Tuesday, January 28, 2020

History And Evolution Of RFID Technology Information Technology Essay

History And Evolution Of RFID Technology Information Technology Essay Chapter 1 Radio Frequency Identification or RFID is the fastest growing technology in the world today. RFID is an automatic identification method that can remotely retrieve data using devices called RFID tags or transponders. RFID in wireless communication has evolved to the great advancement of wireless technology. This introduction of RFID into the mobile communication field has made the world a smaller place to live in. The technology which enables the electronic labeling and wireless identification of objects using radio frequency communications is RFID. RFID is also a subset of the broader area of automatic identification and data capture (AIDC) technologies. The advancement in different applications of RFID are emerging from current research ideas to concrete systems. RFID and mobile telecommunications are the services that provide information on objects equipped with an RFID tag over a telecommunication network. Tags are stationary and Readers are in mobile phone (mobile). RFID readers can simultaneously scan and also identify hundreds of tagged items. Diffusion of radio frequency identification (RFID) promises to enhance the added value of assistive technologies of mobile users. Visually impaired people may benefit from RFID- based applications that support users in maintaining spatial orientation through provision of information on where they are, and description of what lies in their surroundings. To investigate this issue, we have integrated our development for mobile device. With a complete support of RFID tag detection, and implemented an RFID enabled location-guide. The guide is an ecological guidance in mobile technology. This introduction of RFID into the mobile communication field has made the world a smaller place to live in. RFID is the base technology for ubiquitous network or computing and to be associated with other technologies such as telemetric, and sensors. The term RFID is used to describe various technologies that use radio waves to automatically identify people or objects. RFID technology is similar to the bar code identification systems we see in retail stores every day. However one big difference between RFID and bar code technology is that RFID does not rely on the line-of-sight reading that bar code scanning requires to work. 2.0 PROJECT OVERVIEW: The study of this project describes about the application of RFID in cinemas. The main study of the project is to check the authorized member or not enter the cinema using RFID application. We must check whether the person is authorized or not through RFID technology .In this project each person have one RFID card with the ticket when the person purchases the ticket so that person has right to enter the cinema .After entering the cinema the person can check the status whether it is screen1 or screen2 through RFID. Here RFID will read the data from card and compare data base and display the data. If the person is authorized means cinema(screen1 or 2) will open through door shepherd(stepper motor).Otherwise it will give message as this is not appropriate screen please check the other screen and it give a buzzer. Aims and Objectives: The main aim of the project is to explore the application of RFID in wireless communications. The main objectives are to develop a new application using the existing applications of RFID. DELIVERABLES: CHAPTER 2 Definition: The technology which enables the electronic labeling and wireless identification of objects using radio frequency communications is RFID. RFID is also a subset of the broader area of automatic identification and data capture (AIDC) technologies. RFID is an application of object connected data carrier technology with attributes that are complementary to other machine-readable data carrier technologies. RFID technologies provide strong potential for improving efficiency, productivity and/or competitiveness. RFID market increasing significantly, yielding lower costs and higher performance. RFID is about identifying and handling items Physical Materials Components and sub-assemblies Products Containers Physical carriers People Locations HISTORY AND EVOLUTION OF RFID TECHNOLOGY: Radio Frequency Identification or RFID is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. It was not until the 1980s that RFID applications began to appear in commercial applications, such as railroad freight car tagging, the tagging of cattle and rare dog breeds, key less entry systems and automatic highway toll collection. As there is improvement in the technology there has been reduction in the cost and size, and it has gained wide acceptance in warehouse management and manufacturing. First application to identify planes in world II using radar. 60s -Electronic article surveillance (EAS) used to identify whether an item has been paid or not using a 1 bit tag. 80s first automated toll payment systems. RFID has been used in mobile technology through which there had been a great advancement in this field. Korea is widely known that it has established one of the most robust mobile telecommunication networks. Korea has recognized the potential of RFID technology and has tried to converge with mobile phone. Convergence of three technologies: Radio frequency electronics: The research in the field of radio frequency electronics as applied to RFID was begun during World War 2 and continued through the 1970s. The RF electronics and antenna systems employed by RFID interrogators and tags have been made possible because of radio frequency electronic research and development. Information technology: The research in the field of information technology started in the mid 1970s and roughly continued through 1990s. interrogator and the host computer employ this technology. Networking of RFID systems and RFID interrogators has been made possible by research in this field. Material science: some of the breakthroughs in material science technology made the RFID tags cheaper to manufacture. By overcoming this cost barrier goes a long wayin making RFID technology commercially viable. Mile stones in RFID and speed of adoption: The development of RFID technology can be defined by the following time based summaries shown below: Pre- 1940s: Different scientists like faraday, Maxwell, hertz had yielded a complete set of laws of electromagnetic energy describing its nature. In the beginning of 1896 Watson, Baird and many others sought to apply these laws in radio communications and radars. So including RFID work done in this era form the building blocks upon which many technologies have been built. 1940s World war 2: Many advancements and improvements have been taken place during World War 2. Scientists and engineers continued their research increasingly in these areas. In 1948 Harry stockman published a paper on reflected power which is the closest thing to the birth of RFID technology. 1950s- Early exploration of RFID technology: Different technologies related to RFID were explored by researchers during 1950s. The US military began to implement early form of aircraft RFID technology called identification, Friend of Foe, or IFF. 1960s- Development of RFID theory and early field trials: RF Harrington did a lot of research in the field of electromagnetic theory and it is applied to the RFID. Passive data transmission techniques utilizing radar beams and interrogator- responder identification system introduced by Vogel man and J.P vindings. In the late 1960s sensormatic and checkpoints were founded to develop electronic article surveillance (EAS) equipment for anti-theft and security applications. These are 1-bit systems that mean these only detect in the presence of RFID tags rather than identifying them. Later EAS is the first widespread use of RFID. 1970s: Early adopter applications and an RFID explosion: There is a great deal of growth in RFID technology in 1970s based on the witnesses. All the academic institutions, companies and government laboratories are involved in RFID. In 1975 short range radio- telemetry for electronic identification using modulated backscatter was released. Big companies such as Raytheon, RCA started to develop electronic identification technology and by 1978 a passive microwave transponder is accomplished. Later the US federal administration convened a conference to explore the use of electronic identification technology in vehicles and transportation application too. By the end of the decade research in computers and information technology which is crucial to the development of RFID hosts, interrogators and networks has started as evidenced by the birth of PC and the ARPANET. 1980s- commercialization: This year brought about the first widespread commercial RFID systems. Personnel access systems, key less entry are some of the examples. In Norway the worlds first toll application was implemented and later in Dallas. In 1980s the implemented RFID systems were proprietary systems. So there is little competition in the RFID industry and that results in high cost and impeded industry growth. 1990s- RFID enters the main stream: In 1990 RFID finally started to enter the main stream of business and technology. In the middle of the year RFID toll systems operate at highway speeds. This means the drivers could pass through toll points un impeded by plazas or barriers. This results in the deployment of RFID toll systems in United States. TIRIS system was started by the Texas instruments which developed new RFID applications for dispensing fuel such as ski pass system and vehicle access systems. In the early 1990s the research in the information was well developed and evidenced by proliferation of PCs and internet. The materials technology advances and many of them related to semiconductor chip makers such as IBM, INTEL, MOTOROLA and AMD put cost effective tags on the horizon. At the end of the year large scale smart label tests had started. 2007 and Beyond: Item level tagging is implemented when there are no checkout scenario at large super markets. High value and high risk goods are the first to benefit from item level tagging. For example goods like pharmaceuticals and firearms. Smart shelves for select categories started to appear and smart appliances with embedded RFID technology come into the market place. OVERVIEW OF RFID TECHNOLOGY: Wireless radio communication technology is used by the RFID system to uniquely identify the people or tagged objects. RFID system consists of three basic core components RFID tag RFID Reader Controller TAG: Tag can also be called as transponder which consists of a semi conductor chip and sometimes a battery. The life time of a battery in a active tag is limited by the number of read operations and the amount of energy stored. http://www.tutorialsweb.com/rfid/rfid-1.gif READER: Reader can also be called as interrogator or a read/write device, which consists of antenna, an RF electronics module and a control electronics module. http://hackedgadgets.com/wp-content/RFID_Reader_preliminaryCons.jpg CONTROLLER: Controller can also be called as host which acts as a work station running data base and control which is often called as middle ware software. FUNCTION OF RFID TAG: Tag stores the data and transmits data to the interrogator. The electronic chip and antenna present in tag are combined in a package to form a usable tag as a packaging label fixed to a box. The chip contains memory where the data stored is read or written too in addition to other important circuitry. Tags are of two types Active tags Passive tags [RFID-tags.bmp] Active tags: Tags are said to be Active if they are having an on-board power source called battery. When the tag requires transmitting the data to the interrogator, tag uses the source to derive the power for the transmission. This is same as the mobile phone which uses a battery so that the information is transmitted over longer ranges and communicates with less powerful interrogators. These tags have large memories up to 128 Kbytes. The life time of battery in the active tag can last from two to seven years. Passive tags: Tags which contain no on-board power source are called passive tags. To transmit the data they will get the power from the signal sent by the interrogator. Passive tags are of low cost and typically smaller to produce than active tags. Differences between Active tags and Passive tags: Active tags are self powered where as Passive tags is not having their own power source. The maximum distance that the Passive tags generally operate is 3 meters or less where as Active tags can communicate with 100 meters are more away. Passive tags require more signal from the reader than the Active tag. Active tags are better suited than passive tags when the collection of tags needs to be simultaneously read. The reader talks first in the passive tag, the RFID tag is a server where as in the case of Active tags communications can be initiated by either the tag or the reader. FUNCTION OF RFID READER: RFID readers convert the returned radio waves from the RFID tag into a form that can be passed on to controllers, which can make use of it. The RFID tags and readers should be tuned to the same frequency in order to communicate. 125KHZ frequency is most commonly used or supported by Reader. FUNCTION OF A CONTROLLER: The brains of any RFID system are RFID controllers. Controllers are used to network multiple RFID interrogators combined and to process the information centrally. In any network the controller should be a application software or workstation running data base. Controller uses the information gathered by the interrogators when new inventory is needed in retail application and alert the suppliers. FREQUENCY: Frequency of operation is the key consideration as the television broadcast in a VHF or a UHF band. RFID Frequency Table In RFID there are two types of bands low frequency and high radio frequency bands in use Low frequency RFID bands: Low frequency (LF): 125-134 kHz High frequency (HF): 13.56 MHz High frequency RFID bands: Ultra- high frequency (UHF): 860-960 MHz Microwave: 2.5GHz and above Frequency plays a prominent role because several characteristics of an RFID system are affected by the choice of frequency. CHARACTERISTICS OF AN RFID SYSTEM: The following are the characteristics of an RFID system: Read range Interference from other radio systems Data rate Antenna size and type Read range: For the lower frequency bands the read ranges of passive tags are not more than couple feet because of poor antenna gain. The electromagnetic wavelength is very high at lower frequencies. At high frequency there is increase in the read range especially where active tags are used. Here because of high frequency bands that leads to health concerns in human, most regulating bodies. So the range of these high frequency systems reduced from 10 to 30 feet on average in the case of passive tags. Interference from other radio systems: The fact is that LF frequencies do not experience path loss and the operating systems in the LF band are particularly vulnerable. The radio signals operating at same LF frequency will have high strength at the antenna of a RFID interrogator, which can translate into interference. Data rate: RFID systems have low data rate operating in the LF band. With frequency of operation there is increase in the data rate reaching the Mbit/s range at microwave frequencies. Antenna size and type: The size has to be made larger than UHF for the antennas of LF and HF systems to achieve comparable signal gain. Te type of antenna is decided by the frequency of operation. Loop type antennas are used at LF and HF and they are also called as inductive coupling and inductive antennas. Capacitive coupling is used at UHF and microwave frequencies and dipole type antennas are used. RFID SMART LABELS: The next generation of bar code is the RFID smart labels. Smart label is nothing but a RW transponder that has been incorporated in a printing packaging label. These smart labels are quick to read, easily applied, unconstructive, disposable and cheap. There are some measures by which RFID smart labels not stack up to bar codes such as technological maturity, price and ease of implementation. The benefits of smart labels over bar code systems started to outweigh the short comings and the cost of implementing smart label solutions a cost effective technology. SMART LABELS vs. BAR CODES: Bar coding system uses laser light as a data carrier where as RFID and smart labels uses radio waves to carry information. Bar code is referred as optimal technology and RFID is called radio frequency or RF technology. COMPARISION OF RFID TO BARCODES: Memory size/ Data storage: Bar codes hold only limited amount of data. It holds just a few bytes as data storage that is only 8 numerical characters. They are UPCE symbols. The data matrix of the bar code system permits the storage of 2000 ASCII characters on a two dimensional tag and these are these are used rarely. RFID tags can hold far more information. Here RFID tags made with smaller memories to hold a few bytes but the present technology puts the upper limit at 128K bytes. Read/write: once they are printed barcodes cannot be modified again therefore bar coding is called RO technology. RFID tags such as smart tags have a specified addressable, writable memory which can be modified thousand times over the life of the tag and this is why RFID technology is more powerful. CHAPTER 3 LITERATURE REVIEW 1. INTRODUCTION:- Radio Frequency Identification or RFID is the fastest growing technology in the world today. RFID is an automatic identification method that can remotely retrieve data using devices called RFID tags or transponders. This introduction of RFID into the mobile communication field has made the world a smaller place to live in. RFID readers can simultaneously scan and also identify hundreds of tagged items. Diffusion of radio frequency identification (RFID) promises to enhance the added value of assistive technologies of mobile users. Visually impaired people may benefit from RFID- based applications that support users in maintaining spatial orientation through provision of information on where they are, and description of what lies in their surroundings. To investigate this issue, we have integrated our development for mobile device. With a complete support of RFID tag detection, and implemented an RFID enabled location-guide. The guide is an ecological guidance in mobile technology. RFID is the base technology for ubiquitous network or computing and to be associated with other technologies such as telemetric, and sensors. The term RFID is used to describe various technologies that use radio waves to automatically identify people or objects. RFID technology is similar to the bar code identification systems we see in retail stores every day. However one big difference between RFID and bar code technology is that RFID does not rely on the line-of-sight reading that bar code scanning requires to work. 2. BACKGROUND OF PROJECT: Radio Frequency Identification or RFID is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. 80s first automated toll payment systems. RFID has been used in mobile technology through which there had been a great advancement in this field. Korea is widely known that it has established one of the most robust mobile telecommunication networks. Korea has recognized the potential of RFID technology and has tried to converge with mobile phone. 3. AIMS AND OBJECTIVES: The main aim of this project is to explore the application of RFID in wireless communications using RFID tags, readers , the computer and the internet. The specific objectives include; Study of existing applications of RFID. Expanding the application of RFID in wireless communications. Using the internet to further enhance the employee management system. 4. RFID APPLICATION FIELDS: Transportation, materials management, and security and access control. Currently, there are a variety of other applications for RFID in agriculture, construction, and athletics. Major RFID application domains include monitoring physical parameter, such as temperature or acceleration during fragile or sensitive products delivery, monitoring product integrity from factory to retail locations, utilizes for home and office automation. Now a day we have passive or active inexpensive RFID that makes these kind of sensors practical for tourist applications. For example, a museum explosion can place tags attached to each point of interest so that tourists can receive information about explosion in the right moment at right place. 5. FUTURE OF RFID TECHNOLOGY: RFID is said by many in the industry to be the frontrunner technology for automatic identification and data collection. The biggest, as of yet unproven, benefit would ultimately be in the consumer goods supply chain where an RFID tag attached to a consumer product could be tracked from manufacturing to the retail store right to the consumers home.   Many see RFID as a technology in its infancy with an untapped potential. While we may talk of its existence and the amazing ways in which this technology can be put to use, until there are more standards set within the industry and the cost of RFID technology comes down we wont see RFID systems reaching near their full potential anytime soon and RFID is expected to be the base technology for ubiquitous network or computing and to be associated with other technology such as telemetric, and sensors. 6. CHALLENGES OF MY RESEARCH: To develop an application of RFID where there is less human attention and to prevent more fraud. Developing an RFID solution that can interoperate with emerging standards for communication protocols, hardware platforms, and software interfaces. Implementing an RFID solution that is cost effective, leverages their existing supply chain investments, and gives them clear a return on investment (ROI). Preparing for the vast amounts of data generated by RFID. 7. PROBLEMS WITH RFID: Problems are divided into two parts 1. Technical problems 2. Privacy and ethics problems 7.1 Technical problems: Problems with RFID Standards RFID systems can be easily disrupted RFID Reader Collision RFID Tag Collision 7.2 Security, privacy ethics problems: RFID tags are difficult to remove 8. RESEARCH METHODS Conducting of a detailed survey of the various existing applications of RFID and monitoring systems used in the locality: At this stage the study of applications of RFID is to develop a real time application. The study about this will also determine the workers and employer attitude towards the monitoring system being used. To conduct this research a questionnaire will be formulated and distributed to various organizations in the locality. 9. RFID READER AND TAG COMMUNICATION FLOW DIAGRAM: 10. DESIGN OF RFID MONITORING SYSTEM: The design solution for the employee monitoring system based on a selected land size of 500 meters by 500 meters with ten buildings, 3 of which are administrative, 3 are production centers, 2 are general purpose building, 1 is a mess and 1 is the car park area. The designer will determine the best places to install the RFID receivers. It is assumed that the workers will be carrying RFID tags in form of a card. When a worker enters the gate, the receiver at the gate takes his number, records it and stores this value in a database. The time of entering is also noted and entered in the database. When he/she goes to his area of work, say, the production area the receiver there takes his number and stores it plus the time he has entered. Based on all the data collected, the developed software produces a summary of the time and place the worker has visited in the firm. Visitors are also given special tags. 11. PREVIOUS WORK: RFID is a rapidly developing automatic wireless data collection technology. Firstly we have multi-bit functional passive RFID systems with the range of several meters. Recently it has experienced a tremendous growth due to developments in integrated circuits and radios and due to increased interest from the retail industrial and government. Key volume applications of RFID technology in markets such as access control sensors and metering applications, payment methods, document tracking. Previously they were using radars to warn off approaching planes while they were still miles away however it is impossible to distinguish enemy planes from allied ones and after that crude method is implemented by germans for identifying the planes. So with the increasing technology further research of RFID is done using RFID tags and readers which is similar to barcode. VARIOUS EXISTING APPLICATIONS OF RFID: The following are some of the applications of RFID: Vehicle anti theft system uses radio frequency identification system. Application of RFID technology on tires tracking. Application of RFID in automotives. Supply chain management uses RFID in retail industries. Mobile health care service system using RFID. Application of RFID in animal tracking. Application of RFID in asset tracking. BRIEF STUDY OF THE APPLICATIONS OF RFID: Vehicle anti theft system uses radio frequency identification system: As there are many car and light van thefts which are increasing alarmingly all around the world the new guide lines were implemented by the insurance companies, are being set for vehicle manufacturers to make their products secure. A new passive anti theft security system (PATS) is developed by ford registration and identification system (TIRIS) which is a radio frequency technology which meets the new requirements. Working: There is a tamper-proof link between the drivers key and the ignition system. This system is based upon the tamper-proof electronic link. Each key has a tiny transponder which electronically links it to a specific vehicle. The tag which can be called as a transponder contains a unique identification code that is accessed by the radio signal from a transceiver unit in the car whenever someone tries to start the vehicle. Unless there is a proper ignition key with a transponder present the engine will not start, even if the ignition key is broken or bypassed. This is based up on RFID technology which adds a new level of theft protection to vehicle security systems which does not require any effort from the drivers. .

Monday, January 20, 2020

The Actual Meaning of My Papas Waltz by Theodore Roethke Essay example

The Actual Meaning of "My Papa's Waltz" by Theodore Roethke Poetry is made to express the feelings, thoughts, and emotions of the poet. The reader can interpret the poem however they see fit. Critics are undecided about the theme of Theodore Roethke's "My Papa's Waltz." Some people believe that the poem is one of a happy exchange between a father and son. The more convincing interpretation is that it has a hidden message of parental abuse. Careful analysis of the keywords and each individual stanza back up this theory of child abuse by a violent and drunken father. The word that is key to the poem is romp. Roethke states that "we romped until the pans / slid from the kitchen shelf" (5-6). The word is usually associated with happy, boisterous, and energetic running around or dancing. A second definition is rough, lively play. Alcohol would cause a person to act in such a harsh manner. In athletics, a romp is an easy victory over an easy opponent. This means one side is clearly superior and beats the competition with fury and ease. The father could be viewed as a dominating and overpowering force to a small child. The younger son could not possible fight back to his bigger father especially with the added influence of liquor. Further reading of the poem will back up that meaning of the poem is to illustrate parental abuse. The first stanza sets the scene with clear imagery. The father appears to be in a heavily drunken state because the son can smell the "whiskey on your breath" (1). The reader knows the drinking is excessive because it almost made the boy dizzy. Clearly, the father is in a heavenly drunken state because someone else is feeling the effects of his drinking. Critics will ague that the son was enjoying ... ... is a happy time between a father and his child. Through careful reading, that interpretation is not valid. In 1948, actions such as this may have been a part of life. Maybe that is why Roethke wrote the poem this way because the event was probably happening in many households and people then could identify with this. Because of the vivid imagery, the reader can feel the boy's pain and fear of his father. In this case, the waltz is not a bonding time between a father and his son. People now would identify with the son and find a hatred for the father because of the mental and physical toll this could have on a child. The father does his dance by "waltzing" all over his son. Works Cited Roethke, Theodore. "My Papa's Waltz." Discovering Literature: Stories, Poems, Plays. Ed. Hans P. Guth and Gabriel L. Rico. Upper Saddle River, NJ: Prentice Hall, 1997, 536.

Sunday, January 12, 2020

To what extent are writers also detectives in the novels you have studied?

The crime and the detective novel and their conventions have changed considerably over the last century. As societies have changed, these genres have adapted and branched out to meet the needs of writers attempting to express new concerns. Edgar Allen Poe's detective novel, The Murders in the Rue Morgue (1841) follows conventions we would now consider to be traditional in mystery writing. Bearing a close resemblance to Sir Arthur Conan Doyle's Sherlock Holmes stories, we find a detective who relies on reasoning and deduction to solve a mystery that to all intensive purposes appears unsolvable; a locked room mystery such as Doyle's The Speckled Band (1892). In America, between the world wars, emerged the ‘hard-boiled' private eye novel, featuring tough private investigators, often themselves outcasts from society. Raymond Chandler and Dashiell Hammett are examples of authors from this school of detective fiction. After the Second World War there was increasingly a feeling that literary fiction was an inadequate means of accurately describing the horrors of the modern world. ‘New journalism' emerged, a term coined by Tom Wolfe to describe non-fiction novels by authors such as Truman Capote. His true crime novel, In Cold Blood (1965) is one of the texts that will be examined in this essay. Later in the century literature became more preoccupied with issues of alienation as a result of city living and capitalist expansion. Postmodern concerns were expressed in detective metafiction, such a Paul Auster's New York Trilogy (1987). This novel will also be examined. Lastly, this essay will look at James Ellroy's My Dark Places (1996). Ellroy himself has described this as an â€Å"investigative autobiography†, but it also contains elements of the police procedural novel, which came into being in 1940's America. This sub-genre deals with the more detailed elements of police detection, in comparison to that of the private eye. The extent to which writers are also detectives in these three texts varies greatly. The fact that they are all very different in terms of the sub-genres of detective or crime fiction makes direct comparison difficult. Therefore this essay concentrates on each in turn, drawing together the main arguments in the conclusion. I have tried to give equal attention to each text, but the fact that each story in Paul Auster's New York Trilogy can stand alone as an individual piece of writing has made this difficult. In New York Trilogy, the distinction between writer and detective is particularly indistinct. This is complicated by the fact that Auster continually subverts the conventions of the detective genre that are expected by the reader. For instance, in a detective novel there is generally an expectation on the reader's part that a crime has been committed, and that the mystery surrounding this crime will be solved thereby restoring the social order. In the first story of the novel, City of Glass, no crime takes place. The central character, I will for now call Quinn (this term as I will later explain is also problematic), accepts a surveillance job, which only becomes a mystery when his employers, Virginia and the young Peter Stillman disappear. Rather than providing a solution to this mystery the novel instead throws up more questions and leaves the reader increasingly confused. It is with this central character, Quinn, that the distinction between writer and detective first becomes unclear. Quinn is an author of detective fiction. He has created the character Max Work, a private eye, under the pen name of William Wilson. At this stage Quinn has already to some extent become a detective. For Quinn the roles of, â€Å"the writer and detective are interchangeable†1. Both the writer and the detective must look out in to the world and search for thoughts or clues that will enable them to make sense of events. They must both be observant and aware of details. Quinn appears to exist only through the existence of Max Work, â€Å"If he lived now in the world at all, it was only at one remove, through the imaginary person of Max Work. â€Å"2. He even finds himself imagining what Max Work would have said to the stranger on the phone after receiving the first call. Perhaps this is why the next time he answers the phone to the stranger he finds himself taking on the identity of the unknown detective, Paul Auster. Surely this is not an action one would expect from the uncomfortable writer Quinn, but one that could be easily identified with the confident private eye Max Work. From this moment on, Quinn the writer has also taken on the physical duties of the detective. Adding to the complication, by taking on the identity of an unknown and apparently non-existent detective named Paul Auster, Quinn also takes on the identity of an existing writer Paul Auster, who agrees to cash the checks paid to Quinn by the Stillmans. At this point Quinn (as his name suggests3) has five identities. Three of these are writers and two are detectives. As a detective, Quinn finds that the thought processes in which he must engage are not dissimilar to those of a writer. As â€Å"Dupin says in Poe†¦ ‘An identification of the reasoner's intellect with that of his opponent'†4is necessary. In this case Stillman senior is the opponent. This is similar to the process in which Quinn must put himself in the fictional Max Work's place in order to determine what course of action he might take in order to make him appear realistic to the reader. In the second story of the trilogy, Ghosts, the reader is introduced to Blue, a professional rather than sham detective. A man named White hires him to watch a man called Black, and to make weekly reports on his movements. In contrast to the first story in which the writer becomes detective, in this we see the detective become writer. Faced with very little understanding of the case he has embarked upon, Blue finds himself making up stories in order to bring some meaning to the position he is in, â€Å"Murder plots, for instance, and kidnapping schemes for giant ransoms. As the days go on he realise there is no end to the stories he can tell. â€Å"5. Blue is hardly restricted in the number of theories he can advance because he possesses only a small number of facts they have to meet. The detective becomes a writer in his attempt to reconstruct a possible crime. This can be seen in any number of detective or crime novels, including In Cold Blood and My Dark Places. According to Peter Huhn in his article ‘The Detective as Reader: Narrativity and Reading Concepts in Detective Fiction', †¦ he text of the novel can be said to have two authors (at least): the criminal (who wrote the original mystery story [by committing the crime]) and the detective (who writes the reconstruction of the first story). As a detective, Blue has never previously had difficulty with writing reports. It is only when he sits down to write his first report on Black that he encounters a writers struggle to find a way of adequately expressing events. Before, action has always held â€Å"forth over interpretation†7 in his reports. As he feels pulled towards interpreting events he becomes more a writer than detective. In one report he even includes a completely fictitious observation, that he believes Black is ill and may die. The incident in the Algonquin Hotel, in which Blue approaches Black under the guise of a life insurance salesman named Snow, the reader is made aware that perhaps Black is also a private detective (unless he is lying). If we take this to be the case then it could be considered that Black the private detective is also a writer, in that his actions determine those of Blue. Blue must follow him wherever he goes, is trapped by Black's routine and so Black is, in effect, writing Blue's life. Conversely then, the same must be true for Blue. If Black really is a private detective, as Blue is, then Black must follow Blue, becoming trapped in his routine. Blue is therefore the writer of Black's life. In the third story, The Locked Room, the central character, an un-named author is a writer who turns detective in an attempt to locate his childhood friend Fanshawe. Until Fanshawe contacts the narrator in a letter, he has been presumed dead. Initially, the process of detection begins under a pretext of writing a biography of Fanshawe's life. As a writer of a biography, one is expected to stick to facts, as is a detective. However, as this biography would be written under the illusion that Fanshawe is dead it would actually in effect be a work of invention rather than accurate reconstruction. The narrator tells us, â€Å"The book was a work of fiction. Even though it was based on facts, it could tell nothing but lies. â€Å"8. Thus, in this story, the central character even through the process of detection remains, in essence, a writer. The extent to which writer is also detective in Truman Capote's In Cold Blood must be looked at in a very different way due to the type of crime novel it is. Tom Wolfe has as I have mentioned, described it as ‘New journalism'. Capote himself, however, distances his novel from this school of writing. He views his work as â€Å"creative journalism† as opposed to for instance, a â€Å"documentary novel†9. The distinction for Capote is that to be a good creative journalist a writer must have experience in writing fiction so that he has the necessary knowledge of fictional writing techniques. Writers trained in journalism for example would not possess the skills needed to write a creative journalistic piece, but are more suited to writing documentary novels. Capote's distinction is relevant to the question because it gives us an insight into the extent in which In Cold Blood was created as a compelling true crime novel, largely based on fact (by a writer), in comparison to the extent in which a crime and it's effects was accurately reconstructed and completely based on fact (as a detective would attempt to do). In order to determine the real extent to which Capote as author of this novel was also a detective a number of issues need to be addressed. To begin with the opinion that in researching and writing In Cold Blood Capote was in fact acting as a detective will be examined. The research Capote undertook in writing this non-fiction novel was indeed extremely thorough. He arrived in Holcomb in November 1959, the same month of the murders and a month before Dick Hickock and Perry Smith were arrested. He was therefore present during the time in which the initial police investigation was taking place. He conducted hundreds of interviews with residents of Holcomb, and other individuals who had come into contact with the two murderers. Some of these interviews, as he told George Plimpton in an interview for the New York Times in 1966, went on for three years. Capote also undertook â€Å"months of comparative research on murder, murderers, the criminal mentality,† as well as interviewing, â€Å"quite a number of murderers† in order to gain a perspective on Smith and Perry10. In his interviewing of Smith and Perry after their arrest, he acted to a great extent as a detective is expected to. As the men were kept apart following their arrest, Capote was able to cross-reference their interview answers in order to determine fact from fiction, â€Å"I would keep crossing their stories, and what correlated, what checked out identically, was the truth†11. In Cold Blood has been widely accepted as an extremely accurate portrayal of the Clutter murders and the following investigation. However, the opinion that In Cold Blood was as much a work of fiction as of fact needs to be considered. Within this novel there are several instances in which Capote could be said to have used artistic licence. The clearest example of this is the last scene of the novel in which Detective Alvin Dewey meets murdered Nancy Clutter's childhood friend at the graveyard in Holcomb, four years after the family's deaths, ‘And nice to have seen you, Sue. Good luck,' he called to her as she disappeared down the path, a pretty girl in a hurry, her smooth hair swinging, shining – just such a young woman as Nancy might have been. 12 We know this to be an utterly fictitious scene because, according to Dewey's biographer Gerald Clarke, Dewey never met Susan Kidwell until the executions of Smith and Hickock in 196513. According to Capote, however, the meeting at the graveyard took place the previous May, in 1964. In the novel, the reader also cannot escape a feeling that Capote is somewhat biased towards Perry Smith. As a writer, personal opinions and feelings are perfectly acceptable inclusions in a reconstruction, but as a detective they are not. Of course this bias may arise directly from Capote's observations of the two men, and of factual, psychological evidence. In which case this would be a fair assessment. However, it has been suggested by some that this bias arises from Capote's feelings for Perry Smith and the relationship they developed whilst Capote was conducting his research. Ned Rorem, referring to a dinner conversation with Truman Capote in 1963, said of Capote â€Å"he seemed clearly in love with him [Perry]. It must be remembered however that this is just speculation. In Cold Blood has also been seen as a polemic against capital punishment and the American justice system. By indicating in the novel that Perry Smith was in a â€Å"psychological cul-de-sac†15 at the time he committed the murders he insinuates that the death penalty was an unjust sentence. With regard to Capote's attack on the justice system, his criticism can clearly be seen in his account of the jury selection for the trial, The airport employee, a middle-aged man named N. L. Dunnan, said, when asked his opinion of capital punishment, ‘Ordinarily I'm against it. But in this case no' – a declaration which, to some who heard it, seemed clearly indicative of prejudice. Dunnan was nevertheless selected as a juror. 16 If this is indeed a polemic, it must be the case that opinions and facts in opposition to Capote's argument would have been left out. This would make him more writer than detective. He himself confessed that, I make my own comment by what I choose to tell and how I choose to tell it. It is true that an author is more in control of fictional characters because he do [sic] anything he wants with them as long as they stay credible. But in the nonfiction novel one can also manipulate. 17 Ellroy's My Dark Places is also a true crime novel containing, as I have mentioned, elements of autobiography and of the police procedural. Unlike In Cold Blood, in which the reader is aware of the culprits' identities from the beginning, it is more of a ‘whodunit' in that the reader does not know who the murderer is. Through the process of detection, and with the help of a homicide detective named Bill Stoner, Ellroy retraces the initial investigation into his mother's murder in the hope of finally solving it. As in New York Trilogy, however, the reader is denied the solution and restoration of order generally expected from (and often desired in) a detective novel. The novel is written in four parts, and the extent to which Ellroy is both writer and detective varies with each one. The first part, ‘The Redhead' is Ellroy's reconstruction of the original investigation. Although true crime, this section reads as a police procedural novel, involving meticulous detail of each piece of evidence and information collected at the time. Ellroy has had to take on the role of detective in this section in order to reconstruct events as they happened at the time, 1958, thirty-five years before his own investigation. Unlike a fictional police procedural, in which the reader expects at least a portion of the evidence to be significant in solving the case, in the end it proves to be useless. It is Ellroy's inclusion of this irrelevant information that increases the extent to which he is also detective. Rather than using it as a plot device, he has included it for the purposes of accuracy. This section is also largely devoid of emotion, regardless of the significance of the case to Ellroy. The title, ‘The Redhead' is an example of this emotional absence; it provides a superficial physical description of Ellroy's mother with no real clue as to her identity. Ellroy himself, as narrator, is absent. He appears only as a character in the drama, the murdered woman's son. Unlike the last section in the novel, Ellroy does not appear as a detective. The second part of the text, ‘The Kid in the Picture', is autobiographical. It traces Ellroy's personal involvement in crime, such as going on â€Å"righteous burglary†18 runs, and his development as a writer of crime fiction. In this section Ellroy is clearly writer rather than detective. This is made even more evident as he mentions novels written by him during this period, such as L. A. Confidential – which he describes as a novel â€Å"all about me and L. A. crime†19. The third part of the novel, ‘Stoner', introduces the reader to the detective Bill Stoner, the man who will eventually aid Ellroy in the search for his mother's killer. This section is a biography of Stoner's life and cases as a homicide and later as an unsolved crime detective. Ellroy himself is again absent from this section. As a writer he would had to have investigated the events in Stoner's life that are mentioned here. Thus, in writing this section Ellroy has had to, in effect, engage in detection. The other way in which Ellroy could be seen to also be a detective in this part is the language he employs. Much of the information we are given reads as would a police report. As Blue in New York Trilogy is accustomed to writing reports in which â€Å"action holds forth over interpretation†20, we see Ellroy writing in the same manner. This can be seen in the following extract, The Soto guys let her in. Karen verbally attacked John's common-law wife and ran out of the apartment. The wife chased her. They traded insults on the sidewalk until 2:00 in the morning. John Soto ran down. He made his wife go upstairs. The whole of this section is written in the same manner. In contrast to In Cold Blood there is no emotion or interpretation, only facts. For this reason, as Ellroy's novel also deals with true crime, it could be said that Ellroy is a detective to a greater extent than Capote because he sticks more rigidly to the facts. The fact that the reader finishes this novel with a sense of dissatisfaction (as the case is not solved) could also add credence to this idea. This is because as a self-consciously literary exercise, rather than accurate detection, In Cold Blood manages to create a sense of suspense even though the reader knows who has been killed and who committed the crime. Ellroy instead recounts facts as they were rather than attempting to satisfy readers' expectations. Conversely, if we are talking about conventional detective literature, we could say that Ellroy is less of a detective (in the traditional manner) for the very reason that he fails to solve the crime, thereby failing to restore social order. The final section, ‘Geneva Hilliker', is that in which Ellroy is most evidently a detective as well as writer. This section of the novel details Ellroy's own investigation. It follows his collation of evidence, false leads followed and the final (if unsatisfying) resolution to Ellroy's story. Even if the reader does not find out who killed Geneva Hilliker, they, as Ellroy does, find out about her and her life. For Ellroy this provides some closure, as we would expect from a crime novel. It is not conventional to the genre but does resolve some of the questions Ellroy hoped to answer when he embarked on the investigation, thus consolidating his position as detective (however temporarily). In each of these novels, writers have to a considerable extent also been detectives. It is difficult to determine whether this is truer in any of the texts than in the others due to the different ways in which this has been the case. In My Dark Places and In Cold Blood, the authors of the novels have also carried out acts of detection in the research carried out for those novels. In New York Trilogy we see characters that happen to be either writers or detectives exchanging these roles. It may be said that any author is to some extent a detective, whether they are researching a factual book, or writing a fictional novel in order to discover something about the world in which they live. As Quinn believes, â€Å"the writer and detective are interchangeable†21.

Friday, January 3, 2020

Essay on Parenting Styles - 1718 Words

Reflection Paper. Mr. and Mrs. Harsh ­Heart believe in the importance of stern discipline and impose strict rules that they expect their children to obey without question. They penalize behavior harshly, frequently with spanking. Mr. and Mrs. Easygoing do not use punishment to enforce their rules and believe in natural consequences teaching lessons and setting limits on behavior. They have regular family meetings with their children to discuss household rules and their importance to the family dynamics. These styles of parenting have their advantages and disadvantages. There are ethical and unethical issues when it comes to discipline with punishment styles as well. The advantages and disadvantages of The Harsh ­Heart family can†¦show more content†¦The children can become rebellious, if the parents are just strict but do not allow much or high expectations or do not guide their children, the children may not learn right from wrong themselves. The child may simply just behave when parents are around. Some strict parents are not open to ideas and forget to communicate with their children. Which give their children communication problems. The child will feel less confident and more insecure. The feelings of the child won’t be expressed because he may believe his feelings will be criticized or punished. The children will need someone to confide in and the parent may not be available for this role. â€Å"Studies of Spanish and Brazilian adolescents have reported that teens from authoritarian homes had lower self ­esteem than did teens from authoritative or permissive families (Martinez and Garcia 2007Í ¾ Martinez and Garcia 2008).† Secrets and lies manifest within the relationship between the child and parent. When children are under the pressure of strict rules, they learn how to avoid punishment through lies and deceit. This leads to lying about places they are going and friends they hang out with and also activities they do. Sometimes the child in a strict household does not learn to make responsible situations because the decision was always made for them. This can lead to dangerous outcomes and wrongfulShow MoreRelatedParenting Styles And Styles Of Parenting1391 Words   |  6 Pages Parenting Styles My term paper will discuss the 4 Styles of Parenting, including; the styles of parenting that we as single parents and couple parents may identify with. My paper will also discuss how each parenting styles impacts our children, if it works and the style of parenting that’s most effective. Authoritative Parenting Style The Authoritative Style of Parenting, children are expected to follow the rules and guidelines that a parent with this style of parenting has put into place. ThisRead MoreParenting Styles : An Effective Parenting Style988 Words   |  4 PagesParenting style can influence whether a child succeeds or merely survives. The authoritative parenting style may be an effective parenting style in theory, however like communism, it is not as effective in practice. Children need to learn through friendships and develop social skills. Being able to connect to the outside world expand the mind and imagination, giving the children skills that help them think critically. On the other hand, being a permissive parent can also damage the child’s developmentRead MoreDifferent Styles Of Parenting Styles1708 Words   |  7 PagesSilicon Valley. (Hogan and Haskell, 2). Most of today’s kids have one of the following types of parents: Indulgent, Authoritative, Neglectful, Authoritarian*. T hese are generally regarded as the four main types of parenting. These four styles of parenting are the stereotypical parenting styles most people identify one or both of their parents as. Indulgent parents tend to coddle their children and protect them from disappointment. Authoritative parents are people who have reasonable demands and rulesRead MoreConflicting Styles Of Parenting Styles1375 Words   |  6 PagesConflicting Styles of Parenting Parents will treat their children the way they see fit. In the authoritarian parenting style, there is no room for freedom. In permissive parenting, there can be more freedom than the children know what to do with. Authoritative parenting combines the gist of both of the other styles and allows both freedom and structure. Both authoritarian and permissive styles have components that authoritarian parents see as productive methods if used properly. Many people associateRead MoreParenting Style Of Parenting Styles1772 Words   |  8 PagesPin pointing a specific parenting style that I was raised by was quite difficult. I believe that most parents use different styles throughout the raising of their children. Of course, I do understand that this paper is to select the dominate style of parenting used for my upbringing, but I was raised in two different households. Each household had its own dominate parenting style, however most of my life I was raised by my mother, so I’ll focus on her parenting style. As I stated above, I believeRead MoreEffects Of Parenting Styles992 Words   |  4 PagesParenting styles can be highly impressionable on their children.  There are various styles of parenting, and each style can have different effects on the child or adolescent.  The four parenting styles that can be implemented in the household are recognized as: authoritarian, neglectful, permissive, and authoritative. All four of these styles carry their own unique characteristics, and have some distinct features. Whichever style a parent decides is best to use for their child can have multiple shortRead MoreThe Different Parenting Styles1024 Words   |  5 PagesParenting styles have been described as the collection of parents’ behaviors which create an atmosphere of parent-child interaction across situation (Mize and Petit, 1997). Darling and Steinberg (1993) defined parenting style as â€Å"a constellation of attitudes toward the child that are communicated to the child and that , taken together, create an emotional climate in which the parents’ behaviors have expressed.† Despite these challenges, researchers have uncovered convincing links between parentingRead MoreThe Authoritarian Style Of Parenting Essay1414 Words   |  6 Pageschild-parent behavior, seeking to identify parenting styles. The Baumrid study and other further studies identified four main styles of parenting (Miller, 2010): the authoritative parenting style was characterized by fair rules and consequences; The Authoritarian parenting style was characterized by strict rules and harsh punishment; the permissive parenting style was characterized by minimal rules with little or no consequences; the uninvolved parenting style was characterized by no rules, and parentRead MoreEssay on Parenting Styles1213 Words   |  5 PagesParenting Paper Diane Baumrind’s typology has two major dimensions. The first dimension is responsiveness. In the text it mentions that responsiveness â€Å"refers to the extent in which parents respond to and meet the needs of their children.† (Knox 364). This is when parents support, encourage, and foster their children’s needs. The second dimension is demandingness which is â€Å"the matter in which parents place demands on children in regard to expectations and discipline.† (Knox 364). This is aboutRead MoreParenting Styles Essay1913 Words   |  8 Pagesunfortunate theme: Parenting can be done quickly and with little inconvenience. The reality is that good parenting does not require classical music, but instead time and effort. As children grow from infancy into adolescence the role of parenting broadens. How parents react to their childs actions communicates a standard of appropriate and inappropriate behavior that are fulfilled with varying degrees of conscious awareness. There are two major dimensions that underline parenting behavior. The first