This colonialization caused many indigenous people to suffer. Colonizers didnt want the colonies to make industries, this policy often led to the development of plantation agriculture (Spielvogel 229). In this system, peasants worked as laborers on others plantations. The workers were kept at the poverty level for profit increase and many died due to the unhealthy conditions. Things like this continued in many areas of the world as they were colonized. The process usually was that colonizers took the area, colonists moved in, natives were treated unfairly, they colonizers try to change the culture, and then revolts pop up. The reason that the imperialist counties gave for these terrible actions was that Western powers were bringing the blessing of Western civilization to their colonial subjects, including representative government.(Spielvogel 229). Even then, not many native people were allowed to be in the government or even educated because the idea of political rights to the people scarred the colonizers. This example of imperialism doesnt show the full suffering of the native people. In India, people would hold parties at the Taj Mahal, a grave burial for the kings beloved wife. They would even chip pieces off as souvenirs. Imperialism corrupted many cultures and caused enormous amounts of hate and racism. Now, is it possible to see that imperialism is unacceptable? The U.S is no exception. The United States intruded onto Latin America and became known as the Big bully to the north(Spielvogel 243). The U.S imperialization of Latin America included Panama. People had dreamed of building a canal across Central America to link the Atlantic and Pacific Oceans (President Roosevelt Decides To Build The Panama Canal. VOA. N. p., 2006. Web. 4 Dec. 2018.). This included President Theodore Roosevelt. Two places in North Latin America caught the eye of Roosevelt and the U.S; Panama and Nicaragua. Engineers claimed that in the 1880s, Panama would be the cheaper choice. Though, at the time, they would have to buy land and building rights from the French company who was already there, through imperialism. With these two purchases, it could easily cost a hundred million dollars just to own the land. Congress approved of the building of the canal in Nicaragua. A debate soon sparked however because Fra nce had lowered the price of Panama. Roosevelt supported the Panama plan, but it was clear Nicaragua would win this debate. But as volcanic action destroyed homes and killed thousands, Panama became the only choice. The people in this area of Colombia wanted to separate themselves from the Columbian rule, so the U.S gave them a little shove. The United States was intrigued so much by Panama that they convinced rebel groups to take arms against the Colombians with the support of American troops and resources.(Effects On Panama Imperialism In Central America. Sites.google.com. N. p., 2018. Web. 6 Dec. 2018.). The Panamanians successfully won their independence from Columbia with the support of the United States. Though, the US only helped for one reason, the location to build the canal. Almost instantly the Americans restrained Panama with a treaty that gave the US the land where the canal would be built. The treaty was almost an exact replica of the treaty the US tried to give Colombia. Expect that the canal zone was now 16 meters wide instead of 10 and the US got permanent control of the canal (President Roosevelt Decides To Build The Panama Canal. VOA. N. p., 2006. Web. 9 Dec. 2018.). Panama signed it just 15 days after their declaration of independence from Colombia in 1903. Many Columbians and Americans protested and resented the actions of Roosevelt. Many saw him as a pirate. However, Roosevelt continued to build the canal. He said, I took the canal zone and let Congress debate. And while the debate goes onso does work on the canal. After ten years, the canal was finished in 1914. Panama, from 1903 to 1939, became a US protectorate. In 1921, Colombia and the United States entered into the Thomsonâ€Å"Urrutia Treaty. (Panama Canal. En.wikipedia.org. N. p., 2018. Web. 9 Dec. 2018.). In this treaty, paid Colombia $25 million and granted Colombia privileges to the canal. Colombia, in return, recognized Panama as an independent nation. Through all of the troubles of the imperialization a Panama, the US decided to return the canal. In 1977, US president Jimmy Carter and Panama leader Omar Torrijos signed a treaty that promised full control of the canal to Panama by 2000. Panama got full authority on December 31, 1999. The previous paragraph represented how the US controlled Panama and built the canal through the years, but what was the most important was how the people felt and were affected by this stage of imperialism. At first, once America had helped Panama lead a successful revolt, the leader of the revolution, Manuel Amador, said, Yesterday, we were slaves of Colombia. Today, we are free. President Theodore Roosevelt has kept his word. Long live the Republic of Panama! long live President Roosevelt!. This shows that at first, Panama found the US as an ally that had helped lead them to freedom. Soon, however, they realized this was not true. Colombia protested. It said the United States had acted illegally in Panama. Many American citizens protested, too. (President Roosevelt Decides To Build The Panama Canal. VOA. N. p., 2006. Web. 9 Dec. 2018.). As stated earlier, Roosevelt was widely seen as a pirate. Despite all these protested, Theodore Roosevelt didnt care. He stated, I took the Isthmus, started the canal and then left Congress not to debate the canal, but to debate me. Panama was utilized as a tool for Americas growing economy. Once the canal was finished, The US attempted to control all the profits made from it. The US propaganda that was directed toward the Panama government promised that the Panama canal would be profitable for their citizens. However, this was a complete lie on the USs part. Americas only interest was to imperialize Panama and take control and use the country as a source of profit exclusively(Effects On Panama Imperialism In Central America. Sites.google.com. N. p., 2018. Web. 9 Dec. 2018.). Truly, wealthy American businessmen were the profiteers. The attraction to the Panama canal was for economic growth, but instead, it aggravated tensions between Panama and the Us. Eventually, it leads to thousands of injuries and riots. Many other Latin American nations grew to fear the idea of American imperialization. Roosevelt, however, claimed that the US would only take action on nations who had debts to European countries. Despite the unjust sides of this, there were some ups. America brought in railroads, sewage, electricity, and schools. No matter what, the cons overpower the pros. What the US did was wrong. Many unfortunate things befell on the people of Panama, and it happens to be Americas fault. In the end, America shouldnt have imperialized Panama or any Latin American nation. After Roosevelt left office, the United States signed an agreement that showed Americas regret and gave $25 million to Colombia. Even though Roosevelt was out of office, his friends in the Senate rejected the proposal in his place. After his death, another agreement was signed. It still included the money but didnt include a statement of regret as the previous one did. This agreement was approved by the Senate. The engineering of this canal is something that should strike awe into anyone. The canal has a total of 3 locks and 3 chambers on each side of the ocean. The locks lift and lower ships from the Gatun Lake, an artificial lake to reduce excavation for the canal. This waterway is very important today. However, the imperialization that took place has left a permanent mark on the history of the US. People can hope that the US isnt seen as a nation who conquers others for wealth and resource, but instead as an ally to other nations across the world.

Thursday, December 19, 2019

Graduate Level Class Emergency Management - 4166 Words

Introduction Hurricane Katrina happened 4 years after the attacks of 9/11, 3 years after the succeeding production of the Department of Homeland Security (DHS), and one year after the DHS had actually produced a National Response Plan. However regardless of the heightened focus on homeland safety, the feedback to Katrina was a failure. The world viewed as government responders appeared not able to provide standard security from the ravages of nature. The titles of 2 congressional reports summed up the sense of failure. A Select House Committee [Residence Report, 2006] determined A Failure of Initiative while the Senate Committee on Homeland Security and Governmental Affairs [Senate Report, 2006] evaluated the United States A Nation Still Unprepared. (Moynihan, 2009). The bad feedback emerged from a failure to handle a lot of threat elements. The threats of a significant hurricane striking New Orleans had actually been long thought about, and there sufficed caution of the danger of Katrina that declarations of emergency were made days in advance of landfall. However responders fell short to transform this info into a level of preparation suitable with the scope of the approaching catastrophe. The distributed nature of authority in the United States intergovernmental feedback system additional deteriorated feedback, as federal responders fell short to acknowledge they should even more actively engage. In any case, numerous of the crucial institutional capabilities toShow MoreRelatedDnp Project Proposal Development Project Evaluation1153 Words   |  5 Pages4: Project Evaluation PICOT Question For graduate nurses, does the use of high-fidelity simulators compared to low-fidelity simulators lead to better non-technical skills during emergency situation/code blue within ten weeks? 1. Sample The interest population for the study comprises all graduate nurses working in a large health facility in the city. In the clinical environment, nurses ensure continuity of patient care and are involved in various emergency responses. Therefore, it is important thatRead MoreSyllabus Essay1480 Words   |  6 PagesAdministration - Oakland University Winter 2015 Time: 3:30-5:17 PM ï‚ ·MW Instructor: Tianxu Chen, Ph.D. Office: Elliot Hall Room 300 Office Hours: By appointment. E-Mail: tchen234@oakland.edu I. Course Description This capstone course in Strategic Management aims to equip you with the knowledge and analytical tools essential to comprehend and analyze how firms formulate and implement strategies. In doing so, you will learn how leaders of successful organizations make decisions and strategically maneuverRead MoreStudy And Career Preparation Of Emergency Nursing Essay1346 Words   |  6 Pagespresented is the student’s own, or has been referenced appropriately. â€Æ' Describe your chosen profession: Emergency nursing I feel is my vocation, I am a kind and compassionate person who can work amidst a high stress environment. An emergency nurse or triage nurse assesses each patient in the waiting room to determine how urgently they need to be seen. Once a patient has been brought through to the Emergency Department (ED) a nurse will check their blood pressure, listen to their heart and chest and checkRead MoreThe Recovery Room1612 Words   |  7 Pagesdifferent paths in their careers forcing the PACU managers to revise hiring requirements and open the PACU doors to non-ICU and new graduate nurses. In order to assist the new graduate nurses transition to their professional roles in the critical care setting, the Christ Hospital offers a critical care nurse residency program to a selected group of new graduates. New graduates hired to the PACU are required to attend this program prior starting their unit orientation and non-ICU nurses are required toRead MorePhysician Assistant Career As My Profession979 Words   |  4 Pagesin 1965, and its first graduate class was in 1967 from Duke University (American Academy of PAs). The Physician Assistant degree is a two year Master’s degree, offered multitude of colleges across the nation. (American Academy of PAs) This field was created, as there was a gap in the physician shortage in the healthcare system. (American Academy of PAs). This gap has now been filled by PA’s. A physician assistant can do everything a physician can do, under the management of a doctor. CurrentlyRead MoreWhy I Am A Teacher956 Words   |  4 PagesHuman Resource Management at the end of March. This simple, yet powerful little quote seemed to get to me on an emotional level because that is how I have worked my way through school and my life since I decided to continue my education two years ago, by taking one step at a time. I am a paramedic and have been for over fourteen years. I worked in the field on an ambulance right after I became a paramedic for many years. This was followed by several years in a busy, urban emergency department, whichRead MoreWhy I Got Into The Field Of Public Administration Essay1195 Words   |  5 PagesThe reasons that I got into the field of public administration was the community needs and its’ lifeblood. Plus, I have this desire to constant improve the overall policies for the ideal of good government. Ever since I got into the graduate school for a Master of Public Administration at the San Diego State University. I came from a small town in the east and moved to one of major cities in the United States. Everything and everyone from there opened my eyes wide opened to the world and all of its’Read MoreHealth Occupations: Registered Nursing877 Words   |  3 PagesWithout nurses the medical field would collapse. In order to fully understand the life and importance of a nurse, the road leading up to becoming a nurse must first be examined. A senior high school graduate must be accepted into a nursing program of his or her school of choice. Because so many graduates are crowding the health care field, it has become extremely hard to be accepted into nursing school. In order to help become accepted, an applicant must set themselves apart from other hopeful studentsRead MoreBenners theory and usefulness Essay1021 Words   |  5 Pagesor coaching function, Diagnostic client monitoring function, Effective management of rapidly changing situations, Administering and monitoring therapeutic interventions and regimes, Monitoring and ensuring quality of health care practice, Organizational and work role competencies (McEwen Wills 2014).In my present role as unit educator, I have the opportunity to be also involved with nurse orientation including new graduate nurses and also with clinical advanceme nt programs. Benner’sRead MoreFinance Plan1175 Words   |  5 Pageswill be a little different than most of the class. For the purpose of this assignment, I will create a new 5 year plan, which will probably go up in smoke as soon as my wife has our first baby (due in less than 2 months), and will use my experience in the workforce as well as a few other sources to complete the assignment. For reference, this financial plan will assume a January 2014 start date as I plan to graduate in December 2013. I will graduate Pitt with a bachelors in Finance and would

Tuesday, December 10, 2019

The Roles of Marketers

Question: Describe about the role of Marketers? Answer: Introduction There was a time when marketing was considered as a secondary function in the organization. With time, organizations have evolved and competition has increased. In this era of globalization and high competition, marketing is considered as important organizational function. One of the roles of marketers is to create high brand equity for the brand. Brand equity is defined as the value premium that a company realizes from a product with a recognizable name as compared to its generic equivalent (Parker, 2014). For example, brand equity is that value for which consumers are willing the I Phone or I Pod rather than buying a local brand or Brand Equity is the value for which consumers are willing to buy a Coca-Cola rather than buying a local soda. Today, organizations have realized that brand equity can help them to influence the decision of consumers. Marketers have realized the concept of relationship marketing and marketers have realized that relationship marketing can help to increase the brand equity. It would not be incorrect to say that brand equity of a product or brand would have an impact on consumer decision process (Valenzuela, 2013). It is expected that consumer would be willing to pay a premium price if the brand equity of product is high. Today, marketers have realized that consumers do not only buy a product but they also buy a brand. It can be said that brand equity is the promise that brands offers to customers. The objective of this research paper is to study the way brand equity can impact the consumers decision to buy a particular product. The paper would also discuss the extent to which brand equity can influence the buying decision. The main research question of this research work cane be highlighted as: To What Extent does a company's brand Equity impact consumers decision to buy a particular product? Literature review and Research Questions Lehmann Neslin (2012) argued that there has been a fundamental difference in the way consumers used to make the purchase decision. There was a time when consumers used to analyze the quality of product itself and they paid little attention to brand. That was the time when corporations had limited reach and the product concept of marketing was prevalent. With time, the concept of branding and brand equity has been established (Sachse, 2011). Nowadays life in a society is decided by What people have not by what people are. Therefore, this leads to situation where everyone wants to have a prestige in the society by maintaining the standard of living, which makes him or her different from the rest of the people. This prestige could be obtained with branded products. In todays society, the brands not only represent the symbol of company but the standard of living also (Schmitt, 2009). Which product a person uses in his day-to-day life reflects his taste, his status in the society, his ec onomic background and many other things. Therefore, it makes a close relationship between the company and its brand with the consumer. Therefore, people would buy the products from a reputed brand. Guizani Merunka (2011) argued that the competition has increased in the current world. There was a time when competition was limited and organizations were able to reach out to customers through their products. However, today the fact is that there exists very little difference between the same products of different companies. For example, the carbonated drink of Pepsi and Coca-Cola. In fact, people would find it difficult to identify the product when they are blindfolded (Lin, 2008). Therefore, it can be said that people do not just buy the product but they buy the brand and they want to get associated with the brand. People do not just like the cola in Pepsi or Coca-Cola but they like the brand. Therefore, it can be said that the purchase decision of consumers depends on the brand equity. This decision is influenced more when there exist minimal differences in the product (Trib, 2011). This decision could be impacted less if the products are different and consumers are able to dif ferentiate the products based on certain tangible and intangible attributes. Huang Sarigollu (2012) mentioned that for a single commodity, multiple brands are available in the market, so it gives a mental and physical activity to a consumer which product to use. For this consumer has to be active, should have an enormous amount of information with regards to product and services available. Customer has to follow the sequence of step in decision process to purchase a particular product. They start realizing the requirement of product, get information, identify and evaluate alternate products and finally decide to purchase the product from a specific brand. There are number of clues present in the environment that guide public in selection (Schroeder, 2009). One of them is brand. Here comes the importance of brand. In each of the step of consumer buying process, the brand equity could have an influence. For example, when users are evaluating the options, he or she may reject or accept some options because of brand reputation or brand value. It is important for marketers to analyze the consumer purchase process for their product and then align the branding strategy based on the consumer purchase process (Allen, 2014). It would give an idea to marketers about the phase where products should be marketed to customers. Nam Whyatt (2011) highlighted that Brand is a combination of name, symbol and design. Brand represents the customers perception of opinion about the performance of the product. The powerful brand is one, which resides in the mind of consumer and they become loyal to the brand. Brand is nothing but a promise and consumers may want to take a promise that could be fulfilled by companies. Therefore, brand value of the company can have an impact on the consumer purchase decision. In fact, some of the brands have good products but they are not able to sustain the market because they do not have any brand equity. Buil Chernatony (2013) argued that it is easy to develop or manufacture the product and start a company. However, it is difficult to create a brand. It can be said that brands are not created in a day or two. It can take months and years to create a brand. There are various factors and attributes of brands that can attract customers (Yaprak, 2008). These attributes would include both tangible and intangible things. It would include the product itself, the pricing, promotion etc. It would include the marketing mix of product and it would also include the packaging of product. As the branded products have attractive packaging, so it appeals to consumers. It has a logo, which can be easily identified by the customers. As the life of the people is too busy, they need shortcuts, which is provided by brand identity in selection of products (Tellis, 2013). Many researchers agree that the choice of brand name can alter the consumer judgement about the product and their purchase decision-mak ing process. With competition getting fiercer and product quality becoming more homogeneous, a better brand name can be decisive in product choice if the consumer compare several products (Tellis, 2008). However, many companies are able to have better products and yet are unable to compete in the market due to poor branding activities. Thus, strong brands have the potential to generate long term and loyal customers, which would eventually lead to an increase in sales in the future. One Instance in support of this can be highlighted as: In October 2012, report from Forbes magazine, Apple was ranked as the top global brand with a value of $87.1 billion. This is how brand affects the buying decision of consumers. Research Methodology Typically, any research could be primary research or secondary research. This research would use a mix method of research. It means that this research work would use both primary and secondary research. The research methodology or research design would be to start with the primary research and the continue the secondary research. The research methodology for this research work would be divided into 7 phases. These phases can be discussed as: Phase 1: Research Topic identification This would be the first phase of the research project. This would be the phase where research topic would be identified. The identified research topic is Brand equity and consumer purchase decision. It can be said that this is one of the most important phase of entire research work as it is very important to identify the research topic (Hoicka, 2014). Phase 2: Background Study This would be the phase where the background study would be done on research topic. The background study would help to formulate the specific research questions. The background study would be done in the form of literature review of existing literature (Bryman, 2012). The background study would also be done on the previous research work of similar nature. Phase 3: Identification of research questions This would be the phase in which the research questions would be designed based on which entire research would be done. There are two crisp research questions identified for this research work (Saunders, 2011). It is recommended to have definite and specific research questions for any research work. Phase 4: Primary research This would be the phase in which inputs from respondents would be collected. It would be the phase in which survey would be designed and questionnaire would be mailed to sample of 200 people. The sample of 200 people would include both customers and executives. At least 40% of the sample (80) would be female candidates. Out of 200, 150 would be consumers and 50 would be from management layer of corporations. The 200 people would belong to age group of 18 years to 60 years with at least 20% of the sample with more than 50 years and at least 20% of the population with less than 30 years. This distribution would ensure a fair and equal participation from different age group. The survey would be targeted to only urban population. The survey would consist of only close-ended question. It would ensure that respondents do not find any difficulty to answer the questions. It has been observed that people would find it easy to fill the short survey. A sample of questions that would be part of this survey would be: Question 1: On a scale of 5 (1 with least and 5 being highest), how strong would you rate your behavior to buy a product due to its brand name? Question 2: On a scale of 5 (1 with least and 5 being highest), would you try a new product just because it is from reputed and establish brand? Question 3: Would you be willing to buy a low price local product or a slightly high price branded product? The primary research would be mainly quantitative in nature but it would also have some element of qualitative research. The qualitative research would be done in terms of focus group interview and group discussion. A focus group of experts would be created that would discuss the issue of brand equity and consumer behavior. It is expected that a good amount of information would be collected from focus group interviews (Babin, 2012). These interviews would be held with marketing executives of companies. The group discussion would be done with employees of organization, management and consumers. Phase 5: Secondary Research This would be the phase in which information would be collected from previous research in this area. This would be mainly qualitative in nature. The online sources would act as great source of information. The Internet is full of resources over brand equity and consumer purchase. The journals and articles would be used to collect data and information about brand equity and consumer purchase decision. It would be important to mention that not all the sources on Internet could be trusted. Therefore, only peer-reviewed journals would be used to collect the information from Internet as part of secondary research (Emma, 2007). Phase 6: Data Collection This is the phase where the collected data would be collected. The data would be collected as part of both primary research and secondary research. The surveys websites would be used to create survey and survey would be mailed to respondents. The next part would be data analysis part. Phase 7: Conclusion and Report generation This is the phase where inferences and conclusion would be made. In this phase a report would be generated to summarize the work of research. The report would be developed in a clear and simple writing that would summarize the results through graphs and charts. Analysis of Data Probably, one of the most important phases of entire research work is data analysis phase. The data would be collected as part of both primary research and secondary research. The statistical tools would be used to analyze the data. The tools like Microsoft Excel and SPSS would be used to analyze the data and make inferences. One of the important activities in data analysis phase would be to fill the missing values and filter or clean the data. It is also important that research data should be free of any form of bias. It is difficult for research to control the biasness of respondents. The data for focus group study and group discussion would also be analyzed (Bryman, 2011). This data would be in form of qualitative information. That would be collected as part of qualitative study. There would be predefined templates and charts that would help to analyze the data of group discussion and focus group interviews. These templates would be used to record the data. Once the data is record ed and captured, statistical tools would be used to analyze the data. Once the data is analyzed, researcher would be able to conclude the research. The data of secondary research would also be analyzed in a similar manner. It can be said that the data collected from secondary research does not have much of the bias as compared to data collected from primary research. Ethical considerations Any research work would include number of ethical considerations. The most important ethical consideration is that researcher should not use the information collected from respondents for any work, other than this research work. The data and information collected from people should not be shared without their consent (Shin, 2010). It is also important that researcher should avoid using the names and identity of the people involved in the research work. The researcher may face certain ethical dilemmas while using the result of research. It is important that researcher should not be judgmental in his approach. The ethical issues could be best avoided if researcher is able to work in an unbiased way. In any of the circumstances the confidential information of respondents should not be made public. It is important that researcher should create a balance between personal objectives and professional objectives. The ethical considerations could also be avoided if researcher could use a defi ned set of standards and procedures for the research work. The respondents should be made aware of these standards at the beginning of the research work. References Alan, B., Emma, B. (2007). Business research methods.Cooper. R. Donald Emory. C. William (1995).Business Research methods. Buil, I., de Chernatony, L., Martnez, E. (2013). Examining the role of advertising and sales promotions in brand equity creation.Journal of Business Research,66(1), 115-122. Bryman, A., Bell, E. (2011).Business research methods 3e. Oxford university press. Nah, S., Saxton, G. D. (2012). Modeling the adoption and use of social media by nonprofit organizations.New Media Society, 1461444812452411. Huang, R., Sarigll, E. (2012). How brand awareness relates to market outcome, brand equity, and the marketing mix.Journal of Business Research,65(1), 92-99. Kim, A. J., Ko, E. (2012). Do social media marketing activities enhance customer equity? An empirical study of luxury fashion brand.Journal of Business Research,65(10), 1480-1486. Nam, J., Ekinci, Y., Whyatt, G. (2011). Brand equity, brand loyalty and consumer satisfaction.Annals of Tourism Research,38(3), 1009-1030. Parker, B. T. (2014, January). An Examination Of The Relationship Between Brand Equity And Consumer Response Toward Environmental Product Advertisements. InAmerican Academy of Advertising. Conference. Proceedings (Online)(p. 76). American Academy of Advertising. Sang Jib Kwona, E. P. (2010). What drives successful social networking services? A comparative analysis of user acceptance of Facebook and Twitter . Science Direct, 534-544. Shin, D.-H. (2010). the effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption . Science Direct, 428-438. Stahl, F., Heitmann, M., Lehmann, D. R., Neslin, S. A. (2012). The impact of brand equity on customer acquisition, retention, and profit margin.Journal of Marketing,76(4), 44-63. Valenzuela, S. (2013). Unpacking the Use of Social Media for Protest Behavior The Roles of Information, Opinion Expression, and Activism.American Behavioral Scientist,57(7), 920-942. Valette-Florence, P., Guizani, H., Merunka, D. (2011). The impact of brand personality and sales promotions on brand equity.Journal of Business Research,64(1), 24-28. Bambauer-Sachse, S., Mangold, S. (2011). Brand equity dilution through negative online word-of-mouth communication.Journal of Retailing and Consumer Services,18(1), 38- 45. Brakus, J. J., Schmitt, B. H., Zarantonello, L. (2009). Brand experience: what is it? How is it measured? Does it affect loyalty?.Journal of marketing,73(3), 52-68. Nagalingam, S. V., Lin, G. C. (2008). CIMstill the solution for manufacturing industry.Robotics and Computer-Integrated Manufacturing,24(3), 332-344. Torres, A., Trib, J. A. (2011). Customer satisfaction and brand equity.Journal of Business Research,64(10), 1089-1096. Schroeder, J. E. (2009). The cultural codes of branding.Marketing Theory,9(1), 123-126. Allen, F. (2014).Secret formula: How brilliant marketing and relentless salesmanship made Coca-Cola the best-known product in the world(p. 33). HarperBusiness. Golder, P. N., Tellis, G. J. (2013). Pioneer advantage: marketing logic or marketing legend?.Journal of marketing Research, 158-170 Johnson, J., Tellis, G. J. (2008). Drivers of success for market entry into China and India.Journal of Marketing,72(3), 1-13. Yaprak, A. (2008). Culture study in international marketing: a critical review and suggestions for future research.International Marketing Review,25(2), 215-229. Yu, T., Wu, N. (2009). A review of study on the competing values framework.International journal of business and management,4(7), p37. Bijvoet-van den Berg, S., Hoicka, E. (2014). Individual differences and age-related changes in divergent thinking in toddlers and preschoolers. Developmental Psychology, 50(6), 1629- 1639. doi:10.1037/a0036131 Bryman, A. (2012).Social research methods. Oxford university press. Liamputtong, P. (2009). Qualitative research methods. Saunders, M. N., Saunders, M., Lewis, P., Thornhill, A. (2011).Research methods for business students, 5/e. Pearson Education India. Zikmund, W., Babin, B., Carr, J., Griffin, M. (2012).Business research methods. Cengage Learning.

Tuesday, December 3, 2019

World over a precipice Review Essay Example

World over a precipice Review Paper Essay on World over a precipice Read with great interest the previous reviews, is now just want to make a simple contribution to the assessment of reading the book. And if appropriate to compare with womens novels, I would like to recall the talented writer V. Tokarev, a few stories read. As Tokarev Oleg Roy affects the readers emotions, showing that life is sometimes like a puzzle, difficult and intricate, sometimes tranichna. But unlike the writer, Roy offers the reader an optimistic and cheerful finale, as if rewarding isperezhivavshegosya over the fate of everyman heroes. I would like to mention a fascinating storyline. In general, the novel will not be bored! Author is definitely a spark of talent, but . First of all, truly talented work always multi-layered, explain, with each new reading is sure to find something new. It does not end with a description only of life and the characters of the characters, but also affects the deeper themes, as chitetsya between the lines. Secondly, there is such a wonderful rec eption in the literature written with irony about the most difficult and tragic moments. This technique used by Gogol, and of modern writers Paul San and John Irving (classic of modern American literature). If the author used it, it is not so sad melancholic reader would have to, because you can and bring to a heart attack))). In general, I liked that in the novel there is an active psychology and the authors position is commendable. For example Vitas line a very tragic way, for which unfortunately there is no happy ending! Meanwhile, his prototype is found at every turn. The image of women is very bright and real! I am sorry if someone hurt his assessment, but in the written novel, I could see both negative and positive aspects of the authors intention. Just as it is to read the book quickly, almost in the same breath, and not left food for thought at least a week after reading it. As noted in previous reviews solve all the same to you. Read! World over a precipice Review Essay Example World over a precipice Review Paper Essay on World over a precipice Since childhood, I like to read. The book a unique thing it helps to learn something new and experience the vivid emotions, relax and immerse yourself in a fantastic world For its thirty years I have read many classical works, each of which deserves a separate discussion, but did not leave without. attention and the work of contemporary writers, such as domestic. Many of the books in this category, fall into my hands, can only be described as Pulp Fiction. Books do not have to allow time to kill, in the best case. But despite the general trend, I discovered and interesting writers. Particular attention should be paid to Oleg Roy. My acquaintance with the author began with his book The World of the precipice, which tells the tragic story of a man who lost his wife and daughter Perhaps more terrible loss to come up with is impossible. .. More recently, Igor Bykov was a happy father and a loving husband, he madly loved his family and was infinitely happy that fate has given them to him. But just at one point she also took it all His world seemed so serene and strong flying into the abyss. Like in the film World over a precipice: an impregnable fortress, an indestructible castle stands on a piece of ground, hanging over the abyss deeply sunk into the soul of this metaphor We will write a custom essay sample on World over a precipice Review specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on World over a precipice Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on World over a precipice Review specifically for you FOR ONLY $16.38 $13.9/page Hire Writer World over a precipice, however like other novels of Oleg Roy, I read in one breath. Written by relaxing the reader an intriguing storyline, says on a serious topic that gives deep meaning to every story. Heroes Oleg Roys on the brink of life and death, love and hate, happiness and despair As I read the first novel by Oleg Roy, World over a precipice deeply sunk into my soul, but not cease to amaze and new books of this writer!

Wednesday, November 27, 2019

Evil Under the Sun Essays

Evil Under the Sun Essays Evil Under the Sun Essay Evil Under the Sun Essay There is evil everywhere under the sun. Hercule Poirot (The Great Belgian Detective) I book I have recently read is Evil under the Sun by Agatha Christie. Agatha Christie is famous for her crime mystery novels and short stories and like any other of her books this one is also a murder mystery. This book brings excitement and also challenges you to solve the mystery that Christie has brilliantly presented with the use of rather simple words and everyday language and repeats it, rather than trying to introduce new words and phrases. She also relies heavily on dialogue throughout the book. In addition, the solution often depends upon the reader’s interpretation of something that a character says. Therefore by keeping her dialogues very simple and straightforward, and not challenging the reader with the vocabulary, she leaves us free to focus on the plot. Agatha Mary Clarissa Miller was born on 15 September 1890 in Torquay, England. Her father, Frederick, was an outgoing American with an independent income. Her mother, Clara, was rather shy; Agatha resembled her greatly in personality. There were two other children Madge and Monty, both older than Agatha. Although Agatha had amused herself as a child, acting out stories and make believe, her writing career really began after her sister Madge challenged her to write a novel. It took several years to get her first book The Mysterious Affair at Styles published. Agatha’s happiness was complete when Rosalind, her only daughter was born on 5th August 1919 but by 1926, her life was in tatters: Christie’s mother Clara died and Archie left her for another woman. She then went to Baghdad to rebuild her life and married Max Mallowan and continued writing stories. After a hugely successful career and a wonderful life Agatha died peacefully on 12 January 1976. Agatha had an easily recognisable style of writing, but this only led her to fame. There is a level of repetition of key concepts in her words within a small space. When Agatha is getting a concept across, she repeats key words and words which are similar in meaning in rapid succession and in a condensed space. This is how language affects the mind and how the words can ave an affect on how we think and feel. By repeating words at least 3 times in a paragraph, it enables the reader to become convinced about something. In addition, a person’s conscious mind has a very limited focus, and can only focus on between five and nine things at one time. Once there are more than nine things to focus on, the conscious mind can’t continue to track them all, and so the person literally go es into a hypnotic trance. Agatha often uses this by using more than nine characters, and by having more than nine plot lines taking place at any one time. As the reader’s mind gets overloaded, they start to begin really experiencing the book, feeling the book, and getting lost in it. Agatha Christie very precisely controls the speed at which we read her books, by changing the level of descriptive passages. There are more descriptive passages at the beginning of her book than at the end, which has the effect that we read more quickly towards the end of her books literally we are rushing towards the end to see who did it! The book very well depicts the way she writes. This extract is from the beginning of the story and clearly shows the immense descriptive but simple language used by Christie; Hercule Poirot, resplendent in a white duck suit, with a panama tilted over his eyes, his moustaches magnificently befurled, lay back in a deck chair on a sunny terrace overlooking the bathing beach. Casually his fellow guests at the luxury hotel moved around him, talking, knitting, drying from their bathes, anointing themselves with oil. As I mentioned earlier that Agatha uses multitudinous characters to lure the readers into her realm. There are many characters in this story as well and are described in such a manner that they speak to the reader and not only make the readers sympathise for their soft side but also make them empathise. These characters are as follows: -Hercule Poirot, the famous Belgian detective with the little grey cells -Colonel Weston, the Chief Constable -Inspector Colgate, the investigating officer -Sergeant Phillips, a policeman in the case -Dr. Neasdon, the police surgeon -Captain Kenneth Marshall, Arlenas present husband, proud as Lucifer -Arlena Stuart Marshall, a former actress and Kenneth Marshall’s wife -Linda Marshall, Kenneth’s daughter and Arlena’s stepdaughter, naive and precocious -Patrick Redfern, Arlena’s lover and Christines husband -Christine Redfern, Patrick’s wife, pretty in a washed out way and a mousy/silent woman. -Rosamund Darnley, a fashionable dressmaker and Kenneths past childhood friend -Emily Brewster, an athletic spinster -Mrs. Carrie Gardener, a garrulous American tourist -Mr. Odell Gardener, the husband of Mrs. Gardener who quite obligingly does whatever Mrs. Gardener says. -Sir Horace Blatt, a yachtsman, a self made man Reverend Stephen Lane, a clerical guest who quite openly declares Arlena Marshall the evilest in the land. -Major Barry, a retired officer who fought in India -Gladys Narracott, a chambermaid in the Jolly Roger Hotel -Mrs. Daffney Castle, the owner of the Jolly Roger Hotel The plot of this magnificent story is quite complicated but the motive of th e murder in the story is money. Arlena is a very beautiful retired actress and a flirtatious young woman with many men attracted to her. She goes to the Jolly Roger Hotel with her husband and step daughter, Kenneth and Linda Marshall. Linda Marshall, a sixteen-year-old girl, dislikes her stepmother very much. Arlena flirts in the hotel with a handsome man named Patrick Redfern who is infatuated with her. This makes his wife Christine Redfern, an educated schoolteacher, jealous and hurt. Early on the morning of the murder, Christine witnesses Linda accidentally dropping a parcel, which reveals a number of candles. Christine asks Linda to come to Gull Cove with her. On the same morning, Arlena goes out on a float and asks Poirot not to tell anyone where she is going. In Poirots mind Arlena is going to meet Patrick Redfern, but he is proved wrong when Patrick asks Poirot if he has seen Arlena. Patrick Redfern asks Emily Brewster to join him in a rowboat outing. They eventually reach Pixy Cove and find a body lying there, her arms outstretched and her face hidden by a hat. It is the strangled body of Arlena, killed at about quarter to 12. When they begin to question peoples whereabouts, Kenneth Marshall says he was in his room typing letters at the time of the murder. Linda lies that she was fond of her stepmother. She also claims that she and Christine went to Gull Cove at about 10:30 and that she returned to the hotel at about quarter to 12, which would mean it was impossible for her to have committed the murder because the murder was committed at exactly quarter to 12. The Gardeners were with Hercule Poirot at that time of the murder and thus cleared of suspicion. Rosamund Darnley claims that she went to Sunny Ledge (above the Pixy Cove) to read a book. She says that she saw no one because she was concentrating on reading but while Emily and Patrick were rowing a boat, they saw her there. As for the rest of the group, Stephen Lane and Major Barry went out and Horace Blatt sailed. Christine, Rosamund, Kenneth and Mr. Gardener all went to play tennis at noon. The chambermaid also heard Kenneth Marshall typing in his room, thus corroborating Kenneths story and clearing him of suspicion. Poirot goes to Pixy Cove to investigate the place, he finds a pair of new scissors, a fragment of pipe, and a bottle. The pipe could be Kenneths, but he is not the only one who smokes a pipe. On entering Pixys Cave he also finds heroin. There are suspicions that Horace Blatt has something to do with smuggling of drugs or with the murder. Poirot also enquires about the murder of Alice Corrigan many years ago. It emerges that she was also strangled but her murderer was never caught. Alices husband Edward claimed innocence and had an alibi because he was away at that time, thus, making him impossible to commit the murder. Alices body was found at the time by a school teacher. Poirot has an idea to go for a picnic, perhaps to make a little test. Christine and Emily had both mentioned that they were afraid of heights. Therefore, when they are made to cross a narrow bridge with running water below nearby on the way to the picnic, they should feel giddy and uncomfortable doing so. Emily does, yet Christine crosses the bridge without any problems. Therefore it is shown that she has told at least one lie could all she had said earlier be lies too? When they return, the chambermaid tells them that Linda is not feeling well. On entering her room it transpires that Linda took six sleeping pills in an unsuccessful attempt at suicide, leaving a letter confessing that she was the one who killed Arlena. As she recovers, the true nature of her confession is revealed the mysterious parcel of candles she had dropped earlier was part of a magic spell directed at Arlena, and she mistakenly believed it to have killed her. After that Poirot tells everyone the identity of the murderer. Patrick Redferns real identity is Edward Corrigan, the husband of Alice Corrigan who was also murdered by Patrick years ago. The games mistress who found her body was Christine Redfern, then known as Christine Deverill, and she also helped Edward to kill Alice. So, Patrick Redfern and Christine Redfern killed Arlena. The body Patrick and Emily had seen was the live body of Christine, who was helping Patrick. When Emily left to call the police, Christine went to the hotel and Patrick strangled Arlena, who was in the cave. The story is very involving because there is too much happening and the key to solve the challenging mystery is only one man, Hercule Poirot. The overall impression of the book is good and I believe it is a good read for anyone who enjoys the intricacies of the motives and the cleanliness of committing murder. I recommend this book to everyone in my class and even to you maam, if you havent read then you should give it a try

Saturday, November 23, 2019

Nokia and the RFID student attendance monitoring system The WritePass Journal

Nokia and the RFID student attendance monitoring system Abstract: Nokia and the RFID student attendance monitoring system Abstract:Introduction:Aim: Deliverables: Research question(s): Problem StatementScope:Summary:Resources required:Literature Review:Smart Card Technology:RFID technology background:RFID Reader RFID tags:RFID Frequencies:Elements of an RFID System: Technical capabilities of Mobile interaction with NFC:NFC detection:Share to device:Service tags:Share or read service tags:Bluetooth:Numeric Comparison Method: Just Works Method:Out of Band Method:Passkey Entry Method:Contactless communication API:  Ã‚   DesignDescription:References:Related Abstract: RFID student attendance monitoring system is a system that will take students attendance by using RFID technology. This system mainly comprises of Nokia 6212 NFC mobile which is used as RFID reader, RFID tags which are embedded to the students ID cards and Server machine which is likely computer. This system records student’s attendance to an attendance database server. The system is included with other additional system module for students and lecturers. The information in the attendance database is used by the university administration to better manage the class room statistics, warning for unattended students via letters or e-mails, reminder for students, report for parents and students can also track their performance. RFID student attendance monitoring system is developed using java programming language. The database support for this software is oracle 10g. In order to have complete system functionality, the software application is needed to be integrated with the RFID te chnology. The software application on the computer is needed with the attendance details which would come from the RFID reader in to order to take attendance and persist in the database. The software application on the computer is deployed in Apache Tomcat 6.0 server and can be viewed by the user by using any internet browsers such as Mozilla Firefox or Google Chrome. Introduction: The research is proposed to investigate the requirements of automatic students’ attendance monitoring system. The requirements which has been identified and modelled are represented in the form of structure for students’ attendance system. In order to obtain requirements, some of the methods have been applied such as observation and literature research related to current RFID monitoring systems. We have an existing system like taking attendance manually. For example professors take attendance of their students by taking signatures on an attendance sheet. The main problem with this system is that students will sign occasionally for their friends who are not present to the class. The purpose of this project is to automate tracking of the presence of students in the class room, with the intention of bringing transparency and reducing number of errors that usually happen in such tasks. The another problem is counting each student attendance for the total semester will be difficult if the professor got 100 or more students which leads to time consuming and error prone. In order to make taking attendance simpler I got a thought to make this application automatic with the existing identification technologies like automated finger print identification system, barcode system and radio frequency identification system. In my project I am using radio frequency identification (RFID) technology for security and attendance purposes. Identification means the ability to find, retrieve, report, change or delete specific data without having any doubt. These problems can be eliminated by using RFID technology. The main advantage of RFID based student attendance monitoring system is, 1. It saves time for taking attendance during the class. 2. More authentic attendance system 3. Reduces paper based system 4. It provides interaction between student, course leaders and lecturers. Student attendance monitoring system is an exclusive software solution. It can be integrated with RFID technology. In order to implement this project we require RFID reader, RFID tags and web interface. The card reader should positively identify student’s ID cards and provide consistent class attendance logs for the benefit of students, lecturers and university. The attendance logs must be stored in the central database in order to generate reports. The device must capable to communicate with the central database server. Professors should be able to view attendance and be capable to add information to the system. 1. This application tracks each student’s classroom attendance for any number of students. 2. It provides a software set up to monitor information about scanned cards against a database and provides detailed statistics to the lecturer’s about the students. The software set up must include adequate administration capabilities. 3. Provide a wireless interface between the reader and database server. 4. It also provides facility to the course leaders, professors to monitor student attendance at regular intervals. 5. It monitors the attendance of students for each course. Radio frequency identification (RFID) consists of a transmitter chip/IC and a receiving antenna. Each chip has a unique identification number generally referred to as a RFID Tag, which is attached to the object that we want to discover. Now the RFID tags are detected and identified using an antenna or a scanning device known as transceiver, which with the help of radio signals identifies the tag, the object. In this project, the RFID tags will be associated, to the students (by attaching the RFIDs to student’s university cards) and the transceivers will be placed on the entry points of the classrooms. Software at the back end will keep and manage the records, relating to the student’s entry to the classroom. All the use-cases will be accomplished using software having application and databases layers. Concepts of Object orientation will be followed in the design of the system. Aim: This research is aimed to develop a student attendance monitoring system using RFID technology. Objectives: The main objective of the project is to automate the student attendance recording system using RFID technology. To study on data transfer between RFID system and Graphical user interface (GUI). The application should be able to display the student attendance percentage in each of the modules and the overall semester attendance. The application should be capable to generate attendance reports for the authorized party which we would be helpful for university administration to have better database record. To test the application using testing techniques. Deliverables: 1. A review of RFID readers and methods for programming them including a demonstration application running on the Nokia 6212 that can read the unique information from an RFID label. 2. A Nokia 6212 application for tutors to take to classes to capture students id data from RFID labels. 3. A review of techniques for communicating between mobile phones and PCs accompanied by a demonstration application for transferring id card data from a Nokia 6212 to a PC. 4. A PC application for downloading and collating register data from a Nokia 6212 and storing it in a central database. 5. An application for generating reports for personal tutors and admin staff. Research question(s): How RFID Technology used for monitoring student attendance? What are the best techniques for storing and processing the data? What are the techniques and technologies for getting data from the phone to PC? Problem Statement According to Wang. (2005), Automatic student attendance using RFID technology comprises of multiple devices work together. The devices include RFID reader, RFID tag, system interfaces and databases. This system needs a good system design to make sure that the devices can capture accurate data and can interact with the information system accurately and efficiently. In order to obtain good system design, developers should have clear idea, knowledge and able to understand the requirements and convert them in to useful information. It is very important to represent the necessary information in to a meaningful data model suitable for application level interactions, including monitoring, tracking and application integration. Therefore a structure is needed to present plans for developing automatic student attendance monitoring system using RFID Technology. Why Automation? To save on time spent for daily roll calls. To avoid manual errors. To obtain accurate attendance means exact IN time. To avoid record search time, when we want to see any student’s attendance performance. To avoid reporting time used for preparing the attendance percentage reports at the end of the year. Finally to have professional and global look of the organization. Scope: The scope of this project is mainly based on the following things. I selected university of Wolverhampton as a case study to acquire requirements. Web-based technology is used to develop the application. Unified modelling language is used as a requirement modelling technique. Significance: The structure of the student attendance monitoring system is planned to provide strategy for developing automatic student attendance system using RFID technology. Need to know the project requirements for developing the application. Technical knowledge is required on RFID technology and software tools to develop the application. System functionality: Components used for the system RFID reader RFID tags Bluetooth connection Power supply Software on the computer Description: The students old ID cards will be replaced with RFID ID cards which means the RFID tags are embedded on the ID cards. The card looks similar to their old cards having photo, name and other details. The sufficient number of RFID readers will be installed at the entrance of each and every class room. All the RFID readers are networked to the computer via Bluetooth connection. The students enter the class room by showing their ID cards to the RFID reader from the maximum of 3cm. The RFID reader reads the card data that is RFID tag reference number and sends the data to the computer via Bluetooth connection. As soon as the card is read by the reader, the tag reference numbers will be streamed in the newly created excel sheet in the computer and waits for other card get scanned. The RFID reader reads a card within less than a second. The software application in the computer uses the data in the excel sheet for taking students attendance and maintains the data for generating reports. Summary: The RFID technology has been used by many sectors for automated tracking of objects like chain management, retailing, security and health care applications. The RFID student attendance monitoring system utilizes the existing RFID based applications technology which gives advantages to the users in the term of feasibility while recording their attendance. This application combines multiple devices which work together as a complete system. This system consists of readers, tags, user interfaces and databases to keep and manage user’s data. Designing multiple devices system is a great challenge. The developer needs to have a clear understanding of the system from different perspectives to ensure the successful of the system. Therefore this research investigates the requirements of the system and suggests a structure for it. Resources required: The following resources are required to develop the application.    Processor 1 GHz processor is recommended RAM 256 MB RAM is recommended Operating System Windows XP Service Pack 2, Windows Vista or Windows 7 is recommended IDE Eclipse Pulsar 1.3.2 Database Oracle 10g Java Tools JDK and JRE 1.6 is needed to run java files Web Server Jakarta tomcat 6.0 is necessary to host the application on the web and to test the application. Hardware Nokia 6212 NFC Mobile is used as a RFID reader and RFID tags and Server machine MS – Office 2007 MS-Excel 2007 is recommended. Literature Review: Automatic Identification and Data Capture Technology: This chapter mainly describes the introduction to automatic capture of data for the purpose of user identification. Definition of User Identification Devices (UIDS): User Identification devices are used to describe a physical object or a process that discovers the attributes of the consumer or producer and attempts to exclusively organize that entity. The main objective of the UIDs is to maintain accountability and access control. Currently the UIDs are supported by the business people because it making them more convenient, continuing efforts to make them smaller, easier to transport and maintain, and more efficient with respect to data throughput. Many of the UIDs are currently in usage they are plastic cards or badges with a picture on it, barcodes, magnetic strips, embedded microchips also known as smart cards, biometrics and passwords. The latest identification technology which is being advanced is the use of radio frequency. The radio frequency identification is a noncontact transmission method. The main objective method is to automatically capture the data for accurate identification. Firstly these UIDs need to improve the security and int egrity of UIDs. Automatic Identification and Data Capture (AIDC): The Automatic Identification and Data Capture (AIDC) can be referred as a worldwide industry term. AIDC explains the identification and direct collection of information into a computer system, programmable logic controller (PLC) or other microprocessor-controlled device without using keyboard.   The ability of recognizing and accessing the information in secured places within the business world and without the use of keyboards has directed to the use of contact and non contact badges and cards. Smart Card Technology: In the early 1950’s the concept of plastic cards was first appeared in the USA. They introduced plastic credit cards and it was first being issued by Diners club in 1950s. Later integrated technology was developed which made it possible to integrate data memory and processing logic on to a single silicon chip. The desire for the ease of a smaller transaction tool caused the two to merge in to what is known as the â€Å"smart card†. RFID technology background: According to Ching-Hsien Hsu. et al. (2009), RFID technology is one of the most commonly used technologies for identification nowadays. It is an automatic technology which helps the machines or computers to identify, record, or control the individual target through radio waves. Typically an RFID system consists of two components namely RFID reader and RFID tag. Generally RFID reader electronics uses outside power resource to generate a signal to drive the reader’s antenna and turn into radio wave. The radio wave will be accepted by the RFID tag and reflects the energy in the way signalling its identification and other related information. In order to access the reflection from the RFID tag, the RFID reader works as a receiver on sensing and decoding the signal from the RFID tag. In simple RFID system, RFID tag is passive and powered by the energy of the reader’s signals. In some systems, the RFID reader radio frequencies instruct the memory to be read or write from the associated RFID tag. RFID Reader According to Johansson (2004), The RFID readers continuously send the interrogating radio signals in search for the responding tags. These radio signals are sent at fixed frequency bands. The tag discovers this radio energy signals and sends the tag’s serial number and any other information to the reader. In addition to reading the data from the tag, some readers can write data to the tag.   The distance from which a reader can set up a contact with a tag is called read range and the read rate can be defined as the maximum rate at which the data can be read from the tag (bits or bytes per second). The high frequency signal and the stronger powered examination signal for communication increases the range of communication. According to Simson (2005), Historical RFID readers were designed to read only a particular type of tag but multimode readers can read different type of tags and are becoming popular. Similar to tags, RFID readers come in many sizes. The largest reader consists of a desktop computer with a special card and multiple antennas connected to the card through shielded cable. These type readers in general hold a network connection, so that it could report tags that it reads to other computers. The smallest readers are of postage stamp size and are designed to embed in mobile telephones. RFID tags: According to Mark (2010), An RFID tag is sometimes referred as a transponder. It contains the identifying data of the object where it is sited on and it generates a signal containing that relevant information. There are four different types of tags available based on the power sources. They are: Passive tags Semi Passive tags Active tags Semi Active tags Passive tags: These tags usually get their power to transmit the signal from the magnetic field created by the RFID reader. These tags can transmit up to a range of 10 meters. These tags are smaller and cheaper because they don’t have batteries. Semi Passive tags: This tag consists of onboard battery which is used to power the onboard circuitry but it doesn’t produce any signal but it still uses magnetic field produced by the reader to produce a signal. These tags have a maximum transmission range of 100 meters. Active tags: This tag consists of an onboard battery which is used to communicate and send signals to the reader and power the onboard circuitry. The onboard battery allows it to transmit up to a maximum range of 1000 meters. Semi Active tags: These tags are very much similar to active tags with a small difference of they remain in sleep mode until they receive a signal from the reader. Which means the tag activates when it receives a signal from the reader. The communication between the reader and tag is possible through the radio frequencies. Tag detection: According to Bogdon (2008), Signals from the RFID readers activates the tags which are likely within their examination zone. The examination zone can be referred as the area around the reader where the tags can receive the readers signal, process it and sends back the response that can be decoded by the reader. The information that is decoded by the reader is passed to the host computing systems for processing according to the application. RFID reader-writers have the capability to send back the data to the read/write-capable tags in order to append or replace data. The RFID reader usually locates, activates, and receives transmissions from RFID tags. Readers can be fixed or portable. Fixed readers are typically attached to antenna to notice the tag within particular area. These readers usually collect the data from the products that are travelling through conveyor belt, gates and doorways etc. Portable readers can be moved to detect remote tags. In today’s market readers with wireless communication capabilities exists such as SkyeTech’s SkyeRead reader is attuned with Mica Motes and IDBlue is a handheld Bluetooth 13.56MHz reader with High Frequency is compatible with devices ranging from PDAs to PCs. Now a day’s major mobile phone manufacturers providing phones with embedded RFID readers e.g. Nokia 6131 and Nokia 6212 NFC. RFID Frequencies: According to Ali (2008), Different RFID systems drive at a variety of radio frequencies. Each range of frequencies offers its own power requirements, operating range and performance. Each of the ranges may have different restrictions that limit based on the applications they can be used for. The detection range may vary from few centimetres to 100 meters. RFID systems are currently operating in the Low frequency (LF), High Frequency (HF), Ultrahigh Frequency (UHF) and Super High Frequency bands. RFID operation frequency ranges and related applications shown in the below table: Frequency Range Description Typical Applications 135 KHz Low Frequency, Inductive Coupling Access Control OEM applications 13.56 MHz High Frequency, Inductive Coupling Access Control and Library Books 868    870 MHz902 – 928 MHz Ultra High Frequencies (UHF), Backscatter coupling Supply chain tracking 2.40 t – 2.483 GHz SHF, Backscatter coupling Asset tracking Highway toll tags Vehicle tracking Elements of an RFID System: Basically RFID system consists of four elements: RFID Readers RFID tags Antennas and radio characteristics Computer network (if any) which is used to connect the readers Antennas and Radio: The physical layer of the RFID system comprises of antennas and radios used to connect the reader to the tag which allows the devices to share the information. The RFID tag antenna is the conductive element that allows the tag to send and receive data. In order to form a magnetic field, the passive, low (135 KHz) and high frequency (13.56 MHz) tags consists of a coiled antenna that couples with the coiled antenna of the reader. UHF antennas come in different shapes. Readers consist of antennas which releases radio waves. The Radio Frequency energy from the reader antenna is harvested by the antenna and this energy is used to power up the microchip, which leads to change the electrical load on the antenna to reflect back its own signal. rfidjournal.com/glossary/antenna   Near Field Communication: According to Raine (2009), Near Field Communication (NFC) and Radio Frequency Identification (RFID) terms are often confusing as the RFID acronym holds multiple standards. NFC and RFID are used inaccurately as transferable terms. This means that the RFID readers might be able read the RFID tags which are implemented with the same standard. Near Field Communication (NFC) technology is used for remote identification and data transfer at reading ranges up to a few centimetres. It means it reads the tags which are close in range. NFC can be considered as a division of more common RFID technology. NFC operates in different communication modes when compared to traditional RFID reader/RFID tag combination. It is more likely for the two NFC devices communicate each other and NFC devices are also capable to imitating definite RFID smart cards. The emulation mode enables the NFC devices to use the existing reader infrastructure. NFC is complaint with some smart card ISO (International Organiza tion for Standardization) standards: ISO 14443A, 14443B, and 15693 along with Sony’s FeliCa Standards and MiFare. NFC was initiated from a joint project of Philips and Sony for developing a short range communication technology in 2002 and it resulted as a Ecma Standard (ECMA 340) and later it was a accepted as ISO Standard 18092 in 2003. Nokia, Philips and Sony founded the NFC forums and been promoting the NFC technology. According to Raine (2009), Basically NFC operates in three different modes. The first operational mode is read/write mode. In this mode, the NFC device reads/writes data to or from an NFC complaint tag and in read/write mode the NFC device acts as an initiator and the tag acts as a target. In this mode it transfers the data at a maximum rate of 106 kilo bits per second. The second operation mode is peer to peer mode. In this mode it allows the two NFC devices to interact to each other and the maximum data transfer rate is 424 kilo bits per second. The third operational mode is emulation mode which allows the NFC device to emulate as a smart card. In this mode the built-in smart card chip is integrated in the NFC device and connected to the NFC antenna. Technical capabilities of Mobile interaction with NFC: According to Khoovirajsingh (2009), in these days mobile phones are increasingly used for storing pictures, videos, documents and Personal Information Management (PIM) data. In addition to this there is often need to copy these files from mobile phone to a computer or vice versa. In this process the user first need to find file, then need to select the method for transferring file (e.g. Bluetooth), after wards the user need to perform the device discovery process, then select the target device. After having the file on the other device, the user has to decide what to do with it. This will be an awkward process to the user. In order to avoid this process. Some of the basic interaction techniques are available to make things simple. According to Gregor (2011), Dynamic NFC-displays can be used for a wide range of applications at private e.g. home, semi-public e.g. pubs and public places like stations and shopping malls etc., including information retrieval, interactive advertisements, maps or games. NFC enabled mobile phones provide interaction with the diverse content of dynamic NFC-displays, including pictures, texts, links, maps and custom widgets. The design, implementation and performance of interaction techniques for dynamic NFC-displays rely on the technical capabilities of reading devices, tags and physical UIs. Basically NFC displays depends on the size of the tags, target items and mobile devices. Some of the NFC enabled mobile phones are available in the market e.g. the Nokia 6212 NFC classic. This mobile can read only tag a time and cannot identify multiple tags as they block during the interaction with one or several items. NFC enabled devices need a considerable amount of time to read a tag say abou t 0.5 seconds and tag should be placed very nearer to the device. These types of issues are seen in the currently available devices like Nokia 6212 mobile. Basic interaction techniques: These types of techniques can be used for simple interactions like the selection of items, triggering actions or activating links. Touch-select: This is the most basic interaction technique. In this technique the users touch a tag with a mobile phone and take out from it after the tag has been recognized. This tiny interaction can be varied through the combination with input from keyboard, joysticks or sensors. Click-select: This technical can also be referred as touch-select method. This method is pursued by pressing the pressing dedicated key on the mobile device to confirm the selection of the tag. Touch and Hold: This technique needs users to touch a tag for a certain amount of time which is longer than the normal touch-select e.g. 2 seconds. Double-touch: In this technique users have to touch the tag twice in a row. Contactless Cards (tags) Mifare 1k or 4k: According to NXP, (2007), The read/write mode of NFC needs two devices to communicate, one is NFC reader/writer and the other one is NFC tag. The NFC technology permits to access standard ISO 14443A card products as the Mifare family. In the NFC forum, the specification to store data for any kind of service or application is currently specified and it is known as NFC Data Exchange Format (NDEF). In order to store NDEF formatted data which is also called as NDEF data or NFC forum data inside a contactless tag product a mapping model is required. The Mifare 1k/4k tag product is a contactless card presently available in market with 1k byte and 4k byte of EEPROM memory. The Mifare standard 1k/4k supports mutual three pass authentication, file data transfer up to 106 kbit/s, data encryption of RF-channel with replay attack protection and CRYPTO1 stream cipher for secure data exchange. Mifare 1k tag: A Mifare 1k tag is able to store up to 1024 bytes of information. These 1024 bytes are organized as 16 different sectors numbered as Sector 00, Sector 01..Sector 0E and Sector 0F. Each sector comprises 16 bytes of data blocks named as blocks and numbered as Block 0, Block 1, Block 2 and Block 3. Block 0 of the Sector 00 contains IC manufacturer’s data. In every sector Block 3 is called as trailer and is used for sector authentication serving the security purposes. The first six bits of the authentication block are known as Code A, the next four bits are known as access bits and finally the last six bits are known as Code B. Code A and Code B are typically password keys which can be programmed for reading and writing protection. Fig: Mifare 1k Mifare 4k: The memory area of Mifare 4k is organized in numbered sectors from 0 to 39. It can store 4096 bytes of information. The organization of the first 32 sectors follows the similar structure of blocks and sectors of Mifare 1k. The last eight sectors are quadrupled in capacity. Depending on the settings of the access bits the reader device has to carry out an authentication with key A or key B to read or write the sector. Nokia 6212 NFC Classic Mobile in focus: According to Nokia Corporation (2008), The device which i focussed of this paper is Nokia 6212 NFC classic. This device comes with an RFID module which functions as RFID tag and reader operating at 13.56 MHz. It also supports features like read write, card emulation and peer to peer communication. According to product specification, the Nokia 6212 NFC device is capable of Tag reading and writing as native NFC functionality. Contactless communication API (JSR-257) with extensions for java applications on the phone. It gives support for all NFC Forum defined tags. This phone is compatible with non-battery powered tags (passive tags) which are: a)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   MIFARE (Standard, Standard 4K, Ultralight and DESFire) b)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sony FeliCa (non-secure) c)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Innovision (Jewel read only and Topaz) d)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   ISO 14443-4 complaint tags or cards. Compatible with ISO/Global platform smart card for service providers to install application specific data e.g. payment and ticketing applications. Compatible with existing contactless reader infrastructure (payment and ticketing). The main features of Nokia 6212 NFC include different connectivity options like Bluetooth, GPRS, USB and NFC with read, write and sharing capabilities. Graphic display with 2† QVGA 240 x 320 display supporting up to 16 million colours and contains user storage of 22 MB and microSD format for removable flash cards. Fig: Nokia 6212 NFC Mobile Nokia 6212 provides some settings to configure NFC functionality. NFC detection: To switch NFC on or off we need to select Menu NFC NFC settings. To use NFC switch on the mobile and activate the NFC setting, if disabled. With the phone touch the service tag or other NFC device with in the discovery area. Typically the reading range is 0-3 centimetres. When a tag or device is discovered the corresponding information is displayed on the mobile. Share to device: Select Menu NFC Share to device and select the required option. When the sharing is enabled you can send a bookmark, business card, call request, alarm alert calendar note, gallery item, profile, radio station, note, or to-do note. Service tags: A service tag may hold a shortcut such as URL of an internet based service, business card, SMS based service and phone number of a telephone service. Share or read service tags: Select Menu NFC Share to tag. Scroll to select desired option. Select share and touch a service tag. In order to read a service tag, need to touch a tag with the phone. Touch a service tag with your device to allow video streaming or Bluetooth connection or receive a business card, SMS message, call request, bookmark, calendar note etc. NFC received items or card applications can be accessed by selecting Menu NFC Inbox or Cards. The device memory restricts the amount of tag data that can be stored. In order to free up memory space delete the received files from the NFC Inbox. We can share the same information repeatedly to different service tags. Bluetooth: According to Cynthia et.al. (2007), Bluetooth is a Personal Area Networking standard based on short range radio. Devices like phones, printers, modems and headsets use Bluetooth technology to communicate between themselves. Bluetooth technology is mainly useful for communication when two or more devices are in close proximity and need reserved bandwidth. A Bluetooth device either acts as a â€Å"master† or â€Å"slave†. At most a master can communicate with seven slave devices, and a Bluetooth consisting of one master and it slaves is called a piconet. The master acts as a controller to control all the timings of all Bluetooth connections on piconet. Bluetooth pairing can be defined as a process of adding new slave device to the Bluetooth piconet. Bluetooth simple paring is a set of security improvements to the Bluetooth pairing mechanism. The target of the Bluetooth simple pairing is to set up authentication credentials between the Bluetooth master and the slave device s. Bluetooth simple pairing encourages four different pairing models.   Those are: Numeric comparison Just Works Out of Band and Passkey Entry Numeric Comparison Method: The Numeric Comparison model is proposed when both the devices are able to display a six digit number and both provide â€Å"Yes† and â€Å"No† buttons. Numeric Comparison For example, A PDA can use the pairing scheme with a PC.   During the process of pairing, each of the devices displays a six digit number matched from the pairing protocol. The user of each device is believed to compare the two numbers and select â€Å"Yes† if they match and â€Å"No† if they mismatch. The numeric comparison is executed over Bluetooth, which is in the in-band channel in the standard model for authentication. Just Works Method: The Just Works model is proposed when at least one of the devices has no display or â€Å"Yes/No† buttons.   This model is commonly used when pairing a Bluetooth headset with a cell phone. This method is similar to numeric comparison model but it does not display the six digits for comparison it uses numeric comparison internally. Even if one of the device displays numbers it won’t be compared on the putatively paired device because the Just Works model lacks any out-of-band channel required by the standard model. This model does not provide security against active attack. Out of Band Method: The â€Å"Out-of-Band† method is used when an alternate communication medium exits on both the devices, such as Near Field Communication (NFC). The alternate communication medium transfers a key between the proposed devices and functions as the Out-of-Band channel in the standard model. Passkey Entry Method: The Passkey Entry method is proposed when one of the devices has a display and the other device should have a key pad. The device which has got display randomly generates a six-digit number and the user enters this number on the other device using keypad. Like the numeric comparison an attacker can negotiate the six digit pass key with a probability of at least 2-20. The protocol which divides the passkey in to 20 bits and unveils one bit over 20 rounds of exchange. Each bit of the passkey can be computed by an eavesdropper after it has been sent. A passkey can be used securely only once. Pass key Entry    Why attendance should be taken? According to Melchiorre, et. al. (2003), To verify the accuracy of attendance records, the research team visited Southwest Community Center three times on different days of the week at different times. During their visits the research team conducted random head checks, looked at the attendance and registration records. They discovered the flow of passage throughout the Southwest Community Center. During the head checks, the number accounted on the attendance sheet was compared with the number of members present. While these attendance sheets do not contain time in and time out and the head checks could not show whether the attendance recorded correctly or not. This results inaccurate attendance. Finally we could not know how many persons were present during the entire hours of operation. Problems with the attendance can be recognized as unclear understandings of job responsibilities. According to Mary. (2005), A small California startup called InCom has developed a radio frequency identification (RFID) system called Inclass which is used automate student attendance in elementary and secondary schools. This system uses ultra-high frequency (UHF) readers which are mounted at the entrance of the class rooms and passive RFID tags are embedded to student ID cards. This InClass system was tested at Brittan Elementary School in Sutter, but the use of RFID in schools was protested by the parents of Brittan students. The Brittan school administrators were interested in the product in part because California bases school assist upon attendance numbers. The InClass product working scenario: Each of the students ID card comprises of unique 15 digit ID number written to each tag and associated with name of the student. When the student pass through the reader interrogation area at the class room entrance, the reader immediately sends the tags unique ID numbers to a central server. Software program was developed by the InCom and it is installed on the server where it collects the tag data and uploads a list of present, absent and tardy (based on when they enter the classroom) students to the PDA which is issued to the teachers. The upload can be done wirelessly over an 802.11b Wi-Fi protocol. Now the teacher would perform a visual check on the InClass generated attendance list by examining the class quickly to compatible what the list says with class room present number. Once the attendance was confirmed, the list is sent to the school administrators via PDA. School administrators need to file attendance records to the board of educati on. Later school administration tested the InClass product to see whether it could decrease the amount of time taken by the teachers to take attendance manually. Contactless communication API:  Ã‚   According to Enrique (2008), the contactless communication API java specification specifies a set of proximity, contactless-based communication. These specifications are defined under the java community process as JSR-257 and led by Nokia.    JSR 257 Packages: Out of all these packages mainly we use javax.microedition.contactless API. The contactless communication API permits us to Discover and Exchange data with contactless targets such as NDEF tags, RFID tags, and external smart cards. This API also provides support for visual tags. The following diagram demonstrates the relationships between the different API classes and interfaces. Fig: Contactless Communication API Relationships Source: http://java.sun.com/developer/technicalArticles/javame/nfc/ Applications using Contactless Communication API usually follow the flow demonstrated below. Fig: Typical flow of a Contactless Communication Application    Each of the steps are explained below. The first step is basically for the application to query the implementation to discover the supported targets by the device. Here the application registers a target listener to receive activity notifications for each of the supported targets. On the other hand the application registers with the PushRegistry for the activation due to target activity. The supported target activities are NDEF and secure element in card emulation method activities. When the targets come in to proximity they are discovered by the implementation, which notifies the application by invoking the right activity listeners. On the other hand PushRegistry activates the MIDlet. The application can learn the target properties for each of the discovered target. The application can be connected to read, write, exchange data with the discovered agent. When the job is done the application releases the resources. Design This phase will produce outline of the system architecture and the prototype of the application that will satisfy all requirement analysis. In this stage all the necessary input, user interface and process will be identified. This phase also determines the application architecture which will show how to transform the logical design in to basic system coding to generate the first prototype of the system. The result of this phase is application interface and system design specification. This research proposed an outline for student’s attendance monitoring system using RFID technology. Implementing this kind of system will maximize lecture time and provide convenience to them. This application uses Nokia 6212 NFC mobile as a RFID reader and are placed at the entrance of the classroom. The MIFare RFID tags are attached to the student ID cards. A unique ID number is written to the tag. When the student scans the ID card through the reader range at the classroom, the reader sends the tags unique ID numbers to the computer via Bluetooth. Description: A framework includes the hardware of the system, and describes how it works. However, the reader must be placed at the entrance of the classroom to read the student ID cards (Tags) of every student who attends classes. This proposed research mainly contains four components which are discussed below. The reader: RFID reader is responsible for communicating with the tag and it uses radio waves to retrieve data from the tag. The tag: RFID tag is an integrated circuit which is embedded on the student ID cards. This research proposes to use passive tag, which does not need any battery. This type of tags gets it power from the reader. Software Development process: This software application uses Contactless Communication API (JSR-257) which comes with Software Development Kit for Nokia 6212 NFC mobile phones. Nokia 6212 NFC SDK allows the users to develop Java applications (MIDlets) for Nokia 6212 NFC mobile phones. The contactless communication API mainly gives access to many contactless cards and communicates with them. Some of the use cases of Contactless Communication are calling a taxi by touching tag given by the taxi company and linking to a web page by touching a smart poster. In order to discover and communicate contactless targets, the applications should use classes and interfaces of this API. The contactless cards which pass through in the radius of NFC device can be recognized by any instance of DiscoveryManger class to receive notification. Then the device can set up a target particular connection defined in the subpackages with the detected target. The link required to open connection to the target device is given in the TargetPr operties parameter. For example, for an external smart card it can be ISO14443Connection.   Access and modification of data is provided by the methods of this connection. The data exchange format (NDEF) allows communication between an NFC device and another NFC device or with a tag which is defined in the NFC forum. Any device that supports NDEF data formatting is capable to communicate by using APDU (Application Protocol Data Unit) commands given by the Contactless Communication API. Record Type Definitions (RTD) which is supported by the NDEF defines the rules and formats for creating standard record types to be used by NFC Forum application definitions and offers users to create fully compatible applications. The four specific RTDs defined by NFC Forum are: NFC Text RTD: In this method by using NDEF format and RTD mechanism which allows storing text strings in multiple languages. An example of using this specification is integrated in the Smart Poster RTD. NFC URI RTD: Like the above method this technique also uses NDEF format and RTD mechanism to Uniform Resource Identifiers (URI). An example of using this specification is included in the Smart Poster RTD. NFC Smart Poster RTD: This method allows SMSs, URLs, phone numbers on an NFC tag, or to transport them between the devices. The Smart Poster RTD establishes on the RTD mechanism and NDEF format and uses the URI RTD and Text RTD as building blocks.    NFC Generic Control RTD: This method offers a simple way to request a specification to an NFC device (destination device) from another NFC device, tag or card (source device) trough NFC communication. The class diagram that shows the relationships of Contactless Communication API. Application Development: Programming Languages and Software Tools: Development Environment: Microsoft Windows XP (SP2) Eclipse pulsar 1.3.2 JDK 1.6 Nokia 6212 NFC mobile phone Mifare 1k or 4k tags Nokia connectivity frame work 1.2 Nokia 6212 NFC SDK 1.0 Apache Tomcat Server 6.0 Developing Application Tools: Java: According to Gosling, et. al. (2005), Java is a high-level object-oriented language produced by Sun Microsystems. Java is operating system independent since it uses Java Virtual Machine to interpret and execute the previously compiled code in different environments producing the same output. I have chosen Java technology as programming language to carry out this project. I have chosen Java technology as programming language to carry out this project. During this project i have used Java Standard Edition Development Kit 6 (JDK 1.6), the Java Standard Edition Runtime Environment (JRE 1.6) and Java Micro Edition with the Software Development Kit 3.6 (Java ME SDK 3.6) which also includes Java Wireless Toolkit 2.5.2.       J2ME:    According to Shenbagaraj, (2011), J2ME is called as Java to Micro Edition. It is an advance technology in java, developed with the help of Java Community Process Program. J2ME is specifically designed to operate within the limited resources available in the embedded computers and microcomputers and it is a low version of Java API and Java Virtual Machine. The J2ME mainly targeted the developers of small computing devices and intelligent wireless devices who want to incorporate cross-platform functionality in their products. The main advantage of using J2ME is compatible with all java enabled devices. The java enabled devices are Nokia, Motorola and Panasonic. J2ME application acts as a balanced application between local and server-side processing.    MIDlet:    According to Shenbagaraj, (2011), A MIDlet is a J2ME application which operates on an MIDP. A MIDlet can be defined with at least a single class that is derived from javax.microedition.midlet.MIDlet abstract class. A MIDlet can be called as a event-based application. All the routines that are executed in the MIDlet are initiated in response to an event reported to the MIDlet by the application manger. The application manger invokes startApp() method when the MIDlet is started. The startApp() method in a MIDlet contains a statement holds a statement that displays a screen of information and informs the user to enter a selection from the list of the list of options provided. A Command object is used to inform the user with a selection of options to opt from when the screen is displayed. Each screen should have a CommandListener. A CommandListener follows the user events with a screen and makes the right code to execute on the current event. Java Libraries: According to Sun. (2006), A java library can be referred as a set of resources required by a project. Typically a library contains one or more JAR files containing compiled classes, the source file required to debug the classes, and java documentation for the classes. A project can reference one or more libraries for the purpose of compiling java files or additional JAR files in the deployed application. In IDE the Library Manager allows you edit and create libraries. I have used few libraries which are downloaded from internet and added to the code to fulfil the requirements of the application. These libraries or APIs that communicate with some of the specific elements or implementations that have been used during the project development. They are BlueCove (JSR-82): According to BlueCove, (2008), BlueCove is a Java library for Bluetooth (JSR-82 implementation). This library currently interfaces with the WIDCOMM, BlueSoleil and Microsoft Bluetooth stack found in Windows XP SP2 or Windows Vista and WIDCOMM and Microsoft Bluetooth stack on Windows Mobile. BlueCove offers JSR-82 java interface for the following profiles: SDAP Service Discovery Application Profile RFCOMM Serial Cable Emulation Protocol L2CAP Logical Link Control and Adaptation Protocol OBEX Generic Object Exchange Profile (GOEP) profile on top of RFCOMM and TCP UploadBean: This API simply reads and stores the uploaded files sent the browser. It is a technical component that can be integrated in any Java/JSP/Servlets application.    Servlet:    According to Stephanie. (2002), A servlet is a java programming class which is used to extend the facilities of servers that hosts applications accessed through request-response programming tool. The servlets give response to any type of request and these are normally used to extend the applications hosted by the web servers. Java servlet technology usually defines HTTP specific servlet classes.    JSP:    According to Stephanie. (2002), Java Server Pages (JSP) technology is used to create web content that has both static and dynamic components. JSP technology provides a normal approach to create static content. JSP presents all the dynamic capabilities of Java Servlet. The main advantages of JSP technology are: A language for developing JSP pages, which are text based documents that illustrate how to process a request and construct a response. Techniques for defining extensions to the JSP language. Constructs for accessing server side objects. Developing platform: Eclipse: According to Bob, (2008). Eclipse is a software development platform developed in java and mainly used to develop java applications. It provides an IDE and a complete set of plug-ins. In eclipse except the eclipse kernel, everything is treated as a plug-in. This plug-ins expand the application features and permits the developers to program in different languages like C, C++, and COBOL etc. This also includes management of databases, extending network capabilities, creating web services etc by using eclipse’s interface. In total the Eclipse Plug-in central has gathered more than 1200 different plug-ins for eclipse, some of them are developed by third parties and released to the community. In this project, I have used EclipseME plug-in which helped in developing J2ME Midlets and Suite projects, supports J2ME emulators and offers JAD editor as well as connecting to the already installed wireless toolkits. Apache Tomcat Server: Apache Tomcat Server is free open-source software from Apache Software Foundation (ASF). It can be defined as a container where java Servlets and Java Server Pages (JSP) files are placed and afterwards invoked. In this project i have used Tomcat 6.0 version and made use of configurations. Management Console: The management console offers a web interface where the parameters of the developed application can be configured. It consists of JavaServer pages, which are hosted in the Tomcat server.   The web interface comprises of four different tabs through which the user can be capable to establish the parameters’ values. Nokia PC Suite: Nokia PC Suite is a group of applications that permit connecting Nokia mobile phones to computers. Basically it is used to transfer pictures, music or applications. This application is used in the project in order to send the developed Midlets to the NFC-enabled phones through Bluetooth. References: Ching, H.- H., Shih, C.-C., Chia, H.-Y., Jong, H. –P. (2009)  Ã‚   Alleviating reader collision problem in mobile RFID networks. Proceedings at Springer-Verlag London Limited, pp.489-497. Johansson, B.(2004) An Introduction to RFID – Information Security and Privacy Concerns, TDDC03 Projects. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.111.5602rep=rep1type=pdf Simson. G, and Henry, H.(2005) UNDERSTANDING RFID TECHNOLOGY. garfinkel.book, 15-36. [Online] [Assessed on 2nd June 2005] Available from: http://ptgmedia.pearsoncmg.com/images/0321290968/samplechapter/garfinkel_ch02.pdf Raine. K, Tommi. K, and Jouni I.(2009) Remote Identification and Information Processing with a Near Field Communication Compatible Mobile Phone. Proceedings at International Conference on Computer Systems and Technologies CompSysTech’09 Mark. M and Elmarie. B. (2010) Integrated Security Framework for Low Cost RFID Tags. ACM 978-1-60558-950-3/10/10 Al-Ali, A.R. Fadi, A. Nada, R. Amin, A. Al-Zarouni, Nassar, H. (2008) Mobile RFID Tracking System. Available from: aloul.net/Papers/faloul_ictta08.pdf Khoovirajsingh. S, Enrico. R, Robert. H, Paul. H. (2009) Touch Connect and Touch Select: Interacting with a Computer by Touching it with a Mobile Phone. Computing Department, Lancaster University, UK: ACM 978-1-60558-281-8. [Accessed 15th September 2009]. Available at: http://delivery.acm.org.ez-proxy.unv.wlv.ac.uk/10.1145/1620000/1613905/a36 seewoonauth.pdf?key1=1613905key2=1417853031coll=DLdl=ACMip=134.220.2.101CFID=17640379CFTOKEN=61603121 Gregor, B. Wolfgang, R. Paul, H. Matthias, W. (2011) Design and Evaluation of Techniques for Mobile Interaction with Dynamic NFC-Displays. ACM 978-1-4503-0478-8/11/01. [Accessed   26th January 2011]. Available at: http://delivery.acm.org.ez-proxy.unv.wlv.ac.uk/10.1145/1940000/1935743/p205-broll.pdf?key1=1935743key2=6866853031coll=DLdl=ACMip=134.220.2.101CFID=17640379CFTOKEN=61603121 Enrique, C. (2008) An Introduction to Near-Field Communication and the Contactless Communication API. Available at: http://java.sun.com/developer/technicalArticles/javame/nfc/ Bogdan, C. Murali, R. Mehmet, K. Suresh, J. (2008) Efficient tag detection in RFID systems. J. Parallel Distrib. Comput. 69 (2009) 180_196. [Accessed 8th July 2008]. Available at http://compbio.case.edu/koyuturk/publications/carbunar_jpdc09.pdf Nokia Corporation, (2008) Nokia 6212 classic user guide. Available at: http://nds1.nokia.com/phones/files/guides/Nokia_6212_classic_UG_en.pdf Cynthia, Kuo. Walker, J. and Perrig, A. â€Å"Low-cost Manufacturing, Usability, and Security: An analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup,† 2007 [Online]. Available at: http://sparrow.ece.cmu.edu/group/pub/kuo_walker_perrig_simple.pdf [Accessed: Sep 7, 2009] Melchiorre, G. Pishvazadeh, Y. Wechter, J. Zarit, M. (2003). ‘Community Benchmarks Program The Maxwell School of Syracuse University’. Available at: maxwell.syr.edu/uploadedFiles/paf/benchmarks/Southwest.pdf?n=3275 Wang, F. Liu, P. (2005). ‘Temporal management of RFID data’, Proceedings at: 31st VLDB Conference, Trondheim, Norway, 2005. Nokia Corporation, (2008) Nokia 6212 Classic: Brings together Visa and Nokia for RFID enabled services. Available at: rfidweblog.com/50226711/nokia_6212_classic_brings_together_visa_and_nokia_for_rfid_enabled_services.php Mary, C. (2005) RFID Takes Attendance- and Heat. Available at: rfidjournal.com/article/articleview/1408/1/1 Shenbagaraj, (2011) Introduction to J2ME. Available at: javabeat.net/articles/27-introduction-to-j2me-1.html James, G. Bill, J. Guy, S. Gilad, B. The Java Language Specification Third Edition. Available at: http://java.sun.com/docs/books/jls/download/langspec-3.0.pdf BlueCove, (2008) BlueCove. Available at: http://bluecove.org/ javazoom.net/jzservlets/uploadbean/uploadbean.html Stephanie, B. (2002) The J2EE Tutorial. Available at: http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/Servlets.html Stephanie, B. (2002) The J2EE Tutorial. Available at: http://java.sun.com/j2ee/tutorial/1_3-fcs/doc/JSPIntro.html Bob, K. (2008) Eclipse: Java EE Applications Made Easy. Available at: spidertg.com/cmsv5/images/stories/eBook_Libarary/Developer/Java%20EE%20Applications%20Made%20Easy.pdf NXP, (2007) NXP Type MF1K/4K Tag Operation. Available at: nxp.com/documents/application_note/AN130411.pdf