Figure 6 - uploaded by Sundaaresaan Chi
Content may be subject to copyright.
Performing validation on login screen  

Performing validation on login screen  

Source publication
Article
Full-text available
Android is a current trend when it comes to smartphone usage in the current market. Most of the users’ community of Android the young generation, most of them attend either college or school. In this paper we describe the original work done in the development of Android application for content query from Fedena (an open source School management sys...

Context in source publication

Context 1
... Figure 6 shows the snapshot of the login screen validating the user credentials when the user clicks on Login button. The data retrieved from the user is sent to the server through POST method where the validation takes place through a PHP script invoked by the request. ...

Similar publications

Article
Full-text available
World Wide Web (WWW) has increasing information, and the websites usage also increasing rapidly. The web server records the users’ search activity on the web and store it in the server log. When these web logs properly mined, lot of useful information can be provided for the decision making. Thus the process of accessing relevant information become...
Article
response time (RT) has a significant feature in both of traditionally response time (TRT) with physical (face-to-face) Businesses, and Automated response time (ART) with web-based businesses. The TRT is very primitive in physical (face-to-face) business and depended on human activity with devices reliability as well. TRT is very changeable from one...
Article
Full-text available
This paper presents the design and building of a Web Server to command, control and monitor at a distance lots of industrial or personal equipments and/or sensors. The server works based on a personal software. The software can be written by users and can work with many types of operating system. The authors were realized the Web server based on tw...
Article
Full-text available
In traditional virtualization systems Virtual Machines (VMs) are usually over-provisioned for guarantying peak performance of hosting applications and thus waste a lot of computing resources. Although virtual machine consolidation can save power consumptions, it also increases the power intensity in a rack and makes the servers more prone to failur...
Article
Full-text available
We previously developed an agent system with a function to access Web servers via HTTP and to operate flexibly according to users' requests with agent configuration files (Profiles) to autonomously manage Web-based sensor nodes such as Field Servers. In the Profiles, a combination of agent commands and production rules are described in order to res...