Sunday, May 19, 2019

Apartment – title

CHAPTER 1 admittance Rationale Every individual has the desire to live in a peaceful manner and in a checkd way. flatcar is dyadless of the most profitable establishments here in Cebu City for the number of pack came from provinces keeps on increasing. Living in an uncertain realism, flats owners want to preserve safety mea originals in their firms and occupants might as well want to be secured. ravishment is an issue nowadays. It is an act of illegal accession without any permission from the owners/occupants to a specified argona.Further more(prenominal), it often resulted to theft, burglary and intrusion. To get rid of this issue, the classify proposes this dodging which is to maintain the hostage of the apartments via biometrics. With this placement, encroachment issue impart be avoided for without the posture of the occupants, no one buttocks levy the apartment. Theoretical Background According to Harbron (1988), one way of attaining gage of a certain bea is b y means of biometrics. Jain et. al. (1999) identified that biometric system do-nothing ope treasure verification and identification mode.It is very grave to get out our place secured in numerous aspects to prevent from encroachment issues. According to statistics, more than 30% of the burglars substantiate deducted access into apartments, finished an open door or window. (http//www. buzzle. com/ words/security-alarm-systems-for-apartments. html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that in that location are problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered being encroachment. Lao, Excio Erving Jr. A. et. al. 2003) explained that by exploitation home automation system, one raft make several or totally of the systems and devices in home work automatically to provide more security, safety, and convenience. It inspires the class to make this apartment pledge ashes via Biometrics that get out enhance the existing one in securing the flatcars. In flat tire Security dodging via Biometrics, all meanss should be interneted to the server. According to Clark et. al. (1985), a ne bothrk is a collection of processors and terminals that serves more than one expendr at a time by communication.Biometrics scheme Biometric identification technologies (the automatic cite of individuals establish on physical and/or behavioral characteristics) date blanket all over 50 historic period to the earliest digital computers. Over the last two decades, biometric identification devices shake up become faster, cheaper, and more reliable, allowing for a variety of applications. This trail looks at the history, theory, algorithms, applications, and standards of biometric recognition, including voice, iris, face, hand, and fingermark identification.Test protocols, system design, and error rate prediction are discussed, a commodious with the implications of the technology for individualal priva cy. 1. Abstract One of the most critical issues to sort out when building multi-accessible systems, such(prenominal) as computer applications, political machines or physical buildings, is to determine the identity of a person. A system protecting confidential information, or items of value, puts strong security demands on the identification. Biome pronounce provides us with a exploiter-friendly method for this identification and is becoming a competitor for current identification weapons, especially for electronic transactions.However, there are ways to compromise a system reportd on biometric verification. This article focuses on the d sensiblebacks and risks of biometric verification, specifically verification based on reproduces. It shows how all currently available reproduce grazeners flush toiletful be fooled by dummies that are created with very limited means and skills. This article should be read as a warning to those thinking of using new methods of identificatio n without first examining the technical opportunities for compromising the identification mechanism and the associated legal consequences.This is especially true for people working with smart railcards since it is quite common to investment firm fingerprints on smart cards and due to the ontogenesiss in solid state fingerprint scanners, integration of a fingerprint scanner on a smart card is possible. 2. Information Identification systems based on biometrics are capable of identifying persons on the basis either physical or behavioural characteristics. Currently, there are over ten different techniques available to identify a person based on biometrics.The following techniques are applied within the main categories physical and behavioural characteristics Behavioral characteristics Physical characteristics keystrokes dynamics iris recognition voice recognition retina recognition signature dynamics vein blueprint recognition face recognition recognition of hand or finger geometry fingerprint recognition Before a system is able to assure the specific biometrics of a person, it of course requires something to compare it with. Therefore, a compose or guidebook containing the biometrical properties is shop classd in the system. Recording the characteristics of a person is called enrolment. In order to get a profile that corresponds most with reality, the biometrical. characteristics are scanned several times. In case of fingerprint recognition the finger is scanned 3 to four times to get a profile that is independent of variations that occur in practice, such as the angle of placement of the finger on the scanner.Since storage capacity for the profiles in these systems is usually limited (for pillow slip if apply in combining with smart cards), it is common to use entropy compression to begin with storing the profile. Storing profiles in tokens requires a combination of token and biometry for verification and therefore gives a highe r level of security. When a biometrical verification is to occur, a scan of the biometrics of a person is made and compared with the characteristics that are stored in the profile. In general, a certain margin of error is allowed amidst the observed and stored characteristics. If this margin is too gnomish, the system go out reject a righteous person more often while if this margin is too large, cattish persons will be accepted by the system.The probabilities that a righteous person will be jilted and that a malicious person will be accepted, are called fictitious Reject Rate (FRR) and out of true Accept Rate (FAR) delight inively. When using a biometric system, one would of course want to minimise both rates, nonwithstanding unfortunately these are not independent. An optimum trade-off between FRR and FAR has to be found with value to the application. 3. Biometric Identification In this chapter the techniques for fingerprint identification will be explored. After explain ing the theory of fingerprint verification, all current scan technologies are described in more detail. Once it is known how these scanners identify a person by means of a fingerprint, two methods to counterfeit fingerprints are shown.All additional methods implemented by scanner manufacturers to prevent counterfeits from being successful are also described together with proposed methods how these systems could also be fooled into accepting dummy fingerprints. The consequences for systems using fingerprint verification are discussed at the end of the chapter. first-class honours degree, an example for fingerprint verification from practice will be given. This example also illustrates how difficult it can be to remark an optimum trade-off between FAR and FRR. From a security point of view, one would want to keep the FAR as small as possible. However, for acceptance of a biometry system, a large FRR is worse. topic Within the car industry a biometric verification system is under e valuation.Manufacturers of expensive cars are considering using fingerprint recognition as a requirement for ignition of the engine. To arm against car theft, the FAR should be as small as possible. On the different hand, suppose that the righteous owner of a car cannot use his car because his fingerprint is rejected (i. e. FRR is too high). He will consider this to be a much more serious flaw in the system than a technical failure which prevents the car from being started. This is especially true if he compares the advantages of this system with this rejection the advantages are that the driver does not (necessarily) expect to have a key to his car and a perception of higher security with respect to theft of his car. Whether thusly the security improves is questionable.Right now, we do not see car thieves trying to copy the key of your car, instead they try to by-pass the ignition mechanism where the car key is involved. Furthermore, as this article will show, it might decrease security since it is fairly easy and cheap to copy a fingerprint from a person, even without the person subtle this. 3. 1 Theory of reproduce tab The skin on the inside of a finger is cover with a pattern of ridges and valleys. Already centuries ago it was studied whether these patterns were different for every individual, and indeed every person is believed to have unique fingerprints. This makes fingerprints suitable for verification of the identity of their owner.Although some fingerprint recognition systems do the compare on the basis of actual recognition of the pattern, most systems use exactly specific characteristics in the pattern of ridges. These characteristics are a consequence from the fact that the papillary ridges in the fingerprint pattern are not continuous lines only when lines that end, split into forks (called bifurcation), or form an island. These special points are called minutiae and, although in general a fingerprint contains about a hundred minutiae, the fingerprint area that is scanned by a sensor usually contains about 30 to 40 minutiae. For over hundred years law enforcement agencies all over the world use minutiae to accurately identify persons .For a positive identification that stands in European courts at least(prenominal) 12 minutiae have to be identified in the fingerprint. The choice of 12 minutiae is often referred to as the 12 point rule. This 12 point rule is not based on statistical calculations but is empirically defined based on the assumption that, even when a population of tens of millions of persons are considered, no two persons will have 12 coinciding minutiae in their fingerprints. Most commercially available fingerprint scanners give a positive match when 8 minutiae are found. Manufacturers claim a FAR of one in a million based on these 8 minutiae, which seems reasonable. 3. 2 Fingerprint Scanning Technologies Technologies for scanning fingerprints have evolved over the past years.The traditional method w hich is used by law enforcement agencies for over a hundred years now is do a copy of the print that is found at a crime scene or any other location and manually examining it to find minutiae. These minutiae are compared with prints from a selective informationbase or specific ink prints, which could be taken at a later time. This method is of course based on the fact that the person who left the fingerprints is not co-operating by placing his finger on a fingerprint scanner. For systems that are commercially available (and deployed) people are required to co-operate in order to gain access to whatever is protected by the verification system. The first generation fingerprint scanners appeared on the market place in the mid eighties, so the technology is about fifteen years old.Over the past few years the technology for scanning fingerprints for commercial purposes has evolved a lot. man the first generation sensors used optical techniques to scan the finger, current generation se nsors are based on a variety of techniques. The following techniques are deployed in commercial products that are currently available Optical sensors with CCD or CMOS cameras Ultrasonic sensors Solid state electric field sensors Solid state capacitive sensors Solid state temperature sensors The techniques will be described in greater detail in this section. The solid state sensors are so small that they can be build into virtually any machine.Currently a sensor is in development that will be built in a plastic card the size of a credit card, not only with respect to length and width but also with respect to thickness It is clear that this type of sensor will give a boost to the number of applications using fingerprint technology. (http//cryptome. org/fake-prints. htm) THE PROBLEM Statement of the Problem Encroachment has been an issue in our industry. It could not be resolved unless there are security systems. This study aims to secure every room in any apartment eliminating strangers to get into ones room without the presence of any occupant. This study is further concerned with the following issues 1.What are the existing systems used to maintain security of the apartments? 2. What are the problems fulfiled by the occupants of the apartments? 3. What are the advantages of this Apartment Security formation among the existing systems? 4. What are the techno sensible makes in this Apartment Security System? Statistics The number of residential burglaries recorded increased 0. 7% from 27,347 in 2009/2010 to 27,531 in 2010/2011. Burglary (residential) had a clearance rate of 12. 4% during 2010/2011, 1. 6 percentage points lower than that of 2009/2010. Reported Residential Burglary in the Philippines as of 2007 pic auspicate 1. 1 Burglary (residential) Graph Significance of the StudyTrespassing has been a concern in our society, to put an end this issue, this Apartment Security System moldiness be realized. Apartment is the most profitable business estab lishment businessmen could ever have. Hence, such establishments must be secured all the time. Security systems are not just highlife in an Apartment, it is a necessity to maintain security and to be able to prevent from encroachment issues such as burglary, intrusion, theft, etc. If there is security system in the apartment, then both owners and roomers will get ahead the system. The boarders will feel comfortable living in the apartment with such system, and will not encounter encroachment issues, hence the boarders will live peacefully and live longer in that certain apartment.A boarder who stays in the apartment long enough is an indication that he trusted the system that runs in the apartment. So, it is an advantage on the owners side because, aside from the fact that no intruder can get access to his establishment, it is a big income if the boarders stayed longer in his apartment. Scope and Limitation The project focuses more on the security systems. The project identified the occupants of the apartment by means of fingerprint identification through biometrics. This project already exists, the only difference is that the group applied the system in every room which makes the system expensive enough for it requires every apartment a single biometrics. The group pilots only two rooms for demonstration purposes.The system is capable of identifying occupants to the extent that it alarms whenever an intruder r distributivelyed the maximum tries of fingerprint identifying. The project could not cater occupants who are disabled (do not have fingers). RESEARCH METHODOLOGY Methodology is generally a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. The group uses applied research and makes use of various techniques and tools in conducting this research. question Environment The group will conduct the survey in the apartment where there are tenants and an owner. The purpose of our survey is to deter mine what are their concerned about the security of their apartment. image of apartments and dormitories surveyed 21Number of owners interviewed 3 Number of workers interviewed 18 Number of boarders interviewed 100 Example of apartments and dormitories surveyed Kim Kathleens phratry for ladies Brgy. Cabancalan, Mandaue City Engr. Bing Momo Europa Apartelle and Dormitory- Brgy. Cabancalan, Mandaue City Patoy Saint Joseph Dormitory Lopez Jaena St. , Mandaue City Maam Earl Joy Pink Dormitory- Brgy. Pitogo Consolacion Dioscor Jamisola Research Respondents The people to be conducted by the group are the apartment tenants and the owner for they are the stakeholder of the system. The group will use the simple random sampling technique in getting the number of respondents.Research Instruments The data host is employed through the use of the questionnaire and supplemented with some data analysis of published, unpublished thesis and some article Research Procedure Gathering Data The agg roup gathered the data through the formulated questionnaire which was distributed in the apartments, hotel, boarding house and school to identify the views of the respondents. Treatment of Data Based on the questionnaire, the team construct, analyze, and interpret. The team will use the following formula. n = N 1 + N e Where n = precedent size N = population size e = desire margin of error DEFINITION OF term Project Design A project that is being put into reality by a group of designer. Designers A group of individuals that is tasked to develop the project design. Hardware The physical components of a computer system, including any skirting(prenominal) equipment such as printers, modem and mouse. Software Computer programs are referred to as software. Feature Is a unique, attractive, or loveable property of a program or of a computer or other hardware. Micro chinkler A highly integrated chip contains all the components comprising a tameler. Server A computer system that c onsist of database and other information of it a device that manages network resource. Circuit A combination of galvanic or electronics components, unified to perform one or more specific functions. Breadboard A fiberboard used by electronic circuit designers to build experimental circuits and prototypes. Relay Is an electric switch that opens and closes under the control of other electrical circuit. Transistor Is a semiconductor device, commonly used to amplify or switch electronic signals. Serial Communication Is the process of sending data one bit at one time, sequentially, over a communication channel or computer bus. This is in contrast to parallel communication, where all the bits of each symbols are sent together. Flowchart A plat representing the logical sequence in which a combination of steps or operation is to be perform. broadcast Flowchart Describes graphically in detail the logical operation and steps with in a program and the sequence in which these steps are to be executed to the transformation of data to produce the needed output. System Flowchart Graphic representation of the office involved in convinceing data or media to data in output form. CHAPTER 2 PRESENTATION, ANALYSIS AND exposition OF DATA This chapter focuses more on the data gathered in order for the proponents to further understand the importance of the project. The gathered data is being analyzed so that the group will be aware of the standards or the expectations of the mass.It is then interpreted by making graphs such as pie graph and bar graph to considerably visualize the results of the conducted survey. The var. 2. 1 shows that most of the groups research respondents are the Occupant of the Apartment with fifty eight percent (58%). The group conducted this research in the apartments occupant because they are the ones who will be benefiting the project aside from the Apartment owners. Their opinions and suggestions are very significant in making our project a successful one. The skeletal frame 2. 2 shows that sixty four percent (64%) of the respondents has security systems in their respective apartments. But there are thirty six percent (36%) of the respondents who are living in an apartment with no security. CHAPTER 3Technical Aspects of the Systems This chapter contains the summary of the software and components used in the project in order for the readers to poll how the project was made. System Flowchart is the interpretation of how the project runs from start to end. The platform Flowchart is the interpretation of how the user interfaces with the users. The Block Diagram is how the project composed of. And the cum Code it is the program used of how the project runs with. pic Figure 3. 1 System Flowchart pic Figure 3. 2 System Flowchart pic Figure 3. 3 Program Flowchart pic Figure 3. 4 Program Flowchart pic Figure 3. 5 Program Flowchart pic Figure 3. Program Flowchart pic Figure 3. 7 Program Flowchart System Block Diagra m For Fingerprint scanner pic Figure 3. 8 System Block Diagram For Fingerprint Scanner For the whole system pic Figure 3. 9 System Block Diagram For the whole System Schematic Diagram The courtly diagram is the design which shows how the desired components are being connected to each other. Figure shows the schematic diagram of our design. pic Figure 3. 10 Schematic Diagram Design Components Software Design genus Proteus 7 ISIS sea captain The Proteus Professional demonstration is intended for prospective customers who wish to evaluate our professional level products.It differs from Proteus Lite in that it does not allow you to save, print or design your own microcontroller based designs (you can however write your own software programs to run on the existing sample design entourage for evaluation), but does include all features offered by the professional system including netlist based PCB design with auto-placement, auto-routing and graph based simulation .pic Figure 3. 11 Proteus 7 ISIS Professional MikroC The group decided to use MicroC compiler because it is a C complier for PIC. It is designed to provide the customer with the easiest possible solution for developing applications for embedded system without compromising performance or control. MikroC allows quickly develop and deploy complex applications. pic Figure 3. 12 MikroC VB6. 0 pic Figure 3. 3 VB6. 0 Visual introductory (VB) is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model first released in 1991. Visual Basic is designed to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and understructure of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syn tactically similar to Visual Basic, but perform differently.A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Though the program has get criticism for its perceived faults, from version 3 Visual Basic was a runaway commercial success,and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsofts extended sustain ended in March 2008 and the designated successor was Visual Basic . NET (now known simply as Visual Basic). Hardware Components PIC 16F877A Microcontroller pic Figure 3. 14 PIC 16F877AA PIC (Peripheral Interface Controller) microcontroller is an IC fabricate by Microchip. These ICs are complete computers in a single package. The only external components necessary are whatever is required by the I/O devices that are connected to the P IC. A microcontroller is a small computer and it can only perform simple task. Microcontroller consists of Processor that executes the program Program memory to store the program that has been compiled successfully by the programmer. Ram (random-access memory) to store variables. IO Port to connect sensor, keypad, guide and so on. quartz glass Oscillator pic Figure 3. 15 Crystal OscillatorAwatch glass oscillatoris anelectronic oscillatorcircuit that uses the mechanicalresonanceof a vibratingcrystalofpiezoelectric materialto create an electrical signal with a very precisefrequency. This frequency is commonly used to keep track of time (as inquartz wristwatches), to provide a stable time signalfor digitalintegrated circuits, and to stabilize frequencies forradio transmittersandreceivers. The most common type of piezoelectric resonating chamber used is the quartz crystal, so oscillator circuits designed around them became known as crystal oscillators. Relay pic Figure 3. 16 R elay Arelayis anelectricallyoperatedswitch. Many relays use anelectromagnetto operate a switch over mechanism mechanically, but other operating principles are also used.Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to some other. Relays were used extensively in telephone ex interpolates and early computers to perform logical operations. Resistor pic Figure 3. 17 Resistor normal 10K ohm, 1/4 watt resistor that can be used with various circuits. The color border on the resistor is Brown, Black, Orange, Gold. Diode pic Figure 3. 18 DiodeDiodes allow electricity to flow in only one direction. The arrow of the circuit symbol shows the direction in which the current can flow. Diod es are the electrical version of a valve and early diodes were actually called valves. Regulator pic Figure 3. 19 Regulator Encapsulated in a single chip/package (IC), the7805is a positive electric potential DCregulatorthat has only 3 terminals. They are Input voltage, Ground, Output Voltage. Transistor pic Figure 3. 20 Transistor Transistor is a online operated device which has a very large amount of current (Ic) which flows without restraint through the device between thecollectorand emitter terminals.But this is only possible if a small amount of biasing current (Ib) ispresentin the base terminal of the transistor making the base to act as a current control input. LED (Light Emitting Diode) pic Figure 3. 21 LED A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a hardheaded electronic component in 1962,2 early LEDs emitted low-intensity red light, but modern ve rsions are available crosswise the visible, ultraviolet and infrared wavelengths, with very high brightness. DCU 11 pic Figure 3. 22 DCU 11 The product line incorporates a charger port to charge the phone while the cable is in use, and your phones underlying modem brings the Web and email to your PC.The widely accepted USB standard and high-speed data transfer make this cable the ideal link from your phone to your PC. USB connector Fingerprint Scanner pic Figure 3. 23 Fingerprint Scanner Fingerprint recognitionorfingerprint authenticationrefers to theautomatedmethod of verifying a match between two humanfingerprints. Fingerprints are one of many forms ofbiometricsused toidentifyindividuals andverifytheiridentity. This article touches on two major classes ofalgorithms(minutia and pattern) and foursensordesigns (optical, ultrasonic, passive capacitance, and active capacitance). Power depict pic Figure 3. 24 Power Supply Apower supplyis a device that supplieselectricalenergyto o ne or moreelectric loads.The term is most commonly applied to devices that convert one form of electrical energy to another, though it may also refer to devices that convert another form of energy (e. g. , mechanical, chemical, solar) to electrical energy. Aregulated power supplyis one that controls the output voltage or current to a specific value the controlled value is held nearly constant despite variations in either load current or the voltage supplied by the power supplys energy source. Program Source Code MikroC char ch void main() PORTB = 0x00 TRISB = 0x00 TRISC = 0x80 PORTC = 0 Usart_Init(9600) delay_ms(100) while(1) if(Usart_Data_Ready()) ch = Usart_Read() if(ch == 1) PORTC. F0 = 1 elay_ms(5000) PORTC. F0 = 0 ch= if(ch == 2) PORTC. F1 = 1 delay_ms(8000) PORTC. F1 = 0 ch= PORTB = 0x00 VB6. 0 enrolment fatal WithEvents Capture As DPFPCapture dismal CreateFtrs As DPFPFeatureExtraction swart CreateTempl As DPFPEnrollment inglorious ConvertSample As DPFPSampleConv ersion individual(a) fill in Draw regard(ByVal Pict As I exhibitDisp) Must use hidden PictureBox to easily resize picture. put together HiddenPict. Picture = Pict Picture1. PaintPicture HiddenPict. Picture, _ 0, 0, Picture1. Scalelargeness, _ Picture1. ScaleHeight, _ 0, 0, HiddenPict. Scalelargeness, _ HiddenPict. ScaleHeight, vbSrcCopy Picture1. Picture = Picture1. Image destroy make out esoteric paladin ReportStatus(ByVal str As String) Status. AddItem (str) Add string to list quoin. Status. ListIndex = Status. risingIndex Move list box tell apartion down. finish gunman occult pigboat Close_Click() Capture. StopCapture Stop capture operation. flatten Me eat up replace tete-a-tete numbfish Form_ freight() spate Capture = upstart DPFPCapture Create capture operation. Capture. StartCapture Start capture operation. engraft CreateFtrs = late DPFPFeatureExtraction Create DPFPFeatureExtraction object. trammel CreateTempl = overbold DPFPEnrollment Create DP FPEnrollment object. Samples. legend = CreateTempl.FeaturesNeeded submit number of samples needed. send ConvertSample = newly DPFPSampleConversion Create DPFPSampleConversion object. finish up step in mysterious grinder Capture_OnReaderConnect(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was connected. ) abolish fill in hidden Sub Capture_OnReaderDisconnect(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was disconnected. ) mop up Sub hush-hush Sub Capture_OnFingerTouch(ByVal ReaderSerNum As String) ReportStatus (The fingerprint reader was touched. ) destroy Sub hole-and-corner(a) Sub Capture_OnFingerGone(ByVal ReaderSerNum As String) ReportStatus (The finger was removed from the fingerprint reader. ) kibosh Sub unavowed Sub Capture_OnSampleQuality(ByVal ReaderSerNum As String, ByVal Feedback As DPFPCaptureFeedbackEnum) If Feedback = CaptureFeedbackGood wherefore ReportStatus (The quality of the fingerprint sample is good. ) Else ReportStatus (The quality of the fingerprint sample is poor. ) devastation If kibosh Sub head-to-head Sub Capture_OnComplete(ByVal ReaderSerNum As String, ByVal Sample As Object) Dim Feedback As DPFPCaptureFeedbackEnum ReportStatus (The fingerprint sample was captured. ) Draw fingerprint image. DrawPicture ConvertSample. ConvertToPicture(Sample) Process sample and create feature act for purpose of enrollment. Feedback = CreateFtrs.CreateFeature denounce(Sample, DataPurposeEnrollment) Quality of sample is not good enough to produce feature set. If Feedback = CaptureFeedbackGood hence ReportStatus (The fingerprint feature set was created. ) Prompt. Caption = Touch the fingerprint reader again with the same finger. Add feature set to template. CreateTempl. AddFeatures CreateFtrs. Feature mess fork over number of samples needed to complete template. Samples. Caption = CreateTempl. FeaturesNeeded If Val(Samples. Caption) = 0 Then MainFrame. Picture1. patent = veritab le Else MainFrame. Picture1. seeable = sham End If Check if template has been created. If CreateTempl.TemplateStatus = TemplateStatusTemplateReady Then MainFrame. solidifyingTemplete CreateTempl. Template Template has been created, so pessary capturing samples. Capture. StopCapture Prompt. Caption = Click Close, and then click Fingerprint Verification. MsgBox The fingerprint template was created. End If End If End Sub Private Sub Form_Unload(Cancel As Integer) Capture. StopCapture Stop capture operation End Sub frmFlash excerption Explicit Dim i As Integer Private Declare Sub Sleep Lib kernel32 (ByVal dwMilliseconds As Long) Private Sub Form_Activate() For i = 0 To 10 i = i + 1 Sleep (500) Me. call up Next Unload Me frmStandbyMode. level End Sub frmInventoryPrivate Function ConnectDB() As String ConnectDB = number one wood=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS substance abuser = settle down countersignature = End Function Private Sub cmdPayDue _Click() Set rsPay = upstart ADODB. Recordset rsPay. CursorLocation = adUseClient rsPay. CursorType = ad generateDynamic rsPay. LockType = adLockOptimistic rsPay. Open grant * FROM tbl_registration, ConnectDB rsPay. Open select * from tbl_registration where FullName = & txtPay. school text & , ConnectDB If rsPay. EOF = imitative Then With rsPay rsPay. MoveFirst duration rsPay. EOF = phony If txtPay. text edition = rsPay FullName Then If MsgBox(Continue paying his due? , vbInformation + vbYesNo, Apartment monitor and Security System Paying Due) = vbYes Then rsPay ToPay = rsPay ToPay + rsPay Payment rsPay. Update List_Unpaid. legislate Call query_list rsPay. MoveNext Else rsPay. MoveNext End If Else rsPay. MoveNext End If travel End With End If End Sub Private Sub cmdPrint_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open select * from tbl_registration, ConnectDB Set th ickeningReport. DataSource = rst. DataSource GuestReport. ReportWidth = 6000 GuestReport. Show End SubPrivate Sub cmdPrintLogs_Click() Set rst = New ADODB. Recordset rst. CursorLocation = adUseClient rst. CursorType = adOpenDynamic rst. LockType = adLockOptimistic rst. Open select * from tbl_logs where FullName = & txtPay. text edition & , ConnectDB If rst. EOF = preposterous Then Set GuestLogs. DataSource = rst. DataSource GuestLogs. ReportWidth = 5000 GuestLogs. Show End If End Sub Private Sub Command1_Click() Unload Me Load MainFrame End Sub Private Sub Form_Load() txtPay. textual matter = Set rs ascertainInventory = New ADODB. Recordset rsViewInventory. CursorLocation = adUseClient rsViewInventory. CursorType = adOpenDynamic rsViewInventory. LockType = adLockOptimistic rsViewInventory.Open distribute * FROM tbl_registration effect BY RoomNumber ASC, ConnectDB Set dgGuestInventory. DataSource = rsViewInventory frmInventory. dgGuestInventory. Columns(0). transparent = sen seless frmInventory. dgGuestInventory. Columns(2). gross = dishonest frmInventory. dgGuestInventory. Columns(5). subgross = irrational frmInventory. dgGuestInventory. Columns(7). gross = False frmInventory. dgGuestInventory. Columns(8). macroscopical = False frmInventory. dgGuestInventory. Columns(1). Width = 2200 frmInventory. dgGuestInventory. Columns(3). Width = 1900 frmInventory. dgGuestInventory. Columns(4). Width = 1600 frmInventory. dgGuestInventory. Columns(6). Width = 1200 If rsViewInventory.EOF = False Then With rsViewInventory rsViewInventory. MoveFirst While rsViewInventory. EOF = False If rsViewInventory. EOF = False Then txtBayadHolder. textbook = rsViewInventory ToPay txtBayadUtang. textual matter = Val(txtBayadUtang. school text) + Val(txtBayadHolder. schoolbook) rsViewInventory ToPay rsViewInventory. MoveNext End If Wend End With Dim rsUpdateNah As New ADODB. Recordset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpda teNah. LockType = adLockOptimistic rsUpdateNah. Open tell apart * FROM tbl_inventory, ConnectDB If txtBayadUtang. text = rsUpdateNah Total Then txtBayadUtang. schoolbook = Php & FormatNumber(rsUpdateNah Total) Else Dim rsUpdateNahh As New ADODB. Recordset rsUpdateNahh. CursorLocation = adUseClient rsUpdateNahh. CursorType = adOpenDynamic rsUpdateNahh. LockType = adLockOptimistic rsUpdateNahh. Open SELECT * FROM tbl_inventory, ConnectDB rsUpdateNahh Total = txtBayadUtang. school text rsUpdateNahh. Update rsUpdateNahh. Close txtBayadUtang. school text = Php & FormatNumber(txtBayadUtang. text edition) End If End If Call query_list End Sub Private Sub txtPay_Change() If txtPay. Text Then cmdPayDue. Enabled = true(a) cmdPrintLogs. Enabled = true(p) End If End Sub overt Function query_list() Dim rsViewUnpaid As New ADODB. Recordset rsViewUnpaid.CursorLocation = adUseClient rsViewUnpaid. CursorType = adOpenDynamic rsViewUnpaid. LockType = adLockOptimistic rsViewUnpaid. Open SELEC T * FROM tbl_registration, ConnectDB If rsViewUnpaid. EOF = False Then With rsViewUnpaid List_Unpaid. AddItem Names & vbTab & vbTab & vbTab & To Pay List_Unpaid. AddItem rsViewUnpaid. MoveFirst While rsViewUnpaid. EOF = False If rsViewUnpaid ToPay = 0 Then txtBayadHolder. Text = rsViewUnpaid FirstName & & rsViewUnpaid LastName & vbTab & vbTab & Php & FormatNumber(rsViewUnpaid Payment) List_Unpaid. AddItem txtBayadHolder. Text rsViewUnpaid. MoveNext Else rsViewUnpaid.MoveNext End If Wend End With End If End Function frmLogin Private Declare Function sndPlaySound Lib winmm. dll Alias sndPlaySoundA _ (ByVal lpszSoundName As String, ByVal uFlags As Long) As Long Const SND_SYNC = &H0 Const SND_NODEFAULT = &H2 Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = root PASSWORD = End Function Private Sub cmdCancel_Click() Unload Me frmStandbyMode. Enabled = True frmStandbyMode. Show End Sub Private Sub Form_Load( ) frmStandbyMode. Enabled = False End Sub Private Sub cmdOK_Click() Set recordSetAccount = New ADODB. Recordset ecordSetAccount. CursorLocation = adUseClient recordSetAccount. CursorType = adOpenDynamic recordSetAccount. LockType = adLockOptimistic recordSetAccount. Open tbl_account, ConnectDB If (frmLogin. txtUserName. Text = And frmLogin. txtPassword. Text = ) Then Unload frmLogin Unload frmStandbyMode MainFrame. mnuSearchGuest. Enabled = False MainFrame. mnuAddGuest. Enabled = False MainFrame. Show ElseIf recordSetAccount. EOF = False Then If frmLogin. txtPassword. Text = Then soundfile$ = CProgram loadsTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%)MsgBox Please input your password. Try again , , Login frmLogin. txtPassword. SetFocus ElseIf not frmLogin. txtPassword. Text = recordSetAccount Password Then soundfile$ = CProgram FilesTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NOD EFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox Incorrect password. Try again , , Login frmLogin. txtPassword. SetFocus frmLogin. txtPassword. SelStart = 0 frmLogin. txtPassword. SelLength = Len(frmLogin. txtPassword. Text) ElseIf (frmLogin. txtUserName. Text = recordSetAccount UserName And frmLogin. txtPassword. Text = recordSetAccountPassword) Then Unload frmLogin Unload frmStandbyMode MainFrame. Show End If Else soundfile$ = CProgram FilesTitaniumTimekeepersoundsaccess_denied. wav wFlags% = SND_ASYNC Or SND_NODEFAULT sound = sndPlaySound(soundfile$, wFlags%) MsgBox Not a valid account. Try again , , Login frmLogin. txtUserName. SetFocus frmLogin. txtUserName. SelStart = 0 frmLogin. txtUserName. SelLength = Len(frmLogin. txtUserName. Text) End If End Sub frmStanbyMode Private Sub mnuExit_Click() If MsgBox( be you sure you want to exit program? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then Timer1. Enabled = True End IfEnd Sub Private Sub mnuLogin_Click() frmLogin. Show End Sub Private Sub Timer1_Timer() Label1. patent = True ProgressBar1. Visible = True If ProgressBar1. Value = ProgressBar1. Max Then End End If ProgressBar1. Value = ProgressBar1. Value + 1 End Sub MainFrame Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = root PASSWORD = End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = Economy Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = Standard Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice.Text = Family Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuest edit. Visible = True Set recordSet delete = New ADODB. Recordset recordSetDelete. CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open SELECT * FROM tbl_registration WHERE RoomNumber = & cboRoom NumberDel. Text & , ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete.Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800 MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox This room has no guest yet. , vbInformation, Apartment Monitoring and Security System img_box_del. Visible = False cmdOpenSesame.Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDelete RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen txtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmd distinctly_Click() Call substantiate End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDBIf MsgBox( be you sure you want to delete this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsDelete. Delete MsgBox Guest has been successfully deleted. , vbInformation, Apartment Monitoring and Security System Set dgGuestDelete. DataSource = energy Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = Edit here save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt.Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB txtFirstName. Text = rsEditGuestt FirstName txtLastName. Text = rsEditGuestt LastName cboGender. Text = rsEditGuestt Gender cboRoomChoice. Text = rsEditGuestt RoomChoice cboRoomNumber. Text = rsEditGuestt RoomNumber txtFilePathPic. Text = rsEditGuestt Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open SELECT * FROM tbl_registration WHERE RoomNumber = & MainFrame. txtIdHolder. Text & , ConnectDB ritePort rsOpen RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recor dset rsUpdateNah. CursorLocation = adUseClient rsUpdateNah. CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB If MsgBox(Are you sure you want to update this Guest?. , vbYesNo + vbInformation, Update Verification) = vbYes Then rsUpdateNah templates = Templ. Serialize rsUpdateNah FirstName = txtFirstName. Text rsUpdateNah LastName = txtLastName. Text rsUpdateNah Fullname = txtFirstName. Text & & txtLastName.Text rsUpdateNah Gender = cboGender. Text rsUpdateNah RoomChoice = cboRoomChoice. Text rsUpdateNah RoomNumber = cboRoomNumber. Text rsUpdateNah Picture = txtFilePathPic. Text rsUpdateNah CompleteDateStarted = Format(cboMonthStarted. Text & / & cboDateStarted & / & cboYearStarted. Text, mm/dd/yyyy) rsUpdateNah CompleteDueDate = Format(cboDueMonth. Text & / & cboDueDate. Text & / & cboDueYear. Text, mm/dd/yyyy) rsUpdateNah. Update rsUpdateNah. Close MsgBox Guest has suc cessfully Updated. , vbOnly, Apartment Monitoring and Security System Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest.Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text Then Set rsguestview = New ADODB. Recordset rsguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open Select * from tbl_logs where Date= & mskDateStarted & , ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub mankind Function GetTemplate() As Object Template can be empty. If so, then returns Nothing.If Templ Is Nothing Then Else Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End Sub Private Sub Form_Load() Call Clear Call Vie w Dim fleck() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open Select * from tbl_registration, ConnectDB blob = rs templates set raw image from MySQL database If Templ Is Nothing Then convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End SubPrivate Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = Register here frameRegisterGuest. Visible = True frameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(Are you sure you want to logout and change user? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Privat e Sub mnuLogout_Click()If MsgBox(Are you sure you want to exit program? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then closePort Unload Me frmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = cboRoomNumberDel. Text = cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1.Filter = Fingerprint Template File*. fpt Set duologue box so an error occurs if duologue box is cancelled. CommonDialog1. Cancel rollor = True On erroneousness Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then This code runs if dialog box was cancelled. Exit Sub End If Read binary data from file. Open Common Dialog1. FileName For Binary As 1 ReDim blob(LOF(1)) Get 1, , blob() Close 1 Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest.CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open tbl_registration, ConnectDB If txtFirstName. Text = Or txtLastName. Text = Or cboGender. Text = Or cboRoomChoice. Text = Or cboRoomNumber. Text = Or txtFilePathPic. Text = Or cboMonthStarted. Text = Or cboDateStarted. Text = Or cboYearStarted. Text = Or cboDueMonth. Text = Or cboDueDate. Text = Or cboDueYear. Text = Then MsgBox Missing Fields. , vbCritical + vbInformation, Apartment Monitoring and Security System Else If MsgBox(Are you sure you want to add this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsAd dGuest. AddNew rsAddGuest templates = Templ. Serialize rsAddGuest FirstName = txtFirstName. Text rsAddGuest LastName = txtLastName. Text rsAddGuest Fullname = txtFirstName. Text & & txtLastName. Text rsAddGuest Gender = cboGender. Text rsAddGuest RoomChoice = cboRoomChoice. Text rsAddGuest RoomNumber = cboRoomNumber. Text rsAddGuest Picture = txtFilePathPic. Text rsAddGuest CompleteDateStarted = Format(cboMonthStarted. Text & / & cboDateStarted. Text & / & cboYearStarted. Text, mm/dd/yyyy) rsAddGuest CompleteDueDate = Format(cboDueMonth. Text & / & cboDueDate. Text & / & cboDueYear.Text, mm/dd/yyyy) rsAddGuest Payment = txtIdHolder. Text rsAddGuest. Update rsAddGuest. Close Call Clear MsgBox Guest has successfully Added. , vbOnly, Apartment Monitoring and Security System End If End If End Sub Private Sub SaveTemplate_Click() Dim blob() As Byte First verify that template is not empty. If Templ Is Nothing Then MsgBox You must create a fingerprint template before you can save it. E xit Sub End If CommonDialog1. Filter = Fingerprint Template File*. fpt Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Save As dialog box. CommonDialog1. ShowSaveIf Err Then This code runs if the dialog box was cancelled. Exit Sub End If Export template to binary data. blob = Templ. Serialize Save binary data to file. Open CommonDialog1. FileName For Binary As 1 Put 1, , blob Close 1 End Sub Private Sub Timer1_Timer() lblDate. Caption = Format(Date, Long Date) lblTime. Caption = Format(Time, Long Time) End Sub Private Sub Verify_Click() First verify that template is not empty. If Templ Is Nothing Then MsgBox You must create fingerprint template before you can perform verification. Exit Sub End If Show Fingerprint Verification dialog box. Verification. Show vbModal, Me End SubPublic Function Clear() txtFirstName. Text = txtLastName. Text = txtFilePathPic. Text = cboGender. Text = cboRoomChoice. Text = cboRoomNumber. Text = cboMonthStarted. Text = cboDateStarted. Text = cboYearStarted. Text = cboDueMonth. Text = cboDueDate. Text = cboDueYear. Text = cboRoomNumberDel. Text = imgbox. Visible = False img_box_del. Visible = False frameRegisterGuest. Visible = False frameSearchGuest. Visible = False End Function Public Function View() frameRegisterGuest. Visible = False frameSearchGuest. Visible = False frameViewGuest. Visible = True Set rsViewGuest = New ADODB. Recordset rsViewGuest.CursorLocation = adUseClient rsViewGuest. CursorType = adOpenDynamic rsViewGuest. LockType = adLockOptimistic rsViewGuest. Open SELECT * FROM tbl_registration ORDER BY RoomNumber ASC, ConnectDB Set dgGuestView. DataSource = rsViewGuest MainFrame. dgGuestView. Columns(0). Visible = False MainFrame. dgGuestView. Columns(2). Visible = False MainFrame. dgGuestView. Columns(5). Visible = False MainFrame. dgGuestView. Columns(7). Visible = False MainFrame. dgGuestView. Columns(8). Visible = False Mai nFrame. dgGuestView. Columns(1). Width = 2200 MainFrame. dgGuestView. Columns(3). Width = 1900 MainFrame. dgGuestView. Columns(4). Width = 1600 MainFrame. dgGuestView.Columns(6). Width = 1200 Set rsViewGuest = Nothing End Function Verification Dim Templ As DPFPTemplate Private Function ConnectDB() As String ConnectDB = DRIVER=MySQL ODBC 5. 1 Driver SERVER = localhost DATABASE = db_AMASS USER = root PASSWORD = End Function Private Sub cboRoomChoice_Click() If cboRoomChoice. Text = Economy Then txtIdHolder. Text = 1500 ElseIf cboRoomChoice. Text = Standard Then txtIdHolder. Text = 2000 ElseIf cboRoomChoice. Text = Family Then txtIdHolder. Text = 2500 End If End Sub Private Sub cboRoomNumberDel_Click() dgGuestDelete. Visible = True Set recordSetDelete = New ADODB. Recordset recordSetDelete.CursorLocation = adUseClient recordSetDelete. CursorType = adOpenDynamic recordSetDelete. LockType = adLockOptimistic recordSetDelete. Open SELECT * FROM tbl_registration WHERE RoomNumber = & cboRo omNumberDel. Text & , ConnectDB Set dgGuestDelete. DataSource = recordSetDelete MainFrame. dgGuestDelete. Columns(0). Visible = False MainFrame. dgGuestDelete. Columns(2). Visible = False MainFrame. dgGuestDelete. Columns(7). Visible = False MainFrame. dgGuestDelete. Columns(8). Visible = False MainFrame. dgGuestDelete. Columns(1). Width = 2200 MainFrame. dgGuestDelete. Columns(3). Width = 1800 MainFrame. dgGuestDelete. Columns(4). Width = 1800MainFrame. dgGuestDelete. Columns(6). Width = 1600 MainFrame. dgGuestDelete. Columns(8). Width = 3200 If recordSetDelete. EOF True Then img_box_del. Visible = True img_box_del. Picture = LoadPicture(recordSetDelete Picture) cmdDeletee. Visible = True cmdEditt. Visible = True cmdOpenSesame. Visible = True Else MsgBox This room has no guest yet. , vbInformation, Apartment Monitoring and Security System img_box_del. Visible = False cmdOpenSesame. Visible = False End If If recordSetDelete. EOF True Then MainFrame. txtIdHolder. Text = recordSetDele te RoomNumber End If End Sub Private Sub cmdBrowse_Click() CommonDialog1. ShowOpen xtFilePathPic. Text = CommonDialog1. FileName imgbox. Picture = LoadPicture(txtFilePathPic. Text) imgbox. Visible = True End Sub Private Sub cmdClear_Click() Call Clear End Sub Private Sub cmdDeletee_Click() Set rsDelete = New ADODB. Recordset rsDelete. CursorLocation = adUseClient rsDelete. CursorType = adOpenDynamic rsDelete. LockType = adLockOptimistic rsDelete. Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB If MsgBox(Are you sure you want to delete this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsDelete. Delete MsgBox Guest has been successfully deleted. , vbInformation, Apartment Monitoring and Security System Set dgGuestDelete. DataSource = Nothing Call Clear End If End Sub Private Sub cmdEditt_Click() Call Clear frameSearchGuest. Visible = False frameRegisterGuest. Visible = True frameRegisterGuest. Caption = Edit here save. Visible = False Dim rsEditGuestt As New ADODB. Recordset rsEditGuestt. CursorLocation = adUseClient rsEditGuestt. CursorType = adOpenDynamic rsEditGuestt. LockType = adLockOptimistic rsEditGuestt. Open SELECT * FROM tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB txtFirstName. Text = rsEditGuestt FirstName txtLastName. Text = rsEditGuestt LastName cboGender.Text = rsEditGuestt Gender cboRoomChoice. Text = rsEditGuestt RoomChoice cboRoomNumber. Text = rsEditGuestt RoomNumber txtFilePathPic. Text = rsEditGuestt Picture cmdUpdateNah. Visible = True End Sub Private Sub cmdOpenSesame_Click() Set rsOpen = New ADODB. Recordset rsOpen. CursorLocation = adUseClient rsOpen. CursorType = adOpenDynamic rsOpen. LockType = adLockOptimistic rsOpen. Open SELECT * FROM tbl_registration WHERE RoomNumber = & MainFrame. txtIdHolder. Text & , ConnectDB writePort rsOpen RoomNumber End Sub Private Sub cmdUpdateNah_Click() Dim rsUpdateNah As New ADODB. Recordset rsUpd ateNah. CursorLocation = adUseClient rsUpdateNah.CursorType = adOpenDynamic rsUpdateNah. LockType = adLockOptimistic rsUpdateNah. Open tbl_registration WHERE FullName = & MainFrame. txtSearch. Text & , ConnectDB If MsgBox(Are you sure you want to update this Guest?. , vbYesNo + vbInformation, Update Verification) = vbYes Then rsUpdateNah templates = Templ. Serialize rsUpdateNah FirstName = txtFirstName. Text rsUpdateNah LastName = txtLastName. Text rsUpdateNah Fullname = txtFirstName. Text & & txtLastName. Text rsUpdateNah Gender = cboGender. Text rsUpdateNah RoomChoice = cboRoomChoice. Text rsUpdateNah RoomNumber = cboRoomNumber. Text rsUpdateNah Picture = txtFilePathPic. Text sUpdateNah CompleteDateStarted = Format(cboMonthStarted. Text & / & cboDateStarted & / & cboYearStarted. Text, mm/dd/yyyy) rsUpdateNah CompleteDueDate = Format(cboDueMonth. Text & / & cboDueDate. Text & / & cboDueYear. Text, mm/dd/yyyy) rsUpdateNah. Update rsUpdateNah. Close MsgBox Guest has successfully U pdated. , vbOnly, Apartment Monitoring and Security System Call Clear End If End Sub Private Sub cmeExitAdd_Click() frameRegisterGuest. Visible = False End Sub Private Sub Command2_Click() Dim rsguestview As New ADODB. Recordset If mskDateStarted. Text Then Set rsguestview = New ADODB. Recordset sguestview. CursorLocation = adUseClient rsguestview. LockType = adLockOptimistic rsguestview. CursorType = adOpenDynamic rsguestview. Open Select * from tbl_logs where Date= & mskDateStarted & , ConnectDB Set DataGrid1. DataSource = rsguestview MainFrame. DataGrid1. Columns(0). Width = 2200 Set rsguestview = Nothing End If End Sub Private Sub Enroll_Click() Enrollment. Show vbModal, Me End Sub Public Function GetTemplate() As Object Template can be empty. If so, then returns Nothing. If Templ Is Nothing Then Else Set GetTemplate = Templ End If End Function Public Sub SetTemplete(ByVal Template As Object) Set Templ = Template End SubPrivate Sub Form_Load() Call Clear Call View Dim blob() As Byte Dim rs As New ADODB. Recordset rs. CursorLocation = adUseClient rs. CursorType = adOpenDynamic rs. LockType = adLockOptimistic rs. Open Select * from tbl_registration, ConnectDB blob = rs templates set raw image from MySQL database If Templ Is Nothing Then convert raw image to picture Set Templ = New DPFPTemplate Templ. Deserialize blob End If End Sub Private Sub mnuAddGuest_Click() Call Clear flag = 1 save. Visible = True frameRegisterGuest. Caption = Register here frameRegisterGuest. Visible = True rameSearchGuest. Visible = False frameViewGuest. Visible = False cmdUpdateNah. Visible = False End Sub Private Sub mnuChangeUser_Click() If MsgBox(Are you sure you want to logout and change user? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then Unload Me frmStandbyMode. Show frmLogin. Show End If End Sub Private Sub mnuEditGuest_Click() frameEditGuest. Show End Sub Private Sub mnuInventory_Click() frmInventory. Show End Sub Private Sub mnuLogout _Click() If MsgBox(Are you sure you want to exit program? , vbYesNo + vbInformation, Apartment Monitoring and Security System) = vbYes Then closePort Unload Me rmStandbyMode. Show End If End Sub Private Sub mnuSearchGuest_Click() frameSearchGuest. Visible = True frameRegisterGuest. Visible = False frameViewGuest. Visible = False txtSearch. Text = cboRoomNumberDel. Text = cmdEditt. Visible = False cmdDeletee. Visible = False cmdOpenSesame. Visible = False img_box_del. Visible = False dgGuestDelete. Visible = False End Sub Private Sub mnuViewGuest_Click() Call View End Sub Private Sub ReadTemplate_Click() Dim blob() As Byte CommonDialog1. Filter = Fingerprint Template File*. fpt Set dialog box so an error occurs if dialog box is cancelled. CommonDialog1. CancelError = True On Error Resume Next Show Open dialog box. CommonDialog1. ShowOpen If Err Then This code runs if dialog box was cancelled. Exit Sub End If Read binary data from file. Open CommonDialog1. FileName For Binary As 1 ReDim blob(LOF(1)) Get 1, , blob() Close 1 Template can be empty, it must be created first. If Templ Is Nothing Then Set Templ = New DPFPTemplate Import binary data to template. Templ. Deserialize blob End Sub Private Sub save_Click() Dim rsAddGuest As New ADODB. Recordset rsAddGuest. CursorLocation = adUseClient rsAddGuest. CursorType = adOpenDynamic rsAddGuest. LockType = adLockOptimistic rsAddGuest. Open tbl_registration, ConnectDB If txtFirstName.Text = Or txtLastName. Text = Or cboGender. Text = Or cboRoomChoice. Text = Or cboRoomNumber. Text = Or txtFilePathPic. Text = Or cboMonthStarted. Text = Or cboDateStarted. Text = Or cboYearStarted. Text = Or cboDueMonth. Text = Or cboDueDate. Text = Or cboDueYear. Text = Then MsgBox Missing Fields. , vbCritical + vbInformation, Apartment Monitoring and Security System Else If MsgBox(Are you sure you want to add this Guest?. , vbYesNo + vbInformation, Delete Verification) = vbYes Then rsAddGuest. AddNew rsAddGuest templa tes = Templ. Serialize rsAddGuest FirstName = txtFirstName. Text

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.