Sunday, January 26, 2020
E-voting system
E-voting system CHAPTER 1: INTRODUCTION Introduction Motivation Objectives The aim of this project is to design an e-voting system that makes use of Java and Bluetooth technologies. The specific objectives of this project are: To create voting software that using Java 2 Micro Edition (J2ME) that can run on any mobile devices which will act as server and clients. To develop Java 2 Micro Edition (J2ME) based voting system that able to fully utilize the functionality of Bluetooth technologies by transferring data (voter database, voting records, etc.), between two mobile devices. To build a low cost and reliable client-server based voting system. Outline of Thesis The content of this thesis is organized according to the chapter. Chapter 1 is mainly about the brief introduction of the project done with some motivation and objectives. Chapter 2 is generally about the literature review of Java 2 Micro Edition (J2ME), Bluetooth and JSR-82 technologies, and also overview about the BVote itself. Next, Chapter 3 is about the methodology and details of the design whereas Chapter 4 is about the implementation of program through simulator and hardware devices since it is the output of the work done on Chapter 3. Chapter 5 is in relation to the presentation of data of the program with some program module hierarchy and classes used for Java programming. Then, Chapter 6 is concerning the discussion about the program outcome and its limitation. Finally, Chapter 7 is the final part of any reports or thesis which is the conclusion and some recommendations for future research. CHAPTER 2: LITERATURE REVIEW Overview of Java Micro Edition (Java ME) Introduction Java is a programming language originally developed by James Gosling at Sun Microsystems, which is now a subsidiary of Oracle Corporation. It was released in 1995 as a core component of Sun Microsystems Java platform. Java is general-purpose, concurrent, class-based, and object-oriented, and is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere. Recognizing that one size doesnt fit all, Sun has defined and supports four editions of Java aiming different application environments and segmented many of its APIs so that they belong to one of the platforms. The platforms are: Java Card aimed for smartcards. Java Platform, Micro Edition (Java ME) aimed at small and memory constrained devices by means of environments with limited resources. Java Platform, Standard Edition (Java SE) aimed at standard desktop and workstation environments. Java Platform, Enterprise Edition (Java EE) aimed at heavy duty server systems, large distributed enterprise or Internet environments. Java ME was formerly known as Java 2 Platform Micro Edition (J2ME), is a Java platform designed for mobile devices and embedded systems. Java ME technology was originally created in order to deal with the constraints associated with building applications for small devices with as little as 128KB of RAM and with processors a lot less powerful than those used on typical desktop and server machines. Thus, Sun defined the basics for Java ME technology to fit such a limited environment and make it possible to create Java applications running on small devices with limited memory, display and power capacity. There are three core concepts in the Java ME technology: Configuration provides the most basic set of libraries and virtual machine capabilities for a broad range of devices. Profile set of APIs that support a narrower range of devices. Optional package set of APIs in support of additional, common behaviours that dont really belong in one specific configuration or profile J2ME consists of a set of profiles. Each profile is defined for a particular type of device and consists of a minimum set of class libraries required for the particular type of device and a specification of a Java virtual machine required to support the device. A profile itself does not do anything; it just defines the specification. Since profiles are subsets of configurations, profiles are implemented with a configuration. Ultimately, Java ME platform has been divided into two base configurations which is Connected Device Configuration (CDC) and Connected Limited Device Configuration (CLDC). Java ME was designed to use profiles and configurations to enables devices of varying ability to able to run Java ME applications on the Kilobytes Virtual Machine (KVM), which is the micro version of Java Virtual Machine (JVM). Figure 1 illustrates how the CDC and the CLDC together make Java ME. The diagram also shows an overview of the components of Java ME architecture, and how it fits in the overall Java model. Configurations Configuration is a preliminary Java platform for devices with similar requirements with respect to total memory, processing speed, power and display constraints. Specifically, a configuration consists of Java language features, JVM features and a limited set of generalized APIs. Configurations are closely linked with JVM. In fact, configuration is a term identifying Java language features as a set of APIs and a specific JVM for that particular configuration. The dividing line as to what configuration applies to a device is for the most part, dependent on the memory, processing power, network connectivity and display constraints of a device. Connected Limited Device Configuration (CLDC). The Connected Limited Device Configuration (CLDC) is a fundamental part of the architecture of the Java ME that targeting resource-constraint devices like mobile phones. It is specifically designed to meet the needs for a Java platform to run on devices with limited memory, processing power and graphical capabilities. CLDC contains a strict subset of the Java-class libraries, and is the minimum amount needed for a Java virtual machine to operate. CLDC is basically used to classify myriad devices into a fixed configuration. When coupled with one or more profiles, the CLDC gives developers a solid Java platform for creating applications for consumer and embedded devices. CLDC is designed to bring the many advantages of the Java platform to network-connected devices that have limited processing power, memory, and graphical capability. Target devices typically have the following capabilities: A 16-bit or 32-bit processor with a clock speed of 16MHz or higher. At least 160 KB of non-volatile memory. At least 192 KB of total memory available for the Java platform. Low power consumption, often operating on battery power. Connectivity to some kind of network, often with a wireless, intermittent connection and limited bandwidth. On top of the different configurations Java ME platform also specifies a number of profiles defining a set of higher-level APIs that further define the application. A widely adopted example is to combine the CLDC with the Mobile Information Device Profile (MIDP) to provide a complete Java application environment for mobile phones and other devices with similar capabilities. Connected Device Configuration (CDC) CDC is a specification of a framework for Java ME applications describing the basic set of libraries and virtual-machine features that must be present in an implementation. The targets for CDC-based technology comprise a broad range of consumer and embedded devices like smart communicators, pagers, high-end personal digital assistants (PDAs), and set-top boxes. Within this range, CDC is the basis for several standard API bundles that address the needs of developers of applications for specific categories of devices. Devices that support CDC typically include a 32-bit microprocessor/controller and make about 2 MB of RAM and 2.5 MB of ROM available to the Java application environment. The CDC configuration was designed to bring the many advantages of the Java platform to a broad range of network-connected consumer and embedded devices. CDC versus CLDC The CLDC is different from, yet also a subset of the CDC. The two configurations are independent of each other, however, so they should not be used together to define a platform. The CLDC is a proper subset of the CDC. Neither the CLDC nor the CDC is a proper subset of the J2SE platform, however, because both of these configurations add new classes necessary to deliver services on their respective families of devices. Like the CDC, the CLDC specifies the level of support of the Java programming language required, the required functional support of a compliant Java VM, and the set of class libraries required. Figure 2 shows the relationship between the two configurations and the J2SE platform. Profiles Profiles are an extension of its underlying configuration. A profile simply is a set of APIs but unlike configurations, profiles are closer and specific to the target device capabilities. They are intended to include device specific APIs providing those functionality missing at configuration level such as user interface, persistence, etc. Profiles obtain the required foundation from configuration and hence are layered above configurations. Currently, there are a handful profiles available and a few more are being finalized. MIDP is a profile supported by CLDC while CDC support three different profiles namely the Foundation Profile (JSR 219), Personal Basis Profile (JSR 217) and Personal Profile (JSR 216). Foundation Profile (FP) Foundation Profile is the most basic of the CDC family of profiles. It is a skeleton upon which a developer can create a new profile. The FP APIs, together with CDC APIs provides a complete Java ME JRE for consumer electronics and embedded devices. It is a set of Java APIs tuned for low-footprint devices that have limited resources that do not need a graphical user interface system. It provides a complete Java ME application environment for consumer products and embedded devices but without a standards-based GUI system. Version 1.1.2 is specified in JSR 219 and implements a subset of Java SE 1.4.2, including a set of security-related optional packages, such as Java Authentication and Authorization Service (JAAS), Java Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE). The Mobile Information Device Profile (MIDP) The Mobile Information Device Profile (MIDP), combined with the Connected Limited Device Configuration (CLDC), is the Java runtime environment for todays mobile information devices such as phones and entry level PDAs. MIDP provides the core application functionality required by mobile applications including the user interface, network connectivity, local data storage, and application lifecycle management. Currently, there are three version of MIDP which are MIDP 1.0, MIDP 2.0 and MIDP 3.0. With the configuration and profiles, the actual application then resides, using the different available APIs in the profile. Following in the tradition of Java parlance, MIDP applications are called MIDlets. A MIDlet is a Java application that uses the MIDP profile and the CLDC configuration, created by a Java ME software developer, such as a game, a business application or other mobile features. These MIDlets can be written once and run on every available device conforming to the specifications for Java ME technology. The MIDlet can reside on a repository somewhere in the ecosystem and the end user can search for a specific type of application and having it downloaded over the air to another device. Kilobyte Virtual Machine (KVM) The Kilobyte virtual machine (KVM) is a virtual machine derived from the Java Virtual Machine (VM) specification. The VM that comes with the CLDC reference implementation is called the Kilobyte Virtual Machine (KVM) because it uses only a few kilobyte of runtime memory as opposed to megabyte. It is a reference implementation that adheres to the CLDC specifications description of a compliant VM. It is designed for small devices as it has a small memory footprint. It supports a subset of the features of the higher end JVM. For low-end, resource-limited products, Java ME and the KVM support minimal configurations of the Java virtual machine and Java APIs that capture just the essential capabilities of each type of device. KVM can be deployed flexibly to address a range of trade-offs between space and functionality. The KVM is engineered and specified to support the standardized, incremental deployment of the Java virtual machine features and the Java APIs included in the Java ME architecture. Overview of Bluetooth Technology Introduction Bluetooth is a proprietary open wireless communication protocol for exchanging data over short distances by using short length radio waves from fixed and mobile devices, creating personal area networks (PANs). The Bluetooth wireless connectivity technology was originally envisioned in 1994 by Ericsson as a way for mobile devices to communicate with each other at short ranges up to 30 feet, or 10 meters. While Bluetooth is positioned as a replacement for cable, infrared, and other connection media, it offers a variety of other services, and creates opportunities for new usage models. It can connect several devices, overcoming problems of synchronization and it works quietly, unconsciously, and automatically in the background. Bluetooth has client-server architecture. In client-server architecture, the one that initiates the connection is the client, and the one who receives the connection is the server. Bluetooth is a great protocol for wireless communication because its capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. In order for Bluetooth devices to communicate properly, they all need to conform to the Bluetooth specification. The Bluetooth specification, like any other specification, defines the standard that a Bluetooth device should adhere to, as well as rules that need to be enforced when communicating. The Bluetooth protocol stack and profiles together comprise the Bluetooth specification. Bluetooth Protocol Stack Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth Special Interest Group (SIG). Additional protocols have been adopted from other standards bodies. The Bluetooth stack is the software or firmware component that has direct access to the Bluetooth device. The Bluetooth protocol stack is split in two parts: a controller stack containing the timing critical radio interface, and a host stack dealing with high level data. It has control over things such as device settings, communication parameters, and power levels for the Bluetooth device. The stack itself consists of layers, and each layer of the stack has a specific task in the overall functionality of the Bluetooth device. Since Bluetooth device manufacturers are not required to use all of the layers in the stack, listed below are the overview of the core protocols and those adopted protocols that are widely used and implemented in almost every Bluetooth device: L2CAP: The Logical Link Controller and Adaptation Protocol used to send packets between host and client. This layer is the multiplexer of all data passing through the unit. It receives application data and adapts it to the Bluetooth format. Qualities of Service (QoS) parameters are exchanged at this layer. LMP: The Link Manager Protocol uses the links set up by the baseband to establish connections and manage piconets. Responsibilities of the LMP also include authentication and security services, and monitoring of service quality. SDP: The Service Discovery Protocol is used to find services on remote Bluetooth devices. HCI: The Host Controller Interface is the interface between the radio and the host computer. HCI is the dividing line between software and hardware. The HCI is the driver interface for the physical bus that connects these two components. RFCOMM: The Radio Frequency COMMunication is very easy and uncomplicated. Widely known as the virtual serial port protocol, it is used to stream simple data. OBEX: The Object Exchange communication protocol is used to exchange physical data such as files, images, and so on in binary format. Bluetooth Profiles Bluetooth profiles are intended to ensure interoperability among Bluetooth-enabled devices and applications from different manufacturers and vendors. A Bluetooth profile is a designed set of functionality for Bluetooth devices that defines the roles and capabilities for specific types of applications. If Bluetooth-enabled devices want to interact, having the bare minimum Bluetooth stack is not enough. It also needs to conform to a particular profile. Listed are some of the Bluetooth profiles: The Generic Access Profile defines connection procedures, device discovery, and link management. It also defines procedures related to use of different security models and common format requirements for parameters accessible on the user interface level. At a minimum all Bluetooth devices must support this profile. The Service Discovery Application and Profile defines the features and procedures for an application in a Bluetooth device to discover services registered in other Bluetooth devices, and retrieves information related to the services. The Serial Port Profile defines the requirements for Bluetooth devices that need to set up connections that emulate serial cables and use the RFCOMM protocol. The LAN Access Profile defines how Bluetooth devices can access the services of a LAN using PPP, and shows how PPP mechanisms can be used to form a network consisting of Bluetooth devices. The Synchronization Profile defines the application requirements for Bluetooth devices that need to synchronize data on two or more devices. Bluetooth Network Topology Bluetooth-enabled devices are organized in groups called piconets or also known as Personal Area Network (PAN). A piconet consists of one master and up to seven active slaves. The slaves in a piconet can only link to the master. Slaves cannot directly transmit data to one another. In fact, the master acts as a switch for the piconet and all traffic must pass through the master. A master and a single slave use point-to-point communication. If there are multiple slaves; point-to-multipoint communication is used. A master unit is the device that initiates the communication. A device in one piconet can communicate to another device in another piconet, forming a scatternet. A Bluetooth unit can be a slave in two or more piconets, but only one Bluetooth can be a master. Devices that participate in two or more piconets may act as gateways, forwarding traffic from one piconet to another.Notice that a master in one piconet may be a slave in another piconet: The basic concepts of any Bluetooth application consist of the following five components: Stack Initialization Device Management Device Discovery Service Discovery Communication Bluetooth vs. Infrared The major difference between the two methods of data transmission is that Bluetooth is based on radio technology (from 2.4GHz bands upwards), while Infrared utilizes invisible light in the 400 700nm wavelength. Infrared is fairly reliable and doesnt cost much to build into devices but it does have drawbacks: Its line-of-sight, so a sender must align with its receiver. Its one-to-one, so a device cant send to multiple receivers at the same time. Infrareds advantages are consequences of its disadvantages: Because its line-of-sight, interference is uncommon. Because its one-to-one, message delivery is reliable: each message sent goes to the intended recipient no matter how many infrared receivers are in the room. Bluetooth vs. 802.11b Both Bluetooth and IEEE 802.11b are wireless communication protocols and both operate in the 2.4GHz band, but they are designed to accomplish different goals. A major difference is that 802.11b was not designed for voice communications, while any Bluetooth connection can support both data and voice communications. The 802.11b protocol is designed to connect relatively large devices with lots of power and speed, such as desktops and laptops. Devices communicate at up to 11 Mbit/sec, at greater distances (up to 300 feet, or 100 meters). By contrast, Bluetooth is designed to connect small devices like PDAs, mobile phones, and peripherals at slower speeds (1 Mbit/sec), within a shorter range (30 feet, or 10 meters), which reduces power requirements. Overview of Java APIs for Bluetooth Technology (JSR-82) Java APIs for Bluetooth Wireless Technology Bluetooth is an important emerging standard for wireless integration of small devices. The specification standardizes a set of Java APIs to allow Java-enabled devices to integrate into a Bluetooth environment. Previously, there has been no standardized way to develop Bluetooth applications until JSR 82 came into play JSR-82 is a standard defined by the Java Community Process for providing a standard to develop Bluetooth applications using the Java programming language. It is the first open and non-proprietary standard for developing Bluetooth applications. The JSR-82 API hides the complexity of the Bluetooth protocol stack behind a set of Java APIs that allow to focus on application development rather than the low-level details of Bluetooth, by exposing a simple set of Java APIs. JSR 82 is based on version 1.1 of the Bluetooth Specification. JSR 82 consists of two optional packages: the core Bluetooth API and the Object Exchange (OBEX) API. The latter is transport-independent and can be used without the former. The Java APIs for Bluetooth do not implement the Bluetooth specification, but rather provide a set of APIs to access and control a Bluetooth-enabled device. JSR 82 concerns itself primarily with providing Bluetooth capabilities to J2ME-enabled devices. Java APIs described in the JSR-82 interface for following Bluetooth Protocols/Profiles: SDAP Service Discovery Application Profile RFCOMM Serial Cable Emulation Protocol L2CAP Logical Link Control and Adaptation Protocol GOEP Generic Object Exchange (OBEX) Profile The API Architecture The goal of the specification was to define an open, non-proprietary standard API that can be used by all J2ME-enabled devices. Therefore, it was designed using standard J2ME APIs and CLDC/MIDPs Generic Connection Framework. JSR 82 requires that the Bluetooth stack underlying a JSR 82 implementation be qualified for the Generic Access Profile, the Service Discovery Application Profile, and the Serial Port Profile. The stack must also provide access to its Service Discovery Protocol, and to the RFCOMM and L2CAP layers. The APIs are designed in such a way that developers can use the Java programming language to build new Bluetooth profiles on top of this API as long as the core layer specification does not change. JSR 82 includes APIs for OBEX and L2CAP so that future Bluetooth profiles can be implemented in Java, and these are already being used for that purpose. Figure 4 shows where the APIs defined in this specification fit in CLDC/MIDP architecture. Capabilities of JSR-82 These are the properties and capabilities of JSR-82 in a nutshell. The JSR-82 API is intended to provide the following capabilities options: Manage the Local Bluetooth Device settings. Discover other Bluetooth devices in the neighbourhood. Search for Bluetooth services on the discovered Bluetooth devices. Connect to any of those Bluetooth services and communicate with it. Register a Bluetooth service on the Local Bluetooth Device, so that other Bluetooth devices can connect to it. Establish RFCOMM, L2CAP, and OBEX connections between devices Manage and control the communication connections. Provide the security to all of the above options. Reasons on Using Java Platform Micro Edition (Java ME) Java ME has significant advantages over other languages and environments that make it suitable for Bluetooth Voting System (BVote). The advantages of Java are as follows: Most of mobile devices nowadays are compatible and supports Java ME application development. Java ME has a particularly high market penetration. According to Morales and Nelson, approximately 68% of mobile phones are Java ME capable, which equates to more than 350 million Java ME capable mobile devices worldwide. Java ME is an open source and free. There are no licensing expenses needed for the SDK. Java ME is platform-independent. Java has the ability to move easily from one computer system to another.Java is a platform-independent at both the source and binary levels. It can run on any operating system without modification Simplicity and ease-of-use. Java was designed to be easy to use and is therefore easy to write, compile, debug, and learn than other programming languages. Java uses automatic memory allocation and garbage collection. In addition, the I/O and network library is very easy to use. Java ME is robust. Java compilers are able to detect many problems that would first show up during execution time in other languages. Java ME is interpreted. An interpreter is needed in order to run Java programs. With Java, the program need only be compiled once, and the bytecode generated by the Java compiler can run on any platform. Reasons on Using Bluetooth Technology There are various reasons to use a Bluetooth technology. These reasons are mainly based on the advantages of the Bluetooth technology itself that it offers to users. Availability of Bluetooth connectivity wireless technology in mobile devices. Bluetooth has already become a standard inclusion and important feature on most mobile phones nowadays. No cost per transmission. As an alternative for the current Short Message Services (SMS) that would be charge per transmission, Bluetooth cost no charge for its communication. Low energy consumption as Bluetooth uses low power signals. Thus, the technology requires little energy and hence uses less battery or electrical power. Standardize technology. Since Bluetooth is a standardized wireless specification, a high level of compatibility among devices is guaranteed. In addition, Bluetooth is a universal, world-wide, wireless standard. Ability to keep information private. In order to make a transfer or allow someone to access the files in the phone, it will need to give the access by accepting or rejecting the request through the phone. Therefore, authentication will prevent unauthorized access to important data and make it very difficult to listen in. Signals are omni-directional and can pass through walls. Communicating devices do not need to be aligned and do not need an unobstructed line of sight. Besides, Bluetooth uses frequency hopping. Its spread spectrum approach greatly reduces the risk that communications will be intercepted. Overview on Bluetooth Voting System (BVote) The name of this project is BVote. BVote is being developed using Java 2 Micro Edition (J2ME) programming language in order to create an open source, freely available and platform-independent mobile voting platform with basic connectivity options to expedite the process of data transfer and multi-user collaboration. It consists of two parts which are server and client. The server is the one that become the administrator. The administrator is responsible to manage all the registration of the voters and set the question(s) of the voting. As for the client, it can only log in the voting system as a voter and vote for the question that is being sent. In order to create such a program like BVote, it must meet some basic requirements before the application can be run. Firstly, as BVote is being developed using J2ME, therefore both server and client must use mobile devices as their platform. In addition, both server and client must be able to communicate with each other through Bluetooth technology. Last but not least, since BVote is voting system application software, BVote must accept processing, storing, and updating functions especially for the server part. Research on E-Voting System http://en.wikipedia.org/wiki/Electronic_voting http://en.wikipedia.org/wiki/Electronic_voting_examples http://en.wikipedia.org/wiki/Indian_voting_machines http://www.topbits.com/e-voting.html http://www.howstuffworks.com/e-voting.htm http://avirubin.com/vote/analysis/ CHAPTER 3: DESIGN METHODLOGY AND DETAILS This chapter addressed issues that arise when implementing and using the Java APIs for Bluetooth Wireless Technology and designing the software application using Java 2 Micro Edition (J2ME). Lastly, this section discusses issues on the hardware and technology that involved on the implementation and development of Bluetooth Voting System. Hardware Mobile Phone Mobile phone is acting as the main hardware for Bluetooth Voting System, both for server and client part. Nowadays, a mobile phone in market is growing up rapidly with respectively to mobile technology. The fast growing of the mobile technology has benefited and improved the quality of life. In addition, the Bluetooth technology has become the main features in all the latest product of mobile devices available on market. With this specification, the objective to develop a low cost system has been met. As this project make the most of the Bluetooth as a connection medium for voting process, mobile phone has been fully utilized due to its ability in supporting Bluetooth. PC or Laptop In the development work, PC has been used as a workstation for programming and simulation process. For the simulation purpose, it had been perform in PC by using Java IDE and mobile phone emulator generated by Sun Wireless Toolkits. After the simulation work is done, a .jar executable file will be installing in mobile phones for real time hardware testing. Software and Development Toolkit The following software will be used: J2SDK1.5.0 Eclipse 3.0.1: one of the best Java IDE ðŸËâ° J2ME Wireless toolkit 2.2 EclipseME 0.7: Eclipse plugin to help develop J2ME code ProGuard 2.1: class file shrinker and obfuscator. Wireless Toolkit 2.5.2 The Sun Java Wireless Toolkit for CLDC (formerly known as Java 2 Platfo
Saturday, January 18, 2020
Shakira on Philantrophy
Maybe most of you known Shakira as one of the greatest Latin American singer ever but most of you may not know her as an activist. BAREFOOT FOUNDATION In 1997 at the young age of 20, Shakira founded the ââ¬Å"Pies Descalzosâ⬠(ââ¬Å"Barefootâ⬠) foundation, after the great success of her record ââ¬Å"Pies Descalzosâ⬠, in order to help Colombian poor children not only to get an appropriated education, but to be healthy and nourished. She says that the children are the future of every country, especially in Latin America, so we should give them all the tools they need to succeed in life.On 2003 Shakira and the ex Chancellor and ex education Minister Maria Emma Mejia started to work together and Maria assume the Executive President of the Barefoot Foundation. The Foundation moved from Barranquilla to Bogota and began working on a massive program of nutrition for children from disadvantaged areas and displaced communities in Colombia On 2004 the foundation began the cons truction of the first educational institution which provided attention to 1565 children; also they opened offices on Quibdo. Now they give psychosocial help.On 2006 it was made the ââ¬ËFirst Strategic Plan 2006 ââ¬â 2008', whose main goal is the comprehensive care of children on vulnerable areas or displacement areas. They made the educational intervention strategy stronger which care about of 3,072 children and young people. Also it strengthens the comprehensive model of community development center, taking care to 10,500 people around. Because this foundation not only care about children but care about their families since they're the people that spend more time with them and so if they're fine, the children would be too.That year, 52 000 people donated money, which raised $15 000. The second building of School District Las Americas is constructed in Barranquilla, with the support of European foundations. Om 2008 it elaborates the ââ¬ËII Strategic Plan for the triennium 2009 ââ¬â 2011', whose mission is to implement a model of quality public and private assistance support. So far the Barefoot Foundation has built 4 schools on 3 different cities of Colombia that are: Barranquilla, Quibdo, and Altos de Cazuca.Their new challenge is to build schools in Cartagena also implement a project which is concern about the people there and the environment. BARRANQUILLA * Educational Institute of the Americas The Barefoot Foundation began its work there in 2004 and through several programs now helps 680 children, young people, and their community * Educational Institution Barefoot Foundation- Township La Playa This Public School, was built and opened in 2009 and now helps 1469 children, youth and the community there. QuibdoEducational Institution Barefoot Maria Berchmans The Barefoot Foundation began its work in 2004 and through several projects now helps 1225 children, young people and people of the area. There they help displaced families from the tragedy of Bojaya. Altos de Cazuca Gabriel Garcia Marquez Educational Institution Located in the commune of 4 de Altos de Cazuca in Soacha, where most of the victims of displacement and high levels of poverty are settled , from Boyaca, Santander, Cundinamarca, Tolima, Huila, the Pacific Coast and the Eastern Plains.The Barefoot Foundation supports this Public School since 2005 and through various educational projects now serves 1340 children and young people and 814 families in the sector THE LAST SCHOOL WAS BUILT THANKS TO CONTRIBUTIONS BY DONORS LIKE SHAKIRA, THROUGH PROCEEDS FROM HER 2006 BARRANQUILLA CONCERT, AND CONTRIBUTORS LIKE THE HOWARD BUFFET FOUNDATION, THE GERMAN TELEVISION NETWORK RTLTV, THE CITY OF MADRID, HARD ROCK CAFE AND SEAT. Pies Descalzos Programs If I eat well, I will learn morePies Descalzos Foundation believes that if children are hungry, not nourished or unhealthy they canââ¬â¢t pay attention in class and they feel weak or lazy, so the foundation have this progra m in order to reduce malnutrition and encourages a healthy life so the kids improve their learning If I learn more, I can be more Good spaces for children to be educated are important since they feel comfortable, thatââ¬â¢s why Pies Descalzos has implement with great equipment on its schools so children are able to have the tools they need to have a quality educationIf I smile more, I can achieve more Bad experiences can give children terrible traumas. Through this program Pies Descalzos help children who have been victims of violence, not just to overcome a trauma but also to help them adjusting to the school setting. So they use art, music and any kind of assistance like psychological to support them and their families Family income Most of the children Pies Descalzos help have to work because they are alone and they need to survive or just because their parents havenââ¬â¢t enough money to maintain the family.Thatââ¬â¢s why this program is very important, since Pies Desca lzos provides economic opportunities for the families, so the children donââ¬â¢t work anymore and go to school. This program helps build projects that benefit children and their families. Sponsor a Child You can be a monthly sponsor of a kid, called a ââ¬Å"Godparentâ⬠so you can help a Colombian child receive an education, uniforms, books, nutritious food, recreational activities and homework support while also letting him or her know that they matter. UNICEF After being working for 5 years on her barefoot foundation, Shakira was named goodwill ambassador for UNICEF
Friday, January 10, 2020
King Edward Viii
King Edward VIII was born on the 23 June 1894 ââ¬â 28 May 1972. Edward Reigned as King of the United Kingdom, Ireland and the other British Dominions, and as Emperor of India from 20 January 1936 until his abdication on 11 December 1936 . He was the last monarch to serve his entire reign as Emperor of India. His official title during his reign was Edward the Eighth, by the Grace of God, of Great Britain, Ireland and the British Dominions beyond the Seas, King, Defender of the Faith, Emperor of India.Later, as Duke of Windsor during World War II, he held the office of Governor and Commander-in-Chief of The Bahamas. No other British monarch has voluntarily relinquished the throne, though several have been ââ¬Å"deemed to have abdicatedâ⬠after fleeing, have suffered execution, or have given up part of their power.. Edward VIII was born at Richmond, the eldest son of Their Royal Highnesses The Duke and Duchess of York. The Duke of York, who later became King George V, was the second son of Albert Edward, Prince of Wales.The Duchess of York, formerly Her Serene Highness Princess Mary of Teck, was a great-granddaughter of King George III and a first cousin once removed of Queen Victoria. At the time of his birth, the child stood third in line to the British throne behind his father and grandfather. Edwards immediate family always knew him as David. His father ascended the throne on 6 May 1910. The new king created him Prince of Wales and Earl of Chester on 2 June 1910 and officially invested him as such in a special ceremony at Caernarfon Castle in 1911. For the first time since the middle Ages, this investiture took place in Wales. When World War I broke out, David had reached the minimum age for active service and expressed keenness to participate. Although the authorities allowed him to join the army, they kept him well away from any action that might have threatened his safety. After the war ended in 1918, his conduct began to give cause for concern to his ultra-conservative parents, particularly when he enjoyed relationships with a series of married women, including Americans Freda Dudley Ward and Wallis Simpson.Simpson had divorced her first husband in 1927 and subsequently married Ernest Simpson, an Anglo-American businessman. Mrs. Simpson and the Prince of Wales became lovers. Powerful figures deemed marriage to Mrs Simpson impossible for the king, even after she obtained her second divorce, because he had become de jure head of the Church of England, which prohibited remarriage after divorce. Edward rejected several alternative proposed solutions, including a morganatic marriage: he maintained adamantly that he wished to marry Mrs.Simpson, and he eventually abdicated his throne on December 11, 1936. State papers released in 2003 revealed that during the abdication crisis, as well as King Edward, Mrs. Simpson reportedly had two other lovers, one a car salesman, the other Edward FitzGerald, 7th Duke of Leinster, a close friend of the King. The abdication crisis caused a constitutional upheaval, and the throne passed to the Heir Presumptive, the King's next oldest brother, Prince Albert, Duke of York, who became King George VI of the United Kingdom.On March 8, 1937, George VI created his brother, the former king, Duke of Windsor (the title lapsed with the Duke's death). However, letters patent dated May 27, 1937, which reconferred upon the Duke of Windsor the ââ¬Å"title, style, or attribute of Royal Highness,â⬠specifically stated that ââ¬Å"his wife and descendants, if any, shall not hold said title or attribute. â⬠Edward was actually granted the title Duke of Windsor on December 12, 1936 the day after his abdication.The Duke mentions in his book, A King's Story, that it was the first act of George VI's reign, and it was proclaimed at the new King's Accession Privy Council that his brother would be known as ââ¬Å"His Royal Highness the Duke of Windsorâ⬠and that he had recreated him a Knight of the Garter. However, the formal letters patent were not signed until March 8, 1937. The Duke of Windsor married Mrs. Simpson in a private ceremony on 3 June 1937 at Chateau de Cande, Monts, France. None of the British royal family attended.The denial of the style ââ¬Å"HRHâ⬠to the Duchess of Windsor, as well as the financial settlement, strained relations between the Duke of Windsor and the rest of the royal family for decades. The Duke had assumed that he would settle in Britain after a year or two of exile in France. However, King George VI (with the support of his mother Queen Mary and his wife Queen Elizabeth) threatened to cut off his allowance if he returned to Britain without an invitation. In 1937, the Duke and Duchess visited Germany as personal guests of Adolf Hitler, a visit much publicized by the Nazi media.The couple then settled in France. When the Germans invaded the north of France in May 1940, the Windsors fled south, first to Biarritz, then in Jun e to Spain. In July the pair moved to Lisbon, Portugal, where they lived at first in the home of a banker with close German Embassy contacts. The British Foreign Office strenuously objected when the pair planned to sail around aimlessly on a yacht belonging to a Swedish magnate, Axel Wenner-Gren, whom American intelligence considered to be a close friend of Hermann Goering, Hitler's lieutenant.A ââ¬Å"defeatistâ⬠interview with the Duke that received wide distribution may have served as the last straw for the British government: in August a British warship dispatched the pair to the Bahamas, where the Duke of Windsor became Governor, a post he held until after the end of World War II in 1945. Then the couple retired once again to France, where they spent much of the remainder of their lives. In recent years, some have suggested that the Duke and (especially) the Duchess sympathised with Fascism before and during World War II, and had to remain in the Bahamas to minimize their opportunities to act on those feelings.These revised assessments of his career hinge on some wartime information released in 1996, and on further secret files released by the U. K. government in 2003. The files had remained closed for decades, as Whitehall judged that they would cause the Queen Mother substantial distress if released during her lifetime. US naval intelligence documents a confidential report of a conference of German foreign officials in October 1941 that found the Duke ââ¬Å"no enemy to Germanyâ⬠and the only English representative with whom Hitler would negotiate any peace terms, ââ¬Å"the logical director of England's destiny after the warâ⬠.President Roosevelt had ordered covert surveillance of the Duke and Duchess when they visited Palm Beach, Florida, in April 1941. The former Duke of Wurttemberg (then a monk in an American monastery) convinced the FBI that the Duchess had been sleeping with the German ambassador in London, Joachim von Ribbentrop, h ad remained in constant contact with him, and continued to leak secrets. In later years, the Duke of Windsor met with other members of the royal family on several occasions, but his wife never gained acceptance.He died in 1972 at Paris, and his body was returned to Britain for burial at Frogmore, near Windsor Castle. The Duchess of Windsor, on her death ten and a half years later, was buried alongside her husband in Frogmore. They had no children. Through the years of Edwardsââ¬â¢s life his titles varied changing approximately ten times he was called everything from His Highness Prince Edward of York to His Majesty King Edward VIII And everything in-between.
Thursday, January 2, 2020
The Christmas Tree Essay - 558 Words
The Christmas Tree nbsp; Tightly squashed like sardines my family and I travel back to my childhood in thirty simple minutes. The sunshine tickles my eyelids through the salt- stained window. Bing Crosby chimes in his monotone voice singing, Im Dreaming of a White Christmas, setting the mood. His voice is like a familiar calling that Christmas is near. nbsp; Bundled in our scratchy layers of insulation reminds me of deep sea diving. Pine sap and burning wood greet my nose, as we reach our destination. Hand-in-hand and piggy back rides for the younger kids fails to contain their instinctual excitement. Squirming to the sample trees we always argue over a white pine or a spruce, and we always end up with the sameâ⬠¦show more contentâ⬠¦I have yet to win in my 17 years, but I can feel that this is my year! We run around marking possible candidates to set in our living room with sacrificing our own warmth with garments from our own bodies. A scarf here, a glove there. Finally, like a lieutenant checking cleanliness we critique the trees with high standards. No, this one is too bare in the front. This is too yellow. No, not quite tall enough! My sister yelps like a puppy with her balled up fists raised in triumph. I reach out and touch the soft bristly needles of the white pine. This, here, is the Christmas symbol of joy. T he best sensation known to kid-dom is smelling the sweet yet bitter sharpness of pine sap. The thick syrupy consistence of the translucent sap coats my black mittens. nbsp; Trudging back with our coniferous prize the girls race to the old, golden school bus /which is a sauna in itself, while my dad waits in line to bind the trees extended limbs. Back at the barn, our tree is lined up against the rusty red, warped paint that chips off like confetti when you press against it. Entering the barn, the warmth swallows me whole as I searched for my family in the crowded interior. Distributing the hot cocoa, hot cider, powdered doughnuts and hotdogs we tap our toes and sing along to the live music man and band who has sung Christmas songs since the beginning of this tradition. Sipping my hot chocolate, I can feel theShow MoreRelatedSummary : Christmas Tree 1171 Words à |à 5 PagesEveryone sees different symbols when they think of Christmas.(GS1) A Christmas tree is a huge part of Christmas, it is decorated and the presents are set under it for Christmas day.(GS2) Snowflakes are a trail of pureness left by God to notice all the little things. (GS3) Santa is one of the first things that kids today think of when they hear the word Christmas. (Thesis statement) For Christmas there are many different symbols, (I) the Christmas t ree is what the family takes part in with their ownRead MoreChristmas Tree Essay1481 Words à |à 6 PagesChristmas tree ââ¬Å"Wake up, wake up! Today is Christmas day.â⬠said new T-200 home robot. ââ¬Å"Today is december 25, sunny day, it is perfect weather to.....â⬠the robot said with female human voice. But no one responded. Suddenly, a little boy with blue pajamas got up straightly, unlike the lazy face he had yesterday, his eyes were full of energy, just like a blue crystal dazzling in the dimmed room. He got up immediately without wearing his shoes, he rushed out of his room, he opened hisRead MoreGetting Up The Christmas Tree981 Words à |à 4 Pagescoupons to go Christmas shopping when I ran across a flyer from a craft store advertising pre-lit Christmas trees for 50% off the regular price. It sounded like a pretty good deal to me, in more ways than one. Unfortunately, putting up the Christmas tree has never been a joyful experience in our family. When the boys were young, we tromped through the woods to cut the obligatory Charlie Brown spindly pine or the lopsided cedar tree. When it came to paying for a live Christmas tree, my husband quicklyRead MoreThe Christmas Tree By Henrik Ibsen981 Words à |à 4 PagesThe most magical time of the year is Christmas; where friends and family gather around to celebrate the birth of Christ, exchange gifts and love. The Christmas tree itself is a symbolic figure that brings Christmas together. During the time of ââ¬Ë1879ââ¬â¢ was conceived a revolution of a new modern perspective and created a realist drama in modern homes (local history). Whereas Nora lived and breathed to make Torvald happy because in the time, European men were the dominate ones and women basically conformRead MoreDescriptive Essay About A Christmas Tree735 Words à |à 3 Pagesheight, and perfect color. I have hear d so many great things about the holiday! The food, the presents, the love towards others, but most importantly the birth of our savior, Jesus. I hope this family chooses me to be there new Christmas tree! ââ¬Å"How much will the Christmas tree on the left be,â⬠Asked the families father. Next thing I know I am getting hauled off towards a big machine like thing and then unexpectedly I am inside of a red and green net. The son and father carry me gently to the top ofRead MoreThe Christmas Tree Industry Of Ashe County730 Words à |à 3 PagesThe Christmas tree industry of Ashe County is the leading industry of the mountain region of North Carolina. The attraction of tourists is a positive benefit for Ashe County, and has increased substantially, because tourism brings in money for public funding for services that we would not normally be able to do, as well as employment for those to maintain hotels and restaurants for those who visit our county. Although the county benefits from added revenue and employment, there are also disadvantagesRead MoreOriginal Writing Of A Christmas Tree Farm On The Outskirts Of Town1274 Words à |à 6 Pagesevening, we had cocoa from Starbucks and went shopping for a Christmas tree. After finding a Christmas tree farm on the outskirts of town, we selected a tree that would fit our home best. Since we didnââ¬â¢t have a truck, we paid the owner of the lot to deliver our tree. He followed us as we drove home. I didnââ¬â¢t realize that the tree was so big until it was positioned in the corner of the living room. It was a good thing we didnââ¬â¢t pick a bigger tree because it would not have fit without trimming it and nobodyRead MoreWhen she was younger, they would decorate the Christmas tree together. There would be Christmas700 Words à |à 3 PagesWhen she was younger, they would decorate the Christmas tree together. There would be Christmas music playing and cups of warm apple cider. They would argue laughingly over whose topper got put on the tree. Once all the ornaments had been hung and before the tissue paper and boxes had been put away, they would sit on the floor around the tree with all of the lights off, just the strands of white bulbs lighting the space. Gradually, as the years passed, hanging the ornaments became less and lessRead MoreChristmas Tree817 Words à |à 4 Pagescommemorate the Christmas season, a significant religious holiday. Beyond a doubt, my favorite holiday is Christmas. During this festive season, I love the fact that everyone is guaranteed to hear festive carols. Also, it is one time of year when people are searching for the perfect gifts to give their loved ones because it is a season when giving is more important than receiving. Mostly, I cant think of anything more exciting than the idea of the entire family decorating a Christmas Tree and wrappingRead MoreChristmas Tree Analysis1402 Words à |à 6 Pagesthe Christmas tree parallels with Noraââ¬â¢s development, her mental state, and position in the household. The tree can be recognized as an object placed in a house to please the eyes and adds beauty to a home. Torvald objectifies Nora, seeing her as a plaything carrying no purpose other than to look at and be pretty. As the play continues and Nora develops into a mature character and becomes aware of her repression, the Christmas Tree begins to visibly deteriorate and wither. The Christmas tree emphasizes
Subscribe to:
Comments (Atom)