You are on page 1of 11

FOLLOW-ME CLOUD: WHEN CLOUD SERVICES

FOLLOW MOBILE USERS

By
CLINTON C
(Register Number: 960814621001)
of
JAMES COLLEGE OF ENGINEERING AND TECHNOLOGY
Navalkadu, Nagercoil 629 852

A PROJECT REPORT
Submitted to the

FACULTY OF INFORMATION AND COMMUNICATION


ENGINEERING
In partial fulfillment of the requirements
for the award of the degree
of
MASTER OF COMPUTER APPLICATION

ANNA UNIVERSITY
CHENNAI 600 025
JUNE, 2017
ii

BONAFIDE CERTIFICATE

Certified that this project report titled XXXX is the bonafide work of

NAME (Register No.: 960813621XXX) who carried out the project under my

supervision. Certified further, that to the best of my knowledge the work reported

herein does not form part of any other project report on the basis of which a degree

was conferred on an earlier occasion on this or any other candidate.

PROJECT GUIDE HEAD OF THE DEPARTMENT


Mr. C.T.K Amarnath, M.C.A, M.Phil. Mr. R.K Ratheesh Lynd M.C.A
Assistant Professor / MCA Assistant Professor / MCA
JAMCET, Nagercoil JAMCET, Nagercoil

Submitted for the Project Viva examination held on

INTERNAL EXAMINER EXTERNAL EXAMINER


iii

DECLARATION

I affirm that the project work titled TITLE being submitted in partial

fulfillment of the award of MASTER OF COMPUTER APPLICATION is the

original work carried out by me. It has not formed the part of any other project work

submitted for award of any degree or diploma, either in this or any other university.

SIGNATURE OF THE STUDENT


NAME
(Register No.: XXXXXXXXXXX)

I certify that the declaration made above by the candidate is true.

SIGNATURE OF THE GUIDE


Mr. C.T.K Amarnath, M.C.A, M.Phil.
Assistant Professor
DEPARTMENT OF COMPUTER APPLICATION
iv

ABSTRACT

The rapid growth in the use of e-commerce applications requires reliable and

automatic personal identification for effective security control. Traditional,

automatic, personal identification can be divided into two categories: token based,

such as a physical key, an ID card, and a passport, and knowledge-based, such as a

password. However, these approaches have some limitations. In the token-based

approach, the token can be easily stolen or lost. In the knowledge-based approach,

to some extent, the knowledge can be guessed or forgotten. Biometrics is an

emerging technology that is used to identify people by their physical and/or

behavioral characteristics and, so, inherently requires that the person to be identified

is physically present at the point of identification. The physical characteristics of an

individual that can be used in biometric Identification/verification systems are

fingerprint, hand geometry, palm print, face, iris, retina and ear. But palm prints are

rich in features such as principal lines, wrinkles and texture features and these

provide stable and distinctive information sufficient for separating an individual from

a large population.
v

ACKNOWLEDGEMENT

First and foremost we concede the surviving presence and the flourishing

refinement of almighty GOD for His concealed hand yet substantial supervision all

through the project.

I am ineffably indebted to our Chairman Dr. James Premkumar, B.Sc.,

M.B.B.S., M.Phil., for giving me this opportunity.

I would like to express my deep and heartfelt thanks to our Principal Prof.

XXXXXXXXXXXX for providing me the opportunity and the facilities to complete

this project work successfully.

I am extremely thankful to Mr. R. K. Ratheesh Lynd, M.C.A, Head of the

Department of Computer Application, for his valuable guidance and support on

completion of this project.

I am very grateful to my internal guide Mr. C.T.K Amarnath, M.C.A,

M.Phil., Assistant Professor, Department of Computer Application, for his

invaluable advices and support in many aspects of this work.

I would also like to express my thanks to all other faculty members for the

valuable help and also thank my parents for their love and encouragement throughout

our career.
vi

TABLE OF CONTENT

CHAPTER TITLE PAGE NO


I INTRODUCTION
1.1 Organization Profile
1.2 Objective

II SYSTEM ANALYSIS
2.1 Existing System
2.2 Proposed System
2.3 Feasibility study

III DEVELOPMENT ENVIRONMENT


3.1 Hardware Environment
3.2 Software Environment

IV SOFTWARE DESCRIPTION
4.1
4.2

V SYSTEM DESIGN
5.1 Data Flow Diagram
5.2 Architecture Diagram
5.3 Data Base Design

VI PROJECT DESCRIPTION
6.1 Problem Definition
6.2 Modules Description
6.3 Source Code
vii

VII SYSTEM TESTING


7.1 Testing Objectives
7.2 Testing Models

VIII PERFORMANCE AND LIMITATIONS


8.1 Conclusion
8.2 Merits of the System
8.3 Limitation of the System
8.4 Future Enhancements

IX APPENDIX
9.1 Screens

REFERENCES
viii

LIST OF FIGURES

FIGURE PAGE
NAME
NUMBER NUMBER
ix

LIST OF TABLES

TABLE PAGE
NAME
NUMBER NUMBER
x

LIST OF ABBREVIATIONS

ABBREVIATION DESCRIPTION
xi

LIST OF SYMBOLS

SYMBOL NAME DESCRIPTION

You might also like