This dissertation discusses developing a mobile application to regulate server centralization. The existing systems for managing servers and clients are complicated and expensive to operate. The proposed system aims to organize servers and clients through both Windows and mobile applications. It will allow users to manage servers and clients through a mobile app from anywhere at any time at low cost. The system will be created using Java, Android, and MySQL. The server and client apps will be developed in Java using socket programming and Windows API commands. The mobile app will be developed in Android. A MySQL database will store data. The system aims to reduce human effort and costs while improving management of servers and clients.
A study of security in wireless and mobile paymentsJamal Meselmani
Master’s Thesis By Ahmed Ali
Mobile payments are increasing in popularity in recent years. New mobile solutions are being developed in the form of
new Internet capable mobile devices such as the IPhone and new wireless networks such as the LTE and WiMAX
networks.
This report will present, explain and compare some of the most popular wireless networks that enable mobile payments,
from a security point of view. The chosen networks are 3G with connection to GSM and WLAN networks. The main
security mechanisms involved in each network, and how they work will be studied. Security requirements and some of the
most important threats each network faces will be presented and discussed. The main purpose of the report is to examine if
mobile payments offer an acceptable level of security to the average user.
Automatic detection of click fraud in online advertisementsTrieu Nguyen
This thesis presents an approach to automatically detecting click frauds in online advertising.
The approach uses a mathematical theory of evidence to estimate the likelihood of a click whether it is fraud or genuine using web log data of a user‟s activities on the advertiser‟s website. One advantage of the proposed approach is the fact that the likelihood can be computed for each incoming click and thus it gives an online computation of the belief that fits well with the dynamic behaviors of users
Detecting fraud in cellular telephone networksJamal Meselmani
A Thesis Presented in Partial Fulfillment of the Requirement for the Degree in "MBA" by Hiyam Ali El Tawashi
Telecommunication fraud is a problem that has grown dramatically over the past ten years.
Fraud become a serious global issue for mobile network service providers, it has
undoubtedly become a significant source of revenue losses and bad debts to
telecommunication industry, and with the expected continuing growth in revenue it can be
expected that fraud will increase proportionally.
The research project therefore, focused on how Jawwal Company managing and detecting
the fraud, in order to modify the current tools for more effective fraud prevention and
detection, for this reason the researcher undertook a set of actions that are reported as
follow:
First step it was necessary to understand the problem of telecom fraud, then to know what
makes people perpetrate the fraud, and which are the most prevalent fraud types that are
occurring, clarifying which is the likely products and services to be attacked, what source
of information to facilitate the fraud, how fraudsters perpetrate the fraud finally explaining
the fraud detection and prevention procedures.
Then apply the study on Jawwal Company as study case, by distributing 200
questionnaires to targeted sections, and analyzing the result which shows that the current
fraud management at Jawwal Company is not efficient and needs to be modified.
1-The main intention of this project is to find the accident spot at any place and intimating it to ambulance through the GPS and GSM networks
2-Global system for mobiles (GSM) technology is used to establish cellular connections.
3-GPS is used to trace the position of the vehicle.
You can download detailed ppt from here
https://adf.ly/XPA3E
In the present era the technology in communications has developed to a very large extent. The communication industries have seen a tremendous increase in last few years which have resulted in installation of large number of towers to increase the coverage area and network consistency. In wireless communication network these towers play a significant role hence failure of such structure in a disaster is a major concern. Therefore utmost importance should be given in considering all possible extreme conditions for designing these towers. In most of the studies, the researches have considered the effect of wind only on the four legged self-supporting towers. In this dissertation, a four legged lattice tower is analyzed and designed along with foundation details.
Vision 360 is an Optical Shop Ecommerce Website
Made for retailers
Major Project MCA
Made by Nayan Gupta and Naina Kesharwani
Detailed report with
Introduction
Analysis
Planning
Design
Methodology
Implementation
Testing
Output
Limitations
Conclusion
Also, there are required figures like ER Diagram, DFD, Use Case, Structural Chart, Class Diagram and Website Screenshots
Matrimony Service Project Report - Nafizul Islam - Software Engineering - Daf...NAFIZULISLAM19335480
ABSTRACT
The "Matrimony Service" project focuses on the development of a web-based platform exclusively tailored for the Bengali community, addressing their distinct requirements and preferences in the realm of matrimonial connections. With the increasing reliance on digital interactions and the shift towards paperless practices, there is a rising demand for a reliable and user-friendly platform in the matrimony domain. Thorough research and extensive feedback from potential users within the Bengali community have been gathered to ensure the system is precisely customized to their needs. The project incorporates open-source tools and technologies to implement a robust and scalable system, which has undergone comprehensive testing to ensure its effectiveness and functionality. Notably, the platform is designed to be intuitive and user-friendly, providing seamless communication and engagement with support for Bengali text. Moreover, the future roadmap of the project includes the integration of smartphone capabilities, enhancing accessibility and convenience for users. The overarching goal of the Matrimony Service project is to provide a secure and inclusive online platform that empowers individuals within the Bengali community to find compatible life partners through a culturally sensitive and user-centric approach.
A study of security in wireless and mobile paymentsJamal Meselmani
Master’s Thesis By Ahmed Ali
Mobile payments are increasing in popularity in recent years. New mobile solutions are being developed in the form of
new Internet capable mobile devices such as the IPhone and new wireless networks such as the LTE and WiMAX
networks.
This report will present, explain and compare some of the most popular wireless networks that enable mobile payments,
from a security point of view. The chosen networks are 3G with connection to GSM and WLAN networks. The main
security mechanisms involved in each network, and how they work will be studied. Security requirements and some of the
most important threats each network faces will be presented and discussed. The main purpose of the report is to examine if
mobile payments offer an acceptable level of security to the average user.
Automatic detection of click fraud in online advertisementsTrieu Nguyen
This thesis presents an approach to automatically detecting click frauds in online advertising.
The approach uses a mathematical theory of evidence to estimate the likelihood of a click whether it is fraud or genuine using web log data of a user‟s activities on the advertiser‟s website. One advantage of the proposed approach is the fact that the likelihood can be computed for each incoming click and thus it gives an online computation of the belief that fits well with the dynamic behaviors of users
Detecting fraud in cellular telephone networksJamal Meselmani
A Thesis Presented in Partial Fulfillment of the Requirement for the Degree in "MBA" by Hiyam Ali El Tawashi
Telecommunication fraud is a problem that has grown dramatically over the past ten years.
Fraud become a serious global issue for mobile network service providers, it has
undoubtedly become a significant source of revenue losses and bad debts to
telecommunication industry, and with the expected continuing growth in revenue it can be
expected that fraud will increase proportionally.
The research project therefore, focused on how Jawwal Company managing and detecting
the fraud, in order to modify the current tools for more effective fraud prevention and
detection, for this reason the researcher undertook a set of actions that are reported as
follow:
First step it was necessary to understand the problem of telecom fraud, then to know what
makes people perpetrate the fraud, and which are the most prevalent fraud types that are
occurring, clarifying which is the likely products and services to be attacked, what source
of information to facilitate the fraud, how fraudsters perpetrate the fraud finally explaining
the fraud detection and prevention procedures.
Then apply the study on Jawwal Company as study case, by distributing 200
questionnaires to targeted sections, and analyzing the result which shows that the current
fraud management at Jawwal Company is not efficient and needs to be modified.
1-The main intention of this project is to find the accident spot at any place and intimating it to ambulance through the GPS and GSM networks
2-Global system for mobiles (GSM) technology is used to establish cellular connections.
3-GPS is used to trace the position of the vehicle.
You can download detailed ppt from here
https://adf.ly/XPA3E
In the present era the technology in communications has developed to a very large extent. The communication industries have seen a tremendous increase in last few years which have resulted in installation of large number of towers to increase the coverage area and network consistency. In wireless communication network these towers play a significant role hence failure of such structure in a disaster is a major concern. Therefore utmost importance should be given in considering all possible extreme conditions for designing these towers. In most of the studies, the researches have considered the effect of wind only on the four legged self-supporting towers. In this dissertation, a four legged lattice tower is analyzed and designed along with foundation details.
Vision 360 is an Optical Shop Ecommerce Website
Made for retailers
Major Project MCA
Made by Nayan Gupta and Naina Kesharwani
Detailed report with
Introduction
Analysis
Planning
Design
Methodology
Implementation
Testing
Output
Limitations
Conclusion
Also, there are required figures like ER Diagram, DFD, Use Case, Structural Chart, Class Diagram and Website Screenshots
Matrimony Service Project Report - Nafizul Islam - Software Engineering - Daf...NAFIZULISLAM19335480
ABSTRACT
The "Matrimony Service" project focuses on the development of a web-based platform exclusively tailored for the Bengali community, addressing their distinct requirements and preferences in the realm of matrimonial connections. With the increasing reliance on digital interactions and the shift towards paperless practices, there is a rising demand for a reliable and user-friendly platform in the matrimony domain. Thorough research and extensive feedback from potential users within the Bengali community have been gathered to ensure the system is precisely customized to their needs. The project incorporates open-source tools and technologies to implement a robust and scalable system, which has undergone comprehensive testing to ensure its effectiveness and functionality. Notably, the platform is designed to be intuitive and user-friendly, providing seamless communication and engagement with support for Bengali text. Moreover, the future roadmap of the project includes the integration of smartphone capabilities, enhancing accessibility and convenience for users. The overarching goal of the Matrimony Service project is to provide a secure and inclusive online platform that empowers individuals within the Bengali community to find compatible life partners through a culturally sensitive and user-centric approach.
As IT student my main responsibility is to introduce new technologies or modify an existing System. I develop this Online Parking Reservation System for RANJAN LANKA IMP. PVT LTD to enhance efficiency, Effectiveness, and responsiveness of the online- parking process and reduce the problems of the business process of RANJAN LANKA IMP. PVT LTD.
1. REGULATE THE SERVER
CENTRALIZATION THROUGH THE MOBILE
APPLICATION
Bachelor of Science in Computer Science and Technology
Dissertation
M. PUVANARAJAN
Computer Science and Technology
Uva Wellassa University of Sri Lanka
September 2013
2. ii
REGULATE THE SERVER CENTRALIZATION
THROUGH THE MOBILE APPLICATION
A dissertation submitted to the
Computer Science and Technology Degree Program,
Uva Wellassa University
In partial fulfillment of the requirements for the award of the
Degree of Bachelor of Science in
Computer Science and Technology
by
MOHANARAM PUVANARAJAN
Registration Number: UWU/CST/09/0034
Computer Science and Technology
Uva Wellassa University of Sri Lanka
September 2013
3. iii
Declaration
I do hereby declare that the work reported in this dissertation was exclusively carried out
by me under the supervision of Mr. Kalinga Ihalagedara. It describes the results of my
own independent research except where due reference has been made in the text. No part
of this dissertation has been submitted earlier or concurrently for the same or any other
degree.
Date: ……….. ………………………
Signature of the Candidate
We/I endorse the declaration by the candidate.
………………………………..
Mr. Kalinga Ihalagedara
Supervisor
Date: ………………….
4. iv
Abstract
Nowadays in Sri Lanka all the industries use several kinds of computers and technologies
to increase the excellence of work and time efficiency. The advanced technologies play a
major role in the organizations. In order to improve the quality in before mentioned areas
the accuracy, reliability and speed of works have to be increased, if the particular
company has to win the competitive market they have to consider all these elements. In
other words, dependency on human effort has to be reduced and new technologies have
to be implemented with low cost.
“Regulate the server centralization through the mobile application” is basically regulates
the server and client rather than existing system. This application completely organizes
the server and client with windows and mobile applications. The existing systems have
complicated process and need high cost to operate there for we may face some difficulties
to access in any places. The new system also includes all relevant basic activities such as
client management, device identification, device management and remote accessing. The
main milestone feature is mobile application. We can manage the server and client
through the mobile application in any time and any place with low cost. The windows
application able to eject the removable device, enable, disable the USB port, who are the
persons login the systems and full access the client using remote access. The mobile
application also include above features.
The entire systems are created using JAVA, Android and MySQL. The server and client
applications were developed using Java. It is using socket programming and windows
API commands. The mobile application is done using Android and the database was
created using MySQL.
5. v
Acknowledgement
In reality no one can succeed without the help of others. It is true regarding my project as
well. First I would like to thank my supervisor from the bottom of my heart, as he is the
one who encouraged me during hard time and offered his noble assistance to make this
project a successful one. And also I take this opportunity to thank my Lecturers, who
shared their valuable ideas and guided me throughout my university life.
I would like to thank Mr. Kalinga Ihalagedara for being the chief supervisor and
accepting my project and providing valuable guidance and advice throughout the project.
Finally it’s my pleasure to appreciate the encouragement and genuine love and constant
support given by my parents, all my colleagues and friends and for all whom I could not
mention by names for every single bit of their assistance and all great moments that I
share with them throughout my years at Uva Wellassa University of Sri Lanka.
6. vi
Table of Contents
Declaration........................................................................................................................ iii
Abstract..............................................................................................................................iv
Acknowledgement ...............................................................................................................v
List of Abbreviation........................................................................................................ vii
Chapter 01 ..........................................................................................................................1
Introduction ....................................................................................................................1
1.1 Background........................................................................................................1
1.2 Motivation...............................................................................................................2
1.2 Goals..................................................................................................................2
1.4. Achievement in brief .............................................................................................3
Chapter 02 ..........................................................................................................................4
Literature Review...........................................................................................................4
2.1 Introduction.............................................................................................................4
2.3 Existing System of Syslog......................................................................................4
2.4 Development of Syslog...........................................................................................4
2.4.1 Main Tasks of the proposed IT solution..............................................................4
Chapter 03 ..........................................................................................................................5
Methodology ...................................................................................................................5
3.1 Technology adopted................................................................................................5
3.2 Approach.................................................................................................................5
3.3 Development stages................................................................................................6
Chapter 04 ..........................................................................................................................7
Design ..............................................................................................................................7
4.3 Functional overview ...............................................................................................8
4.4 Functional requirements .........................................................................................8
4.4 System Design .........................................................................................................12
Chapter 05 ........................................................................................................................12
Implementation.............................................................................................................12
5.1 Introduction...........................................................................................................12
5.2 System functionalities...........................................................................................13
Chapter 6 ..........................................................................................................................14
Testing and Evaluation ................................................................................................14
6.1 Introduction...........................................................................................................14
6.2 Testing .....................................................................................................................14
Chapter 07 ........................................................................................................................15
7. vii
Conclusion and future work........................................................................................15
7.1 Conclusion............................................................................................................15
Reference...........................................................................................................................17
Table of figures
Figure 1: 4.1 Over view of the structure..............................................................................7
Figure 2: 4.2 Client configuration........................................................................................9
Figure 3: 4.3 Server configuration.....................................................................................10
Figure 4: 4.4 Server and mobile link pattern .....................................................................11
Figure 5: 4.5 Whole structure of the system......................................................................12
List of Abbreviation
IT: Information Technology
LAN: Local Area Network
GUI: Graphical User Interface
8. 1
Chapter 01
Introduction
1.1 Background
In modern world, technology has become one of the major essential parts of human life.
Most of the systems are available with the computerized technique. At present not only IT
related fields but also many fields like Education, Business, Entertainment, etc. are
working like joined hands with the computerized automated technologies. With these
available facilities we can save our time and also can reach at any place through a small
devices.
“Regulate the server centralization through mobile application” is mainly focuses on
the server system that has been controlled and regulate by the mobile application. If we
consider the LAN system we can manage all the clients by the server. That means if we
login or insert any devices in the client computer, then the server can automatically detect
the device and give message to the server. Then we can easily handle that computer or if
we want, we can block the function of the device as well as we can control and manage
the server by the mobile in any place and any time. That means the mobile also act like a
server. We can control all the client computers using the server and mobile application
and also we can identify how many clients were logged in and who are the persons logged
in the system in a time. If we need we can remotely access and control the clients.
If we use this application, we do not need to spend much time in monitoring the
clients by going behind them. We can get all the information in the mobile and access the
server using the mobile. The system will play a critical role to manage the clients and
servers.
9. 2
1.2 Motivation
Most of the IT sectors are using computers in developing countries and moving forward
to high end technical systems in developed countries. There were many software vendors
developing solutions for different sectors and also open source solutions are coming up
these days. As each individual organizations have its own software solution.
“Regulate the server centralization through mobile application” is mainly focus on the
server system that has been controlled and regulate by the mobile application. If we
consider the LAN system we can manage all the clients by the server. That means if we
login or insert any devices in the client computer, then the client can automatically detect
the devices and give message to the server and as soon as it will be displayed on the
mobile screen. Then we can easily handle that computer or if we want, we can block the
function of the device as well as we can control and manage the server by the mobile in
any place and in any time. That mean the mobile also act like as a server. We can control
all client computers using the server and mobile application.
This is a new application, which can facilitate the regulators at any time. The new
arena open up new ventures oriented programs in IT related companies and lead a path to
other software developers to generate more advanced version with this idea. If we use this
application, we do not need to spend the time in front of the server. We can get all the
information in the mobile and access the server using the mobile.
1.2 Goals
• Easy and Fast client management in any time at place
• At low cost, we can reap high effective solutions
• Easily access the client and control the clients through the mobile application in
any place at any time.
• Remote access for clients, No need for much configuration to access the clients.
• Easy configuration and easily remote access to the computers.
10. 3
1.4. Achievement in brief
Developed system is mobile-based system to manage the client and server, which is
identifying and rectifying existing issues related to manage the server and clients.
System features includes,
• Server Application
• Keep the configured client information
• Display the login clients
• Manage the clients
Remote Access
Shutdown
Logoff
Eject Device
Enable, Disable USB port
• Client Application
• Configuration to server
• Response the server command
• Mobile application
• Notify the client activities
• Transfer the user command to server
11. 4
Chapter 02
Literature Review
2.1 Introduction
This chapter examines the current system in “Syslog Shell Control Box”. To study the
current system I chose the “Syslog Shell Control Box” and the information regarding the
current system was taken from there.
2.3 Existing System of Syslog
Shell Control Box is an activity monitoring appliance that controls privileged access to
remote servers and networking devices and records activities in movie-like audit trails
that can be searched and replayed
2.4 Development of Syslog
System has been developed according to “Syslog Shell Control Box”. Identified existing
system issues and developed system avoid and rectifying those problems and provides
best solution for server client management.
2.4.1 Main Tasks of the proposed IT solution
• Remote accessing for configure clients through the server
• Log creating for client activities for any time
• Device controlling for clients and configuration
• Recording and managing the client activities and privileges
12. 5
Chapter 03
Methodology
3.1 Technology adopted
• Windows application
JAVA
• Mobile application
o Android Technology (JAVA).
• Database
o MySQL
This system was developed to solving issues by client and server management. The client
windows application always check the new devices are plugin or not and if device is
plugin send the message to server and also waiting for server responsible. If it is received
then do the actions according to the server command. The server applications always
check the client activities and notify the user. If user gives any order that application pass
that order to that particular client. The mobile applications also do the same server
activities.
3.2 Approach
Development method: Throwaway Prototyping
Throwaway prototyping best suits in the following occasions,
• For rapidly changing requirements
• When there is a strong demand for the development speed
• Suitable when the developers are uncertain about the optimal architecture
• In occasions, the project objectives are identified but the detailed
requirement definitions are not being defined
13. 6
As the project need to be rapidly developed with a given time frame the
evolutionary prototyping model will highly assist it. Another advantage that can be
gained is that as the system is developed in component basis the model will support
that aspect as well. The main reason for selecting this model is that the author is
uncertain of the best techniques for the system and therefore creating a prototype
will be more appropriate. Further as the documentation can proceed with system
development phase it will be an added advantage. Hence it is evident that
throwaway prototyping is the most appropriate development methodology to
proceed with the project as it assist in most prominent project factors as project
speed, visibility and documentation.
3.3 Development stages
1. Preliminary Study
Studied on project development regarding server, client and mobile
applications, existing process, etc. uses observation method.
2. Submission of Proposal and approval
Develop the project proposal on the problem identified by proposing the IT
driven solution.
3. Logical design and creating database
Designed the ER diagrams using CASE Studio software, designed the
interfaces and develop the codes using JAVA with eclipse IDE
4. Physical designing
Create the database and tables using “wamp server phpmyadmin” GUI tool.
5. Constructing the final system
Implementation the application using technologies such as JAVA, MySQL
and Android.
6. Evaluation and testing
Tested the system using several test cases and evaluation
14. 7
7. Documenting the final thesis and demonstration
Writing of final dissertation and Presentation and demonstration of the
completed system is to be completed.
Chapter 04
Design
Identify and rectify existing issues related to requirements sharing of transportation and
the project looks at solving these issues by proposing both a business as well as an IT
solution
Clients Clients
Server
Mobiles
Figure 1: 4.1 Over view of the structure
15. 8
4.3 Functional overview
This system is a completely consist simple and mobile based solution. It could be use by
client server management and server client controlling through the mobile. There are
three applications are needed. They are server application, client application and mobile
application.
4.4 Functional requirements
The statement of services system should provide, how the system should react, behave
in particular situations are functional requirements. The functional requirements of the
developed system are;
• Client application
• Client configuration
• Start service
• Received command
• Remote connection
• Server application
• Accept client request
• Receive the client messages
• Pass the Administrator order to client
• Remote connection
• Mobile application
• Notify the client activities
• Pass the user order to server
The main expectation of this system is to regulate the client or simply monitor internal
work and manage the server and client through the mobile application. So the following
diagram will give a brief idea on how the server, client and mobile interact with the
system.
16. 9
1. Client configuration
This is the function for configure the client to server. In this
function used server IP address and server port number to
configure and store the information in the own database until
reconfiguration.
2. Start service
This is the function for always check the client any new removable
devices are plugin or unplug in and pass the information to each
and every time.
3. Received command
This is the function for always checking the server responsible and
does the function according to the server responsible.
4. Remote connection
This is the function for connect the remote to server. This is always
capturing the screen and sends to server, receives the server
command and do the server order.
Store the information
Configure
Server Responsible
Figure 2: 4.2 Client configuration
17. 10
5. Accept client request
This is the function for accept the client request and store the
configured client information in the database.
6. Receive the client messages
This process, always waiting for the clients responsible. If client
sent the any message this function receive and notify to
administrator.
7. Pass the Administrator order to client
This function passes the administrator message to particular client
or set of clients
8. Remote connection
Connect the selected client or clients to remote access without any
permission and view all remotely connected clients.
Store the client information
Clients send the information’s
Figure 3: 4.3 Server configuration
18. 11
9. Notify the client activities
This is the mobile application for notify the client activities for
every time.
10. Pass the administrator order to server
Pass the administrator order to server immediately.
Figure 4: 4.4 Server and mobile link pattern
19. 12
4.4 System Design
The system can be divided in to three main parts, as server application, client application
and mobile application
Chapter 05
Implementation
5.1 Introduction
This section describes implementation of the system and the layouts of the proposed
Regulate the server through the mobile application. It includes some of the graphical
interfaces of the system.
Client database
Client
Server database
Server Mobile
Figure 5: 4.5 Whole structure of the system
20. 13
5.2 System functionalities
1. Client application
a. Configuration
Administrator can only configure the system. If it is configure
successfully store the information in the local database.
b. Start service
Administrator can only start and stop the services. It is always
checking.
2. Server application
a. View clients
View the entire configured client with basic details
b. Device plugin clients
This form only view device plugin clients with hostname and login
username
c. Client manager
Display the all control tools. There for shutdown, logoff, restart, enable,
disable, eject and Remote access.
3. Mobile application
a. View form
View the all client activities with basic information.
b. Control box
View the control tool kits.
21. 14
Chapter 6
Testing and Evaluation
6.1 Introduction
Testing is the process of executing a system with the intention of finding errors. The main
objective is to find errors as possible in unit/component, integration and system testing. It
causes to prevent the errors of the system as well as it adds value to the system by
confirming user requirements.
6.2 Testing
This system consists mainly of three parts, which are Server application, client
application and mobile application. Those three parts were tested right from the
beginning. Testing equal to the white box testing was carried right from the beginning.
When the coding of each component is completed those codes and behavior of the system
components were tested.
After the implementation of the system, the system was tested to check whether it
behaves as specified. Most of the functions worked correctly according to the
requirement, which is equal to a black box testing.
Given below are the descriptions of some test cases carried out in the system
1. Client application
• Client configuration
Configuration process worked properly. If already configured display the
configured details and if not exist ask for configuration
22. 15
• Start services
Check the available devices and check new devices plugin or not. If plugin pass
the message to server and response for the server order to properly
2. Server application
• Configure client view
View the configure client information with basic information
• Device plugin client
It is view device plugin client with login user information. It is also working
properly
• Client manager
It is pass the command server to client properly
• Remote connection
It is connect the client and view the client in the server.
Chapter 07
Conclusion and future work
7.1 Conclusion
I am pretty sure about this project that this will bring a considerable change in the
field of Server client management. First of all I am happy to conclude that this
project allows easy and fast client management in any time and can be accessed
23. 16
from any part of the world. This will reduce the workload of the organizations that
are messing up with improper client and server management.
Low cost is the key achievement in this project. From the beginning of the project
I was damn sure about one fact. That is this system should be available to
everyone without the economical barrier. There for this system was designed in
such a way that the implementation and maintenance can be done at low cost.
The use of mobile application within this project has opened a new era in this
field. In this fast developing world the usage of smart phones increasing rapidly at
the expense of computer usage because this project was designed by considering
the future trend of the techno world in mind.
Remote accessing is a mile stone achievement to this project. In many ways this
saves time when compared with the traditional systems. This reduced the man
power by totally cancelling the need for monitoring each and every uses in front
of the client by going after them, reduced the work load of checking what are the
devices plugged-in to the systems, who are the persons using the systems, is any
un law full activities are done through the system.
As this system was thoroughly checked and well-structured over many times and
all the possible errors and bugs were debugged. There for I am happily concluding
that this system developed by me will work for my clients without any error and
surely it will accelerate the achievement of users.
24. 17
Reference
1. Yong mook, M (2010). How to get the mac address, From:
http://www.mkyong.com/java/how-to-get-mac-address-in-java/
2. Vanlalhmangaiha, K (2006). Getting Hardware details, Processor details, From:
http://www.coderanch.com/t/567735/java/java/hardware-details-processor-type-
java
3. Paul-Benoit, L (2008). Simple chat program. From:
http://www.dreamincode.net/forums/topic/259777-a-simple-chat-program-with-
clientserver-gui-optional/
4. Anurag.J (2013). How to connect MySQL database using JAVA. From:
http://mrbool.com/how-to-connect-with-mysql-database-using-java/25440