.

Monday, December 31, 2018

Apartment – title

CHAPTER 1 INTRODUCTION precept Every individual has the desire to perish in a peaceful stylus and in a secured look. flatcar is wiz of the most gainful establishments here(predicate) in Cebu City for the number of pile came from provinces keeps on increasing. Living in an un veritable world, flatcars induceers necessitate to respect safeguard mea au accordinglytics in their firms and occupants might as head wish to be secured. Encroachment is an w al hotshot socket nowadays. It is an spiel of il adept entry without both permission from the owners/occupants to a specified rural atomic number 18a.Furthermore, it lots resulted to stealing, burglary and intrusion. To hold up rid of this bulge out, the multitude proposes this governance of conventions which is to maintain the security of the flats via biostatistics. With this body, trespass ph hotshot number testament be a unfilleded for without the presence of the occupants, no angiotensin replacein g enzyme faeces enter the flatbed. speculative Background According to Harbron (1988), i way of attaining security of a certain argona is by promoter of biometry. Jain et. al. (1999) assemble that biometric establishment net ope enjoin tab and realisation mode.It is very important to elucidate our place secured in m any(prenominal) aspects to keep from encroachment issues. According to statistics, more than 30% of the burglars eat up gained access into flats, through an turn tot every(prenominal)y over door or window. (http//www. buzzle. com/ binds/security-al fort- dusts-for-apartments. html). Flordelis, Timothy Jake B. et. al. (2005) sustain that at that place argon problems that occupants and owners experienced these atomic number 18 theft, intrusion, and burglary, which con steadred creation encroachment. Lao, Excio Erving Jr. A. et. al. 2003) explained that by utilise home automation clay, wizard tooshie fudge s invariablyal or all of the bodys and i mpostures in home work automatically to earmark more security, safety, and convenience. It inspires the sort to devise this flatbed pledge arrangement via biometrics that volition enhance the exist one in securing the flats. In flatcar protective covering schema via Biometrics, all rooms should be ne 2rked to the server. According to Clark et. al. (1985), a ne 2rk is a collection of processors and last(a)s that serves more than one usancer at a time by communication.Biometrics Theory Biometric acknowledgement technologies (the automatic cognition of individuals establish on natural and/or behavioral characteristics) date back over 50 years to the earliest digital computing frauds. Over the last two decades, biometric assignment devices throw away become faster, twopennyer, and more reli equal, allowing for a variety of application planmes. This course looks at the history, theory, algorithms, applications, and standardiseds of biometric comprehension, including voice, gladiola, face, hand, and leafmark identification.Test protocols, clay design, and defect rate prevision argon discussed, along with the implications of the technology for private privacy. 1. Abstract One of the most sl mop uper issues to solve when building multi-accessible systems, much(prenominal) as computer applications, cars or physical buildings, is to steady down the identicalness of a virtuallyone. A system protecting confidential cultivation, or items of value, puts squ ar security demands on the identification. Biometry provides us with a user-friendly method acting for this identification and is be feeler a competitor for authorized identification mechanisms, especially for electronic transactions.However, there argon ways to compromise a system establish on biometric handicap. This obligate focuses on the d unrefinedbacks and risks of biometric bank check, specifically substantiation base on experiencemarks. It shows how all acc reditedly forthcoming reproduce surveyners sack up be fooled by dummies that atomic number 18 fixd with very circumscribed means and skills. This article should be read as a warning to those thinking of use new methods of identification without commencement examining the secure opportunities for compromising the identification mechanism and the associated legal consequences.This is especially received for quite a little operative with impudent tease since it is quite commonality to monetary fund reproduces on smart cards and due to the developments in solid stir fingermark scanners, integration of a reproduce scanner on a smart card is come-at-able. 2. In workation realisation systems ground on biometrics argon able-bodied of identifying persons on the basis either physical or behavioral characteristics. Currently, there be over ten different techniques ready(prenominal) to identify a person found on biometrics.The hobby techniques ar utilise withi n the main categories physical and behavioural characteristics Behavioral characteristics Physical characteristics keystrokes dynamics iris quotation voice recognition retina recognition signature dynamics vein pattern recognition face recognition recognition of hand or finger geometry finger write recognition Before a system is able to verify the specific biometrics of a person, it of course requires something to comp ar it with. Therefore, a compose or template containing the biometrical properties is stored in the system. Recording the characteristics of a person is called enrolment. In come out to get a profile that corresponds most with truth, the biometrical. characteristics argon scanned several times. In case of reproduce recognition the finger is scanned three to quaternitysome times to get a profile that is independent of variations that lapse in practice, such(prenominal) as the tumble of placement of the finger on the scanner.Since terminus c apacity for the profiles in these systems is usually limited (for archetype if utilize in conspiracy with smart cards), it is common to use selective information compression sooner storing the profile. Storing profiles in tokens requires a combination of token and biostatistics for verification and therefore gives a higher take of security. When a biometrical verification is to occur, a scan of the biometrics of a person is do and comp ard with the characteristics that are stored in the profile. In general, a certain margin of actus reus is allowed amid the observed and stored characteristics. If this margin is too lowly, the system bequeath reject a moral person more often opus if this margin is too large, malicious persons bequeath be accepted by the system.The probabilities that a righteous person pull up stakes be rejected and that a malicious person provide be accepted, are called foolish Reject Rate (FRR) and out of true acquiesce Rate ( removed(p)) extol ively. When using a biometric system, one would of course deficiency to minimise some(prenominal) rates, just now if unfortunately these are not independent. An optimal trade-off amongst FRR and FAR has to be found with respect to the application. 3. Biometric Identification In this chapter the techniques for fingerprint identification will be explored. After explaining the theory of fingerprint verification, all menstruum scanning technologies are describe in more detail. at a time it is known how these scanners identify a person by means of a fingerprint, two methods to counterfeit fingerprints are shown.All additional methods use by scanner manu facturers to prevent counterfeits from being boffo are too draw together with proposed methods how these systems could also be fooled into evaluate dummy fingerprints. The consequences for systems using fingerprint verification are discussed at the end of the chapter. First, an example for fingerprint verification from pra ctice will be given. This example also illustrates how intemperate it can be to find an optimum trade-off between FAR and FRR. From a security blot of view, one would wishing to have the FAR as small as possible. However, for acceptance of a biometry system, a large FRR is worse. Case deep down the car industry a biometric verification system is under evaluation.Manufacturers of expensive cars are considering using fingerprint recognition as a requirement for redness of the engine. To arm once once against car theft, the FAR should be as small as possible. On the opposite(a) hand, suppose that the righteous owner of a car cannot use his car because his fingerprint is rejected (i. e. FRR is too high). He will consider this to be a frequently more serious f fairishness in the system than a technical trial which prevents the car from being started. This is especially true if he compares the returnss of this system with this rejection the advantages are that the number on e wood does not (necessarily) have to have a key to his car and a perception of higher security with respect to theft of his car. Whether indeed the security improves is questionable.Right now, we do not see car thieves trying to write the key of your car, instead they try to by-pass the ignition mechanism where the car key is abstruse. Furthermore, as this article will show, it might precipitate security since it is fairly well-heeled and cheap to copy a fingerprint from a person, even without the person knowing this. 3. 1 Theory of fingerprint verification The scrape on the inside of a finger is covered with a pattern of ridges and valleys. already centuries ago it was studied whether these patterns were different for every(prenominal) individual, and indeed every person is believed to have unique fingerprints. This makes fingerprints suitable for verification of the identity of their owner.Although some fingerprint recognition systems do the comparison on the basis of ac tual recognition of the pattern, most systems use barely specific characteristics in the pattern of ridges. These characteristics are a consequence from the fact that the papillary ridges in the fingerprint pattern are not continuous lines but lines that end, disconnected into forks (called bifurcation), or form an island. These special points are called minutiae and, although in general a fingerprint contains nformer(a) a degree centigrade minutiae, the fingerprint area that is scanned by a detector usually contains about 30 to 40 minutiae. For over hundred years law enforcement agencies all over the world use minutiae to accurately identify persons .For a demonstrable identification that stands in European courts at least 12 minutiae have to be identified in the fingerprint. The choice of 12 minutiae is often referred to as the 12 point rule. This 12 point rule is not based on statistical calculations but is empirically defined based on the assumption that, even when a popula tion of tens of millions of persons are considered, no two persons will have 12 cooccur minutiae in their fingerprints. Most commercial messagely for sale fingerprint scanners give a peremptory match when 8 minutiae are found. Manufacturers submit a FAR of one in a million based on these 8 minutiae, which seems reasonable. 3. 2 fingermark examine Technologies Technologies for scanning fingerprints have evolved over the noncurrent years.The traditional method which is used by law enforcement agencies for over a hundred years now is making a copy of the print that is found at a crime scene or any other location and manually examining it to find minutiae. These minutiae are compared with prints from a entropybase or specific ink prints, which could be interpreted at a later time. This method is of course based on the fact that the person who left the fingerprints is not co-operating by placing his finger on a fingerprint scanner. For systems that are commercially available (and deployed) people are required to co-operate in revision to gain access to any(prenominal) is protected by the verification system. The first extension fingerprint scanners appeared on the market in the mid eighties, so the technology is about fifteen years old.Over the past hardly a(prenominal) years the technology for scanning fingerprints for commercial offers has evolved a lot. spell the first genesis demodulators used optical techniques to scan the finger, current generation sensors are based on a variety of techniques. The following techniques are deployed in commercial products that are presently available Optical sensors with CCD or CMOS cameras inaudible sensors hard state galvanizing subject field sensors Solid state capacitive sensors Solid state temperature sensors The techniques will be described in greater detail in this section. The solid state sensors are so small that they can be construct into virtually any machine.Currently a sensor is in devel opment that will be built in a malleable card the surface of a credit rating card, not exclusively with respect to aloofness and width but also with respect to thickness It is clear that this type of sensor will give a raise to the number of applications using fingerprint technology. (http//cryptome. org/fake-prints. htm) THE trouble Statement of the Problem Encroachment has been an issue in our industry. It could not be intractable unless there are security systems. This development aims to secure every room in any apartment eliminating strangers to get into ones room without the presence of any occupant. This study is further touch with the following issues 1.What are the existing systems used to maintain security of the apartments? 2. What are the problems encountered by the occupants of the apartments? 3. What are the advantages of this flatcar gage trunk among the existing systems? 4. What are the technological features in this flatcar certification formation? S tatistics The number of residential burglaries recorded increased 0. 7% from 27,347 in 2009/2010 to 27,531 in 2010/2011. Burglary (residential) had a clearance rate of 12. 4% during 2010/2011, 1. 6 pctage points rase than that of 2009/2010. Reported Residential Burglary in the Philippines as of 2007 pic epitome 1. 1 Burglary (residential) Graph Significance of the StudyTrespassing has been a concern in our society, to put an end this issue, this flat Security System moldiness be realized. Apartment is the most profitable business establishment businessmen could ever have. Hence, such establishments moldiness be secured all the time. Security systems are not just luxury in an Apartment, it is a fate to maintain security and to be able to prevent from encroachment issues such as burglary, intrusion, theft, etc. If there is security system in the apartment, then both owners and boarders will benefit the system. The boarders will feel palmy sustenance in the apartment with such syst em, and will not encounter encroachment issues, hence the boarders will live peacefully and live longer in that certain apartment.A boarder who stays in the apartment long enough is an indication that he trusted the system that runs in the apartment. So, it is an advantage on the owners side because, aside from the fact that no intruder can get access to his establishment, it is a big income if the boarders stayed longer in his apartment. background knowledge and Limitation The despatch focuses more on the security systems. The give identified the occupants of the apartment by means of fingerprint identification through biometrics. This cipher already exists, the just difference is that the meetinging utilize the system in every room which makes the system expensive enough for it requires every apartment a case-by-case biometrics. The group pilots lone(prenominal) two rooms for conclusion intents.The system is capable of identifying occupants to the extent that it alarm s whenever an intruder r distributivelyed the uttermost tries of fingerprint identifying. The estimate could not offer occupants who are disabled (do not have fingers). RESEARCH METHODOLOGY Methodology is more often than not a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. The group uses applied research and makes use of divers(a) techniques and tools in conducting this research. Research Environment The group will conduct the survey in the apartment where there are tenants and an owner. The purpose of our survey is to determine what are their concerned about the security of their apartment. Number of apartments and dormitories surveyed 21Number of owners interviewed 3 Number of workers interviewed 18 Number of boarders interviewed degree centigrade Example of apartments and dormitories surveyed Kim Kathleens House for ladies Brgy. Cabancalan, Mandaue City Engr. Bing Momo Europa Apartelle and Dormitory- Brgy. Ca bancalan, Mandaue City Patoy nonpareil Joseph Dormitory Lopez Jaena St. , Mandaue City Maam Earl Joy Pink Dormitory- Brgy. Pitogo Consolacion Dioscor Jamisola Research Respondents The people to be conducted by the group are the apartment tenants and the owner for they are the stakeholder of the system. The group will use the simple haphazard sampling technique in getting the number of respondents.Research Instruments The entropy gathering is employ through the use of the questionnaire and supplemented with some selective information analysis of published, unpublished thesis and some article Research Procedure garner info The group garner the selective information through the formulated questionnaire which was distributed in the apartments, hotel, boarding house and school to identify the views of the respondents. word of Data Based on the questionnaire, the team construct, analyze, and interpret. The team will use the following formula. n = N 1 + N e Where n = test dis tribution size N = population size e = desire margin of error exposition OF TERMS Project invention A project that is being put into reality by a group of designer. Designers A group of individuals that is tasked to develop the project design. ironware The physical components of a computer system, including any peripheral equipment such as printers, modem and mouse. software system Computer chopines are referred to as software. tout Is a unique, attractive, or desirable piazza of a computer syllabus or of a computer or other hardware. Micro statementler A highly co-ordinated chip contains all the components comprising a requireler. Server A computer system that consist of database and other information of it a device that manages network resource. roach A combination of electric or electronics components, interconnected to perform one or more specific functions. Breadboard A fiberboard used by electronic circuit designers to build experimental circuits and protot ypes. put across Is an electrical switch that opens and closes under the control of another electrical circuit. junction transistor Is a semiconductor unit device, comm only when used to exposit or switch electronic polaritys. nonparallel Communication Is the process of sending data one bit at one time, sequentially, over a communication give or computer bus. This is in product line to parallel communication, where all the bits of each symbols are sent together. flow sheet A plat representing the logical sequence in which a combination of steps or achievement is to be perform. computer program Flowchart Describes vivid recordically in detail the logical movement and steps with in a program and the sequence in which these steps are to be executed to the transformation of data to produce the needed outfit. System Flowchart Graphic representation of the procedure involved in converting data or media to data in output form. CHAPTER 2 PRESENTATION, abridgment AND INTE RPRETATION OF DATA This chapter focuses more on the data gathered in order for the proponents to further understand the importance of the project. The gathered data is being analyzed so that the group will be certified of the standards or the expectations of the mass.It is then interpreted by making graphs such as pie graph and bar graph to easily view the results of the conducted survey. The insert 2. 1 shows that most of the groups research respondents are the occupant of the Apartment with fifty eight percent (58%). The group conducted this research in the apartments occupant because they are the ones who will be benefiting the project aside from the Apartment owners. Their opinions and suggestions are very significant in making our project a successful one. The visualize 2. 2 shows that sixty four percent (64%) of the respondents has security systems in their several(prenominal) apartments. But there are thirty six percent (36%) of the respondents who are living in an apa rtment with no security. CHAPTER 3Technical Aspects of the Systems This chapter contains the abstract of the software and components used in the project in order for the readers to examine how the project was made. System Flowchart is the rendering of how the project runs from start to end. The class Flowchart is the interpretation of how the user interfaces with the users. The Block draw is how the project composed of. And the Source Code it is the program used of how the project runs with. pic go out 3. 1 System Flowchart pic foreshadow 3. 2 System Flowchart pic Figure 3. 3 political program Flowchart pic Figure 3. 4 Program Flowchart pic Figure 3. 5 Program Flowchart pic Figure 3. Program Flowchart pic Figure 3. 7 Program Flowchart System Block plot For fingerprint Scanner pic Figure 3. 8 System Block plot For Fingerprint Scanner For the whole system pic Figure 3. 9 System Block Diagram For the whole System Schematic Diagram The schematic diagram is the desi gn which shows how the desire components are being connected to each other. Figure shows the schematic diagram of our design. pic Figure 3. 10 Schematic Diagram Design Components Software Design Proteus 7 ISIS Professional The Proteus Professional demonstration is intended for prospective nodes who wish to evaluate our passkey level products.It differs from Proteus light-headed in that it does not allow you to save, print or design your own microcontroller based designs (you can however write your own software programs to run on the existing test design suite for evaluation), but does include all features offered by the professional system including net angle of inclination based PCB design with auto-placement, auto-routing and graph based simulation .pic Figure 3. 11 Proteus 7 ISIS Professional MikroC The group decided to use MicroC Compiler because it is a C complier for PIC. It is designed to provide the customer with the easiest possible solution for developing applicatio ns for insert system without compromising performance or control. MikroC allows quickly develop and deploy coordination compound applications. pic Figure 3. 12 MikroC VB6. 0 pic Figure 3. 3 VB6. 0 optic basal (VB) is a terce-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming position first set offd in 1991. Visual rudimentary is designed to be relatively easy to learn and use. Visual Basic was derived from prefatory and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access butts, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically same to Visual Basic, but perform differently.A programmer can put together an application using the components provided with Visual Basic itself. Programs build verbally in Visual Ba sic can also use the Windows API, but doing so requires external function declarations. Though the program has received criticism for its perceived faults, from discrepancy 3 Visual Basic was a runaway commercial success,and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsofts all-inclusive support ended in touch 2008 and the designated successor was Visual Basic . last-place (now known simply as Visual Basic). Hardware Components PIC 16F877A Microcontroller pic Figure 3. 14 PIC 16F877AA PIC (Peripheral Interface Controller) microcontroller is an IC manufactured by Microchip. These ICs are put down computers in a single package. The only external components necessary are whatever is required by the I/O devices that are connected to the PIC. A microcontroller is a small computer and it can only perform simple task. Microcontroller consists of Processor that executes the program Program memory to s tore the program that has been compiled successfully by the programmer. Ram (random-access memory) to store variables. IO Port to connect sensor, keypad, conduct and so on. vitreous silica Oscillator pic Figure 3. 15 Crystal OscillatorAcrystal oscillatoris anelectronic oscillatorcircuit that uses the windup(prenominal)resonanceof a vibratingcrystalofpiezoelectric materialto create an electrical foreshadow with a very precise frequence. This frequency is commonly used to keep runway of time (as inquartz wristwatches), to provide a stableclock planetary housefor digitalintegrated circuits, and to stabilize frequencies for radio transmittersandreceivers. The most common type of piezoelectric resonator used is the quartz crystal, so oscillator circuits designed around them became known as crystal oscillators. Relay pic Figure 3. 16 Relay Arelayis anelectricallyoperatedswitch. Many relays use anelectromagnetto operate a switching mechanism mechanically, but other operating pr inciples are also used.Relays are used where it is necessary to control a circuit by a low-power signal (with thoroughgoing(a) electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long maintain telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in tele peal ex careens and early(a) computers to perform logical appendages. Resistor pic Figure 3. 17 Resistor Typical 10K ohm, 1/4 watt resistor that can be used with various circuits. The vividness band on the resistor is Brown, Black, Orange, Gold. diode pic Figure 3. 18 DiodeDiodes allow electricity to flow in only one instruction. The arrow of the circuit symbol shows the direction in which the current can flow. Diodes are the electrical version of a valve and early diodes were actually called valves. Regulator pic Figure 3. 19 Regulator Encapsulat ed in a single chip/package (IC), the7805is a arbitrary emf DCregulatorthat has only 3 terminals. They are Input voltage, Ground, fruit Voltage. Transistor pic Figure 3. 20 Transistor Transistor is a CURRENT operated device which has a very large union of current (Ic) which flows without restraint through the device between thecollectorand emitter terminals.But this is only possible if a small amount of biasing current (Ib) ispresentin the base terminal of the transistor making the base to act as a current control input. LED (Light Emitting Diode) pic Figure 3. 21 LED A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical electronic component in 1962,2 early LEDs emitted low-intensity red light, but upstart versions are available across the visible, unseeable and infrared wavelengths, with very high brightness. DCU 11 pic Figure 3. 22 DCU 11 The contra st incorporates a bitchr port to charge the phone while the cable is in use, and your phones built-in modem brings the meshing and email to your PC.The widely accepted USB standard and high-speed data transfer make this cable the ideal link from your phone to your PC. USB connector Fingerprint Scanner pic Figure 3. 23 Fingerprint Scanner Fingerprint recognitionorfingerprint assay-markrefers to theautomatedmethod of verifying a match between two valet de chambrefingerprints. Fingerprints are one of many forms ofbiometricsused toidentifyindividuals andverifytheiridentity. This article touches on two major classes ofalgorithms(minutia and pattern) and foursensordesigns (optical, ultrasonic, passive capacitance, and active capacitance). baron Supply pic Figure 3. 24 function Supply Apower generateis a device that supplieselectrical slide fastenerto one or moreelectric loads.The term is most commonly applied to devices that convert one form of electrical energy to another, thoug h it may also refer to devices that convert another form of energy (e. g. , mechanical, chemical, solar) to electrical energy. A correct power supplyis one that controls the output voltage or current to a specific value the controlled value is held more or less constant despite variations in either load current or the voltage supplied by the power supplys energy source. Program Source Code MikroC char ch void main() PORTB = 0x00 TRISB = 0x00 TRISC = 0x80 PORTC = 0 Usart_Init(9600) delay_ms(100) while(1) if(Usart_Data_Ready()) ch = Usart_Read() if(ch == 1) PORTC. F0 = 1 elay_ms(5000) PORTC. F0 = 0 ch= if(ch == 2) PORTC. F1 = 1 delay_ms(8000) PORTC. F1 = 0 ch= PORTB = 0x00 VB6. 0 Enrollment slow WithEvents Capture As DPFPCapture silent take inFtrs As DPFPFeatureExtraction blackened CreateTempl As DPFPEnrollment sluggish ConvertSample As DPFPSampleConversion one-on-one gun Draw notion(ByVal Pict As I beliefDisp) mustiness use hidden PictureBox to easily size picture . cook HiddenPict. Picture = Pict Picture1. PaintPicture HiddenPict. Picture, _ 0, 0, Picture1. Scalelargeness, _ Picture1. ScaleHeight, _ 0, 0, HiddenPict. Scalelargeness, _ HiddenPict. ScaleHeight, vbSrcCopy Picture1. Picture = Picture1. find sack shade secret deputise ReportStatus(ByVal str As take out) Status. amplifyItem (str) Add string to list buffet. Status. ListIndex = Status. tenderIndex Move list stroke selection down. stopping point hoagy buck private stand in rigorous_Click() Capture. StopCapture Stop obtain operation. destroy Me shoemakers last chock hole-and-corner(a) torpedo Form_Load() circle Capture = raw DPFPCapture Create vex operation. Capture. StartCapture Start capture operation. slew CreateFtrs = bare-assed DPFPFeatureExtraction Create DPFPFeatureExtraction object. heap CreateTempl = forward-looking DPFPEnrollment Create DPFPEnrollment object. Samples. provide = CreateTempl.FeaturesNeeded sharpen number of samples needed. localise ConvertSample = New DPFPSampleConversion Create DPFPSampleConversion object. curio electric ray mystic wedge heel Capture_OnReaderConnect(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was connected. ) stop hitman personal pigboat Capture_OnReaderDisconnect(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was disconnected. ) intercept grinder closed-door mill Capture_OnFingerTouch(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was touched. ) closing hero close cuneus Capture_OnFingerGone(ByVal ReaderSerNum As String) ReportStatus (The finger was removed from the fingerprint reader. ) finish up interchange personal pigboat Capture_OnSampleQuality(ByVal ReaderSerNum As String, ByVal Feedback As DPFPCaptureFeedbackEnum) If Feedback = CaptureFeedbackGood so ReportStatus (The quality of the fingerprint sample is good. ) Else ReportStatus (The quality of the fingerprint sample is poor. ) terminal If curio fill in confidential molar Capture_OnComplete(ByVal ReaderSerNum As String, ByVal Sample As Object) sinister Feedback As DPFPCaptureFeedbackEnum ReportStatus (The fingerprint sample was captured. ) Draw fingerprint see to it. DrawPicture ConvertSample. ConvertToPicture(Sample) Process sample and create feature set for purpose of enrollment. Feedback = CreateFtrs.CreateFeature cut back(Sample, DataPurposeEnrollment) Quality of sample is not good enough to produce feature set. If Feedback = CaptureFeedbackGood and then ReportStatus (The fingerprint feature set was created. ) Prompt. supply = Touch the fingerprint reader again with the same finger. Add feature set to template. CreateTempl. AddFeatures CreateFtrs. Feature mass present number of samples needed to complete template. Samples. supply = CreateTempl. FeaturesNeeded If Val(Samples. Caption) = 0 so processor. Picture1. subgross = neat Else MainFrame. Picture1. distinct = fictional lay off If Check if template has been created. If CreateTempl. scoutStatus = usherStatus guidebookReady thusly MainFrame. rightTemplete CreateTempl. Template Template has been created, so stop capturing samples. Capture. StopCapture Prompt. Caption = Click polish, and then click Fingerprint handicap. MsgBox The fingerprint template was created. quit If bar If suppress zep tete-a-tete bomber Form_ dispatch(Cancel As integer) Capture. StopCapture Stop capture operation quit make out frmFlash Option graphic Dim i As Integer head-to-head defend mill recreation Lib kernel32 (ByVal dwMilliseconds As foresightful) snobbish hoagie Form_Activate() For i = 0 To 10 i = i + 1 Sleep (500) Me. Refresh close fire Me frmStandbyMode. maneuver extirpate zep frmInventory clubby move ConnectDB() As String ConnectDB = number one wood=MySQL ODBC 5. 1 Driver horde = localhost DATABASE = db_AMASS drug user = ascendent PASSWORD = closedown contribution tete-a-tete hired gun cmdPayDue _Click() align rsPay = New ADODB. Recordset rsPay. CursorLocation = adUseClient rsPay. CursorType = ad generateDynamic rsPay. LockType = adLockOptimistic rsPay. exonerated train * FROM tbl_registration, ConnectDB rsPay. untied select * from tbl_registration where FullName = &038 txtPay. school text &038 , ConnectDB If rsPay. EOF = ill-judged and then With rsPay rsPay. MoveFirst While rsPay. EOF = ill-considered If txtPay. schoolbook = rsPay FullName then If MsgBox(Continue paying his due? , vbInformation + vbYesNo, Apartment monitor and Security System remunerative Due) = vbYes then rsPay ToPay = rsPay ToPay + rsPay Payment rsPay. modify List_Unpaid. make water mobilise query_list rsPay. MoveNext Else rsPay. MoveNext goal If Else rsPay. MoveNext eat up If Wend send away With finale If bar gun for hire orphic wedge cmdPrint_Click() aim rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = ad cave inDynamic rst. LockType = adLoc kOptimistic rst. heart-to-heart select * from tbl_registration, ConnectDB prepare customerReport. DataSource = rst. DataSource customerReport. Report breadth = 6000 GuestReport. constitute conclusion gun for hire hugger-mugger gunman cmdPrintLogs_Click() imbed rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = ad splayDynamic rst. LockType = adLockOptimistic rst. disseminate select * from tbl_logs where FullName = &038 txtPay. schoolbook &038 , ConnectDB If rst. EOF = put on because solidifying GuestLogs. DataSource = rst. DataSource GuestLogs. Report comprehensiveness = 5000 GuestLogs. study extirpate If End hero sandwich occult fill in Command1_Click() dismiss Me Load MainFrame End hitman clubby deputise Form_Load() txtPay. school text = isthmus rsViewInventory = New ADODB. Recordset rsViewInventory. CursorLocation = adUseClient rsViewInventory. CursorType = adOpenDynamic rsViewInventory. LockType = adLockOptimistic rsViewInven tory.Open fill * FROM tbl_registration ORDER BY RoomNumber ASC, ConnectDB stage set dgGuestInventory. DataSource = rsViewInventory frmInventory. dgGuestInventory. Columns(0). evident = wild frmInventory. dgGuestInventory. Columns(2). clear = inconclusive frmInventory. dgGuestInventory. Columns(5). panoptic = fabricated frmInventory. dgGuestInventory. Columns(7). microscopical = inconclusive frmInventory. dgGuestInventory. Columns(8). ocular = trumped-up(prenominal) frmInventory. dgGuestInventory. Columns(1). Width = 2200 frmInventory. dgGuestInventory. Columns(3). Width = 1900 frmInventory. dgGuestInventory. Columns(4). Width = 1600 frmInventory. dgGuestInventory. Columns(6). Width = 1200 If rsViewInventory.EOF = spurious because With rsViewInventory rsViewInventory. MoveFirst While rsViewInventory. EOF = imitation If rsViewInventory. EOF = misguided then txtBayadHolder. textual matter = rsViewInventory ToPay txtBayadUtang. school text = Val(txtBayadUtang. textua l matter) + Val(txtBayadHolder. textbook) rsViewInventory ToPay rsViewInventory. MoveNext End If Wend End With Dim rs modifyNah As New ADODB. Recordset rsupdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open SELECT * FROM tbl_inventory, ConnectDB If txtBayadUtang. textbook = rsUpdateNah Total therefore txtBayadUtang. textbook = Php &038 FormatNumber(rsUpdateNah Total) Else Dim rsUpdateNahh As New ADODB. Recordset rsUpdateNahh. CursorLocation = adUseClient rsUpdateNahh. CursorType = adOpenDynamic rsUpdateNahh. LockType = adLockOptimistic rsUpdateNahh. Open SELECT * FROM tbl_inventory, ConnectDB rsUpdateNahh Total = txtBayadUtang. text edition rsUpdateNahh. Update rsUpdateNahh. cobblers last txtBayadUtang. school text = Php &038 FormatNumber(txtBayadUtang. text edition) End If End If inflict query_list End hired gun head-to-head wedge txtPay_Change() If txtPay. textbook accordingly cmdP ayDue. Enabled = align cmdPrintLogs. Enabled = certain End If End hero sandwich commonplace government agency query_list() Dim rsViewUnpaid As New ADODB. Recordset rsViewUnpaid.CursorLocation = adUseClient rsViewUnpaid. CursorType = adOpenDynamic rsViewUnpaid. LockType = adLockOptimistic rsViewUnpaid. Open SELECT * FROM tbl_registration, ConnectDB If rsViewUnpaid. EOF = wild and so With rsViewUnpaid List_Unpaid. AddItem Names &038 vbTab &038 vbTab &038 vbTab &038 To Pay List_Unpaid. AddItem rsViewUnpaid. MoveFirst While rsViewUnpaid. EOF = False If rsViewUnpaid ToPay = 0 thus txtBayadHolder. schoolbook = rsViewUnpaid FirstName &038 &038 rsViewUnpaid LastName &038 vbTab &038 vbTab &038 Php &038 FormatNumber(rsViewUnpaid Payment) List_Unpaid. AddItem txtBayadHolder. textbook rsViewUnpaid. MoveNext Else rsViewUnpaid.MoveNext End If Wend End With End If End position frmLogin esoteric Declare Function sndPlaySound Lib winmm. dll Alias sndPlaySoundA _ (ByVal lpszSoundName As String, ByVal uFlags As Long) As Long Const SND_SYNC = &038H0 Const SND_NODEFAULT = &038H2 Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = report PASSWORD = End Function Private step in cmdCancel_Click() Unload Me frmStandbyMode. Enabled = True frmStandbyMode. read End Sub Private Sub Form_Load() frmStandbyMode. Enabled = False End Sub Private Sub cmdOK_Click() amaze record clipAccount = New ADODB. Recordset ecord boundAccount. CursorLocation = adUseClient recordSetAccount. CursorType = adOpenDynamic recordSetAccount. LockType = adLockOptimistic recordSetAccount. Open tbl_account, ConnectDB If (frmLogin. txtUserName. school text = And frmLogin. txtPassword. textual matter = ) because Unload frmLogin Unload frmStandbyMode MainFrame. mnuSearchGuest. Enabled = False MainFrame. mnuAddGuest. Enabled = False MainFrame. manifest ElseIf recordSetAccount. EOF = False because If frmLogin. txtPassword. text = thus wakelessfile$ = CProgram FilesTitanium beatkeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%)MsgBox Please input your password. Try again , , Login frmLogin. txtPassword. SetFocus ElseIf not frmLogin. txtPassword. schoolbook = recordSetAccount Password whence soundfile$ = CProgram FilesTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox Incorrect password. Try again , , Login frmLogin. txtPassword. SetFocus frmLogin. txtPassword. SelStart = 0 frmLogin. txtPassword. SelLength = Len(frmLogin. txtPassword. text) ElseIf (frmLogin. txtUserName. textbook = recordSetAccount UserName And frmLogin. txtPassword. textual matter = recordSetAccountPassword) Then Unload frmLogin Unload frmStandbyMode MainFrame. luff End If Else soundfile$ = CProgram FilesTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = s ndPlaySound(soundfile$, wFlags%) MsgBox Not a valid account. Try again , , Login frmLogin. txtUserName. SetFocus frmLogin. txtUserName. SelStart = 0 frmLogin. txtUserName. SelLength = Len(frmLogin. txtUserName. text) End If End Sub frmStanbyMode Private Sub mnu sack_Click() If MsgBox( be you sure you destiny to mercantile establishment program? , vbYesNo + vbInformation, Apartment supervise and Security System) = vbYes Then Timer1. Enabled = True End IfEnd Sub Private Sub mnuLogin_Click() frmLogin. gift End Sub Private Sub Timer1_Timer() Label1. microscopical = True ProgressBar1. telescopic = True If ProgressBar1. take account >= ProgressBar1. pocket Then End End If ProgressBar1. Value = ProgressBar1. Value + 1 End Sub MainFrame Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = root PASSWORD = End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. school text = thrift Then txtIdHolder. schoolbook = 1500 ElseIf cboRoomChoice. textual matter = threadbare Then txtIdHolder. school text = 2000 ElseIf cboRoomChoice. school text = Family Then txtIdHolder. school text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuest redact. circumpolar = True Set recordSetDelete = New ADODB. Recordset recordSetDelete. CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open SELECT * FROM tbl_registration WHERE RoomNumber = &038 cboRoomNumberDel. textbook &038 , ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). palpable = False MainFrame. dgGuestDelete. Columns(2). obvious = False MainFrame. dgGuestDelete. Columns(7). macroscopical = False MainFrame. dgGuestDelete.Columns(8). megascopic = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800 MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. gross = True img_box_del. Picture = LoadPicture(recordSetDelete Picture) cmdDeletee. seeable = True cmd burnt. in sight = True cmdOpenSesame. telescopic = True Else MsgBox This room has no invitee yet. , vbInformation, Apartment monitor and Security System img_box_del. telescopic = False cmdOpenSesame. megascopic = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. textbook = recordSetDelete RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. denominateOpen txtFilePathPic. textual matter = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. text) imgbox. visible = True End Sub Private Sub cmd straighten out_Click() constitute overhear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocatio n = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open SELECT * FROM tbl_registration WHERE FullName = &038 MainFrame. txtSearch. textbook &038 , ConnectDBIf MsgBox(Are you sure you want to blue-pencil this Guest?. , vbYesNo + vbInformation, Delete check) = vbYes Then rsDelete. Delete MsgBox Guest has been successfully deleted. , vbInformation, Apartment Monitoring and Security System Set dgGuestDelete. DataSource = nonentity entreat Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. in sight = False frame pictureGuest. Visible = True frameRegisterGuest. Caption = Edit here save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt.Open SELECT * FROM tbl_registration WHERE FullName = &038 MainFrame. txtSearch. Text &038 , ConnectDB txtFirstName. Text = rsE ditGuestt FirstName txtLastName. Text = rsEditGuestt LastName cbo sexual activity. Text = rsEditGuestt Gender cboRoomChoice. Text = rsEditGuestt RoomChoice cboRoomNumber. Text = rsEditGuestt RoomNumber txtFilePathPic. Text = rsEditGuestt Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open SELECT * FROM tbl_registration WHERE RoomNumber = &038 MainFrame. txtIdHolder. Text &038 , ConnectDB ritePort rsOpen RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open tbl_registration WHERE FullName = &038 MainFrame. txtSearch. Text &038 , ConnectDB If MsgBox(Are you sure you want to update this Guest?. , vbYesNo + vbInformation, Update V erification) = vbYes Then rsUpdateNah templates = Templ. arrange rsUpdateNah FirstName = txtFirstName. Text rsUpdateNah LastName = txtLastName. Text rsUpdateNah Fullname = txtFirstName. Text &038 &038 txtLastName.Text rsUpdateNah Gender = cboGender. Text rsUpdateNah RoomChoice = cboRoomChoice. Text rsUpdateNah RoomNumber = cboRoomNumber. Text rsUpdateNah Picture = txtFilePathPic. Text rsUpdateNah Complete checkStarted = Format(cboMonthStarted. Text &038 / &038 cboDateStarted &038 / &038 cboYearStarted. Text, mm/dd/yyyy) rsUpdateNah CompleteDueDate = Format(cboDueMonth. Text &038 / &038 cboDueDate. Text &038 / &038 cboDueYear. Text, mm/dd/yyyy) rsUpdateNah. Update rsUpdateNah. Close MsgBox Guest has successfully Updated. , vbOnly, Apartment Monitoring and Security System Call Clear End If End Sub Private Sub cme congestAdd_Click() frameRegisterGuest.Visible = False End Sub Private Sub Command2_Click() Dim rsinviteeview As New ADODB. Recordset If mskDateStarted. Text Then Set rsgu estview = New ADODB. Recordset rsguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open engage * from tbl_logs where Date= &038 mskDateStarted &038 , ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object Template can be empty. If so, then returns Nothing.If Templ Is Nothing Then Else Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End Sub Private Sub Form_Load() Call Clear Call View Dim espy() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open train * from tbl_registration, ConnectDB blob = rs templates set raw image from MySQL database If Templ Is Nothin g Then convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End SubPrivate Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = Register here frameRegisterGuest. Visible = True frameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(Are you sure you want to logout and change user? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click()If MsgBox(Are you sure you want to exit program? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then closePort Unload Me frmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = cboRoomNumberDel. Text = cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. drivel = Fingerprint Template File*. fpt Set dialogue box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error scoop out Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then This jurisprudence runs if dialog box was cancelled. Exit Sub End If Read double star data from file. Open CommonDialog1. FileName For binary program program star program program As 1 ReDim blob(LOF(1)) Get 1, , blob() Close 1 Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate Import binary data to template. Templ. Des erialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest.CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open tbl_registration, ConnectDB If txtFirstName. Text = Or txtLastName. Text = Or cboGender. Text = Or cboRoomChoice. Text = Or cboRoomNumber. Text = Or txtFilePathPic. Text = Or cboMonthStarted. Text = Or cboDateStarted. Text = Or cboYearStarted. Text = Or cboDueMonth. Text = Or cboDueDate. Text = Or cboDueYear. Text = Then MsgBox Missing Fields. , vbCritical + vbInformation, Apartment Monitoring and Security System Else If MsgBox(Are you sure you want to add this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsAddGuest. AddNew rsAddGuest templates = Templ. Serialize rsAddGuest FirstName = txtFirstName. Text rsAddGuest LastName = txtLastName. Text rsAddGuest Fullname = txtFirstName. Text &038 &038 txtLastName. Text rsAddGuest Gende r = cboGender. Text rsAddGuest RoomChoice = cboRoomChoice. Text rsAddGuest RoomNumber = cboRoomNumber. Text rsAddGuest Picture = txtFilePathPic. Text rsAddGuest CompleteDateStarted = Format(cboMonthStarted. Text &038 / &038 cboDateStarted. Text &038 / &038 cboYearStarted. Text, mm/dd/yyyy) rsAddGuest CompleteDueDate = Format(cboDueMonth. Text &038 / &038 cboDueDate. Text &038 / &038 cboDueYear.Text, mm/dd/yyyy) rsAddGuest Payment = txtIdHolder. Text rsAddGuest. Update rsAddGuest. Close Call Clear MsgBox Guest has successfully Added. , vbOnly, Apartment Monitoring and Security System End If End If End Sub Private Sub SaveTemplate_Click() Dim blob() As Byte First verify that template is not empty. If Templ Is Nothing Then MsgBox You must create a fingerprint template before you can save it. Exit Sub End If CommonDialog1. Filter = Fingerprint Template File*. fpt Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Save As dialog box. CommonDialog1. ShowSaveIf Err Then This code runs if the dialog box was cancelled. Exit Sub End If Export template to binary data. blob = Templ. Serialize Save binary data to file. Open CommonDialog1. FileName For double star As 1 Put 1, , blob Close 1 End Sub Private Sub Timer1_Timer() lblDate. Caption = Format(Date, Long Date) lblTime. Caption = Format(Time, Long Time) End Sub Private Sub Verify_Click() First verify that template is not empty. If Templ Is Nothing Then MsgBox You must create fingerprint template before you can perform verification. Exit Sub End If Show Fingerprint Verification dialog box. Verification. Show vbModal, Me End SubPublic Function Clear() txtFirstName. Text = txtLastName. Text = txtFilePathPic. Text = cboGender. Text = cboRoomChoice. Text = cboRoomNumber. Text = cboMonthStarted. Text = cboDateStarted. Text = cboYearStarted. Text = cboDueMonth. Text = cboDueDate. Text = cboDueYear. Text = cboRoomNumberDel. Text = im gbox. Visible = False img_box_del. Visible = False frameRegisterGuest. Visible = False frameSearchGuest. Visible = False End Function Public Function View() frameRegisterGuest. Visible = False frameSearchGuest. Visible = False frameViewGuest. Visible = True Set rsViewGuest = New ADODB. Recordset rsViewGuest.CursorLocation = adUseClient rsViewGuest. CursorType = adOpenDynamic rsViewGuest. LockType = adLockOptimistic rsViewGuest. Open SELECT * FROM tbl_registration ORDER BY RoomNumber ASC, ConnectDB Set dgGuestView. DataSource = rsViewGuest MainFrame. dgGuestView. Columns(0). Visible = False MainFrame. dgGuestView. Columns(2). Visible = False MainFrame. dgGuestView. Columns(5). Visible = False MainFrame. dgGuestView. Columns(7). Visible = False MainFrame. dgGuestView. Columns(8). Visible = False MainFrame. dgGuestView. Columns(1). Width = 2200 MainFrame. dgGuestView. Columns(3). Width = 1900 MainFrame. dgGuestView. Columns(4). Width = 1600 MainFrame. dgGuestView.Columns(6). Width = 12 00 Set rsViewGuest = Nothing End Function Verification Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = root PASSWORD = End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = Economy Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = Standard Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice. Text = Family Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete.CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open SELECT * FROM tbl_registration WHERE RoomNumber = &038 cboRoomNumberDel. Text &038 , ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = F alse MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete. Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox This room has no guest yet. , vbInformation, Apartment Monitoring and Security System img_box_del. Visible = False cmdOpenSesame. Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen xtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) im gbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open SELECT * FROM tbl_registration WHERE FullName = &038 MainFrame. txtSearch. Text &038 , ConnectDB If MsgBox(Are you sure you want to delete this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsDelete. Delete MsgBox Guest has been successfully deleted. , vbInformation, Apartment Monitoring and Security System Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = Edit here save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adL ockOptimistic rsEditGuestt. Open SELECT * FROM tbl_registration WHERE FullName = &038 MainFrame. txtSearch. Text &038 , ConnectDB txtFirstName. Text = rsEditGuestt FirstName txtLastName. Text = rsEditGuestt LastName cboGender.Text = rsEditGuestt Gender cboRoomChoice. Text = rsEditGuestt RoomChoice cboRoomNumber. Text = rsEditGuestt RoomNumber txtFilePathPic. Text = rsEditGuestt Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open SELECT * FROM tbl_registration WHERE RoomNumber = &038 MainFrame. txtIdHolder. Text &038 , ConnectDB writePort rsOpen RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah.CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open tbl_registration WHERE FullNam e = &038 MainFrame. txtSearch. Text &038 , ConnectDB If MsgBox(Are you sure you want to update this Guest?. , vbYesNo + vbInformation, Update Verification) = vbYes Then rsUpdateNah templates = Templ. Serialize rsUpdateNah FirstName = txtFirstName. Text rsUpdateNah LastName = txtLastName. Text rsUpdateNah Fullname = txtFirstName. Text &038 &038 txtLastName. Text rsUpdateNah Gender = cboGender. Text rsUpdateNah RoomChoice = cboRoomChoice. Text rsUpdateNah RoomNumber = cboRoomNumber. Text rsUpdateNah Picture = txtFilePathPic. Text sUpdateNah CompleteDateStarted = Format(cboMonthStarted. Text &038 / &038 cboDateStarted &038 / &038 cboYearStarted. Text, mm/dd/yyyy) rsUpdateNah CompleteDueDate = Format(cboDueMonth. Text &038 / &038 cboDueDate. Text &038 / &038 cboDueYear. Text, mm/dd/yyyy) rsUpdateNah. Update rsUpdateNah. Close MsgBox Guest has successfully Updated. , vbOnly, Apartment Monitoring and Security System Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegister Guest. Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text Then Set rsguestview = New ADODB. Recordset sguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open Select * from tbl_logs where Date= &038 mskDateStarted &038 , ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object Template can be empty. If so, then returns Nothing. If Templ Is Nothing Then Else Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End SubPrivate Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLoc kOptimistic rs. Open Select * from tbl_registration, ConnectDB blob = rs templates set raw image from MySQL database If Templ Is Nothing Then convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End Sub Private Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = Register here frameRegisterGuest. Visible = True rameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(Are you sure you want to logout and change user? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click() If MsgBox(Are you sure you want to exit program? , vbYesNo + vbInformation, Apartment Monitoring and Security Syst em) = vbYes Then closePort Unload Me rmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = cboRoomNumberDel. Text = cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. Filter = Fingerprint Template File*. fpt Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then This code runs if dialog box was cancelled. Exit Sub End If Read binary data from file. Open CommonDialog1. FileName For binary program As 1 ReDim blob(LOF(1)) Get 1, , blob() Close 1 Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest. CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open tbl_registration, ConnectDB If txtFirstName.Text = Or txtLastName. Text = Or cboGender. Text = Or cboRoomChoice. Text = Or cboRoomNumber. Text = Or txtFilePathPic. Text = Or cboMonthStarted. Text = Or cboDateStarted. Text = Or cboYearStarted. Text = Or cboDueMonth. Text = Or cboDueDate. Text = Or cboDueYear. Text = Then MsgBox Missing Fields. , vbCritical + vbInformation, Apartment Monitoring and Security System Else If MsgBox(Are you sure you want to add this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsAddGuest. AddNew rsAddGuest templates = Templ. Serialize rsAddGuest FirstName = txtFirstName. Text

Tuesday, December 25, 2018

'Week Final\r'

'My training was of a military family with my Father creation from central Indiana and my mother glide path from Japan, this difference has interestingly shape my views a unforesightful bit differently from hers, but on the same side of things as we gather in execute older shaped a truly similar portend of view on ourselves, family, and society. Taking the Myers Briggs quiz I scored a emblem SITS and was named a Trustee, meaning that I was to a greater extent than Introverted, sensing, thinking, and mind than my mate although similar with a type JIFFS and names conservator tying among introverted and extroverted, ensign, ruleing, and judging beingnessness her higher(prenominal) marked percentages.What I found give away is that for me it was moderately faultless I feel as I am to a greater extent introverted when it comes to accomplishments and things that I tidy sum do to make things matter most. Am a thinker and think most before doing something whether It has to do with myself of others, and overtime have become Judging in my perception of Issues or Ideas.My Interviewee tested similar with the exception of being more feeling, I for 1 faecal matter see this as she is always spirit emerge for the less fortunate, and helping when she can no tater what, sp contemplateing her plan thinner as the days of the calendar week unfold. My interviewer remembers information give away if given the opportunity to give away rather than reading slightly a behavior. The reason was given that to observe Is better than reading as dis redactment can be misconstrued or left out when trying to remember equit adequate to(p) what It was you had Just read about.I for champion am split between the two as I do learn better by observing an example or technique than reading, but feel powerfully that I can besides read about behaviors or techniques and then hire what I had just read bout, I also feel that with the more media on sicknesses and disorders in schools and with more kids being diagnosed with convey it comes to a point that what you take in daily Is the information on what signs to life for and where to seek help, a nonher Instance is that It seems analogous you can Just talk to e precise given parent who has kids and school and you allow find someone who has experienced this at first hand or knows someone who has dealt with it. Interviewee chooses to study at home with distractions and noise as contend to going to a unemotional place equal a public library.She feels as though noise and distractions are of no concern over the cleverness to be comfortable in her own picture at home, and she doesnt really want to be in a place foreign because that alone will give her more distractions than any that could could settle into a soothe quiet environment better to be able to concentrate better with little or no distraction apparent. I know that if I chose to study at home and was not able to bed to my downstairs of fice for peace and quiet I would not be able to concentrate long enough to do any good. One way I study at home is to do it either early in the first light or posterior in the flush so that I am not tempted to see what else the family is doing of find myself choosing to partake in other activities other than studying. The results of the Myers Briggs test for the interviewee was one of being a conservator; she was more opt to minister to others needs and in demand(p) to be of service to others first to a fault herself.I on the other hand was one of Trustee, decisive in practical affairs, and a guardian of time honoured institutions. My interviewee mat up as if the test was somewhat accurate and that it lacked accuracy on how she believed she should of scored, she had a unstated time believing that only a little over 13% of the state was indeed similar to her. She matte up that with rescuerianity being as high as it was in the U. S. That more people should have been scored as to have the craving to help others in need and to mentor to them. I apprehension that the test was fairly accurate for me as I am really traditionalistic in my thinking and decisive, but felt similar as I melodic theme that more than 11% should be like me.My interviewee thought that childhood memories of church building and observations on how her parents treated others shaped her personality as a young women, and then as she matured it grew into a better blood with her memories of church that helped her to continue to want to go and become better at doing the things that savior has died for us to become. She felt potently that it was her desire or the Holy Spirit touching in her lead her to this understanding and defines who she is today. I felt different as I was never brought up in church and didnt even take in church until I aired my wife and was then arrears old. I feel that my parents strong will to be respectable after all my experience was in the Ana and I held a pretty straight line or suffered the consequences for my actions, that and the Nipponese culture from my mothers side which has a very high respect for a family love that molded my transformation as a young man to adulthood.I do feel that after living the way I did, which was a typical one as a young man it was later in life when my wife asked me to attend church that I felt something was miss and that desire led to my walk with Christ that shaped my personality today. Interviewee feels as if she is very self monitoring as I pertains to her military posture each and every day, an attitude that starts with what she takes in, what she reads, watches, meditates to, music she listens to, and even the food she eats. She do the comments â€Å"garbage in garbage out”. I felt as if this has also led my day as well. I choose to be conscious of what I say and what I do. This awareness affords me the ability to bobby pin the everyday stresses with work, school, kids, etc. door knocker confidence that I can concentrate through the day Just as long as I have the attitude to behave positively and responsibly.The strongest things that enchant the interviewees attitudes are scripture. She gives GOD her first and endure each and every day. This positive shake meditation that includes, prayer, bible readings, and awareness allows herself to be charged for positive things and allows her the ability to administer stressful times with integrity and honor to GOD. The thing that I felt strongly about that has the most influence on my attitude is my mind. If I allow things torn down with negative influences. I likewise feel that a conscious descent with Christ has offered me and equipped my spirit to handle stressful situations with integrity and honor as well.\r\n'

Monday, December 24, 2018

'Part Four Chapter V\r'

'V\r\nShirley Molli male child was convinced that her husband and son were over-stating the danger to the council of leaving the stalks military positions online. She could not stick with and through how the essences were worse than gossip, and that, she knew, was not yet punishable by fair play; nor did she believe that the police would be foolish and unreasonable abundant to punish her for what somebody else had written: that would be monstrously unfair. Proud as she was of Miles law degree, she was sure that he essential hire this bit wrong.\r\nShe was tameing the meat boards tied(p) more frequently than Miles and Howard had advised, provided not because she was alarmed of legal consequences. Certain as she was that Barry Fairbrothers move had not yet finished his unauthorised task of crushing the pro-Fielders, she was eager to be the first to set eyes on his next post. Several generation a day she scurried into Patricias rare room, and clicked on the web pa ge. Somemultiplication a little gelidity would run through her while she was hoovering or peeling potatoes and she would race to the think, exactly to be disappointed over again.\r\nShirley felt a special, inexplicable kinship with the Ghost. He had chosen her website as the forum where he would expose the double-dealing of Howards opponents, and this, she felt, entitled her to the p dischargee of the naturalist who has constructed a habitat in which a ancient species deigns to nest. plainly thither was more to it than that. Shirley relished the Ghosts anger, his brutality and his audacity. She wondered who he big businessman be, visualizing a strong, faint man standing basis herself and Howard, on their side, cutting a path for them through the opponents who crumpled as he slayed them with their ingest ugly truths.\r\nSomehow, none of the men in Pagford bring break throughmed worthy to be the Ghost; she would extradite felt disappointed to learn that it was any of the anti-Fielders she knew.\r\n‘Thats if its a man, verbalise Maureen.\r\n‘Good point, say Howard.\r\n‘I think its a man, say Shirley coolly.\r\nWhen Howard left for the cafe on sunshine morning, Shirley, calm in her impregnation gown, and attrisolelye her cup of tea, padded automatically to the study and brought up the website.\r\nFantasies of a delegate victor posted by The_Ghost_of_Barry_Fairbrother.\r\nShe set surmount her tea with trembling make passs, clicked on the post and read it, open-m come onhed. Then she ran to the lounge, seized the telephone and called the cafe, but the number was engaged.\r\nA mere phoebe bird minutes later, Parminder Jawanda, who had also developed a habit of looking at the council message boards much more frequently than usual, receptive up the site and saw the post. standardized Shirley, her immediate reaction was to seize a telephone.\r\nThe skirts were breakfasting with issue their son, who was still asleep upstai rs. When Tessa picked up, Parminder cut crosswise her friends greeting.\r\n‘Theres a post astir(predicate) Colin on the council website. Dont let him see it, whatever you do.\r\nTessas stir eyes swivelled to her husband, but he was a mere three feet from the receiver and had already perceive each word that Parminder had intercommunicate so loudly and clearly.\r\n‘Ill call you back, express Tessa urgently. ‘Colin, she express, fumbling to replace the receiver, ‘Colin, wait †‘\r\n barely he had already stalked protrude of the room, bobbing up and go across, his arms stiff by his side, and Tessa had to jog to catch him up.\r\n‘Perhaps its best not to look, she urged him, as his big, knobble-knuckled gain travel the mouse across the desk, ‘or I can read it and †‘\r\nFantasies of a substitute Headmaster\r\nOne of the men hoping to present the community at Parish Council level is Colin Wall, legate Headmaster at Wint erdown Comprehensive School. Voters might be interested to hold out that Wall, a strict disciplinarian, has a truly extraordinary fantasy life. Mr Wall is so frightened that a pupil might file him of inappropriate sexual behaviour that he has often necessary time impinge on work to calm himself down again. Whether Mr Wall has actually fondled a first year, the Ghost can only guess. The fervour of his hectic fantasies suggests that, even if he hasnt, he would corresponding to.\r\nStuart wrote that, design Tessa, at at a time.\r\nColins deliver was brainsick in the light pouring out of the monitor. It was how she imagined he would look if he had had a stroke.\r\n‘Colin †‘\r\n‘I suppose Fiona Shawcross has told people, he whispered.\r\nThe denouement he had perpetually feared was upon him. It was the end of everything. He had al ways imagined taking sleeping tablets. He wondered whether they had enough in the house.\r\nTessa, who had been momentaril y throw by the mention of the headmistress, tell, ‘Fiona wouldnt †anyway, she doesnt know †‘\r\n‘She knows Ive got OCD.\r\n‘Yes, but she doesnt know what you †what youre afraid of †‘\r\n‘She does, said Colin. ‘I told her, out front the last time I needed sick leave.\r\n ‘Why? Tessa abound out. ‘What on earth did you tell her for?\r\n‘I wanted to explain why it was so important I had time off, said Colin, almost humbly. ‘I panorama she needed to know how serious it was.\r\nTessa fought down a powerful desire to shout at him. The tinge of distaste with which Fiona treated him and talked close to him was explained; Tessa had never bidd her, always thought her delicate and unsympathetic.\r\n‘Be that as it may, she said, ‘I dont think Fionas got anything to do †‘\r\n‘Not directly, said Colin, pressing a trembling hand to his sweating upper lip. ‘But Mollisons heard gossip from somewhere.\r\nIt wasnt Mollison. Stuart wrote that, I know he did. Tessa recognized her son in every line. She was even astonished that Colin could not see it, that he had not connected the message with yesterdays row, with hitting his son. He couldnt even propel a bit of alliteration. He must have done all of them †Simon footing. Parminder. Tessa was horror-struck.\r\nBut Colin was not thinking about Stuart. He was recalling thoughts that were as vivid as memories, as sensory impressions, violent, vile ideas: a hand seizing and squeezing as he passed through densely packed teen bodies; a promise of offend, a childs tone contorted. And then asking himself, again and again: had he done it? Had he enjoyed it? He could not remember. He only knew that he kept thinking about it, perceive it happen, feeling it happen. Soft flesh through a thin cotton blouse; seize, squeeze, pain and shock; a violation. How many times? He did not know. He had fagged hours won dering how many of the children knew he did it, whether they had speak to each other, how long it would be until he was exposed.\r\nNot knowing how many times he had offended, and unable to trust himself, he burdened himself with so many papers and files that he had no custody bleak to attack as he locomote through the corridors. He shouted at the swarming children to halt out of the way, to stand clear, as he passed. None of it helped. There were always stragglers, running past him, up against him, and with his hands burdened he imagined other ways to have improper march with them: a swiftly repositioned elbow brushing against a breast; a side-step to ensure corporal contact; a leg haply entangled, so that the childs groin make contact with his flesh.\r\n‘Colin, said Tessa.\r\nBut he had started to cry again, great sobs shaking his big, ungainly body, and when she put her arms around him and pressed her face to his her own tears wet his skin.\r\nA few miles away, in Hilltop House, Simon Price was sitting at a speckless family computer in the sitting room. watching Andrew cycle away to his weekend trouble with Howard Mollison, and the reflection that he had been forced to turn out full market price for this computer, made him feel irritable and additionally hard done by. Simon had not looked at the Parish Council website once since the night that he had thrown out the stolen PC, but it occurred to him, by an association of ideas, to check whether the message that had cost him his job was still on the site and thus seeable by potential employers.\r\nIt was not. Simon did not know that he owed this to his wife, because poignancy was scared of admitting that she had telephoned Shirley, even to request the removal of the post. Slightly cheered by its absence, Simon looked for the post about Parminder, but that was asleep(p) too.\r\nHe was about to close the site, when he saw the newest post, which was entitled Fantasies of a Deputy Headmaster .\r\nHe read it through in two ways and then, alone in the sitting room, he began to laugh. It was a savage triumphant laugh. He had never taken to that big, bobbing man with his huge forehead. It was good to know that he, Simon, had got off very lightly indeed by comparison.\r\n shame came into the room, smiling timidly; she was glad to hear Simon laughing, because he had been in a dread(a) mood since losing his job.\r\n‘Whats funny?\r\n‘You know Fats old man? Wall, the deputy headmaster? Hes only a bloody paedo.\r\nRuths smile slipped. She zip forward to read the post.\r\n‘Im going to shower, said Simon, in high good humour.\r\nRuth waited until he had left the room before trying to call her friend Shirley, and alerting her to this new scandal, but the Mollisons telephone was engaged.\r\nShirley had, at last, reached Howard at the delicatessen. She was still in her dressing gown; he was pacing up and down the little back room, behind the counter.\r\n‘à ¢â‚¬Â¦ been trying to get you for ages †‘\r\n‘Mo was using the phone. What did it say? Slowly.\r\nShirley read the message about Colin, enunciating like a newsreader. She had not reached the end, when he cut across her.\r\n‘Did you copy this down or something?\r\n‘Sorry? she said.\r\n‘Are you teaching it off the screen? Is it still on there? Have you taken it off?\r\n‘Im dealing with it now, lied Shirley, unnerved. ‘I thought youd like to †‘\r\n‘Get it off there now! God above, Shirley, this is getting out of hand †we cant have stuff like that on there!\r\n‘I bonny thought you ought to †‘\r\n‘Make sure youve got rid of it, and well talk about it when I get home! Howard shouted.\r\nShirley was furious: they never raised(a) their voices to each other.\r\n'

Friday, December 21, 2018

'Analysis of Scenes of Atonement Film\r'

'Atone work forcet- analytic thinking of Scenes The context starts with a tenacious opaline of the three characters base on balls on a path in the reeds towards the television tv camera. The argue a coarse push over is utilise is to try the setting of the characters. It cuts in to a refine fleetst up of Robbie to ground his whole step as he realises they have made it to the sea. It cuts to an modal(a) high angle aerial abundant ginger snap as the characters atomic number 18 path finished and through with(predicate) the reeds to taper the true discouragement of the men. While they atomic number 18 running the symphony playing is commencement like creation played on an organ and picks up pass to build up the latent hostility of the gibe.It come plazas their movement as they run and cuts into a cozy u p of Robbie’s shoe then zooms stunned and moves up at the same time up over Robbie’s head to an complete immense scene of the mar gin of Dunkirk. The reason an extreme long barb was employ was in exhibition for the viewers to sincerely be subject to see the alto go throughher of the bound, to capture the essence of the War by all the loneliness of the beach by beholding it all. A bend coolness turnaround time is used between the men and the beach, firstly it is a boney up of Robbie’s expression to be able to portray the emotion of disappointment in Robbie’s side.The camera then cuts to its continues trailing virgule using a hold steadicam for the duration of 5 minutes. It starts with the camera bring in a mediocre lance at eye level of the men talk of the town as they walk towards the camera. the captain is tall-stalked and walks with precision to steer his authority. The camera continues to track the men in a long gingersnap as they walk on the beach, certain objects obscure the view of the men move as the camera tracks derriere things like burning cars which is includ ed in the mise-en-scene as it shows the viewers the true devastation of the scene.Robbie is walking with purpose and determination and the camera follows Robbie to shows his purpose. in that respect is no medicinal drug on the unlesston the rattling of the on differences of the soldiers and the soldiers shouting, the moves of horses atomic number 18 perceive and gun changeables. As the horses argon macrocosm shot in a long shot view with Robbie walking forward from them symphony starts playing to heighten the emotion of the scene. The camera tracks Robbie as he moves through the scene, the camera follows whatsoever flying paper in the air into a low angle shot of the broken sails of a ship with a bit on top shouting ‘Laddie, I’m coming home! which shows contrast of his expect despite his hopeless situation, it also gives a sense of madness. The camera tracks rout into a close up of Robbie to show his emotion through his facial expression. The beach is alter with broken debris and men going closely all sorts of things, one man is seen doing exercises on a beam and contrasts with some other men getting in a fight or stumbling a bit drunk. A Ferris wheel is seen in the canground border by smoke and devastation, it looks as if it’s almost a dead carnival and the Ferris wheel is a to show the true nature of the devastation of the war.Children are seen posing down next to some toys, they are placed sitting down to learn the defeat and hopelessness in their situation. The music begins to s come up and men are comprehend singing as the camera tracks them and moves into a close up as it goes round seeing their faces as they sing, gives a feeling of hope within them. The camera tracks back into a close up of Robbie exhibit defeated, uncomfortable expression on his face which contrasts as the camera tracks around a group of men shouting and tantalize as they are going on a merry-go-round.The camera tracks back as Robbie an d the both men walk towards the camera in a medium shot as they walk through the beach, exhibit all the doings of different men on the beach. The camera tracks the men walking up some stairs as the music heightens, the camera turns to show the beach as it tracks behind men. It shows the devastation the beach has suffered due the terrible war, it tracks behind the men to include them into the shot as they are a part of the war.The camera tracks on exposing the beach and music is at a very low tempo to approbation the feeling of the shot as easily as the men singing are comprehend as hygienic as the â€Å"Laddie, I’m coming home! ” BRIONY IN THE HOSPITAL The scene starts with a long shot of a corridor lighted down the middle, the type create verbally sound is heard. The music picks up as a group of concords in a long shot walk down the corridor towards the camera. The music and typewriter is the same as the scene briony had as a little girl and so the music in combination with the rhythmic type pen has take her signature soundtrack.The camera pans in a close up shot of the treasures apparel as they walk passed, the shot of their berth shows the determination of them as they walk. The camera tracks the binds as they walk into a room with the patients beds, it goes into a close up of the head nurse as she addresses the other girls, the close up shows the seriousness in her expression as she talks. A shot reverse shot is used as the head nurse addresses them. The other nurses are dismissed walking past in two lines showing precision eaving bryony standing all in the middle of the shot and the music heightens as the camera zooms into a medium shot of her showing a worried, lone(prenominal) expression on her face. the hospital seems to slip her character as everything is in order and is just so, everything is white, perfect and orderly which goes well with her character. The camera cuts to a shot reverse shot of briony and the head nurse as she addresses bryony, Briony is positioned in a very upright position to show her character.The camera cuts to a close up shot of Briony in the window to portray her unhappy emotion, the camera zooms out into a long shot of Briony walking down a corridor, the shot has low key lighting as it gives an almost eerie feeling. A radio is heard in the background notification the developments of the war as well as her signature sound of a typewriter is heard as she walks, she walks very rigid but not with the same determination as in the previous scene with her as a girl as if ‘ in that location is no Briony anymore. ’ The camera pans a shot of the nurses room, all doing girly things as they get ready for bed.Lights are switched off and the sound of the typewriting is heard once once more and the camera cuts to a medium shot of Briony sitting down writing in the dark, one of her fellow nurses walks in and Briony jumps up guiltily as if she’s doing something wr ong when she gets a shake from the noise. A medium shot reverse shot is used as a conversation between the two are going on. Briony’s hand slaps down on the page to show she’s anxious about anybody seeing her work. A high angle close up shot of her hand on the page is shown and once her hand is outside the viewers see the title of what she’s writing â€Å"Two Figures by a Fountain. A slow swelling of music is heard as they speak about the book and a close up of the two faces is shown to portray the friends eagerness to shaft about the story and Briony’s worried expression on her face. Briony confesses what it’s about in a close up shot to show her pain as she thinks about what she has done, it shows her ontogenesis as a character as she is finally acknowledging and understanding what she has done. There is a half shadow on her face which is a technique the director has used to portray secrets as she is only congress a half truth.There is a lo ng shot used to show the two girls laughing and this is the first time Briony is seen laughing as she is feeling exhilarated. unison picks up as the camera cuts to a shot of Briony sitting at a desk writing a garner to Cecelia, as she is writing there is a voice over telling us what she has contained in her letter. The camera cuts to a serial of shots of her cleaning as the voice over of the letter is being read, the cleaning is emblematicalal for cleansing oneself as she is trying to neaten herself for to terrible thing she did.She is trying to redress for what she has done and that is seen through the shots. For example there is a close up shot of her vigorously scrubbing her hands which is symbolic for her desperation to cleanse herself within. The camera cuts to a medium shot of the two girls talking as they pack stuff away in the store room , the camera cuts to a close up shot of Briony to show her expression as she is reminiscing about her crush. A bell go and the came ra tracks the nurses as they run through the corridor, music starts to swell to add tension to the scene.The camera tracks the girls as they run through a group of soldiers outside, men are heard shouting and it adds to the sense of chaos. There is a medium shot of Briony carry a badly injure man inside, a medium shot is used to show the determination on her face. The camera cuts to different shots of nurses tending to wound men and what Briony is doing, the continues change of shot and the use of the handheld camera in truth adds and emphasizes the chaos of it all as well as the use of the handheld camera making it feel more real. It cuts to a shot of Briony having blood on her hands which is very symbolic.Men and those being carried are rushing passed her as she stands looking around, Robbie is seen in the middle and it quickly cuts to a close up of Briony to show her reply to seeing him, music swells to add to the approaching of her going towards Robbie but the music drops wh en it’s not him. Briony is seen inside once again tending to hurt men, there are close ups and medium shots of the terribly injured men to add to the devastation of the war. In the shots Briony is seen as very sedate and determined in contrast to some others who are crying.\r\n'

Thursday, December 20, 2018

'Conflict Management Styles Essay\r'

' impinge ordinarily occurs when soulfulnesss within a pigeonholing or organization has differences in opinions. When individuals be in a disagreement nearly something like policies and procedures or even the boilers suit direction of which an organization or ships company is heading it sess be sum actually frustrating. As we all know engagement the process of mesh usually begins when an individual or subdivisiony has perceived the different part and it has showed a proscribe squeeze or bequeath affect something that some other party c atomic number 18s about.\r\nAccording to the readings in Chapter 15 the early approach of encounter truism that all counterpoint was labeled to be bad. Conflict then had a negative vibe and was used often to be linked with such terms as violence, destruction, or irrationality as support to its negative association. There are some(prenominal) types of strife from the integrationist point of view that intromits useful and dysfun ctional conflict. Functional conflict usually arises during when the goals of a group are support and the execution rises.\r\nOn the other overhaul dysfunctional conflict is conflicts that hinder the performance of the group as a whole. The conflict process consists of five stages that include potential drop opposition, incompatibility, cognition and privateization, intentions, behaviors, and outcomes. In my tameplace the nigh common form of conflict charge is potential opposition and incompatibility. I slang worked for Viking Range Corporation for 10 days now and I enjoy my work in that location. My supervisory program is invariably open for dialogue and this is maven of the most full of life parts that come about conflict in my organization.\r\nMost of the times intercourse plays a huge role in the metier of the company. Communication is the biggest task that we spend a penny as a whole throughout the facility because in that location perpetually take care to be conflict that arises between divisions on part outages, and department personnel. Conflict is something we can’t rescind whether at space or at the workplace. Conflict will be present in retributory about e actually human interaction that we come across and this can even out the strategies that we use for conflict focusing very important.\r\nAccording to (Conflict Management Home-versus-work) â€Å"Conflict focussing strategies vitally increase the performance and force of an individual and in turn the effectiveness of the organization as a whole. ” I am an individual that can’t compensate or probe to parry conflict. I behave been a part of a lot of confrontations and I subdue to avoid them at all costs. â€Å"In the same article Rahim and Bonama’s (1979) salmagundi of the styles of settling interpersonal conflict is ground on two facades, first when a person considers himself and his take concerns and the second when a person consid ers others and the concerns of others.\r\nTheir styles for handling conflict include an integrating style in which a person considers his style and the styles of others. Secondly would be the avoiding style in which the individual has no concerns for their self as well as others. Thirdly would be obliging in which the individual posses a concern for others but not himself. The next one is the predominate style in which the individual has heights concerns for himself for low concerns for others. Lastly we have the pliable style in which the individual own some consideration for himself and some for others.\r\nI can relate more to the commanding style because in my organization either department is usually out for themselves sum they like to maintain a high up standard by any means. However, one thing that I have wise to(p) that is creation a part of the credit line world there will always be some form of conflict and differences of opinions will arise so it is best to ha ndle the situation immediately. By acknowledging that there is conflict present and communication has come to a standstill we can drop-off the problems that unsolved conflict can bring about in any organization.\r\n one and only(a) way that we appoint with conflict in our organization is by acknowledging the goals of each department as well as the employees. The Supervisor over our department does not handle conflict well and he tries to avoid any altercations at all costs. With me being next in line he will usually push things of this record off for me to handle. I often deal with the situations by convey the employees into the office to perk what the problem is in forms of communication and what caused the problem to begin with.\r\nI have attempt to encourage my Supervisor to deal with situations in the future before they occur and he has taken steps on his own to deal with situations where he sense conflict. He can actually sense when there is a lack of communication and co nflict is about to arise so he stops it before it starts by bringing both individuals into the office to try and labor to the root of the problem before something major adventures. This same occurrence can happen between priapic and female person management personnel that can’t depend to see eye to eye and have issues that lead to conflict.\r\nAccording to (Conflict Management Modes and leaders Styles) â€Å"most individual characteristics have an relate on the instruments analyzed, for example: younger managers are more task-oriented, while older managers are typically relationship- oriented and avoid conflicts, women are more collaborative and avoid conflicts slight and men tend to use the reconciling mode more than women. â€Å"Rather surprisingly, check to our survey, women appear to be more rivalrous than men.\r\nThe compromising style of conflict matches my personal preference tremendously, because I can relate to this style in my organization on a day to da y basis. existence in my field of work there will always be a competition between the male and female employees as well as male and female management personnel. I view at this as something that will be unavoidable because there will always be a power difference between the genders. So I try to look at things from a large perspective and consider both parties knobbed because there will always be differences in opinions.\r\n'

Wednesday, December 19, 2018

'Mang Inasal Essay\r'

'I. Background of the Company\r\nMANG INASAL †Filipino’s spryest growing barbeque fast food chain, serving chicken, pork barbeque and other Filipino favorites, was first established on declination 12, 2003 in Iloilo city. Mang Inasal comes from two word’s MANG †topical anesthetic word for â€Å"Mister” and INASAL †Ilonggo word for barbecue, a popular suitcase in Visayas. MangInasal †is a Pinoy quick-service restaurant that originated in the City of Iloilo and was able to compete with other existing food chains nationwide. Currently, there are 464 branches nationwide and with everywhere 10,000 employees system wide. MANG INASAL is doing its share in alleviating the unemployment burden of the country. The front man of every MANG INASAL in a certain sphere provides not only employment but in any case opportunities to community members including suppliers of kalamansi, charcoal, banana leaves, vegetables, bamboo sticks, and other ingre dients. It also indirectly gives income †generating activities to many. MILESTONE:\r\n* Mang Inasal’s First Company have store: Robinson’s Place Iloilo on declination 12, 2003\r\n* First store in Manila: SM Mall of Asia on September 15, 2006\r\n* 100th hive away at Kalibo on January 9, 2009\r\n* 200th Store core Miranda Quiapo December 21, 2009\r\nOn its 6thyear, Mang Inasal built a tote up of100 stores in one year from 2008 to 2009. Mang Inasal capitalized on better-looking livelihood to the people around its surrounding communities Mang Inasal has destine a significant example of using environmental friendly materials in its operations. Vision Statement\r\n* To be the 2nd largest QSR in the Philippines by year 2020.\r\n explosive charge\r\n* To consistently provide our customers with a â€Å"solb, alagang pinoy” experience everyday.\r\nMang Inasal shopping centre Values\r\n* Costumer Focus\r\n* Excellence\r\n* adore for the Individual\r\n* Teamwo rk\r\n* Spirit of Family and Fun\r\n* Honesty and rightfulness\r\n* Frugality\r\n* Sense of Ownership\r\n* Humility to beware and Learn\r\n'

Tuesday, December 18, 2018

'Human freedom and the ten commandments Essay\r'

'When Jesus was asked, â€Å"What moldiness I do to inherit eternal heart bosh? â€Å", he replied: â€Å"You know the Commandments, keep these and you volition live. ” It has been said, that the decennium Commandments are non simple rules mandated by beau ideal, exactly rather, this set of rules is considered as a gift precondition to men in order for them to live the life storyspan that perfection has promised.\r\nAlthough the word â€Å"commandment”, by itself, imports something authorisation and mandatory, it must be understood that God has bothow severally sensation of his people independence and freedom to choose how he or she will act, and hence, serviceman race freedom is an important topic to be discussed aboard the Ten Commandments. It will be seen, that the kind of life that men live is simply a musing of how he uses the freedom that he has been gifted with. A person evict either live a life full of one spent as a superb follower of God.\r\nAlthough some would cite that it is a promontory of fate, destiny, or maybe plain luck, the truth is that, a person lives a life based on his own qualitys and decisions. As go for been stated, men have been gifted with freedom, and it is up to him how he will utilize this gift. Every person has unlike forms of needs and wants that have to be dealt with in effortless life. This is where freedom sets in. In allowing absence of restriction, God permits all several(prenominal) the opportunity to shape his life. It has been stated that this is one risk that God chose to take.\r\nâ€Å"God risked much in creating us humans with the freedom, now, to unleash horrendous nuclear disaster or to love our fellows across all boundaries. ” (Grider, 1994). It is the freedom that each one has been blessed with that enables him to empathize and appreciate the life that he has and all the cup of tea that comes with it. On the other hand, if this freedom is abused, past the consequences that go with it, would also have to be dealt with by the individual concerned. Being free entails a lot of responsibility.\r\nIt is believed that God granted every individual the gift of freedom, not for the sole reason that he be unconditioned or limitless. Man is given freedom for him to be responsible for all the things that he says, does or even so thinks of. neat enough, some philosophers believe that the things that happen to each individual can be traced to the actions and decisions that he chooses to take. around of the times, it is not up to the heavens if a good or bad thing happens to one person. more of than not, everything that happens to a person can be traced to the soma of action that he chose to take.\r\nThe scriptures that God instructed to be drafted, in essence, are mere forms of guidance for men; that in the end, it is human freedom which will ultimately dictate whether or not an individual will live his life by these guidelines. The conce pt of human freedom is more often discussed by mentioning the story of what happened to spell and Eve in the garden of Eden. As has been aptly stated, â€Å"these questions as to the nature of human freedom arise especially when we turn our attention to the question of the origin of sin.\r\nOnly consider how many times the origin of sin has been ascribed to this human freedom of choice, implying this multiple power of man’s nature and of his creaturely conception: to sin or not to sin; a good part and an evil part of his nature. ” (Berkouwer, 1962). True enough, God could have stopped the serpent from interacting with Adam and Eve, but due to the freedom that he bestowed the two, they had the choice as to whether or not to take the orchard apple tree that the serpent offered them. Ultimately then, it is this choice that they made which is the chemical group cause of why they were banished from the garden of Eden.\r\nIt would appear then that despite the Ten Command ments being set bring by God to be sent to his people, the alike is not precisely a set of obligatory rules imposed upon men. Rather, the Ten Commandments are considered as a guide as to how each person should live if he wants to experience the kind of life that God promised. This is a kind of life full of happiness, peace, steady and love. A person’s freedom can lead to this if a person, in choosing paths to take, keeps in melodic theme what the Ten Commandments speak of.\r\nUltimately, it would depend upon the person if he will live the kind of life promised by God ever since the olden times, or if he will use his freedom to lead him to a kind of unspeakable and despicable kind of living.\r\n reservoir â€Å"The Ten Commandments”, <http://www. whitestonejournal. com/tencommandments> J. Kenneth Grider , â€Å" gay Freedom”, 1994, <http://www. bibleviews. com/humanfreedom. html> G. C. Berkouwer, â€Å"Human Freedom”, 1962, <http://www. the-highway. com/freedom2_Berkouwer. html>\r\n'