Friday, March 26, 2010

N Viro International Coorporation




N-Viro International Corporation is the company that has generated sales in excess of $40 million dollars, since its initial public offering in October of 1993, which was underwritten by Robertson Stephens, Raymond James, Oppenheimer & Co., and Paine Webber.
N-Viro is the company which deals with the idea of regenerating old products to the new ones that are better and helps us in the future. It bassically deals with the waste product in the environment and turn that product into a new product as an alternative energy.
N-Viro uses best technology to stabilize and disinfect disinfect municipal bio solids and other organic waste products. These technologies safely and efficiently transform waste streams into beneficial reuse products. The product which is formed by these method is called renewable product as we get a product from a junk or we can say waste. These conversion of waste to energy is the prime motto of the company. The product is renewable product and consist of the substances which can be used as fuel , which the most important and high level demands of the every nation. The product we get can be used in many fields such as aggricultural , bio-fuel ,etc.
The company has tested many experiments on the product and had a report in it. In the report the company has given a statistical data about the product. The report is given below
The N-Viro Fuel technology was recently tested on a full-scale basis at the Michigan State University coal-fired power plant. Two different fuels, one made from biosolids and the other from manure, were blended with eastern Ohio coal and burned in the power plant’s fluidized bed boiler. The blended fuels performed well compared to coal alone; air emissions were below regulatory limits, and the boiler performed normally.
From the report it is clear that the product which the company used works better than coal and also the air pollution which is emitted by the coal is higher than our product. So this shows that the product works better than the coal which is write now the main cause of global warming. Our product is the like clean coal , which is the right choice for generating electricity and etc.
Today as we know that in earth the consumption of coal is higher than the production so if we don't use new technology we wouldn't be able to use these materials(coal) in the near future. This shows that our product is the opportunity fuel for the generation of electricity ,aggricultural issues ,etc. So for these reason N-Viro company is doing a great job by making new technology to provide better platform for us and as well as for our future generation.

The product information and the details of each step of making is given in their website. The link to the website is given below:-
http://www.bloggerwave.com/Bloggerwave/c/391/29720/0

So for this reasons the company develops and licenses its technology to municipalities and private companies. Their patented processes use lime and/or mineral-rich, combustion byproducts to treat, pasteurize, immobilize and convert wastewater sludge and other bio-organic wastes into biomineral agricultural and soil-enrichment products with real market value.
Right now this is the best choice for our future.

Friday, March 19, 2010

SOFTWARE REQUIREMENT SPECIFICATION ON HOSPITAL MANAGEMENT SYSTEM-HMS

Software Requirement specification



Contents

0. Document History

1. Introduction
1.1 Functionality
1.2. HMS functionality
1.3 Terms, definitions and abbreviations
2. General description
2.1 Application description
2.2 Interface description
2.3 Restrictions
3. Task, functions
3.1 HMS functionality
3.2 Signing on for the course
3.3 Original Tasks
4. External interfaces
5. Other functionalities

5.1 Security Requirement
5.2 Performance Requirement
5.3 Safety Requirement
5.4 User Documentation
6. Quality Plan










1. Introduction: To Provide an integrated Solution for the Hospital, which
• Helps in Efficient Management of the Hospital.
• Enhance Patient Care
• Improve work efficiency
• Enable the Growth of the Hospital

1.2 Scope:
This product will provide separate billing method for indoor and outdoor patient, corporate and individual patient.



Login Page: user enters login-id and password and clicks on login button; home page opens.


a. Functionality : there are 15 major modules
The various modules are
1.1.1 Reception Management
1.1.2 Patient Registration (OPD & Indoor)
1.1.3 Out Patient Management
1.1.4 OPD Billing
1.1.5 Investigations Reporting (Pathology & Imaging)
1.1.6 Indoor Patient Management
1.1.7 Indoor Billing
1.1.8 Store
1.1.9 Pharmacy
1.1.10 Financial Accounting
1.1.11 Payroll
1.1.12 MRD Management
1.1.13 Online Diagnostic Reporting
1.1.14 HR Management


1.2. HMS functionality:
1. Reception Management:

Patient Registration:
Reception is the first point of interaction for anybody coming to the Hospital. It has all the information of the patients, doctors, departments and activities of the Hospital. All enquiries and appointments are scheduled through this module.

Doctor Scheduling: User selects dept-name and doctor id from drop down list ; doctor’s name display and user selects date from date picker and enters doctor type, selects visiting hours and click on submit button. Information saves in database.
All information available here are in real time and any enquiry about the patient status, Room Status, Doctors availability or tariff’s for various services is on actual status since the data is constantly updated.


This module comprises of the following components
Patient Enquiry: This will provide information of any patient like: Patient status, Name, Address or any other demographic detail.

Consultants Enquiry: Any Information regarding a visiting Consultant can be obtained like consultant’s availability, days & time of availability, Department, specialization or any other.
Appointments Scheduling: This option allocates the slots for various consultants. Any appointment can be booked either by phone or visit, enquired and cancelled.




Patient Appointment Registration:
Every patient who visits the hospital has to get registered prior to getting any consultation, treatment or investigations done. Registration of patients involves accepting certain general and demographic information about the patient. The patient is allocated a unique Registration number and a Patient Identification number. The Patient ID will remain same for his all subsequent visits to the hospital whereas he will be allocated a new registration number on every visit. The consultation charges (if applicable) can also be collected for the OPD patients during registration and a receipt will be generated.


The following information is required for the registration of OPD Patient--:
v Patient Details like Name, Age, Sex, Address, Contact number, Nationality, etc.

v Referring Source and Sponsorship / Penal Details

v Department & Consultant to be visited.

For Inpatient the additional information requirements are:

v Room / bed requirement.
v Consultant In charge
v Treatment required
v Authorisation from Sponsor/Penal if required

After registration an OPD Card is printed for the OPD patients, which list all his registration information. This card is used for the prescription writing by the consultant. An Admission form is printed with all the registration details for Indoor patients, which serves as the cover page of the patient file.





In Patient Daily Report: user selects registration-id from drop down list and click on submit button; then Inpatient Daily report generates.



3. out Patient Management:

After the registration the patient comes to the consultation chamber, where the consultant records his history, diagnose and prescribe medicines & investigation.
The Consultant note down the following details on Patients OPD Card:
i. Complaints
ii. History
iii. Diagnosis
iv. Investigation
v. Medicines
vi. Advice
vii. Next Visit

This information is then entered into the patient data by the consultant or the operator at the OPD Counter. It serves the purpose of tracing patient’s visits history and also as a feedback for research & analysis.
The prescription can also be scanned and saved. The scanned data can be entered later into various fields by the operator.

4. OPD Billing:

For billing of any OPD service like Pathology Tests, or any imaging investigation, the patient moves to OPD billing counter. Here the services are charged as per the rates already defined for various categories/ penal/ time etc to the patient with his Patient ID. The Payment is collected for the service provided and a receipt is generated.
This module works as an interface with the diagnostic modules. All services will be automatically entered into the respective modules wherever required like lab & Imaging reporting.
The Salient features of this module are
i. Record Charges to be taken from the patient.
ii. Record details of the concession & concession authority.
iii. Consultant charges are automatically picked according to general or emergency charges.
iv. The charges for the services are automatically picked according to the category or panel of the patient.
v. The charges are also dependent on time when the service is being given to patient.
vi. When patient revisits his information will be automatically picked using his identification number.
vii. Patient can be defined under Cash & Credit OPD.
viii. All relevant information is transferred to the Investigation departments.

5. Investigations Reporting (Pathology & Imaging)

In the routine functioning of a hospital, various types of investigations are carried out. Carrying out number of tests and making the results available promptly is very crucial for assessing the patient's medical status and deciding on the further course of action.

The investigation requisition can be auto-generated (through OPD billing or IPD) or can also be generated here, depending on the system followed in the hospital. The tests parameters are pre defined with the interpretations & formulae wherever applicable. The test results are entered into the software manually or with equipment integration and a descriptive smart report is printed after verification and validation.
The Salient features of this module are
i. Online investigation requisition can be raised from OPD or IPD or Labs
ii. Provision for entering results for diverse tests in multiple reporting formats.
iii. Five options for each test parameter, along with interpretations & explanation.
iv. Age wise & Sex wise Reference range for Pathology tests.
v. Warnings & Auto-highlighting of abnormal values.
vi. Auto calculation and validation of test results with formulae
vii. All the Reports will be validated before finally ready for printing after verifying its correctness.
viii. Role Based Security. Different access password for each department & User.
ix. Comparative analysis of Test result with last visits reports.
x. Integration with diagnostic equipments to fetch actual result values directly


6. Patient Management

The Indoor patient module commences when the patient is being registered and allotted a bed in the ward. It deals with the complete treatment and services provided to the patient during his stay in the hospital.
This module works at the nursing station. During his stay in the hospital, every patient is provided various services in terms of consultant’s visits, investigations, procedures, medicines & consumable, room services, diet, etc. All these services are entered online to the patient record through nursing station. It also interacts with the Investigation module, Store, Pharmacy and sends the requisitions to these departments. This data serves as major input for the IPD billing.









Salient Features:
i. Bed Allocation and Transfer.
ii. Consultants visit entry.
iii. Recording Patient’s Clinical Data
iv. Requisition of Investigations required.
v. Requisition to Store & Pharmacy for Medicines & Consumables.
vi. OT Billing & Management

7. Billing:
Indoor billing module has a supervisory role. The entries for billing are automatically transferred to the patient bill by the respective departments, which provide the service. The services are charged as per the category/panel/package applicable.

Here the bill is compiled and the payment collected from time to time. Provisional and Final bills are generated which provides complete information about the Services availed, its Charges, Advance collected, appropriate Receipts, Refunds, Credit notes, Concession allowed, etc.


Salient Features:
i. Collection of Payment by Cash/Credit Card/ DD or Cheque.
ii. Receipts, refunds, Credit Note Generation.
iii. Provisional & Final Bills.
iv. Department wise services availed.
v. Scrutinizing the Deposit Exhaust list and sending requisition for deposit.
vi. Automatic scrutiny of the credit limit available to the patient
vii. Provision to bill a patient against another account (LIC account/company account/Donors account etc.)
viii. Additional payment for Ambulance/attendants at discharge if required.

8. Central Store:

This module deals with the inventory of all Hospital Equipments, Materials, Consumables, and Medicines, Implants & Asset items in different departments of the hospital along with their purchase and supplier details. Requisitions for different items/equipment are sent to this store from different departments and accordingly the Central Store issues items/equipment to various departments and generate purchase orders for purchases. This also maintains records of purchases, stock, and supplier list, item/equipment/material master tables.

The Store module ensures that there is a round the clock availability of a sufficient quantity of drugs and consumable material for the patients in a mode that neither hinders efficient clinical work, nor it becomes a threat to the survival of the Store.

Salient Features of this Module are:
i. Maintains the details of all items, its suppliers and purchase details.
ii. Items can be categorized under different groups.
iii. Items can be defined for the store i.e. a particular will be able to view only those items which comes under it.
iv. Generate Purchase order linked with patient indents.
v. Maintain Separate Stock of Central Store & Multiple Sub Stores.
vi. A particular store can indent items from all other stores.
vii. Maintain vendor details from whom Items are being purchased.
viii. Central Store can acknowledge return of purchased item.
ix. Various area stores can return items that are not required by them back to the Central Store.
x. Different store can issue Items to other Stores, Department.
xi. Strict Check on the Expiry Date of Medicines & Consumables.
xii. Items can be issued according to FIFO & LIFO check
xiii. Maintain Reorder Level of Items and warn accordingly.

The following reports can be generated as part of this module:
i. Report of all items according to their group
ii. Stock in Hand Report (Group & Batch Wise)
iii. Stock Valuation on Purchase Rate & M.R.P.
iv. Report on Stock Movement as when & from where Item was issued and to whom it was issued.
v. Items Expiry list & warning
vi. Reorder Level of Items.
vii. Purchase & Issue Registers.

9. Pharmacy:

The Pharmacy Module deal with the Retail Sale of medicines to OPD patients and Issue of medicines to the In-patients in the hospital. Its function includes, online drug prescription, inventory management and billing of drugs, consumables and sutures. This module is closely linked to the Billing Module and In-patient Module. All the drugs required by the patient can be indented from the various sub stores.
Salient Features:
i. This module enables complete control on pharmacy including Purchase & Issue of medicine to IPD or OPD Patient.
ii. Medicines can be classified under different categories as per the salt or appearance.
iii. Total amount of the bill for IPD Patient will automatically get added in his bill.
iv. The Pharmacy can acknowledge the return of items and issue Credit notes.
v. Items can not be issued after the expiry date.
vi. Items can be issued according to FIFO & LIFO check.
vii. Details of all vendors are kept in accordance with their transactions.
viii. Maintain Reorder Level of Items
The following reports can be generated as part of this module:
i. Stock in Hand Report (Group wise, Batch wise)
ii. Expired medicines list. List of all the items according to their group classification. (Batch wise, or without Batch wise)
iii. Report on Stock Valuation on Purchase Rate, Sale Rate & M.R.P.
iv. Report on Stock Movement as when medicine was issued and to whom it was issued.
v. Purchase, Sale & Issue Register.
10. Financial Accounting
A Financial accounting module is linked with hospital billing module. You get online accounting of all revenue generated along with expenses incurred. There is no need to enter the revenue entries as they are already fetched from the billing module. All relevant information for the staff salary/wages, consultant share, etc is available.

Salient Features of this module are:
i. All revenue entries are transferred automatically from billing module.
ii. Just enter the expense vouchers and the accounts are complete up to balance sheet.
iii. Consultant Share and other relevant Information already available.
iv. User defined ledger Groups & Accounts.
v. User definition of Cost Centre.
vi. Department wise income detail.
vii. Cheque Printing.
viii. Graph with Key Reports.

Key Reports of this module are:
i. Party Ledger
ii. Ledger Analysis.
iii. Day Book
iv. Cash Book
v. Bank Book
vi. Sale Book
vii. Trial Balance as on date.
viii. Group wise Trial Balance.
ix. Profit & Loss Report.
x. Balance Sheet

11. Payroll:

Keep track of all staff member’s attendance; there leave record and deductions. Generate salary slip and other related reports.

Salary Master: User clicks on master salary option; master salary page opens. User selects Emp-Code from drop down list then all salary related information display.





Salient Features of this Module are:
i. Maintains complete record of all employees including the Employee Code, name, Demographic data, Salary in different heads, Department, Designation, PF account, ESI Account, etc.
ii. Definition of Salary head as per formula or straight away.
iii. Leave’s as per defined by user.
iv. Salary settings as per monthly basis, or on wages basis.
v. Daily/ Monthly attendance record.
vi. Short Term & Long Term Loans.
vii. Record of employee’s in time, out time, lunch hours, over time.
viii. Application of salary increment formula.
ix. Supports all types of Smart Cards, Bar Cards, etc.

Key Reports under this module are:
i. Salary Register.
ii. Leave Register.
iii. Pay Slips.
iv. Employee List with their complete details.
v. Over time report.
vi. Overall PF Report.
vii. Report of Leaving and new join employees.


12. Medical Record data (MRD) Management

Patient’s Medical record data is critical for the analysis and research purposes. This data includes patient history, observation, diagnosis and therapeutic conclusions along with the tests details and serves as a source of information for any analysis and research. The purpose for this module is to utilize the patient’s medical information and use it for analysis thereby improving patient care.
Salient Features of this Module are
i. Statistical reports based on diagnosis, age, sex, geographical areas and other parameters.
ii. Discharge Summary with details of test reports.
iii. Reports on departments, consultants, etc.
iv. Birth & Death Records with full details.





HR Management:

Department: User enters dept name, HOD, location, current man power, Authorised man power and user will click on save button; information saves in database. When user clicks on reset option; all fields are cleared.





Employee Information: when user clicks on employee information option; employee information page opens. And user enters EMP- name, emp-type, user will select date from date picker, enter department, designation, qualification, select blood group, gender, status from drop down list and user enters family information and address information and click on save button; popup message display and information saves in database.







What does HMS integrate?
v Database
v Applications
v Interfaces
v Tools

1.3 Terms, definitions and abbreviations

v QA Quality Assurance

v DATABASE A place where permanent data is stored

v BRS Business Requirement Specification

v SRS Software Requirement Specification

v FRS Functional Requirement Specification

v HMS Hospital Management System


2. General description:

2.1 Application description: The user will enter all the billing information for a particular patient. This will include the type of the patient (inpatient/outpatient and corporate/individual), type of billing (for inpatient the mode of bill payment may be post-paid but for outpatient it should be prepaid). The user will also have to select the laboratory tests done by the patient, the date of discharge of the patient and the amount of discount if there is any.2.2 Interface description: The user will have to be familiar with the billing module. If needed, the user should be trained up to use this module. The user may be an administrator, nurse or a cashier. It depends upon the particular hospital.



3. Task & Function:

3.2.1 Tasks and functions of the system:

Almost all the functional requirement validating the input data, updating of some Module pages and checking deadlines.

3.2.2 Original Task:
The original goal of this project is to develop new Web-based software for the HMS and Process control and monitoring.





The administration included the following tasks:

v Signing on for authorization: Administrator manages site security and permissions features and can make site-wide changes. It's usually the person who first set up the site.


4. External interfaces
Input from the user will be via keyboard input and mouse point and click. The user will navigate through the software by clicking on icons and links. The icons will give appropriate responses to the given input

4.1) Technology Used: Oracle 9i, JAVA

5. Other functionalities:

5.1 Security: Each member is required to enter an individual password when accessing the site. Administrators have the option of increasing the level of password security their members must use. The data on your site is secured through multiple layers of protection. One of those security layers involves member passwords. For maximum security of your site, each member must protect their password.



5.2 Performance requirements:
The performance of our product is at its best if stored locally, as the response time will be much faster. If the product accessed via Internet, the performance is limited by the connection speed. The only foreseen limitation is that of web-server response.

5.3 Safety:
Humans are error-prone, but the negative effects of common errors should be limited. E.g., users should realize that a given command will delete data, and be asked to confirm their intent or have the option to undo.

5.4 User Documentation
The form generation language will be separately documented.

6. Quality plan

Goal
Description
Evaluation metrics
Priority
Functionality
Good quality of the framework
= produces robust, bug free software which contains all necessary requirements
Customer satisfaction
10
Documentation
If used in other projects documentation is of real value
All the required documents will be produced with a good level of English language.
Source code will be commented
= produces consistent, easy to read documentation
Customer satisfaction
9
Modularity
Simplicity of system architecture
Independence of code modules
= produces a system that is easy to update and maintain
Customer satisfaction
8
Reusability
Is part of the code going to be used elsewhere
= produces simple and independent code modules that can be reused
Customer satisfaction
7
Flexibility
How general the form generation language is
Simplicity vs. functionality of the form language
= Speeds up form development but does not limit functionality
Customer satisfaction
8
Communication
Effective, clear
= simplify communications internally and with customers
Customer satisfaction and internal acceptance.
8
Schedule
Can some tasks be late? (Overwhelming workload on certain tasks)
= Reduces some risks
Following deadlines, evaluation of effectiveness in reviews.
4
Working methods & Tools of the group
= can significantly speed up development time
Internal acceptance
3
Scalability
Simultaneous users, if not this course what about other?
= produces multi-user proof software
Passing of scalability tests and customer satisfaction
2
Browser independence
What restricts the usage of browsers?
Testing the outputted pages on different browsers
1


How to evaluate at the end of the course the results in relation with the quality plan?

The goals have a priority which goes from 10 to 1, from the most important to the less important.




The overall of the course could be evaluated in the following way:

Each goal is given a grade which goes from 0 to 10.
Then that grade is multiplied by its priority in the table After doing the same with all the goals, they are added together and divided by 5.5 this way is possible to get a percentage of how the quality plan has been accomplished. For example : let's suppose that the group gets a 5 in each of the goals of the quality plan, this would mean that in average the overall of the project group has met 54.54 % of the initial requirements. The total of the points in this case would be 300, then 300/5.5 = 54.54%


Reviewed by
Approved by
PM
P.Subramanium
Date
30/11/07
Created By
B.B Singh

T SPICE

T-SPICE

To transform your ideas into designs, you must be able to simulate large circuits quickly and with a high degree of accuracy. That means you need a simulation tool that offers fast run times, integrates with your other design tools, and is compatible with industry standards. Tanner T-Spice Circuit Simulator puts you in control of simulation jobs with an easy to use graphical interface and a faster, more intuitive design environment. With key features such as device state plotting, real-time waveform viewing and analysis, and command tools for simpler SPICE syntax creation, T-Spice saves you time and money during the simulation phase of your design flow. T-Spice enables more accurate simulations by supporting the latest transistor models—including BSIM4.5 and the Penn State Philips (PSP) model. And because T-Spice is compatible with a wide range of design solutions and runs on Windows-based systems, it fits easily and cost-effectively into your current tool flow.
T-SPICE is a most powerful tool for complete circuit design and analysis. It is powerful simulation tools for almost all integrated circuits. Almost every IC can be simulated by using tanner spice. T-Spice performs fast and accurate simulation of analog and mixed
Analog/digital circuits. The simulator can analyze large, complex designs with hundreds of thousands of circuit elements. The T-Spice Advanced Model Package includes the latest and best device models available, to help you get the most realistic simulation results possible. The Advanced Model Package also includes coupled line models and support for user-defined device models via tables or C functions. The design cycle for the development of electronic circuits includes an important pre-fabrication verification phase. Because of the expense and time pressures associated with the fabrication step,
Accurate verification is crucial to an efficient design process. The role of T-Spice is to help design and verify a circuit’s operation by numerically solving the differential equations describing the circuit. T-Spice simulation results allow circuit designers to verify and fine-tune designs before submitting them for fabrication.


v Improve simulation accuracy with advanced modeling features

T-Spice provides extensive support of behavioral models using expression controlled sources, tables, and external C-code. Behavioral models give you the flexibility to create customized models of virtually any device. T-Spice also supports the latest industry models, including the transistor model recently selected as the next standard for simulating future CMOS transistors manufactured at 65 nanometers and below—the Penn State Philips (PSP) model. PSP will simplify the exchange of chip design information and support more accurate digital, analog, and mixed-signal circuit behavior analysis.

Most SPICE simulators don’t support the added extensions that foundries use. T-Spice supports foundry extensions, including HSPICE foundry extensions to models.

• Supports PSP, BSIM3.3, BSIM4.5, BSIM SOI, EKV, MOS11, MOS20, VBIC, and MEXTRAM models.

• Includes two stress effect models, from the Berkeley BSIM4 model and from TSMC processes, in the BSIM3 model to provide more accuracy in smaller geometry processes.

• Supports gate and body resistance networks in RF modeling. • Performs non-quasi-static (NQS) modeling.

• Supports comprehensive geometry-based parasitic models for multi-finger devices.

• Models partially depleted, fully depleted, and unified FD-PD SOI devices.

• Models self-heating and RF resistor networks.

• Performs optional table-based modeling for fastest simulations.

• Includes enhanced diode and temperature equations to improve compatibility with many foundry model libraries.

T-Spice also incorporates several innovations and improvements not found in other SPICE and SPICE compatible simulators:

Ø Speed. The results of device model evaluations are stored in tables and reused. Because evaluation of device models can be computationally expensive, this technique can yield dramatic simulation speed increases. The memory used by T-Spice tables is optimized by storing only those points which are actually needed. T-Spice allows you to specify which devices use tables.

Ø Convergence. T-Spice uses advanced mathematical methods to achieve superior numerical stability. Large circuits and feedback circuits, impossible to analyze with other SPICE products, can be simulated in T-Spice.

Ø Accuracy. T-Spice uses very accurate numerical methods and charge conservation to achieve superior simulation accuracy.

Ø Advanced models. T-Spice incorporates the latest and best transmission-line and semiconductor device models to give you simulation results which are closer to real-world behavior, including the exclusive physically based Maher-Mead MOSFET.

Ø Macro modeling. T-Spice simulates circuits containing “black box” macro devices. A macro device can directly use experimental data as its device model. Macro devices can also represent complex devices, such as logic gates, for which only the overall transfer characteristics, are of interest.

Ø Input language extensions. The T-Spice input language is an enriched version of the standard SPICE language. It contains many enhancements, including parameters, algebraic expressions, and a powerful bit and bus input wave specification syntax.

Ø External model interface. Users can develop custom device models using C or C++.

Ø Runtime waveform viewing. The W-Edit waveform viewer displays graphical results during simulation. T-Spice analysis results for voltages, currents, charges, and power can be written to single or multiple files.

Ø Schematic entry. T-Spice Pro includes the schematic editor View Draw.


T-Spice maintains compatibility with traditional circuit simulation tools, while using the best available simulation technology to deliver results as quickly and accurately as possible

v Tanner Tools Design System

T-Spice Pro is part of a complete integrated circuit design tool suite for layout, verification and simulation offered by Tanner EDA.

Simulation Tools
§ T-Spice: analog/digital circuit simulator.
§ W-Edit: waveform viewer.

T-Spice offers fast and accurate simulation of analog and mixed analog/digital circuits. Full chip designs with more than 300,000 elements can be simulated. T-Spice accepts standard SPICE, table based, and user-defined models. The Advanced Model Package includes most current models, such as BSim3v3. Tanner EDA offers an optional process characterization service to extract parameters for all T-Spice-supported models. W-Edit streamlines and customizes the task of graphical data presentation. It accepts data files without modification from T-Spice.

v Define a Project
Dashboard is used to organize data related to a design project. Dashboard functions as the project manager and the launch pad for all other ePD and T-Spice Pro applications.
The Dashboard contains a tree control of toolboxes, which are folders containing related
application programs. To begin a project using View Draw you must define a project, associate it with a design, and specify the libraries that the design will be using. A project is simply a directory that identifies your current working area. The project directory
References or contains all of the component libraries used in your schematics, as well as other files and subdirectories associated with your design. The Project Wizard provides a simple way to create a new project and set up your initial library search order.


Library Setup and Search Order

The library search order specifies the list of libraries from which you will select component symbols for a particular project. When you create a schematic, you build the design from component symbols. These may include standard parts libraries supplied with your software, user-defined components and symbols, or third-party vendor libraries. They may reside on your local workstation or in a network location. There are three pieces of information you use in order to specify libraries in your library search order: the library directory path, the library type (read-only, writable, or mega file), and optionally a library alias.



Run Circuit Analysis

Use the T-Spice circuit simulator for operating point, time domain, swept frequency, and swept DC simulations. The T-Spice Advanced Model Package includes additional modeling features such as coupled line models and support for user-defined device models via tables or C functions.

Waveform Viewing

Use the W-Edit waveform viewer to view T-Spice simulation output waveforms as they are being generated during simulation.


v Perform sophisticated analysis

T-Spice uses superior numerical techniques to achieve convergence for circuits that are often impossible to simulate with other SPICE programs. The types of circuit analysis it performs include:

• DC and AC analysis.

• Transient analysis with Gear or trapezoidal integration.

• Enhanced noise analysis.


• Monte Carlo analysis over unlimited variables and trials.

• Virtual measurements with functions for timing, error, and statistical analysis.

• Parameter sweeping using linear, log, discrete value, or external file data sweeps.

With T-Spice, you can:

• Optimize designs with variables and multiple constraints and goals.

• Achieve performance goals by applying a Levenberg-Marquardt non-linear optimizer.

• Use plot statements that support wildcards.

• Use plot statements and parameter definitions that support mathematical expressions involving C-style math functions.

• Use bit and bus logic waveform inputs.


v Simulation Concepts

Simulation Algorithms
T-Spice is designed to solve a wide variety of circuit problems. Its flexibility is due to robust algorithms which can be optimized by means of user-adjustable parameters.

Kirchoff’s Current Law.

T-Spice uses Kirchoff’s Current Law (KCL) to solve circuit problems. To T-Spice, a circuit is a set of devices attached to nodes. The circuit’s state is represented by the voltages at all the nodes. T-Spice solves for a set of node voltages that satisfies KCL (implying that the sum of the currents flowing into each node is zero). In order to evaluate whether a set of node voltages is a solution, T-Spice computes and sums all the
Currents flowing out of each device into the nodes connected to it (its terminals). The relationship between the voltages at a device’s terminals and the currents through the terminals is determined by the device model. For example, the device model for a resistor of resistance R is i = Δv ⁄ R, where Δv represents the voltage difference across the device.

DC Analysis
Most T-Spice simulations start with a DC operating point calculation. A circuit’s DC operating point is its steady state, which would in principle be reached after an infinite amount of time if all inputs were held constant. In DC analysis, capacitors are treated as open circuits and inductors as short circuits. Because many devices, such as transistors, are described by nonlinear device models, the KCL equations that T-Spice solves in DC

analysis are nonlinear and must therefore be solved by iteration. On each iteration, T-Spice tries to find a set of node voltages that satisfies KCL more closely than the previous set. When the KCL equations are satisfied “well enough” (the sums of currents into nodes
are small enough), the process stops. The abstol and reltol options determine how closely KCL must be satisfied. The numnd option imposes a limit on the number of iterations. If numnd iterations are reached without a solution being found, then non convergence is declared.

Transient Analysis
In transient analysis, T-Spice solves for a circuit’s behavior over some time interval. In this mode, T-Spice takes small time steps, solving for the circuit’s state at each step. At each time step, two approximations are made.
First, a small error — the discretization error — is introduced because T-Spice cannot take infinitely small time steps. The chargetol and relchargetol options determine the acceptable limits of discretization error. In general, taking smaller time steps decreases the discretization error, so tightening the tolerances has the effect of higher accuracy at the expense of smaller time steps and therefore longer simulation times and larger output files. The discretization error is also affected by the order of the time integration method used, adjusted with the maxord option.
Second, just as in DC analysis, T-Spice solves the nonlinear KCL equations iteratively at each time step. The accuracy is affected by an iteration stopping criterion. The same tolerances as in DC analysis — abstol and reltol —affect this solution process.

v Device Model Evaluation
T-Spice can evaluate device models with any of the following methods. Direct model evaluation is the default.

Evaluation Methods

! In direct model evaluation, data points (the charges and currents at device terminals) are computed “directly” at each step from terminal voltages using analytical model equations. This method typically produces the most accurate results, but also typically takes the most time, because values must be repeatedly recomputed from very complex equations.
! In table-based model evaluation, data points are read or interpolated from precomputed tables stored in memory. When the simulation requires the charge or current value (output) corresponding to a given voltage (input) for a particular device, T-Spice uses the voltage to look up the appropriate value in the device table, interpolating if necessary to arrive at the needed charge or current. This method is considerably faster than direct model evaluation. By default, T-Spice uses analytical models to generate cached, or internal, tables for use during a simulation. At the conclusion of the simulation these internal tables are discarded.





v Parametric Analysis
Under many circumstances, T-Spice will be required to study the effects on circuit performance of variations in parameter values. For example, parametric analysis can be
used to evaluate multidimensional trends in the output over defined ranges of input
values or the sensitivity of circuit behavior to random fluctuations in fabrication conditions. A large range of parameters may be systematically and automatically varied:
! External parameters (such as temperature)
! Simulation parameters (such as tolerances)
! Device parameters (such as input voltage level)
! Model parameters (such as transistor length)
Three types of parametric analysis are made possible by T-Spice: parameter sweeping, Monte Carlo analysis, and optimization.

Monte Carlo Analysis
Monte Carlo analysis generates “random” variations in parameter values by drawing them probabilistically from a defined distribution. For each value thus chosen, all analyses requested by the input file are performed, and the results recorded. Monte Carlo analysis is performed using the keyword sweep;

Syntax
.step sweep [[sweep] sweep [[sweep] sweep]]

Where sweep is in one of the following formats:

[lin] variable start stop inc
or
decoct variable start stop npoints
or
variable lindecoct npoints start stop
or
variable list value [value […]]
or
list variable value [value […]]
or
variable poi npoints [value […]]
or
data=dataname
or
monte=mcruns [seed=seedval]
or
optimize=optname results=measname [measname […]] model=optmodelname





This example demonstrates Monte Carlo Analysis on a CMOS inverter circuit.

Input
...
* Main circuit: invert5
c2 out Gnd 800ff
.include ml2_125mc.md
m1n out in Gnd Gnd nmos L=5u W=8u
m1p out in Vdd Vdd pmos L=5u W=12u
.measure tran falltime trig v(out) val=2.8 fall=1 targ v(out) val=0.2 fall=1
.param vto_n=unif(0.622490, 0.5, 1) vto_p=unif(-0.63025, 0.5, 1)
.tran 2n 600n sweep monte=10
.print tran in out
vdd Vdd Gnd 3.0
vin in Gnd pwl (0ns 0V 100ns 0V 105ns 3V 200ns 3V 205ns 0V 300ns
+ 0V 305ns 3V 400ns 3V 405ns 0V 500ns 0V 505ns 3V 600ns 3V)
* End of main circuit: invert5

A Monte Carlo analysis sweeps parameter values that are chosen based on statistical variations. In this example, T-Spice varies the model parameter vto using random values chosen by probability distribution. In model file ml2_125mc.md, the .model statement specifies the vto parameter as two variables: vto_n for an n-channel MOSFET and vto_p for a p-channel MOSFET.
Input invert5.cir
Output invert5.out
The .param statement defines the probability distribution, where vto_n=unif(0.622490, 0.5, 1) and vto_p=unif(-0.63025, 0.5, 1) select uniform distributions centered at 0.622490 and -0.63025 with relative variation of 50%. The keyword monte=10 in the .tran statement invokes Monte Carlo analysis with 10 runs. The .measure statement measures the falltime of the output pulse for different values of vto.
Output
T-Spice reports the transient analysis results in ten sections for the ten Monte Carlo runs.
Following is part of the output section for the first run.
TRANSIENT ANALYSIS - Monte-Carlo-index=1
Time v(in) v(out)
0.0000e+000 0.0000e+000 2.9996e+000
6.0000e-010 0.0000e+000 2.9996e+000
2.6000e-009 0.0000e+000 2.9996e+000
4.6000e-009 0.0000e+000 2.9996e+000
6.6000e-009 0.0000e+000 2.9996e+000
8.5999e-009 0.0000e+000 2.9996e+000

Measurement results are reported at the end of each section.
MEASUREMENT RESULTS - Monte-Carlo-index=1
falltime = 1.2278e-008


Trigger = 1.0471e-007
Target = 1.1699e-007
At the end of the output file, T-Spice reports the Monte Carlo values for each run The measurement results are summarized along with statistical results from the analysis (minimum, maximum, mean, average deviation, variance, and sigma).

MONTE CARLO PARAMETER VALUES
Index 1
parameter Vto for model nmos = 3.1202e-001
parameter Vto for model pmos = -6.7032e-001
Index 2
parameter Vto for model nmos = 4.3157e-001
parameter Vto for model pmos = -8.2483e-001
Index 3
parameter Vto for model nmos = 6.7541e-001
parameter Vto for model pmos = -6.1756e-001

TRANSFER ANALYSIS
Index<> falltime<>
1.0000e+000 1.1738e-008
2.0000e+000 1.2477e-008
3.0000e+000 1.4346e-008
4.0000e+000 1.3173e-008
5.0000e+000 1.5912e-008
6.0000e+000 1.2399e-008
7.0000e+000 1.5150e-008
8.0000e+000 1.2944e-008
9.0000e+000 1.2069e-008
10.0000e+001 1.2278e-008
Minimum 1.1738e-008
Maximum 1.5912e-008
Mean 1.3249e-008
Avg dev 1.1325e-009
Variance 1.9941e-018
Sigma 1.4121e-009

DBMS Project for ipu

TO CREATE A NEW TABLE :

SYNTAX:

Create Table ( Datatype ( size ) , Datatype(size) ,…);

EXAMPLE:

SQL> Create Table Student (Stu_id int , Stu_name varchar(25) , DOB varchar(20) , Stu_marks int);

Table created.




STU_ID STU_NAME DOB STU_MARKS



























TO INSERT INTO A TABLE :

SYNTAX:

Insert into ( , , …) Values( Expression);

EXAMPLE:

SQL> Insert Into Student (Stu_id , Stu_name ,DOB , Stu_marks) Values (1 , ' Vineet gautam ' , '17 Aug 1988' , 70 ) ;

1 row created.

STU_ID STU_NAME DOB STU_MARKS
1 Vineet gautam 17 Aug 1988 70































VIEWING DATA STORED IN A TABLE :

1. ALL COLUMNS , ALL ROWS.

SYNTAX :

SQL> Select * From ;


EXAMPLE :


SQL> Select * From Student ;


STU_ID STU_NAME DOB STU_MARKS

1 Vineet gautam 17 Aug 1988 70
2 Kiran Nagar 13 Jan 1990 50
3 Reetika kaul 10 Jul 1989 73
4 Kishan 24 Dec 1988 65
5 Reetika kaul 10 Jul 1989 73
6 Kiran Nagar 13 Jan 1990 50
7 Vipin 15 Jul 1987 40
























2. SELECTED COLUMNS , ALL ROWS.

SYNTAX :

SQL> Select ( , , …) From ;

EXAMPLE :

SQL> Select (Stu_id , Stu_name ) From Student ;


STU_ID STU_NAME
1 Vineet gautam
2 Kiran Nagar
3 Reetika kaul
4 Kishan
5 Reetika kaul
6 Kiran Nagar
7 Vipin
























3. ALL COLUMNS , SELECTED ROWS.

SYNTAX :

SQL> Select * From Where (Search Condition) ;

EXAMPLE :

SQL> Select * From Student Where (Stu_marks > 50 ) ;



STU_ID STU_NAME DOB STU_MARKS
1 Vineet gautam 17 Aug 1988 70

3 Reetika kaul 10 Jul 1989 73
4 Kishan 24 Dec 1988 65
5 Reetika kaul 10 Jul 1989 73































4. SELECTED CULUMNS , SELECTED ROWS.

SYNTAX :

SQL> Select ( , , …) From Where (Search Condition) ;

EXAMPLE :

SQL> Select (Stu_id , Stu_name ) From Student Where ( Stu_marks > 50 ) ;





STU_ID STU_NAME

1 Vineet gautam
3 Reetika kaul
4 Kishan
5 Reetika kaul



























ELIMINATION OF DUPLIVINEET GAUTAMES USING SLECT STATEMENT :

1. ALL COLUMNS :

SYNTAX :

SQL> Select Distinct * From ;

EXAMPLE :

SQL> Select Distinct * From Student ;





STU_ID STU_NAME DOB STU_MARKS


1 Vineet gautam 17 Aug 1988 70
2 Kiran Nagar 13 Jan 1990 50
3 Reetika kaul 10 Jul 1989 73
4 Kishan 24 Dec 1988 65
7 Vipin 15 Jul 1987 40


















2. SELECTED COLUMNS

SYNTAX :

SQL>Select Distinct ( , ,…) From ;

EXAMPLE :

SQL> Select Distinct (Stu_id , Stu_name) From Student ;







STU_ID STU_NAME

1 Vineet gautam
2 Kiran Nagar
3 Reetika kaul
4 Kishan
7 Vipin






















SORTING DATA IN A TABLE :

SYNTAX:

SQL>Select * From order by ,,… <[Sort order]>;

SORTING IN ASCENDING ORDER
EXAMPLE:
SQL> Select * From Student order by Stu_name ;



STU_ID STU_NAME DOB STU_MARKS
2 Kiran Nagar 13 Jan 1990 50
4 Kishan 24 Dec 1988 65
1 Vineet gautam 17 Aug 1988 70
3 Reetika kaul 10 Jul 1989 73
7 Vipin 15 Jul 1987 40



























SORTING IN DESCENDING ORDER
EXAMPLE:
SQL> Select * From Student order by Stu_name Desc ;






STU_ID STU_NAME DOB STU_MARKS
7 Vipin 15 Jul 1987 40
3 Reetika kaul 10 Jul 1989 73
1 Vineet gautam 17 Aug 1988 70
4 Kishan 24 Dec 1988 65
2 Kiran Nagar 13 Jan 1990 50































CREATING A TABLE FROM ANOTHER TABLE :
SYNTAX:

SQL>Create Table (,,…)
As Select ,,… From ;







CREATING TARGET TABLE WITHOUT OLD RECORDS


EXAMPLE:

SQL>Create Table Student_info (S_no , Name , Birthday)
As Select Stu_id , Stu_name , DOB From Student
Where (Stu_id==0);


S_NO NAME BIRTHDAY






CREATING TARGET TABLE WITHOUT OLD RECORDS

EXAMPLE:
SQL>Create Table Stu_info (S_no , Name , Birthday)
As Select Stu_id , Stu_name , DOB From Student ;


S_NO NAME BIRTHDAY

1 Vineet gautam 17 Aug 1988
2 Kiran Nagar 13 Jan 1990
3 Reetika kaul 10 Jul 1989
4 Kishan 24 Dec 1988
7 Vipin 15 Jul 1987



INSERTING DATA INTO TABLE FROM ANOTHER TABLE:

SYNTAX:

SQL>Insert Into Select , ,… From ;

EXAMPLE:
SQL>Insert Into Student_info Select Stu_id , Stu_name , DOB From Student ;




S_NO NAME BIRTHDAY

1 Vineet gautam 17 Aug 1988
2 Kiran Nagar 13 Jan 1990
3 Reetika kaul 10 Jul 1989
4 Kishan 24 Dec 1988
7 Vipin 15 Jul 1987



























INSERT ING A DATASET INO A TABLE FROM ANOTHER TABLE
SYNTAX:

SQL>Insert Into Select , ,… From Where( Condition);

EXAMPLE:
SQL>Insert Into Student_info Select Stu_id , Stu_name , DOB From Student
Where ( Stu_marks > 50 ) ;






S_NO NAME BIRHDAY
1 Vineet gautam 17 Aug 1988
3 Reetika kaul 10 Jul 1989
4 Kishan 24 Dec 1988
5 Reetika kaul 10 Jul 1989

























DELETE OPERATIONS :

1. REMOVAL OF ALL ROWS.

SYNTAX:
Delete from ;

EXAMPLE:
Delete From Stu_info;


S_NO NAME BIRTHDAY




2. REMOVAL OF SPECIFIC ROWS.

SYNTAX:
Delete From Where (Condition) ;

EXAMPLE:
Delete From Student_info Where (S_no>=5);

S_NO NAME BIRHDAY
1 Vineet gautam 17 Aug 1988
3 Reetika kaul 10 Jul 1989
4 Kishan 24 Dec 1988






3.REMOVAL OF SPECIFIC ROWS BASED ON DATA HELD BY THE OTHER TABLE.

EXAMPLE:
Delete from student

Tuesday, March 16, 2010


1. Introduction

The 1800s marked the beginning of the fundamental understanding of electromagnetic energy. Michael Faraday, a noted English experimentalist, proposed in 1846 that both light and radio waves are part of electromagnetic energy. In 1864, James Clerk Maxwell, a Scottish physicist, published his theory on electromagnetic fields and concluded that electric and magnetic energy travel in transverse waves that propagate at a speed equal to that of light. Soon after in 1887, Heinrich Rudolf Hertz, German physicist, confirmed Maxwell's electromagnetic theory and produced and studied electromagnetic waves (radio waves), which he showed are long transverse waves that travel at the speed of light and can be reflected, refracted, and polarized like light. Hertz is credited as the first to transmit and receive radio waves, and his demonstrations were followed quickly by Aleksandr Popov in Russia.

20th Century
In 1906, Ernst F. W. Alexanderson demonstrated the first continuous wave (CW) radio generation and transmission of radio signals. This achievement signals the beginning of modern radio communication, where all aspects of radio waves are controlled.
In the early 20th century, approximately 1922, was considered the birth of radar. The work in radar during World War II was as significant a technical development as the Manhattan Project at Los Alamos Scientific Laboratory, and was critical to the success of the Allies. Radar sends out radio waves for detecting and locating an object by the reflection of the radio waves. This reflection can determine the position and speed of an object. Since RFID is the combination of radio broadcast technology and radar.

The 1960's through the 1980s: RFID Becomes Reality
The 1970's were characterized primarily by developmental work. Intended applications were for animal tracking, vehicle tracking, and factory automation. Examples of animal tagging efforts were the microwave systems at Los Alamos and the inductive systems in Europe. Interest in animal tagging was high in Europe. Alfa Laval, Nedap, and others were developing RFID systems.
The 1980s became the decade for full implementation of RFID technology, though interests developed somewhat differently in various parts of the world. The greatest interests in the United States were for transportation, personnel access, and to a lesser extent, for animals. In Europe, the greatest interests were for short-range systems for animals, industrial and business applications, though toll roads in Italy, France, Spain, Portugal, and Norway were equipped with RFID.
Research and development didn't slow down during the 1990s since new technological developments would expand the functionality of RFID. For the first time, useful microwave Schottky diodes were fabricated on a regular CMOS integrated circuit. This development permitted the construction of microwave RFID tags that contained only a single integrated circuit, a capability previously limited to inductively-coupled RFID transponders. Companies active in this pursuit were IBM (the technology later acquired by Intermec) Micron, and Single Chip Systems (SCS).

The 1990's
The 1990's were a significant decade for RFID since it saw the wide scale deployment of electronic toll collection in the United States. Important deployments included several innovations in electronic tolling. The world's first open highway electronic tolling system opened in Oklahoma in 1991, where vehicles could pass toll collection points at highway speeds, unimpeded by a toll plaza or barriers and with video cameras for enforcement.
Interest was also keen for RFID applications in Europe during the 1990s. Both Microwave and inductive technologies were finding use for toll collection, access control and a wide variety of other applications in commerce.

Back to the future: The 21st Century
Exciting times await those of us committed to the pursuit of advancements in RFID. Its impact is lauded regularly in mainstream media, with the use of RFID slated to become even more ubiquitous. The growing interest in telematics and mobile commerce will bring RFID even closer to the consumer. Recently, the Federal Communications Commission (FCC) allocated spectrum in the 5.9 GHz band for a vast expansion of intelligent transportation systems with many new applications and services proposed. But, the equipment required to accommodate these new applications and services will necessitate more RFID advancements.



The new generation of casino chips is giving insights into the way banks and shops could keep track of real money if it was tagged. Casino operators routinely monitor gamblers with security cameras, just as retailers monitor stores for shoplifters. Aside from improving security, RFID-tagged casino chips could also be used to track how people play. Casino operators can keep tabs on the fortunes of every gambler on their premises, recording the stakes placed by each player along with their winnings and losses. The casinos want to check that big winners are not cheating the house, and to identify lucrative "high rollers" and encourage them to keep playing by treating them to free meals, show tickets, or hotel rooms. But this monitoring has to be done by human observers and is haphazard and unreliable. Chip tracking could dramatically improve the process.


The Decades of RFID

Decade Event
1940 – 1950 Radar refined and used, major World War II development
effort.
RFID invented in 1948.
1950 – 1960 Early explorations of RFID technology, laboratory
experiments.
1960 – 1970 Development of the theory of RFID.
Start of applications field trials.
1970 – 1980 Explosion of RFID development.
Tests of RFID accelerate.
Very early adopter implementations of RFID.
1980 – 1990 Commercial applications of RFID enter mainstream.
1990 – 2000 Emergence of standards.
RFID widely deployed.
RFID becomes a part of everyday life.



RFID systems are essentially short-range, low frequency, low-bit rate wireless networks. Since their origins in the late 1940s, they have been developed specifically to exchange small amounts of data over relatively short distances using tags and readers based on proprietary air interface protocols. RFID applications are starting to “piggy back” onto today’s established WPANs and WLANs using active tags that communicate with these networks’ air interface protocols. In this sense, active RFID tags are a subset of more common communication devices like cell-phones, PDAs, and WiFi-enabled laptops, only with fewer input/output features (like keypads, screens, etc.) and transmitting less data. Similarly, RFID networks are a subset of today’s broad menu of wireless networks, as shown in fig 1.1. while ZigBee-enabled RFID will use wireless sensor networks to track mobile assets. Similarly, WiFi-enabled RFID allows organizations to leverage existing WLAN investments or choose to invest in a wireless infrastructure that will have multiple purposes, rather than building separate networks. NFC is a more recent wireless technology used in combination with RFID. NFC is essentially a WPAN technology with an even shorter range – about 20 centimeters – and lower data rates than Bluetooth. The technology supports a “touch paradigm,” where devices (including smart cards or mobile phones with embedded tags and readers) are brought very close together, or actually touch, to intuitively create a connection between tag and reader. NFC-based RFID may be used to automatically configure a higher-bandwidth connection like Bluetooth or WiFi between two devices.

Another typical application involves tapping a concert poster with a cell phone to automatically connect to a Web site over the mobile phone network to buy a concert ticket or download a song. NFC technology is compatible with the established smart-card infrastructure for contactless smart cards (wave or tap instead of swipe), which enables NFC phones to function as the smart card for mobile payment applications. Mobile payment using cell phones is already very popular in Japan. NFC technology is aimed primarily at consumer applications and analysts predict that 50% of mobile phones will be NFC-enabled by 2009. Mobile operators in Japan like DoCoMo and Vodafone have installed the necessary software on most of their new phones, increasing the popularity of these applications in Asia over the last couple of years.

Figure 1.1: Wireless technologies

Radio frequency identification or RFID, is rapidly becoming widespread enabling remote objects to be identified automatically. The person contributing more than any other single individual to this application of radio technology is Charles Walton of Los Gatos. The first successful application was for an RF coupled proximity key entry through locked doors. Mr. Walton formed a company with several associates, and sold the technology to Schlage Lock of San Francisco. Millions of radio frequency cards using this system have been sold and put into use. Mr. Walton invented several distinctly different forms of radio frequency ID, licensing the technology to several companies,and chose the frequency of 13.56 MHz for the RFID application,which has become a standard frequency. Charles also built systems to identify vehicles, eliminating the need to stop to pay a toll.
Walton will talk about his experience with RFID technology, and his experiences with starting companies. Charles began his involvement in RFID back in 1970. The RFID system they developed consisted of a transmitter that sends a signal of a few milliwatts that sweeps over a relatively wide frequency range, and a passive receiver that responds at one particular frequency.
A typical RFID system consists of a RFID tag (antenna or coil attached) with its unique electronic product code, a transceiver (reader with decoder), and the computer network (if any) that is used to connect the readers. RFID system mostly relies on RFID tags, reader and computer network for the identification of asset. All the basic components of RFID will be explained below priority wise.



2. RFID Tags
RFID tag or transponder is the basic building block of RFID system. Each tag consists of an antenna and a small silicon chip that contains a radio receiver, a radio modulator for sending a response back to the reader, control logic, some amount of memory, and a power system. These form the inlay which is encapsulated in glass or plastic coating according to the application to form the finished tag. tags may contain as large as 1024 bits depending on the requirement. The read range of tags largely depends upon the antenna circuit, size and the transmitting power of the reader.
fewTag is attached to or embedded in an object to be identified with the particular information to be retrieved, such as a product, case, or pallet, and can be scanned by mobile or stationary readers using radio waves


Fig.2.1: RFID tag[2]

.

2.1. Active tags[3]
Active tags are usually read/write devices. These are capable of initiating communication unlike passive tags which mean they are always on. They derive power from an on-board battery capable of supplying the circuitry with power as well as enabling a longer range of broadcast to the corresponding reader. Therefore they somewhat overcome the need of larger reader power for longer distances transmission. However their lifetime is limited due lower battery life and they are also more expensive than passive tags. Longer ranges, better immunity to noise and higher transmission rates are among the obvious benefits. They are employed for asset management and real time location system (RTLS).

2.2. Passive tags [3]
Passive tags are the simplest, smallest and cheapest version of an RFID tag as they do not contain a built-in power source and consequently cannot initiate communication with a reader. They are tiny resource-limited computers that are inductively powered by the energy of the request signal sent from RFID readers. The reader first interrogate the tag with a query through electromagnetic waves which when coupled with the antenna of tag energizes it. These tags are inexpensive, costing less than a quarter . They have limited amount of memory capacity. They also have a very long life span unless they are damaged or torn therefore are widely used in many different retail items. Passive tags can operate at low, high, ultrahigh, or microwave frequency but are ore exposed to electromagnetic noise.
A small part of the emitted field penetrates the antenna coil of the transponder,which is some distance away from the coil of the reader. A voltage Ui is generated in the transponder’s antenna coil by inductance. This voltage is rectified and serves as the power supply for the data-carrying device (microchip). A capacitor Cr is connected in parallel with the reader’s antenna coil, the capacitance of this capacitor being selected such that it works with the coil inductance of the antenna coil to form a parallel resonantcircuit with a resonant frequency that corresponds with the transmission frequency of the reader.





Figure 2.2 :Power supply to an inductively coupled transponder from the energy of the magnetic alternating field generated by the reader[3]

The antenna coil of the transponder and the capacitor C1 form a resonant circuit tuned to the transmission frequency of the reader. The efficiency of power transfer between the antenna coil of the reader and the transponder is proportional to the operating frequency f , the number of windings n, the area A enclosed by the transponder coil, the angle of the two coils relative to each other and the distance between the two coils.

2.3. Carrier
This part consists of a Radio frequency (RF) sine wave generated by the reader to transmit energy to the tag and retrieve data from the tag. This frequency is the leading factor that determines RFID range, resistance to interference and other performance attributes. Most of the RFID systems use the unlicensed spectrum, which is a specific part of the spectrum set aside for use without a radio license. Popular bands are the low-frequency (LF) band at 125–134.2 KHz, the high-frequency band at 13.56MHz, the ultrahigh-frequency (UHF) band at 859 to 960MHz (e.g. EPC global Gen 2), and the industrial, scientific, and medical (ISM) band at 2.4GHz used with expensive battery powered tags

3. Components of a reader
Readers in all systems can be reduced to two fundamental functional blocks: the control system and the HF interface, consisting of a transmitter and receiver (Figure 3.1) In order that it can be integrated into a software application, this reader has an RS232 interface to perform the data exchange between the reader (slave) and the external application software (master).



Figure 3.1: Master–slave principle between application software (application), reader and transponder[4]

First, a signal of the required operating frequency, i.e. 135 kHz or 13.56 MHz, is generated in the transmitter arm by a stable (frequency) quartz oscillator. To avoid worsening the noise ratio in relation to the extremely weak received signal from the transponder, the oscillator is subject to high demands regarding phase stability and sideband noise. The oscillator signal is fed into a modulation module controlled by the baseband signal of the signal coding system. This baseband signal is a keyed direct voltage signal (TTL level), in which the binary data is represented using a serial code (Manchester, Miller, NRZ). Depending upon the modulator type, ASK or PSK modulation is performed on the oscillator signal.



Figure 3.2: Block diagram of a reader consisting of control system and HF interface[5]

3.1 HF Interface
The reader’s HF interface performs the following functions:
•Generation of high frequency transmission power to activate the transponder and supply it with power;
•Modulation of the transmission signal to send data to the transponder;
•Reception and demodulation of HF signals transmitted by a transponder
Reader antennas in inductively coupled RFID systems generate magnetic flux , which is used for the power supply of the transponder and for sending messages between the reader and the transponder.
This gives rise to three fundamental design requirements for a reader antenna:
• Maximum current i1 in the antenna coil, for maximum magnetic flux ;
• Power matching so that the maximum available energy can be used for the generation of the magnetic flux;
• Sufficient bandwidth for the undistorted transmission of a carrier signal modulated with data.

3.2 Control unit
The reader’s control unit (Figure 3.2) performs the following functions:
• Communication with the application software and the execution of commands from the application software;
• Control of the communication with a transponder (master–slave principle),
• Signal coding and decoding (Figure 3.3).
Data exchange between application software and the reader’s control unit is performed by an RS232 or RS485 interface




Figure 3.3: Signal coding and decoding is also performed by the control unit in the reader[6]

RFID TODAY & TOMORROW
Libraries: Some libraries have implemented RFID systems to facilitate book checkout and inventory control and to reduce repetitive stress injuries in librarians
Smart appliances: By exploiting RFID tags in garments and packages of food, home appliances could operate in much more sophisticated ways. Washing machines might automatically choose an appropriate wash cycle

Health: Personal medical RFID card with prescription, RFID tagging of pharmaceuticals

Shopping: In retail shops, consumers could check out by rolling shopping carts past point-of-sale terminals


ADVANTAGES OF RFID[7]

• Non-line-of-sight Scanning
• Simultaneous Automatic Reading
• Labour Reduction
• Enhanced Visibility and Forecasting
• Asset Tracking
• Item Level Tracking
• Improved Asset Utilisation
• Traceable Warrantees
• Reliable and Accurate
• Information Rich
• Enhance Security
• Robust and Durable
• Improved Inventory Management


DISADVANTAGES OF RFID

• Cost of Tags
• Cost of new Infrastructure
• Lack of Training
• Limited Knowledge
• Immature Technology
• Deployment Issues
• Interference Limitations
• Lack of Ratified Standards
• Concern of Return on Investment
• Requirement of Close Co-operation
• Between Supply Chain Partners

HOW TO CREATE CS 1.6 DEDICATED SERVER

http://www.steampowered.com/download/hldsupdatetool.exe

NoSteamPatcher ->http://www.tutorialecstrike.com/index.php?option=com_remository&Itemid=95&id=2&func=fileinfo

AdminMod + MetaMod -> http://ovh.dl.sourceforge.net/source....50.60-win.zip

StatsMe -> http://ovh.dl.sourceforge.net/source....3-cstrike.zip


Step 1

Create a dir were the server will be installed example C:\HLDS
Open hldsupdatetool.exe, click next , then I agree we will get to the destination folder, here

we press browse and select Local Disk C , then double click the HLDS folder. OK finish the

steps

Step 2

click Start , then Run , type "cmd" , in the command line type cd C:\hlds

Step 3

if you se in the command line C:\hlds , type hldsupdatetool.exe -command update -game valve

-dir .

what this does ? it just start downloading in to the server directory all the latest files

needed by the server to run it will download the latest server aplication.
After you se "HLDS installation up to date" in the command prompt we will install the Counter

Strike mod for the server

Like before at C:\hlds type hldsupdatetool.exe -command update -game cstrike -dir .

after the mod is downloaded the message "HLDS installation up to date

Patching the server to accept Non Steam Clients:
Open no-won-steam.zip wich you have downloaded extract everything in C:\HLDS

Server CFG
In C:\HLDS\cstrike there is a server.cfg file open it with wordpad delete everything in it and

paste the following cvars:
code:

QUOTE
hostname ""
mp_autokick 0
mp_autocrosshair 0
mp_autoteambalance 0
mp_buytime 2
mp_consistency 1
mp_c4timer 35
mp_fadetoblack 0
mp_falldamage 0
mp_flashlight 1
mp_forcecamera 3
mp_forcechasecam 2
mp_friendlyfire 1
mp_freezetime 3
mp_fraglimit 0
mp_hostagepenalty 0
mp_limitteams 6
mp_logfile 1
mp_logmessages 1
mp_logdetail 3
mp_maxrounds 0
mp_playerid 0
mp_roundtime 3
mp_startmoney 800
mp_timelimit 35
mp_tkpunish 0
mp_winlimit 0

sv_aim 0
sv_airaccelerate 10
sv_airmove 1
sv_allowdownload 1
sv_clienttrace 1.0
sv_clipmode 0
sv_allowupload 1
sv_cheats 0
sv_gravity 800
sv_lan 1
sv_maxrate 7000
sv_maxspeed 320
sv_maxupdaterate 101
sys_ticrate 10000
decalfrequency 60
pausable 0
log on
decalfrequency 60
edgefriction 2
host_framerate 0
exec listip.cfg
exec banned.cfg
rcon_password


At we can type anything we what example "Jack's Counter-Strike Server"
is the rcon password for the admin to the server it is used to remote control the

server.

Installing Admin Mod

We have downloaded earlyer halflife-admin-2.50.60-win.zip wich we will extract it anywere and

double click on install_admin.vbs after wich it will ask us where to install. You will se

diferent targets , we are interested in C:\HLDS so we type the number of the target, it will

ask us what mod to install we are interesated in cstrike. OK and that's about it.

Installing StatsMe

we downloaded statsme-2.8.3-cstrike.zip extract everything in C:\HLDS\cstrike
Go to C:\HLDS\cstrike\addons\metamod open plugins.ini with wordpad and here add the next line

on top of the existing one :
Code:
win32 addons\statsme\dlls\statsme_mm.dll

Go to C:\HLDS\cstrike\addons\statsme open statsme.cfg with wordpad
At sm_menupassword modify r3wt with an other password (it's a must! or something won't work)

to make de /rank and /top10 work
open the same statsme.cfg at sm_storebyauth put 0 instead of 1

How to start the server using less resources

make a shorcut for C:\HLDS\hlds.exe on the desktop
on the desktop click the properties of the shortcut you will se at the target C:\HLDS\hlds.exe
we will just add this line ( note ! leav a space between C:\HLDS\hlds.exe and the code)
Code:
-console -game cstrike +ip External IP +sv_lan 1 +maxplayers +map de_dust2 -nomaster

example of target:

C:\HLDS\hlds.exe -console -game cstrike +ip 69.69.123.231 +sv_lan 1 +maxplayers 22 +map

de_dust2 -nomaster

To start the server just double click the shortcut hlds.exe

This is the basic Dedicated Server with Admin Mod and StatME


IF ANY PROBLEM OCCUR .POST IT HERE .I WILL TRY TO SOLVE IT