Wednesday, July 31, 2019

How Work Affects Family Life Essay

Today, the term â€Å"family† is difficult to define. All families are unique, and they can range anywhere from single parent families to extended families. Most importantly though, it is in the family where the next generation is being built. Parents must provide security and support for their children, and they need to be prepared for the challenges of balancing work and family in today’s society. In traditional families, there was a mother, a father and their resulting children. The father would most often be the earner of the family, and the mother would stay at home and take care of the children. Things have changed considerably in the twenty-first century. Now there are more dual-income families, single-parent families, and there are many more women in the labour force. This poses a great change to family life, and many parents are working a â€Å"double day†. They have their regular full time jobs where they earn an income, and then they have to come home to more work such as cooking, cleaning and grocery shopping. Like all systems and interactions, conflict arises between work and family issues. This issue causes conflict for every member of the family, and they need to discover ways to resolve this conflict. According to the feminist theory, â€Å"gender is basic to all social structures and organizations†. (Eshleman & Wilson, 2001:23). Obviously, it is also basic to the conflicts of work and family life. Today, both men and women must go to work to support their families, but it is usually the woman who has to come home and do the cooking, cleaning and grocery shopping, while her husband plays with the kids or watches television in the living room. This is definitely a concern that needs to be addressed, and although there have been some improvements in this area, much more can still be done. More improvements have also been made by employers, unions and the government to benefit families who have full time jobs. Although, they have made steps towards improving this dilemma, there are still many issues that need to be dealt with. The social conflict theory states that â€Å"conflict is natural and inevitable in all human interaction† (Eshleman & Wilson, 2001:15). It is not seen as a negative theory, it just calls for people to be aware that conflict will arise, and that they need to come up with solutions to these struggles. This is no different in the family. Today’s families have to deal with tension on the macro level and the micro level. Work and employment affect both the  macro and micro elements of the family. More and more varieties of families are coming about, such as dual-income families, single-parent families, and families who take care of their children as well as their parents. These people face tribulations everyday of their lives while trying to juggle work and their family. Mostly in dual-income families, and single-parent families, people are performing a â€Å"double day†. According to Eshleman and Wilson (2001), the double day, or second shift, refers to the combina tion of paid and unpaid work most people do. The family member earning the income â€Å"often feels stress and encounters difficulties trying to meet their responsibilities as family members and as employees† (Coates, 1991:1). This affects their performance at work and at home. They are caught in the middle between having to work to support the family, and wanting to create a good environment for their family to grow in. Society tells these parents that â€Å"they are bad [parents] if they don’t go to the school play and bad employees if they do go and take time off from work† (Denholtz, 2000:91). The children or elderly people in the head of the household’s care also suffer from the work/family conflict. Children are often raised by other people other than their own parents, such as nannies, teachers, other relatives or day care workers. Many children must learn to grow up a lot quicker than they would normally have to if their parents were always around which could be good in some cases, but not so good in others. Every member of the family must have a role, and know that role. Partners must discuss who will do the dishes that night, and who will take the children to baseball practice. Children must also help out with household chores, and take some responsibility for themselves. If all members of the family can come to a specific agreement, and implement a good plan to satisfy everyone, work and family can be managed. All that is needed are the right attitudes and resources. Several couples in Crysdale’s study of working class people in downtown Toronto said that they manage trouble at work by leaving it at the door when they come home (1991:103). There was not always an issue between family life and work. Typically, the only women who would work were young, single females with no other obligations. Married women would stay home with their children, do all the  housework and make sure supper was on the table for their husbands when they came home from work. The predicament between work and family arose when women began participating more in the labour force during and after World War I. Their involvement in the labour force has steadily increased since the beginning of the twentieth century, while men’s participation has decreased. According to Eshleman and Wilson (2001), 16.2 percent of women over the age of fifteen were employed in 1911, and approximately 60 percent of women are employed today. So in under a century the number of women working has almost quadrupled. There are many different reasons explaining why more and more women are joining the work force. It basically first started during World War II, because there was a great need for workers in factories, stores, etc., and the men were off fighting in the war. Therefore, the women had to join the labour force, and after the war, when they could leave their jobs, many women chose to stay instead of becoming a housewife once again. In the 1960’s, there was a women’s liberation movement, and this time period was the most significant change in women’s roles. Wives and mothers wanted to be free from the constraints placed on them in the home, so many of them decided to go to work. Prior to this, mainly single women were working for pay, but since then the gap between single and married women has decreased. Also, there has been an increase in the number of blended families, common-law relationships, and single-parent families which forces most members of these families to find paid work in order to financially support their family. Most single parents must go to work to provide for the family because they have no help from the mother or father of their children. Altogether, many different circumstances have led to the increa sed problems between work and family life. As we can see, as women gained a more significant role in the labour force, and as different types of families arose such as single-parent families, the conflicts also increased. When Eshleman and Wilson are explaining the feminist theory they ask the question, â€Å"What about women?† Their answers to this question are: Based on the ideas that the experiences of women are different from those of men, are unequal (less privileged) to those of men, and are actively  oppressed (restrained, subordinated, used and abused) by men. (p. 23) This definition works perfectly into the dilemma between men and women’s roles in the family and in the work force. We must always consider women and gender when making assumptions about the family and work because they are inseparable issues. Even with the intense changes that have taken place in the family structure and the workforce, there is still the general idea that a woman’s first and foremost responsibility is in the home, even when she is engaged in work outside of the home. Women workers experience much more stress and difficulty in balancing work and home than men do, because they â€Å"tend to bear a disproportionate share of household tasks and family responsibilities† (Coates, 1991:8). Coates (1991) listed some important statistics from a survey by the Conference of Canada in his article. He concluded that women reported spending an average of 16.5 hours per week on ‘home maintenance’ compared to 9.8 hours by men. Three-quarters of the women reported that they had the majority of responsibility for making child arrangements compared to 4.1 percent of men, and women were almost four times as likely to stay home with their children when they were sick. Basically, the work and family issue has been viewed only as a woman issue, which creates problems between husband-wife families. This is a micro example of the social conflict theory. Work creates conflict within the family between the husband and the wife, in deciding who will perform what tasks within the family. More recently, men have been accepting larger responsibilities within the family â€Å"either through choice, or necessity in their role as a single parent in the paid workforce†. The gaps between men and women’s responsibilities in the home are decreasing, but there is much more to be done about this matter. Child care is the largest concern parents have when it comes to their family and their work. There are many options available for parents when it comes to childcare, such as daycare, nannies, relatives, babysitters, and schools, although it is not that easy. Some families cannot afford daycare or nannies; some do not have families they can rely on for childcare and some parents’ work schedules do not accommodate babysitter’s hours. The age of  the child is another factor that has to be considered when planning on childcare. If the child is an infant, one of the parents usually has to be with them all day, and not all employers offer maternity or paternity leave. When the child is a toddler, they have not yet reached the age that would allow them to be in school from nine o’clock until three o’clock, so they still need someone in their care for the entire day. When the child reaches the school years, there are still a few hours before and after school that needs to be taken into account. After the child has reached an age in which he/she is able to take care of themselves, transportation between school, home and extracurricular activities comes into account. All of these factors contribute to the hardships parents face when trying to balance work and family life. Aside from the family, corporations and employers need to address the problems of stress placed on their employees while trying to manage between work and home. This incorporates the macro level of the social conflict theory. Fernandez states that: There is a high correlation not only between missed work and caring for a sick child, but also caring for a sick child and leaving work early, coming in late, dealing with family issues during working hours, and on-and-off-the-job-stress. As the families continue to grow and change, the companies need to implement a vast range of improvements in order to reduce the great demands of parenting and work. This will not only help the parents out with their family, but it will create a less stressful environment for all of the employees, and therefore, it will improve the company. Many companies have already taken certain steps in doing this, but there is still much more that can be done. One suggestion is job-sharing, which is â€Å"a form of part-time working wherein two people choose to share the salary, benefits and responsibilities of one full-time job† (McRae, 1989:16). This benefits parents who want to maintain paid work and also want to be at home with their children. Homeworking is another example, and it is when a person takes on paid work from the home. This has become increasingly easier to  manage with new technologies such as the Internet. Shift work would also help to balance out the time between work and the family. The shifts could correspond with the hours that the children are in bed, or are at school, which allows the worker to spend more time with their family. More steps need to be taken in this area, such as on-site day care, paid leave to attend to a sick child or family issue, and included day-care costs. We have reached a point in society when it is time to come to a compromise between work and family life, and flexibility needs to be offered whenever it is needed. In all, families have changed a great deal in the last century, and we need to keep up with these changes and offer new suggestions towards improving family life. Work places a great demand on all families, including dual-income families, single-parent families, blended families, and extended families. Parents are struggling everyday with the conflict between work and family life. It works in a viscous circle, because families need money to support their families, but at the same time they need a lot of extra time to spend with their families. The burden is placed more on women than it is on men, because taking care of the household is still seen as the â€Å"woman’s job†, even if she is engaged in paid work. Men need to start doing their equal share around the house to make it easier on the demands of the woman. More steps need to be taken in child care facilities, because that is the main problem working parents face today. Companies must implement new plans in order to meet the needs of their workers. Altogether, it has been an ongoing battle for parents who are trying to balance between work and family life, and as the family continues to grow and change so must the laws behind flexible work hours, day care, and permissible absence for family issues.

Apartment – title

CHAPTER 1 INTRODUCTION Rationale Every individual has the desire to live in a peaceful manner and in a secured way. Apartment is one of the most profitable establishments here in Cebu City for the number of people came from provinces keeps on increasing. Living in an uncertain world, apartment’s owners want to maintain safety measures in their firms and occupants might as well want to be secured. Encroachment is an issue nowadays. It is an act of illegal entry without any permission from the owners/occupants to a specified area.Furthermore, it often resulted to theft, burglary and intrusion. To get rid of this issue, the group proposes this system which is to maintain the security of the apartments via biometrics. With this system, encroachment issue will be avoided for without the presence of the occupants, no one can enter the apartment. Theoretical Background According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode.It is very important to make our place secured in many aspects to prevent from encroachment issues. According to statistics, more than 30% of the burglars have gained access into apartments, through an open door or window. (http://www. buzzle. com/articles/security-alarm-systems-for-apartments. html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that there are problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered being encroachment. Lao, Excio Erving Jr. A. et. al. 2003) explained that by using home automation system, one can make several or all of the systems and devices in home work automatically to provide more security, safety, and convenience. It inspires the group to make this Apartment Security System via Biometrics that will enhance the existing one in securing the Apartments. In Apartment Security System via Biometrics, all roo ms should be networked to the server. According to Clark et. al. (1985), a network is a collection of processors and terminals that serves more than one user at a time by communication.Biometrics Theory Biometric identification technologies (the automatic recognition of individuals based on physical and/or behavioral characteristics) date back over 50 years to the earliest digital computers. Over the last two decades, biometric identification devices have become faster, cheaper, and more reliable, allowing for a variety of applications. This course looks at the history, theory, algorithms, applications, and standards of biometric recognition, including voice, iris, face, hand, and fingerprint identification.Test protocols, system design, and error rate prediction are discussed, along with the implications of the technology for personal privacy. 1. Abstract One of the most critical issues to solve when building multi-accessible systems, such as computer applications, cars or physical buildings, is to determine the identity of a person. A system protecting confidential information, or items of value, puts strong security demands on the identification. Biometry provides us with a user-friendly method for this identification and is becoming a competitor for current identification mechanisms, especially for electronic transactions.However, there are ways to compromise a system based on biometric verification. This article focuses on the drawbacks and risks of biometric verification, specifically verification based on fingerprints. It shows how all currently available fingerprint scanners can be fooled by dummies that are created with very limited means and skills. This article should be read as a warning to those thinking of using new methods of identification without first examining the technical opportunities for compromising the identification mechanism and the associated legal consequences.This is especially true for people working with smart cards since it is quite common to store fingerprints on smart cards and due to the developments in solid state fingerprint scanners, integration of a fingerprint scanner on a smart card is possible. 2. Information Identification systems based on biometrics are capable of identifying persons on the basis either physical or behavioural characteristics. Currently, there are over ten different techniques available to identify a person based on biometrics.The following techniques are applied within the main categories physical and behavioural characteristics: |Behavioral characteristics                      |Physical characteristics | |keystrokes dynamics |iris recognition | |voice recognition |retina recognition | |signature dynamics |vein pattern recognition | | |face recognition | | |recognition of hand or finger geometry | | |fingerprint recognition | Before a system is able to verify the specific biometrics of a person, it of course requires something to compare it with. Therefore, a p rofile or template containing the biometrical properties is stored in the system. Recording the characteristics of a person is called enrolment. In order to get a profile that corresponds most with reality, the biometrical. characteristics are scanned several times. In case of fingerprint recognition the finger is scanned three to four times to get a profile that is independent of variations that occur in practice, such as the angle of placement of the finger on the scanner.Since storage capacity for the profiles in these systems is usually limited (for example if used in combination with smart cards), it is common to use data compression before storing the profile. Storing profiles in tokens requires a combination of token and biometry for verification and therefore gives a higher level of security. When a biometrical verification is to occur, a scan of the biometrics of a person is made and compared with the characteristics that are stored in the profile. In general, a certain mar gin of error is allowed between the observed and stored characteristics. If this margin is too small, the system will reject a righteous person more often while if this margin is too large, malicious persons will be accepted by the system.The probabilities that a righteous person will be rejected and that a malicious person will be accepted, are called False Reject Rate (FRR) and False Accept Rate (FAR) respectively. When using a biometric system, one would of course want to minimise both rates, but unfortunately these are not independent. An optimum trade-off between FRR and FAR has to be found with respect to the application. 3. Biometric Identification In this chapter the techniques for fingerprint identification will be explored. After explaining the theory of fingerprint verification, all current scanning technologies are described in more detail. Once it is known how these scanners identify a person by means of a fingerprint, two methods to counterfeit fingerprints are shown.A ll additional methods implemented by scanner manufacturers to prevent counterfeits from being successful are also described together with proposed methods how these systems could also be fooled into accepting dummy fingerprints. The consequences for systems using fingerprint verification are discussed at the end of the chapter. First, an example for fingerprint verification from practice will be given. This example also illustrates how difficult it can be to find an optimum trade-off between FAR and FRR. From a security point of view, one would want to have the FAR as small as possible. However, for acceptance of a biometry system, a large FRR is worse. Case: Within the car industry a biometric verification system is under evaluation.Manufacturers of expensive cars are considering using fingerprint recognition as a requirement for ignition of the engine. To arm against car theft, the FAR should be as small as possible. On the other hand, suppose that the righteous owner of a car can not use his car because his fingerprint is rejected (i. e. FRR is too high). He will consider this to be a much more serious flaw in the system than a technical failure which prevents the car from being started. This is especially true if he compares the advantages of this system with this rejection: the advantages are that the driver does not (necessarily) have to have a key to his car and a perception of higher security with respect to theft of his car. Whether indeed the security improves is questionable.Right now, we do not see car thieves trying to copy the key of your car, instead they try to by-pass the ignition mechanism where the car key is involved. Furthermore, as this article will show, it might decrease security since it is fairly easy and cheap to copy a fingerprint from a person, even without the person knowing this. 3. 1 Theory of Fingerprint Verification The skin on the inside of a finger is covered with a pattern of ridges and valleys. Already centuries ago it was studied whether these patterns were different for every individual, and indeed every person is believed to have unique fingerprints. This makes fingerprints suitable for verification of the identity of their owner.Although some fingerprint recognition systems do the comparison on the basis of actual recognition of the pattern, most systems use only specific characteristics in the pattern of ridges. These characteristics are a consequence from the fact that the papillary ridges in the fingerprint pattern are not continuous lines but lines that end, split into forks (called bifurcation), or form an island. These special points are called minutiae and, although in general a fingerprint contains about a hundred minutiae, the fingerprint area that is scanned by a sensor usually contains about 30 to 40 minutiae. For over hundred years law enforcement agencies all over the world use minutiae to accurately identify persons .For a positive identification that stands in European courts at lea st 12 minutiae have to be identified in the fingerprint. The choice of 12 minutiae is often referred to as â€Å"the 12 point rule†. This 12 point rule is not based on statistical calculations but is empirically defined based on the assumption that, even when a population of tens of millions of persons are considered, no two persons will have 12 coinciding minutiae in their fingerprints. Most commercially available fingerprint scanners give a positive match when 8 minutiae are found. Manufacturers claim a FAR of one in a million based on these 8 minutiae, which seems reasonable. 3. 2 Fingerprint Scanning Technologies Technologies for scanning fingerprints have evolved over the past years.The traditional method which is used by law enforcement agencies for over a hundred years now is making a copy of the print that is found at a crime scene or any other location and manually examining it to find minutiae. These minutiae are compared with prints from a database or specific ink prints, which could be taken at a later time. This method is of course based on the fact that the person who left the fingerprints is not co-operating by placing his finger on a fingerprint scanner. For systems that are commercially available (and deployed) people are required to co-operate in order to gain access to whatever is protected by the verification system. The first generation fingerprint scanners appeared on the market in the mid eighties, so the technology is about fifteen years old.Over the past few years the technology for scanning fingerprints for commercial purposes has evolved a lot. While the first generation sensors used optical techniques to scan the finger, current generation sensors are based on a variety of techniques. The following techniques are deployed in commercial products that are currently available: †¢ Optical sensors with CCD or CMOS cameras †¢ Ultrasonic sensors †¢ Solid state electric field sensors †¢ Solid state capacitive sens ors †¢ Solid state temperature sensors The techniques will be described in greater detail in this section. The solid state sensors are so small that they can be built into virtually any machine.Currently a sensor is in development that will be built in a plastic card the size of a credit card, not only with respect to length and width but also with respect to thickness! It is clear that this type of sensor will give a boost to the number of applications using fingerprint technology. (http://cryptome. org/fake-prints. htm) THE PROBLEM Statement of the Problem Encroachment has been an issue in our industry. It could not be resolved unless there are security systems. This study aims to secure every room in any apartment eliminating strangers to get into one’s room without the presence of any occupant. This study is further concerned with the following issues: 1.What are the existing systems used to maintain security of the apartments? 2. What are the problems encountered by the occupants of the apartments? 3. What are the advantages of this Apartment Security System among the existing systems? 4. What are the technological features in this Apartment Security System? Statistics The number of residential burglaries recorded increased 0. 7% from 27,347 in 2009/2010 to 27,531 in 2010/2011. Burglary (residential) had a clearance rate of 12. 4% during 2010/2011, 1. 6 percentage points lower than that of 2009/2010. Reported Residential Burglary in the Philippines as of 2007 [pic]Figure 1. 1 Burglary (residential) Graph Significance of the StudyTrespassing has been a concern in our society, to put an end this issue, this Apartment Security System must be realized. Apartment is the most profitable business establishment businessmen could ever have. Hence, such establishments must be secured all the time. Security systems are not just luxury in an Apartment, it is a necessity to maintain security and to be able to prevent from encroachment issues such as burgla ry, intrusion, theft, etc. If there is security system in the apartment, then both owners and boarders will benefit the system. The boarders will feel comfortable living in the apartment with such system, and will not encounter encroachment issues, hence the boarders will live peacefully and live longer in that certain apartment.A boarder who stays in the apartment long enough is an indication that he trusted the system that runs in the apartment. So, it is an advantage on the owner’s side because, aside from the fact that no intruder can get access to his establishment, it is a big income if the boarders stayed longer in his apartment. Scope and Limitation The project focuses more on the security systems. The project identified the occupants of the apartment by means of fingerprint identification through biometrics. This project already exists, the only difference is that the group applied the system in every room which makes the system expensive enough for it requires every apartment a single biometrics. The group pilots only two rooms for demonstration purposes.The system is capable of identifying occupants to the extent that it alarms whenever an intruder reached the maximum tries of fingerprint identifying. The project could not cater occupants who are disabled (do not have fingers). RESEARCH METHODOLOGY Methodology is generally a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. The group uses applied research and makes use of various techniques and tools in conducting this research. Research Environment The group will conduct the survey in the apartment where there are tenants and an owner. The purpose of our survey is to determine what are their concerned about the security of their apartment. Number of apartments and dormitories surveyed: 21Number of owners interviewed: 3 Number of workers interviewed: 18 Number of boarders interviewed: 100 Example of apartment’s and dormitori es surveyed: Kim Kathleen’s House for ladies – Brgy. Cabancalan, Mandaue City Engr. Bing Momo Europa Apartelle and Dormitory- Brgy. Cabancalan, Mandaue City â€Å"Patoy† Saint Joseph Dormitory – Lopez Jaena St. , Mandaue City â€Å"Ma’am Earl Joy† Pink Dormitory- Brgy. Pitogo Consolacion â€Å"Dioscor Jamisola† Research Respondents The people to be conducted by the group are the apartment tenants and the owner for they are the stakeholder of the system. The group will use the simple random sampling technique in getting the number of respondents.Research Instruments The data gathering is employed through the use of the questionnaire and supplemented with some data analysis of published, unpublished thesis and some article Research Procedure Gathering Data The team gathered the data through the formulated questionnaire which was distributed in the apartments, hotel, boarding house and school to identify the views of the respondents. Tre atment of Data Based on the questionnaire, the team construct, analyze, and interpret. The team will use the following formula. n = N 1 + N e Where: n = sample size N = population size e = desire margin of error DEFINITION OF TERMS Project Design A project that is being put into reality by a group of designer. Designers – A group of individuals that is tasked to develop the project design. Hardware – The physical components of a computer system, including any peripheral equipment such as printers, modem and mouse. Software – Computer programs are referred to as software. Feature – Is a unique, attractive, or desirable property of a program or of a computer or other hardware. Microcontroller – A highly integrated chip contains all the components comprising a controller. Server – A computer system that consist of database and other information of it a device that manages network resource. Circuit A combination of electrical or electronics comp onents, interconnected to perform one or more specific functions. Breadboard – A fiberboard used by electronic circuit designers to build experimental circuits and prototypes. Relay – Is an electrical switch that opens and closes under the control of another electrical circuit. Transistor – Is a semiconductor device, commonly used to amplify or switch electronic signals. Serial Communication – Is the process of sending data one bit at one time, sequentially, over a communication channel or computer bus. This is in contrast to parallel communication, where all the bits of each symbols are sent together. Flowchart A diagram representing the logical sequence in which a combination of steps or operation is to be perform. Program Flowchart – Describes graphically in detail the logical operation and steps with in a program and the sequence in which these steps are to be executed to the transformation of data to produce the needed output. System Flowchart – Graphic representation of the procedure involved in converting data or media to data in output form. CHAPTER 2 PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA This chapter focuses more on the data gathered in order for the proponents to further understand the importance of the project. The gathered data is being analyzed so that the group will be aware of the standards or the expectations of the mass.It is then interpreted by making graphs such as pie graph and bar graph to easily visualize the results of the conducted survey. The Figure 2. 1 shows that most of the group’s research respondents are the Occupant of the Apartment with fifty – eight percent (58%). The group conducted this research in the apartment’s occupant because they are the ones who will be benefiting the project aside from the Apartment owners. Their opinions and suggestions are very significant in making our project a successful one. The Figure 2. 2 shows that sixty four percent ( 64%) of the respondents has security systems in their respective apartments. But there are thirty six percent (36%) of the respondents who are living in an apartment with no security. CHAPTER 3Technical Aspects of the Systems This chapter contains the summary of the software and components used in the project in order for the readers to examine how the project was made. System Flowchart is the interpretation of how the project runs from start to end. The Program Flowchart is the interpretation of how the user interfaces with the users. The Block Diagram is how the project composed of. And the Source Code it is the program used of how the project runs with. [pic] Figure 3. 1 – System Flowchart [pic] Figure 3. 2 – System Flowchart [pic] Figure 3. 3 – Program Flowchart [pic] Figure 3. 4 – Program Flowchart [pic] Figure 3. 5 – Program Flowchart [pic] Figure 3. – Program Flowchart [pic] Figure 3. 7 – Program Flowchart System Block Diagram †¢ For Fingerprint Scanner [pic] Figure 3. 8 – System Block Diagram For Fingerprint Scanner †¢ For the whole system [pic] Figure 3. 9 – System Block Diagram For the whole System Schematic Diagram The schematic diagram is the design which shows how the desired components are being connected to each other. Figure shows the schematic diagram of our design. [pic] Figure 3. 10 – Schematic Diagram Design Components Software Design Proteus 7 ISIS Professional The Proteus Professional demonstration is intended for prospective customers who wish to evaluate our professional level products.It differs from Proteus Lite in that it does not allow you to save, print or design your own microcontroller based designs (you can however write your own software programs to run on the existing sample design suite for evaluation), but does include all features offered by the professional system including netlist based PCB design with auto-placement, auto-routing and graph b ased simulation .[pic] Figure 3. 11 – Proteus 7 ISIS Professional MikroC The group decided to use MicroC Compiler because it is a C complier for PIC. It is designed to provide the customer with the easiest possible solution for developing applications for embedded system without compromising performance or control. MikroC allows quickly develop and deploy complex applications. [pic] Figure 3. 12 – MikroC VB6. 0 [pic] Figure 3. 3 – VB6. 0 Visual Basic (VB) is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model first released in 1991. Visual Basic is designed to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Script ing languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently.A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Though the program has received criticism for its perceived faults, from version 3 Visual Basic was a runaway commercial success,and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsoft's extended support ended in March 2008 and the designated successor was Visual Basic . NET (now known simply as Visual Basic). Hardware Components PIC 16F877A Microcontroller [pic] Figure 3. 14 – PIC 16F877AA PIC (Peripheral Interface Controller) microcontroller is an IC manufactured by Microchip. These ICs are complete computers in a single package. The only external components necessary are whate ver is required by the I/O devices that are connected to the PIC. A microcontroller is a small computer and it can only perform simple task. Microcontroller consists of: †¢ Processor that executes the program †¢ Program memory to store the program that has been compiled successfully by the programmer. †¢ Ram (random-access memory) to store â€Å"variables. † †¢ IO Port to connect sensor, keypad, LED and so on. Crystal Oscillator [pic] Figure 3. 15 – Crystal OscillatorA  crystal oscillator  is an  electronic oscillator  circuit that uses the mechanical  resonance  of a vibrating  crystal  of  piezoelectric material  to create an electrical signal with a very precise  frequency. This frequency is commonly used to keep track of time (as in  quartz wristwatches), to provide a stable  clock signal  for digital  integrated circuits, and to stabilize frequencies for  radio transmitters  and  receivers. The most common ty pe of piezoelectric resonator used is the quartz crystal, so oscillator circuits designed around them became known as â€Å"crystal oscillators. † Relay [pic] Figure 3. 16 – Relay A  relay  is an  electrically  operated  switch. Many relays use an  electromagnet  to operate a switching mechanism mechanically, but other operating principles are also used.Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in telephone exchanges and early computers to perform logical operations. Resistor [pic] Figure 3. 17 – Resistor Typical 10K ohm, 1/4 watt resistor that can be used with various circuits. The color band on the r esistor is Brown, Black, Orange, Gold. Diode [pic] Figure 3. 18 – DiodeDiodes allow electricity to flow in only one direction. The arrow of the circuit symbol shows the direction in which the current can flow. Diodes are the electrical version of a valve and early diodes were actually called valves. Regulator [pic] Figure 3. 19 – Regulator Encapsulated in a single chip/package (IC), the  7805  is a positive voltage DC  regulator  that has only 3 terminals. They are: Input voltage, Ground, Output Voltage. Transistor [pic] Figure 3. 20 – Transistor Transistor is a â€Å"CURRENT† operated device which has a very large amount of current (Ic) which flows without restraint through the device between the  collector  and emitter terminals.But this is only possible if a small amount of biasing current (Ib) is  present  in the base terminal of the transistor making the base to act as a current control input. LED (Light Emitting Diode) [pic] Figure 3 . 21 – LED A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical electronic component in 1962,[2] early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness. DCU 11 [pic] Figure 3. 22 – DCU 11 The cable incorporates a charger port to charge the phone while the cable is in use, and your phone’s built-in modem brings the Web and email to your PC.The widely accepted USB standard and high-speed data transfer make this cable the ideal link from your phone to your PC. †¢ USB connector Fingerprint Scanner [pic] Figure 3. 23 – Fingerprint Scanner Fingerprint recognition  or  fingerprint authentication  refers to the  automated  method of verifying a match between two human  fingerprints. Fingerprints are one of many forms o f  biometrics  used to  identify  individuals and  verify  their  identity. This article touches on two major classes of  algorithms  (minutia and pattern) and four  sensor  designs (optical, ultrasonic, passive capacitance, and active capacitance). Power Supply [pic] Figure 3. 24 – Power Supply A  power supply  is a device that supplies  electrical  energy  to one or more  electric loads.The term is most commonly applied to devices that convert one form of electrical energy to another, though it may also refer to devices that convert another form of energy (e. g. , mechanical, chemical, solar) to electrical energy. A  regulated power supply  is one that controls the output voltage or current to a specific value; the controlled value is held nearly constant despite variations in either load current or the voltage supplied by the power supply's energy source. Program Source Code MikroC char ch; void main() { PORTB = 0x00; TRISB = 0x00; TRI SC = 0x80; PORTC = 0; Usart_Init(9600); delay_ms(100); while(1) { if(Usart_Data_Ready()) { ch = Usart_Read(); if(ch == ‘1') { PORTC. F0 = 1; elay_ms(5000); PORTC. F0 = 0; ch=''; } if(ch == ‘2') { PORTC. F1 = 1; delay_ms(8000); PORTC. F1 = 0; ch=''; } } PORTB = 0x00; } VB6. 0 â€Å"Enrollment† Dim WithEvents Capture As DPFPCapture Dim CreateFtrs As DPFPFeatureExtraction Dim CreateTempl As DPFPEnrollment Dim ConvertSample As DPFPSampleConversion Private Sub DrawPicture(ByVal Pict As IPictureDisp) ‘ Must use hidden PictureBox to easily resize picture. Set HiddenPict. Picture = Pict Picture1. PaintPicture HiddenPict. Picture, _ 0, 0, Picture1. ScaleWidth, _ Picture1. ScaleHeight, _ 0, 0, HiddenPict. ScaleWidth, _ HiddenPict. ScaleHeight, vbSrcCopy Picture1. Picture = Picture1. Image End SubPrivate Sub ReportStatus(ByVal str As String) Status. AddItem (str) ‘ Add string to list box. Status. ListIndex = Status. NewIndex ‘ Move list box selection down. End Sub Private Sub Close_Click() Capture. StopCapture ‘ Stop capture operation. Unload Me End Sub Private Sub Form_Load() Set Capture = New DPFPCapture ‘ Create capture operation. Capture. StartCapture ‘ Start capture operation. Set CreateFtrs = New DPFPFeatureExtraction ‘ Create DPFPFeatureExtraction object. Set CreateTempl = New DPFPEnrollment ‘ Create DPFPEnrollment object. Samples. Caption = CreateTempl.FeaturesNeeded ‘ Show number of samples needed. Set ConvertSample = New DPFPSampleConversion ‘ Create DPFPSampleConversion object. End Sub Private Sub Capture_OnReaderConnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was connected. â€Å") End Sub Private Sub Capture_OnReaderDisconnect(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was disconnected. â€Å") End Sub Private Sub Capture_OnFingerTouch(ByVal ReaderSerNum As String) ReportStatus (â€Å"The fingerprint reader was to uched. â€Å") End Sub Private Sub Capture_OnFingerGone(ByVal ReaderSerNum As String) ReportStatus (â€Å"The finger was removed from the fingerprint reader. â€Å") End SubPrivate Sub Capture_OnSampleQuality(ByVal ReaderSerNum As String, ByVal Feedback As DPFPCaptureFeedbackEnum) If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The quality of the fingerprint sample is good. â€Å") Else ReportStatus (â€Å"The quality of the fingerprint sample is poor. â€Å") End If End Sub Private Sub Capture_OnComplete(ByVal ReaderSerNum As String, ByVal Sample As Object) Dim Feedback As DPFPCaptureFeedbackEnum ReportStatus (â€Å"The fingerprint sample was captured. â€Å") ‘ Draw fingerprint image. DrawPicture ConvertSample. ConvertToPicture(Sample) ‘ Process sample and create feature set for purpose of enrollment. Feedback = CreateFtrs.CreateFeatureSet(Sample, DataPurposeEnrollment) ‘ Quality of sample is not good enough to produce feature set. If Feedback = CaptureFeedbackGood Then ReportStatus (â€Å"The fingerprint feature set was created. â€Å") Prompt. Caption = â€Å"Touch the fingerprint reader again with the same finger. † ‘ Add feature set to template. CreateTempl. AddFeatures CreateFtrs. FeatureSet ‘ Show number of samples needed to complete template. Samples. Caption = CreateTempl. FeaturesNeeded If Val(Samples. Caption) = 0 Then MainFrame. Picture1. Visible = True Else MainFrame. Picture1. Visible = False End If ‘ Check if template has been created. If CreateTempl.TemplateStatus = TemplateStatusTemplateReady Then MainFrame. SetTemplete CreateTempl. Template ‘ Template has been created, so stop capturing samples. Capture. StopCapture Prompt. Caption = â€Å"Click Close, and then click Fingerprint Verification. † MsgBox â€Å"The fingerprint template was created. † End If End If End Sub Private Sub Form_Unload(Cancel As Integer) Capture. StopCapture ‘ Stop capture operat ion End Sub â€Å"frmFlash† Option Explicit Dim i As Integer Private Declare Sub Sleep Lib â€Å"kernel32† (ByVal dwMilliseconds As Long) Private Sub Form_Activate() For i = 0 To 10 i = i + 1 Sleep (500) Me. Refresh Next Unload Me frmStandbyMode. Show End Sub â€Å"frmInventory†Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdPayDue_Click() Set rsPay = New ADODB. Recordset rsPay. CursorLocation = adUseClient rsPay. CursorType = adOpenDynamic rsPay. LockType = adLockOptimistic ‘rsPay. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB rsPay. Open â€Å"select * from tbl_registration where FullName = ‘† & txtPay. Text & â€Å"‘†, ConnectDB If rsPay. EOF = False Then ‘With rsPay ‘rsPay. MoveFirst ‘ While rsPay. EOF = False ‘ If txtPay. Text = rsPay! Fu llName Then If MsgBox(â€Å"Continue paying his due? , vbInformation + vbYesNo, â€Å"Apartment Monitoring and Security System – Paying Due†) = vbYes Then rsPay! ToPay = rsPay! ToPay + rsPay! Payment rsPay. Update List_Unpaid. Clear Call query_list ‘ rsPay. MoveNext ‘ Else: rsPay. MoveNext End If ‘ Else: rsPay. MoveNext ‘ End If ‘ Wend ‘End With End If End Sub Private Sub cmdPrint_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_registration†, ConnectDB Set GuestReport. DataSource = rst. DataSource GuestReport. ReportWidth = 6000 GuestReport. Show End SubPrivate Sub cmdPrintLogs_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open â€Å"select * from tbl_logs where FullName = ‘† & txtPay. Text & â⠂¬Å"‘†, ConnectDB If rst. EOF = False Then Set GuestLogs. DataSource = rst. DataSource GuestLogs. ReportWidth = 5000 GuestLogs. Show End If End Sub Private Sub Command1_Click() Unload Me Load MainFrame End Sub Private Sub Form_Load() txtPay. Text = â€Å"† Set rsViewInventory = New ADODB. Recordset rsViewInventory. CursorLocation = adUseClient rsViewInventory. CursorType = adOpenDynamic rsViewInventory. LockType = adLockOptimistic rsViewInventory.Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestInventory. DataSource = rsViewInventory frmInventory. dgGuestInventory. Columns(0). Visible = False frmInventory. dgGuestInventory. Columns(2). Visible = False frmInventory. dgGuestInventory. Columns(5). Visible = False frmInventory. dgGuestInventory. Columns(7). Visible = False frmInventory. dgGuestInventory. Columns(8). Visible = False frmInventory. dgGuestInventory. Columns(1). Width = 2200 frmInventory. dgGuestInventory. Co lumns(3). Width = 1900 frmInventory. dgGuestInventory. Columns(4). Width = 1600 frmInventory. dgGuestInventory. Columns(6). Width = 1200 If rsViewInventory.EOF = False Then With rsViewInventory rsViewInventory. MoveFirst While rsViewInventory. EOF = False If rsViewInventory. EOF = False Then txtBayadHolder. Text = rsViewInventory! ToPay txtBayadUtang. Text = Val(txtBayadUtang. Text) + Val(txtBayadHolder. Text) ‘rsViewInventory! ToPay rsViewInventory. MoveNext End If Wend End With Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB If txtBayadUtang. Text = rsUpdateNah! Total Then txtBayadUtang.Text = â€Å"Php † & FormatNumber(rsUpdateNah! Total) Else Dim rsUpdateNahh As New ADODB. Recordset rsUpdateNahh. CursorLocation = adUseClient rsUpdateNahh. CursorType = adOpenDynamic rsUpdateNahh. Lock Type = adLockOptimistic rsUpdateNahh. Open â€Å"SELECT * FROM tbl_inventory†, ConnectDB rsUpdateNahh! Total = txtBayadUtang. Text rsUpdateNahh. Update rsUpdateNahh. Close txtBayadUtang. Text = â€Å"Php † & FormatNumber(txtBayadUtang. Text) End If End If Call query_list End Sub Private Sub txtPay_Change() If txtPay. Text â€Å"† Then cmdPayDue. Enabled = True cmdPrintLogs. Enabled = True End If End Sub Public Function query_list() Dim rsViewUnpaid As New ADODB. Recordset rsViewUnpaid.CursorLocation = adUseClient rsViewUnpaid. CursorType = adOpenDynamic rsViewUnpaid. LockType = adLockOptimistic rsViewUnpaid. Open â€Å"SELECT * FROM tbl_registration†, ConnectDB If rsViewUnpaid. EOF = False Then With rsViewUnpaid List_Unpaid. AddItem â€Å"Name's† & vbTab & vbTab & vbTab & â€Å"To Pay† List_Unpaid. AddItem â€Å"† rsViewUnpaid. MoveFirst While rsViewUnpaid. EOF = False If rsViewUnpaid! ToPay = 0 Then txtBayadHolder. Text = rsViewUnpai d! FirstName & † † & rsViewUnpaid! LastName & vbTab & vbTab & â€Å"Php † & FormatNumber(rsViewUnpaid! Payment) List_Unpaid. AddItem txtBayadHolder. Text rsViewUnpaid. MoveNext Else: rsViewUnpaid.MoveNext End If Wend End With End If End Function â€Å"frmLogin† Private Declare Function sndPlaySound Lib â€Å"winmm. dll† Alias â€Å"sndPlaySoundA† _ (ByVal lpszSoundName As String, ByVal uFlags As Long) As Long Const SND_SYNC = &H0 Const SND_NODEFAULT = &H2 Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cmdCancel_Click() Unload Me frmStandbyMode. Enabled = True frmStandbyMode. Show End Sub Private Sub Form_Load() frmStandbyMode. Enabled = False End Sub Private Sub cmdOK_Click() Set recordSetAccount = New ADODB. Recordset ecordSetAccount. CursorLocation = adUseClient recordSetAccount. CursorType = a dOpenDynamic recordSetAccount. LockType = adLockOptimistic recordSetAccount. Open â€Å"tbl_account†, ConnectDB If (frmLogin. txtUserName. Text = â€Å"† And frmLogin. txtPassword. Text = â€Å"†) Then Unload frmLogin Unload frmStandbyMode MainFrame. mnuSearchGuest. Enabled = False MainFrame. mnuAddGuest. Enabled = False MainFrame. Show ElseIf recordSetAccount. EOF = False Then If frmLogin. txtPassword. Text = â€Å"† Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%)MsgBox â€Å"Please input your password. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus ElseIf Not frmLogin. txtPassword. Text = recordSetAccount! Password Then soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Incorrect pa ssword. Try again! â€Å", , â€Å"Login† frmLogin. txtPassword. SetFocus frmLogin. txtPassword. SelStart = 0 frmLogin. txtPassword. SelLength = Len(frmLogin. txtPassword. Text) ElseIf (frmLogin. txtUserName. Text = recordSetAccount! UserName And frmLogin. txtPassword. Text = recordSetAccount!Password) Then Unload frmLogin Unload frmStandbyMode MainFrame. Show End If Else soundfile$ = â€Å"C:Program FilesTitaniumTimekeepersoundsaccess_denied. wav† wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox â€Å"Not a valid account. Try again! â€Å", , â€Å"Login† frmLogin. txtUserName. SetFocus frmLogin. txtUserName. SelStart = 0 frmLogin. txtUserName. SelLength = Len(frmLogin. txtUserName. Text) End If End Sub â€Å"frmStanbyMode† Private Sub mnuExit_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Timer1. Enabled = True End IfEnd Sub Private Sub mnuLogin_Click() frmLogin. Show End Sub Private Sub Timer1_Timer() Label1. Visible = True ProgressBar1. Visible = True If ProgressBar1. Value >= ProgressBar1. Max Then End End If ProgressBar1. Value = ProgressBar1. Value + 1 End Sub â€Å"MainFrame† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice.Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete. CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete.Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800 MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â₠¬Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame.Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen txtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDBIf MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt.Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender. Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Se t rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB ritePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & t xtLastName.Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text rsUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyy†) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest.Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset rsguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOp timistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing.If Templ Is Nothing Then Else: Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End Sub Private Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to pictur e Set Templ = New DPFPTemplate Templ. Deserialize blob End If End SubPrivate Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True frameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click()If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me frmStandbyMode. Show End If End Sub Private Sub mnuSearc hGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1.Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = Ne w DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest.CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName. Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"† Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. , vbYes No + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text rsAddGuest! LastName = txtLastName. Text rsAddGuest! Fullname = txtFirstName. Text & † † & txtLastName. Text rsAddGuest! Gender = cboGender. Text rsAddGuest! RoomChoice = cboRoomChoice. Text rsAddGuest! RoomNumber = cboRoomNumber. Text rsAddGuest! Picture = txtFilePathPic. Text rsAddGuest! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted. Text & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsAddGuest! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear.Text, â€Å"mm/dd/yyyy†) rsAddGuest! Payment = txtIdHolder. Text rsAddGuest. Update rsAddGuest. Close Call Clear MsgBox â€Å"Guest has successfully Added. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† End If End If End Sub Private Sub SaveTemplate_Click() Dim blob() As Byte ‘ First verify that template is not empty. If Templ Is Nothing Then MsgBox â€Å"You must create a fingerprint template before you can save it. † Exit Sub End If CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fpt† ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next ‘ Show Save As dialog box. CommonDialog1. ShowSaveIf Err Then ‘ This code runs if the dialog box was cancelled. Exit Sub End If ‘ Export template to binary data. blob = Templ. Serialize ‘ Save binary data to file. Open CommonDialog1. FileName For Binary As #1 Put #1, , blob Close #1 End Sub Private Sub Timer1_Timer() lblDate. Caption = Format(Date, â€Å"Long Date†) lblTime. Caption = Format(Time, â€Å"Long Time†) End Sub Private Sub Verify_Click() ‘ First verify that template is not empty. If Templ Is Not hing Then MsgBox â€Å"You must create fingerprint template before you can perform verification. † Exit Sub End If ‘ Show Fingerprint Verification dialog box. Verification. Show vbModal, Me End SubPublic Function Clear() txtFirstName. Text = â€Å"† txtLastName. Text = â€Å"† txtFilePathPic. Text = â€Å"† cboGender. Text = â€Å"† cboRoomChoice. Text = â€Å"† cboRoomNumber. Text = â€Å"† cboMonthStarted. Text = â€Å"† cboDateStarted. Text = â€Å"† cboYearStarted. Text = â€Å"† cboDueMonth. Text = â€Å"† cboDueDate. Text = â€Å"† cboDueYear. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† imgbox. Visible = False img_box_del. Visible = False frameRegisterGuest. Visible = False frameSearchGuest. Visible = False End Function Public Function View() frameRegisterGuest. Visible = False frameSearchGuest. Visible = False frameViewGuest. Visible = True Set rsViewGuest = New ADODB. Recordset rsViewGuest.CursorLocation = adUseClient rsViewGuest. CursorType = adOpenDynamic rsViewGuest. LockType = adLockOptimistic rsViewGuest. Open â€Å"SELECT * FROM tbl_registration ORDER BY RoomNumber ASC†, ConnectDB Set dgGuestView. DataSource = rsViewGuest MainFrame. dgGuestView. Columns(0). Visible = False MainFrame. dgGuestView. Columns(2). Visible = False MainFrame. dgGuestView. Columns(5). Visible = False MainFrame. dgGuestView. Columns(7). Visible = False MainFrame. dgGuestView. Columns(8). Visible = False MainFrame. dgGuestView. Columns(1). Width = 2200 MainFrame. dgGuestView. Columns(3). Width = 1900 MainFrame. dgGuestView. Columns(4). Width = 1600 MainFrame. dgGuestView.Columns(6). Width = 1200 Set rsViewGuest = Nothing End Function â€Å"Verification† Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = â€Å"DRIVER={MySQL ODBC 5. 1 Driver}; SERVER = localhost; DATABASE = db_AMASS; USER = root; PASSWORD = †;† End Fu nction Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = â€Å"Economy† Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = â€Å"Standard† Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice. Text = â€Å"Family† Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete.CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & cboRoomNumberDel. Text & â€Å"‘†, ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete. Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Wi dth = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete! Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox â€Å"This room has no guest yet. â€Å", vbInformation, â€Å"Apartment Monitoring and Security System† img_box_del. Visible = False cmdOpenSesame. Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete! RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen xtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to delete this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsDelete. Delete MsgBox â€Å"Guest has been successfully deleted. , vbInformation, â€Å"Apartment Monitoring and Security System† Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = â€Å"Edit here†¦ † save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsE ditGuestt. Open â€Å"SELECT * FROM tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB txtFirstName. Text = rsEditGuestt! FirstName txtLastName. Text = rsEditGuestt! LastName cboGender.Text = rsEditGuestt! Gender cboRoomChoice. Text = rsEditGuestt! RoomChoice cboRoomNumber. Text = rsEditGuestt! RoomNumber txtFilePathPic. Text = rsEditGuestt! Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open â€Å"SELECT * FROM tbl_registration WHERE RoomNumber = ‘† & MainFrame. txtIdHolder. Text & â€Å"‘†, ConnectDB writePort rsOpen! RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah.CursorType = adOpenDynamic rsUpdateNah. LockType = adL ockOptimistic rsUpdateNah. Open â€Å"tbl_registration WHERE FullName = ‘† & MainFrame. txtSearch. Text & â€Å"‘†, ConnectDB If MsgBox(â€Å"Are you sure you want to update this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Update Verification†) = vbYes Then rsUpdateNah! templates = Templ. Serialize rsUpdateNah! FirstName = txtFirstName. Text rsUpdateNah! LastName = txtLastName. Text rsUpdateNah! Fullname = txtFirstName. Text & † † & txtLastName. Text rsUpdateNah! Gender = cboGender. Text rsUpdateNah! RoomChoice = cboRoomChoice. Text rsUpdateNah! RoomNumber = cboRoomNumber. Text rsUpdateNah! Picture = txtFilePathPic. Text sUpdateNah! CompleteDateStarted = Format(cboMonthStarted. Text & â€Å"/† & cboDateStarted & â€Å"/† & cboYearStarted. Text, â€Å"mm/dd/yyyy†) rsUpdateNah! CompleteDueDate = Format(cboDueMonth. Text & â€Å"/† & cboDueDate. Text & â€Å"/† & cboDueYear. Text, â€Å"mm/dd/yyyyâ₠¬ ) rsUpdateNah. Update rsUpdateNah. Close MsgBox â€Å"Guest has successfully Updated. â€Å", vbOnly, â€Å"Apartment Monitoring and Security System† Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest. Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text â€Å"† Then Set rsguestview = New ADODB. Recordset sguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open â€Å"Select * from tbl_logs where Date= ‘† & mskDateStarted & â€Å"‘†, ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object ‘ Template can be empty. If so, then returns Nothing. If Templ Is Nothing Then Else: Set GetTem plate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End SubPrivate Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open â€Å"Select * from tbl_registration†, ConnectDB blob = rs! templates ‘set raw image from MySQL database If Templ Is Nothing Then ‘convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End Sub Private Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = â€Å"Register here†¦ † frameRegisterGuest. Visible = True rameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(â€Å"Are you sure you want to logout and change user? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout_Click() If MsgBox(â€Å"Are you sure you want to exit program? â€Å", vbYesNo + vbInformation, â€Å"Apartment Monitoring and Security System†) = vbYes Then closePort Unload Me rmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = â€Å"† cboRoomNumberDel. Text = â€Å"† cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. Filter = â€Å"Fingerprint Template File|*. fptà ¢â‚¬  ‘ Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then ‘ This code runs if dialog box was cancelled. Exit Sub End If ‘ Read binary data from file. Open CommonDialog1. FileName For Binary As #1 ReDim blob(LOF(1)) Get #1, , blob() Close #1 ‘ Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate ‘ Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest. CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open â€Å"tbl_registration†, ConnectDB If txtFirstName.Text = â€Å"† Or txtLastName. Text = â€Å"† Or cboGender. Text = â€Å"† Or cboRoomChoice. Text = â€Å"† Or cboRoomNumber. Text = â€Å"â €  Or txtFilePathPic. Text = â€Å"† Or cboMonthStarted. Text = â€Å"† Or cboDateStarted. Text = â€Å"† Or cboYearStarted. Text = â€Å"† Or cboDueMonth. Text = â€Å"† Or cboDueDate. Text = â€Å"† Or cboDueYear. Text = â€Å"† Then MsgBox â€Å"Missing Fields. â€Å", vbCritical + vbInformation, â€Å"Apartment Monitoring and Security System† Else If MsgBox(â€Å"Are you sure you want to add this Guest?. â€Å", vbYesNo + vbInformation, â€Å"Delete Verification†) = vbYes Then rsAddGuest. AddNew rsAddGuest! templates = Templ. Serialize rsAddGuest! FirstName = txtFirstName. Text

Tuesday, July 30, 2019

International Trade Theory Essay

7 theories of international trade: 1. Mercantilism 2. Absolute Advantage 3. Comparative Advantage 4. Heckscher-Ohlin Theory 5. Product Life-Cycle Theory 6. New Trade Theory 7. The Theory of National Competitive Advantage 1. Mercantilism -emerged in England in the mid-16th century. The main tenet of mercantilism was that it was in a country’s best interests more than it imported. Consistent with this belief, the mercantilist doctrine advocated government intervention to achieve a surplus in the balance of trade. To achieve this, imports were limited by tariffs and quotas, while exports were subsidized. The flaw with mercantilism was that it viewed trade as a zero-sum game. Zero-sum Game- is one in which a gain by one country results in a loss by another. 2. Absolute Advantage  -In his 1776 landmark book The Wealth of Nations, Adam Smith attacked the mercantilist assumption that trade is a zero-sum game. He argued that countries differ in their ability to produce goods efficiently. According to Smith, countries should specialize in the production of goods for which they have an absolute advantage and then trade these for goods produced by other countries. He added that a country should never produce goods at home that it can buy at a lower cost from other countries. Smith demonstrates that, by specializing in the production of goods in which each has an absolute advantage, both countries benefit by engaging in trade. 3. Comparative Advantage -In his 1817 book Principles of Political Economy, David Ricardo of Comparative Advantage Theory said that it makes sense for a country to specialize in the production of those goods that it produces most efficiently and to buy the goods that it produces less efficiently from other countries, even if this means buying goods from other countries that it could produce more efficiently itself. The basic message of this theory is that potential world production is greater with unrestricted free trade than it is with restricted trade. It suggests that consumers in all nations can consume more if there are no restrictions on the trade and that trade is a positive-sum game in which all countries that participate realize economic gains. Three of the assumptions in the comparative advantage model: 1. Resources move freely from the production of one good to another within a country. 2. There are constant returns to scale.  3. Trade does not change a country’s stock of resources or the efficiency with which those resources are utilized. The Samuelson Critique- looks at what happens when a rich country -the United States- enters into a free trade agreement with a poor country -China- that rapidly improves its productivity after the introduction of a free trade regime. 4. Heckscher- Ohlin Theory -Swedish economists Eli Heckscher (1919) and Bertil Ohlin (1933) put forward a different explanation of comparative advantage. They argued that comparative advantage arises from the differences in national factor endowments. Factor endowments meant the extent to which a country is endowed with such resources as land, labor, and capital. Nations have varying factor endowments, and these explain differences in factor costs; specifically, the more abundant a factor, the lower its cost. This theory predicts that countries will export those goods that make intensive use of factors that are locally abundant, while importing goods that make intensive use of factors that are locally scarce. This also argues that free is beneficial. But unlike Ricardo’s theory, this theory argues that the pattern of international trade is determined by differences in factor endowments, rather than differences in productivity. The Leontief Paradox- a famous study published in 1953 by Nobel Prize winner Wassily Leontief. The result of the study was at variance with the predictions of the Heckscher- Ohlin Theory. 5. The Product Life-Cycle Theory -this was originally proposed by Raymond Vernon in the mid-1960s. This theory tells us that where a new product was introduced is important. This theory suggests that early in their life cycle, most new products are produced in and exported from the country in which they were developed. As a new product becomes widely accepted internationally, production starts in other countries. As a result, the theory suggests, the product may ultimately be exported back to the country of its original innovation. 6. New Trade Theory -this was developed by economist Paul Krugman in 1980s who pointed out that the ability of firms to attain economies of scale might have important implications for international trade. Economies of scale are unit cost reductions associated with a large scale of output. They are a major source cost reductions in many industries. Two important points of the New Trade Theory: ïÆ'Ëœ First, through its impact on economies of scale, trade can increase the variety of goods available to consumers and decrease the average costs of those goods. ïÆ'Ëœ Second, in those industries when the output required to attain economies of scale represents a significant proportion of total world demand, the global market may only be able to support a small number of enterprises. Another theme of the New Trade Theory is that the pattern of trade we observe in the world economy may be the result of economies of scale and first mover advantages. The theory suggests that a country may predominate in the export of a good simply because it was lucky enough to have one or more firms among the first to produce that good. 7. The Theory of National Competitive Advantage: Porter’s Diamond -this was developed by Michael Porter in 1990. For him, the essential task was to  explain why a nation achieves international success in a particular industry. Four attributes that constitute the Porter’s Diamond: ïÆ'Ëœ Factor Endowments- a nation’s position in factors of production such as skilled labor or the infrastructure necessary to compete in a given industry. ïÆ'Ëœ Demand Conditions- the nature of home demand for the industry’s product or service. ïÆ'Ëœ Relating and supporting industries-the presence or absence of supplier industries and related industries that are internationally competitive. ïÆ'Ëœ Firm strategy, structure, and rivalry- the conditions governing how companies are created, organized, and managed and the nature of domestic rivalry. Porter argues that firms are more likely to succeed in industries where the diamond is most favorable. He also argues that the diamond is a mutually reinforcing system. The effect of one attribute is contingent on the state of others. IMPLICATIONS FOR MANAGERS The theories discussed have at least three main implications for international businesses: ïÆ'Ëœ Location Implications ïÆ'Ëœ First-mover Implications ïÆ'Ëœ Policy Implications

Monday, July 29, 2019

Managing Competing Agendas Assignment Example | Topics and Well Written Essays - 1000 words

Managing Competing Agendas - Assignment Example incipal information officer who drives this objective by managing the development and execution of an initiative -level information technology framework (Corbett &Kappagoda, 2013). Health and Human Services Department is committed to ensuring efficient and effective management concerning the information resources that are meant to support the public health vision and mission, human service program, and the U.S. health system. In addition to overseeing the department, the chief information officer is responsible for designing the its policy outline for information technology, including areas such as enterprise architecture, investment planning, accessibility, security and privacy, and records management (Venkatesh, Hoehle, &Aljafari, 2014). For instance, the security field has a strong framework, which incorporates the Federal Information Security and Management Act of 2002 (FISMA), technology guidance on safety and privacy that remains to be covered in the policies of the department. The Department of Information Technology is sizable and comprises support for many grant programs that provide information technology resources to local, state, and tribal governments with an aim to support the plans administered by Health and Human Services Department (Venkatesh, Hoehle, &Aljafari, 2014). The Department’s group also encourages everything from public and commodity information technology matters such as human resources, accounting systems and email, to the duty systems which allows research at the National Institutes of Health, Directive of Drugs, and strategies for the Food and Drug Administration. Health and Human Services Department is responsible for various sets of missions. Its operating divisions comprise of the administration for kids and families, the management for community living, the management for health examination and quality, various Centers for Medicare and Medicaid Services (CMS), the Nutrition and Drug Management. The information technology

Sunday, July 28, 2019

McCabe on Faith and Reason Essay Example | Topics and Well Written Essays - 1000 words

McCabe on Faith and Reason - Essay Example Indeed, Christianity or Islam operate with rather complex notions and require their followers to have a strong faith. In this paper I will argue that Herbert McCabe fails to draw a good connection between faith and reason because his arguments are too ambiguous. This represents the major drawback of his position when it comes to explaining what role the latter plays in the former. In order to demonstrate this, I will first explore his position on the connection between faith and reason; then pay attention to the merits of it and, afterwards, put emphasis on the deficiencies that can be found in it. To begin with, it may be particularly important to outline the view of McCabe on the way faith and reason are connected. He points out that there are two extreme positions when it comes to faith: on the one hand, some might argue that to practice it one should not have any reasons at all which means that faith is above any reasoning; on the other hand, others are firm in that their faith can hardly be disproved logically. The scholar notes that true understanding of faith lies somewhere in between as â€Å"the first extreme makes the notion of truth inapplicable. The other makes the notion of faith inapplicable† (McCabe 5). In addition McCabe notes that people who dismiss the importance of the relationship between faith and reasons fail to â€Å"take sufficiently seriously the point that faith means holding something as true – they think of faith as more an act of courage or trust in a very general sense† (McCabe 6). So, he proves that it is essential to make th is relationship clear. There are several merits of such an approach. First of all, McCabe shows that faith should not be perceived as some kind of a metaphysical knowledge that is beyond common sense and is incompatible with logic. Quite the opposite, he draws several examples, as in the case of marrying for money, which show that faith is a rather difficult complex and any

Saturday, July 27, 2019

The cross section of Globalisation Essay Example | Topics and Well Written Essays - 2750 words

The cross section of Globalisation - Essay Example Coming out of internal fissures, we then analyse the share of its structural framework in triggering current financial collapse. Free Trade regime promulgated Deregulation, which has been the underlying cause of today's liberalized world. This philosophy has been the source for lax and ludicrous financial sector management that aided the global financial system to collapse. The ensuing panic that has spread out of the economic meltdown is tempting enough for nations to reverse gains of open policies by reverting back to protectionist approach. Calls for G20 to address the very fears of scaling back and to come up with singular global stance, are proving speech fully tactical but practically inconclusive. Despite of all these fears and anxiety, the Gross domestic contribution of free trade has been immense and can not be shrouded by just single brush of jittering. Greater global integration 'brain child of Globalisation, on one hand has not only given us tools for prosperity by employ ing thousands of workers across continents, while on the other hand made them vulnerable on slightest of demand fluctuations. Present crisis no doubt has brought hard time upon Global economic regime but on the same note provided us with an opportunity to rectify those worms that had conveniently been ignored for long time. Introduction The Demise of Globalisation as narrated by Princeton's economist in his obituary "The late Great Globalisation"1 confines us to look in to its realm in a very limited and constrained fashion, such that we only seem to view the extreme shades on the spectrum's periphery while ignorantly shrugging the rest. Globalisation is about finance, economics, investment, trade, borders and barriers no doubt, but it also encompasses while shouting load about the flow of ideas that are free to flow across the world, their convergence and divergence. The breadth and depth of Globalisation is more comprehensively addressed by David Held, a political scientist who envision it as the "widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life"2. Thus expanding the very realm to incorporate slants of life's social, political and economic shades. The Great Shift Seismic shift that has taken place after the violent jolts of world economic crisis has ripped apart the already disdained and reservation-ridden world trade order. Today when the battle for survival is on, Seven years of wasted Doha round are beginning to shape into a painful memoir of impasse. The lost opportunity is beginning to afflict the very foundations of global free trading regime, that could have been achieved if interest of corporations and powerful governments had been neutralised for greater gains of global integration. In the wake of attaining consensus, the presiding of invitation-only ministerial meetings in the so called 'Green rooms, by Lamy1 were enough to dispel the ideals of WTO, whose commitment has been an environment based on consensus, harmony and equality. The height of irony was still grossly palpable when even the exclusive few could not converge on single agenda to work through with. Even before the current crisis ever emerged, the road through WTO had already become rock-strewn. WTO's Director General Supachai Panitchpakdi3 who

Friday, July 26, 2019

Should We lease or buy a car Essay Example | Topics and Well Written Essays - 2000 words

Should We lease or buy a car - Essay Example The total costs incurred in the three options analyzed form the basis of the choice preferred. As can be seen from the analysis, the buying option based on the chosen parameters and values is better considering especially if a higher deposit is given. It is recommended that one buys the car by paying a higher deposit amount. Should we lease or buy a car? This is the managerial question that the company seeks to answer. Buying or leasing is a very familiar question in the present age. In the United States, leasing accounted for close to 42 percent of the total new cars purchased in 2000. It is important to note that the number is increasing at a considerable rate. It is estimated that more cars that are new will be leased in the future. Leasing is defined as the process renting for a particular period or amount of time. As a result, the individual pays only a portion of the item value and not its total value. Majority of the automobiles are leased and the lease generally lasts for 2 to 5 years. The individual or the organization puts up the initial security deposit and it is generally a one to two months advance lease expense (Royale Management Services, 2001). There are several benefits of buying or leasing a car. Benefits to buying include lack of restrictions as to how many miles per year the car can be driven, the car can be sold because it has some residual value, and the absence of insurance issues linked to premature termination. Other benefits include that the car be treated in any way the individual or the company wishes this were because there are no turn-in issues associated with the residual value. If an investment type loan like home equity is utilized to finance the purchase of the car, the interest charges can be deducted on the individual’s or the company’s tax return (Royale Management Services, 2001). Benefits to leasing

Thursday, July 25, 2019

East Asia Essay Example | Topics and Well Written Essays - 1000 words

East Asia - Essay Example Based on such a perspective, this paper makes a comparison of the Neo- Confucianism in China and Korea by establishing discussions on the different perspectives and circumstances that both nations experienced during the different eras. Indeed, the main area of discussion for this paper involves the benefits of Neo-Confucianism to both China and Korea and the various ways through which Neo-Confucianism influenced the lives of citizens in the two nations. Ideally, in the study of the numerous dynasties that played roles in China, the Song dynasty made a significant impact, despite the fact that it was less known for its power and stability, during a period in which Tang had previously imposed great suffering among the people. The Song dynasty, therefore, developed mechanisms for ensuring that the oppressive nature of the Tang came to an end and that all the oppressive activities reversed. Indeed, during the period, the Chinese society showed significant improvements in the various aspects including economy and cities’ expansions, contrary to the occurrences during the Tang regime in which oppression was high, resulting in the fall of the economy with success of few individuals and great suffering for the majority. The Song dynasty indeed influenced a state of significant development in all the different sectors of the economy. Such a perspective has an accurate view that through Neo-Confucianism a rationalist and worldlier Con fucianisms form was established, which involved the rejection of the previous superstitious and mystical elements of Daoism and Buddhism, which had substantive influence on Confucianism, most especially during and after the Han Dynasty (De Bary 314). Neo-Confucianism that had its origins in the Tang Dynasty, ideally, sort to create the existence of a peaceful coexistence between an individual and the universe. As such, in the Korean perspective through its scholars, classics were

Global Beauty Economy Essay Example | Topics and Well Written Essays - 750 words

Global Beauty Economy - Essay Example The essay "Global Beauty Economy" talks about the model of productive, reproductive and virtual economies at work in the global beauty industry in general and in the Quine Anos more specifically and how these economies are "intertwined" and how the participants make use of these economies as both consumers and producers.The reproductive services included; financial support, beauty creams, hairdressing, and clothing. For instance, Quine Anera’s sisters and cousins donated their best clothes, god fathers took care of the financial arrangements and well-wishers provided room or venue for the event. In case a needed service is not within the reach of well-wishers and family members, the event organizers have to seek for commercial reproduction services that family members of the Quine Anera have to pay or compensate later and this defines the virtual economy. According to the author, virtual economy is the exchange of virtual services for real money of physical products. For insta nce, Quine Anera had to pay for a beauty advice which is a virtual service. Participants in the productive economy serve as consumers to those in the reproductive economy. For instance, Parents who are in the production economy, tend to buy the services of those in the beauticians who are reproductive part of the economy. The chain between the productive and reproductive economy gives rise to virtual economy. Beauty experts and other service rendering individuals commercialize their roles into money earning-profession.

Wednesday, July 24, 2019

BUS 499 MoD-5 (SLP) Integation Causal & Strategy Essay

BUS 499 MoD-5 (SLP) Integation Causal & Strategy - Essay Example ooking at this strategy and its impact on financial performance, it can be concluded that this strategy will lead to an increase in revenues, which in turn would lead to greater operating profits and net income. Since the company will add new competencies in its operations; these competences, presumably will enable it to achieve economies of scale in its operation and reduce unit price of the product. This coupled with an increase in sales volume will lead to an increase in the company’s profit margins, which ultimately will be reflected on the company’s annual profits. In this way, the balance scorecard approach enables the company to achieve its two foremost financial objectives: increasing the company’s profitability and maximizing the returns of stockholders of the company. By accomplishing both these objectives, the company will ensure future survivability and growth. Kaplan, R. S., and Norton, D. P. (1992). The Balanced Scorecard: Measures That Drive Performance. Retrieved May 17, 2012, from http://library.tmu.edu.tw/news/%5BHarvard%20Business%20Review%20-%20January-February%201992%5D%20-%20Kaplan%20&%20Norton%20-%20The%20Balanced%20Scorecard%20-%20Measures%20That%20Drive%20Pe.pdf Kaplan, R.S. and Norton, D.P. (2004). Measuring the strategic readiness of intangible assets. Retrieved May 17, 2012, from http://www.cma-slp.com/onlinelibrary/OL_English/Strategy%20Implementation/Management%20Accounting/MeasuringTheStrategicReadinessofIntangibleAssets.pdf   Lawrie, G., and Cobbold, I. (2004). Third-generation balanced scorecard: evolution of an effective strategic control tool. International Journal of Productivity and Performance Management, 53(7), 611 – 623. Palladium. (2011, June 8).  Palladium balanced scorecard hall of fame for executing strategy. Retrieved May 17, 2012, from Roos, G., and Roos, J. (1997). Measuring Your company’s Intellectual Performance.