Monday, September 30, 2019

Healthcare and Poverty in America

The Dire Need for Universal Health Care The United States is considered by many to be the greatest country in the world. However, when it comes to health care the US is ranked behind 36 other countries, according to the World Health Organization. If one was to do any research at all, they would find that an overwhelming 34 of these 36 countries all have one thing in common. They all use a universal health care system. This is not just a mere coincidence.The problems and outrageous cost within the US healthcare system causes over 700,000 Americans to go bankrupt every year. This staggering problem simply does not occur in any other industrialized countries. Accounting for these facts the United States needs to move quickly to embrace the ideas and adopt the policies of a universal healthcare system. Not only will this help improve the quality of care but will also improve the life of its estimated 16. 3% or 50 million citizens without any healthcare insurance at all.An almost overwhel ming problem caused by the United States’ current health care system is that those with low incomes can't afford the necessary health care and thus already rely on occupations or government programs to receive coverage. This is evident if not by merely recognizing that 50 million citizens don’t have any health insurance, but also because the statistics clearly show that it is very uncommon for health insurance to be purchased directly by the individual. Using statistics taken by the US Census Bureau in 2010, we can conclude that of the 83. % of people with health insurance, the majority 55. 3% had it through employment –based benefits and 31. 0% were able to receive it through government funding. This compares to the measly 9. 8% of people that purchased their insurance directly from a provider. After examining this, it is evident that the vast majority of people rely on their employers or the government funding to keep health insurance. This fact clearly causes some problems when someone might be laid off or just simply makes a career change. Entire families can lose their health coverage due to the breadwinner being released from their job.The National Center for Health Statistics claims that over 50% of individuals lacking health insurance directly blame cost. Roughly 24% of uninsured people claim reasons related to a lost job or a change in employment. It is interesting to note that around 8% of people claim ineligibility for family insurance coverage due to age or leaving school. The primary reason for lacking insurance is money, and it could also be argued that money is directly or indirectly involved in almost every circumstance causing a family to lack the necessary health insurance to provide care.Several years ago in 2005 the NCHS began a study that found well over 40 million adults claiming that they were in need of but did not receive one or more of the health services that follow: medical care, prescription medicines, mental h ealth care, dental care, or eyeglasses. The best reason these 40 million citizens didn’t receive such basic forms of healthcare was simply that they could not afford it. The United States is the only industrialized country that does not provide some type of universal health care to its citizens. Furthermore, they have one of the highest rates for health care expenditures in the world.As a matter of fact, health care expenditures in the United States are by far the highest of any developed country. According to the Organization for Economic Co-operation and Development the United States health care expenditures is at 15. 3% of GDP. Next highest in spending is Switzerland, at only 11. 6% of their national GDP. This leads one to believe that the United States does not spend health care money very efficiently. Even according to the Congressional Budget Office in 2006 there were an estimated one-third of health care expenditures that did not help improve health outcomes.Thatâ€⠄¢s roughly 700 billion dollars, and represents nearly 5% of the United States entire GDP. The best solution that is currently being made to the United States healthcare system is what people informally call â€Å"Obamacare. † The actual name for the bill is the Patient Protection and Affordable Care Act (abbreviated to PPACA or ACA). The PPACA has implemented a large amount of new rules and regulations regarding health care, with the purpose of making health care more affordable for everyone. There are some that stand in opposition of the PPACA.They argue that they believe these new rules and regulations take away too many freedoms and force people (both individuals and businesses) to do things they shouldn't have to. However, politicians have concluded that the positive effects of the PPACA far outweigh any negatives. The positive effects that will come about from the Patient Protection and Affordable Care Act are so numerable it would take hundreds of pages to discuss. One important change will come about by lifting the patent protections on prescription drugs.The bill allows the Food and Drug Administration to approve more generic drugs, thus causing competition in the market to drive the prices downward. This in itself would lower the United States drug prices from being an astounding 35% to 55% higher than other countries to actually being competitive at a fair market value. The PPACA has also made new regulations that place a limit on just how much of a percentage of the money an insurer makes can be profit, to make sure they're not price-gouging customers. Obamacare† uses the philosophy that strictly regulating insurance companies profit margins will help prevent the health insurance price-gouging that has been running awry all over the United States. Helpless customers that desperately need to be insured have formerly had little to no control over the greedy insurance providers. The PPACA stepping in and regulating should be viewed more a s a protection for the consumer that a hindrance to the insurance suppliers. The PPACA also places new regulations on what new health plans have to offer.For example, insurance providers are now required to provide preventive care without requiring any sort of charge at all. Before this new regulation was put in place many health providers did not cover cost or still charged fees for things such as mammograms, colonoscopies, and many other forms of screening that would be unaffordable to many in the lower class. Requiring preventive care coverage should better the quality of health care provided in the US, especially to those at or below the poverty line.In conclusion, upon seeing the problems the current United States healthcare system creates for citizens struggling in or right above the poverty line, upon taking a glance at other countries healthcare systems that seem to be more efficient and less expensive, and upon already experiencing the positive changes that have come from i mplementing rules and regulations that create a universal healthcare system, Americans should begin to finally agree that healthcare reform should be at the forefront of our minds.Not only to help all those stricken with poverty to receive care, but to improve the quality of healthcare for all Americans. Word Count: 1197 words

Sunday, September 29, 2019

Classroom Observation Essay

I did my observation at Horace Mann Elementary school 3nd grade classroom. When I entered the classroom, I felt very welcomed, Mrs. burns had all the students welcome me. It was a very colorful classroom covered with the children’s art work. The children seemed to feel very comfortable around each other; they all appeared to be communicating well. The goals of the children in the class room are to actively participate and understand the information taught. As I observed part of her math class, they were learning money. She gave them a worksheet to work on after she taught the lesson. As they were completing the worksheet she walked around to answer any questions and to make sure they were on task. Ten minutes later, children need to take a break on the underground,so Mrs. burns asked them to keep quiet and stand a line leave the classroom,in order to let them keep quiet,she got a idea,she took a rose and give it to who are being quiet ,then she asked that person pass this rose to another person which u think being quite,but at this time I found an interesting thing. A girl ,she didn’t pass the rose to a quiet person,she just passed it to her best friend,at first I didn’t know it ,but then there are some students began to complain about that,so I know she didn’t do it as teacher said,actually it correspond this age’s behaver,they are care more about friendship , the children are starting to not be as bossy and domineering. They do not like critism, and wishes to please others. They are sensitive about others feelings. However, they may be critical of themselves and become more of a perfectionist. The children are more cautious and withdrawn during this age. I asked Mrs. burns how she went about communicating with her students families and she told me she uses phone calls, email, and parents will sometimes send a note if he/she has any concerns. She gave me advice to always call from work and to never call from home. She said last year she had a bad experience where she used her house phone to call a parent, and after that the parent was constantly calling her house. Her curriculum was based on the California Standards. She showed me form, which was made from the CA Standards it gives you a weekly plan, and different activities to do Monday-Friday. A few of the activities included target skills of the week, like phonics, comprehension skills, and comprehension strategies.

Saturday, September 28, 2019

Book Store Business Essay Example | Topics and Well Written Essays - 750 words

Book Store Business - Essay Example An extension of the used book store without seating for espresso kiosk and snack bar is not an ideal decision because it reduces the appeal of the store. In case the expansion is planned with a large scale renovation to the store with a lengthier menu to chose, additional furniture, shelves and interior design, expansion costs may range from $40000 to $80000. Returns from the investment for expansion are lucrative since coffee kiosks that sell specialty coffee is a profitable business. Material cost for the preparation is lower than twenty five percent of the sale price (Plan A: The small, bookstore-owned coffee bar 2002). The used book store is located in a shopping mall and stocks book in various categories. They include mathematics, arts and entertainment, children’s fiction, antiques and collectibles, humor, history, law, literary criticism, biography and autobiography, children’s non-fiction, cooking education, games, house and home, language arts and disciplines, body, mind and spirit, computers, gardening, family relationship’s, business and economics, current affairs, health and fitness, foreign language study, medical books, self help, sports and recreation, nature, poetry, pets, religion, philosophy, technology, philosophy, study aids, true stories, reference, travel and science (Browse Book Categories 2008). Online sales of used books have reached a growth rate of thirty percent in the recent past. This is due to the vast customer base available online and the comparative lesser cost in reaching these customers around the world. The store specialized in used study books for which the market share is huge. Specialized advertising in student related websites and educational websites frequented by students serves as the main mode of sales promotion. There is a high demand for used books for various reasons. The used books may be required because it is out of print and students require it in class, or the book may not

Friday, September 27, 2019

Sonny's Blues Essay Example | Topics and Well Written Essays - 500 words

Sonny's Blues - Essay Example On the other hand, Sonny’s brother is an upright math teacher and a family man. Though, he always steers clear of trouble but feels trapped in Harlem and yet, chooses to remain passive about it. Sonny’s character depicts restlessness and even though Sonny’s brother too experiences that restlessness they both have different ways of exhibiting them and coping with such feelings. 2. What are the conflicts in the story (internal and external)? The entire story depicts various conflicts both the narrator and the protagonist face and eventually pave their paths in life. The conflicts that sonny and the narrator are constantly battling with are the feeling of being trapped in Harlem and their estranged relationship with each other. They both understand the problems they have faced throughout their lives, but due to the fact that none of them truly took the time to share and divulge their feelings to one another, none of them could truly understand each other. Moreover, Sonny’s older brother had taken up the responsibility of looking after his brother after his mother died but due to the way he turned out, the narrator was always suffering from this guilt.

Thursday, September 26, 2019

Nutrition Essay Example | Topics and Well Written Essays - 2000 words

Nutrition - Essay Example A closer look at my daily diet showed that I was not consistent in meeting the food requirements that are set in the basic food pyramid guide (health.stateuniversity.com, 2009). My diet varied highly from day to day, with very high-energy intake on day 2, followed by day 1. On day 3, there was a very drastic reduction in my food and energy intake to less than half of what I normally take. This was due to my busy school workload, which made me neglect the preparation of food for that day. The third-day food intake was sufficient to lower my daily average to 2200 cal day-1. However, my food intake was much higher than what I really needed considering my very low level of physical activity. Being relatively young, I still do not have a medical condition that will require an immediate change in diet, however there is a major discrepancy in my diet compared to the set guidelines. The food pyramid sets the minimum and maximum levels of food servings that are required from each of the different food groups namely cereals, vegetables, fruits, meats, dairy and sweets and oils. Servings were calculated based on standard recommendation (Healthy Eating Guide, 2001). The average number of servings was calculated from my diet and is presented in Appendix Table 2, Table 1, and Figure 1. On a weight basis, the meat group contributed the most to the daily energy intake, followed by the cereals group. The least contribution came from the vegetables (Figure 2). This was in agreement with the very large number of servings obtained from meat. Figure 3 presents the percentage of contribution of the different major nutrients to my diet. Carbohydrates make up more than half of my nutrients, while proteins and fats have almost equal contribution to the other half. Analysis of foods and how they affect our metabolism and health should be done by taking an overall picture of the whole. However,

Wednesday, September 25, 2019

Critical Thinking Argument Paper Assignment Example | Topics and Well Written Essays - 500 words - 1

Critical Thinking Argument Paper - Assignment Example The energy wasted in the process far exceeds the energy we actually receive from these renewable sources. For these reasons, my conclusion is that the solar, wind, and hydraulic sources of renewable energy cannot be a feasible and permanent alternative to coal. Preexisting conditions, like congenital heart disease or Type I diabetes, can be grounds for refusal of health insurance by private insurance companies. This leads to a growing number of people who either are uninsured or have inadequate coverage. The costs of routine visits to a doctor, let alone life-saving procedures or long term medical care, are immense and can be impossible to pay off in full by most of the Americans. Thus, there is no regular and monitored access to health care for a growing number of people. Emergency rooms are available to uninsured people if they require urgent medical care, but these visits are not free. Neither do they include continued monitoring. The costs incurred by the government for providing aid to uninsured people run into billions of dollars. Providing some kind of basic health insurance for all American citizens would probably cost the government a lot less, in the long run. Thus, I conclude that universal health care would have numerous advant ages to

Tuesday, September 24, 2019

Applications of Operant Conditioning at School Essay

Applications of Operant Conditioning at School - Essay Example Operant conditioning can be defined as a type of learning in which voluntary (controllable; non-reflexive) behavior is strengthened if it is reinforced and weakened if it is punished (or not reinforced) 1 . It states that environmental contingencies or the environment's 'reaction' to an individual's behaviour controls that individual's behaviour. As an Undergraduate he was an English major, then decided to study Psychology in graduate school. Early in his career he believed much of behavior could be studied in a single, controlled environment (created Skinner box - address later). Instead of observing behavior in the natural world, he attempted to study behavior in a closed, controlled unit. This prevents any factors not under study from interfering with the study - as a result, Skinner could truly study behavior and specific factors that influence behavior. During the "cognitive revolution" that swept Psychology (discussed later), Skinner stuck to the position that behavior was not guided by inner force or cognition. This made him a "radical behaviorist". As his theories of Operant Conditioning developed, Skinner became passionate about social issues, such as free will, how they developed, why they developed, how they were propagated, etc. 1 Skinner state that actions that are followed by reinforcing consequences are more likely to re-occur, and that actions that are followed by unpleasant or punishing consequences are less likely to re-occur. Again this might seem deceptively simple. However, the theory becomes more complicated when one realizes that what constitutes punishment and reinforcement differs depending on the individual. Skinner also noted that the situation within which the learning took place had to be taken into account. In analyzing and trying to account for behaviour, the psychologist, as behavioural detective, needs to take into account the antecedent (what happens immediately before the behaviour), the behaviour, and the consequences of the behaviour. This method is known as the ABC approach (A for antecedent, B for behaviour and C for consequences). There are five basic processes in operant conditioning: positive and negative reinforcement strengthen behavior; punishment, response cost, and extinction weaken behavior 2. Positive Reinforcement The term reinforcement always indicates a process that strengthens a behavior; the word positive has two cues associated with it. First, a positive or pleasant stimulus is used in the process, and second, the reinforcer is added (i.e., "positive" as in + sign for addition). In positive reinforcement, a positive reinforcer is added after a response and increases the frequency of the response. 2 Negative Reinforcement The term reinforcement always indicates a process that strengthens a behavior; the word negative has two cues associated with it. First, a negative or aversive stimulus is used in the process, and second, the reinforcer is subtracted (i.e., "negative" as in a "-" sign for subtraction). In negative reinforcement, after the response the negative reinforcer is removed which increases the fre

Monday, September 23, 2019

Engineering Ethics Essay Example | Topics and Well Written Essays - 250 words - 1

Engineering Ethics - Essay Example Today, France generates about 70% of its electricity with an array of nuclear plants that come in only three sizes: small, medium, and large. In fact, their plants make so much electricity that France is the largest net exporter of electric power in the world. And modular, standardized construction practices are a large part of why the French nuclear effort has been such a success† (Kayde, 2011). Modular practices make it harder to produce dual-use materials or turn waste into weaponry. France's engineers created a moral result through engineering. Is smart nuclear power ethical? Some people think it isn't, no matter how smart. But it seems to really stretch believability that nuclear power is always by definition a bad thing. Is it really worse than coal? Is it so much worse that there is never a reason to use it over coal? Engineers working on smarter nuclear solutions is moral even when many activists are opposed to nuclear power as a matter of course. But there is another p oint to make. Morality must always be adjudicated based not just on consequences but on the innate character of the acts and the virtues of the person involved. One problem with consequentialist, utilitarian perspectives is that they tend to allow people to justify flawed solution A over B without ever trying to think of good solution C, something deontological ethics prevents by favoring the status quo.

Sunday, September 22, 2019

Career development Essay Example | Topics and Well Written Essays - 2000 words - 4

Career development - Essay Example 32). One aspect of substantive importance in the study of career development is that it differs depending on whether it is an individual involved or an organization. For individuals, career development involves a broader array of activities involving decision-making processes and planning, whereas, for organizations, it involves the practice of effectively managing the human resources workforce. However, for the case of this paper, focus is made on an individual basis. Self-efficacy involves making a person make a judgment on the ability to perform certain tasks. Unlike self-esteem that makes reflections on an individual’s worth or value, self-efficacy determines the confidence in an individual towards accomplishing certain tasks and reaching certain goals. A number of perspectives exist in the study of self-efficacy beliefs including the development and the dynamics involved. Ideally, self-efficacy beliefs have effects in all aspects of the human body, because through the determination of a person’s ability and belief towards the accomplishment of certain tasks. In return, self-efficacy affects situations by the use of power. It is substantively clear that self-efficacy beliefs have the necessary power that an individual requires to perform a certain task as well as make an informed decision in regard to a particular task. In life, tasks usually involve the numerous challenges faced, and as such, self-efficacy beliefs determine the ability to tackle the different life challenges by making the most appropriate and informed decisions. Four major theoretical approaches exist from which the study of self-efficacy beliefs emanates, especially in career development. Such include the social cognitive theory, social learning theory, self-concept theory, and attribution theory. Social cognitive theory makes emphasis on the development of an individual’s personality through observational learning and experiences from the

Saturday, September 21, 2019

The Nature of Nursing Practice Essay Example for Free

The Nature of Nursing Practice Essay Nursing practice, like medicine, is also governed with ethical principles by which they are expected to perform their duties. Indeed, the moral sense of their duty lies with in this context of ethical considerations which according to Anne Bishop and John Scudder is â€Å"to lift out the moral significance of their practice and to develop facility in understanding how to fulfill the moral imperatives in their practice† (2001, p. 13) Bishop and Scudder contends that the moral issue in nursing ethics â€Å"concern with relationship of good in the sense of attentive, efficient, and effective with good in the personal sense† (2001, p. 19). It means of understanding the ways of the practice of nursing and employing them to foster welfare of the patient. Graham Rumbold in his book, Ethics in Nursing, pointed out that nursing evolves as a distinct profession from a medicine. He said, â€Å"Nurses no longer see themselves as handmaidens to the doctor but, at the very least, partners in care and at best practitioners in their own right† (Rumbold 1999, p. 9) Patricia Cronin and Karen Rawlings-Anderson citing Pierson (1999) pointed out that nursing practice, education and research has been significantly influenced by Cartesian philosophy. They state, â€Å"Nursing using the conventions of Cartesian philosophy would be able to describe, explain, predict, and control the phenomena of concern in nursing practice† (Cronin Anderson 2004, p. 10). Regarding the practice of nursing, William Cody pointed out that the nurse â€Å"is obligated to practice in such a way that seeks to avoid harm and to benefit the patient† (2006, p. 139). Cody said good nursing is more than a cluster of technique in that it involves a commitment to a moral end and is directed and judge by the end. George Khushf emphasized that nursing practice must be governed by ethical behavior and described the good nurse as â€Å"an individual who was virtuous and who followed certain rules in caring for the sick† (Khushf 2004, p. 490). Khushf pointed out that the ethical behaviors that were expected of the nurse, included loyalty, modesty, trustworthiness, obedience, promptness, quietness, cheerfulness, and deference to authority figure (2004, p. 490). Louise Rebraca Shives that the ANA or the American Nurses Association identified four primary principles to guide ethical decisions; â€Å"The client’s right to autonomy, the client’s right to beneficence, (doing good by the nurse), the client’s right to veracity (honesty and truth by the nurse), and the ethical principle4s of fidelity or the nurse faithful duties, obligations, and promises when providing care† (Shives 2006, p. 52) But nurses’ responsibility extends beyond their hospital duties. Sarah T. Fry argued, â€Å"Practicing nurses are also responsible for working within the professional organization to establish and maintain equitable social and economic working conditions in cursing† (Fry 2002, p. 136). Fry stressed that nurse collaborates with co-workers in bringing social and economic concerns to the awareness of employers and the members of the community, even if this means to participate in organized labor demonstration. Despite of the importance of the nursing practice in hospitals, nurses may also be at great risk of being sued if one appears oblivious or unresponsive to the needs of the patient, the family, or both.   Charles Sharpe pointed out, â€Å"The practitioner who attempt to care too much† (1999, p. 42). He emphasized that the conscientious, dedicated nurse who oversteps the limits of his clinical skills, training, and professional knowledge in providing what may well be meticulous care, places him or her self and the patient in jeopardy (Sharpe 1999, p. 42). Susan Westrick Killion and Katherine Dempski stressed that â€Å"when a nurse’s professional negligence rises to the level of reckless disregard for human life the nurse may face criminal charges of negligent homicide or manslaughter† (2006, p. 9). Work cited Bishop, AH Scudder, JR 2001, Nursing Ethics: Holistic Caring Practice, Jones Bartlett Publisher, Massachusetts, USA. Cody, W 2006, Philosophical and Theoretical Perspectives for Advanced Practice, Jones and Bartlett Publisher, Massachuserrs, USA. Cronin, P Anderson KR 2004, Knowledge for Contemporary Nursing Practice, Elsevier Limited, London, UK. Fry, St 2002, Ethics in Nursing Practice: A Guide To Ethical Decision Making, Blackwell Publishing Company, Oxford, UK. Khusf, G 2004, Handbook Of Bioethics: Taking Stock of the Field From a Philosophical Perspective, Kluwer Academic Publishers, Massachusetts, USA. Killion, SW Dempski K 2006, Quick Look Nursing: Legal and Ethical Issues, Jones and Bartlett Publishers, Massachusetts, USA. Rumbold, G 1999, Ethics in Nursing Practice, Elsevier Limited, Philadelphia, USA.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sharpe, C 1999, Nursing Malpractice: Liability and Risk Management, Green Wood Publishing Group, USA. Shives, LR 2006, Basic Concepts of Psychiatric-Mental Health Nursing, Lippincott Williams Wilkins, Philadelphia, USA.

Friday, September 20, 2019

The Role Of Jealousy And Your Relationship

The Role Of Jealousy And Your Relationship Do you find yourself constantly checking your boyfriends/girlfriends cellphone, hacking their email, looking through their purse, briefcase , looking for solid evidence to prove their dishonesty? When your partner dresses nicely for an occasion, does your compliment accompany sarcastic remarks? Do you think your partner is a flirt or exceptionally friendly with his workmates? Do you call your partner when youre feeling anxious, just to make sure, he is not with someone else? If the abovementioned scenarios are familiar to you, then chances are you are slowly turning into a green eyed-monster. And if you are not careful this monster will wreak havoc in your relationship. Jealousy is an emotion that refers to the negative thoughts and feelings of insecurity, fear, and anxiety over an anticipated loss of something of valuable, such as a relationship, friendship, or love. It often consists of a combination of emotions such as anger, sadness, and disgust. It is not to be confused with envy. The color green is often associated with jealousy and envy, from which the expressions green with envy, and green-eyed monster. The green eyed monster comes to life when distrust eats into the relationship. This is further aggravated with acts of infidelity. The reality of a third party in a relationship can be most traumatic. For the faint hearted this is enough reason to end ones life. Some partners may be willing to forgive incidents of infidelity, but the devastating experience can never be forgotten. And although there is some level of peace in the relationship instances of nagging doubts can still cause tension, sometimes this triggers the final separation. The irony of it all, is that people who are guilty of cheating, turn out to be the more suspicious. Because they are aware of what could take place, as they are guilty of the crime, they are likely to suspect their partner to do the same. Believe or not even a person who engages in acts of infidelity may feel intense feelings of jealousy. Of course there are some who are naturally distrustful, probably because of some traumatic experience. For instance most kids who were old enough to witness the break-up of their parents, have a hard time trusting others. They believe relationships do not last forever and that the day will come when they too, will left by the person they love. However psychologists are firm that that the root cause of jealousy is internal, and not external factors like third party. People do not get jealous because they saw their partner having fun with someone else. Psychologists believe that a big part of the problem lies within, and external conditions. The pretty girl, or the friendly workmate have nothing to do with it. The possible causes of Jealousy are as follows: Lack of self confidence: People develop feelings of jealousy because they have no faith in their own abilities and skills. They do not believe that they are capable of having happy relationships. They probably think that their current partner is the best that they will ever have, and thus they should make it last forever, because they might not find anyone like it. If youre one hundred percent sure of yourself, youll never have feelings of jealousy because you know that you are deserve to be happy and that you will always attain the life you deserve. If you have faith in yourself you know that you will always have happy relationships, and just in case the current one will not work out, you can always look forward to a better one. Poor self image: Having a poor self image is another cause of jealousy; if you think you are not beautiful then chances are youll be experiencing insecure whenever you are in the presence of someone good looking. You will compare yourself to that person and you will feel bad because you do not have the same eyes, or shes taller or slimmer. A person with a very positive self image, values ones uniqueness. He or she knows that beauty is beyond skin deep. Fear : One of the root causes of feelings of jealousy is fear. Most people are so afraid to lose their partner because they do not want to be alone. They think being alone is synonymous to loneliness. Believe it or not, some people are happily living fulfilling lives on their own, without any partner. When you are alone it is easy to take control of your life, because no one will influence your decision-making process. Some people anchor happiness to being in a relationship. Happiness is a choices. Whether you are in relationship or not, you can still have a happy life. Insecurity: Feelings of insecurity is a result of poor self image, a lack of self confidence topped with the fear of losing your partner to someone else. This can be a very stressful phase in the relationship. Insecurity can lead to nonstop arguments and petty quarrels. If the problem is not addressed immediately then it can lead to something as drastic as separation. Levels of Intensity in professional jealousy There can be intense jealousy if you happen to dislike the party in question. This is very evident in cases of professional jealousy. If you happen to abhor the person who received the promotion, then you could be fuming mad. The opposite can also take place. Of course if the person who received the honor, happens to be a very good friend, then you too will be just as happy. While low self esteem and poor self image can also lead to professional jealousy, another factor to consider is emotional maturity the ability to assess a relationship or situation and to act according to what is best for oneself and for the other person in the relationship. Being emotionally-mature means being just as happy for other peoples success as if it were our own. And so we shouldnt feel bad when someone else wins the contest, or if someone gets a higher grade in class. Negative thoughts bring negative situations and so brewing ill-feelings in our hearts moves us further away from blessings. Invasion of privacy A jealous person will not stop until he or she can come up with a tangible proof of the suspected affair. The alleged aggrieved party would start snooping around going through personal effects, in order to look for clues. Invading ones private space, like hacking ones email password causes dissatisfaction and can ruin a relationship. Such an action is a clear indication of mistrust. How can there be a good relationship if two people no longer trust each other. Of course if there is a strong evidence of cheating invasion of private space may seem logical. However one must be prepared for the ugly truth. Friend or foe Jealousy brings nothing but feelings of negativity. You will end up feeling bad, you will ruin your relationships, and fill your heart with hatred. It leads to blaming others which can result to further misunderstandings. Getting rid of the green-eyed monster: Yes, there is a good side. Like anything else, jealousy can be channeled towards the good. Lets take professional jealousy as an example. If you are aspiring for a promotion at work, and all of a sudden, your boss awards that position to someone else, instead of feeling bad you can look at the bright side and be happy for that persons good fortune. Instead of declaring that the promotion should have been yours, be grateful to the universe for sending you a sign. The fact that a manifestation of that wish has taken place, even if the recipient was not you, is an indication that the universe has acknowledged it. And guess what you are next in line. The other persons good fortune could just be a sign, that your with is in the air, and it will soon be made available to you at the perfect time. Get rid of all ill feelings. Relax, spread love and be happy, for your wish will soon be granted. As for the jealousy that takes place between two people in a relationship, this simply indicates that there are matters that need to be settled. People in love, trust and respect each other. Jealousy is a sign of diminishing trust. Why is your girlfriend so adamant about reading your text messages? Have you been paying her enough attention or have you been spending too much time with the boys? Why is she suddenly having doubts? At this point no one is at fault until proven guilty, however such matters need to be settled, immediately before its too late. Remember that in the law of attraction, thoughts become things. A person in doubt who constantly floods her mind with thoughts of her cheating husband, will eventually bring it to life. Instead of dwelling on the negative, think of the good times, those fun moments with the family, such thoughts will undoubtedly fuel feelings of happiness in your heart. So get rid of that green-eyed monster. It will bring nothing but anger and sadness. Thank God for your wonderful partner every day and stay happy. www.nomorejealousy.com/

Thursday, September 19, 2019

Paul Strand :: essays research papers fc

Paul Strand (1890-1976) was born in New York and attended the Ethical Culture School, based on the principles of John Dewey , a popular choice for those middle class Jewish families wishing to assimilate into secular US society.(Encarta) In 1907 he joined the photography classes and club taught by Lewis Hine, the greatest American documentary photographer of his time, who was photographing living conditions in slum areas and the treatment of immigrants on arrival at Ellis Island, and campaigning for the appeal of child labor laws through photographs of "Children Working" on the streets, in factories and in mines. (Capa) Hine took his students to Alfred Stieglitz's "Gallery at 291", which had an overwhelming impression on the seventeen-year-old Strand, who later returned to discuss his photographs with Stieglitz. After leaving school Strand started work in the family business, continuing his photography in his spare time.(Encarta) His early work followed the pictorialist model of the photo secession, but further visits to 291 and other galleries, and discussions with Stieglitz meant that Strand was kept up to date with the new modern art from Europe. He shared Stieglitz's growing disillusion with pictorialism, and in particular his growing insistence that photography should make use of the unique possibilities it offered, particularly its ability to describe the scene with greater detail and accuracy than the human hand, rather than attempt to mimic painting or drawing. (Rosenblum) Strand expressed his views clearly and forcibly in a number of articles. Strand was one of the first photographers to take up the visual problems and approaches which he saw in modern art. By 1915 this was showing clearly in his work, with an interest in geometrical forms, patterns, rhythm, space and the division of the frame; the pictures were like a knife cutting through the butter of Pictorialism . Stieglitz greeted this with enthusiasm, showing it in the gallery and making it the feature of the final issues of Camerawork. (Web Galleries) The "White Fence", perhaps the best known from this period, shows the white painted pickets of a fence across the lower half of the picture, setting up a rhythm which is syncopated by their imperfections. The spaces between the posts show a dark grass area, pictorially of equal weight to the white wood, setting up a 'figure-ground opposition' (we can see it as either light areas against a dark background or dark areas against a light background) in this part of the picture, producing the spatial illusion of bringing the horizontal grass expanse into a vertical visual plane.

Wednesday, September 18, 2019

The Common Cold :: essays research papers

The common cold has been plaguing humankind since the beginning of human existence. Even in these advanced times, there is no vaccine or cure. There are many symptoms that accompany the common cold. Some of these infamous symptoms are a runny nose, caused by inflammation of the nasal tissues, resulting in over production of mucus to trap the virus, and coughing. there are two different kinds or types of coughs that are common with colds. The first, is the less common dry hacking cough, these kinds are more likely to keep you up at night and just plainly annoy you than do any thing else. The other more common type of cough is the kind whose purpose is to expel mucus and or phlegm. These help to combat the cold by helping to expel the mucus that has the virus trapped in it. Other symptoms include a slight tingle or tickle in the back of the throat that usually turns into a sore throat and sneezing. Both of these symptoms are was for your body to help expel phlegm or mucus from the body. Another symptom is swelling of the face and or neck usually accompanied by pain around the eyes, nose, and forehead. This pain and swelling is caused by the introduction of the virus into your upper respiratory tract, therefore causing mucus building up in your nasal passages and then in your sinuses causing them both to become impacted. Many people complain of hoarseness, aches and pains in their joints, fever of about 101 degrees, and general aches and pains all over their bodies (Anthanasoid). There are at least two hundred different kinds of viruses that are known to cause what is known as the common cold, and an unknown number of undiscovered causes (Nourse 56). The virus who is usually responsible for a cold is called a rhinovirus, and it accounts for around thirty to fifty percent of all colds that afflict the adult part of the human population. The virus that is secondly responsible for most common colds, is called a coronavirus, and it is only different form a rhinovirus by a margin of few select proteins in it's molecular structure. The rhinovirus is so small that it can only be measured in milimicrons, one milimicron is about 1/25,000,000 of an inch, that means that about five hundred rhioviruses can fit on the point of a pin. That fact makes the rhinovirus and the coronavirus categorized in the medium territory. The virus cannot reproduce by itself. In fact scientists cannot even decide whether to classify it as an animal or a plant, because it is so primitive. To reproduce, the virus must first latch onto a nearby cell and inject it's genetic makeup into the

Tuesday, September 17, 2019

Tenskwatawa :: essays research papers fc

History has not been kind to Tenskwatawa, otherwise known as Lalawethika or The Prophet. He is inevitably compared to his heroic brother Tecumseh and fails to measure up in both physical and moral stature. He seems hidden in the shade of his brother's name, whereas his brother would never have had the stature he received if it were not for The Prophet's religion of classical Indian heritage. Lalawethika seemed to be plentiful of both physical and social shortcomings. An unimpressive-looking man of below-average height, fond of wearing jewelry, especially small medals, which he hung from his pierced nose and ears. His most striking physical characteristic was his damaged right eye, which was permanently closed after he injured it with a bow and arrow. Lalawethika was not a likable person. He was not accepted by the other Shawnee youths and refused to take part in traditionally prestigious male activities such as hunting and fighting. As a young man he boasted of his abilities but seem ed to lack anyambition. He attempted to compensate for his misfortunes but was only counterproductive in making "a truculent, bragging personality that earned him his nickname Lalawethika (The Rattle or Noisemaker)" (p. 73). Two activities Lalawethika liked were drinking and talking. He wasn't as gifted a speaker as his brother Tecumseh, but he was nonetheless manipulative and forceful. Using these qualities he became a medicine man in Tecumseh's village. Lalawethika's transformation from a lazy drunkard into a powerful spiritual leader came after a dream in which he claimed to have been visited by the Great Spirit. He proclaimed his new name to be Tenskwatawa meaning "The Open Door." White settlers began to call him The Prophet because he said the gods had shown him the path to salvation for his people. This new religion called upon Natives to reject white culture and return to the traditional way of life. Tenskwatawa gave up alcohol and urged his followers to do the same. The distinguished changes apparent in Tenskwatawa immensely supported his new way of life. When those sent by The Master of Life took Lalawethika in his dream, they showed him a very fertile land full of game as well as a large wigwam where eternal fires burned. "The Master of Life had chosen him to lead the Indians back down the road toward salvation" (p. 76). At the heart of these new teachings was the belief that the land was held in common by all the tribes.

Monday, September 16, 2019

Critics on Cooperative Principle Essay

As phrased by Paul Grice, who introduced it, it states, â€Å"Make your contribution such as it is required, at the stage at which it occurs, by the accepted purpose or direction of the talk exchange in which you are engaged. â€Å"[1] Though phrased as a prescriptive command, the principle is intended as a description of how people normally behave in conversation. Speakers and listeners involved in conversation are generally cooperating with each other. For reference to be successful, it was proposed that collaboration was a necessary factor. In accepting speaker’s presuppositions, listeners normally have to assume that a speaker who says his something really does have that which is mentioned and isn’t trying to mislead the listener. This sense of cooperation is simply one in which people having a conversation are not normally assumed to be trying to confuse, trick, or withhold relevant information from each other. In most circumstances, this kind of cooperation is only the starting point for making sense of what is said. Since conversations between people are not always straight forward, the linguistic philosopher H. P. Grice attempted to explain how a hearer gets from what is said to what is meant, from the level of literally expressed meaning to the level of implied meaning and he termed the implied meaning conversational implicature in his theory. Grice suggests that there is a general principle guiding conversation what he calls the Cooperative Principle (CP for short), and communicators observe the general conversational maxims of truthfulness, informativeness, relevance and clarity within the CP, according to the four main maxims of Quantity, Quality, Relation and Maner. When the listener hears the expression, he has to assume that the speaker is being cooperative and intends to communicate something. That something must be more than just what the words mean. It is an additional conveyed meaning, which is an implicature. People who obey the cooperative principle in their language use will make sure that what they say in a conversation furthers the purpose of that conversation. Obviously, the requirements of different types of conversations will be different. The cooperative principle goes both ways: speakers (generally) observe the cooperative principle, and listeners (generally) assume that speakers are observing it. This allows for the possibility of implicatures, which are meanings that are not explicitly conveyed in what is said, but that can nonetheless be inferred. For example, if Alice points out that Bill is not present, and Carol replies that Bill has a cold, then there is an implicature that the cold is the reason, or at least a possible reason, for Bill’s absence; this is because Carol’s comment is not cooperative — does not contribute to the conversation — unless her point is that Bill’s cold is or might be the reason for his absence. (This is covered specifically by the Maxim of Relevance). We assume that people are normally going to provide an appropriate amount of information. We assume that they are telling the truth, being relevant, and trying to be as clear as they can. Listeners and speakers must speak cooperatively and mutually accept one another to be understood in a particular way. The cooperative principle describes how effective communication in conversation is achieved in common social situations. However, there are some circumstances where speakers may not follow the expectation of the cooperative principle. In courtrooms and classrooms, witnesses and students are often called upon to tell people things which are already well known to those people, thereby violating the quantity maxim. Such specialized institutional talk is clearly different from conversation. However, even in conversation, a speaker may opt out of the maxim expectations by using expressions like ‘No comment’ or of such expressions is that, although they are typically not â€Å"as informative as is required† in the context, they are naturally interpreted as communicating more than is said. For example, the speaker knows the answer. It is speakers who communicate meaning via implicatures and it is listeners who recognize those communicated meanings via inference. The inferences selected are those which will preserve assumption of cooperation. In the theory of conversational implicature, Grice proposes that in an exchange of conversation, there is an underlying principle that determines the way in which language is used maximally effectively and efficiently to achieve rational interaction. He calls this governing dictum the co-operative principle and subdivides it into nine maxims classified into four categories. The co-operative principle: Make your conversational contribution such as is required, at the stage at which it occurs, by the accepted purpose or direction of the talk exchange in which you are engaged. He suggests that there is an accepted way of speaking which we all accept as standard behaviour. When we produce, or hear, an utterance, we assume that it will generally be true, have the right amount of information, be relevant, and will be couched in understandable terms. If an utterance does not appear to conform to this model (e. g. B’s utterance in (1) above), then we do not assume that the utterance is nonsense; rather, we assume that an appropriate meaning is there to be inferred. In Grice’s terms, a maxim has been flouted, and an implicature generated. Without such an assumption, it would not be worth a co-interactant investing the effort needed to interpret an indirect speech act. This is the standard basic explication of the CP, maxims and implicatures1. At this point, many descriptions immediately turn to detailed explanations of the many ways in which the operation of the CP can be tracked in language use: flouts, violations, infringing and opting out. However, in this mass of detail, Grice’s underlying ideas are too often lost. Taylor & Cameron (1987:83) stand alone in making this point: â€Å"Few commentators pause to consider Grice’s avowed motive for introducing the CP. Instead they rush on to consider the various maxims which are subordinate to it. † All the examples of flouts, violations and opting out are there to further illustrate the distinction between saying and meaning: an interest which has been evident in the Gricean program since Grice (1957), and to show that there is a pattern in the way we interact. There is a relationship between the conventional meaning of an utterance and any implicit meaning it might have, and it is calculable. What Grice (1975) does not say is that interaction is ‘cooperative’ in the sense which is found in the dictionary. In fact, as we have suggested in Davies (1997), it could be argued that the existence of this pattern of behaviour enables the speaker to make the task of the hearer more difficult. Speakers can convey their intentions by a limitless number of utterances, it is up to the hearer to calculate the utterer’s intention. It would seem from this that the CP is not about making the task of the Hearer straightforward; potentially, it is quite the reverse. It allows the speaker to make their utterance harder, rather than easier, to interpret: we can omit information or present a non-literal utterance, and expect the Hearer to do the extra work necessary to interpret it. We would suggest that there is a conflict between the way we interpret the CP’s position in the Gricean program, and the way it is often represented in the linguistic literature. Grice suggests that conversational implicatures- roughly, a set of non-logical inferences that contains conveyed messages which are meant without being said in the strict sense – can arise from either strictly and directly observing or deliberately and ostentatiously flouting the maxims. Furthermore, he distinguishes between those conversational implicatures which arise without requiring any particular contextual conditions and those which do require such conditions. He calls the first kind generalised conversational implicatures and the second kind particularised conversational implicatures. Grice also points out that conversational implicatures are characterised by a number of distinctive properties, notably (i) cancellability, or defeasibility (conversational implicatures can simply evaporate in certain linguistic or non-linguistic contexts), (ii) non-detachability (any linguistic expression with the same semantic content tends to carry the same conversational implicature (a principled exception is those conversational implicatures that arise via the maxim of Manner)), (iii) calculability (conversational implicatures are calculable via the co-operative principle and its attendant axims), (iv) non-conventionality (conversational implicatures, though dependent on what is coded, are non-coded in nature), (v) reinforceability (conversational implicatures can be made explicit without producing too much redundancy) (Sadock 1978), and (vi) universality (conversational implicatures tend to be universal, being motivated rather than arbitrary) (see Sadock 1978 for a critique and Nunburg 1981 for a defense). Recent advances on the classic Gricean theory of conversational implicature include Atlas & Levinson (1981), Leech (1981, 1983), Sperber & Wilson (1982, 1986), Levinson (1983, 1987a, b, 1991), Horn (1984, 1988, 1989, 1992) and Atlas (1989). 2 In these new developments, the original Gricean programme has been revised in somewhat different ways. Sperber and Wilson, for example, in an attempt to make a paradigm change’ (Kuhn 1970) in pragmatics, propose that the entire Gricean apparatus be subsumed within a single cognitive principle, namely the principle of Relevance. On this Relevance theory, which is essentially a modification of the Fodorian theory of cognitive modularity (Fodor 1983),3 it is assumed that the human central cognitive mechanism works in such a way as to maximise Relevance with respect to communication, that is, ‘communicated information comes with a guarantee of [R]elevance’ (Sperber & Wilson 1986: vii). Thus, the principle of Relevance is claimed to be responsible for the recovery of both the explicit and implicit content of an utterance. In other words, on Sperber and Wilson’s view, in interpreting an utterance, one is always maximizing the informational value of contextual stimuli to interpret the utterance in a way which is most consistent with the principle of Relevance. Horn suggests a less reductionist, bipartite model. In Horn’s view, all of Grice’s maxims (except the maxim of Quality) can be replaced with two fundamental and antithetical principles: the Quantity principle and the Relation principle. These maxims may be better understood as describing the assumptions listeners normally make about the way speakers will talk, rather than prescriptions for how one ought to talk. Philosopher Kent Bach writes: We need first to get clear on the character of Grice’s maxims. They are not sociological generalizations about speech, nor are they moral prescriptions or proscriptions on what to say or communicate. Although Grice presented them in the form of guidelines for how to communicate successfully, I think they are better construed as presumptions about utterances, presumptions hat we as listeners rely on and as speakers exploit. (Bach 2005). Gricean Maxims generate implicatures. If the overt, surface meaning of a sentence does not seem to be consistent with the Gricean maxims, and yet the circumstances lead us to think that the speaker is nonetheless obeying the cooperative principle, we tend to look for other meanings that could be implied by the sentence. Grice did not, howev er, assume that all people should constantly follow these maxims. Instead, he found it interesting when these were not respected, namely either â€Å"flouted† (with the listener being expected to be able to understand the message) or â€Å"violated† (with the listener being expected to not note this). Flouting would imply some other, hidden meaning. The importance was in what was not said. For example: Answering It’s raining to someone who has suggested playing a game of tennis only disrespects the maxim of relation on the surface, the reasoning behind this ‘fragment’ sentence is normally clear to the interlocutor (the maxim is just â€Å"flouted†). Criticism Grice’s theory is often disputed by arguing that cooperative conversation, as with most social behavior, is culturally determined, and therefore the Gricean Maxims and the Cooperative Principle cannot be universally applied due to intercultural differences. Keenan claims that the Malagasy, for example, follow a completely opposite Cooperative Principle in order to achieve conversational cooperation. In their culture, speakers are reluctant to share information and flout the Maxim of Quantity by evading direct questions and replying on incomplete answers because of the risk of losing face by committing oneself to the truth of the information, as well as the fact that having information is a form of prestige. [3] However, Harnish points out[4] that Grice only claims his maxims hold in conversations where his Cooperative Principle is in effect. The Malagasy speakers choose not to be cooperative, valuing the prestige of information ownership more highly. It could also be said in this case that this is a less cooperative communication system, since less information is shared) Another criticism is that the Gricean Maxims can easily be misinterpreted to be a guideline for etiquette, instructing speakers on how to be moral, polite conversationalists. However, the Gricean Maxims, despite their wording, are only meant to describe the commonly accepted traits of successful cooperative comm unication. Geoffrey Leech created the Politeness maxims: tact, generosity, approbation, modesty, agreement, and sympathy. Flouting the Maxims Without cooperation, human interaction would be far more difficult and counterproductive. Therefore, the Cooperative Principle and the Gricean Maxims are not specific to conversation but to verbal interactions in general. For example, it would not make sense to reply to a question about the weather with an answer about groceries because it would violate the Maxim of Relevance. Likewise, responding to a question with a long monologue would violate the Maxim of Quantity. However, it is possible to flout a maxim intentionally or unconsciously and thereby convey a different meaning than what is literally spoken. Many times in conversation, this flouting is manipulated by a speaker to produce a negative pragmatic effect, as with sarcasm or irony. One can flout the Maxim of Quality to tell a clumsy friend who has just taken a bad fall that her gracefulness is impressive and obviously intend to mean the complete opposite. The Gricean Maxims are therefore often purposefully flouted by comedians and writers, who may hide the complete truth and manipulate their words for the effect of the story and the sake of the reader’s experience. Speakers who deliberately flout the maxims usually intend for their listener to understand their underlying implication. In the case of the clumsy friend, she will most likely understand that the speaker is not truly offering a compliment. Therefore, cooperation is still taking place, but no longer on the literal level. Conversationalists can assume that when speakers intentionally flout a maxim, they still do so with the aim of expressing some thought. Thus, the Gricean Maxims serve a purpose both when they are followed and when they are flouted.

How to Become a Professional Nurse Essay

Becoming a professional nurse, a nurse must self-regulation with knowledge to practice standards and code of ethics. One of the first stepping stone is reflecting in journal of experiential learning. â€Å"Knowledge of yourself is gained from reflecting on your experience† (Cooper, 2001, p. 22). In the course Development of self as nurse I have learned how to be a professional nurse practicing the standards and code of ethics in a working environment. Also how the tools of communication is affective towards patients. When walking into a patient’s room for the first time, a Nurse is expected to examine the patients view and to provide the best quality of care. Personally I found the lesson Way of Knowing most engaging to learn because it teaches a nurse student how to approach the patient and communicate with them. There are many different types of ways of knowing which are empirical, ethical, aesthetical, personal and emancipatory. I found this topic most interesting because each one creates the principle and foundation of patient care. During one of the group activities we read a case study of a patient’s chart and discussed her condition and how we would approach and make a connection to her. This made me feel engaged to the subject as if I was standing next to the patient’s bed. Professionalism is one of many characteristic of being a nurse, with a responsibility of their actions, attitude and display the code of conduct to provide the best practice. How the media views affect nurses image has a negative impact on the professionalism aspect of nursing. In this activity we pulled pictures off of the internet of nurses and most were Halloween costumes or cartoons and we discussed how this affects the perspective of professional nurse. I found this most engaging because all the images of nurses on the internet are not what nurses thrive for in a professional view. A professional nurse is responsible for self regulation and to follow the code of ethics, this topic I was least engaged. Reading history of nursing creates an understanding of the past to enhance the present and is the foundation of structure with economics, consumer demand, family structure, science and technology, demography and the women movement. Without an activity and just reading about history of nursing I was least engaged with this topic. The most important lesson I have learned in Development of Self as Nurse is human relationships regarding the tools of communication and ethic, values regarding beliefs, attitude and spirit. Verbal, nonverbal, electronical, interpersonal, and therapeutic are tools of communication. I believe these two concepts are important to my personal development as a professional nurse by understanding the principle of providing proper socialisation processes which starts by approaching, communicating and connecting to a patient creating a positive patient-centered environment. â€Å"Sometimes a patient will tell us something over a cup of tea that may seem trivial, but that we can use to help make their stay more comfortable. † says Julie Thompson, Head Nurse of Burton Hospital. â€Å"Relative feedback that suggested nurses over look the little things that can make a huge difference. The Initiatives are small, but they are having a big impact. † Finding time to sit down with a patient and talk breaks down the barrier between the professional and patient enables real dialogue to take place (Friend, B. , 2013). In order to understand others beliefs, morals and values a professional nursing must have knowledge of one self. â€Å"Therefore, understanding oneself results in ethical practice. Applying this practice when a patient is uncertain about their values by helping them clarify their values by listing alternative, examine possible consequences of choice, choose freely and feels good about the choice. Kozier et al (2010), p. 75 Various forms of communication are practiced by having knowledge of interpersonal skills and professional communication. Using the tools of communication influences effective communication skills, a professional attitude, respect and dignity. Expectations and issues can become present when communicating with patients or other health care professionals. I am wondering how to overcome situations where an issue has occurred during communication with a patient and how to practice standard procedures to solve the issues, different influences including gender, culture, and illness. Nonverbal communication can be expressed such as a gesture or touch and is crucial to nurse-patient relationship. This often shows how a person is feeling then what is actually said. â€Å"Research shows that touch is the best way to comfort, generally from the shoulder down to the hand is the only acceptable areas for touch professionally. † Chillot, R. (2013). Many facts influence effective communication and I question how to apply and gain effective interpersonal skills? Having knowledge of critical thinking is very important in the role of nursing which identifies awareness of personal thinking skills and styles. Always asking yourself in any situation or scenario why? What else? And what if? This leads me to question how to apply critical thinking from the classroom to practice. Turning errors into learning opportunities is the key to skill development in critical thinking. Throughout the course Development of self as nurse I believe it has taught me how to figure out my own morals, values and beliefs and to successes in helping others to find theirs. Tools of communication open up a range of affective nurse-patient relationship and professional environment.

Sunday, September 15, 2019

Apartment – title

CHAPTER 1 INTRODUCTION Rationale Every individual has the desire to live in a peaceful manner and in a secured way. Apartment is one of the most profitable establishments here in Cebu City for the number of people came from provinces keeps on increasing. Living in an uncertain world, apartment’s owners want to maintain safety measures in their firms and occupants might as well want to be secured. Encroachment is an issue nowadays. It is an act of illegal entry without any permission from the owners/occupants to a specified area.Furthermore, it often resulted to theft, burglary and intrusion. To get rid of this issue, the group proposes this system which is to maintain the security of the apartments via biometrics. With this system, encroachment issue will be avoided for without the presence of the occupants, no one can enter the apartment. Theoretical Background According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode.It is very important to make our place secured in many aspects to prevent from encroachment issues. According to statistics, more than 30% of the burglars have gained access into apartments, through an open door or window. (http://www. buzzle. com/articles/security-alarm-systems-for-apartments. html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that there are problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered being encroachment. Lao, Excio Erving Jr. A. et. al. 2003) explained that by using home automation system, one can make several or all of the systems and devices in home work automatically to provide more security, safety, and convenience. It inspires the group to make this Apartment Security System via Biometrics that will enhance the existing one in securing the Apartments. In Apartment Security System via Biometrics, all roo ms should be networked to the server. According to Clark et. al. (1985), a network is a collection of processors and terminals that serves more than one user at a time by communication.Biometrics Theory Biometric identification technologies (the automatic recognition of individuals based on physical and/or behavioral characteristics) date back over 50 years to the earliest digital computers. Over the last two decades, biometric identification devices have become faster, cheaper, and more reliable, allowing for a variety of applications. This course looks at the history, theory, algorithms, applications, and standards of biometric recognition, including voice, iris, face, hand, and fingerprint identification.Test protocols, system design, and error rate prediction are discussed, along with the implications of the technology for personal privacy. 1. Abstract One of the most critical issues to solve when building multi-accessible systems, such as computer applications, cars or physical buildings, is to determine the identity of a person. A system protecting confidential information, or items of value, puts strong security demands on the identification. Biometry provides us with a user-friendly method for this identification and is becoming a competitor for current identification mechanisms, especially for electronic transactions.However, there are ways to compromise a system based on biometric verification. This article focuses on the drawbacks and risks of biometric verification, specifically verification based on fingerprints. It shows how all currently available fingerprint scanners can be fooled by dummies that are created with very limited means and skills. This article should be read as a warning to those thinking of using new methods of identification without first examining the technical opportunities for compromising the identification mechanism and the associated legal consequences.This is especially true for people working with smart cards since it is quite common to store fingerprints on smart cards and due to the developments in solid state fingerprint scanners, integration of a fingerprint scanner on a smart card is possible. 2. Information Identification systems based on biometrics are capable of identifying persons on the basis either physical or behavioural characteristics. Currently, there are over ten different techniques available to identify a person based on biometrics.The following techniques are applied within the main categories physical and behavioural characteristics: |Behavioral characteristics                      |Physical characteristics | |keystrokes dynamics |iris recognition | |voice recognition |retina recognition | |signature dynamics |vein pattern recognition | | |face recognition | | |recognition of hand or finger geometry | | |fingerprint recognition | Before a system is able to verify the specific biometrics of a person, it of course requires something to compare it with. Therefore, a p rofile or template containing the biometrical properties is stored in the system. Recording the characteristics of a person is called enrolment. In order to get a profile that corresponds most with reality, the biometrical. characteristics are scanned several times. In case of fingerprint recognition the finger is scanned three to four times to get a profile that is independent of variations that occur in practice, such as the angle of placement of the finger on the scanner.Since storage capacity for the profiles in these systems is usually limited (for example if used in combination with smart cards), it is common to use data compression before storing the profile. Storing profiles in tokens requires a combination of token and biometry for verification and therefore gives a higher level of security. When a biometrical verification is to occur, a scan of the biometrics of a person is made and compared with the characteristics that are stored in the profile. In general, a certain mar gin of error is allowed between the observed and stored characteristics. If this margin is too small, the system will reject a righteous person more often while if this margin is too large, malicious persons will be accepted by the system.The probabilities that a righteous person will be rejected and that a malicious person will be accepted, are called False Reject Rate (FRR) and False Accept Rate (FAR) respectively. When using a biometric system, one would of course want to minimise both rates, but unfortunately these are not independent. An optimum trade-off between FRR and FAR has to be found with respect to the application. 3. Biometric Identification In this chapter the techniques for fingerprint identification will be explored. After explaining the theory of fingerprint verification, all current scanning technologies are described in more detail. Once it is known how these scanners identify a person by means of a fingerprint, two methods to counterfeit fingerprints are shown.A ll additional methods implemented by scanner manufacturers to prevent counterfeits from being successful are also described together with proposed methods how these systems could also be fooled into accepting dummy fingerprints. The consequences for systems using fingerprint verification are discussed at the end of the chapter. First, an example for fingerprint verification from practice will be given. This example also illustrates how difficult it can be to find an optimum trade-off between FAR and FRR. From a security point of view, one would want to have the FAR as small as possible. However, for acceptance of a biometry system, a large FRR is worse. Case: Within the car industry a biometric verification system is under evaluation.Manufacturers of expensive cars are considering using fingerprint recognition as a requirement for ignition of the engine. To arm against car theft, the FAR should be as small as possible. On the other hand, suppose that the righteous owner of a car can not use his car because his fingerprint is rejected (i. e. FRR is too high). He will consider this to be a much more serious flaw in the system than a technical failure which prevents the car from being started. This is especially true if he compares the advantages of this system with this rejection: the advantages are that the driver does not (necessarily) have to have a key to his car and a perception of higher security with respect to theft of his car. Whether indeed the security improves is questionable.Right now, we do not see car thieves trying to copy the key of your car, instead they try to by-pass the ignition mechanism where the car key is involved. Furthermore, as this article will show, it might decrease security since it is fairly easy and cheap to copy a fingerprint from a person, even without the person knowing this. 3. 1 Theory of Fingerprint Verification The skin on the inside of a finger is covered with a pattern of ridges and valleys. Already centuries ago it was studied whether these patterns were different for every individual, and indeed every person is believed to have unique fingerprints. This makes fingerprints suitable for verification of the identity of their owner.Although some fingerprint recognition systems do the comparison on the basis of actual recognition of the pattern, most systems use only specific characteristics in the pattern of ridges. These characteristics are a consequence from the fact that the papillary ridges in the fingerprint pattern are not continuous lines but lines that end, split into forks (called bifurcation), or form an island. These special points are called minutiae and, although in general a fingerprint contains about a hundred minutiae, the fingerprint area that is scanned by a sensor usually contains about 30 to 40 minutiae. For over hundred years law enforcement agencies all over the world use minutiae to accurately identify persons .For a positive identification that stands in European courts at lea st 12 minutiae have to be identified in the fingerprint. The choice of 12 minutiae is often referred to as â€Å"the 12 point rule†. This 12 point rule is not based on statistical calculations but is empirically defined based on the assumption that, even when a population of tens of millions of persons are considered, no two persons will have 12 coinciding minutiae in their fingerprints. Most commercially available fingerprint scanners give a positive match when 8 minutiae are found. Manufacturers claim a FAR of one in a million based on these 8 minutiae, which seems reasonable. 3. 2 Fingerprint Scanning Technologies Technologies for scanning fingerprints have evolved over the past years.The traditional method which is used by law enforcement agencies for over a hundred years now is making a copy of the print that is found at a crime scene or any other location and manually examining it to find minutiae. These minutiae are compared with prints from a database or specific ink prints, which could be taken at a later time. This method is of course based on the fact that the person who left the fingerprints is not co-operating by placing his finger on a fingerprint scanner. For systems that are commercially available (and deployed) people are required to co-operate in order to gain access to whatever is protected by the verification system. The first generation fingerprint scanners appeared on the market in the mid eighties, so the technology is about fifteen years old.Over the past few years the technology for scanning fingerprints for commercial purposes has evolved a lot. While the first generation sensors used optical techniques to scan the finger, current generation sensors are based on a variety of techniques. The following techniques are deployed in commercial products that are currently available: †¢ Optical sensors with CCD or CMOS cameras †¢ Ultrasonic sensors †¢ Solid state electric field sensors †¢ Solid state capacitive sens ors †¢ Solid state temperature sensors The techniques will be described in greater detail in this section. The solid state sensors are so small that they can be built into virtually any machine.Currently a sensor is in development that will be built in a plastic card the size of a credit card, not only with respect to length and width but also with respect to thickness! It is clear that this type of sensor will give a boost to the number of applications using fingerprint technology. (http://cryptome. org/fake-prints. htm) THE PROBLEM Statement of the Problem Encroachment has been an issue in our industry. It could not be resolved unless there are security systems. This study aims to secure every room in any apartment eliminating strangers to get into one’s room without the presence of any occupant. This study is further concerned with the following issues: 1.What are the existing systems used to maintain security of the apartments? 2. What are the problems encountered by the occupants of the apartments? 3. What are the advantages of this Apartment Security System among the existing systems? 4. What are the technological features in this Apartment Security System? Statistics The number of residential burglaries recorded increased 0. 7% from 27,347 in 2009/2010 to 27,531 in 2010/2011. Burglary (residential) had a clearance rate of 12. 4% during 2010/2011, 1. 6 percentage points lower than that of 2009/2010. Reported Residential Burglary in the Philippines as of 2007 [pic]Figure 1. 1 Burglary (residential) Graph Significance of the StudyTrespassing has been a concern in our society, to put an end this issue, this Apartment Security System must be realized. Apartment is the most profitable business establishment businessmen could ever have. Hence, such establishments must be secured all the time. Security systems are not just luxury in an Apartment, it is a necessity to maintain security and to be able to prevent from encroachment issues such as burgla ry, intrusion, theft, etc. If there is security system in the apartment, then both owners and boarders will benefit the system. The boarders will feel comfortable living in the apartment with such system, and will not encounter encroachment issues, hence the boarders will live peacefully and live longer in that certain apartment.A boarder who stays in the apartment long enough is an indication that he trusted the system that runs in the apartment. So, it is an advantage on the owner’s side because, aside from the fact that no intruder can get access to his establishment, it is a big income if the boarders stayed longer in his apartment. Scope and Limitation The project focuses more on the security systems. The project identified the occupants of the apartment by means of fingerprint identification through biometrics. This project already exists, the only difference is that the group applied the system in every room which makes the system expensive enough for it requires every apartment a single biometrics. The group pilots only two rooms for demonstration purposes.The system is capable of identifying occupants to the extent that it alarms whenever an intruder reached the maximum tries of fingerprint identifying. The project could not cater occupants who are disabled (do not have fingers). RESEARCH METHODOLOGY Methodology is generally a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. The group uses applied research and makes use of various techniques and tools in conducting this research. Research Environment The group will conduct the survey in the apartment where there are tenants and an owner. The purpose of our survey is to determine what are their concerned about the security of their apartment. Number of apartments and dormitories surveyed: 21Number of owners interviewed: 3 Number of workers interviewed: 18 Number of boarders interviewed: 100 Example of apartment’s and dormitori es surveyed: Kim Kathleen’s House for ladies – Brgy. Cabancalan, Mandaue City Engr. Bing Momo Europa Apartelle and Dormitory- Brgy. Cabancalan, Mandaue City â€Å"Patoy† Saint Joseph Dormitory – Lopez Jaena St. , Mandaue City â€Å"Ma’am Earl Joy† Pink Dormitory- Brgy. Pitogo Consolacion â€Å"Dioscor Jamisola† Research Respondents The people to be conducted by the group are the apartment tenants and the owner for they are the stakeholder of the system. The group will use the simple random sampling technique in getting the number of respondents.Research Instruments The data gathering is employed through the use of the questionnaire and supplemented with some data analysis of published, unpublished thesis and some article Research Procedure Gathering Data The team gathered the data through the formulated questionnaire which was distributed in the apartments, hotel, boarding house and school to identify the views of the respondents. Tre atment of Data Based on the questionnaire, the team construct, analyze, and interpret. The team will use the following formula. n = N 1 + N e Where: n = sample size N = population size e = desire margin of error DEFINITION OF TERMS Project Design A project that is being put into reality by a group of designer. Designers – A group of individuals that is tasked to develop the project design. Hardware – The physical components of a computer system, including any peripheral equipment such as printers, modem and mouse. Software – Computer programs are referred to as software. Feature – Is a unique, attractive, or desirable property of a program or of a computer or other hardware. Microcontroller – A highly integrated chip contains all the components comprising a controller. Server – A computer system that consist of database and other information of it a device that manages network resource. Circuit A combination of electrical or electronics comp onents, interconnected to perform one or more specific functions. Breadboard – A fiberboard used by electronic circuit designers to build experimental circuits and prototypes. Relay – Is an electrical switch that opens and closes under the control of another electrical circuit. Transistor – Is a semiconductor device, commonly used to amplify or switch electronic signals. Serial Communication – Is the process of sending data one bit at one time, sequentially, over a communication channel or computer bus. This is in contrast to parallel communication, where all the bits of each symbols are sent together. Flowchart A diagram representing the logical sequence in which a combination of steps or operation is to be perform. Program Flowchart – Describes graphically in detail the logical operation and steps with in a program and the sequence in which these steps are to be executed to the transformation of data to produce the needed output. System Flowchart – Graphic representation of the procedure involved in converting data or media to data in output form. CHAPTER 2 PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA This chapter focuses more on the data gathered in order for the proponents to further understand the importance of the project. The gathered data is being analyzed so that the group will be aware of the standards or the expectations of the mass.It is then interpreted by making graphs such as pie graph and bar graph to easily visualize the results of the conducted survey. The Figure 2. 1 shows that most of the group’s research respondents are the Occupant of the Apartment with fifty – eight percent (58%). The group conducted this research in the apartment’s occupant because they are the ones who will be benefiting the project aside from the Apartment owners. Their opinions and suggestions are very significant in making our project a successful one. The Figure 2. 2 shows that sixty four percent ( 64%) of the respondents has security systems in their respective apartments. But there are thirty six percent (36%) of the respondents who are living in an apartment with no security. CHAPTER 3Technical Aspects of the Systems This chapter contains the summary of the software and components used in the project in order for the readers to examine how the project was made. System Flowchart is the interpretation of how the project runs from start to end. The Program Flowchart is the interpretation of how the user interfaces with the users. The Block Diagram is how the project composed of. And the Source Code it is the program used of how the project runs with. [pic] Figure 3. 1 – System Flowchart [pic] Figure 3. 2 – System Flowchart [pic] Figure 3. 3 – Program Flowchart [pic] Figure 3. 4 – Program Flowchart [pic] Figure 3. 5 – Program Flowchart [pic] Figure 3. – Program Flowchart [pic] Figure 3. 7 – Program Flowchart System Block Diagram †¢ For Fingerprint Scanner [pic] Figure 3. 8 – System Block Diagram For Fingerprint Scanner †¢ For the whole system [pic] Figure 3. 9 – System Block Diagram For the whole System Schematic Diagram The schematic diagram is the design which shows how the desired components are being connected to each other. Figure shows the schematic diagram of our design. [pic] Figure 3. 10 – Schematic Diagram Design Components Software Design Proteus 7 ISIS Professional The Proteus Professional demonstration is intended for prospective customers who wish to evaluate our professional level products.It differs from Proteus Lite in that it does not allow you to save, print or design your own microcontroller based designs (you can however write your own software programs to run on the existing sample design suite for evaluation), but does include all features offered by the professional system including netlist based PCB design with auto-placement, auto-routing and graph b ased simulation .[pic] Figure 3. 11 – Proteus 7 ISIS Professional MikroC The group decided to use MicroC Compiler because it is a C complier for PIC. It is designed to provide the customer with the easiest possible solution for developing applications for embedded system without compromising performance or control. MikroC allows quickly develop and deploy complex applications. [pic] Figure 3. 12 – MikroC VB6. 0 [pic] Figure 3. 3 – VB6. 0 Visual Basic (VB) is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model first released in 1991. Visual Basic is designed to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Script ing languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently.A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Though the program has received criticism for its perceived faults, from version 3 Visual Basic was a runaway commercial success,and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsoft's extended support ended in March 2008 and the designated successor was Visual Basic . NET (now known simply as Visual Basic). Hardware Components PIC 16F877A Microcontroller [pic] Figure 3. 14 – PIC 16F877AA PIC (Peripheral Interface Controller) microcontroller is an IC manufactured by Microchip. These ICs are complete computers in a single package. The only external components necessary are whate ver is required by the I/O devices that are connected to the PIC. A microcontroller is a small computer and it can only perform simple task. Microcontroller consists of: †¢ Processor that executes the program †¢ Program memory to store the program that has been compiled successfully by the programmer. †¢ Ram (random-access memory) to store â€Å"variables. † †¢ IO Port to connect sensor, keypad, LED and so on. Crystal Oscillator [pic] Figure 3. 15 – Crystal OscillatorA  crystal oscillator  is an  electronic oscillator  circuit that uses the mechanical  resonance  of a vibrating  crystal  of  piezoelectric material  to create an electrical signal with a very precise  frequency. This frequency is commonly used to keep track of time (as in  quartz wristwatches), to provide a stable  clock signal  for digital  integrated circuits, and to stabilize frequencies for  radio transmitters  and  receivers. The most common ty pe of piezoelectric resonator used is the quartz crystal, so oscillator circuits designed around them became known as â€Å"crystal oscillators. † Relay [pic] Figure 3. 16 – Relay A  relay  is an  electrically  operated  switch. Many relays use an  electromagnet  to operate a switching mechanism mechanically, but other operating principles are also used.Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in telephone exchanges and early computers to perform logical operations. Resistor [pic] Figure 3. 17 – Resistor Typical 10K ohm, 1/4 watt resistor that can be used with various circuits. The color band on the r esistor is Brown, Black, Orange, Gold. Diode [pic] Figure 3. 18 – DiodeDiodes allow electricity to flow in only one direction. The arrow of the circuit symbol shows the direction in which the current can flow. Diodes are the electrical version of a valve and early diodes were actually called valves. Regulator [pic] Figure 3. 19 – Regulator Encapsulated in a single chip/package (IC), the  7805  is a positive voltage DC  regulator  that has only 3 terminals. They are: Input voltage, Ground, Output Voltage. Transistor [pic] Figure 3. 20 – Transistor Transistor is a â€Å"CURRENT† operated device which has a very large amount of current (Ic) which flows without restraint through the device between the  collector  and emitter terminals.But this is only possible if a small amount of biasing current (Ib) is  present  in the base terminal of the transistor making the base to act as a current control input. LED (Light Emitting Diode) [pic] Figure 3 . 21 – LED A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical electronic component in 1962,[2] early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness. DCU 11 [pic] Figure 3. 22 – DCU 11 The cable incorporates a charger port to charge the phone while the cable is in use, and your phone’s built-in modem brings the Web and email to your PC.The widely accepted USB standard and high-speed data transfer make this cable the ideal link from your phone to your PC. †¢ USB connector Fingerprint Scanner [pic] Figure 3. 23 – Fingerprint Scanner Fingerprint recognition  or  fingerprint authentication  refers to the  automated  method of verifying a match between two human  fingerprints. Fingerprints are one of many forms o f  biometrics  used to  identify  individuals and  verify  their  identity. This article touches on two major classes of  algorithms  (minutia and pattern) and four  sensor  designs (optical, ultrasonic, passive capacitance, and active capacitance). Power Supply [pic] Figure 3. 24 – Power Supply A  power supply  is a device that supplies  electrical  energy  to one or more  electric loads.The term is most commonly applied to devices that convert one form of electrical energy to another, though it may also refer to devices that convert another form of energy (e. g. , mechanical, chemical, solar) to electrical energy. A  regulated power supply  is one that controls the output voltage or current to a specific value; the controlled value is held nearly constant despite variations in either load current or the voltage supplied by the power supply's energy source. Program Source Code MikroC char ch; void main() { PORTB = 0x00; TRISB = 0x00; TRI SC = 0x80; PORTC = 0; Usart_Init(9600); delay_ms(100); while(1) { if(Usart_Data_Ready()) { ch = Usart_Read(); if(ch == ‘1') { PORTC. F0 = 1; elay_ms(5000); PORTC. F0 = 0; ch=''; } if(ch == ‘2') { PORTC. F1 = 1; delay_ms(8000); PORTC. F1 = 0; ch=''; } } PORTB = 0x00; } VB6. 0 â€Å"Enrollment† Dim WithEvents Capture As DPFPCapture Dim CreateFtrs As DPFPFeatureExtraction Dim CreateTempl As DPFPEnrollment Dim ConvertSample As DPFPSampleConversion Private Sub DrawPicture(ByVal Pict As IPictureDisp) ‘ Must use hidden PictureBox to easily resize picture. Set HiddenPict. Picture = Pict Picture1. PaintPicture HiddenPict. Picture, _ 0, 0, Picture1. ScaleWidth, _ Picture1. ScaleHeight, _ 0, 0, HiddenPict. ScaleWidth, _ HiddenPict. ScaleHeight, vbSrcCopy Picture1. Picture = Picture1. Image End SubPrivate Sub ReportStatus(ByVal str As String) Status. AddItem (str) ‘ Add string to list box. Status. ListIndex = Status. NewIndex ‘ Move list box selection down. End Sub Private Sub Close_Click() Capture. StopCapture ‘ Stop capture operation. Unload Me End Sub Private Sub Form_Load() Set Capture = New DPFPCapture ‘ Create capture operation. Capture. StartCapture ‘ Start capture operation. Set CreateFtrs = New DPFPFeatureExtraction ‘ Create DPFPFeatureExtraction object. Set CreateTempl = New DPFPEnrollment ‘ Create DPFPEnrollment object. Samples. Caption = CreateTempl.FeaturesNeeded ‘ Show number of samples needed. Set ConvertSample = New DPFPSampleConversion ‘ Create DPFPSampleConversion object. End Sub Private Sub Capture_OnReaderConnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was connected. â€Å") End Sub Private Sub Capture_OnReaderDisconnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was disconnected. â€Å") End Sub Private Sub Capture_OnFingerTouch(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was to uched. â€Å") End Sub Private Sub Capture_OnFingerGone(ByVal ReaderSerNum As String) ReportStatus (â€Å"The finger was removed from the fingerprint reader. â€Å") End SubPrivate Sub Capture_OnSampleQuality(ByVal ReaderSerNum As String, ByVal Feedback As DPFPCaptureFeedbackEnum) If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The quality of the fingerprint sample is good. â€Å") Else ReportStatus (â€Å"The quality of the fingerprint sample is poor. â€Å") End If End Sub Private Sub Capture_OnComplete(ByVal ReaderSerNum As String, ByVal Sample As Object) Dim Feedback As DPFPCaptureFeedbackEnum ReportStatus (â€Å"The fingerprint sample was captured. â€Å") ‘ Draw fingerprint image. DrawPicture ConvertSample. ConvertToPicture(Sample) ‘ Process sample and create feature set for purpose of enrollment. Feedback = CreateFtrs.CreateFeatureSet(Sample, DataPurposeEnrollment) ‘ Quality of sample is not good enough to produce feature set. If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The fingerprint feature set was created. â€Å") Prompt. Caption = â€Å"Touch the fingerprint reader again with the same finger. † ‘ Add feature set to template. CreateTempl. AddFeatures CreateFtrs. FeatureSet ‘ Show number of samples needed to complete template. Samples. Caption = CreateTempl. FeaturesNeeded If Val(Samples. Caption) = 0 Then MainFrame. Picture1. Visible = True Else MainFrame. Picture1. Visible = False End If ‘ Check if template has been created. If CreateTempl.TemplateStatus = TemplateStatusTemplateReady Then MainFrame. SetTemplete CreateTempl. Template ‘ Template has been created, so stop capturing samples. Capture. StopCapture Prompt. Caption = â€Å"Click Close, and then click Fingerprint Verification. † MsgBox â€Å"The fingerprint template was created. † End If End If End Sub Private Sub Form_Unload(Cancel As Integer) Capture. StopCapture ‘ Stop capture operat ion End Sub â€Å"frmFlash† Option Explicit Dim i As Integer Private Declare Sub Sleep Lib â€Å"kernel32† (ByVal dwMilliseconds As Long) Private Sub Form_Activate() For i = 0 To 10 i = i + 1 Sleep (500) Me. Refresh Next Unload Me frmStandbyMode. Show End Sub â€Å"frmInventory†Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdPayDue_Click() Set rsPay = New ADODB. Recordset rsPay. CursorLocation = adUseClient rsPay. CursorType = adOpenDynamic rsPay. LockType = adLockOptimistic ‘rsPay. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB rsPay. Open â€Å"select * from tbl_registration where FullName = ‘† & txtPay. Text & â€Å"‘†, ConnectDB If rsPay. EOF = False Then ‘With rsPay ‘rsPay. MoveFirst ‘ While rsPay. EOF = False ‘ If txtPay. Text = rsPay! Fu llName Then If MsgBox(â€Å"Continue paying his due? , vbInformation + vbYesNo, â€Å"Apartment Monitoring and Security System – Paying Due†) = vbYes Then rsPay! ToPay = rsPay! ToPay + rsPay! Payment rsPay. Update List_Unpaid. Clear Call query_list ‘ rsPay. MoveNext ‘ Else: rsPay. MoveNext End If ‘ Else: rsPay. MoveNext ‘ End If ‘ Wend ‘End With End If End Sub Private Sub cmdPrint_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_registration†, ConnectDB Set GuestReport. DataSource = rst. DataSource GuestReport. ReportWidth = 6000 GuestReport. Show End SubPrivate Sub cmdPrintLogs_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_logs where FullName = ‘† & txtPay. Text & â⠂¬Å"‘†, ConnectDB If rst. EOF = False Then Set GuestLogs. DataSource = rst. DataSource GuestLogs. ReportWidth = 5000 GuestLogs. Show End If End Sub Private Sub Command1_Click() Unload Me Load MainFrame End Sub Private Sub Form_Load() txtPay. Text = â€Å"† Set rsViewInventory = New ADODB. Recordset rsViewInventory. CursorLocation = adUseClient rsViewInventory. CursorType = adOpenDynamic rsViewInventory. LockType = adLockOptimistic rsViewInventory.Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestInventory. DataSource = rsViewInventory frmInventory. dgGuestInventory. Columns(0). Visible = False frmInventory. dgGuestInventory. Columns(2). Visible = False frmInventory. dgGuestInventory. Columns(5). Visible = False frmInventory. dgGuestInventory. Columns(7). Visible = False frmInventory. dgGuestInventory. Columns(8). Visible = False frmInventory. dgGuestInventory. Columns(1). Width = 2200 frmInventory. dgGuestInventory. Co lumns(3). Width = 1900 frmInventory. dgGuestInventory. Columns(4). Width = 1600 frmInventory. dgGuestInventory. Columns(6). Width = 1200 If rsViewInventory.EOF = False Then With rsViewInventory rsViewInventory. MoveFirst While rsViewInventory. EOF = False If rsViewInventory. EOF = False Then txtBayadHolder. Text = rsViewInventory! ToPay txtBayadUtang. Text = Val(txtBayadUtang. Text) + Val(txtBayadHolder. Text) ‘rsViewInventory! ToPay rsViewInventory. MoveNext End If Wend End With Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB If txtBayadUtang. Text = rsUpdateNah! Total Then txtBayadUtang.Text = â€Å"Php † & FormatNumber(rsUpdateNah! Total) Else Dim rsUpdateNahh As New ADODB. Recordset rsUpdateNahh. CursorLocation = adUseClient rsUpdateNahh. CursorType = adOpenDynamic rsUpdateNahh. Lock Type = adLockOptimistic rsUpdateNahh. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB rsUpdateNahh! Total = txtBayadUtang. Text rsUpdateNahh. Update rsUpdateNahh. Close txtBayadUtang. Text = â€Å"Php † & FormatNumber(txtBayadUtang. Text) End If End If Call query_list End Sub Private Sub txtPay_Change() If txtPay. Text â€Å"† Then cmdPayDue. Enabled = True cmdPrintLogs. Enabled = True End If End Sub Public Function query_list() Dim rsViewUnpaid As New ADODB. Recordset rsViewUnpaid.CursorLocation = adUseClient rsViewUnpaid. CursorType = adOpenDynamic rsViewUnpaid. LockType = adLockOptimistic rsViewUnpaid. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB If rsViewUnpaid. EOF = False Then With rsViewUnpaid List_Unpaid. AddItem â€Å"Name's† & vbTab & vbTab & vbTab & â€Å"To Pay† List_Unpaid. AddItem â€Å"† rsViewUnpaid. MoveFirst While rsViewUnpaid. EOF = False If rsViewUnpaid! ToPay = 0 Then txtBayadHolder. Text = rsViewUnpai d! FirstName & † † & rsViewUnpaid! LastName & vbTab & vbTab & â€Å"Php † & FormatNumber(rsViewUnpaid! Payment) List_Unpaid. AddItem txtBayadHolder. Text rsViewUnpaid. MoveNext Else: rsViewUnpaid.MoveNext End If Wend End With End If End Function â€Å"frmLogin† Private Declare Function sndPlaySound Lib â€Å"winmm. dll† Alias â€Å"sndPlaySoundA† _ (ByVal lpszSoundName As String, ByVal uFlags As Long) As Long Const SND_SYNC = &H0 Const SND_NODEFAULT = &H2 Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdCancel_Click() Unload Me frmStandbyMode. Enabled = True frmStandbyMode. Show End Sub Private Sub Form_Load() frmStandbyMode. Enabled = False End Sub Private Sub cmdOK_Click() Set recordSetAccount = New ADODB. Recordset ecordSetAccount. CursorLocation = adUseClient recordSetAccount. CursorType = a dOpenDynamic recordSetAccount. LockType = adLockOptimistic recordSetAccount. Open â€Å"tbl_account†, ConnectDB If (frmLogin. txtUserName. Text = â€Å"† And frmLogin. txtPassword. Text = â€Å"†) Then Unload frmLogin Unload frmStandbyMode MainFrame. mnuSearchGuest. Enabled = False MainFrame. mnuAddGuest. Enabled = False MainFrame. Show ElseIf recordSetAccount. EOF = False Then If frmLogin. txtPassword. Text = â€Å"† Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%)MsgBox â€Å"Please input your password. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus ElseIf Not frmLogin. txtPassword. Text = recordSetAccount! Password Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Incorrect pa ssword. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus frmLogin. txtPassword. SelStart = 0 frmLogin. txtPassword. SelLength = Len(frmLogin. txtPassword. Text) ElseIf (frmLogin. txtUserName. Text = recordSetAccount! UserName And frmLogin. txtPassword. Text = recordSetAccount!Password) Then Unload frmLogin Unload frmStandbyMode MainFrame. Show End If Else soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Not a valid account. Try again! â€Å", , â€Å"Login† frmLogin. txtUserName. SetFocus frmLogin. txtUserName. SelStart = 0 frmLogin. txtUserName. SelLength = Len(frmLogin. txtUserName. Text) End If End Sub â€Å"frmStanbyMode† Private Sub mnuExit_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Timer1. Enabled = True End IfEnd Sub Private Sub mnuLogin_Click() frmLogin. Show End Sub Private Sub Timer1_Timer() Label1. Visible = True ProgressBar1. Visible = True If ProgressBar1. Value >= ProgressBar1. Max Then End End If ProgressBar1. Value = ProgressBar1. Value + 1 End Sub â€Å"MainFrame† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice.Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete. CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete.Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800 MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â₠¬Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame.Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen txtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDBIf MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt.Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender. Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Se t rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB ritePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & t xtLastName.Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text rsUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyy†) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest.Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset rsguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOp timistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing.If Templ Is Nothing Then Else: Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End Sub Private Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to pictur e Set Templ = New DPFPTemplate Templ. Deserialize blob End If End SubPrivate Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True frameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click()If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me frmStandbyMode. Show End If End Sub Private Sub mnuSearc hGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1.Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = Ne w DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest.CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName. Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"† Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. , vbYes No + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text rsAddGuest! LastName = txtLastName. Text rsAddGuest! Fullname = txtFirstName. Text & † † & txtLastName. Text rsAddGuest! Gender = cboGender. Text rsAddGuest! RoomChoice = cboRoomChoice. Text rsAddGuest! RoomNumber = cboRoomNumber. Text rsAddGuest! Picture = txtFilePathPic. Text rsAddGuest! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted. Text & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsAddGuest! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear.Text, â€Å"mm/dd/yyyy†) rsAddGuest! Payment = txtIdHolder. Text rsAddGuest. Update rsAddGuest. Close Call Clear MsgBox â€Å"Guest has successfully Added. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† End If End If End Sub Private Sub SaveTemplate_Click() Dim blob() As Byte ‘ First verify that template is not empty. If Templ Is Nothing Then MsgBox â€Å"You must create a fingerprint template before you can save it. † Exit Sub End If CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Save As dialog box. CommonDialog1. ShowSaveIf Err Then ‘ This code runs if the dialog box was cancelled. Exit Sub End If ‘ Export template to binary data. blob = Templ. Serialize ‘ Save binary data to file. Open CommonDialog1. FileName For Binary As #1 Put #1, , blob Close #1 End Sub Private Sub Timer1_Timer() lblDate. Caption = Format(Date, â€Å"Long Date†) lblTime. Caption = Format(Time, â€Å"Long Time†) End Sub Private Sub Verify_Click() ‘ First verify that template is not empty. If Templ Is Not hing Then MsgBox â€Å"You must create fingerprint template before you can perform verification. † Exit Sub End If ‘ Show Fingerprint Verification dialog box. Verification. Show vbModal, Me End SubPublic Function Clear() txtFirstName. Text = â€Å"† txtLastName. Text = â€Å"† txtFilePathPic. Text = â€Å"† cboGender. Text = â€Å"† cboRoomChoice. Text = â€Å"† cboRoomNumber. Text = â€Å"† cboMonthStarted. Text = â€Å"† cboDateStarted. Text = â€Å"† cboYearStarted. Text = â€Å"† cboDueMonth. Text = â€Å"† cboDueDate. Text = â€Å"† cboDueYear. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† imgbox. Visible = False img_box_del. Visible = False frameRegisterGuest. Visible = False frameSearchGuest. Visible = False End Function Public Function View() frameRegisterGuest. Visible = False frameSearchGuest. Visible = False frameViewGuest. Visible = True Set rsViewGuest = New ADODB. Recordset rsViewGuest.CursorLocation = adUseClient rsViewGuest. CursorType = adOpenDynamic rsViewGuest. LockType = adLockOptimistic rsViewGuest. Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestView. DataSource = rsViewGuest MainFrame. dgGuestView. Columns(0). Visible = False MainFrame. dgGuestView. Columns(2). Visible = False MainFrame. dgGuestView. Columns(5). Visible = False MainFrame. dgGuestView. Columns(7). Visible = False MainFrame. dgGuestView. Columns(8). Visible = False MainFrame. dgGuestView. Columns(1). Width = 2200 MainFrame. dgGuestView. Columns(3). Width = 1900 MainFrame. dgGuestView. Columns(4). Width = 1600 MainFrame. dgGuestView.Columns(6). Width = 1200 Set rsViewGuest = Nothing End Function â€Å"Verification† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Fu nction Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice. Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete.CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete. Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Wi dth = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame. Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen xtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. , vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsE ditGuestt. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender.Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB writePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah.CursorType = adOpenDynamic rsUpdateNah. LockType = adL ockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & txtLastName. Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text sUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyyâ₠¬ ) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest. Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset sguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing. If Templ Is Nothing Then Else: Set GetTem plate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End SubPrivate Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End Sub Private Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True rameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me rmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fptà ¢â‚¬  ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest. CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName.Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"â €  Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text