Wednesday, July 31, 2019

Ece Project

SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics andCommunication Engineering, Communication Engineering, Park College of Engineering Park College of En gineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy.Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader.A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology.For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identifica tion (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver).The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVEThe aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach.SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through co mmunication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action.The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used.Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger prin t impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTSMODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use.Vi sual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations.Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems , without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers.FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detai led reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes.Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocess or or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident.Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorize d access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the a bove criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition.Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR T he Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communicat ion at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePerip heral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for relia ble operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending a nd receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there w ill be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the op erating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positi ve half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology i t has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TE KHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software req uirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database wher e information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Data base server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the sy stem along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactic ally similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickly develop and deploy complex applicatio ns: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DE SCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to an d read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs).A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember t hat not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behav ioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present consi dered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated rad ios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions t o learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePeripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A /D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communic ate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion a nd will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive reg ulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gatherin g information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. I NTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so tha t there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTIN G SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added . In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interfa ce about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m

Tuesday, July 30, 2019

‘Journal on Gryphon” by Charles Baxter Essay

The short story Gryphon by Charles Baxter has an unusual character, a new substitute teacher at the rural community of Five Oaks in Michigan. The students meet with the strange lady who brings them strange yet fascinating lectures. Miss Ferenczi could be an exceptional teacher in a suitable environment, with her willingness to break the boundary in teaching method, her lectures on new materials never presented in textbooks, and her influence to help the students explore new things. I wonder if there would be any teacher daring enough to tell the class â€Å"six times eleven could be sixty eight.† Miss Ferenczi accepts the normal mathematical answer, but she also provides a different view and solution to the math problem, because â€Å"it’s more interesting that way.† When the narrator boy could not spell â€Å"balcony† she whispered to him; that the word is ugly and if he does not like a word, he does not have to use it. The students who have the wrong answer and the wrong spelling would always remember the right answers that way; moreover they do not feel ashamed of their wrong reply. They feel better when they are accepted and gently guided toward the right knowledge. Miss Ferenczi hates the way teachers are supposed to follow the rules, timeline, and the material presented readily in textbooks. When she told the children to open the book she herself â€Å"was staring at some object just outside the window.† She refuses to have lunch with other teachers since she wants to stay close with her students. Miss Ferenczi feels comfortable only when she can teach in her own way, not to be directed by any rules or any inflexible method or limit, which makes the students less distracted at the same boring way they have always been taught. The new substitute teacher appeared in the class surprising the students as much as her strange stories. The kids have never heard of the Antipode stone that would blind people, the Hope diamond, or the plant that can eat meat. The things they get to learn in textbooks are boring numbers and parched tiresome text. Miss Ferenczi knows the kids will love her stories, as she exposes them to amazing facts. Whether true, mythic or untrue, the information she provides is wide outside the schoolbook. They are the historical, cultural, social, and scientific lessons of the world that her students have never been told. The knowledge she gives the members of the  class is not only taken from what the school requires, but everything worthwhile to inform them about the universe. Her outstanding, broad collection of matters in different fields reveals a brand new world to the students. Children at fourth grade normally would blow their nose into notebook paper when there is nobody around, sit in class just to watch the teacher’s actions, and go home to play. It is amazing how Miss Ferenczi captures the kids’ interest, make them focus to a point that â€Å"no one even went to the bathroom.† With their old teacher Mr. Hibler, the students would chatter and whisper during the lecture, but with Miss Ferenczi they sit still and are fascinated with her lecturing. They are astounded at a plant that can kill animals, they are eager to discuss whether a half bird and half lion monster is real. They go home excitedly and dig up the dictionary to find out and feel â€Å"fabulous† to discover a new myth. She creates an â€Å"information hunger† in the children to explore, to discover new things that most teachers can hardly ever do. Since Miss Ferenczi’s appearance, the students have changed their view. She brings a fresh perspective of life, a strange way to present her lecture, and makes the students eager to go to class. It is because of her that after she got fired, during the lecture, the students pay close attention to the insects unlike they had ever done before. Miss Ferenczi accomplishes what all teachers are supposed to achieve, she is the most wonderful teacher every kid dreams to have. Works Cited Baxter, Charles. Gryphon.1985. Rpt. in Compact Literature ReadingReacting Writing. By Kirszner and Mandell. 6th ed. 2007. â€Å"Gryphon: Often Asked Questions.† Rev. of Gryphon, by Charles Baxter. CharlesBaxter. 3 June 2009 .

Monday, July 29, 2019

Application of 2D gas chromatography for environmental analysis

All these benefits make GC?GC in the toxic compounds involved in the determination of trace level environmental analysis of a very good tool in complex matrices. This paper summarizes some of the environmental analysis and review and monitoring of the GC?GC applications Introduction Many years of humans society development led to many of the world distribution of chemicals in the atmosphere, the Earth’s surface and land border. Many of these compounds are harmful to the world’s ecosystems and the people. Analysis of these compounds in the environment is important. When analytes have high vapor pressure, gas chromatography is the selection method. The main problem in the environmental analysis is to analyze the existence of material is usually very complex matrix trace. Result, a huge research work into the analysis of major environmental pollutants [1]. Methods used in environmental analysis is usually the same as in all aspects of practice. It includes sampling, sample preparation, separation and detection. All of these steps may benefit from change, it is usually the biggest limitations imposed by the separation step. In gas chromatography (GC) cases, the majority of environmental samples containing analyte and matrix components of many closely eluting peaks in a chromatographic dimension (1D) the maximum total capacity is greatly exceeded, and many coelutions and unresolved in the separation region was observed. This led to the analyte of interest and quantify the poor separation [1]. Poor resolution in the chromatographic analysis of sample preparation and detection of high demand for equipment placement. Expensive and labor-intensive sample preparation, and solvent waste may cause a lot of harmful to the environment. By microextraction method development, such as liquid-liquid microextraction (LLME) and solid phase microextraction (SPME) and non-dissolved sample introduction system (ie, direct thermal desorption), has the potential to greatly simplify the sample preparation process, without sacrificing sensitivity and selectivity [2-5]. On investigation, lack of resolution often means using mass spectrometry (MS), including high-resolution mass spectrometry (HRMS), in some cases, is necessary. Figure 1 illustrates the GC-MS encountered in the common problems [36]. In the analysis of food extracts commonly 1D-GC clinch with insecticides (Fig. 1b), trace interest (in this case chlorfenvinphos) coelute analyte and sample matrix is more abundant components. Results obtained for such compounds, mass spectrometry (Figure 1e) frequently contains compounds derived from fragments of interference, leading to poor matching and library mass spectrometry (Fig. 1d). MS overlap algorithm may greatly improve the quality of the information of coeluting peak, but they are not always successful, when the number of coelutions is high. Figure 1a shows, full 2D-GC (GC?GC) to increase space and improve the chromatographic separation of the resolution, resulting in the separation of analytes of interest (chlorfenvinphos) from coeluting compounds and matrix components. Result, improved the quality of the analyte mass (Fig. 1c), taking into account the proof of a more confident analysis of material (Figure 1d). It is possible that some coelutions exist; these may often solve efficiently overlap with the MS, leading to better results, while reducing the number of components when the coeluting. GC?GC separation with the increased power resulting in a successful demo nstration and quantification of analytes. Fig. 1 GC?GC–TOF MS versus 1D-GC–TOF MS for the analysis of a carrot extract. The highest-capacity problem in terms of conventional gas chromatography through multi-dimensional gas chromatography to cope (MDGC) implementation. In this method, one-dimensional (1D) chromatogram of a complex and unresolved part is subjected to the stationary phase coated with a second column separation of the other selectivity [1]. Although this method increases the 1D chromatographic part of the choice of chromatographic resolutions, this method with automation challenging, and only a few sample components can be adequately addressed. However, the many applications is good for the PCBs, pesticides and toxaphene analysis, among other things, the report with different degrees of success [6-12]. Overall, however, is the exact number of separation will be beneficial, if the entire sample is subjected to a separation in two dimensions. This became possible a comprehensive two-dimensional gas chromatography (GC?GC) in the introduction. Principle for Two-Dimensional Gas Chromatography (GC?GC) 2D-GC is a comprehensive method of fundamental solution to meet the highest capacity. A typical structure of GC?GC set in Figure 2. The basic structure of GC?GC using virtually is the same as the composition of 1D-GC. These include syringes, oven, columns and detectors. In a typical GC?GC system, using non-polar stationary phase coated with a thick coating of a long column was installed as the main column. The exports through a special interface or modem is connected to the entrance of the second dimension column coated with stationary phase of another selectivity. Modulator connected not only to primary and secondary column; its main role is repeated trapping of the effluent fractions from the first dimension and periodic injection of them to the form of narrow pulses separated into further chromatographic analysis. Because the operation of 2D-GC in the fast condition, the detector in the GC?GC selection is limited to those capable of fast data collection rate. For example, GC?GC de tector can include flame ionization detector (FID), electron capture detector (ECD), single atomic emission detector (AED), sulfur compounds optical detector (SCD), nitrogen photodetector compounds (NCD) and time of flight mass spectrometer (TOF MS). Fig. 2 A block diagram of a GC?GC system. Modulator is the important part of the instrument, because it guarantees the separation is comprehensive and multidimensional [13]. In 1991, the first implementation of the GC?GC, the field has witnessed a number of modulator design [14]. Initially, the use of thermal adjustment of the heat modulator was implemented; however, the modular cryogenic liquid (liquid carbon dioxide or nitrogen) is currently the main use. Modulator at low temperatures within the system, each design has its own distinct advantages and limitations, making it suitable for analysis of the specific type. For example, the analysis of water pollutants has been developed an interface [19], when the buildings, and an in-house applications modulator in the quantitative analysis of PAHs and PCBs has been described [15]. Then, the modulator of the different types of analyte in the analysis of organohalogenated been evaluated [16]. The implementation of GC?GC provides the following advantage to surpass the 1D separation method: improvement separation strength; improved sensitivities; and constructs or highly predetermined, stratography spectrum. In the environment analysis, GC?GC has the potential to improve the toxic compound through the separation from the coeluting analysis and the matrix component, increases the detection limit such chemical product and provides the ideal for the surveillance application the two-dimensional stratography spectrum which constructs. Finally, this possibly causes to reduce to the smallest sample preparation procedure, and reduces analysis time. Other applications are also possible. For example, recently, GC?GC the product estimate which divided into for the diesel oil hydrocarbon environment had used, was important affected many ecosystems [17] the oil leak. Application of GC?GC in Environmental Analysis Water and Sediment Analysis The water is the most basic material to the life in planet. In order to estimate that the tap water safety for human consumption, the rapid, precise and the accurate method needs to analysis the water. The sediment is also important for river and the lake; The analysis of water pollutant is time-consuming sample preparation, follows by GC-MS analyzes. In the initial period realized that GC?GC has the great potential improvement to analysis water and sediment. In its earliest applications in this region, GC?GC was explained possibly from the common matrix interference which is separating the BTEX (benzene, toluene, ethyl benzene and xylene) and methyl alcohol tert butyl ether (MTBE), when and SPME [18]. The separation strength of GC?GC is improved; MTBE and the benzene are the foundation line solution in the 2nd chromatograph analysis space. This research showed GC?GC has the great potential for water pollutant analysis by combination this technology with microextraction (head space SPME). Certain Earth’s freshwater body is polluted daily by petroleum and the oil contamination. In the 1970s, it is pays attention the petroleum sample stratography spectrum to exhibit a model, has not solved, foundation line which rises â€Å"hillock† [20]. Chromatogram is the complex part, including compound many different kinds, refers to â€Å"unsolution complex mixture† at present [21]. GC?GC-FID uses in analysis of two different freshwater sediments [21]. Observed the conventional sample preparation procedure, the author has used the superior resolution, and has constructed the chromatogram of sediment for UCM different levele by GC?GC. The chromatogram obtained for two samples provides by clue direction contamination important source researcher. , The research showed GC?GC the potential importantly in the environment law, for an environmental chemistry basic tool, environmental audit. The nonylphenol polyethylene ethoxides’ degenerated product, was possible feminine hormone splitter [22]. Increases the concern, NPs from the urban district [23] the water and the deposition present are found. GC?GC-TOF MS is the NP isomer separation from technical mixture [24] used. 41 components are identified. Figure 3 explanation GC?GC-TOF MS application to NP isomer respective ion trace analysis from identical research. Two NP stave products were explained that m/z 135 (chart 3a) and m/z 149 (chart 3b). Two chromatogram exhibition group type separation, emphasizes by the connection compound peak maximum value in the identical homologous family incline line. It from as a result of various NP isomer structure similarity, the complete separation is the very difficult this chart is obvious. However, other resolution strength by GC?GC provided â€Å"cleanly† the mass spectrum to provide, made the analysis proof to be easier. Fig. 3. Extracted ion GC?GC–TOF MS chromatograms of a technical nonylphenyl (NP) mixture GC?GC for to the environment pollutant’s analysis was recently the application current in oceanic deposit [25]. A qualitative method has developed, fast and is unified according to the tendency by the ultrasonic wave assistance’s extraction to the complex sample’s high resolution analysis provides to GC?GC-TOF UAE which is fast and high efficiency selective sampling pretreatment procedure is utilized solid sample [30]. A high efficiency and has the selective sample preparation method, when the powerful separation method GC?GC combine with UAE can causes 1500 kind of more than several not aromatic hydrocarbon (PAHs) the compound and the certificate resolution, NPs and dialkylated benzene. Once more, GC?GC not only ability from each other isolation analysis, and has proven from the sample matrix priceless. The carcinogen which and the mutagen suspected, PAHs is many industry activity by-product and the universal existence is distributed in the environment. Because it requests the hard sledding and has the selective sample preparation, they in the deposition sample’s trace determination are difficult. The improvement to complex matrix’s PAHs, the Cavagnino trace analysis with GC?GC-FID [large-volume splitless injection (LVSI) technology]. Sample complex which analyzes is many deposition sample representative who obtains from the river and the lake. Separated and investigates seven PAHs which diluted in the synthesis diesel oil to demonstrate the LVSI- GC?GC-FID potential achievement in the low ppb level for to trace amount analysis one powerful and the rapid tool in complex matrix PAHs. While, Ong. and so on has developed a PAHs rapid surveillance method probably in the soil sample, utilizes liquid extraction (PLE) – GC?GC-FID [27]. The current publishing work is merely GC?GC latent serviceable demonstration to deposition sample PAH analysis. In brief, with the resolution which improves, improvement many sensitivities and the stratography spectrum which orders, GC?GC may add on the result which effective and the rapid sample preparation method produces cannot be achieved by the routine analysis procedure. Analysis of PCBs, PCDDs and PCDFs Polychlorinated dibenzodioxins (PCDDs), polychlorinated dibenzofurans (PCDFs) and some polychlorinated biphenyl (PCB) congeners is dominated by bioaccumulation and biomagnification in the environment and thus is a dangerous The wildlife and people. Many are suspected carcinogens and induced changes of [28]. Of PCBs, dioxins and furans in the environment assessment of certain requirements of a method to isolate and quantify them in complex samples such as food, soil and water. GC?GC provides one advantageous method in complex matrix’s PCDDs and the PCDFs analysis. In its one of early experiments, a liquid crystal main column and a limitless secondary column (according to steam pressure separation) uses in (according to the planarity separation) separates the tone – and from technical mixture [30] non-straight PCB congeners. The connection GC?GC microelectron captures investigates (MECD) is toxic PCBs, PCDDs and the PCDFs determination is the application in the cod liver sample [29]. The analysis result showed all 12 priority PCB from liver sample congeners, and most toxic Dai Aoxin and fu nan the full separation and the proof nail fast with 90 PCBs and 17 contain poison PCDDs and PCDFs. Moreover, when compares with the standard sample preparation procedure, the liver sample pretreatment does not have the selectivity and reduces to is smallest. It has included the direct injection and fractionation followed cell degree of illness gradually dra ws back, the centrifuge process to enter GC?GC the system. Figure 4 showing from the 2nd stratography spectrum which obtains to the cod liver sample’s analysis. Recently, an item of multilaboratory research has been conducted in food sample, analyzes PCDD/Fs and World Health Organization PCBs through once more GC?GC-MECD and the GC-HRMS comparison and the explanation GC?GC great potential in the rapid surveillance application [31]. With the standard analysis method comparison GC?GC, GC?GC the performance is unified (GC?GC-ID-TOF MS) has to 13C mark isotopic dilution (ID) TOF MS conventional GC-HRMS to appraise [32]. Quantification 17 PCDD/Fs and four PCBs nail fast in the soil and in the deposition sample are two methods are comparable. However, GC?GC implementation request only smallest sample preparation, and causes the signal improvement (factor 5-10), superior resolution, lower instrumentation expense, and improved TOF the MS data [32] the ghost overlaps legitimately. As highest capacity which and resolution result increases, the unknown compound’s proof is possible. Fig. 4 GC?GC–ECD chromatogram of a cod liver sample spiked with 90 PCBs [29]. Pesticide Analysis Forms the challenge to the pesticide analysis to analyze the chemist to prepare about the sample to make the law and the chromatography. Is similar other toxic compound, the pesticide is usually distributed in the trace amount environment. Moreover, they are extreme complex matrix part of for example foods, the soil and the water sample. Needs to be like today presses to the rapid high resolution analysis method. GC?GC the application early showed the method potential regular implementation to the pesticide analysis in person’s organization in the future. Supercritical invariable extraction (SFE) with GC?GC-FID together utilizes the analysis in person’s blood serum [33] the pesticide. To were few from the sharp person’s blood serum extraction’s 15 pesticide’s foundation line segments achieve in four minutes. Later, GC?GC-FID to estimate that the child pesticide exposure has been utilized through the use urine and the blood serum [34] low-power. This special example in were few showed 16 pesticide complete separations in four minutes. Recently, has been demonstrated including PCBs and the organic chlorine pesticide 59 organization pollutant’s proof and the quantification [35]. But GC?GC-ID-TOF MS completed the comparable result author who ran in standard routine analysis (GC-ID-TOFMS) to indicate that analyzed like this, three different injection needs . GC?GC the application early showed the method potential regular implementation to the pesticide analysis in person’s organization in the future. Supercritical invariable extraction (SFE) with GC?GC-FID together utilizes the analysis in person’s blood serum [33]. Pesticide determination in food extract is similarly important. Separated using GC?GC-TOF MS and identifies 58 pesticides to nail fast completely on the vegetable was explained [36]. This completed with has been smallest and the non-selective sample preparation: The celery or the carrot sample and the sodium acetate and the ethyl acetate have chopped, mixed, was mixed, has been separated, and is dried. The extract is injected entered GC?GC [36]. Recently, separated 12 halogenate compound kind of groups five different GC?GC column combination to appraise, including PCBs, PCDDs, PCDFs, multi-chlorobenzene diphenyl ester (PCDEs), multi-chlorobenzene naphthalene (PCNs), multi-chlorobenzene dibenzothiophenes (PCDTs), multi-chlorobenzene terphenyl (PCTs), multi-chlorobenzene alkane (PCAs), toxaphene, multi-bromination biphenyl (PBBs), multi-bromination diphenyl ether (PBDEs) and organic chlorine pesticide (OCPs) [37]. Although this article focal point is the different compound kind of major group separates, was also explained in the family separation. When the separation and proof all 28 OCPs are pure pesticide mixture has only been demonstrated that majority has been separated fully, since, when injects along other 11 compound kind of [37]. Therefore, its as if that the column establishment which disposes appropriately with one, GC?GC may use takes mainly shields step for the environment sample contamination and along pollutant m any other kind of pesticides, with smallest sample preparation. Air Analysis Volatile organic compound (VOCs) in metropolis photochemical smog [38] the generation plays a strong character. The World Health Organization thought that possibly has to the air granular material’s exposition to the human health [39] the ill effect. But, uncertainty existence about from VOCs health effect in metropolis granular material (PM) [40]. Therefore, requests rapid, reliable and information method guarantee in air pollutant successful surveillance, proof and discovery. Many PAHs and PAHs (oxy-PAHs) which oxidizes is the carcinogen which and the mutagen suspected, with, therefore they are in the metropolis aerosol analysis profitable target analysis. GC?GC-FID and GC?GC four-pole MS (QMS) is applied permits from Finland about 1500 peaks goal PAHs [41] investigates in the metropolis air sample and the proof. But woman is unified the method for the compound proof and the quantification, used GC?GC-FID the combination to confirm the good reproducibility. 13 non-goal PAHs has been identified, and ten goal PAHs by quota. Found PAH centralism scope (0.5-5.5 ng/m3) with in Europe [41] other parts of standard methods obtained the result was comparable. The cigarette smoke is estimate extreme complex mixture component [43] which has not recognized including about 4,700 kind of identification’s compound and 100,000. GC?GC-TOFMS utilizes the solution approximately from the cigarette smoke [43] 30,000 peaks. After this, analyzes cigarette smoke condensate simpler sample determination neutrality score [44], basic score [45] and acidic score [46] chemical composition. Conventional GC-MS possible to separate 200 unknown peaks and identifies 115 hydrocarbons from the cigarette condensate limitless neutral scores; To identical sample GC?GC analysis, however, has achieved 4,000 kind of compound separations and 1,800 hydrocarbons [44] proved. In another research, GC?GC-TOF has identified 377 kind of nitrogen-containing compound to the cigarette condensate’s basic score’s MS analysis, in 155 is the pyridine derivative, 104 kinds kui lin or different kui lin derivative and 56 kind of pyrazine derivative [45]. Conclusions GC?GC has achieved the condition rapidly for to the volatile organic compound analysis most powerful tool. It appoints oneself achievement to be suitable completely for in the complex sample surveillance analysis technology. In the environment analyzed area, this includes PCBs by the analysis many example testimony to the common environment pollutant, PCDDs, PCDFs, PAHs and the pesticide in the complex environment matrix. Moreover, GC?GC has the potential to simplify the sample preparation procedure (even completely to eliminate them), when simultaneously causes when the shorter overall analysis time high resolution stratography spectrum. Regarding widely a new analysis method which adopts, not only it is certainly reliable and renewable, but it should also exhibit the significant advantage to surpass the method which accepts. The example reported the showing GC?GC method advantage in this review in the traditional 1DGC separation. In GC?GC historical first years period, the instrumentation development is the main focal point; However, from GC?GC system’s commercialization, the application quantity which reported greatly increases in the environment analysis and other scientific fields. Therefore, we may anticipate that the transition automation GC?GC is unified on-line sample which the correspondence uses to prepare gradually the equipment in the regular environmental monitoring. References 1. Marriott PJ. Haglund P, Ong RCY. Clin Chim Acta. 2003, 328:1–19. 2. Pawliszyn J. Solid phase microextraction, theory and practice. Wiley, New York. 1997. 3. Pawliszyn J. (1999) Applications of solid phase microextraction. Royal Society of Chemistry, Cambridge. 4. Dettmer K, Engewald W. Anal Bioanal Chem. 2002, 373: 490–500. 5. Butrym E. LC-GC. 1999, 17:S19–S24. 6. de Geus H-J, Wester PG, Schelvis A, de Boer J, Brinkman UATh. J Environ Monit. 2000, 2:503–511. 7. Mrowetz SHJ. J Chromatogr A. 1983, 279:173–187. 8. Duinker JC, Schultz DE, Petrick G. Mar Pollut Bull. 1998, 19:19–25. 9. Storr-Hansen E. Int J Environ Anal Chem.1991, 43:253–266. 10. Silvis LD, Kapila S, Yan Q, Elseewi AA. J Chromatogr A.1994, 688:221–230. 11. Schurig V, Reich S. Chirality. 1998, 10:425–429. 12. Liem DAK. Trends Anal Chem. 1999, 18:499–507. 13. Giddings JC. Anal Chem. 1984, 6:1258A–1270A. 14. Liu Z, Phillips JB. J Chromatogr Sci.1991, 29:227–231. 15. Hyotylainen T, Kallio M, Hartonen K, Jussila M, Palonen S, Riekkola M-L. Anal Chem. 2002, 74:4441–4446. 16. Kristenson EM, Korytar P, Danielsson C, Kallio M, Brandt M, Makela J, Vreuls RJJ, Beens J, Brinkman UATh. J Chromatogr A. 2003, 1019:65–77. 17. Arey JS, Nelson RK, Xu L, Reddy CM. Anal Chem. 2005, 77:7172–7182. 18. Gaines RB, Ledford EB, Stuart JD. J Microcol Sep. 1998, 10:597–604. 19. Beens J, Dalluge J, Adahchour M, Vreuls JJR, Brinkman UATh. J Microcol Sep. 2001, 13:134–140. 20. Blumer M, Souza G, Sass J. Mar Biol. 1970, 5:195–202. 21. Frysinger GS, Gaines RB, Xu L, Reddy CM. Environ Sci Technol. 2003, 37:653–1662. 22. Mueller SO. Anal Bioanal Chem. 2004, 378:582–587. 23. Ieda T, Horii Y, Petrick G, Yamashita N, Ochiai N, Kannan K. Environ Sci Technol. 2005, 39:7202–7207. 24. Moeder M, Martin C, Schlosser D, Harynuk J, Gorecki T. J Chromatogr A. 2006, 1107:233–239. 25. Morales-Munoz S, Vreuls RJJ, Luque de Castro MD. J Chromatogr A. 2005, 1086:122–127. 26. Cavagnino D, Magni P, Zilioli G, Trestianu S. J Chromatogr A. 2003, 1019:211–220. 27. Ong R, Lundstedt S, Haglund P, Marriott P. J Chromatogr A. 2003, 1019:221–232. 28. Schwarzenbach RP, Gschwend PM, Imboden DM. Environmental organic chemistry, 2nd edn. Wiley-Interscience, Hoboken, NJ. 2003. 29. Korytar P, Leonards PEG, de Boer J, Brinkman UATh. J Chromatogr A. 2002, 958:203–218. 30. Haglund P, Harju M, Ong R, Marriott P. J Microcol Sep. 2001, 13:306–311. 31. Danielsson C, Wiberg K, Korytar P, Bergek S, Brinkman UATh, Haglund P. J Chromatogr A. 2005, 1086:61–70. 32. Focant J-F, Reiner EJ, MacPherson K, Kolic T, Sjodin A, Patterson DG Jr, Reese SL, Dorman FL, Cochran J. Talanta. 2004, 63:1231–1240. 33. Liu Z, Sirimanne SR, Patterson DG Jr, Needham LL. Anal Chem. 1994, 66:3086–3092. 34. Dimandja J-M, Grainger J, Patterson DG Jr, Turner WE, Needham LL. J Exp Anal Environ Epidem. 2000, 10:761–768. 35. Focant J-F, Sjodin A, Turner WE, Patterson DG Jr. Anal Chem. 2004, 76:6313–6320. 36. Dalluge J, van Rijn M, Beens J, Vreuls RJJ, Brinkman UATh. J Chromatogr A. 2002, 965:207–217. 37. Korytar P, Leonards PEG, de Boer J, Brinkman UATh. J Chromatogr A. 2005, 1086:29–44. 38. Fowler D, Coyle M, Ashmore MR, Bower J, Williams ML, Smith R, Dollard GJ, Lee DS, Jenkin M, Stedman JR, Cox RA, Derwent RG, Harrison RM, Hewitt CN, Maynard RL, Penkett SA, Weston KJ, Woods PJ, Burgess RA, Anderson R. Fourth Report of the Oxidants Review Group 75-104. UK Department of the Environment, Transport and Regions, London. 1997. 39. WHO. Health aspects of air pollution with particulate matter, ozone and nitrogen dioxide. World Health Organization, Bonn. 2003. 40. Welthagen W, Schnelle-Kreis J, Zimmermann R. J Chromatogr A. 2003, 1019:233–249. 41. Kallio M, Hyotilainen T, Lehtonen M, Jussila ML, Hartonen K, Shimmo M, Riekkola M-L. J Chromatogr A. 2003, 1019:251– 260. 42. Schnelle-Kreis J, Welthagen W, Sklorz M, Zimmermann R. J Sep Sci. 2005, 28:1648–1657. 43. Dalluge J, van Stee LLP, Xu X, Williams J, Beens J, Vreuls RJJ, Brinkman UATh. J Chromatogr A.2002, 974:169–184. 44. Lu X, Zhao M, Kong H, Cai J, Wu J, Wu M, Hua R, Liu J, Xu G. J Chromatogr A. 2004, 1043:265–273. 45. Lu X, Zhao M, Cai J, Kong H, Wu J, Wu M, Hua R, Liu J, Xu G. J Sep Sci. 2004, 27:101–109. 46. Lu X, Cai J, Zhao M, Kong H, Wu J, Wu M, Hua R, Liu J, Xu G. Anal Chem. 2004, 74:4441–4451. Application of 2D gas chromatography for environmental analysis All these benefits make GC?GC in the toxic compounds involved in the determination of trace level environmental analysis of a very good tool in complex matrices. This paper summarizes some of the environmental analysis and review and monitoring of the GC?GC applications Introduction Many years of humans society development led to many of the world distribution of chemicals in the atmosphere, the Earth’s surface and land border. Many of these compounds are harmful to the world’s ecosystems and the people. Analysis of these compounds in the environment is important. When analytes have high vapor pressure, gas chromatography is the selection method. The main problem in the environmental analysis is to analyze the existence of material is usually very complex matrix trace. Result, a huge research work into the analysis of major environmental pollutants [1]. Methods used in environmental analysis is usually the same as in all aspects of practice. It includes sampling, sample preparation, separation and detection. All of these steps may benefit from change, it is usually the biggest limitations imposed by the separation step. In gas chromatography (GC) cases, the majority of environmental samples containing analyte and matrix components of many closely eluting peaks in a chromatographic dimension (1D) the maximum total capacity is greatly exceeded, and many coelutions and unresolved in the separation region was observed. This led to the analyte of interest and quantify the poor separation [1]. Poor resolution in the chromatographic analysis of sample preparation and detection of high demand for equipment placement. Expensive and labor-intensive sample preparation, and solvent waste may cause a lot of harmful to the environment. By microextraction method development, such as liquid-liquid microextraction (LLME) and solid phase microextraction (SPME) and non-dissolved sample introduction system (ie, direct thermal desorption), has the potential to greatly simplify the sample preparation process, without sacrificing sensitivity and selectivity [2-5]. On investigation, lack of resolution often means using mass spectrometry (MS), including high-resolution mass spectrometry (HRMS), in some cases, is necessary. Figure 1 illustrates the GC-MS encountered in the common problems [36]. In the analysis of food extracts commonly 1D-GC clinch with insecticides (Fig. 1b), trace interest (in this case chlorfenvinphos) coelute analyte and sample matrix is more abundant components. Results obtained for such compounds, mass spectrometry (Figure 1e) frequently contains compounds derived from fragments of interference, leading to poor matching and library mass spectrometry (Fig. 1d). MS overlap algorithm may greatly improve the quality of the information of coeluting peak, but they are not always successful, when the number of coelutions is high. Figure 1a shows, full 2D-GC (GC?GC) to increase space and improve the chromatographic separation of the resolution, resulting in the separation of analytes of interest (chlorfenvinphos) from coeluting compounds and matrix components. Result, improved the quality of the analyte mass (Fig. 1c), taking into account the proof of a more confident analysis of material (Figure 1d). It is possible that some coelutions exist; these may often solve efficiently overlap with the MS, leading to better results, while reducing the number of components when the coeluting. GC?GC separation with the increased power resulting in a successful demo nstration and quantification of analytes. Fig. 1 GC?GC–TOF MS versus 1D-GC–TOF MS for the analysis of a carrot extract. The highest-capacity problem in terms of conventional gas chromatography through multi-dimensional gas chromatography to cope (MDGC) implementation. In this method, one-dimensional (1D) chromatogram of a complex and unresolved part is subjected to the stationary phase coated with a second column separation of the other selectivity [1]. Although this method increases the 1D chromatographic part of the choice of chromatographic resolutions, this method with automation challenging, and only a few sample components can be adequately addressed. However, the many applications is good for the PCBs, pesticides and toxaphene analysis, among other things, the report with different degrees of success [6-12]. Overall, however, is the exact number of separation will be beneficial, if the entire sample is subjected to a separation in two dimensions. This became possible a comprehensive two-dimensional gas chromatography (GC?GC) in the introduction. Principle for Two-Dimensional Gas Chromatography (GC?GC) 2D-GC is a comprehensive method of fundamental solution to meet the highest capacity. A typical structure of GC?GC set in Figure 2. The basic structure of GC?GC using virtually is the same as the composition of 1D-GC. These include syringes, oven, columns and detectors. In a typical GC?GC system, using non-polar stationary phase coated with a thick coating of a long column was installed as the main column. The exports through a special interface or modem is connected to the entrance of the second dimension column coated with stationary phase of another selectivity. Modulator connected not only to primary and secondary column; its main role is repeated trapping of the effluent fractions from the first dimension and periodic injection of them to the form of narrow pulses separated into further chromatographic analysis. Because the operation of 2D-GC in the fast condition, the detector in the GC?GC selection is limited to those capable of fast data collection rate. For example, GC?GC de tector can include flame ionization detector (FID), electron capture detector (ECD), single atomic emission detector (AED), sulfur compounds optical detector (SCD), nitrogen photodetector compounds (NCD) and time of flight mass spectrometer (TOF MS). Fig. 2 A block diagram of a GC?GC system. Modulator is the important part of the instrument, because it guarantees the separation is comprehensive and multidimensional [13]. In 1991, the first implementation of the GC?GC, the field has witnessed a number of modulator design [14]. Initially, the use of thermal adjustment of the heat modulator was implemented; however, the modular cryogenic liquid (liquid carbon dioxide or nitrogen) is currently the main use. Modulator at low temperatures within the system, each design has its own distinct advantages and limitations, making it suitable for analysis of the specific type. For example, the analysis of water pollutants has been developed an interface [19], when the buildings, and an in-house applications modulator in the quantitative analysis of PAHs and PCBs has been described [15]. Then, the modulator of the different types of analyte in the analysis of organohalogenated been evaluated [16]. The implementation of GC?GC provides the following advantage to surpass the 1D separation method: improvement separation strength; improved sensitivities; and constructs or highly predetermined, stratography spectrum. In the environment analysis, GC?GC has the potential to improve the toxic compound through the separation from the coeluting analysis and the matrix component, increases the detection limit such chemical product and provides the ideal for the surveillance application the two-dimensional stratography spectrum which constructs. Finally, this possibly causes to reduce to the smallest sample preparation procedure, and reduces analysis time. Other applications are also possible. For example, recently, GC?GC the product estimate which divided into for the diesel oil hydrocarbon environment had used, was important affected many ecosystems [17] the oil leak. Application of GC?GC in Environmental Analysis Water and Sediment Analysis The water is the most basic material to the life in planet. In order to estimate that the tap water safety for human consumption, the rapid, precise and the accurate method needs to analysis the water. The sediment is also important for river and the lake; The analysis of water pollutant is time-consuming sample preparation, follows by GC-MS analyzes. In the initial period realized that GC?GC has the great potential improvement to analysis water and sediment. In its earliest applications in this region, GC?GC was explained possibly from the common matrix interference which is separating the BTEX (benzene, toluene, ethyl benzene and xylene) and methyl alcohol tert butyl ether (MTBE), when and SPME [18]. The separation strength of GC?GC is improved; MTBE and the benzene are the foundation line solution in the 2nd chromatograph analysis space. This research showed GC?GC has the great potential for water pollutant analysis by combination this technology with microextraction (head space SPME). Certain Earth’s freshwater body is polluted daily by petroleum and the oil contamination. In the 1970s, it is pays attention the petroleum sample stratography spectrum to exhibit a model, has not solved, foundation line which rises â€Å"hillock† [20]. Chromatogram is the complex part, including compound many different kinds, refers to â€Å"unsolution complex mixture† at present [21]. GC?GC-FID uses in analysis of two different freshwater sediments [21]. Observed the conventional sample preparation procedure, the author has used the superior resolution, and has constructed the chromatogram of sediment for UCM different levele by GC?GC. The chromatogram obtained for two samples provides by clue direction contamination important source researcher. , The research showed GC?GC the potential importantly in the environment law, for an environmental chemistry basic tool, environmental audit. The nonylphenol polyethylene ethoxides’ degenerated product, was possible feminine hormone splitter [22]. Increases the concern, NPs from the urban district [23] the water and the deposition present are found. GC?GC-TOF MS is the NP isomer separation from technical mixture [24] used. 41 components are identified. Figure 3 explanation GC?GC-TOF MS application to NP isomer respective ion trace analysis from identical research. Two NP stave products were explained that m/z 135 (chart 3a) and m/z 149 (chart 3b). Two chromatogram exhibition group type separation, emphasizes by the connection compound peak maximum value in the identical homologous family incline line. It from as a result of various NP isomer structure similarity, the complete separation is the very difficult this chart is obvious. However, other resolution strength by GC?GC provided â€Å"cleanly† the mass spectrum to provide, made the analysis proof to be easier. Fig. 3. Extracted ion GC?GC–TOF MS chromatograms of a technical nonylphenyl (NP) mixture GC?GC for to the environment pollutant’s analysis was recently the application current in oceanic deposit [25]. A qualitative method has developed, fast and is unified according to the tendency by the ultrasonic wave assistance’s extraction to the complex sample’s high resolution analysis provides to GC?GC-TOF UAE which is fast and high efficiency selective sampling pretreatment procedure is utilized solid sample [30]. A high efficiency and has the selective sample preparation method, when the powerful separation method GC?GC combine with UAE can causes 1500 kind of more than several not aromatic hydrocarbon (PAHs) the compound and the certificate resolution, NPs and dialkylated benzene. Once more, GC?GC not only ability from each other isolation analysis, and has proven from the sample matrix priceless. The carcinogen which and the mutagen suspected, PAHs is many industry activity by-product and the universal existence is distributed in the environment. Because it requests the hard sledding and has the selective sample preparation, they in the deposition sample’s trace determination are difficult. The improvement to complex matrix’s PAHs, the Cavagnino trace analysis with GC?GC-FID [large-volume splitless injection (LVSI) technology]. Sample complex which analyzes is many deposition sample representative who obtains from the river and the lake. Separated and investigates seven PAHs which diluted in the synthesis diesel oil to demonstrate the LVSI- GC?GC-FID potential achievement in the low ppb level for to trace amount analysis one powerful and the rapid tool in complex matrix PAHs. While, Ong. and so on has developed a PAHs rapid surveillance method probably in the soil sample, utilizes liquid extraction (PLE) – GC?GC-FID [27]. The current publishing work is merely GC?GC latent serviceable demonstration to deposition sample PAH analysis. In brief, with the resolution which improves, improvement many sensitivities and the stratography spectrum which orders, GC?GC may add on the result which effective and the rapid sample preparation method produces cannot be achieved by the routine analysis procedure. Analysis of PCBs, PCDDs and PCDFs Polychlorinated dibenzodioxins (PCDDs), polychlorinated dibenzofurans (PCDFs) and some polychlorinated biphenyl (PCB) congeners is dominated by bioaccumulation and biomagnification in the environment and thus is a dangerous The wildlife and people. Many are suspected carcinogens and induced changes of [28]. Of PCBs, dioxins and furans in the environment assessment of certain requirements of a method to isolate and quantify them in complex samples such as food, soil and water. GC?GC provides one advantageous method in complex matrix’s PCDDs and the PCDFs analysis. In its one of early experiments, a liquid crystal main column and a limitless secondary column (according to steam pressure separation) uses in (according to the planarity separation) separates the tone – and from technical mixture [30] non-straight PCB congeners. The connection GC?GC microelectron captures investigates (MECD) is toxic PCBs, PCDDs and the PCDFs determination is the application in the cod liver sample [29]. The analysis result showed all 12 priority PCB from liver sample congeners, and most toxic Dai Aoxin and fu nan the full separation and the proof nail fast with 90 PCBs and 17 contain poison PCDDs and PCDFs. Moreover, when compares with the standard sample preparation procedure, the liver sample pretreatment does not have the selectivity and reduces to is smallest. It has included the direct injection and fractionation followed cell degree of illness gradually dra ws back, the centrifuge process to enter GC?GC the system. Figure 4 showing from the 2nd stratography spectrum which obtains to the cod liver sample’s analysis. Recently, an item of multilaboratory research has been conducted in food sample, analyzes PCDD/Fs and World Health Organization PCBs through once more GC?GC-MECD and the GC-HRMS comparison and the explanation GC?GC great potential in the rapid surveillance application [31]. With the standard analysis method comparison GC?GC, GC?GC the performance is unified (GC?GC-ID-TOF MS) has to 13C mark isotopic dilution (ID) TOF MS conventional GC-HRMS to appraise [32]. Quantification 17 PCDD/Fs and four PCBs nail fast in the soil and in the deposition sample are two methods are comparable. However, GC?GC implementation request only smallest sample preparation, and causes the signal improvement (factor 5-10), superior resolution, lower instrumentation expense, and improved TOF the MS data [32] the ghost overlaps legitimately. As highest capacity which and resolution result increases, the unknown compound’s proof is possible. Fig. 4 GC?GC–ECD chromatogram of a cod liver sample spiked with 90 PCBs [29]. Pesticide Analysis Forms the challenge to the pesticide analysis to analyze the chemist to prepare about the sample to make the law and the chromatography. Is similar other toxic compound, the pesticide is usually distributed in the trace amount environment. Moreover, they are extreme complex matrix part of for example foods, the soil and the water sample. Needs to be like today presses to the rapid high resolution analysis method. GC?GC the application early showed the method potential regular implementation to the pesticide analysis in person’s organization in the future. Supercritical invariable extraction (SFE) with GC?GC-FID together utilizes the analysis in person’s blood serum [33] the pesticide. To were few from the sharp person’s blood serum extraction’s 15 pesticide’s foundation line segments achieve in four minutes. Later, GC?GC-FID to estimate that the child pesticide exposure has been utilized through the use urine and the blood serum [34] low-power. This special example in were few showed 16 pesticide complete separations in four minutes. Recently, has been demonstrated including PCBs and the organic chlorine pesticide 59 organization pollutant’s proof and the quantification [35]. But GC?GC-ID-TOF MS completed the comparable result author who ran in standard routine analysis (GC-ID-TOFMS) to indicate that analyzed like this, three different injection needs . GC?GC the application early showed the method potential regular implementation to the pesticide analysis in person’s organization in the future. Supercritical invariable extraction (SFE) with GC?GC-FID together utilizes the analysis in person’s blood serum [33]. Pesticide determination in food extract is similarly important. Separated using GC?GC-TOF MS and identifies 58 pesticides to nail fast completely on the vegetable was explained [36]. This completed with has been smallest and the non-selective sample preparation: The celery or the carrot sample and the sodium acetate and the ethyl acetate have chopped, mixed, was mixed, has been separated, and is dried. The extract is injected entered GC?GC [36]. Recently, separated 12 halogenate compound kind of groups five different GC?GC column combination to appraise, including PCBs, PCDDs, PCDFs, multi-chlorobenzene diphenyl ester (PCDEs), multi-chlorobenzene naphthalene (PCNs), multi-chlorobenzene dibenzothiophenes (PCDTs), multi-chlorobenzene terphenyl (PCTs), multi-chlorobenzene alkane (PCAs), toxaphene, multi-bromination biphenyl (PBBs), multi-bromination diphenyl ether (PBDEs) and organic chlorine pesticide (OCPs) [37]. Although this article focal point is the different compound kind of major group separates, was also explained in the family separation. When the separation and proof all 28 OCPs are pure pesticide mixture has only been demonstrated that majority has been separated fully, since, when injects along other 11 compound kind of [37]. Therefore, its as if that the column establishment which disposes appropriately with one, GC?GC may use takes mainly shields step for the environment sample contamination and along pollutant m any other kind of pesticides, with smallest sample preparation. Air Analysis Volatile organic compound (VOCs) in metropolis photochemical smog [38] the generation plays a strong character. The World Health Organization thought that possibly has to the air granular material’s exposition to the human health [39] the ill effect. But, uncertainty existence about from VOCs health effect in metropolis granular material (PM) [40]. Therefore, requests rapid, reliable and information method guarantee in air pollutant successful surveillance, proof and discovery. Many PAHs and PAHs (oxy-PAHs) which oxidizes is the carcinogen which and the mutagen suspected, with, therefore they are in the metropolis aerosol analysis profitable target analysis. GC?GC-FID and GC?GC four-pole MS (QMS) is applied permits from Finland about 1500 peaks goal PAHs [41] investigates in the metropolis air sample and the proof. But woman is unified the method for the compound proof and the quantification, used GC?GC-FID the combination to confirm the good reproducibility. 13 non-goal PAHs has been identified, and ten goal PAHs by quota. Found PAH centralism scope (0.5-5.5 ng/m3) with in Europe [41] other parts of standard methods obtained the result was comparable. The cigarette smoke is estimate extreme complex mixture component [43] which has not recognized including about 4,700 kind of identification’s compound and 100,000. GC?GC-TOFMS utilizes the solution approximately from the cigarette smoke [43] 30,000 peaks. After this, analyzes cigarette smoke condensate simpler sample determination neutrality score [44], basic score [45] and acidic score [46] chemical composition. Conventional GC-MS possible to separate 200 unknown peaks and identifies 115 hydrocarbons from the cigarette condensate limitless neutral scores; To identical sample GC?GC analysis, however, has achieved 4,000 kind of compound separations and 1,800 hydrocarbons [44] proved. In another research, GC?GC-TOF has identified 377 kind of nitrogen-containing compound to the cigarette condensate’s basic score’s MS analysis, in 155 is the pyridine derivative, 104 kinds kui lin or different kui lin derivative and 56 kind of pyrazine derivative [45]. Conclusions GC?GC has achieved the condition rapidly for to the volatile organic compound analysis most powerful tool. It appoints oneself achievement to be suitable completely for in the complex sample surveillance analysis technology. In the environment analyzed area, this includes PCBs by the analysis many example testimony to the common environment pollutant, PCDDs, PCDFs, PAHs and the pesticide in the complex environment matrix. Moreover, GC?GC has the potential to simplify the sample preparation procedure (even completely to eliminate them), when simultaneously causes when the shorter overall analysis time high resolution stratography spectrum. Regarding widely a new analysis method which adopts, not only it is certainly reliable and renewable, but it should also exhibit the significant advantage to surpass the method which accepts. The example reported the showing GC?GC method advantage in this review in the traditional 1DGC separation. In GC?GC historical first years period, the instrumentation development is the main focal point; However, from GC?GC system’s commercialization, the application quantity which reported greatly increases in the environment analysis and other scientific fields. Therefore, we may anticipate that the transition automation GC?GC is unified on-line sample which the correspondence uses to prepare gradually the equipment in the regular environmental monitoring. References 1. Marriott PJ. Haglund P, Ong RCY. Clin Chim Acta. 2003, 328:1–19. 2. Pawliszyn J. Solid phase microextraction, theory and practice. Wiley, New York. 1997. 3. Pawliszyn J. (1999) Applications of solid phase microextraction. Royal Society of Chemistry, Cambridge. 4. Dettmer K, Engewald W. Anal Bioanal Chem. 2002, 373: 490–500. 5. Butrym E. LC-GC. 1999, 17:S19–S24. 6. de Geus H-J, Wester PG, Schelvis A, de Boer J, Brinkman UATh. J Environ Monit. 2000, 2:503–511. 7. Mrowetz SHJ. J Chromatogr A. 1983, 279:173–187. 8. Duinker JC, Schultz DE, Petrick G. Mar Pollut Bull. 1998, 19:19–25. 9. Storr-Hansen E. Int J Environ Anal Chem.1991, 43:253–266. 10. Silvis LD, Kapila S, Yan Q, Elseewi AA. J Chromatogr A.1994, 688:221–230. 11. Schurig V, Reich S. Chirality. 1998, 10:425–429. 12. Liem DAK. Trends Anal Chem. 1999, 18:499–507. 13. Giddings JC. Anal Chem. 1984, 6:1258A–1270A. 14. Liu Z, Phillips JB. J Chromatogr Sci.1991, 29:227–231. 15. Hyotylainen T, Kallio M, Hartonen K, Jussila M, Palonen S, Riekkola M-L. Anal Chem. 2002, 74:4441–4446. 16. Kristenson EM, Korytar P, Danielsson C, Kallio M, Brandt M, Makela J, Vreuls RJJ, Beens J, Brinkman UATh. J Chromatogr A. 2003, 1019:65–77. 17. Arey JS, Nelson RK, Xu L, Reddy CM. Anal Chem. 2005, 77:7172–7182. 18. Gaines RB, Ledford EB, Stuart JD. J Microcol Sep. 1998, 10:597–604. 19. Beens J, Dalluge J, Adahchour M, Vreuls JJR, Brinkman UATh. J Microcol Sep. 2001, 13:134–140. 20. Blumer M, Souza G, Sass J. Mar Biol. 1970, 5:195–202. 21. Frysinger GS, Gaines RB, Xu L, Reddy CM. Environ Sci Technol. 2003, 37:653–1662. 22. Mueller SO. Anal Bioanal Chem. 2004, 378:582–587. 23. Ieda T, Horii Y, Petrick G, Yamashita N, Ochiai N, Kannan K. Environ Sci Technol. 2005, 39:7202–7207. 24. Moeder M, Martin C, Schlosser D, Harynuk J, Gorecki T. J Chromatogr A. 2006, 1107:233–239. 25. Morales-Munoz S, Vreuls RJJ, Luque de Castro MD. J Chromatogr A. 2005, 1086:122–127. 26. Cavagnino D, Magni P, Zilioli G, Trestianu S. J Chromatogr A. 2003, 1019:211–220. 27. Ong R, Lundstedt S, Haglund P, Marriott P. J Chromatogr A. 2003, 1019:221–232. 28. Schwarzenbach RP, Gschwend PM, Imboden DM. Environmental organic chemistry, 2nd edn. Wiley-Interscience, Hoboken, NJ. 2003. 29. Korytar P, Leonards PEG, de Boer J, Brinkman UATh. J Chromatogr A. 2002, 958:203–218. 30. Haglund P, Harju M, Ong R, Marriott P. J Microcol Sep. 2001, 13:306–311. 31. Danielsson C, Wiberg K, Korytar P, Bergek S, Brinkman UATh, Haglund P. J Chromatogr A. 2005, 1086:61–70. 32. Focant J-F, Reiner EJ, MacPherson K, Kolic T, Sjodin A, Patterson DG Jr, Reese SL, Dorman FL, Cochran J. Talanta. 2004, 63:1231–1240. 33. Liu Z, Sirimanne SR, Patterson DG Jr, Needham LL. Anal Chem. 1994, 66:3086–3092. 34. Dimandja J-M, Grainger J, Patterson DG Jr, Turner WE, Needham LL. J Exp Anal Environ Epidem. 2000, 10:761–768. 35. Focant J-F, Sjodin A, Turner WE, Patterson DG Jr. Anal Chem. 2004, 76:6313–6320. 36. Dalluge J, van Rijn M, Beens J, Vreuls RJJ, Brinkman UATh. J Chromatogr A. 2002, 965:207–217. 37. Korytar P, Leonards PEG, de Boer J, Brinkman UATh. J Chromatogr A. 2005, 1086:29–44. 38. Fowler D, Coyle M, Ashmore MR, Bower J, Williams ML, Smith R, Dollard GJ, Lee DS, Jenkin M, Stedman JR, Cox RA, Derwent RG, Harrison RM, Hewitt CN, Maynard RL, Penkett SA, Weston KJ, Woods PJ, Burgess RA, Anderson R. Fourth Report of the Oxidants Review Group 75-104. UK Department of the Environment, Transport and Regions, London. 1997. 39. WHO. Health aspects of air pollution with particulate matter, ozone and nitrogen dioxide. World Health Organization, Bonn. 2003. 40. Welthagen W, Schnelle-Kreis J, Zimmermann R. J Chromatogr A. 2003, 1019:233–249. 41. Kallio M, Hyotilainen T, Lehtonen M, Jussila ML, Hartonen K, Shimmo M, Riekkola M-L. J Chromatogr A. 2003, 1019:251– 260. 42. Schnelle-Kreis J, Welthagen W, Sklorz M, Zimmermann R. J Sep Sci. 2005, 28:1648–1657. 43. Dalluge J, van Stee LLP, Xu X, Williams J, Beens J, Vreuls RJJ, Brinkman UATh. J Chromatogr A.2002, 974:169–184. 44. Lu X, Zhao M, Kong H, Cai J, Wu J, Wu M, Hua R, Liu J, Xu G. J Chromatogr A. 2004, 1043:265–273. 45. Lu X, Zhao M, Cai J, Kong H, Wu J, Wu M, Hua R, Liu J, Xu G. J Sep Sci. 2004, 27:101–109. 46. Lu X, Cai J, Zhao M, Kong H, Wu J, Wu M, Hua R, Liu J, Xu G. Anal Chem. 2004, 74:4441–4451.