Monday, January 27, 2020

Temperature Dependent Speed Controller Using Thermistor Computer Science Essay

Temperature Dependent Speed Controller Using Thermistor Computer Science Essay This project is a standalone automatic fan speed controller that controls the speed of an electric fan according to our requirement. This closed loop feedback control system is efficient and reliable by using embedded technology . Micro controller (AT89C51) allows dynamic and faster control. Liquid crystal display (LCD) makes the system user-friendly. The sensed temperature and fan speed level values are simultaneously displayed on the LCD panel. It is very compact using few components and can be implemented for several applications including air-conditioners, water-heaters, snow meltars, ovens, heat-exchangers, mixers, furnaces, incubators, thermal baths and veterinary operating tables. AT89C51 micro controller is the heart of the circuit as it controls all the functions. The temperature sensor thermistor senses the temperature and converts it into an electrical (analog) signal, which is applied to the micro controller through ADC. The analog signal is converted into digital format by the analog to-digital converter (ADC). The sensed and set values of the temperature are displayed on the 162-line LCD. The micro controller drives control relays by means of ULN driver circuit to control the fan speed with the help of high wattage tagged wire wound resistor. Single pole dabble throw (SPDT) relays are connected to the micro controller through a ULN driver circuit. The relays require 12 volts at a current of around 50 mA, which cannot provided by the micro controller. So the ULN driver circuit is added. The relays are used to operate the electrical fan or for operating any other electrical device. Normally the relays remain off. As soon as pin of the micro controller goes high, the relays operate This project uses regulated 5V, 500mA 12V, 500mA power supply. 7805 and 7812 three terminal voltage regulators are used for voltage regulation. Bridge type full wave rectifier is used to rectify the ac out put of secondary of 230/12V step down transformer. This project is useful in process industries for maintenance and controlling temperature. CHOICE OF MICROCONTROLLER There are different types of processors and controllers available in the market. Industrial and control application/may require automation of the process such as temperature, pressure, liquid flow, etc., in order to minimize manual intervention. To automate any application an intelligent controller plays a major role. One such controller proposed for the project is AT89C51, an 8-bit microcontroller. The AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K bytes of Flash Programmable and Erasable Read Only Memory (PEROM). The device is manufactured using Atmels high density nonvolatile memory technology and is compatible with the industry standard MCS-51à ¢Ã¢â‚¬Å¾Ã‚ ¢ instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a con- ventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control appli- cations The AT89C51 provides the following standard features: 4Kbytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator and clock circuitry.In addition, the AT89C51 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. CHOICE OF MEMORY As the system under consideration is using AT89C51 microcontroller it has 4K Bytes of In-System Reprogrammable Flash Memory and EPROM for its purposes. The ATMEL AMR code is stored in an inbuilt flash memory. Flash memory cannot be reprogrammed constantly. The temperature sensor device also supports the storage of last ten pairs of measurements and new measurements are over written to the older one. Hence this system is using EEPROM as a data storage memory. Even though EEPROM is slower than Flash memory it can be rewritten as many number of times as wanted. Memory Organization The information presented in this chapter is collected from the Microcontroller Architectural Overview, AT89C51, AT89LV51, AT89C52, AT89LV52, AT89C2051, and AT89C1051 data sheets of this book. The material has been selected and rearranged to form a quick and convenient reference for the programmers of Atmels microcontroller family of devices. This guide pertains specifically to the AT89C51, AT89LV51, AT89C52, and AT89LV52. Memory Organization Program Memory The AT89C Microcontroller has separate address spaces for program memory and data memory. The program memory can be up to 64 Kbytes long. The lower addresses may reside onchip. Figure 1 shows a map of the AT89C51 program memory, and Figure 2 shows a map of the AT89C52 program memory. The AT89C10512051 do not have off-board memory expansion. Figure 1. AT89C51 Program Memory Flash Microcontroller Memory Organization Figure 2. AT89C52 Program Memory 0498A Data Memory The AT89C can directly address up to 64 Kbytes of data memory external to the chip. The MOVX instruction accesses the external data memory. (Refer to the Instruction Set section in this chapter for a detailed description of instructions). The AT89C51 has 128 bytes of on-chip RAM (256 bytes in the AT89C52) plus a number of Special Function Registers (SFRs). The lower 128 bytes of RAM can be accessed either by direct addressing (MOV data addr) or by indirect addressing (MOV Ri). CHOICE OF ADC ADC0804 (Analog to Digital Converter) Figure 3 illustrates the main function of the ADC0804 i.e. to convert the input signal from temperature sensor device to voltage form that has 8-bit output. This device acts as a memory location or port entry to the microprocessor and does not require additional logic extension. ADC0804 design. To prove that this design is according to the specifications hardware, the formula used is as follows: ADC out = Ain / Vmax X 256 (1.2) where ADC out = digital output value Ain = Input Gain Vmax = Maximum voltage Using formula (1.2), it is found that: without amplifier, ADC out = Ain / Vmax X 256 = (1/5) X 256 = 51 D = 00110011 B So that, the temperature value is = 100 / 51 = 1.96 °C à ¢Ã¢â‚¬ °Ã¢â‚¬ ¦ 2 °C If using amplifier, ADC out = Ain / Vmax X 256 = (5 /5) X 256 = 256 D = 1111 1111 B (Proved) ADC 0804 Analog to digital converters find huge application as an intermediate device to convert the signals from analog to digital form. These digital signals are used for further processing by the digital processors. Various sensors like temperature, pressure, force etc. convert the physical characteristics into electrical signals that are analog in nature. ADC0804 is a very commonly used 8-bit analog to digital convertor.  It is a single channel IC, i.e., it can take only one analog signal as input. The digital outputs vary from 0 to a maximum of 255. The step size can be adjusted by setting the reference voltage at pin9. When this pin is not connected, the default reference voltage is the operating voltage, i.e., Vcc. The step size at 5V is 19.53mV (5V/255), i.e., for every 19.53mV rise in the analog input, the output varies by 1 unit. To set a particular voltage level as the reference value, this pin is connected to half the voltage. For example, to set a reference of 4V (Vref), pin9 is connected to 2V (Vref/2), thereby reducing the step size to 15.62mV (4V/255).   ADC0804 needs a clock to operate. The time taken to convert the analog value to digital value is dependent on this clock source. An external clock can be given at the Clock IN pin. ADC 0804 also has an inbuilt clock which can be used in absence of external clock. A suitable RC circuit is connected between the Clock IN and Clock R pins to use the internal clock. Pin Diagram:   An ADC is an electronic device that converts continuous signals to discrete digital numbers. The reverse operation is done by a DAC. The digital output may be using different coding schemes such as binary and twos compliment binary. Most ADCs are of a type known as linear which means that the range of input values that map to each output value has a linear relationship with the output value. The ADC used is an IC, ADC 0804. Features  · Compatible with 8080  µP derivatives-no interfacing logic needed access time 135 ns  · Easy interface to all microprocessors, or operates stand alone  · Differential analog voltage inputs  · Logic inputs and outputs meet both MOS and TTL voltage level specifications  · Works with 2.5V (LM336) voltage reference  · On-chip clock generator  · 0V to 5V analog input voltage range with single 5V supply  · No zero adjust required  · 0.3[Prime] standard width 20-pin DIP package  · 20-pin molded chip carrier or small outline package  · Operates ratiometrically or with 5 VDC, 2.5 VDC, or analog span adjusted voltage reference CHOICE OF SCHEDULING ALGORITHM. Many scheduling algorithm have been studied to guarantee the real time constraints of real time process. Scheduling decisions of this algorithm is usually based on parameters which are assumed to be crisp. However, in many circumstances the values of these parameters are vague. The vagueness of parameters suggests us to make the usage of fuzzy logic to decide in what order the request should be executed to better utilize the system and as a results reduce the chance of a request being missed. Our main contribution is proposing a fuzzy approach to microprocessor/microcontroller real time scheduling in which the scheduling parameters are treated as fuzzy variables. SAMPLING RATES OF CONTROLLED LOOP The temperature measurement device Resistance Temperature Detector a measure temperature in the range of -25-150 degree Celsius. But in this application the temperature inside the container is maintained at 25 degree Celsius. There is no much deviation of temperature inside the container. The container temperature doesnt vary that much in a second. The resolution of the device is 0.1 degree Celsius if the temperature inside the container varies more than the 0.1 degree Celsius the temperature sensing device can able to detect and the output will be shown. Suppose the temperature inside the container is changing at the rate of 0.1 degree Celsius per second the output has the frequency of 1 Hz. So the sampling rate for the device to sample or measure the temperature neednt be that high. So the device is using a sampling rate of 1 for measuring temperature i.e. temperature measurement device is having a sampling frequency of 1 HZ. Number of bits per second will be 10 bits per second (1 HZ*10 bits) which can be easily handled by 10 bit ATMEL ADC. Temperature Sensor Resolution   0.1 degree Celsius Temperature change inside the container   1 degree Celsius per minute So the frequency would be 0.6 HZ Sampling frequency = 0.6*5 = 3Hz (to be greater) Sampling rate = 0.3 Seconds   CHOICE OF REAL TIME SCHEDULING ALGORITHM There are basically four types of real times scheduling algorithm Round Robin Round Robin with interrupt Function queue scheduling RTOS( Real Time Operating System)   ROUND ROBIN It is the simplest algorithm. The Round Robin algorithm is characterized by the absence of interrupts. The algorithm consists of a main loop that checks each I/O device in turn and Service them if needed. it cannot suffer from shared data problems. Latency is limited by the maximum duration of a loop cycle. Attractive for simple environments. At the same time the disadvantage for the algorithm is it cannot set priorities. Its worst case wait for an important task code is the sum of execution time of all the other task code. ROUND ROBIN WITH INTERRUPT The main advantage of Round Robin with interrupt routines deals with the very urgent needs of devices. Interrupt routines set flags to indicate the interrupt happened. Main while loop polls the status of the interrupt flags and does any  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   follow up process required by a set flag. It moves more control over priority.    FUNCTION QUEUE SCHEDULING The advantage of function queue scheduling is latency for high priority devices can be reduced compared to Round-Robin with Interrupts. In Round-Robin with Interrupts every loop may end up executing every follow-up task. Function-Queue Scheduling guarantees that at most a single follow-up task is executed per loop iteration. The main disadvantage is latency for low priority tasks can increase. Low priority tasks can actually starve. Queuing algorithm may be complex/costly to run/code. If a low priority follow-up task is very time consuming the latency for higher priority response times will suffer. RTOS The advantage of RTOS is interrupts signal the need for follow-up tasks. But, unlike Function-Queue Scheduling, this is handled by the Real-Time Operating System and not by the interrupt routines manipulating flags or a queue. Instead of a loop deciding what to do next the RTOS decides. One follow-up task can be suspended by the RTOS in favouring of performing a higher priority task.-Queue. Suspension of tasks allows the worst case wait for the highest priority item to be zero. Built-in scheduling mechanism yields a system with very stable response characteristics even when changes to the code occur. Widely available for purchase. This embedded system is using  Round Robin Scheduling  as real time scheduling algorithm. The device is used to control only the temperature inside the steel container and so round robin architecture can be set here. FAILURE CONDITIONS The system will fail only if the temperature exceeds the range of the temperature sensor. Since it is a room temperature controller the variation in the room is very slow. PERFORMANCE MEASURES As the performance measure of system is totally dependent on PID Controller performance. So the PID controller performance can be evaluated by the periodic of the parameter hereafter against some baseline values. The performance improvement actions are taken accordingly on a periodic manner. So the Process Variable Error Overshoot Steady state error Settling time Must be calculated by different values of PID controllers Controller tuning methods provide the controller parameters in the form of formula or algorithms. They ensure that the obtained control system would be stable and would meet. These methods require certain knowledge about the controlled process. This knowledge, which depends on the applied method, usually translates into a transfer function. The objectives which should be achieved by the application of the control system are associated with the   control system features Regulating performance, Tracking performance, Robustness, noise attenuation.

Sunday, January 19, 2020

Familiaris Consortio Essay

Familiaris Consortio means â€Å"On the Role of the Christian Family in the Modern World†. It is an Apostolic Exhortation given by Pope John-Paul II on the 22nd of November, 1981 and is mainly about the family, the married couple, the children, parenting. In today’s society it is easy to lose sight of what marriage is, it is often rushed and have been based on materialistic things and the social stature an individual such as wealth, appearance and job. One thing that it made me realizes is that it is important that we understand that marriage is not just a union of two people but it is a sacred bond that helps us achieve true happiness and fulfillment in life therefore it must not be rushed, we must choose our partners wisely and whole heartedly before commiting into marriage. This document also tells us that humans were created by God from love and that it is instilled in us and we have the responsibility to promote this through marriage and building a family. I realized that in order to achieve this kind of love, it is important that in marriage, both individuals are willing to give themselves completely to one another and at the same time have a strong faith in God because it is in God’s blessing that this bond will be strengthened. The document also points out the general tasks of the family which is to form a community of persons ready to serve life, participate in its development, and share amongst others the life and mission of the Church. I have realized that having a happy family must be based on love, understanding, communication and care. It is important that husband and wife respect one another no matter what. I also realized that children in the family have many rights some of these rights being the right to grow up properly in a home with a mother and a father that will guide them throughout their lives and the right to discover their true identity, dignity and potential in life. Every parent has a duty to promote and defend these rights for their children and be a good example that they can follow and look up to. The Familiaris Consortio for me is like a guide for all people about marriage. It tells us its importance and sacredness and helps us use this marriage to have a happy life. It guides and makes us understand all the responsibilities we are engaging and are expected to have in committing into marriage. Lastly, it strengthens our relationship with God and with our family by giving us certain realizations and ideas about taking care of one another treating one another equally.

Saturday, January 11, 2020

Outline how legislation, policies and procedures relating to heath Essay

The Health and Safety at work act is a piece of legislation that is responsible for convering all health and safety in britain. However, the health and safety manager at individual establishments are responsible for carrying out the act and making sure everything is in cohearance with the piece of legislation. HASAWA influences health and social care in many different ways such as the protection it now gives to employers and employees, before this piece of legislation was made people had no legal protection whilst they were at work. HASAWA influences health and social as it tells the owner of a business, or establishment, what they need to be doing to make sure they are working in accordance to the legislation. Everyone has the duty to comply with the act, this includes employers, employees, trainees, self employed, manufacturers, suppliers ect. This legislation keeps people safe as it provides people with the instuctions to make their establishments safe for themselves and their emp loyees. HASAWA tells owners to carry out a risk assessment which points out the hazards that need to be changed and/or fixed. An example of legislation influencing a health and care setting is The Manual Handling Operations regualtion. MHOR is always thought to be the last resort, and only if there is a possibility of injury. Legislation tells emplyers and employees how to move and handle things appropriately and when it is and isn’t appropriate to move and handle things. Employers must carry out risk assessments before opening a business to find if there are any faults or dangers to the customers or employees. There must be a health and safety policy written specifically for that setting and someone must be employed to be in charge of health and safety. Everything in the establishment must be insured incase accidents occur. Employees must take responsibility of your own and other peoples health and  safety and not do anything that could cause someones health and safety to be put at risk. This influences the setting as it keeps people working or entering the setting safe and gives them the appropri ate instructions to keep them as safe as possible. It keeps people safe as it provides instructions and regulations that must be followed to keep everyone safe, and if everyone follows these regulations and instructions then their safety and health will be safe. Food Safety Act 1990 The Food Safety Act 1990 is a frame for all food legislation in Britain. Responsibilities for food businesses include: Ensuring you do not include anything in food or remove anything from food making it a hazard to the health of people consuming it. Advertising food in a way that isn’t misleading or false. The food safety act influences health in many different ways, it gives environmental health the right to inspect the quality of food, the place it is prepared and the place it is served and if it is not up to standard they have the power to close the establishment, in extreme cases. Before the establishment is closed down they are served a notice of improvement or be temporaraly closed until the standards are back up. Without the Food Safety Act food would be able to be served to you in any conditon, and if you became ill from that food you could not retain any form of compensation because there is no legislation telling the establishment how to cook, prepare and serve food safely. Employers and employees must make sure food is safe to eat, make sure they don’t add, remove or treat food in a way that makes it harmful to eat, make sure the quality of the food is the same as it is advertised or expected by the customer, Keep track of where the food was bought, if unsafe food is discovered it needs to be recorded and removed and tell people why the food has been recalled. There must be hand wash at all sinks and hands must be washed before touching food, after touching food, after using the toilet, after touching animals, after touching your own skin and hair, after sneezing or coughing and after touching raw food. Reporting of Injuries, Diseases and Dangerous Occurrences Regulations 1995 RIDDOR is the piece of legislation that states all injuries, diseases, illnesses need to be reported to either the health and safety executive or  the local council. RIDDOR is put in place so that health and safety executives can look at where the risks occur and can take steps to prevent them. There are of course only certain injuries and dangerous occuurences that need to be reported, things such as violence at work, gas leaks, injuries that have occured during work or in the work place. RIDDOR also benefits people who have been injured at work and want compensation, health and safety executives follow up on the case and evaluate if the acdicent was because of the employee being put at risk or if they didnt follow procedure. The employers responsibility is to maintain the safety of their employees customers and they have the responsibility to report if an employee or customer has been injured whilst at wor k or in the establishment. Without RIDDOR, injuries caused in the workplace could not be claimed upon and the hazard could not be found and removed, if the hazard isn’t removed then people will be continuously be getting injured. The incidents need to be written in an accident book and should inlude the date and time of injury, the name of the worker, a description of the accident, action taken and the result. Slips, Trips, Falls Slips, trips and falls are the most common causes of major injuries in the work place. Most trips are caused by uneven or un-maintained floors, and slips are usually cased by wet floors. However, slips, trips and falls can be prevented if the right preventions and procedures are put into place and followed. The employers responsibilities are to make sure the floors serface is even and maintained, decreasing the risk of trips, all obstructions in hallways and on floors are removed and stored properly, this also decreases the risk of trips. All spillages should be immediately cleaned up using the appropriate method, usually a cloth or mop, and a wet floor sign should be appointed if needed, this decreases the risk of slips. Staffs responsibilities are to wear safe and sensible footwear which have good grip, and they must also keep their work stations clear and tidy, also both staff and service users have the responsibility to report obstructions and spillages if not recognised. The pol icy put in place ifluences health and care as it prevents the risks of slips, trips and falls, without it there would be no procedures to influence staff to remove the risks, such as obsticles that may cause trips. If staff, employees and the service users don’t follow the policies put in place then the risks of accidents will be raised, and if an accident does occur and they haven’t followed the procedures they were responsible to follow then they can’t claim any form of compensation.

Thursday, January 2, 2020

What Does The Word Terrorist - 1070 Words

Introduction Many countries around the world are affected by terrorist organizations and continue to terrify audiences far and wide. When examining the word terrorist, it is used as a noun to identify someone who is acting in pursuit of political aims. The person committing the crimes will not call themselves terrorists, for the name terrorist is given by the witnesses and victims – more often public agents, the media – who label the acts of violence as terrorism. Terrorists justify their actions through specular causes, religious causes, and sometimes both. Violence is the key factor that leads us to labeling someone as a terrorist, however the violence is seen as a problem being solved and/or eliminated from society as an act they believe glorifies their beliefs. Through the extended essay, there will not be a sense of justification toward the acts of terrorists, however, an investigation arguing that learned behavior is connected to terroristic violence. Learned behaviors are influenced by internal and external factors. Internal factors affect how the individual behaves depending on what their individual characteristics consist of. Examples of internal factors are genetics, personality, and beliefs. All of these examples alter behavior of people in circumstances. However, internal factors are not the only thing that shaped behavior. Another aspect of learned behaviors is external factors. External factors result in changes of behavior due to outside influences like theShow MoreRelated Terrorism Essay678 Words   |  3 PagesTerrorism Terrorism†¦This is a very common word in today’s society. What does it mean? Or more importantly how do â€Å"we† prevent it and if necessary combat it? The word most commonly used to explain this is counter terrorism, but is also known as anti-terrorism. The military is a great force in combating terrorism with specialist groups in nearly each branch of the armed forces. Prior to the September 11 attacks the United States Armed Forces worked hand in hand with NATO and the United NationsRead MoreIslam and Reality Check Imagine911 Words   |  4 Pageslooks and nasty stares. Passersby look you up and down and sneer. They point when they think you’re not looking. They whisper to their friends about you. You hear the words, â€Å"towel head† and â€Å"terrorist†. Whether you’re a man with a beard and taqiyah (prayer cap) or a woman with a head scarf, it hurts to be treated this way. So why does it happen? Why do so many non-Muslims continuously provoke the Muslims in this country? Why here in the United States, where we have freedom of religion, freedom ofRead MoreTerrorism And Domestic Terrorism836 Words   |  4 PagesTerrorism, a word most people fear, but so often misinterpret. The textbook definition of terrorism is â€Å"the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims†. But how does that compare to domestic terrorism? Domestic terrorism or â€Å"homegrown terrorism† can be defined as â€Å"the committing of terrorist acts in the perpetrator’s own country against their fellow citizens†. Throughout the years, America as a nation has experienced quite a few occurrencesRead MoreReligious Terrorism : Islamic Terrorism1586 Words   |  7 PagesIn other words terrorism is not a good thing. There are numerous types of terrorisms. Some are terrorists for political reasons, some are terrorists for religious reasons, and some are terrorists simply because they are out of their mind. Religious terrorism is one of the fastest growing types of terrorisms today. According to a survey done by the Atlantic, seventy-five percent of Americans think that religious terrorism is a growing, major threat to modern society (Merritt). Terrorist acts basedRead MoreTerrorism is not a derogatory moral classification; rather, it is a mode of warfare1600 Words   |  7 Pagesrecent past. Because of a sweeping generalizations about those that commit act of terrorism, terrorism has been turned into a â€Å"dirty† word to describe people, instead of the act that the word actually defines. Why do people decide to use terrorism as a derogatory moral classification? What causes them to, and how do historical events explain how this term became what it is today, an error of racial stereotyping, and why is it so important that people realize this mistake? Through the points in thisRead MoreThe Argument Against Negotiating With Terrorists913 Words   |  4 Pagesâ€Å"The argument against negotiating with terrorists is simple: Democracies must never give in to violence†1. This for the most part is the official line of most western liberal democracies. The policy of negotiating with terrorists give legitimacy top these violent groups and undermine the actions and methods of other groups who have pursued political change through peaceful means. Peace talks with terrorists can, and have, destabilized the negotiations and undercut international efforts to haltRead MoreReligious Discrimination in Modern Society1233 Words   |  5 Pagesthreatens the freedom of every individual to dress the way that they want, the freedom of expression and the right to practise their religion. We are currently living in a society where basic human rights are violated, and bigots are allowed to dictate what women are allowed to wear and how they should follow their religion. Laws and policies have been passed in countries such as France, banning people from practising their faith in public. It is now illegal to distinguish yourself as a follower ofRead MoreEssay about What is Terrorism, Who Conducts it, and The Intended Target1590 Words   |  7 PagesIn today’s world, terrorism is not an un-known word; terrorism can be tracked back to early recorded history. Nevertheless terrorism definition is universally hard to define (Brown, 2008). Every individual’s definition of terrorism is different some describe it as a strategy and tactic. Another will describe it as sacred obligation, some will say it’s a justified stand against domination. Obviously, it depends on whose point of view is being represented (Brown, 2008). However, AustralianRead MoreEssay on The Terrorists Attack on the World Trade Centre in New York1205 Words   |  5 Pages The terrorists attack on the World Trade Centre in New York on September 9, 2001 which changes the western concept about Islam and Muslims. Moreover, Islamic concept â€Å"Jihad† is criticized and it is questioned among Non-Muslims. 9/11 attack not only effects non-Muslims but also the Muslims who have no connections with the terrorist groups. As well as they do not support these terrorism. These Muslims face the hatred of the non-western people. They feel guilty about the Sin, they neitherRead MoreTerrorist And Freedom Fighter By Steven Handel814 Words   |  4 PagesTerrorist and Freedom fighter can be separated through there definition, but not through there synonyms that clarify an unjust distinction. It is a mentality that majority of American’s apply whether they realize it or not. Individuals according to Steven Handel believes that we implement â€Å"The Us vs. Them Mentality† by extension elaborates the mentality that individuals for instanc e, Americans, give people who are different than us through race, gender, age, nationality, culture, religion, or socioeconomic