Monday, September 30, 2019

Democratization of Uruguay

Giancarlo Orichio Dr. A. Arraras CPO 3055 20 November 2008 Democratic Transition and Consolidation: Uruguay A study of democratization presumes that the meaning of democratization is self-evident: defined simply as a transition of a political system from non-democracy towards accountable and representative government practices. (Grugel 3) A concept that is valid in Uruguayan politics however, has an element of potential risk that will be the topic of further analysis. Assessment of the latter will enable us to determine why Uruguay is the only one of the four former â€Å"bureaucratic-authoritarian† regimes in South America that includes Chile, Brazil, and Argentina to attain this debatably political status quo. Guillermo O’Donnell described this type of regime as an institution that uses coercive measures to respond to what they view as threats to capitalism, whereas, the only means of opposing this repressive government is by an â€Å"unconditional commitment to democracy. (O’Donnell xiii) The hierarchically lead bureaucratic-authoritarian regime as a political actor poses a possible advantage to democratization insofar that the military-as-institution may consider that their interests are best served by extrication from the military-as-government. However, seizing power to a new governing body without imposing strong constraints is improbable and has occurred predictably in Uruguayan democratic transition. Understanding th e obstacle faced by the newly fragile democratic government in managing the military and eliminating its reserved domains brings us to the task at hand. First, I will analyze the political history in Uruguay that lead up to the no doubt controversial argument that it has attained democratic consolidation. Secondly, I will analyze the factors that either contributed or hindered its journey to representative democracy; ultimately, arriving to the conclusion that Juan J. Linz and Alfred Stepan describe as a â€Å"risk-prone† consolidated democracy. On 25 August 1825, Juan Antonio Lavalleja, at the head of a group of patriots called the â€Å"treinta y tres orientales,† issued a declaration of independence. After a three-year fight, a peace treaty signed on 28 August 1828 guaranteed Uruguay's independence. During this period of political turmoil and civil war, the two political parties around which Uruguayan history has traditionally revolved, the Colorados and the Blancos, were founded. â€Å"Even by West Europen standards, [Uruguay] had a tradition of high party identification and a clear sense of a left-right index. † (Linz 152) Uruguay's first president, Gen. Jose Fructuoso Rivera, an ally of Artigas, founded the Colorados. The second president, Brig. Gen. Manuel Oribe, a friend of Lavalleja, founded the Blancos. The 19th century was largely a struggle between the two factions. However, it was not until the election of Jose Batlle y Ordonez as president in 1903 that Uruguay matured as a nation. The Batlle administrations (1903–7, 1911–15) marked the period of greatest economic performance. A distinguished statesman, Batlle initiated the social welfare system codified in the Uruguayan constitution. From then on, Uruguay's social programs, funded primarily by earnings of beef and wool in foreign markets, gave Uruguay the revered soubriquet â€Å"Switzerland of South America. † After World War II, the Colorados ruled, except for an eight-year period from 1958–66. It was during the administration of President Jorge Pacheco Areco (1967–72) that Uruguay entered a political and social crisis. As wool declined in world markets, export earnings no longer kept pace with the need for greater social expenditures. Political instability resulted, most dramatically in the emergence of Uruguay's National Liberation Movement, popularly known as the Tupamaros. This well-organized urban guerrilla movement adopted Marxist and nationalist ideals while on the other hand, most nationally important actors were disloyal or at best semi-loyal to the already established democratic regime. Their revolutionary activities, coupled with the worsening economic situation, exacerbated Uruguay's political uncertainty. Gradually, the military-as institution assumed a greater role in government and by 1973 was in complete control of the political system. By the end of 1973, the Tupamaros had been successfully controlled and suppressed by the military-as-institution. In terms of systematic repression, as Juan J. Linz and Alfred Stepan stated, â€Å"Uruguay was the most deeply repressive of the four South American bureaucratic-authoritarian regimes. (Linz 152) Amnesty international denounced Uruguay for human rights violations; in 1979, they estimated the number of political prisoners jailed at a ratio of 1 per 600, Chile and Argentina were respectively 1 in 2,000 and 1 in 1,200. (Linz 152) By 1977 the military announced that they would devise a new constitution with the intentions to â€Å"strengthen democracy. † The new constitution would be submitted to a plebiscite in 1980, and if ratified elections with a single presidential candidate nominated by both the Colorados and the Blancos and approved by the military would be held the following year. The post-authoritarian transition to democracy began in Uruguay when the democratic opposition won the plebiscite. By the 1980’s the military did not have an offensive plan to lift Uruguay from its uninterrupted bad economic performance, the Tupamaros had in fact been defeated by 1973, so a defense project against urban guerrilla was unnecessary. The military had no civil or political support, and with there loss in the plebiscite, whose results they said they would respect, tarnished the military’s political leverage significantly. Thus, the democratic opposition in the form of the two major catch all political parties that have governed de jure since the 19 century presented a non threatening alternative despite their disloyal behavior before the authoritarian coup d’etat . As previously touched on, the opportunities presented by a hierarchical military favoring democratic transition is the possibility that the leading officers of the military-as-institution will come to the conclusion that the cost of non democratic rule is greater than the cost of extrication. With the main interest resting in a stable state that will in turn allow the military to become a functioning sector of the state apparatus. However, this does not preclude the possibility of non democratic prerogatives in the transfer. The party-military negotiation called the Naval Club Pact disqualified Wilson Ferreira of the Blanco party to be nominated as president, pushed for guarantees concerning their own autonomy, and the most damaging to democracy was the curtailment of human right trails for military officials. Elections were held in 1985 were Julio Maria Sanguinetti from the Colorado party became the first democratically elected candidate in the 1977 constitution. Because of strong public discontent with Military Amnesty granted during the transition, the curtailment was sent to a referendum in 1989, were it approved the amnesty and gained democratic legitimacy by 57%. It has to be stated that the majority of Uruguayan opposed the amnesty, however the fragile democratic government confronted a troubling decision. They could have breached the Naval Club Pact and tried military officer for heir human right offenses and risked military refusal and therefore a crisis in their own authority. Or they could have hastily granted them amnesty at the cost of lowered prestige in the new democracy. It is safe to assume that the electorate voted to let the amnesty law stand not because it was just but more so to avoid a crisis. By 1992 the left-wing Frente Amplio was integrated into Uruguayan politics without any other major party leaders deeming them unacceptable arriving to the quarrelsome argument that Uruguay became a consolidated democracy. Uruguay's economic development can be divided into two starkly contrasting periods. During the first period, when it earned its valued sobriquet â€Å"Switzerland of South America,† from the late 1800s until the 1950s, Uruguay achieved remarkable growth and a high standard of living. Expanding livestock exports; principally beef and wool accounted for its economic development. The advanced social welfare programs, which redistributed wealth from the livestock sector to the rest of the economy, raised the standard of living for the majority of the population and contributed to the development of new industries. When export earnings faltered in the 1950s, however, the fabric of Uruguay's economy had begun to unravel. The country entered a decades-long period of economic stagnation. It was during the administration of President Jorge Pacheco Areco (1967–72) that Uruguay entered a political and social crisis. As wool and beef demands declined in world markets, export earnings no longer kept pace with the need for greater social expenditures causing bad economic performance that lead to the bureaucratic-authoritarian take over of government. Although the old democratic regime was not able to lift economic prosperity neither was the military-as-government. Bad economic performance still plagued the nation throughout authoritarian rule. By 1980 the military had no agenda in combating the bad economic performance that helped unveil the inadequacies of the non democratic regime. In fact, economic performance has been in a decline since 1950’s until today. Although the legitimacy that the democratic system posses in Uruguay is strong, the capacity, or as Stepan and Linz say, the â€Å"efficacy† of the democratic system in resolving the stagnant economy is low. Thus, making Uruguay’s democracy risk-prone due to an unsolved economic performance. Since the economy has been the number one issue affecting Uruguayans since the end of their golden era in the early 19 century. A public opinion poll was asked to upper class respondents weather a political alternative from the authoritarian regime at the time would speed rather than slow economic recuperation. By a margin of 2 to 1 they believed it would, more surprisingly was a 7 to 1 response to the question if a new democratic regime would bring more tranquility and public order. In 1985, of the nine institutions evaluated in terms of trust, political parties ranked highest with a net score of 57 and the armed forces with a net score of negative 73. Only 5% viewed the military sympathetically while 78% viewed the military with antipathy. (Linz 153) In my studies concerning democratization never did democracy start with such rejection of the political role of the military from all class coalitions alike. During the first half on the 19th century the norm was a two party system similar to that of the United States in that there was â€Å"low fragmentation and low polarization. † (Linz 163) However, contrary to the American vetting process the Uruguayan had a peculiar electoral system known as the double simultaneous vote that allows all parties to run multiple candidate for the presidency. This did not present a problem until after the 1960’s when presidents routinely were elected with less than 25% of the vote because of the amount of candidates running. This creates party fragmentation that can hinder democracy. The fact that the old regime political structure remains untouched means that the opportunity for constitutional change was missed and this presents a potential democratic upheaval. Behaviorally, by 1968-73 political elites were at best semi-loyal to the democratic system that soon caused the authoritarian regime to take over government, and one thing that can be done from previous failures in democratic attempts is to learn from their missteps. Stepan and Linz clearly state that for the consolidation of democracy loyalty to the system as well as the perception that all other parties are loyal to the democratic process plays a crucial role. (Linz 156) By 1985 not one of the twelve major factions of the three leading parties perceived the other parties to be acting disloyal. As well as the mere fact that the once unacceptable left-wing party, Frente Amplio, held the mayoral position of Montevideo by 1989 and then the presidency by 2004 demonstrates the positive elite choices that contributed to democracy. Since Uruguay’s troublesome and long fought battle for independence in August 25, 1828 Uruguay did not encounter any â€Å"intermestic† stateness problems. As far as Washington relations to Latin America and in particular Uruguay, the United States continues to pursue hegemony over the region. The neo-liberal reforms in place in the region are bound by the restraints of the global market and for a country like Uruguay it is very difficult to compete with such superpowers. These reforms have often left the lower classes impoverish and desperate while the upper classes and Washington feed their gluttonous appetites. The civilian government in Uruguay has found it increasingly difficult to enforce these foreign economic influences that can potentially result in authoritarian means of accomplishment. As a member of MERCOSUR, Mercado Comun del Sur, Uruguay faced foreign political influences to liberalize its economy during the 1990s, as economic giants, and MERCOSUR partners Brazil and Argentina had done. This can be potentially devastating to democracy except that Uruguay in the 1980’s had a gross national product (GNP) per capita income of 2,820, higher than any of its MERCOSUR counterparts. However, we must remember that Uruguay has been experiencing a downward economic performance since the mid 1900’s and is a potential risk that needs to be addressed to preserve democracy. United States foreign policy in Uruguay and in the rest of Latin America has encouraged for the liberalization of markets. The side effect of neo-liberal reform is the zero-sum element that produces excessive amounts of losers. Essentially the contrary to what it is intended to produce. These superpower polices implemented creates few winners most of which are â€Å"elites with government connection [that] have been the primary beneficiaries of the sweeping economic transformation. † (Kingstone 196) This transcends business when the only means of preserving this market economy is through potential authoritarian means. The contentious claim that Uruguay is a consolidated democracy since 1992 is threefold, first, because of the reluctance to fix the already proven failed double simultaneous vote electoral system. Secondly, because of civil-military relations concerning human rights violation during authoritarian rule, although was legitimized by democratic referendum, but more importantly budgetary cuts that have been implemented as a result of bad economic performance. Finally, and most importantly, Uruguayans accept democracy as the most legitimate political game, but also recognize its incapacity to fix the troubling economy, producing this efficacy-legitimacy gap that can be potentially destructive for democracy. These three factors give Uruguay the title of a risk-prone democracy. Works Cited Kingstone, Peter R. , ed. Readings in Latin American Politics. New York: Houghton Mifflin Company, 2006. Linz, Juan, and Alfred Stepan. Problems of Democratic Transition and Consolidation. Baltimore: Johns Hopkins University Press, 1996. O’Donnell, Guillermo. Modernization and Bureaucratic-Authoritarianism: Studies in South American Politics. Berkley: Institute of International Studies, University of California, 1973.

Sunday, September 29, 2019

Apartment – title

CHAPTER 1 INTRODUCTION Rationale Every individual has the desire to live in a peaceful manner and in a secured way. Apartment is one of the most profitable establishments here in Cebu City for the number of people came from provinces keeps on increasing. Living in an uncertain world, apartment’s owners want to maintain safety measures in their firms and occupants might as well want to be secured. Encroachment is an issue nowadays. It is an act of illegal entry without any permission from the owners/occupants to a specified area.Furthermore, it often resulted to theft, burglary and intrusion. To get rid of this issue, the group proposes this system which is to maintain the security of the apartments via biometrics. With this system, encroachment issue will be avoided for without the presence of the occupants, no one can enter the apartment. Theoretical Background According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode.It is very important to make our place secured in many aspects to prevent from encroachment issues. According to statistics, more than 30% of the burglars have gained access into apartments, through an open door or window. (http://www. buzzle. com/articles/security-alarm-systems-for-apartments. html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that there are problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered being encroachment. Lao, Excio Erving Jr. A. et. al. 2003) explained that by using home automation system, one can make several or all of the systems and devices in home work automatically to provide more security, safety, and convenience. It inspires the group to make this Apartment Security System via Biometrics that will enhance the existing one in securing the Apartments. In Apartment Security System via Biometrics, all roo ms should be networked to the server. According to Clark et. al. (1985), a network is a collection of processors and terminals that serves more than one user at a time by communication.Biometrics Theory Biometric identification technologies (the automatic recognition of individuals based on physical and/or behavioral characteristics) date back over 50 years to the earliest digital computers. Over the last two decades, biometric identification devices have become faster, cheaper, and more reliable, allowing for a variety of applications. This course looks at the history, theory, algorithms, applications, and standards of biometric recognition, including voice, iris, face, hand, and fingerprint identification.Test protocols, system design, and error rate prediction are discussed, along with the implications of the technology for personal privacy. 1. Abstract One of the most critical issues to solve when building multi-accessible systems, such as computer applications, cars or physical buildings, is to determine the identity of a person. A system protecting confidential information, or items of value, puts strong security demands on the identification. Biometry provides us with a user-friendly method for this identification and is becoming a competitor for current identification mechanisms, especially for electronic transactions.However, there are ways to compromise a system based on biometric verification. This article focuses on the drawbacks and risks of biometric verification, specifically verification based on fingerprints. It shows how all currently available fingerprint scanners can be fooled by dummies that are created with very limited means and skills. This article should be read as a warning to those thinking of using new methods of identification without first examining the technical opportunities for compromising the identification mechanism and the associated legal consequences.This is especially true for people working with smart cards since it is quite common to store fingerprints on smart cards and due to the developments in solid state fingerprint scanners, integration of a fingerprint scanner on a smart card is possible. 2. Information Identification systems based on biometrics are capable of identifying persons on the basis either physical or behavioural characteristics. Currently, there are over ten different techniques available to identify a person based on biometrics.The following techniques are applied within the main categories physical and behavioural characteristics: |Behavioral characteristics                      |Physical characteristics | |keystrokes dynamics |iris recognition | |voice recognition |retina recognition | |signature dynamics |vein pattern recognition | | |face recognition | | |recognition of hand or finger geometry | | |fingerprint recognition | Before a system is able to verify the specific biometrics of a person, it of course requires something to compare it with. Therefore, a p rofile or template containing the biometrical properties is stored in the system. Recording the characteristics of a person is called enrolment. In order to get a profile that corresponds most with reality, the biometrical. characteristics are scanned several times. In case of fingerprint recognition the finger is scanned three to four times to get a profile that is independent of variations that occur in practice, such as the angle of placement of the finger on the scanner.Since storage capacity for the profiles in these systems is usually limited (for example if used in combination with smart cards), it is common to use data compression before storing the profile. Storing profiles in tokens requires a combination of token and biometry for verification and therefore gives a higher level of security. When a biometrical verification is to occur, a scan of the biometrics of a person is made and compared with the characteristics that are stored in the profile. In general, a certain mar gin of error is allowed between the observed and stored characteristics. If this margin is too small, the system will reject a righteous person more often while if this margin is too large, malicious persons will be accepted by the system.The probabilities that a righteous person will be rejected and that a malicious person will be accepted, are called False Reject Rate (FRR) and False Accept Rate (FAR) respectively. When using a biometric system, one would of course want to minimise both rates, but unfortunately these are not independent. An optimum trade-off between FRR and FAR has to be found with respect to the application. 3. Biometric Identification In this chapter the techniques for fingerprint identification will be explored. After explaining the theory of fingerprint verification, all current scanning technologies are described in more detail. Once it is known how these scanners identify a person by means of a fingerprint, two methods to counterfeit fingerprints are shown.A ll additional methods implemented by scanner manufacturers to prevent counterfeits from being successful are also described together with proposed methods how these systems could also be fooled into accepting dummy fingerprints. The consequences for systems using fingerprint verification are discussed at the end of the chapter. First, an example for fingerprint verification from practice will be given. This example also illustrates how difficult it can be to find an optimum trade-off between FAR and FRR. From a security point of view, one would want to have the FAR as small as possible. However, for acceptance of a biometry system, a large FRR is worse. Case: Within the car industry a biometric verification system is under evaluation.Manufacturers of expensive cars are considering using fingerprint recognition as a requirement for ignition of the engine. To arm against car theft, the FAR should be as small as possible. On the other hand, suppose that the righteous owner of a car can not use his car because his fingerprint is rejected (i. e. FRR is too high). He will consider this to be a much more serious flaw in the system than a technical failure which prevents the car from being started. This is especially true if he compares the advantages of this system with this rejection: the advantages are that the driver does not (necessarily) have to have a key to his car and a perception of higher security with respect to theft of his car. Whether indeed the security improves is questionable.Right now, we do not see car thieves trying to copy the key of your car, instead they try to by-pass the ignition mechanism where the car key is involved. Furthermore, as this article will show, it might decrease security since it is fairly easy and cheap to copy a fingerprint from a person, even without the person knowing this. 3. 1 Theory of Fingerprint Verification The skin on the inside of a finger is covered with a pattern of ridges and valleys. Already centuries ago it was studied whether these patterns were different for every individual, and indeed every person is believed to have unique fingerprints. This makes fingerprints suitable for verification of the identity of their owner.Although some fingerprint recognition systems do the comparison on the basis of actual recognition of the pattern, most systems use only specific characteristics in the pattern of ridges. These characteristics are a consequence from the fact that the papillary ridges in the fingerprint pattern are not continuous lines but lines that end, split into forks (called bifurcation), or form an island. These special points are called minutiae and, although in general a fingerprint contains about a hundred minutiae, the fingerprint area that is scanned by a sensor usually contains about 30 to 40 minutiae. For over hundred years law enforcement agencies all over the world use minutiae to accurately identify persons .For a positive identification that stands in European courts at lea st 12 minutiae have to be identified in the fingerprint. The choice of 12 minutiae is often referred to as â€Å"the 12 point rule†. This 12 point rule is not based on statistical calculations but is empirically defined based on the assumption that, even when a population of tens of millions of persons are considered, no two persons will have 12 coinciding minutiae in their fingerprints. Most commercially available fingerprint scanners give a positive match when 8 minutiae are found. Manufacturers claim a FAR of one in a million based on these 8 minutiae, which seems reasonable. 3. 2 Fingerprint Scanning Technologies Technologies for scanning fingerprints have evolved over the past years.The traditional method which is used by law enforcement agencies for over a hundred years now is making a copy of the print that is found at a crime scene or any other location and manually examining it to find minutiae. These minutiae are compared with prints from a database or specific ink prints, which could be taken at a later time. This method is of course based on the fact that the person who left the fingerprints is not co-operating by placing his finger on a fingerprint scanner. For systems that are commercially available (and deployed) people are required to co-operate in order to gain access to whatever is protected by the verification system. The first generation fingerprint scanners appeared on the market in the mid eighties, so the technology is about fifteen years old.Over the past few years the technology for scanning fingerprints for commercial purposes has evolved a lot. While the first generation sensors used optical techniques to scan the finger, current generation sensors are based on a variety of techniques. The following techniques are deployed in commercial products that are currently available: †¢ Optical sensors with CCD or CMOS cameras †¢ Ultrasonic sensors †¢ Solid state electric field sensors †¢ Solid state capacitive sens ors †¢ Solid state temperature sensors The techniques will be described in greater detail in this section. The solid state sensors are so small that they can be built into virtually any machine.Currently a sensor is in development that will be built in a plastic card the size of a credit card, not only with respect to length and width but also with respect to thickness! It is clear that this type of sensor will give a boost to the number of applications using fingerprint technology. (http://cryptome. org/fake-prints. htm) THE PROBLEM Statement of the Problem Encroachment has been an issue in our industry. It could not be resolved unless there are security systems. This study aims to secure every room in any apartment eliminating strangers to get into one’s room without the presence of any occupant. This study is further concerned with the following issues: 1.What are the existing systems used to maintain security of the apartments? 2. What are the problems encountered by the occupants of the apartments? 3. What are the advantages of this Apartment Security System among the existing systems? 4. What are the technological features in this Apartment Security System? Statistics The number of residential burglaries recorded increased 0. 7% from 27,347 in 2009/2010 to 27,531 in 2010/2011. Burglary (residential) had a clearance rate of 12. 4% during 2010/2011, 1. 6 percentage points lower than that of 2009/2010. Reported Residential Burglary in the Philippines as of 2007 [pic]Figure 1. 1 Burglary (residential) Graph Significance of the StudyTrespassing has been a concern in our society, to put an end this issue, this Apartment Security System must be realized. Apartment is the most profitable business establishment businessmen could ever have. Hence, such establishments must be secured all the time. Security systems are not just luxury in an Apartment, it is a necessity to maintain security and to be able to prevent from encroachment issues such as burgla ry, intrusion, theft, etc. If there is security system in the apartment, then both owners and boarders will benefit the system. The boarders will feel comfortable living in the apartment with such system, and will not encounter encroachment issues, hence the boarders will live peacefully and live longer in that certain apartment.A boarder who stays in the apartment long enough is an indication that he trusted the system that runs in the apartment. So, it is an advantage on the owner’s side because, aside from the fact that no intruder can get access to his establishment, it is a big income if the boarders stayed longer in his apartment. Scope and Limitation The project focuses more on the security systems. The project identified the occupants of the apartment by means of fingerprint identification through biometrics. This project already exists, the only difference is that the group applied the system in every room which makes the system expensive enough for it requires every apartment a single biometrics. The group pilots only two rooms for demonstration purposes.The system is capable of identifying occupants to the extent that it alarms whenever an intruder reached the maximum tries of fingerprint identifying. The project could not cater occupants who are disabled (do not have fingers). RESEARCH METHODOLOGY Methodology is generally a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. The group uses applied research and makes use of various techniques and tools in conducting this research. Research Environment The group will conduct the survey in the apartment where there are tenants and an owner. The purpose of our survey is to determine what are their concerned about the security of their apartment. Number of apartments and dormitories surveyed: 21Number of owners interviewed: 3 Number of workers interviewed: 18 Number of boarders interviewed: 100 Example of apartment’s and dormitori es surveyed: Kim Kathleen’s House for ladies – Brgy. Cabancalan, Mandaue City Engr. Bing Momo Europa Apartelle and Dormitory- Brgy. Cabancalan, Mandaue City â€Å"Patoy† Saint Joseph Dormitory – Lopez Jaena St. , Mandaue City â€Å"Ma’am Earl Joy† Pink Dormitory- Brgy. Pitogo Consolacion â€Å"Dioscor Jamisola† Research Respondents The people to be conducted by the group are the apartment tenants and the owner for they are the stakeholder of the system. The group will use the simple random sampling technique in getting the number of respondents.Research Instruments The data gathering is employed through the use of the questionnaire and supplemented with some data analysis of published, unpublished thesis and some article Research Procedure Gathering Data The team gathered the data through the formulated questionnaire which was distributed in the apartments, hotel, boarding house and school to identify the views of the respondents. Tre atment of Data Based on the questionnaire, the team construct, analyze, and interpret. The team will use the following formula. n = N 1 + N e Where: n = sample size N = population size e = desire margin of error DEFINITION OF TERMS Project Design A project that is being put into reality by a group of designer. Designers – A group of individuals that is tasked to develop the project design. Hardware – The physical components of a computer system, including any peripheral equipment such as printers, modem and mouse. Software – Computer programs are referred to as software. Feature – Is a unique, attractive, or desirable property of a program or of a computer or other hardware. Microcontroller – A highly integrated chip contains all the components comprising a controller. Server – A computer system that consist of database and other information of it a device that manages network resource. Circuit A combination of electrical or electronics comp onents, interconnected to perform one or more specific functions. Breadboard – A fiberboard used by electronic circuit designers to build experimental circuits and prototypes. Relay – Is an electrical switch that opens and closes under the control of another electrical circuit. Transistor – Is a semiconductor device, commonly used to amplify or switch electronic signals. Serial Communication – Is the process of sending data one bit at one time, sequentially, over a communication channel or computer bus. This is in contrast to parallel communication, where all the bits of each symbols are sent together. Flowchart A diagram representing the logical sequence in which a combination of steps or operation is to be perform. Program Flowchart – Describes graphically in detail the logical operation and steps with in a program and the sequence in which these steps are to be executed to the transformation of data to produce the needed output. System Flowchart – Graphic representation of the procedure involved in converting data or media to data in output form. CHAPTER 2 PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA This chapter focuses more on the data gathered in order for the proponents to further understand the importance of the project. The gathered data is being analyzed so that the group will be aware of the standards or the expectations of the mass.It is then interpreted by making graphs such as pie graph and bar graph to easily visualize the results of the conducted survey. The Figure 2. 1 shows that most of the group’s research respondents are the Occupant of the Apartment with fifty – eight percent (58%). The group conducted this research in the apartment’s occupant because they are the ones who will be benefiting the project aside from the Apartment owners. Their opinions and suggestions are very significant in making our project a successful one. The Figure 2. 2 shows that sixty four percent ( 64%) of the respondents has security systems in their respective apartments. But there are thirty six percent (36%) of the respondents who are living in an apartment with no security. CHAPTER 3Technical Aspects of the Systems This chapter contains the summary of the software and components used in the project in order for the readers to examine how the project was made. System Flowchart is the interpretation of how the project runs from start to end. The Program Flowchart is the interpretation of how the user interfaces with the users. The Block Diagram is how the project composed of. And the Source Code it is the program used of how the project runs with. [pic] Figure 3. 1 – System Flowchart [pic] Figure 3. 2 – System Flowchart [pic] Figure 3. 3 – Program Flowchart [pic] Figure 3. 4 – Program Flowchart [pic] Figure 3. 5 – Program Flowchart [pic] Figure 3. – Program Flowchart [pic] Figure 3. 7 – Program Flowchart System Block Diagram †¢ For Fingerprint Scanner [pic] Figure 3. 8 – System Block Diagram For Fingerprint Scanner †¢ For the whole system [pic] Figure 3. 9 – System Block Diagram For the whole System Schematic Diagram The schematic diagram is the design which shows how the desired components are being connected to each other. Figure shows the schematic diagram of our design. [pic] Figure 3. 10 – Schematic Diagram Design Components Software Design Proteus 7 ISIS Professional The Proteus Professional demonstration is intended for prospective customers who wish to evaluate our professional level products.It differs from Proteus Lite in that it does not allow you to save, print or design your own microcontroller based designs (you can however write your own software programs to run on the existing sample design suite for evaluation), but does include all features offered by the professional system including netlist based PCB design with auto-placement, auto-routing and graph b ased simulation .[pic] Figure 3. 11 – Proteus 7 ISIS Professional MikroC The group decided to use MicroC Compiler because it is a C complier for PIC. It is designed to provide the customer with the easiest possible solution for developing applications for embedded system without compromising performance or control. MikroC allows quickly develop and deploy complex applications. [pic] Figure 3. 12 – MikroC VB6. 0 [pic] Figure 3. 3 – VB6. 0 Visual Basic (VB) is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model first released in 1991. Visual Basic is designed to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Script ing languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently.A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Though the program has received criticism for its perceived faults, from version 3 Visual Basic was a runaway commercial success,and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsoft's extended support ended in March 2008 and the designated successor was Visual Basic . NET (now known simply as Visual Basic). Hardware Components PIC 16F877A Microcontroller [pic] Figure 3. 14 – PIC 16F877AA PIC (Peripheral Interface Controller) microcontroller is an IC manufactured by Microchip. These ICs are complete computers in a single package. The only external components necessary are whate ver is required by the I/O devices that are connected to the PIC. A microcontroller is a small computer and it can only perform simple task. Microcontroller consists of: †¢ Processor that executes the program †¢ Program memory to store the program that has been compiled successfully by the programmer. †¢ Ram (random-access memory) to store â€Å"variables. † †¢ IO Port to connect sensor, keypad, LED and so on. Crystal Oscillator [pic] Figure 3. 15 – Crystal OscillatorA  crystal oscillator  is an  electronic oscillator  circuit that uses the mechanical  resonance  of a vibrating  crystal  of  piezoelectric material  to create an electrical signal with a very precise  frequency. This frequency is commonly used to keep track of time (as in  quartz wristwatches), to provide a stable  clock signal  for digital  integrated circuits, and to stabilize frequencies for  radio transmitters  and  receivers. The most common ty pe of piezoelectric resonator used is the quartz crystal, so oscillator circuits designed around them became known as â€Å"crystal oscillators. † Relay [pic] Figure 3. 16 – Relay A  relay  is an  electrically  operated  switch. Many relays use an  electromagnet  to operate a switching mechanism mechanically, but other operating principles are also used.Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in telephone exchanges and early computers to perform logical operations. Resistor [pic] Figure 3. 17 – Resistor Typical 10K ohm, 1/4 watt resistor that can be used with various circuits. The color band on the r esistor is Brown, Black, Orange, Gold. Diode [pic] Figure 3. 18 – DiodeDiodes allow electricity to flow in only one direction. The arrow of the circuit symbol shows the direction in which the current can flow. Diodes are the electrical version of a valve and early diodes were actually called valves. Regulator [pic] Figure 3. 19 – Regulator Encapsulated in a single chip/package (IC), the  7805  is a positive voltage DC  regulator  that has only 3 terminals. They are: Input voltage, Ground, Output Voltage. Transistor [pic] Figure 3. 20 – Transistor Transistor is a â€Å"CURRENT† operated device which has a very large amount of current (Ic) which flows without restraint through the device between the  collector  and emitter terminals.But this is only possible if a small amount of biasing current (Ib) is  present  in the base terminal of the transistor making the base to act as a current control input. LED (Light Emitting Diode) [pic] Figure 3 . 21 – LED A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical electronic component in 1962,[2] early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness. DCU 11 [pic] Figure 3. 22 – DCU 11 The cable incorporates a charger port to charge the phone while the cable is in use, and your phone’s built-in modem brings the Web and email to your PC.The widely accepted USB standard and high-speed data transfer make this cable the ideal link from your phone to your PC. †¢ USB connector Fingerprint Scanner [pic] Figure 3. 23 – Fingerprint Scanner Fingerprint recognition  or  fingerprint authentication  refers to the  automated  method of verifying a match between two human  fingerprints. Fingerprints are one of many forms o f  biometrics  used to  identify  individuals and  verify  their  identity. This article touches on two major classes of  algorithms  (minutia and pattern) and four  sensor  designs (optical, ultrasonic, passive capacitance, and active capacitance). Power Supply [pic] Figure 3. 24 – Power Supply A  power supply  is a device that supplies  electrical  energy  to one or more  electric loads.The term is most commonly applied to devices that convert one form of electrical energy to another, though it may also refer to devices that convert another form of energy (e. g. , mechanical, chemical, solar) to electrical energy. A  regulated power supply  is one that controls the output voltage or current to a specific value; the controlled value is held nearly constant despite variations in either load current or the voltage supplied by the power supply's energy source. Program Source Code MikroC char ch; void main() { PORTB = 0x00; TRISB = 0x00; TRI SC = 0x80; PORTC = 0; Usart_Init(9600); delay_ms(100); while(1) { if(Usart_Data_Ready()) { ch = Usart_Read(); if(ch == ‘1') { PORTC. F0 = 1; elay_ms(5000); PORTC. F0 = 0; ch=''; } if(ch == ‘2') { PORTC. F1 = 1; delay_ms(8000); PORTC. F1 = 0; ch=''; } } PORTB = 0x00; } VB6. 0 â€Å"Enrollment† Dim WithEvents Capture As DPFPCapture Dim CreateFtrs As DPFPFeatureExtraction Dim CreateTempl As DPFPEnrollment Dim ConvertSample As DPFPSampleConversion Private Sub DrawPicture(ByVal Pict As IPictureDisp) ‘ Must use hidden PictureBox to easily resize picture. Set HiddenPict. Picture = Pict Picture1. PaintPicture HiddenPict. Picture, _ 0, 0, Picture1. ScaleWidth, _ Picture1. ScaleHeight, _ 0, 0, HiddenPict. ScaleWidth, _ HiddenPict. ScaleHeight, vbSrcCopy Picture1. Picture = Picture1. Image End SubPrivate Sub ReportStatus(ByVal str As String) Status. AddItem (str) ‘ Add string to list box. Status. ListIndex = Status. NewIndex ‘ Move list box selection down. End Sub Private Sub Close_Click() Capture. StopCapture ‘ Stop capture operation. Unload Me End Sub Private Sub Form_Load() Set Capture = New DPFPCapture ‘ Create capture operation. Capture. StartCapture ‘ Start capture operation. Set CreateFtrs = New DPFPFeatureExtraction ‘ Create DPFPFeatureExtraction object. Set CreateTempl = New DPFPEnrollment ‘ Create DPFPEnrollment object. Samples. Caption = CreateTempl.FeaturesNeeded ‘ Show number of samples needed. Set ConvertSample = New DPFPSampleConversion ‘ Create DPFPSampleConversion object. End Sub Private Sub Capture_OnReaderConnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was connected. â€Å") End Sub Private Sub Capture_OnReaderDisconnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was disconnected. â€Å") End Sub Private Sub Capture_OnFingerTouch(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was to uched. â€Å") End Sub Private Sub Capture_OnFingerGone(ByVal ReaderSerNum As String) ReportStatus (â€Å"The finger was removed from the fingerprint reader. â€Å") End SubPrivate Sub Capture_OnSampleQuality(ByVal ReaderSerNum As String, ByVal Feedback As DPFPCaptureFeedbackEnum) If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The quality of the fingerprint sample is good. â€Å") Else ReportStatus (â€Å"The quality of the fingerprint sample is poor. â€Å") End If End Sub Private Sub Capture_OnComplete(ByVal ReaderSerNum As String, ByVal Sample As Object) Dim Feedback As DPFPCaptureFeedbackEnum ReportStatus (â€Å"The fingerprint sample was captured. â€Å") ‘ Draw fingerprint image. DrawPicture ConvertSample. ConvertToPicture(Sample) ‘ Process sample and create feature set for purpose of enrollment. Feedback = CreateFtrs.CreateFeatureSet(Sample, DataPurposeEnrollment) ‘ Quality of sample is not good enough to produce feature set. If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The fingerprint feature set was created. â€Å") Prompt. Caption = â€Å"Touch the fingerprint reader again with the same finger. † ‘ Add feature set to template. CreateTempl. AddFeatures CreateFtrs. FeatureSet ‘ Show number of samples needed to complete template. Samples. Caption = CreateTempl. FeaturesNeeded If Val(Samples. Caption) = 0 Then MainFrame. Picture1. Visible = True Else MainFrame. Picture1. Visible = False End If ‘ Check if template has been created. If CreateTempl.TemplateStatus = TemplateStatusTemplateReady Then MainFrame. SetTemplete CreateTempl. Template ‘ Template has been created, so stop capturing samples. Capture. StopCapture Prompt. Caption = â€Å"Click Close, and then click Fingerprint Verification. † MsgBox â€Å"The fingerprint template was created. † End If End If End Sub Private Sub Form_Unload(Cancel As Integer) Capture. StopCapture ‘ Stop capture operat ion End Sub â€Å"frmFlash† Option Explicit Dim i As Integer Private Declare Sub Sleep Lib â€Å"kernel32† (ByVal dwMilliseconds As Long) Private Sub Form_Activate() For i = 0 To 10 i = i + 1 Sleep (500) Me. Refresh Next Unload Me frmStandbyMode. Show End Sub â€Å"frmInventory†Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdPayDue_Click() Set rsPay = New ADODB. Recordset rsPay. CursorLocation = adUseClient rsPay. CursorType = adOpenDynamic rsPay. LockType = adLockOptimistic ‘rsPay. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB rsPay. Open â€Å"select * from tbl_registration where FullName = ‘† & txtPay. Text & â€Å"‘†, ConnectDB If rsPay. EOF = False Then ‘With rsPay ‘rsPay. MoveFirst ‘ While rsPay. EOF = False ‘ If txtPay. Text = rsPay! Fu llName Then If MsgBox(â€Å"Continue paying his due? , vbInformation + vbYesNo, â€Å"Apartment Monitoring and Security System – Paying Due†) = vbYes Then rsPay! ToPay = rsPay! ToPay + rsPay! Payment rsPay. Update List_Unpaid. Clear Call query_list ‘ rsPay. MoveNext ‘ Else: rsPay. MoveNext End If ‘ Else: rsPay. MoveNext ‘ End If ‘ Wend ‘End With End If End Sub Private Sub cmdPrint_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_registration†, ConnectDB Set GuestReport. DataSource = rst. DataSource GuestReport. ReportWidth = 6000 GuestReport. Show End SubPrivate Sub cmdPrintLogs_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_logs where FullName = ‘† & txtPay. Text & â⠂¬Å"‘†, ConnectDB If rst. EOF = False Then Set GuestLogs. DataSource = rst. DataSource GuestLogs. ReportWidth = 5000 GuestLogs. Show End If End Sub Private Sub Command1_Click() Unload Me Load MainFrame End Sub Private Sub Form_Load() txtPay. Text = â€Å"† Set rsViewInventory = New ADODB. Recordset rsViewInventory. CursorLocation = adUseClient rsViewInventory. CursorType = adOpenDynamic rsViewInventory. LockType = adLockOptimistic rsViewInventory.Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestInventory. DataSource = rsViewInventory frmInventory. dgGuestInventory. Columns(0). Visible = False frmInventory. dgGuestInventory. Columns(2). Visible = False frmInventory. dgGuestInventory. Columns(5). Visible = False frmInventory. dgGuestInventory. Columns(7). Visible = False frmInventory. dgGuestInventory. Columns(8). Visible = False frmInventory. dgGuestInventory. Columns(1). Width = 2200 frmInventory. dgGuestInventory. Co lumns(3). Width = 1900 frmInventory. dgGuestInventory. Columns(4). Width = 1600 frmInventory. dgGuestInventory. Columns(6). Width = 1200 If rsViewInventory.EOF = False Then With rsViewInventory rsViewInventory. MoveFirst While rsViewInventory. EOF = False If rsViewInventory. EOF = False Then txtBayadHolder. Text = rsViewInventory! ToPay txtBayadUtang. Text = Val(txtBayadUtang. Text) + Val(txtBayadHolder. Text) ‘rsViewInventory! ToPay rsViewInventory. MoveNext End If Wend End With Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB If txtBayadUtang. Text = rsUpdateNah! Total Then txtBayadUtang.Text = â€Å"Php † & FormatNumber(rsUpdateNah! Total) Else Dim rsUpdateNahh As New ADODB. Recordset rsUpdateNahh. CursorLocation = adUseClient rsUpdateNahh. CursorType = adOpenDynamic rsUpdateNahh. Lock Type = adLockOptimistic rsUpdateNahh. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB rsUpdateNahh! Total = txtBayadUtang. Text rsUpdateNahh. Update rsUpdateNahh. Close txtBayadUtang. Text = â€Å"Php † & FormatNumber(txtBayadUtang. Text) End If End If Call query_list End Sub Private Sub txtPay_Change() If txtPay. Text â€Å"† Then cmdPayDue. Enabled = True cmdPrintLogs. Enabled = True End If End Sub Public Function query_list() Dim rsViewUnpaid As New ADODB. Recordset rsViewUnpaid.CursorLocation = adUseClient rsViewUnpaid. CursorType = adOpenDynamic rsViewUnpaid. LockType = adLockOptimistic rsViewUnpaid. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB If rsViewUnpaid. EOF = False Then With rsViewUnpaid List_Unpaid. AddItem â€Å"Name's† & vbTab & vbTab & vbTab & â€Å"To Pay† List_Unpaid. AddItem â€Å"† rsViewUnpaid. MoveFirst While rsViewUnpaid. EOF = False If rsViewUnpaid! ToPay = 0 Then txtBayadHolder. Text = rsViewUnpai d! FirstName & † † & rsViewUnpaid! LastName & vbTab & vbTab & â€Å"Php † & FormatNumber(rsViewUnpaid! Payment) List_Unpaid. AddItem txtBayadHolder. Text rsViewUnpaid. MoveNext Else: rsViewUnpaid.MoveNext End If Wend End With End If End Function â€Å"frmLogin† Private Declare Function sndPlaySound Lib â€Å"winmm. dll† Alias â€Å"sndPlaySoundA† _ (ByVal lpszSoundName As String, ByVal uFlags As Long) As Long Const SND_SYNC = &H0 Const SND_NODEFAULT = &H2 Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdCancel_Click() Unload Me frmStandbyMode. Enabled = True frmStandbyMode. Show End Sub Private Sub Form_Load() frmStandbyMode. Enabled = False End Sub Private Sub cmdOK_Click() Set recordSetAccount = New ADODB. Recordset ecordSetAccount. CursorLocation = adUseClient recordSetAccount. CursorType = a dOpenDynamic recordSetAccount. LockType = adLockOptimistic recordSetAccount. Open â€Å"tbl_account†, ConnectDB If (frmLogin. txtUserName. Text = â€Å"† And frmLogin. txtPassword. Text = â€Å"†) Then Unload frmLogin Unload frmStandbyMode MainFrame. mnuSearchGuest. Enabled = False MainFrame. mnuAddGuest. Enabled = False MainFrame. Show ElseIf recordSetAccount. EOF = False Then If frmLogin. txtPassword. Text = â€Å"† Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%)MsgBox â€Å"Please input your password. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus ElseIf Not frmLogin. txtPassword. Text = recordSetAccount! Password Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Incorrect pa ssword. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus frmLogin. txtPassword. SelStart = 0 frmLogin. txtPassword. SelLength = Len(frmLogin. txtPassword. Text) ElseIf (frmLogin. txtUserName. Text = recordSetAccount! UserName And frmLogin. txtPassword. Text = recordSetAccount!Password) Then Unload frmLogin Unload frmStandbyMode MainFrame. Show End If Else soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Not a valid account. Try again! â€Å", , â€Å"Login† frmLogin. txtUserName. SetFocus frmLogin. txtUserName. SelStart = 0 frmLogin. txtUserName. SelLength = Len(frmLogin. txtUserName. Text) End If End Sub â€Å"frmStanbyMode† Private Sub mnuExit_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Timer1. Enabled = True End IfEnd Sub Private Sub mnuLogin_Click() frmLogin. Show End Sub Private Sub Timer1_Timer() Label1. Visible = True ProgressBar1. Visible = True If ProgressBar1. Value >= ProgressBar1. Max Then End End If ProgressBar1. Value = ProgressBar1. Value + 1 End Sub â€Å"MainFrame† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice.Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete. CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete.Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800 MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â₠¬Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame.Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen txtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDBIf MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt.Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender. Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Se t rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB ritePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & t xtLastName.Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text rsUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyy†) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest.Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset rsguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOp timistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing.If Templ Is Nothing Then Else: Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End Sub Private Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to pictur e Set Templ = New DPFPTemplate Templ. Deserialize blob End If End SubPrivate Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True frameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click()If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me frmStandbyMode. Show End If End Sub Private Sub mnuSearc hGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1.Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = Ne w DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest.CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName. Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"† Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. , vbYes No + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text rsAddGuest! LastName = txtLastName. Text rsAddGuest! Fullname = txtFirstName. Text & † † & txtLastName. Text rsAddGuest! Gender = cboGender. Text rsAddGuest! RoomChoice = cboRoomChoice. Text rsAddGuest! RoomNumber = cboRoomNumber. Text rsAddGuest! Picture = txtFilePathPic. Text rsAddGuest! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted. Text & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsAddGuest! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear.Text, â€Å"mm/dd/yyyy†) rsAddGuest! Payment = txtIdHolder. Text rsAddGuest. Update rsAddGuest. Close Call Clear MsgBox â€Å"Guest has successfully Added. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† End If End If End Sub Private Sub SaveTemplate_Click() Dim blob() As Byte ‘ First verify that template is not empty. If Templ Is Nothing Then MsgBox â€Å"You must create a fingerprint template before you can save it. † Exit Sub End If CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Save As dialog box. CommonDialog1. ShowSaveIf Err Then ‘ This code runs if the dialog box was cancelled. Exit Sub End If ‘ Export template to binary data. blob = Templ. Serialize ‘ Save binary data to file. Open CommonDialog1. FileName For Binary As #1 Put #1, , blob Close #1 End Sub Private Sub Timer1_Timer() lblDate. Caption = Format(Date, â€Å"Long Date†) lblTime. Caption = Format(Time, â€Å"Long Time†) End Sub Private Sub Verify_Click() ‘ First verify that template is not empty. If Templ Is Not hing Then MsgBox â€Å"You must create fingerprint template before you can perform verification. † Exit Sub End If ‘ Show Fingerprint Verification dialog box. Verification. Show vbModal, Me End SubPublic Function Clear() txtFirstName. Text = â€Å"† txtLastName. Text = â€Å"† txtFilePathPic. Text = â€Å"† cboGender. Text = â€Å"† cboRoomChoice. Text = â€Å"† cboRoomNumber. Text = â€Å"† cboMonthStarted. Text = â€Å"† cboDateStarted. Text = â€Å"† cboYearStarted. Text = â€Å"† cboDueMonth. Text = â€Å"† cboDueDate. Text = â€Å"† cboDueYear. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† imgbox. Visible = False img_box_del. Visible = False frameRegisterGuest. Visible = False frameSearchGuest. Visible = False End Function Public Function View() frameRegisterGuest. Visible = False frameSearchGuest. Visible = False frameViewGuest. Visible = True Set rsViewGuest = New ADODB. Recordset rsViewGuest.CursorLocation = adUseClient rsViewGuest. CursorType = adOpenDynamic rsViewGuest. LockType = adLockOptimistic rsViewGuest. Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestView. DataSource = rsViewGuest MainFrame. dgGuestView. Columns(0). Visible = False MainFrame. dgGuestView. Columns(2). Visible = False MainFrame. dgGuestView. Columns(5). Visible = False MainFrame. dgGuestView. Columns(7). Visible = False MainFrame. dgGuestView. Columns(8). Visible = False MainFrame. dgGuestView. Columns(1). Width = 2200 MainFrame. dgGuestView. Columns(3). Width = 1900 MainFrame. dgGuestView. Columns(4). Width = 1600 MainFrame. dgGuestView.Columns(6). Width = 1200 Set rsViewGuest = Nothing End Function â€Å"Verification† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Fu nction Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice. Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete.CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete. Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Wi dth = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame. Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen xtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. , vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsE ditGuestt. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender.Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB writePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah.CursorType = adOpenDynamic rsUpdateNah. LockType = adL ockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & txtLastName. Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text sUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyyâ₠¬ ) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest. Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset sguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing. If Templ Is Nothing Then Else: Set GetTem plate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End SubPrivate Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End Sub Private Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True rameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me rmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fptà ¢â‚¬  ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest. CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName.Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"â €  Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text

Saturday, September 28, 2019

Mythology by Edith Hamilton Critical Analysis

Mythology by Edith Hamilton Edith Hamilton: Mythology is a collection of Greek and Roman myths retold by Edith Hamilton. It is rewritten in a way that more readers could comprehend its content. The book was published in 1999 by Grand Central Publishing in New York, New York. Edith Hamilton believed that Greek myths â€Å"show how high the ancient Greeks rose above ancient filth and fierceness. † However, she also believed that â€Å"Greek mythology do not throw any clear light upon what early mankind was like† (14).They were simply written by ancient societies or civilizations to express themselves or to explain natural events that occurred around them. In addition, Edith Hamilton also says that the â€Å"best guides to a knowledge of Greek mythology are the Greek writers who believe what they wrote† (23). Edith Hamilton: Mythology can be described in many ways. It can be described and analyzed by its purpose, organization and language, and interpretation. One wa y that it could be described is by analyzing the book's purpose. This book was written for many purposes.In Hamilton's perspective, the purpose of this work was simply to â€Å"show us the way the human race thought and felt untold ages ago† (13). Another purpose of the book was to entertain its readers and audiences. Reading Edith Hamilton's collection of Greek and Roman myths gives its readers more knowledge about how ancient civilizations explained things. Hamilton's purpose for writing this literary work was also to â€Å"make the reader see some differences between writers [of the original], who were so different† from each other.She accomplished this by writing short passages about the original writers at the beginning of each story. Her goal for this book was to be accurate and close to the original and for readers to gain knowledge of myths and an idea of what each original writer was like (Foreword). The organization and language of Edith Hamilton: Mythology i s another way to analyze this book. Hamilton organized her work in easy-to-follow groups. Short love stories were all in one chapter, and the events of the Trojan War were all in another chapter.She also kept the Greek stories and the Roman stories separated by using only Greek characters in some stories and using only Roman characters in the next. While that organization made the book more convenient, it may also have confused some readers. The transition from Roman gods in one story to Greek gods in the next story came so unexpectedly that it may have surprised or confused readers. Hamilton was very sophisticated with her use of words and language in the book. While that may have impressed some of her audiences, others may have preferred the use of simple and easy-to-understand language.Edith Hamilton: Mythology can be interpreted by its effectiveness and appeal to its audience. It was very educational and effective in letting the reader understand the interaction between mortals and immortals. This literary work was definitely a monomyth, a hero with a thousand faces. Most of the stories all related to each other, and some were basically the same stories, only told by different writers using similar gods, goddesses, and mortals. The myths also contained a few recurring themes such as the theme of love.In several stories, readers were told that love was given to mortals by the gods and that it was unavoidable. The stories and myths appealed to the reader and audience in many ways. Some stories or myths contained humor, while others were quite moving and heart-warming. For example, in Hercules's story, we are told that Hercules drank and partied one night while everyone else around him was mourning a woman's death. Hercules regretted being merry on such a night that he did all that he could to bring the woman back to life (176-178). That story was very sweet and heart-warming.It also showed the readers Hercules's true character and how much he cared about the people around him. Other myths and stories provided suspense or even mystery to its audience. The story of â€Å"The Quest of the Golden Fleece† kept some readers wanting to keep reading just to find out what the future held for Jason, the Argonauts, and Medea. Overall, Edith Hamilton: Mythology was a collection of Greek and Roman myths rewritten by Edith Hamilton. Her book can be analyzed by its purpose, organization and language, and its interpretation.It was written to inform its audience about how humans thought and felt ages ago. Its content was organized in such a way that made it easier to understand for some readers. The book's stories were very effective in letting its audience know about the relationship between the gods and the mortals. They also appealed to readers because of their humor or suspense. People all over would now be able to read and understand Greek, as well as Roman, mythology because of the literary work, Edith Hamilton: Mythology.

Friday, September 27, 2019

Aryans and Dravidians Essay Example | Topics and Well Written Essays - 500 words

Aryans and Dravidians - Essay Example This essay will discuss the history and culture of two of the most unique civilizations that inhabited the Indian continent, the Aryans and Dravidians. The term ‘Aryan’, according to the Indo-European philology, refers to an individual, recognized ethnically or racially, and the Aryan language, regardless of the ethnicity or race of the inhabitants speaking its different variants (Basham 1954). The Aryan civilization was a new beginning in the culture of India. Harappa was basically a blind alley; the Aryans borrowed almost nothing of the culture of the Harappan civilization (Basham 1954). They did not develop a writing system, built no states, and cities. Rather they were a hostile civilization that governs themselves in kinship, tribal, and individual units (Gottschalk 2000). Basically, the Aryans were a group of nomadic and tribal people inhabiting the remote part of Euro-Asia in unfriendly steppe territories hardly making a sufficient subsistence (Gottschalk 2000). They were undoubtedly a strong population, and they were brave and aggressive. Their religion is governed by a sky-god that commands combat and invasion (Gottschalk 2000). The culture of the Aryan civilization was concentrated around warfare. They were exceptional horseback riders and charged into combat in chariots (Knott 1998). They were ruled by a raja, or a war-chief. They started to move southwards in series of continuous invasion across Persia and India at some point in the second millennium B.C. (Knott 1998). The term ‘Dravidian’ is given to peoples of India related by language. They are claimed to be the earliest inhabitants of ancient India (Basham 1954). The population is mostly made up of the lower class Indian people. Particular groups of people comprise the Tamil, the Todas and the Ghats (Basham 1954). The culture of the Dravidian is quite diverse, with several

Thursday, September 26, 2019

The Differences between Financial and Management Accounting Assignment

The Differences between Financial and Management Accounting - Assignment Example Management and managerial accounting are used by the management to make decisions with regards to the daily operation of the business. It is based on the past performance of the business. It relies majorly on the forecasting of market trends and markets. Management accounting is internally presented while financial accounting is meant for the external stakeholders. Financial management is important to the current potential investors while management accounting is used by managers in making current and future financial decisions. Finally,  financial accounting is succinct and adheres to the Generally Accepted Accounting Principles (GAAP) while management accounting is usually a guess or estimate given that a myriad of managers rarely have time for exact numbers when they need to make decisions.      Some of the key financial statements include;   Income statement (profit and loss account), Balance sheet, Cash flow.   Income statement tells the users about the earnings and the profitability of the business. The statement is for a specific period of time. The periodic statements are important given that the owners can know the periodic performance of the company. It shows the sales first then cost of sales, the differences of which gives the gross profit. Then it explains the operating expenses which are subtracted from the gross margin to show Earnings Before interests and Taxes (EBIT). It then subtracts expenses and taxes to get the net profit. The balance sheet shows the financial position of the business. It tells the investors whether the company is able to pay its bills on time and the flexibility in the acquisition of capital and the distribution of cash distribution in terms of dividends. The key items are assets, liabilities, and equity.

The affect of in circle group on turnover intention in Saudi Arabia Research Proposal

The affect of in circle group on turnover intention in Saudi Arabia Business - Research Proposal Example However, argues some authors, motivation is essential in fostering impression management and relationships in an organization. While others believe the environmental compulsions has a become powerful antecedents that necessitate proactive participation of the workforce in the change process. Various scholars emphasize the importance of Guanxi that significantly influences the didactic relationship between the leader and a worker in an organization. Others believe employee commitment, extra effort, leadership effectiveness and satisfaction with the leader have a positive relationship with LMX. LMG (guanxi) has mixed effects on the turnover. In connection to this, the broad objective of this research is to examine the critical success factor of employees’ outcome turnover among the private enterprises of Saudi Arabia. Therefore, the sample size of 300 respondents randomly selected from three institutions representing the private sector will be issued with questionnaires and subjected to interviews. Qualitative data analysis will be used to analyses the collected data and represented through graphs, pie charts, and tables. The study will be highly significant for private sector in Saudi Arabia, in addressing the high employee turnover. Saudi Arabia is an important part of the Arab World and the Middle East as a regional power especially economic Zhou (2008). This can be demonstrated by the development of infrastructure, like a road network, and the effectiveness they exude in the region and the most conspicuous fast growing multinational organizations. Saudi Arabia’s characteristics in the determination of social developments and modernization methods have been influenced by the national conditions of history and reality. In the wake of this economic development, of most importance is the synergy developed between the

Wednesday, September 25, 2019

What companies or organization have shown strong commitment to making Essay

What companies or organization have shown strong commitment to making the world a better placeHow do their practices align with your personal views of ethical behavior - Essay Example Apple products have become such a huge part of our daily lives now, so much so that it would be tough to imagine a world without them. Inventions such as the iPhone and iPad make our lives so much easier because it is now possible to be connected to anyone in the world on the go. As I have worked in a customer services department, I know just how important it is to reach someone at a moment’s notice. Apple was not the first company to make a cell phone; it just took the idea and expanded the features available. Apple is going to be around for quite some time yet because its customers are satisfied with the products that it has to offer. I will not be abandoning Apple any time soon because products such as the iPhone and iPad help me to perform simple daily tasks in a much faster way. Apple chooses to manufacture its products in China because of the low labor costs there. While I may not agree with this decision completely, I understand the need to make a profit. Also, people like me are able to get a high quality product for a very low cost. There are sometimes complaints about the treatment of workers in Chinese factories that make Apple products, but I think that Apple does its best to look after any employee that contributes towards the company’s success. My personal views of ethical behavior are that a company should put the views of its customers first. Apple does this by making products in an ethical way and doing so cheaply. Whenever there is a complaint over working conditions in Apple factories, the company is always quick to launch an investigation and try to find out the truth in the matter. Being open and transparent are values that I believe in, so I appreciate that Apple follows this with its customers. If Apple were to be involved in unethi cal practices, then it would affect the image of the brand negatively. Apple does not want this, and neither do the customers, so I’m sure that the company will

Tuesday, September 24, 2019

Summative Written Assignment Example | Topics and Well Written Essays - 1500 words

Summative Written - Assignment Example The paper will explore the legal principles involved in the case with the aim of offering a legal advice to the employee. Facts of the case Mathew, an employee of pharmaceutical company, Medx ltd, was recently involved in an accident. He has worked as a warehouse operative for the pharmaceutical company for over 20 years. The company deals in and store heavy boxes containing its goods. Based on the scope of its operations, the company’s policy is that its employees are supposed to wear protective helmets while on duty. In December 2011, Mathew who was in good health and had never been involved in an accident leading to any injury was involved in an accident while on duty at the pharmaceutical company. A heavy box from an overhead wooden pallet rack fell and hit him to unconsciousness. He sustained several injuries including bruises on his face, a cut on his head, which left a permanent scar, dislocation of his right shoulder, and injuries to his leg. Mathew has been forced out of work for four months and medical report indicates that he may not be able to work for another six months. He also suffers continuous headache. He has a family with a running mortgage to finance. Legal issue Obligations under law of contract One of the essential legal elements in the case is the existence of a legal relationship between Mathew and MedX as defined by his employment contract. His relationship with MedX Ltd falls within the scope of an employment contract. Pozgar and Santucci defines an employment contract as an â€Å"agreement between an employee and an employer† in which special terms such as remuneration, the scope of work and working hours are defined (Pozgar and Santucci, 2009, p. 61). The agreement is therefore regulated by the law of contract under contract of service (Pozgar and Santucci, 2009, p. 61). A contract is an agreement, between parties, that legally enforces their rights and obligations. When parties enter into a contract, they expressly cre ate conditions and warranties that regulate their relationship by laying down responsibilities and obligation of each party. Essential elements of a valid contract as defined through agreement, consideration, and intention to create legal obligations further binds parties to a contract to implied conditions in their trade. Contracts are therefore subject to legislations such as labour law statutes (Goldman and Sigismond, 2010, p. 123). Employee’s safety at workplace Implied conditions in contracts of service impose a responsibility on employers to ensure safety of their employees while at the work place. The occupational safety and health act is an example of such legislations that aims at ensuring welfare of employees. One of the provisions of the act is that an employer has the duty to minimize and possibly mitigate any health hazard within the work place. These threats can either be biological leading to illnesses or physical, leading to injuries. Failure to take necessary measures makes an employer liable to his or her employee for any injury or sickness suffered because of conditions at the work place. The act , with this respect, empowers government agencies to facilitate its implementation as was observed in the case of Donovan v Dewey, 452 U.S 594, 101 s. Cr 2534 (1981) (Ullmann, 2004, p. 339). Further, employers are charged with the responsibility of not only ensuring safety of their

Monday, September 23, 2019

Ethical Relativism and Rights, Equality and Justice Essay

Ethical Relativism and Rights, Equality and Justice - Essay Example This essay discusses that to Hamas, the conflict is all about responding to an aggressive and oppressive neighbor since it refused to recognize Israel and past Palestinian agreements regarding the border and settlements thus escalating the existing border tensions since 2006. The Palestinians living in Gaza Strip and West Bank have equal rights to express their opinions, practice their religion and access basic human services such as food and gas. Accordingly, the Palestinians must be treated equally with respect and dignity. Israel blockade in Gaza has created a humanitarian crisis since 2007 since all border crossing and naval pathways have been restricted in the territory it controls. Although Israel has claimed the goal of the blockade is to diminish Hamas capability of building rockets and mortars, such move has led to the suffering of thousands of Palestinian civilians since it has restricted access to basic services such as healthcare, food, electricity, gas and construction m aterials.Israel asserts that the airstrikes and ground incursion into Hamas is a retaliation of the teenage boys abducted by Hamas and perceives Hamas as a threat since it has launched numerous rockets into Israel territory. Hamas claims that Israel has no moral right of self-defense since it has occupied Palestinian land and implemented a blockade that has led to the humanitarian crisis. However, the best action by the United States is to call for the end of the current hostilities and conflicts that have claimed lives of innocent civilians.

Sunday, September 22, 2019

Marketing Plan for Book Publisher Essay Example for Free

Marketing Plan for Book Publisher Essay ‘Knowledge Hub’Publishers is a provider of latest academic and research material, the best literary material in Urdu and English by quality writers both local and international. Our customers rest assured that when they purchase a publication of Knowledge Hub they receive the optimum value for their money or as we call it ‘your money well spent’. Our publications are free of plagiarism and we endeavor to stay a step ahead in providing academic material which is the most recently proven by researchers instead of re-publishing the same material in a different manner. We are a sole proprietorship and our office is located at Urdu Bazar, Lahore. Being a startup in an industry already being served by a huge number of brands, we shall initially target the Lahore market with intent to move into other cities throughout Punjab within 5 years time. Our focus shall remain to continually research and analyze customer needs, wants, reading trends and preferences to ensure that we provide only the most needed and sought after books with the latest content. Knowledge Hub shall provide its client authors with editing, proofreading, layout and design, promotion and authentication services. Whereas, we shall be outsourcing the printing and distribution of our books. Our long term focus is to motivate the culture of e-books and printing on demand in order to safeguard our natural resources for our future generations. Print on demand (POD) is a printing technology and business process in which new copies of a book (or other document) are not printed until an order has been received, which means books can be printed one at a time. Rationale of this Product: Books are priceless source of knowledge, wisdom and education the best company in times if solitude. Our affiliation with books and knowledge is further promoted by our religion which encourages us to gain knowledge and preaches us to respect books. In today’s fast paced world, where information and knowledge is continually increasing and modifying, the need for books containing the latest of information are always required. As soon as a book or article is publishes a chain of evaluation, testing and research on the published material starts which eventually leads to modified material ready to be published and the cycle continues. This causes a never ending need for high quality books available at easy to access touch points and at affordable prices. And this is exactly what we offer our customers as our product. Strategic Focus and Plan Mission: Knowledge Hub is the premium publisher of academic and illustrated books, novels, best sellers and e-books in Pakistan. We at Knowledge Hub believe that knowledge is a service to be provided to our nation so that we may progress in this fast paced world. The purpose of our affordable and easy to access products is to ensure availability of knowledge to all Pakistanis who seek for it. Goals: Non Financial Goals: Knowledge Hub seeks ensure availability of knowledge to all Pakistanis who seek for it. We at Knowledge Hub believe in a cleaner, safer tomorrow and in a ‘Paper Free World’ in which our natural resources are savored for our future generations to enjoy. Knowledge Hub’s comprehensive website holds the key to a better tomorrow. Our online e-books, research articles, audio and visual resources provide you easy and instant access along with it being environmentally beneficial. Financial Goals: We have targeted to publish 70 books by authors within a year’s time. Moreover, to a customer base of at least 200,000 readers at the end of year one which is approximately 10 percent Market Analysis: International Book Publishing Market: The worldwide book industry has been forecast to exceed revenue of $90 billion. The industry recorded yearly growth of 1% over the past four preceding years, and is expected to accelerate to a yearly rate of almost 4% between 2011 and 2016. Sales by music, video,books and stationery retailers represented the leading segment of the global book market in 2011, generating more than $50 billion and representing 56% of the overall market. Pakistan Book Publishing Market: Book publication is a business very closely related to the literary scenario since books are nothing if they don’t get a publisher or a printer. Like every other thing in Pakistan,the printing industry is with its own sets of problems the initial ones being the unfavorable socio-economic conditions, lack of mass education and the development of local languages. Constraints: Low Literacy Rate: The publishing industry in Pakistan is hampered both by a low literacy rate (48%) and the fact that the national language, Urdu, is written in the right-to-left Arabic script unlike the official language, English, which is written left-to-right. Pakistan has had its share of poetry and prose writers in Urdu, English and other regional languages. Incentives for Writers: Those who don’t reproduce work and are genuinely interested are hardly encouraged. The government, the NGOs and the intellectuals hardly ever take the initiative to encourage young and budding  writers of the country. These results in most of the young authors getting their works published under foreign publishers. At least they get the recognition they warrant in foreign waters. Yet, there are a few committed souls who work tirelessly to make a place for themselves in the literature-deprived country. Market Growth: The publishing industry has been steadily growing despite the many hurdles like the low purchasing power of the masses and the lack of facilities. The principle centers of publishing are Karachi, Lahore and Peshawar. Lahore stands out with its numerous publishing houses and has been the hub of the industry from the pre-independence era. Even now, getting a book published from Lahore is much easier than elsewhere. Pakistan’s publishing industry has a lucrative market for Urdu and religious books abroad. A considerable number of books and periodicals are exported to countries like Malaysia, East Africa and the Middle East. Also, a very large number of books is imported in Pakistan mainly from UK and USA. The Inter-Media Growth program of Pakistan and USA have signed an agreement whereby Pakistan can import books and still pay for them in its local currency. Market needs: In the Pakistan scenario, there is need for up-to-date information available at affordable prices and easily accessible via easy to access retail outlets and via e-books. Trends: The following trends are emerging in the publishing industry: E-books Online book stores Reading clubs Book fairs Mobile bookshops Print on Demand These trends are discussed in detail in the ‘Opportunities’section. Customers Analysis: Following is a detailed description of Knowledge Hub’s client authors, intermediate customers and ultimate customers: Client Authors: Our client authors shall include all local authors who have quality material to offer and who fall within in our product range. Intermediate Customer: Our Intermediate or trade customers include: Wholesaler Book Stores Ultimate Customer: Out ultimate customers include: 25534400 school/ college going children in Pakistan 1,349,000 university going individuals in Pakistan 57. 7 % of our adult population which is literate in Pakistan Needs of the Target Customers: Knowledge Hub endeavors to cater to these basic needs of the target consumers: Academic needs Literary/ information needs Entertainment needs Consumer Touch Points: Our target consumer shall purchase our product via the following channels: Book Stores: Knowledge Hub shall have its products available at book stores including academic and literary book stores book shops in schools, colleges and universities. Gift Shops: Our books shall also be made available on gift shops. Libraries: One of the major sources of contact with the target market are libraries. We shall endeavor to establish relations with the local libraries to allow the usage of our products there. Website: Our comprehensive website will also serve as a major source of interaction with our customers. Our website will display our catalogue of books and shall provide the viewers with an option to get access to our products in the form of both paper editions and electronic versions on-line. Customers would be able to be directed to bookstores for the paper version and they may send an order directly to us. They would also be able to unlock and access an on-line edition instantly by making an online payment. Our website viewers would also be able to opt to receive periodic catalogs of our products online via e-mail. Customer Value Proposition: Like they say â€Å"A book is man’s best friend†, Knowledge Hub shall serve to provide its target consumers with books that serve as their best friends in all their walks of life. Knowledge Hub is a provider of latest academic and research material, the best literary material in Urdu and English by quality writers both local and international. Our customers rest assured that when they purchase a publication of Knowledge Hub they receive the optimum value for their money or as we call it ‘your money well spent’. Our publications are free of plagiarism and we endeavor to stay a step ahead in providing academic material which is the most recently proven by researchers instead of re-publishing the same material in a different manner. Knowledge Hub believes in a cleaner, safer tomorrow. We believe in a ‘Paper Free World’ in which our natural resources are savored for our future generations to enjoy. Knowledge Hub’s comprehensive website holds the key to a better tomorrow. Our online e-books, research articles, audio and visual resources provide you easy and instant access along with it being environmentally beneficial. Constraint: The long term vision of Knowledge Hub is to provide all of its resources online so that the environment and our natural resources can be saved. However, due to low levels of computer literacy in Pakistan, this is not possible immediately and shall take efforts from our end to promote education and reading so that our country can move forward past its literacy barriers. Competitor Analysis: Our competitors include: Local Competitors: Sang-e-Meel Publications Ferozsons Awesome Publishers Association for Academic Quality AFAQ Fact Publications Idara-e-Islamiat Kiran Publications Azeem Academy Publishers Book Sellers Hassan Publishers 2 The Point Publishers 7th Sky Publications A to Z Publishers A-One Publishers Adara Talifat Khatm-e-Naboat Adara-Ul-Tahreer Adara-e Saadad Advanced Publishers A. H. Publishers Affaf Publishers Al Raza Publishers Al Quraish Publications Al Mashriq Publishers A. S. Publishers Adabistan Publishers Adan Publications A. N. Publishers Al-Asad Publications Al-Badar Publications Al-Bilal Publishing House Al-Hamd Publications Al-Madina Publications Al-Mezaan Publishers Book Sellers National Competitors: Iqbal Sons Educational Publishers Karachi, Pakistan New Century Education Karachi, Pakistan Baitul Qalam Karachi, Pakistan Electronic Journals of Academic Research and Reviews(EJARR Publishing) Islamabad, Pakistan Library Promotion Bureau Karachi, Pakistan World Trade Publishers Karachi, Pakistan U. S. Publishers (pvt) Ltd. Karachi, Pakistan Children Publications Karachi, Pakistan Jumbo Publishing Karachi, Pakistan 3KBioXML Publishers Pakistan Haripur,Pakistan Strengths of Competitors: Our competitors have the following strengths: Well established brand names. Extensive market experience. Widely available and accepted products. Strong relations with distributors. Huge chains of retail outlets. Weaknesses of Competitors: Our competitors have the following weaknesses: Most of them are obtaining very high profit margins. They provide less incentive for local authors. Re-publishing of material similar to the one already in the market. Low on-line presence. Most of them do not have their own websites. Well established chain throughout Pakistan. Some competitors are also exporting books. Mahwish: SWOT Analysis: Strengths: Well established relations with authors,editors and media personnel Comprehensive website Up-to-date content of book Our mission is in itself a strength Weaknesses: New brand name thus requiring massive promotion Yet to establish credibility with the target customers Initial focus which is only on the Punjab market Opportunities: The emerging trends are opportunities which Knowledge Hub seeks to take advantage of: Time and Technological Advancements: Time and technological advancements play a pivotal role in shaping the trends over the passage of time. As Pakistan is also entering the digital age, traditional distinctions in media become blurred. It can be seen as furthering the book culture. E-books: The biggest contribution of the internet in the book industry would be to digitize books and grant them a wider readership. A number of online websites have sprung up in the last few decades. Quite a lot of these sites are free and others charge a very nominal fee and provide unlimited access to e-books. They can either be downloaded or read on screen. These obviously have become popular because of easy accessibility and the low cost. In Pakistan,a huge majority of people cannot afford the expensive original foreign titles. Hence,these customers can download the electronic versions at much cheapers rates. Some Urdu websites have started to offer online versions of books for foreign readers. This helps in promoting one’s culture as well as to help the expatriate Pakistanis and is a viable opportunity that Knowledge Hub can take advantage of. Online Book Stores: Closely related to e-books are the online book stores, another wonder of the internet and an opportunity for Knowledge Hub. An extension of the traditional book stores, online book stores give the option to search and read reviews of books, browse through categories, view the covers, author information, reader ratings and then order these books online. Although they are not free and even charge a shipping fee, it’s very convenient to search and order books online saving the hassle. Reading Clubs: Reading clubs are a breath of fresh air into the dying book culture. There are a number of book clubs/reading clubs online and offline. People sit and discuss their favorite books or simply talk about what they are reading these days. Readers Club is an exemplary example is of a Readersclub at the University of Karachi, which is moderated by a teacher who is Lecturer at the Department of the International Relations. This is also an opportunity that Knowledge Hub seeks to avail in the future. We plan of starting our own reading club in different cities throughout Pakistan to encourage the reading culture amongst the people of Pakistan. Book Fairs: The first International Book Fair was held in Karachi and Lahore last year at the expo centre and it was well received by the public at large despite the fact that all the books were originals and were highly priced. Knowledge Hub also seeks to participate in such book fairs at both national and international level in the future. Mobile Bookshops: The concept of a Mobile Bookshop was first used by the Welcome Book port some years back. Recently, Oxford started its own mobile book shop and it has been touring the city for quite some time now. Set on a truck, with the back converted into a small book shop with shelves and a counter set snugly at the end, the book shop attracted people outside various schools and universities. Threats: Threat of New Entrants: The threat of new entrant is always present in our industry and Knowledge Hub shall endeavor to keep track of the latest practices and customer trends and preference in order to stay ahead of our game ahead of competition. Plagiarism Another threat is the problem of plagiarism. That is, either simply copying out whole extracts or stealing the idea or characters. Plagiarism is an old problem and a big worry for authors who spend time and money on writing a piece of good writing and then someone else copies it and sells it at a lower cost. Then there are one-time authors who just reproduce material from some international author and make money by claiming it as their own. Incentives for Writers: The government, the NGOs and the intellectuals hardly ever take the initiative to encourage young and budding writers of the country. This has resulted in most of the young authors getting their works published under foreign publishers. Decline in Reading Habits: There has been a visible decline in reading habits in last few decades. This can be attributed to a number of factors like television, internet and other means of entertainment. Product Market Strategy: Segmentation: Our initial target market for the first five years of operations includes: 10623380 school/ college going children in Punjab 3,683,920 college going individuals in Punjab 3034350 individuals going to universities or acquiring diploma in Punjab Literate individuals above the age of 25 in Punjab This overall customer base has been divided into segments on the following bases: Step No. 1- Geographic Segmentation: As of now we are catering to the consumer base in Lahore. Step No. 2 Segmentation on the Basis of Consumer Age and Needs: From within this customer base our market is further divided into the segments on the basis of the ages and needs of the different customers. Books needs of consumer vary with age and needs such as academic, literary, entertainment or information, etc. Hence we have divided our Lahore consumer base into the following segments: Children below the ages of 10 for their academic, literary and entertainment needs. Children between the ages of 10 – 18 who seek to cater to their academic, literary/ information or entertainment needs. Individuals between the ages of 18 – 25 who seek to cater to their academic, literary/ information and entertainment needs and for research purposes. Individuals and professional from the ages of 25 and above for their academic, literary/ information and entertainment needs and for research purposes. Targeting: Knowledge Hub is provider of books to all the mentioned segments. The reason being that the market is already filled with book publishing brands that have had their names recognized and sought after. If we chose to cater to a narrow segment, chances would have been that our brand would not have attained quick popularity in the overall Lahore Market. Hence, Knowledge Hub is catering to all these segments. We shall target the abovementioned segments with the following products: Academic books for primary level Academic books for secondary level Academic books for university level Illustrated books Novels Best Sellers Our focus shall remain on the publishing of quality and up-to-date material. Positioning: Knowledge Hub will position itself as provider of latest academic and research material, the best literary material and best sellers in Urdu and English by quality writers i. e. both local and international. Knowledge Hub endeavors to position itself as a provider of high quality material at affordable prices. Brand Name: ‘Knowledge Hub’ represents the firm as being a provider of various different sources of knowledge, be it academic or in the form of beautiful pieces of writing to enrich our minds and groom our personalities. Marketing Mix: Product: Our products include: Academic Books for Primary Level: These further include English and Urdu language, mathematics, science, general knowledge, geography, national and international history, Islamiat,social studies and arts and crafts. Academic Books for Secondary Level: These further include English and Urdu language, advanced mathematics, biology, chemistry, physics, geography, national and international history, Islamiat, social studies, sociology, business studies and arts and crafts. Academic Books for University Level: These further include books for business studies, information technology, social sciences, media studies, engineering, commerce, law, pharmacy and medicine. Illustrated Books: These books include books on history, local and international cultures, wildlife, politics, etc. Novels: These include prices of writing by local, national and international writers. Our focus always remains to ensure that only quality material which does in fact impart some type of knowledge or provides quality entertainment and grooming to the readers. Best Sellers: This category includes the best selling stories and novels of today’s age and over the decades. E-Books: All of our publications shall be available online in the form of e-books. Price: High Value but Varying Purchasing Power of Consumers: Books are of tremendous value to readers. Readers of the same types of book belong to drastically varying income levels. Competitors’ Pricing: The prices that prevail in the market are not rigid. It an original book is priced high; its copy is prices at very low prices. Our competitors vary in terms of their size, market shares and prices. Consequently their prices also vary. Some competitors are charging premium pricing with tremendous profit margins due to attractive designing, book cover and page and printing quality. Penetration Pricing Strategy: Since the purpose of the creation of Knowledge Hub is to ensure availability of knowledge to all Pakistanis who seek for it, we use penetration pricing strategy. Knowledge Hub believes that knowledge is not a product to be sold but a service to be provided to our nation so that we may progress in this fast paced world. Knowledge Hub has priced its products so that they are easily purchased by the masses. Knowledge Hub will use penetration strategy to penetrate in the market which is already filled with numerous providers. Knowledge Hub has made a point to publish original books at affordable prices and only attain profits sufficient to achieve our vision of making knowledge accessible to all. The attainment of our vision requires periodic expansions first with in Punjab then throughout the country. Since, Knowledge Hub is a sole proprietorship; the profits shall be retained and reinvested in the expansion of the business. Knowledge Hub has priced its products a bit cheaper and more affordable as opposed to its competitors while maintaining high quality in terms of designing, book covers, page material and printing. We strive to position ourselves as the provider of high-quality material at reasonable prices. The prices of our products shall fall in the following ranges: Sr. No. Product Line Price Range (Rs). 1 Academic Books for Primary Level 200   500 2 Academic Books for Secondary Level 250 –800 3 Academic Books for University Level 300 –1200 4 Illustrated Books Up till 1500 5 Novels 200 –1500 6 Best Sellers 300 1800 7 Primary Level Academic E- Books 150 400 8 Secondary Level E- Books 150- 650 9 University Level E- Books 200 –850 10 Illustrated E- Books Up till 850 11 E- Novels 150 900 12 Best Seller E- Books 200 –1000 Price Sensitivity of Customers: In the Lahore market, the customers are highly price sensitive. The customers shall most willingly opt for a provider of quality books at low prices. Distribution Strategy: Our office shall be located near Urdu bazaar, Lahore. Our products shall move from us to our distributor who will supply our books to retailers and from these retailers our books shall reach our consumers. Our distribution network is as follows: Distributors: Since book stores no longer order directly from most publishers and prefer fewer vendors and quicker service. We shall enter into a contract with our distributor and allow us to reach the book trade (independent bookstores, chain bookstores, wholesalers and libraries) is with a distributor. Our Distributor will have sales reps who visit book stores and libraries, show your book catalogs and take orders. We shall use the following touch points to provide our products to the target market: Book Stores: Our products shall be made available in book stores throughout Lahore. Initially our books shall be available at the following book stores: Defence Book Store Readings Classic Book Store Ferozsons Kitabistan Liberty Books Readings The Last Word Variety Books Books Bank and Gift Shop Ravi Book Store Mavra Books. Libraries: We shall also have our books placed in the following libraries throughout Lahore: Quaid-e-Azam Library Environment Data Resource Centre (EDRC) Defence Public Library Complex Punjab Public Library Atomic Energy Minerals Centre Library Islamia College Library, Islamia College Government College Library, Government College University Lahore University of Management Sciences Library, Lahore University of Management Sciences National Library of Engineering Sciences Dyal Singh Trust Library Provincial Assembly of the Punjab Library, Lahore Peoples Bank Library, Lahore Pakistan Administrative Staff College Library, Lahore The Ewing Memorial Library Babar Ali Library Atchison College, Lahore Punjab University Library, Lahore Dr Baqirs Library, Lahore Gift Stores: Gift stores will also be a touch point of Knowledge Hub. It is often noticed that people gift good illustrated books, novels and best sellers as gifts on various occasions. Hence placing our products in gift stores shall cause an increase in the number of sales and the popularity of our brand name. Places like Illusions will serve as an ideal place for placing our products. Gift Baskets: We shall also enter into mutual agreements with gift shop owners to form ‘gift baskets’ which will include different items to be placed in the form of a gift basket and including one of our books. An example of this can be a pen/ a diary or note pad along with a small teddy bear and a novel or best seller placed in a beautiful gift basket and covered with a net and tassels. Fiction and Poetry Books: Fiction and poetry can be sold better in gift stores as opposed to book stores. Website: Knowledge Hub shall maintain a comprehensive website containing electronic versions of all its books. We will use this website to display our catalogs of books and to sell those books in both paper editions and in electronic versions on-line. Customers would be able to be directed to bookstores for the paper version and they may send an order directly to us. They would also be able to unlock and access an on-line edition instantly by making a online payment. Our website viewers would also be able to opt to receive periodic catalogs of our products online via e-mail. Retail Outlet: By 2014, we plan to open our own retail outlet in H Block Defence with the name of Knowledge Hub. Our outlet shall contain all of our publications. Tahira: Promotion Strategy: Knowledge Hub will use the following promotional techniques to promote its products: Newspaper and Magazine Advertisement: Knowledge Hub shall have the following print advertisement placed in the newspapers and magazines including Sunday Times, Zarnigar, Weekly Pulse,Pakistan Textile Journal Magazine ,Herald ,Defence Journal Magazine (DJ),etc. Book Promotion: Knowledge Hub will use tools like book reviews, news releases and a limited amount of highly targeted direct mail advertising. Book reviews and news releases result in free (editorial) publicity while direct mail (Postal and email) delivers your sales message directly to potential customers. Book Reviews: Book reviews are editorial copy that is far less expensive and much more credible than space advertising. The huge number of magazines, newsletters and newspapers columns that are in the market will receive review packages. These reviews will be published for the trade wholesalers and bookstores and libraries. These reviews tell the trade what is coming so they can order the books before the public reads the post-publication reviews in the popular magazines and newspapers. News Releases: We shall follow the review copies with news releases and articles every month to the very same magazines, newsletters and newspapers. These news releases allow opinion-molding editors know what you are doing and why your book has the information their readers need. Direct Mail Advertising: Direct mail advertising of our catalog and books will provide us with the opportunity to get our complete sales message to a specific potential buyer. Our mailing list for direct mails shall remain selective and include only our main buyers. Broadcast E-mail to Main Buyers: This method will is even better than direct postal mail and eliminates printing, stuffing and postage while getting a quick response. Knowledge Hub will assemble email addresses from customers and potential customers and alert them pertaining to our books. Radio TV Interviews: Radio/TV interviews are an easy way to have the masses asking and searching for an upcoming book. Knowledge Hub shall arrange radio and television interviews of authors hose books are about to be published with us. If the book gains popularity so do we. Radio and television talk shows need interesting guests to attract listeners and viewers. Most people feel that authors are experts and celebrities, so most of the guests booked on such shows are authors. While advertising products on the air is expensive interviews are an editorial matter. People listen to editorial matter. Interviews are more effective than advertising and they are free. Hence, they will serve as an inexpensive way to sell our books. Autograph Parties: Knowledge Hub will arrange autograph parties or book signings in our client bookstores, both chain and independent to draw potential customers into their stores. Best Sellers: Knowledge Hub will endeavor so that its books are labeled as bestsellers. This would drastically improve our brand image. Book fairs: Knowledge Hub will organize book fairs are where publishers traditionally show their books but there are several different kinds. There fairs will be for bookstore buyers, libraries, the general public and so on. Initially these book fairs will be local but they will be replaced with book fairs in other cities as our business expands. Specific Category Promoting: From time to time Knowledge Hub shall also indulge in specific category book promotion. Where we shall promote our different products like children’s books, illustrated books, etc in schools, universities, etc. Audible Books: Some of our potential customers may commute or travel a lot and hence will not have time to read our book. This constraint can be overcome by forming audible books. E-Books: One of the very rapidly emerging trends in the book publishing industry is that –f electronic books. Knowledge Hub shall take complete advantage of this means of reaching to the targeted audience. Public Relations: Knowledge Hub will endeavor to maintain good relations with the distributor, retailing chains,gift stores, editors who write book reviews and leading authors. Sales Promotions: Knowledge Hub will provide sales promotions to retailers and libraries such as books at discount prices when purchased in huge bulks to motivate them to purchase our products and help the company penetrate into the target market. Implementation Strategy: Our primary function as book publishers is to procure books and make them available for sale. Procurement of books will involve soliciting and accepting marketable manuscripts, contracting with the author for selling rights, and getting them copies printed and distributed. The selling of our books will involve making contacts with industry retailers and distributors, and selling directly through your own website. We shall make a percentage of each sale and pay the balance to the author. Operational Plan: For works written independently of the publisher, writers shall first submit a query letter or proposal directly to a literary agent or to a publisher. Submissions sent directly to a publisher are referred to as unsolicited submissions, and the majority come from previously unpublished authors. We shall accept these unsolicited manuscripts, and place it in the slush pile, which our readers will sift through to identify manuscripts of sufficient quality or revenue potential to be referred.