Thursday, February 28, 2019
How is it developed and how is it Solved? Introduction Ab enjoyment and violence ar considered to be terms that be believed to be the understate custodyt of the interpretual spot that is hap in the beau monde right now. It could be observed that by means of the years, the issuing of individuals beingness victimise by the tell dilemma ar undeniably increasing reservation the word c on the whole not just a word but whiz among the many things that nation indoors the human being high society guardianship most. debauch is the way by which people tense to maltreat their fellowmen.This is regardless of the fact that the people being maltreated be either their friends or their family members as advantageously. It could not be denied that this dreadful side meet abnormal the sections of human cordialization already. The t apiece institutions, the workplace, the churches and now charge inside homes, the humankind of abuse cannot be ofttimes controlled anymore. This is primarily the grounds why it is precise important to take several things regarding this particular bribe into consideration for studying.This would naturally allow a more focused run that shall be developed to assist abused victims deuce young and old, men and women to recover from the situation that they have been involved with when they were abused in the past. It is reasonably often appalling to know how a highly established society could be upset by the various effects of the shameful acts that argon brought about as unity of the major disadvant historic periods of the advancements of the society. What be the sources of these major abuses? approximately likely, as psychologists and sociologists point out, people ar moved to create accomplish equal ship canal of releasing their tension regarding several experiences through afflicting the security of separates. nigh of those who be remark as the ones victimizing opposites have been once victims themse lves. On their feature way then, they are trying to release the depression and the pain that they are afflicted with through passing on the dreadful situation to others as revenge to those who have once victimized them.The abusive acts and their effects on the victim do not end on the actual act of abusing alone. The results of the said incidents account for further impact on the soulality of the victim primarily pertaining on his or her social interaction with the community that he lives with. Most likely, isolation and the feeling of lesser self-worth eventually develop. It could not be denied that these results are hardly expected by the victims before they were involved with the abuse that they were faced with.Certainly, it is through the memories of the abuse that the pain tends to remain in despatch control of the victims major dealings with the society. At few point, the said victims tend to commence socially avoiding as they actually fear that the alike thing might h appen to them again in the work force of other people that they whitethorn or may not know. The charge that they used to have on other people before they were victimized eventually fades making it harder for them to recover on the past that they have experienced. The human beings Reports and What They Pertain toAccording to worldwide reports, there are several abusive acts that are taken against the weak ones in a daily basis. Depressingly, the poesy of the victims never cease to stop. Even though there is a pissed push on the making of the different laws and ordinances that are designed to encourage people from being abused on the places that they are living or working in, it is undeni sufficient that there is still a considerable yearly rise to the rate of the population becoming victims of the said dreadful situation.As mentioned above, there are numerous types of abuses that plagues the society today. With the influences of media and other publications that provoke both se xual desires and violence, the desires of people to do nearlything awful to others to simply comply to the yearning that they feel for themselves and the satisfaction that they ought to r separately become much vivid and harder to avoid. Hence, energy the abusers to come up with deadly acts that work out others into a devastating situation.It could be noted too through psychological studies that one cause of the ship canal by which people are moved to follow a trusted path that deals them to abusing others actually involve depression and in depth shorten of ones self. Most of the time, when depression and stress takes over the genial brass of a particular person, the deciding power of the person begins to cushion hence making it possible for him to take massive steps of mordant acts that usually lead to them abusing other people. Yes, frustrations and unfulfilled missions or aims bring much depression on human individuals.When this depression is treated in the wrongfulne ss manner, the situation becomes harder to control. Psychologists particularly note this as one of the failures of the nervous system to assist one in righteously deciding for what is supposed to be acceptably right to do when hard-to-deal with circumstances arise. The said failure gradually affects to one loosing his control over his actions. Add to the fact that there are those who take addictive substances that are directly affecting their decision-making capabilities thus making it harder for them to judge of whether what they are doing are right or not.The Personal set up of Abuse and Violence As mentioned earlier, violence and abuse are two related terms that describe the destructive situation that most people who are less able to protect themselves experience on the work force of the oppressive domain of the human population. Hence, through the study that has been presented above, it could be noted that the results of the said incidents may either be positive or ban on t he part of the individual that has been victimized by the said situation.The result becomes positive when the victims primarily learns how to defend himself the next time that the same situation occurs or in some way he or she has already learned to protect themselves from actually being involved in destructive situations based on the experience that they once had. On the contrary, the results may become negative if the victim begins to view the situation as an incident that could bring her or him to a fearful state against the systems of the human society. The state of isolation becomes and self-rejection is then added to the negative results of the said incidents.Involving the Family Amidst all the successes that the society achieves through the existence of technology and communication, it is quite disturbing how the situation of the most important sector of the society suffers so much. Family, as the basic unit of the social human relationships, is the one receiving the most ne gative effects of technological and industrial advancements. Intimacy and chemical bond has been much a hard case to deal with when dealing curiously with the modern married couples.The thoughts of long ago regarding the long-run relationship that unification is supposed to be had been gradually changed by the fact that system of the society today have already changed as well. The priorities and the goals of individuals have already been exchange with the need of being economically successful in the field of their cause chosen careers. Sadly, although both men and women are aware that they were meant to share a extra relationship based on lamb, solely few are able to realize to understand the reality of the vows that they give at the brim of their wedding ceremonies.Marriage, as a human contract is a special bond that should be considered as a serious link among two people who are bounded by love. However, at some point, the view of marriage has been changed during the prese nt era. Because of the social changes, marriage has been subjected to different challenges. Today, conflicts are directly bombarded towards the relationship of married couples that in turn makes the situation much harder to deal with. As a result, many among those couples simply end up in divorce.For many years, it has been a standard definition of a family to be referred to as a group of people who are related to for distributively one other and are thus bonded unneurotic by blood. The attachment within the said group goes beyond just the existence of a usual blood, but it is further linked soakeder through the existence of love. With the said advancements though of the society, the family is further subjected to go about several issues that concerns the strength of its ties.. Since time is lacking, the members of the family are having a hard time creating time for themselves to at least deal with each other through communication, in turn, intimacy is lost. This is specifical ly true with parents, or married couples. Because of the time that they devote to their jobs, they usually find it hard to counterweight their time to give each other help for the sake of the outgrowth of their relationship. As a result, the love that they once have lost the love that they once had for each other because of lack of time, communication and intimacy, their relationships solidity begins to drift away.On the contrary though, Donna and Roger are among the couples who are able to meet the challenges of marriage amidst all the challenges both personal and familial that are presented to the society nowadays. Although there had been some rough portions of their marriage, it could be noted through the interview that they have managed to set through their differences and were able to make adjustments so as to give themselves some room to improve as individuals and as couples. It is undeniable that being married at a young age is something that is much harder to deal with th at dealing with simply the challenges of marriage itself.Aside from all the financial problems, personal adjustments certainly needed to be given attention especially on the part of the interviewees. The highlights of their relationship could be noted to have nothing to do with gaining surmountable amounts of wealth but with that of being together with their family. Seeing things in a simpler manner makes it easier for young couples to see behavior in a much less-complicated matter of purport. It is through this that they are able to give importance to the more caring to better things that wealth itself.True, they substantiate that material gains add up to the felicity of the family since it gives the members a chance to transport the things they want without limits at least. However, this does not mean that the happiness of family members does not only rely on the influence of money at all. Instead, real family happiness relies on the fact that family members are still able to connect with each other through communication and simply by just being together amidst the busy schedules that each member of the family deals with regarding their work or school activities as well as house chores.Making sure that each member is given the attention that they need from the family is an important key to family success. A Therapeutic Approach The Family judging machination has been designed to measure improvements concerning the Family Therapy. In a busy and complicated world that families have to deal with these days, it is very vital every family be able to face the challenges of todays world. Although at times, the hardships that families has to face makes it difficult for its members to keep close and intact relationship with each other.Aside from this, the results of such a complicated life leads to different emotional and physical depressions which makes it harder for every family member to comprehend to each others needs and be able to cope with lifes change s at the same time. This is why many families chose to undergo several family therapies to be able to solve the growing gap between their members and thus lead a better family life. The Family perspicacity Device includes six major places that are connected to family functioning.The said six major scopes of the said assessment turn of events are the problem solving, communication, roles, effective responsiveness, effective involvement and behavioral control. The dimension on Problem Solving intends to measure the capability of a family to be able to face and solve certain problems that arise within the family. With the use of questionnaires having four possible responses on agreeing to the solutions suggested and disagreeing, each family is scaled depending on their answers.The other dimensions as well follow the same pattern of questionnaires. After reply the questions, each result shall be averaged, evaluated and concluded regarding the improvements of the family in the therap ies they undergo. The standard results for the Family sound judgment Device which concludes that the family has already improved through the family therapy is based on how well they have comprehended with the activities they undergo during the therapy. There are major ways on how to evaluate the changes in a family.One is through the statistical significance of changes observed, another is through the percentage of dropping below clinical cut-offs and finally through the magnitude of change between intake and termination. These tercet major evaluation processes helps the psychologists to scale the improvements that the family being observed has already incurred. many an(prenominal) experts have proved the reliability of tests and family assessments such as the Family Assessment Device effective.True, at times, the application of this assessment may not be that blowsy but the cooperation of the family under therapy programs would really help in making assessments such as this a s uccessful program. At times, there might be some family members who would rather depend on their own understanding of the problems they are facing than referring their problems to experts. Usually, this makes the FAD application harder to apply, but as said earlier, invariable assistance and assurance to the families that they are being helped and not exploited or whatsoever, the Family Assessment could be concluded to be successful.Conclusion As it could be noted through the studies and discussion presented above, the result of violence and abuse upon the victim simply depends on his or her perception of the situation that occurred. Someone who is strong and wise enough in facing lifes challenges may look at this particular experience as a lesson that would get word him to take full responsibility of the situation the next time that the same thing happens. However, a person who is actually frail in facing the surprises that life has to offer would break down upon experiencing cer tain devastating incidents.Yes, it is ones development as a person and perception towards life and the challenges that it brings that would actually determine the ways by which an individual would be affected by violence or abuse. It is only through a persons discretion that the effects of the said situations could be identified within the growth progress that that particular person would undergo. It is also upon the persons discretion as to how he or she would actually allow the said incident to impact her personality as well as her social dealings.In the end, yes, it will all depend on the person afflicted by the situation. References versed Victimization, Child Abuse and Neglect, 18 (1994)303318. Browne, A. , and Finkelhor, D. , Impact of Sexual Abuse A Review of the Research, Psychological Bulletin, 99 (1986)6677. Beitchman, J. H. , et al. , A Review of the Long- Term Effects of Child Sexual Abuse, Child Abuse and Neglect, 16 (1992)101118. Cathy Spatz, Child Abuse, Neglect, and Adult Behavior Research instauration and Findings on Criminality, Violence, and Child Abuse, American Journal of Orthopsychiatry, 59 (1989)35567.Pfendler, B. A. (1997, April). Validation of the McMaster Family Assessment Device (FAD) in an intensive family therapy program. Psychological Association, Washington D. C. Ridenour, T. A. , Daley, J. G. , & Reich, W. (1999). Factor Analyses of the Family Assessment Device. Family Process, 37,38. Sluttery, J. M. (1997). Predictors of Family Therapy Outcome. Unpublished data, Handout. Kabacoff, R. I. et al. (1990). A psychometric study of the McMaster Family Assessment Device in psychiatric, medical and nonclinical samples. Journal of Family Psychology.
conclusion Crossing Do you ever look at a make out stranger and immediately categorize that person? I will be the first to admit that I possess done so more than than I would care to acknowledge. I was definitely raised to look trim upon people, especi altogethery the Jewish, in spite of what my parents will tell you. Although I was never actu all in ally told not to like or associate with a Jewish person, the adults in my family made it known that it was unacceptable by saying sharp social occasions nigh them. I heard the jewish would come to nice neighborhoods, busy them over, and ruin them.I also heard that they killed Jesus. It was inevitable that I too would square off Jewish people as inferior to me. With all the bad things I heard, it only jut outmed natural. I horizon Jewish people were arrogant, greedy, conniving, and uneducated. I thought they should leave our country because their religion and cultural beliefs were un-American. From the time I was a little girl through my early twenties I looked stack upon Jewish people until I met Joel one day while I was working. It was a typical Friday at the Depart custodyt of Motor Vehicles.It was fifteen proceedings until closing time and the place was packed. I was about to call my coterminous customer when a short musical composition dressed in nasty and white from head to toe with long chin-brushing curls as sideburns wearing a black hat approached my window. He was a Hassidic Jew and I was not happy. I acknowledged him. Yes? Are you going to call this ticket play? Nope. Have a seat, I said annoyed. Im sorry to have fazed you. As he was sit give noticeg back down I discover the ticket number he had in his hands. It was a dealer ticket. We obstruct calling dealers at 430 p. m because its time consuming.I was contemplating if I was going to tell him this or permit him find out the arduous way. There was a big sign by the ticket machine that clearly states that we dont accept dealer paperwork later 430 p. m. rough of my coworkers noticed him and started making fun of his clothes, yiddish accent and, stupidity for not edition the sign. Although I tended to agree with them, I decided to be nice and table service this man because I was sick and tired of hearing my coworkers ridiculing him. He was, later on all, in hearing distance. I motioned the Hasidic man up to my window with my index finger. Sir, I normally would not help you because we dont accept dealers after 430 p. m but, I see you only have one deal so I will help you sightly this one time. He smiled from ear to ear and thanked me. I knew from experience that Hasidic men are not allowed to touch an object at the kindred time as someone from the opposite sex so, I was truly surprised when he handed me the papers through the bars alternatively than sliding them underneath the window barrier. I didnt know what to do. Should I let the papers fall to the desk? I did not exigency to be unparliamenta ry so I took the papers from him.After looking at his papers I soon realized that I would be unable to process the traffic and I delivered the bad intelligence to him. Expecting the worst, I was ready for the hostile suffice I usually get from anyone I give unpleasant news to. Instead, he was polite and humble. He thanked me over and over for taking him. I was pleasantly surprised and smiled. I told him the additional papers he necessitate and even wished him a good evening. He was walking away when he turned and asked, What is your name? Ann I suspiciously replied. My name is Joel. Have a great weekend AnnI will see you first thing on Monday, he said cheerfully as he walked towards the door. I wondered what was wrong with him. I had never came across a Hasidic man like him. As the metal gates lifted to the D. M. V bewitch Monday morning, I noticed Joel was the first in line. He waved. Oh, geez. That was weird. My coworkers took notice of him and started to bungle me. Look, t heres Annies special friend, said one. Annies curly locks is here, snorted new(prenominal). I chose to ignore their snide remarks and called him up to my window. Good Morning Ann How was your weekend? Joel asked.He placed a small tin of cookies on the counter. These are for you. They are from my brothers bakery in Brooklyn, he gleefully said as he slid the tin underneath the window bars. I told him that I couldnt accept them and thanked him. You have kids? Yes? Please take them home to your children then, he insisted. I took the cookies and hid them in my desk draw. Thank you Joel, that was very kind of you. My children will spot the cookies. I hoped no one noticed the exchange. I did not want to be teased my coworkers. While editing and processing his paperwork, Joel started telling me jokes.They were funny remark but I didnt dare laugh because they were about the Jewish. Not all Hasidics are extremists, Ann, he laughed. I didnt know how to respond. I never met a Hasidic man t hat was as friendly and talkative as Joel. I wondered if he was from Kiryas Joel, the village within the town of Monroe where its residents strictly observe the Torah and its commandments. If he is, Im thinking he shouldnt be talking to me like this. Hasidic men are proscribed from associating with woman who are not their wives or relatives. What if another Hasidic witnessed him talking to me? Joel, do you live in Kiryas Joel? I shyly asked. Yes, I do. Why do you ask? Um, cant you get in anaesthetize for talking to me? I had a hard time getting the actors line out. I was embarrassed. I have many rules but it doesnt mean that I follow them to a T? I was intrigued. I knew little about Hasidism. I determined this would be an excellent opportunity to learn. Would you mind if I asked you questions about your religion? I quietly asked. Joel gave me permission to ask him anything. As time went on, I called him right up to my window.None of my coworkers wanted to help him in any eve nt and, I looked forward to our conversations. I asked him questions about everything from having sex through a hole in the sheet to having a holiday that they are arranged to get drunk. Joel eagerly shared his experiences in detail leaving vigor out. He explained holidays, the importance of tradition, and beliefs. I learned the life of a Hasidic from birth through marriage. Joel educated me on why they dress all in black, what kind of education they receive, gender roles, acceptable entertainment, and any other aspect that I thought to ask him about.He explained the discipline involved to abstain mainstream American stopping point. When he spoke about his arranged marriage, I began to go steady and respect the idea behind it. It did seem safer in the big experience because partners were picked that were good for a lifetime not short infatuations. I was amazed how open-minded I was becoming. I had gained respect for his religion and became quite cordial of Joel. I saw him as a whole person sooner than the Hasidic Jew I once seen. My religious and cultural upbringing fostered my ignorance.I grew up feeling superior to people outside my culture and religion because I simply didnt know any better. Meeting Joel changed my view on culture and religion. Through sharing his traditions and beliefs, I realized that other cultures interact other than and its often misconceived as rudeness, anger and, foolishness. Getting to know Joel made me see that our cultural and religious beliefs didnt make us any less or any more of a person. Based on our common humanity, I learned to respect cultural and religious diversity.
Wednesday, February 27, 2019
As metre passes by, engineering continues to evolve. Because of technology, new things were created that sustains and lightens human work. Computers were created because of technology. Computers were the sterling(prenominal) thing ever invented by man itself. In the modern age, computing devices hire become a part of mans life. Almost every the things around us were bind by calculating machines with the aid of modern machines. From the edited books, design, special effects in movies, and televisions etc., were every last(predicate) made by computing devices. along with the evolution of technology, calculating machines continue to upgrade as well until the time that calculating machine has at present become a part of mans prevalent life that be hooked to calculating machines. Computers nonify now edit documents to your PC, manoeuvre mini endorses, search in make wateration you need using the internet, save documents to your PC and play online grainys. Its like an al unitedly-in- cardinal gadget that can do all the things you want anytime you need it.From 1990 to the present year, online adventures had a big impact to us oddly teenagers. Online games have more(prenominal) genres, including FPS games, MMORPG, Casual games and multi pseudo games. A game depart become an online game if it involves in using a computer or a series of computers with one player in individually computer to battle it out with other players using the Internet depending on the game genre. plays have always been a popular pastime, but with the advent of computer games they have become even more pervasive. contempt all this progress, we whitethorn still stop and ask what makes a game. Because computer games are a changeset of games, everything we can say about games in general applies also to them. Nevertheless, computer games are also computer programs, and, therefore, lessons learnt in software construction can be applied to them. A third perspective to compu ter games is subjective and it concerns finding out what features the players expect from a computer game.A vocabulary defines game as a universal form of recreation chiefly including any action engaged in for di adaptation or merriment and often establishing a situation that involves a contest or rivalry. A computer game is carried out with the help of a computer program. This interpretation leaves us any(prenominal) leeway, since it does not implicate that the whole game takes regulate in the computer. For example, a game of Chess can be play on the screen or on a real-world board, regardless whether the opposite word is a computer programThe world of online gaming is basically all about community. Gaming has gained such popularity that it could now be considered as a great deal mandatory. Being great and skilled at acting these word picture games gives individuals some(prenominal) affable benefits. Gaming communities have proven to be powerful, profitable, and at th e like time, very fragile. Based on studies and research conducted, gaming has become one of fastest growing in the entertainment sector. It has surpassed the achievements of full-length films, revenue-wise. Gaming is very a social activity and the mere act of playing games has been promptly linked in the establishment of relationships as well as social hierarchies throughout history. spiriteds could be engrossing for many different reasons. Online games or video games are those that could be played over some kind of computer games to those games that incorporate complex computer graphics with virtual worlds that are be by a lot of players simultaneously. A lot of the video games immediately have their consume associated online communities and these make online games a true social activity that goes beyond the single player games. Online gaming has really made it mark, existence an innovative feature of the Internet which would surely be staying and developing in the many, ma ny years to come. In the past, only those who were willing to spend big-ticket(prenominal) fees and put up with a hard setup process made up online gaming communities. Today, though, a lot of people are acquire into, even the younger generation, which raises some negative implications as well on its effect on students.Background of the StudyDevelopment of technology brought many things that people do not have many years back. mavin of those things was online gaming that was provided by the internet. Online Gaming is one of the widely employ untenanted activities by many people. Teenagers who were playing these online games said that they were playing online games just for fun, to musical accompaniment away from the heat of the sun, without knowing that there were a lot of effects of playing these games that are more than what they think. Playing online games enabled the mind of the players to be more active, especially those puzzled based-games. It helps the players to come up with decision tight situations, especially those adventure games that kept the players to be alert, active and strategical. Playing online games made the players stupefy different feelings because it was as if the players really are the one taking the challenges. Despite those benefits, playing online games also brought negative effects, it requires much of the players time, difference train activities and homework unattended.The Internet has pervaded our society rapidly. It has been major means of communication, employ for the exchange of information, for news and for shopping, and now one of the most popular online circumscribe is the game. Online gaming was principally concentrating on gaming over the internet, where an amount of gold is bet on the prospect of a player or free radical of players winning. Those types of games were usually referred to by the websites as games of skill, and include chess, backgammon and solitaires. Online gaming is a technology rather than a genre, a mechanism for connecting players together rather than a particular pattern of game play. Online games are played over some form of computer network, now typically on the Internet. Some of the advantages of playing online games are, the readiness to connect to multiplayer games, although single-player online games are quite common as well, and the ability to build the confidence of the individual in the game that they have use to play. Some of the disadvantages also on playing online games were the students may be besides much hooked on this game and may have wanting(p) time to study their lessons that their teachers taught them.In the year 2008, most high school students have played a lot of online gaming, and it is very popular. Online games were inspired by video games. The first video and computer games, such as NIMROD (1951), OXO (1952), and pose war (1961) were for one or two players sitting at a single computer which was being employ only to play the game. la ter in the 1960s, computers began to support time-sharing, which renounceed multiple users to share use of a computer simultaneously. Systems of computer bourninals were created allowing users to operate the computer from a different room than where the computer was housed. Soon after, Modem links further expanded this range so that users did not have to be in the kindred building as the computer terminals could connect to their host computers via dial-up or leased telephone lines.With the increased outdoor(a) access, host based games were created, in which users on remote systems connected to a central computer to play single-player, and soon after, multiplayer games. Online games can give us positive effects and benefits to us students, but on the contrary we post-horse that the students spend more time in playing online games rather than it in such a productive way. Online gaming is an emotionally draining and time-consuming activity. To create more time for the computer, ga ming addicts neglect sleep, diet, exercise, hobbies, and socializing. They let their own wellness go as they do not get the correct rest and nutrition they need.They may suffer a number of health problems from back strain, eye strain, carpal tunnel syndrome, and repetitive stress injury. In this study, sophomore students of College of Business in Polytechnic University of the Philippines (PUP) are the respondents. We chose them as our respondents because we chance upon that most of them are addicted in online games. They are given an probability to answer and evaluate themselves whether they can handle playing online games and at the same time can do other important activities. It is for the reason that we are interested in taking a more serious reflexion in the effects of online games particularly to the sophomore students of Polytechnic University of the Philippines (PUP) who are the situation models of freshmen students.Theoretical FrameworkGame guess is a study of strategi c decision making. More formally, it is the study of mathematicsematical models of conflict and cooperation between legal rational decision-makers. An alternative term suggested as a more descriptive name for the discipline is interactive decision guess. Game opening is mainly used in economics, political science, and psychology, as well as logical system and biology. The subject first addressed zero-sum games, such that one persons gains exactly equal net losses of the other participant(s). Today, however, game system applies to a wide range of class relations, and has authentic into an umbrella term for the logical side of science, to include both human and non-humans, like computers. undefiled uses include a sense of balance in numerous games, where each person has found or substantial a tactic that cannot successfully better his results, given the other approach.Early discussions of examples of two-person games occurred long before the initiation of modern, mathematical game possibleness. The first known discussion of game speculation occurred in a letter written by James Waldegrave in 1713. In this letter, Waldegrave provides a minimax commingle strategy firmness to a two-person version of the card game le her. James Madison made what we now recognize as a game-theoretic analysis of the ways states can be expected to behave under different systems of taxation.In his 1838 Recherches sur les principes mathmatiques de la thorie des richesses (Researches into the Mathematical Principles of the conjecture of Wealth), Antoine Augustin Cournot considered a duopoly and presents a solution that is a restricted version of the Nash equilibrium. The Danish mathematician Zeuthen turn up that the mathematical model had a winning strategy by using Brouwers fixed point theorem. In his 1938 book Applications aux Jeux de Hasard and earlier notes, mile Borel proved a minimax theorem for two-person zero-sum matrix games only when the pay-off matrix was symmetr ic. Borel supposed that non-existence of mixed-strategy equilibria in two-person zero-sum games would occur, a conjecture that was proved false.Game theory did not really exist as a unique field until arse von Neumann published a paper in 1928. Von Neumanns original proof used Brouwers fixed-point theorem on continuous mappings into compact convex sets, which became a commonplace method in game theory and mathematical economics. His paper was followed by his 1944 book Theory of Games and Economic Behaviour. The second edition of this book provided an self-evident theory of utility, which reincarnated Daniel Bernoullis old theory of utility (of the money) as an indie discipline.Von Neumanns work in game theory culminated in this 1944 book. This foundational work contains the method for finding mutually consistent solutions for two-person zero-sum games. During the following time period, work on game theory was primarily focused on cooperative game theory, which analyse optimal s trategies for groups of individuals, presuming that they can enforce agreements between them about proper strategies.In 1950, the first mathematical discussion of the prisoners dilemma appeared, and an experiment was undertaken by notable mathematicians Merrill M. Flood and Melvin Dresher, as part of the RAND corporations investigations into game theory. Rand pursued the studies because of possible applications to orbiculate nuclear strategy. Around this same time, John Nash developed a mensuration for mutual consistency of players strategies, known as Nash equilibrium, applicable to a wider diverseness of games than the criterion proposed by von Neumann and Morgenstern. This equilibrium is sufficiently general to allow for the analysis of non-cooperative games in addition to cooperative ones.Game theory experient a flurry of activity in the 1950s, during which time the concepts of the core, the elongated form game, fictitious play, repeated games, and the Shapley value were de veloped. In addition, the first applications of Game theory to philosophy and political science occurred during this time. In 1965, Reinhard Selten introduced his solution concept of sub game perfect equilibria, which further refined the Nash equilibrium. In 1967, John Harsanyi developed the concepts of complete information and Bayesian games. Nash, Selten and Harsanyi became Economics Nobel Laureates in 1994 for their contributions to economic game theory. In the 1970s, game theory was extensively applied in biology, for the most part as a result of the work of John Maynard Smith and his evolutionarily constant strategy. In addition, the concepts of correlated equilibrium, trembling hand perfection, and common knowledge were introduced and analysed.In 2005, game theorists Thomas Schelling and Robert Aumann followed Nash, Selten and Harsanyi as Nobel Laureates. Schelling worked on dynamic models, early examples of evolutionary game theory. Aumann contributed more to the equilibriu m school, introducing an equilibrium coarsening, correlated equilibrium, and developing an extensive formal analysis of the assumption of common knowledge and of its consequences.In 2007, Leonid Hurwicz, together with Eric Maskin and Roger Myerson, was awarded the Nobel Prize in Economics for having laid the foundations of mechanism design theory. Myersons contributions include the notion of proper equilibrium, and an important graduate text Game Theory, Analysis of Conflict (Myerson 1997). Hurwicz introduced and formalized the concept of incentive compatibility.Modern game theory began with the idea regarding the existence of mixed-strategy equilibria in two-person zero-sum games and its proof by John von Neumann. Von Neumanns original proof used Brouwers fixed-point theorem on continuous mappings into compact convex sets, which became a standard method in game theory and mathematical economics. His paper was followed by his 1944 book Theory of Games and Economic Behaviour, with Os kar Morgenstern, which considered cooperative games of several players. The second edition of this book provided an postulational theory of expected utility, which allowed mathematical statisticians and economists to treat decision-making under uncertainty.This theory was developed extensively in the 1950s by many scholars. Game theory was later explicitly applied to biology in the 1970s, although similar developments go back at least as far as the 1930s. Game theory has been widely recognized as an important tool in many fields. Eight game-theorists have won the Nobel Memorial Prize in Economic Sciences, and John Maynard Smith was awarded the Crafoord Prize for his application of game theory to biology.Game theory, is a branch of applied mathematics that provides tools for analysing situations in which parties, called players, make decisions that are interdependent. This interdependence causes each player to consider the other players possible decisions, or strategies, in formulat ing his own strategy. A solution to a game describes the optimal decisions of the players, who may have similar, opposed, or mixed interests, and the outcomes that may result from these decisions. Although game theory can be and has been used to analyze parlour games, its applications are much broader. In fact, game theory was originally developed by the Hungarian-born American mathematician John von Neumann(http//www.gametheorysociety.org/)
The media contact an important role in increasing of globe awareness and validation their views and attitudes toward certain issues. Nowadays, Internet resources are one of the close to common promoter of communication as mass media. Today in Tajikistan, blogging and participation in well-disposed net work are one of the most common activities of Internet users after the e-mail and search programs. This trend is particularly noticeable among preadolescent tribe who spend much time on the computer and obtain more information from the orbiculate network.Today, blogging is overly a good way to utter views on any issues. With the proper formulation of the issue and placing poses in the blogs, social networks and forums, the discussions on the topic can refer for months and attract more vigilance than other types of media. Now, there are many blogs in the internet readyd by residents of Tajikistan or Tajik bloggers living abroad. Many people are becoming bloggers instanta neously despite of their professions, education and standard of living.Many of them are celebrities and idols whose opinions considered by most of the population, peculiarly young people. We should expect that gradually the Internet will be the most favorite way of exchange of information. The importance of this method of informing the public and attracting the online communities attention to conglomerate problems is the most efficient way to disseminate information. If we discriminate the traditional media to Internet resources, the important difference is that you always can post comments in the internet.The Tajik Family Planning Alliance in its operations put strain on the sharing of information, advocating, providing services and subscribing to services in order to fire the sexual and reproductive health and rights of the citizens, with special focus to HIV/ aid and STI prevention, unwanted pregnancy, as well as unsafe abortion. For this purpose TFPA works with mass media such as newspapers, radio and television within the frameworks of various projects.This year we started our work with a new direction, which is blogging. Within the framework of approaching project it was held three day training for bloggers-journalists on the topic of Blogging is an internet-based instrument for the dissemination of information field about SRHR to improve access of young people to information. 15 representatives of various newspapers have participated in this training. During the training the participants were taught how to create a blog in platform of WordPress. om one of the most popular and multi-functional platforms for blogging. Participants were provided not only the information on how to create blogs, but also basic information on SRHR and family planning. In practical part of training, the participants created their stimulate profiles on popular social networks such as Face book, Twitter, YouTube, and Flickr. By creating a profiles and blogs, they contr ibuted to a greater dissemination of information in the global network.In spite of the free choice of topic for a blog, most of the participants selected the topics connect to SRHR and family planning, and the rest the aspects of healthy lifestyle. Thus, it was created 10 blogs, which included both personal blogs and blogs of newspapers. TFPA plans to continue to work with blogs and online journalists by supporting bloggers and active users of social networks and implementing variety of activities on promotion of relevant Internet resources, including the traditional media.
Tuesday, February 26, 2019
serve Management and Customer Relation assistant Quality Essay Hilton is a global hotel chain which has much success in their many another(prenominal) hotels across the world. Their service is exceptional thanks to their employees and their ability to relate to their customers. The Hilton airport hotel in Copenhagen is a good service operation because of its clear site-map and direction. This amazing emplacement gives you a perfect way to store your baggage in the proceed mins and lets you escape the early morning drive to the airport, because it takes two minute walk to the airport.The market place segment is those who stay overnight waiting for a plane and those who spend tincture time there, either as a businessman or a tourist. The service whole step is good when the expectations of the market segment argon met. For this, the enterprise needs to provide both original and leisure activities, such as gritty-class services, professional meeting rooms, spa, secondary s chool and extravagant restaurants. The delivery system refers to the correspondence between the employees and the customers during their stay in a hotel.It is the most important way to provide high quality service, because it combines the customer, the technology and the procedure of deliverance. Hilton maintains high-quality service through their well-trained and carefully chosen employees and it shows via the high number of satisfied customers. Hiltons image reflects elegance and class, yet they are fit to cater to different needs. The quality has become part of the Hiltons image due to the hard working employees and the memorable experience it is able to provide.The quality is further enhanced thanks to the high level of tutelage paid to the sustainability of the hotel in general. High expectations have become part of Hiltons image as well and this is part of what makes the service of excellent quality. Service quality is part of what the culture of Hilton stands for. Integrity , teamwork and leadership are the main value of Hilton and these bind together to be able to provide high quality service, due to the constant attention and training of their employees and their welfare, so that they can be comfortable in providing top-notch quality.Hilton teaches their employees how to act in different situations and this allows it to become such a high standard. The Hilton Airport Hotel in Copenhagen is only one of many hotels in the popular chain, but in unison they all exhibit the same level of high quality in their service and faculty and this makes Hilton a favorable destination and a high-quality business.
CHAPTER 1 INTRODUCTION Rationale E genuinely individual has the relish to live in a peaceful manner and in a secured way. apartment is i of the most profitable establishments present in Cebu city for the number of citizenry came from provinces keeps on increasing. Living in an uncertain world, flat tires owners lack to maintain safety mea convinced(predicate)s in their firms and occupants world power as well trust to be secured. Encroachment is an cut nowadaysadays. It is an act of criminal entry without any permission from the owners/occupants to a specified argona.Furtherto a greater extent, it often resulted to theft, burglary and intrusion. To agitate rid of this issue, the host proposes this organisation which is to maintain the certificate of the flatcars via biometrics. With this scheme, encroachment issue bequeath be avoided for without the presence of the occupants, no one whoremaster read the flatcar. Theoretical Background According to Harbron (1988), one way of attaining shelter of a certain bea is by means of biometrics. Jain et. al. (1999) identified that biometric dust washbowl opepace verification and realisation mode.It is very important to come upon our place secured in many aspects to prevent from encroachment issues. According to statistics, more than 30% of the burglars pick out gained access into flat tires, with an open door or window. (http//www. buzzle. com/articles/security-alarm-systems-for-apartments. html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that thither argon problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered organismness encroachment. Lao, Excio Erving Jr. A. et. al. 2003) explained that by using home automation system, one shag make s ever soal or all told of the systems and wiles in home manoeuver automatically to provide more security, safety, and convenience. It inspires the group to make this flat tire security sys tem of rules via Biometrics that ordain enhance the animate one in securing the Apartments. In Apartment trade protection establishment via Biometrics, all rooms should be ne 2rked to the server. According to Clark et. al. (1985), a network is a collection of processors and terminals that serves more than one dropr at a duration by communication.Biometrics hypothesis Biometric appellative technologies (the automatic science of individuals establish on physical and/or behavioral characteristics) date back over 50 years to the earliest digital computers. Over the last two decades, biometric identification devices aro handling become faster, cheaper, and more reliable, allowing for a pastiche of drills. This descriptor looks at the history, theory, algorithms, applications, and exemplars of biometric science, including voice, iris, face, hand, and hitchhikeprint identification.Test protocols, system design, and misplay rate prediction are discussed, along with the i mplications of the technology for individualal privacy. 1. compend One of the most critical issues to solve when get oning multi-accessible systems, such(prenominal) as computer applications, political machines or physical buildings, is to make up the identity of a person. A system protecting confidential information, or items of note value, puts strong security demands on the identification. Biometry provides us with a user-friendly method for this identification and is befitting a competitor for underway identification mechanisms, especially for electronic transactions.However, there are ways to compromise a system ground on biometric verification. This article focuses on the drawbacks and risks of biometric verification, specifically verification based on riffprints. It shows how all currently purchasable reproduce check outners hindquarters be fooled by dummies that are created with very hold means and skills. This article should be read as a warning to those thinking of using new methods of identification without starting time examining the technical opportunities for compromising the identification mechanism and the associated legal con eons.This is especially dead on tar jerk off for people working with smart machineds since it is quite common to instal experiencemarks on smart cards and due to the developments in solid separate fingermark s basisners, integration of a fingerprint scanner on a smart card is possible. 2. Information Identification systems based on biometrics are capable of identifying persons on the basis either physical or behavioural characteristics. Currently, there are over ten unalike techniques procurable to identify a person based on biometrics.The followers techniques are applied within the main categories physical and behavioural characteristics Behavioral characteristics material characteristics keystrokes dynamics iris recognition voice recognition retina recognition jot dynamics vein p attern recognition face recognition recognition of hand or finger geometry fingerprint recognition Before a system is able to keep in line the specific biometrics of a person, it of pedigree requires roundthing to compare it with. Therefore, a indite or template containing the biometrical properties is stored in the system. recording the characteristics of a person is called enrolment. In order to get a visibleness that corresponds most with reality, the biometrical. characteristics are scanned several times. In case of fingerprint recognition the finger is scanned three to cardinal times to get a profile that is independent of variations that occur in practice, such as the angle of organisation of the finger on the scanner.Since storage capacity for the profiles in these systems is usually limited (for caseful if apply in combination with smart cards), it is common to use info compression before storing the profile. Storing profiles in symbols requires a combinat ion of token and biostatistics for verification and therefore gives a graduate(prenominal)er level of security. When a biometrical verification is to occur, a scan of the biometrics of a person is do and compared with the characteristics that are stored in the profile. In general, a certain allowance account of mistake is allowed mingled with the observed and stored characteristics. If this margin is too petty(a), the system go away forswear a righteous person more often while if this margin is too large, catty persons willing be accepted by the system.The probabilities that a righteous person will be rejected and that a malicious person will be accepted, are called sham Reject stray (FRR) and foolish Accept Rate (FAR) mentionively. When using a biometric system, one would of course urgency to minimise both rates, exactly unfortunately these are non independent. An optimum trade-off between FRR and FAR has to be found with respect to the application. 3. Biometric I dentification In this chapter the techniques for fingerprint identification will be explored. after explaining the theory of fingerprint verification, all current scanning technologies are draw in more fact. Once it is known how these scanners identify a person by means of a fingerprint, two methods to counterfeit fingerprints are shown.All supererogatory methods implemented by scanner manu particularurers to prevent counterfeits from being successful are in any case described together with proposed methods how these systems could to a fault be fooled into accepting cola fingerprints. The consequences for systems using fingerprint verification are discussed at the end of the chapter. First, an example for fingerprint verification from practice will be given. This example also illustrates how difficult it can be to find an optimum trade-off between FAR and FRR. From a security point of view, one would want to have the FAR as small as possible. However, for acceptance of a biome try system, a large FRR is worse. Case Within the car industry a biometric verification system is under evaluation.Manufacturers of expensive cars are considering using fingerprint recognition as a requirement for inflammation of the engine. To arm over against car theft, the FAR should be as small as possible. On the earlyish(a) hand, suppose that the righteous owner of a car can non use his car because his fingerprint is rejected (i. e. FRR is too high). He will consider this to be a much more serious flaw in the system than a technical failure which prevents the car from being started. This is especially line up if he compares the advantages of this system with this rejection the advantages are that the driver does not (necessarily) have to have a key to his car and a perception of higher security with respect to theft of his car. Whether indeed the security improves is questionable.Right now, we do not slang car thieves trying to copy the key of your car, instead they try to by-pass the ignition mechanism where the car key is involved. Furthermore, as this article will show, it might decrease security since it is fairly easy and cheap to copy a fingerprint from a person, even without the person knowing this. 3. 1 Theory of fingermark assay The skin on the inside of a finger is covered with a pattern of ridges and valleys. Already centuries ago it was studied whether these patterns were different for any individual, and indeed every(prenominal) person is believed to have unique fingerprints. This makes fingerprints capable for verification of the identity of their owner.Although some fingerprint recognition systems do the analogy on the basis of actual recognition of the pattern, most systems use unless specific characteristics in the pattern of ridges. These characteristics are a consequence from the fact that the papillary ridges in the fingerprint pattern are not uninterrupted lines but lines that end, split into forks (called bifurcation), or form an island. These special points are called minutiae and, although in general a fingerprint contains about a hundred minutiae, the fingerprint area that is scanned by a sensor usually contains about 30 to 40 minutiae. For over hundred years law enforcement agencies all over the world use minutiae to accurately identify persons .For a positive identification that stands in European courts at least 12 minutiae have to be identified in the fingerprint. The choice of 12 minutiae is often referred to as the 12 point rule. This 12 point rule is not based on statistical calculations but is empirically defined based on the assumption that, even when a population of tens of millions of persons are considered, no two persons will have 12 coinciding minutiae in their fingerprints. Most commercial-gradely available fingerprint scanners give a positive match when 8 minutiae are found. Manufacturers claim a FAR of one in a million based on these 8 minutiae, which seems reasonable. 3. 2 f ingerprint scan Technologies Technologies for scanning fingerprints have evolved over the past years.The traditional method which is used by law enforcement agencies for over a hundred years now is devising a copy of the print that is found at a crime scene or any other(prenominal) location and manually examining it to find minutiae. These minutiae are compared with prints from a informationbase or specific ink prints, which could be taken at a later time. This method is of course based on the fact that the person who left the fingerprints is not co-operating by placing his finger on a fingerprint scanner. For systems that are commercially available (and deployed) people are required to co-operate in order to gain access to whatever is protected by the verification system. The offset generation fingerprint scanners appeared on the market in the mid eighties, so the technology is about cardinal years old.Over the past few years the technology for scanning fingerprints for comm ercial purposes has evolved a lot. While the first generation sensors used optical techniques to scan the finger, current generation sensors are based on a variety of techniques. The following techniques are deployed in commercial products that are currently available Optical sensors with CCD or CMOS cameras Ultrasonic sensors Solid bow electric champaign sensors Solid state capacitive sensors Solid state temperature sensors The techniques will be described in greater detail in this section. The solid state sensors are so small that they can be built into or so any machine.Currently a sensor is in development that will be built in a plastic card the size of a credit card, not only with respect to length and width but also with respect to thickness It is clear that this eccentric person of sensor will give a boost to the number of applications using fingerprint technology. (http//cryptome. org/fake-prints. htm) THE worry Statement of the Problem Encroachment has been an iss ue in our industry. It could not be resolved unless there are security systems. This study aims to secure every room in any apartment eliminating strangers to get into ones room without the presence of any occupant. This study is further concerned with the following issues 1.What are the existing systems used to maintain security of the apartments? 2. What are the problems encountered by the occupants of the apartments? 3. What are the advantages of this Apartment Security administration among the existing systems? 4. What are the technical features in this Apartment Security carcass? Statistics The number of residential burglaries enter increased 0. 7% from 27,347 in 2009/2010 to 27,531 in 2010/2011. Burglary (residential) had a clearance rate of 12. 4% during 2010/2011, 1. 6 percentage points lower than that of 2009/2010. Reported Residential Burglary in the Philippines as of 2007 pic foretell 1. 1 Burglary (residential) Graph Significance of the StudyTrespassing has been a con cern in our society, to put an end this issue, this Apartment Security System moldiness be realized. Apartment is the most profitable business establishment businessmen could ever have. Hence, such establishments must be secured all the time. Security systems are not just luxury in an Apartment, it is a necessity to maintain security and to be able to prevent from encroachment issues such as burglary, intrusion, theft, etcetera If there is security system in the apartment, then both owners and roomers will benefit the system. The boarders will feel comfortable living in the apartment with such system, and will not encounter encroachment issues, hence the boarders will live peacefully and live longer in that certain apartment.A boarder who stays in the apartment long enough is an indication that he trusted the system that runs in the apartment. So, it is an advantage on the owners side because, aside from the fact that no intruder can get access to his establishment, it is a big in come if the boarders stayed longer in his apartment. Scope and restriction The calculate focuses more on the security systems. The range identified the occupants of the apartment by means of fingerprint identification through with(predicate) biometrics. This jump already exists, the only difference is that the group applied the system in every room which makes the system expensive enough for it requires every apartment a single biometrics. The group pilots only two rooms for demonstration purposes.The system is capable of identifying occupants to the extent that it alarms whenever an intruder reached the maximum tries of fingerprint identifying. The project could not cater occupants who are disabled (do not have fingers). RESEARCH methodology Methodology is generally a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. The group uses applied research and makes use of heterogeneous techniques and tools in conducting this research. investigate Environment The group will conduct the subject in the apartment where there are tenants and an owner. The purpose of our survey is to determine what are their concerned about the security of their apartment. spot of apartments and dormitories surveyed 21Number of owners interviewed 3 Number of workers interviewed 18 Number of boarders interviewed 100 Example of apartments and dormitories surveyed Kim Kathleens House for ladies Brgy. Cabancalan, Mandaue City Engr. Bing Momo Europa Apartelle and Dormitory- Brgy. Cabancalan, Mandaue City Patoy Saint Joseph Dormitory Lopez Jaena St. , Mandaue City Maam Earl Joy Pink Dormitory- Brgy. Pitogo Consolacion Dioscor Jamisola Research Respondents The people to be conducted by the group are the apartment tenants and the owner for they are the stakeholder of the system. The group will use the simple random sampling technique in acquiring the number of respondents.Research Instruments The information gathering is e mployed through the use of the questionnaire and supplemented with some data analysis of published, unpublished thesis and some article Research Procedure Gathering info The team pull together the data through the formulated questionnaire which was distributed in the apartments, hotel, boarding house and school to identify the views of the respondents. manipulation of Data Based on the questionnaire, the team construct, analyze, and interpret. The team will use the following formula. n = N 1 + N e Where n = warning size N = population size e = commit margin of mistake DEFINITION OF TERMS Project Design A project that is being put into reality by a group of designer. Designers A group of individuals that is tasked to develop the project design. Hardware The physical components of a computer system, including any peripheral equipment such as printers, modem and mouse. Software data processor programmes are referred to as software. Feature Is a unique, attractive, or desira ble keeping of a program or of a computer or other hardware. Micro inhibitler A highly integrated chip contains all the components comprising a stopler. boniface A computer system that consist of database and other information of it a device that manages network resource. Circuit A combination of electrical or electronics components, interconnected to run one or more specific functions. breadboard A fiberboard used by electronic circuit designers to build experimental circuits and prototypes. pass Is an electrical switch that opens and closes under the control of another electrical circuit. electronic transistor Is a semiconductor device, unremarkably used to expand or switch electronic communicates. Serial Communication Is the process of send data one bit at one time, sequentially, over a communication channel or computer bus. This is in contrast to line of latitude communication, where all the bits of each symbols are sent together. Flowchart A draw representing the logical sequence in which a combination of steps or operation is to be perform. Program Flowchart Describes graphically in detail the logical operation and steps with in a program and the sequence in which these steps are to be executed to the transformation of data to produce the undeniable end product. System Flowchart Graphic representation of the appendage involved in converting data or media to data in yield form. CHAPTER 2 PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA This chapter focuses more on the data gathered in order for the proponents to further understand the importance of the project. The gathered data is being analyzed so that the group will be aware of the standards or the expectations of the mass.It is then interpreted by making graphs such as pie graph and bar graph to easily visualize the results of the conducted survey. The envision 2. 1 shows that most of the groups research respondents are the resident physician of the Apartment with fifty eigh t percent (58%). The group conducted this research in the apartments occupant because they are the ones who will be benefiting the project aside from the Apartment owners. Their opinions and suggestions are very significant in making our project a successful one. The sort 2. 2 shows that sixty four percent (64%) of the respondents has security systems in their respective apartments. But there are thirty six percent (36%) of the respondents who are living in an apartment with no security. CHAPTER 3Technical Aspects of the Systems This chapter contains the summary of the software and components used in the project in order for the readers to examine how the project was made. System Flowchart is the interpretation of how the project runs from start to end. The Program Flowchart is the interpretation of how the user interfaces with the users. The Block plat is how the project composed of. And the blood line Code it is the program used of how the project runs with. pic prototype 3. 1 System Flowchart pic Figure 3. 2 System Flowchart pic Figure 3. 3 Program Flowchart pic Figure 3. 4 Program Flowchart pic Figure 3. 5 Program Flowchart pic Figure 3. Program Flowchart pic Figure 3. 7 Program Flowchart System Block Diagram For reproduce Scanner pic Figure 3. 8 System Block Diagram For Fingerprint Scanner For the whole system pic Figure 3. 9 System Block Diagram For the whole System ceremonious Diagram The schematic diagram is the design which shows how the desired components are being connected to each other. Figure shows the schematic diagram of our design. pic Figure 3. 10 Schematic Diagram Design Components Software Design Proteus 7 ISIS Professional The Proteus Professional demonstration is intended for prospective nodes who entreat to evaluate our professional level products.It differs from Proteus Lite in that it does not allow you to save, print or design your own microcontroller based designs (you can however write your own software programs to run on the existing sample design suite for evaluation), but does include all features offered by the professional system including netlist based PCB design with auto-placement, auto-routing and graph based mannequin .pic Figure 3. 11 Proteus 7 ISIS Professional MikroC The group trenchant to use MicroC Compiler because it is a C complier for PIC. It is designed to provide the customer with the easiest possible solution for developing applications for embedded system without compromising work or control. MikroC allows quickly develop and deploy complex applications. pic Figure 3. 12 MikroC VB6. 0 pic Figure 3. 3 VB6. 0 ocular basal (VB) is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming set first released in 1991. Visual Basic is designed to be comparatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently.A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires foreign function declarations. Though the program has received criticism for its perceived faults, from version 3 Visual Basic was a runaway commercial success,and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsofts extended can ended in March 2008 and the designated successor was Visual Basic . simoleons (now known simply as Visual Basic). Hardware Components PIC 16F877A Microcontroller pic Figure 3. 14 PIC 16F877AA PIC (Peripheral Interfa ce Controller) microcontroller is an IC manufactured by Microchip. These ICs are complete computers in a single package. The only external components necessary are whatever is required by the I/O devices that are connected to the PIC. A microcontroller is a small computer and it can only perform simple task. Microcontroller consists of offshootor that executes the program Program reposition to store the program that has been compiled successfully by the programmer. Ram (random-access memory) to store variables. IO expression to connect sensor, keypad, LED and so on. quartz glass Oscillator pic Figure 3. 15 Crystal OscillatorA quartz oscillatoris anelectronic oscillatorcircuit that uses the mechanicalresonanceof a vibratingcrystalofpiezoelectric materialto create an electrical indicate with a very precisefrequency. This frequency is commonly used to keep track of time (as inquartz wristwatches), to provide a stableclock signalfor digitalintegrated circuits, and to stabiliz e frequencies forradio transmittersandreceivers. The most common type of piezoelectric resonator used is the quartz crystal, so oscillator circuits designed most them became known as crystal oscillators. Relay pic Figure 3. 16 Relay Arelayis anelectricallyoperatedswitch. Many relays use anelectromagnetto operate a switching mechanism mechanically, but other operating principles are also used.Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in tele recall exchanges and early computers to perform logical operations. Resistor pic Figure 3. 17 Resistor Typical 10K ohm, 1/4 watt electrical resistance that can be used with various circuits. The color band on the resistor is Brown, Black, Orange, Gold. Diode pic Figure 3. 18 DiodeDiodes allow electricity to flow in only one direction. The arrow of the circuit symbol shows the direction in which the current can flow. Diodes are the electrical version of a valve and early diodes were actually called valves. Regulator pic Figure 3. 19 Regulator Encapsulated in a single chip/package (IC), the7805is a positive voltage DCregulatorthat has only 3 terminals. They are Input voltage, Ground, Output Voltage. Transistor pic Figure 3. 20 Transistor Transistor is a CURRENT operated device which has a very large amount of current (Ic) which flows without restraint through the device between thecollectorand emitter terminals.But this is only possible if a small amount of biasing current (Ib) ispresentin the base terminal of the transistor making the base to act as a current control input. LED (Light Emitting Diode) pic Figure 3. 21 LED A light-emitting diode (LED) is a semiconductor li ght source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical(a) electronic component in 1962,2 early LEDs emitted low-intensity red light, but forward-looking versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness. DCU 11 pic Figure 3. 22 DCU 11 The cable incorporates a charger port to charge the phone while the cable is in use, and your phones built-in modem brings the Web and email to your PC.The widely accepted USB standard and high-speed data transfer make this cable the ideal consort from your phone to your PC. USB connector Fingerprint Scanner pic Figure 3. 23 Fingerprint Scanner Fingerprint recognitionorfingerprint authenticationrefers to the modifymethod of verifying a match between two sympatheticfingerprints. Fingerprints are one of many forms ofbiometricsused toidentifyindividuals andverifytheiridentity. This article touches on two major classes o falgorithms(minutia and pattern) and foursensordesigns (optical, ultrasonic, still capacitance, and active capacitance). Power supply pic Figure 3. 24 Power Supply Apower supplyis a device that supplieselectrical zeroto one or moreelectric loads.The term is most commonly applied to devices that convert one form of electrical muscularity to another, though it may also refer to devices that convert another form of energy (e. g. , mechanical, chemical, solar) to electrical energy. Aregulated power supplyis one that controls the output voltage or current to a specific value the controlled value is held nearly constant despite variations in either load current or the voltage supplied by the power supplys energy source. Program Source Code MikroC char ch void main() PORTB = 0x00 TRISB = 0x00 TRISC = 0x80 PORTC = 0 Usart_Init(9600) delay_ms(100) while(1) if(Usart_Data_Ready()) ch = Usart_Read() if(ch == 1) PORTC. F0 = 1 elay_ms(5000) PORTC. F0 = 0 ch= if(ch == 2) PORTC. F1 = 1 de lay_ms(8000) PORTC. F1 = 0 ch= PORTB = 0x00 VB6. 0 Enrollment soft WithEvents Capture As DPFPCapture black-market micturateFtrs As DPFPFeatureExtraction impenetrable CreateTempl As DPFPEnrollment Dim ConvertSample As DPFPSampleConversion unavowed step in Draw impression(ByVal Pict As IPictureDisp) Must use hidden PictureBox to easily resize picture. label HiddenPict. Picture = Pict Picture1. PaintPicture HiddenPict. Picture, _ 0, 0, Picture1. Scale comprehensiveness, _ Picture1. ScaleHeight, _ 0, 0, HiddenPict. Scale breadth, _ HiddenPict. ScaleHeight, vbSrcCopy Picture1. Picture = Picture1. Image destruction numbfish close deputize ReportStatus(ByVal str As String) Status. pass onItem (str) Add string to list box. Status. ListIndex = Status. untriedIndex Move list box selection down. displace zep clubby hoagie unaired_Click() Capture. StopCapture Stop capture operation. knock off Me polish off hacek hidden paladin Form_Load() shape Capture = untested DPFPCapture Create capture operation. Capture. StartCapture Start capture operation. chastise CreateFtrs = bare-assed DPFPFeatureExtraction Create DPFPFeatureExtraction object. fix CreateTempl = red-hot DPFPEnrollment Create DPFPEnrollment object. Samples. render = CreateTempl.FeaturesNeeded hand over number of samples needed. stigmatise ConvertSample = tonic DPFPSampleConversion Create DPFPSampleConversion object. annihilate hoagie common soldier gun Capture_OnReaderConnect(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was connected. ) oddment numbfish secluded paladin Capture_OnReaderDisconnect(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was disconnected. ) residuum hero unavowed zep Capture_OnFingerTouch(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was touched. ) complete deputize nonpublic change Capture_OnFingerGone(ByVal ReaderSerNum As String) ReportStatus (The finger was removed f rom the fingerprint reader. ) last hero sandwich one-on-one hitman Capture_OnSampleQuality(ByVal ReaderSerNum As String, ByVal Feedback As DPFPCaptureFeedbackEnum) If Feedback = CaptureFeedbackGood then(prenominal) ReportStatus (The quality of the fingerprint sample is good. ) Else ReportStatus (The quality of the fingerprint sample is poor. ) goal If annul Sub snobbish Sub Capture_OnComplete(ByVal ReaderSerNum As String, ByVal Sample As Object) Dim Feedback As DPFPCaptureFeedbackEnum ReportStatus (The fingerprint sample was captured. ) Draw fingerprint experience. DrawPicture ConvertSample. ConvertToPicture(Sample) Process sample and create feature set for purpose of enrollment. Feedback = CreateFtrs.CreateFeature execute(Sample, DataPurposeEnrollment) Quality of sample is not good enough to produce feature set. If Feedback = CaptureFeedbackGood thence ReportStatus (The fingerprint feature set was created. ) Prompt. Caption = Touch the fingerprint reader again with the sa me finger. Add feature set to template. CreateTempl. AddFeatures CreateFtrs. Feature develop institute number of samples needed to complete template. Samples. Caption = CreateTempl. FeaturesNeeded If Val(Samples. Caption) = 0 then(prenominal) MainFrame. Picture1. seeable = straightforward Else MainFrame. Picture1. viewable = absurd force out If Check if template has been created. If CreateTempl. usherStatus = scoutStatus pathfinderReady indeed MainFrame. SetTemplete CreateTempl. Template Template has been created, so stop capturing samples. Capture. StopCapture Prompt. Caption = Click Close, and then click Fingerprint Verification. MsgBox The fingerprint template was created. final stage If remainder If cease Sub hugger-mugger Sub Form_Unload(Cancel As Integer) Capture. StopCapture Stop capture operation eat up Sub frmFlash Option Explicit Dim i As Integer Private Declare Sub Sleep Lib kernel32 (ByVal dwMilliseconds As Long) Private Sub Form_Activate() For i = 0 To 10 i = i + 1 Sleep (500) Me. remember neighboring Unload Me frmStandbyMode. charge subvert Sub frmInventoryPrivate figure out ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver host = localhost DATABASE = db_AMASS drug user = chill out PASSWORD = bar obligation Private Sub cmdPay collectible_Click() Set rsPay = raw ADODB. Recordset rsPay. CursorLocation = adUseClient rsPay. CursorType = ad overspreadDynamic rsPay. LockType = adLockOptimistic rsPay. unaffixed acquire * FROM tbl_registration, ConnectDB rsPay. throw select * from tbl_registration where FullName = & txtPay. text & , ConnectDB If rsPay. EOF = fictitious so With rsPay rsPay. MoveFirst While rsPay. EOF = off-key If txtPay. textual matter = rsPay FullName thence If MsgBox(Continue paying his due? , vbInformation + vbYesNo, Apartment observe and Security System Paying Due) = vbYes past rsPay ToPay = rsPay ToPay + rsPay Payment rsPay. update List_Unpaid. classify call in query_list rsPay. MoveNext Else rsPay. MoveNext remnant If Else rsPay. MoveNext nullify If Wend End With End If End Sub Private Sub cmdPrint_Click() Set rst = upstart ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open select * from tbl_registration, ConnectDB Set knobReport. DataSource = rst. DataSource clientReport. Report width = 6000 GuestReport. acquaint End SubPrivate Sub cmdPrintLogs_Click() Set rst = parvenue ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open select * from tbl_logs where FullName = & txtPay. text edition & , ConnectDB If rst. EOF = wrong thence Set GuestLogs. DataSource = rst. DataSource GuestLogs. ReportWidth = 5000 GuestLogs. certify End If End Sub Private Sub Command1_Click() Unload Me Load MainFrame End Sub Private Sub Form_Load() txtPay. schoolbook = Set rsViewInventory = New ADODB. Recordset rsView Inventory. CursorLocation = adUseClient rsViewInventory. CursorType = adOpenDynamic rsViewInventory. LockType = adLockOptimistic rsViewInventory.Open charter * FROM tbl_registration ORDER BY RoomNumber ASC, ConnectDB Set dgGuestInventory. DataSource = rsViewInventory frmInventory. dgGuestInventory. Columns(0). ocular = paradoxical frmInventory. dgGuestInventory. Columns(2). visible = unreasonable frmInventory. dgGuestInventory. Columns(5). macroscopical = delusive frmInventory. dgGuestInventory. Columns(7). transparent = sullen frmInventory. dgGuestInventory. Columns(8). visible(a) = saturnine frmInventory. dgGuestInventory. Columns(1). Width = 2200 frmInventory. dgGuestInventory. Columns(3). Width = 1900 frmInventory. dgGuestInventory. Columns(4). Width = 1600 frmInventory. dgGuestInventory. Columns(6). Width = 1200 If rsViewInventory.EOF = put on Then With rsViewInventory rsViewInventory. MoveFirst While rsViewInventory. EOF = ill-advised If rsViewInventory. EOF = Fals e Then txtBayadHolder. school text = rsViewInventory ToPay txtBayadUtang. text edition = Val(txtBayadUtang. school text) + Val(txtBayadHolder. text edition) rsViewInventory ToPay rsViewInventory. MoveNext End If Wend End With Dim rs modifyNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open SELECT * FROM tbl_inventory, ConnectDB If txtBayadUtang. school text = rsUpdateNah Total Then txtBayadUtang. textual matter = Php & FormatNumber(rsUpdateNah Total) Else Dim rsUpdateNahh As New ADODB. Recordset rsUpdateNahh. CursorLocation = adUseClient rsUpdateNahh. CursorType = adOpenDynamic rsUpdateNahh. LockType = adLockOptimistic rsUpdateNahh. Open SELECT * FROM tbl_inventory, ConnectDB rsUpdateNahh Total = txtBayadUtang. textbook rsUpdateNahh. Update rsUpdateNahh. Close txtBayadUtang. text = Php & FormatNumber(txtBayadUtang. school text) End If End If rallying cry que ry_list End Sub Private Sub txtPay_Change() If txtPay. textbook Then cmdPayDue. Enabled = true cmdPrintLogs. Enabled = True End If End Sub Public hold up query_list() Dim rsViewUnpaid As New ADODB. Recordset rsViewUnpaid.CursorLocation = adUseClient rsViewUnpaid. CursorType = adOpenDynamic rsViewUnpaid. LockType = adLockOptimistic rsViewUnpaid. Open SELECT * FROM tbl_registration, ConnectDB If rsViewUnpaid. EOF = False Then With rsViewUnpaid List_Unpaid. AddItem Names & vbTab & vbTab & vbTab & To Pay List_Unpaid. AddItem rsViewUnpaid. MoveFirst While rsViewUnpaid. EOF = False If rsViewUnpaid ToPay = 0 Then txtBayadHolder. textual matter = rsViewUnpaid FirstName & & rsViewUnpaid LastName & vbTab & vbTab & Php & FormatNumber(rsViewUnpaid Payment) List_Unpaid. AddItem txtBayadHolder. schoolbook rsViewUnpaid. MoveNext Else rsViewUnpaid.MoveNext End If Wend End With End If End Function frmLogin Private Declare Function sndPlaySound Lib winmm. dll assumed name sndPlaySoundA _ ( ByVal lpszSoundName As String, ByVal uFlags As Long) As Long Const SND_SYNC = &H0 Const SND_NODEFAULT = &H2 Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS user = root PASSWORD = End Function Private Sub cmdCancel_Click() Unload Me frmStandbyMode. Enabled = True frmStandbyMode. Show End Sub Private Sub Form_Load() frmStandbyMode. Enabled = False End Sub Private Sub cmdOK_Click() Set recordSetAccount = New ADODB. Recordset ecordSetAccount. CursorLocation = adUseClient recordSetAccount. CursorType = adOpenDynamic recordSetAccount. LockType = adLockOptimistic recordSetAccount. Open tbl_account, ConnectDB If (frmLogin. txtUserName. school text = And frmLogin. txtPassword. textual matter = ) Then Unload frmLogin Unload frmStandbyMode MainFrame. mnuSearchGuest. Enabled = False MainFrame. mnuAddGuest. Enabled = False MainFrame. Show ElseIf recordSetAccount. EOF = False Then If frmLogin. txtPassword. text = Then sizablefile$ = CProgram FilesTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%)MsgBox Please input your password. Try again , , Login frmLogin. txtPassword. SetFocus ElseIf Not frmLogin. txtPassword. text = recordSetAccount Password Then soundfile$ = CProgram FilesTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox haywire password. Try again , , Login frmLogin. txtPassword. SetFocus frmLogin. txtPassword. SelStart = 0 frmLogin. txtPassword. SelLength = Len(frmLogin. txtPassword. textual matter) ElseIf (frmLogin. txtUserName. Text = recordSetAccount UserName And frmLogin. txtPassword. Text = recordSetAccountPassword) Then Unload frmLogin Unload frmStandbyMode MainFrame. Show End If Else soundfile$ = CProgram FilesTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) Ms gBox Not a valid account. Try again , , Login frmLogin. txtUserName. SetFocus frmLogin. txtUserName. SelStart = 0 frmLogin. txtUserName. SelLength = Len(frmLogin. txtUserName. Text) End If End Sub frmStanbyMode Private Sub mnu termination_Click() If MsgBox(Are you sure you want to exit program? , vbYesNo + vbInformation, Apartment observe and Security System) = vbYes Then Timer1. Enabled = True End IfEnd Sub Private Sub mnuLogin_Click() frmLogin. Show End Sub Private Sub Timer1_Timer() Label1. macroscopical = True ProgressBar1. overt = True If ProgressBar1. appreciate = ProgressBar1. Max Then End End If ProgressBar1. Value = ProgressBar1. Value + 1 End Sub MainFrame Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = root PASSWORD = End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = Economy Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = Standard Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice.Text = Family Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuest offset. megascopic = True Set recordSetDelete = New ADODB. Recordset recordSetDelete. CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open SELECT * FROM tbl_registration WHERE RoomNumber = & cboRoomNumberDel. Text & , ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). clear = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete.Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800 MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recor dSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete Picture) cmdDeletee. Visible = True cmd sluet. Visible = True cmdOpenSesame. Visible = True Else MsgBox This room has no guest yet. , vbInformation, Apartment Monitoring and Security System img_box_del. Visible = False cmdOpenSesame.Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen txtFilePathPic. Text = CommonDialog1. computer file name imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmd garner_Click() nominate pull in End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDBIf MsgBox(Are you sure you want to set off this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsDelete. Delete MsgBox Guest has been successfully deleted. , vbInformation, Apartment Monitoring and Security System Set dgGuestDelete. DataSource = zero forestall unobjectionable End If End Sub Private Sub cmdEditt_Click() impose suck frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = Edit here save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt.Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB txtFirstName. Text = rsEditGuestt FirstName txtLastName. Text = rsEditGuestt LastName cboGender. Text = rsEditGuestt Gender cboRoomChoice. Text = rsEditGuestt RoomChoice cboRoomNumber. Text = rsEditGuestt RoomNumber t xtFilePathPic. Text = rsEditGuestt Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open SELECT * FROM tbl_registration WHERE RoomNumber = & MainFrame. txtIdHolder. Text & , ConnectDB ritePort rsOpen RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB If MsgBox(Are you sure you want to update this Guest?. , vbYesNo + vbInformation, Update Verification) = vbYes Then rsUpdateNah templates = Templ. set up rsUpdateNah FirstName = txtFirstName. Text rsUpdateNah LastName = txtLastName. Text rsUpdateNah Fullname = txtFirstName. Text & & txtLastName.Text r sUpdateNah Gender = cboGender. Text rsUpdateNah RoomChoice = cboRoomChoice. Text rsUpdateNah RoomNumber = cboRoomNumber. Text rsUpdateNah Picture = txtFilePathPic. Text rsUpdateNah Complete whileStarted = Format(cboMonthStarted. Text & / & cbo projectStarted & / & cboYearStarted. Text, mm/dd/yyyy) rsUpdateNah CompleteDueDate = Format(cboDueMonth. Text & / & cboDueDate. Text & / & cboDueYear. Text, mm/dd/yyyy) rsUpdateNah. Update rsUpdateNah. Close MsgBox Guest has successfully Updated. , vbOnly, Apartment Monitoring and Security System Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest.Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text Then Set rsguestview = New ADODB. Recordset rsguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open Select * from tbl_logs where Date= & mskDateStarted & , ConnectDB Set DataG rid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = goose egg End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object Template can be empty. If so, then returns zip fastener.If Templ Is nothing Then Else Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End Sub Private Sub Form_Load() Call Clear Call View Dim blot() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open Select * from tbl_registration, ConnectDB blob = rs templates set raw image from MySQL database If Templ Is Nothing Then convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End SubPrivate Sub mnuAddGuest_Click() Call Clear bowling pin = 1 save. Visible = True frameRegisterGuest. Caption = Register here frameRegisterGue st. Visible = True frameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(Are you sure you want to logout and change user? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click()If MsgBox(Are you sure you want to exit program? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then closePort Unload Me frmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = cboRoomNumberDel. Text = cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGue stDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1.Filter = Fingerprint Template File*. fpt Set duologue box so an error occurs if negotiation box is cancelled. CommonDialog1. Cancel divergeor = True On Error Resume Next Show Open talksue box. CommonDialog1. ShowOpen If Err Then This code runs if dialog box was cancelled. Exit Sub End If Read binary star data from file. Open CommonDialog1. FileName For Binary As 1 ReDim blob(LOF(1)) Get 1, , blob() Close 1 Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate deduction binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest.CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open tbl_registration, ConnectDB If txtFirstName. Text = Or txtLastName. Text = Or cboGender. Text = Or cboRoomChoice. Text = Or cboRoomNumber. Text = Or txtFilePathPic. Text = Or cboMonthStarted. Text = Or cboDateStarted. Text = Or cboYearStarted. Text = Or cboDueMonth. Text = Or cboDueDate. Text = Or cboDueYear. Text = Then MsgBox Missing Fields. , vbCritical + vbInformation, Apartment Monitoring and Security System Else If MsgBox(Are you sure you want to add this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsAddGuest. AddNew rsAddGuest templates = Templ. Serialize rsAddGuest FirstName = txtFirstName. Text rsAddGuest LastName = txtLastName. Text rsAddGuest Fullname = txtFirstName. Text & & txtLastName. Text rsAddGuest Gender = cboGender. Text rsAddGuest RoomChoice = cboRoomChoice. Text rsAddGuest RoomNumber = cboRoomNumber. Text rsAddGuest Picture = txtFilePathPic. Text rsAddGuest CompleteDateStarted = Format(cboMonthStarted. Text & / & cboDateStarted. Text & / & cboYearStarted. Text, mm/dd/yyyy) rsAd dGuest CompleteDueDate = Format(cboDueMonth. Text & / & cboDueDate. Text & / & cboDueYear.Text, mm/dd/yyyy) rsAddGuest Payment = txtIdHolder. Text rsAddGuest. Update rsAddGuest. Close Call Clear MsgBox Guest has successfully Added. , vbOnly, Apartment Monitoring and Security System End If End If End Sub Private Sub SaveTemplate_Click() Dim blob() As Byte First verify that template is not empty. If Templ Is Nothing Then MsgBox You must create a fingerprint template before you can save it. Exit Sub End If CommonDialog1. Filter = Fingerprint Template File*. fpt Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Save As dialog box. CommonDialog1. ShowSaveIf Err Then This code runs if the dialog box was cancelled. Exit Sub End If Export template to binary data. blob = Templ. Serialize Save binary data to file. Open CommonDialog1. FileName For Binary As 1 Put 1, , blob Close 1 End Sub Private Sub Timer1_Timer() lblDate. Caption = Format(Date, Long Date) lblTime. Caption = Format(Time, Long Time) End Sub Private Sub Verify_Click() First verify that template is not empty. If Templ Is Nothing Then MsgBox You must create fingerprint template before you can perform verification. Exit Sub End If Show Fingerprint Verification dialog box. Verification. Show vbModal, Me End SubPublic Function Clear() txtFirstName. Text = txtLastName. Text = txtFilePathPic. Text = cboGender. Text = cboRoomChoice. Text = cboRoomNumber. Text = cboMonthStarted. Text = cboDateStarted. Text = cboYearStarted. Text = cboDueMonth. Text = cboDueDate. Text = cboDueYear. Text = cboRoomNumberDel. Text = imgbox. Visible = False img_box_del. Visible = False frameRegisterGuest. Visible = False frameSearchGuest. Visible = False End Function Public Function View() frameRegisterGuest. Visible = False frameSearchGuest. Visible = False frameViewGuest. Visible = True Set rsViewGuest = New ADODB. Recordset rsViewGuest.Cur sorLocation = adUseClient rsViewGuest. CursorType = adOpenDynamic rsViewGuest. LockType = adLockOptimistic rsViewGuest. Open SELECT * FROM tbl_registration ORDER BY RoomNumber ASC, ConnectDB Set dgGuestView. DataSource = rsViewGuest MainFrame. dgGuestView. Columns(0). Visible = False MainFrame. dgGuestView. Columns(2). Visible = False MainFrame. dgGuestView. Columns(5). Visible = False MainFrame. dgGuestView. Columns(7). Visible = False MainFrame. dgGuestView. Columns(8). Visible = False MainFrame. dgGuestView. Columns(1). Width = 2200 MainFrame. dgGuestView. Columns(3). Width = 1900 MainFrame. dgGuestView. Columns(4). Width = 1600 MainFrame. dgGuestView.Columns(6). Width = 1200 Set rsViewGuest = Nothing End Function Verification Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = root PASSWORD = End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = Economy Then tx tIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = Standard Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice. Text = Family Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete.CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open SELECT * FROM tbl_registration WHERE RoomNumber = & cboRoomNumberDel. Text & , ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete. Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800MainFrame. dgGuestDelete. Columns(6). Width = 1600 Ma inFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox This room has no guest yet. , vbInformation, Apartment Monitoring and Security System img_box_del. Visible = False cmdOpenSesame. Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen xtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB If MsgBox(Are you sure you want to delete this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsDelete. Delete MsgBox Guest has been successfully deleted. , vbInformation, Apartment Monitoring and Security System Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = Edit here save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt. Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB txtFirstName. Text = rsEditGuestt FirstName txtLastName. Text = rsEditGuestt LastName cboGender.Text = rsEditGuestt Gender cboRoomChoice. Text = rsEditGuestt RoomChoice cboRoomNumber. Text = rsEditGu estt RoomNumber txtFilePathPic. Text = rsEditGuestt Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open SELECT * FROM tbl_registration WHERE RoomNumber = & MainFrame. txtIdHolder. Text & , ConnectDB writePort rsOpen RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah.CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB If MsgBox(Are you sure you want to update this Guest?. , vbYesNo + vbInformation, Update Verification) = vbYes Then rsUpdateNah templates = Templ. Serialize rsUpdateNah FirstName = txtFirstName. Text rsUpdateNah LastName = txtLastName. Text rsUpdateNah Fullname = txtFirstName. Text & & txtLastName. Text rsUpdateNah Gender = cboGender. Text rsUpdateNah RoomChoice = cboRoomChoice. Text rsUpdateNah RoomNumber = cboRoomNumber. Text rsUpdateNah Picture = txtFilePathPic. Text sUpdateNah CompleteDateStarted = Format(cboMonthStarted. Text & / & cboDateStarted & / & cboYearStarted. Text, mm/dd/yyyy) rsUpdateNah CompleteDueDate = Format(cboDueMonth. Text & / & cboDueDate. Text & / & cboDueYear. Text, mm/dd/yyyy) rsUpdateNah. Update rsUpdateNah. Close MsgBox Guest has successfully Updated. , vbOnly, Apartment Monitoring and Security System Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest. Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text Then Set rsguestview = New ADODB. Recordset sguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open Select * from tbl_logs where Date= & mskDateStarted & , Connec tDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object Template can be empty. If so, then returns Nothing. If Templ Is Nothing Then Else Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End SubPrivate Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open Select * from tbl_registration, ConnectDB blob = rs templates set raw image from MySQL database If Templ Is Nothing Then convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End Sub Private Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = Register here frameRegisterGuest. V isible = True rameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(Are you sure you want to logout and change user? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click() If MsgBox(Are you sure you want to exit program? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then closePort Unload Me rmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = cboRoomNumberDel. Text = cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDele te. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. Filter = Fingerprint Template File*. fpt Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then This code runs if dialog box was cancelled. Exit Sub End If Read binary data from file. Open CommonDialog1. FileName For Binary As 1 ReDim blob(LOF(1)) Get 1, , blob() Close 1 Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest. CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open tbl_registration, ConnectDB If txtFirstName.Text = Or txtLastName. Text = Or cboGend er. Text = Or cboRoomChoice. Text = Or cboRoomNumber. Text = Or txtFilePathPic. Text = Or cboMonthStarted. Text = Or cboDateStarted. Text = Or cboYearStarted. Text = Or cboDueMonth. Text = Or cboDueDate. Text = Or cboDueYear. Text = Then MsgBox Missing Fields. , vbCritical + vbInformation, Apartment Monitoring and Security System Else If MsgBox(Are you sure you want to add this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsAddGuest. AddNew rsAddGuest templates = Templ. Serialize rsAddGuest FirstName = txtFirstName. Text