Top Essay Writers
Our top essay writers are handpicked for their degree qualification, talent and freelance know-how. Each one brings deep expertise in their chosen subjects and a solid track record in academic writing.
Simply fill out the order form with your paper’s instructions in a few easy steps. This quick process ensures you’ll be matched with an expert writer who
Can meet your papers' specific grading rubric needs. Find the best write my essay assistance for your assignments- Affordable, plagiarism-free, and on time!
Posted: June 26th, 2023
_______________________________
CHAPTER 1: INTRODUCTION
We get a lot of “Can you do MLA or APA?”—and yes, we can! Our writers ace every style—APA, MLA, Turabian, you name it. Tell us your preference, and we’ll format it flawlessly.
_______________________________
The Purpose of this Project is to introduce a system through which a hotel can manage their guests’ access controls by providing them a desktop application. While the guests just have to install a mobile application, which will replace all the keys or identification cards and unifies them under a mobile app. By using these applications hotels can minimize the interaction of their guest from the staff and management. This application therefore it would be easier for guests to make their stay in hotel more pleasant, time saving and inspire them to use the service again.
Nowadays, the numbers of problems with conventional keys such as building break-in cases are increasing, and these problems are increasingly severe from time to time. An access control system which is proposed serves as necessity prevention in order to reduce the number of building break-in and other problems, also at the same time, it provides a safer alternative in security perspective. An access control system is simply defined as any technique used to control passage into or out of any area or any entry, such as residential area, office and others. The evolution of science and technology creates a new generation of the access control system, known as digital access control system.
Today Smart phones are so commonly used, that we don’t even have to explain its popularity but all of its features either not being known or not being used. NFC (Near Field Communication) technology is one of them. As far as its business value is concern this technology is under process of adaption in many Sectors for e.g. (Banking (Smart payments), different Firms, Hospitals, and Hotels for access control and attendance purpose, etc.). Of course, locks and keys have their drawbacks. Locks can be picked. Keys can be lost. They don’t allow access rights to be easily transferred. They don’t provide any additional data, such as who gained access and when. And perhaps most significantly, physical locks and keys have limited applications.
Totally! They’re a legit resource for sample papers to guide your work. Use them to learn structure, boost skills, and ace your grades—ethical and within the rules.
For several years, there have been NFC-enabled locks that let you gain access to your home or business with a tap of your phone. There are also NFC solutions that can simplify flexible access control for cabinets and drawers. But that’s only the beginning. Because NFC can bring both security and intelligence to physical objects, it can do much more than traditional access control.
For example, NFC lets you bypass the long waiting line at the hotel check-in desk and go straight to your room after a long day’s travel. Inexpensive NFC tags attached to luxury goods and collectibles can confirm their authenticity to protect owners’ investments.
So we are considering a hotel’s system for this project. This project contains an android application that uses NFC utility of a device to Figure 1.1 NFC enabled access control
Starts at $10/page for undergrad, up to $21 for pro-level. Deadlines (3 hours to 14 days) and add-ons like VIP support adjust the cost. Discounts kick in at $500+—save more with big orders!
Control Access in different areas of Hotel and
Provide different types of services for the guests which are using this application. For example room service, news/events, and dinner/lunch. On the other hand for the staff and admin there is a desktop application through which the users (it could be an admin, receptionist or a kitchen panel user) would be maintaining data of their guests.
The mobile application includes the features of different packages/deals of different places with in the hotel like rooms, gym, pool, parking, etc. Even the user can do an online booking on the same application after which the costumer gets an auto generated unique ID from the server, which would be the identity of guest for the hotel facilities. Once the guest is registered, now he/she can avail the services of hotel. Guests can give suggestions and can query any question using this application, which would be entertained by staff or management. Please refer to Figure 1.1.
Near Field Communication(NFC) is a set communication protocol, belongs to the family of Radio Frequency Identification(RFID) that allows you to share small payloads of data between NFC Tag and Smartphone device or two Smartphone devices, to establish communication by bringing them within about 5 cm (2 in) of each other. It’s a form of short range wireless communication, powered through modulated magnetic field.
100%! We encrypt everything—your details stay secret. Papers are custom, original, and yours alone, so no one will ever know you used us.
In 2004, Nokia, Sony, and Philips came together to form the NFC Forum. This group is dedicated to promoting the security, ease of use, and popularity of near field communication. In 2006, the specifications for “smart” posters were created. Smart posters hold information that an NFC compatible device can read when passed over it.
The first NFC-compatible cell phone, the Nokia 6131, also surfaced during this time. As the years passed, more specifications emerged and the technology grew from payment methods to sharing videos, links, and game invites between smart phones and other NFC devices. Android produced its first NFC phone, the Samsung Nexus S, in 2010. Today the NFC markets are most dominant in Europe, Asia, and Japan, though the United States is also seeing rapid growth in this field. It is estimated that NFC will soon evolve into a popular form of payment and data exchange technology in the United States.
Bluetooth and Wi-Fi seem similar to near field communication on the surface. All three allow wireless communication and data exchange between digital devices like smartphones. Yet near field communication utilizes electromagnetic radio fields while technologies such as Bluetooth and Wi-Fi focus on radio transmissions instead.
Devices using NFC may be active or passive. A passive device, such as an NFC tag, contains information that other devices can read but does not read any information itself. Think of a passive device as a sign on a wall. Others can read the information, but the sign itself does nothing except transmit the info to authorized devices.
Nope—all human, all the time. Our writers are pros with real degrees, crafting unique papers with expertise AI can’t replicate, checked for originality.
Android-powered devices with NFC simultaneously support three main modes of operation:
Reader/writer Mode, allowing the NFC device to read and/or write passive NFC tags and stickers.
P2P mode, allowing the NFC device to exchange data with other NFC peers; this operation mode is used by Android Beam.
Card emulation mode, allowing the NFC device itself to act as an NFC card. The emulated NFC card can then be accessed by an external NFC reader, such as an NFC point-of-sale terminal.
Our writers are degree-holding pros who tackle any topic with skill. We ensure quality with top tools and offer revisions—perfect papers, even under pressure.
Devices using NFC may be active or passive. A passive device, such as an NFC tag, contains information that other devices can read but does not read any information itself. Think of a passive device as a sign on a wall. Others can read the information, but the sign itself does nothing except transmit the info to authorized devices.
NFC is most commonly associated with the “mobile wallet” the idea that your Smartphone will replace your cash and credit cards. In one tap or wave of your phone, you can pay for your groceries and redeem offers or coupons. Google Wallet, partnering with MasterCard PayPal, is one example. You can store all major credit and debit cards in Google Wallet and get a “virtual MasterCard” that pays for your purchases in-store,
Beyond mobile payments, though, there are a wide number of uses for NFC, including:
Compared to other short-range technologies, NFC has the following advantages:
Experts with degrees—many rocking Master’s or higher—who’ve crushed our rigorous tests in their fields and academic writing. They’re student-savvy pros, ready to nail your essay with precision, blending teamwork with you to match your vision perfectly. Whether it’s a tricky topic or a tight deadline, they’ve got the skills to make it shine.
Bluetooth).
SPG Keyless will go live in ten locations in Beijing, Hong Kong, New York, Los Angeles and Doha on November 5 and will be available to members of the Starwood Preferred Guest (SPG) loyalty program at Aloft, Element and W hotels.
“SPG Keyless is available to SPG members who book a hotel room through one of Starwood’s channels,” the hotel chain explains. “SPG members must register their phone once through the SPG app and allow push notifications.
Once you have the SPG app, you’ll be directed to this page once you click the “SPG Keyless Registration” on the home screen of your SPG app.
Guaranteed—100%! We write every piece from scratch—no AI, no copying—just fresh, well-researched work with proper citations, crafted by real experts. You can grab a plagiarism report to see it’s 95%+ original, giving you total peace of mind it’s one-of-a-kind and ready to impress.
SPG Keyless is compatible with iPhone 4s and above running iOS 8 and above and select Android devices running Flavour 4.3 and above. Member must have an spg.com account and login set up. Member must have a valid email address, a valid credit card and a registered mobile device. Reservation must be made for only one room and booked through a Starwood channel
“After ensuring his/her Bluetooth is enabled, the guest simply opens the SPG app, holds the Smartphone to the door lock, waits for the solid green light and enters the room.”
NFCporter Key is ONLY compatible with NFCporter or IMAporter HW. If you do not own an IMAporter Reader, do not download this app.
NFCporter is a system enabling users to control door, garage gates or attendance terminals with their mobile phones. The mobile phone therefore easily replaces all identification cards and unifies them under a mobile app. To ensure right function of the system, it is necessary to install an identification system reader compatible with NFCporter app.
Yep—APA, Chicago, Harvard, MLA, Turabian, you name it! Our writers customize every detail to fit your assignment’s needs, ensuring it meets academic standards down to the last footnote or bibliography entry. They’re pros at making your paper look sharp and compliant, no matter the style guide.
The application is designed for mobile phones with integrated NFC technology. This technology allows the mobile phone to communicate with a contactless reader and to identify the user.
An integral part of the system is a contactless NFCporter reader available for purchase at http://www.nfcporter.com/buy
• Open door by tapping it with a mobile phone
• Replaces identification cards
For sure—you’re not locked in! Chat with your writer anytime through our handy system to update instructions, tweak the focus, or toss in new specifics, and they’ll adjust on the fly, even if they’re mid-draft. It’s all about keeping your paper exactly how you want it, hassle-free.
• Unifies identification on various systems into mobile phone
• Is compatible with majority of identification systems
The ‘TapToGo’ project will meet the following objectives:
It’s a breeze—submit your order online with a few clicks, then track progress with drafts as your writer brings it to life. Once it’s ready, download it from your account, review it, and release payment only when you’re totally satisfied—easy, affordable help whenever you need it. Plus, you can reach out to support 24/7 if you’ve got questions along the way!
Figure 1.2 general overview
_______________________________
Need it fast? We can whip up a top-quality paper in 24 hours—fully researched and polished, no corners cut. Just pick your deadline when you order, and we’ll hustle to make it happen, even for those nail-biting, last-minute turnarounds you didn’t see coming.
CHAPTER 2
LITERATURE REVIEW
________________________________
In today’s world, most of mobile devices are equipped with wireless modules, which can be used to solve the problems which we face with keys. Almost all these technologies are equipped with Bluetooth and infrared, among which the most recent technology is Near Field Communication (NFC).
The technologies used to learn to make the FYP (Final Year Project) more successful are described in this section with their details. These technologies are the important aspect for making successful project. The technologies are:
Absolutely—bring it on! Our writers, many with advanced degrees like Master’s or PhDs, thrive on challenges and dive deep into any subject, from obscure history to cutting-edge science. They’ll craft a standout paper with thorough research and clear writing, tailored to wow your professor.
JavaScript is the main important key feature of this project. This is the open source language provided many. JavaScript is commonly placed into HTML or ASP file, and runs directly from the web pages.
It is utilized to perform to tasks such as printing the time and date, create a calendar, or the tasks that are not possible through plain HTML. You can create dynamically updating content, control multimedia, animate images, and pretty much everything else. Here are some source from which are learning JavaScript:
Bootstrap is a front-end framework that is developed to support creating dynamic websites and web applications. It is the one of the most preferred front-end framework as it aids an easy and fast processing to develop a website.
Bootstrap gives the developer the flexibility to develop. It’s a CSS framework with predefined classes for layout using its grid system. Here some source where we are learning Bootstrap:
We follow your rubric to a T—structure, evidence, tone. Editors refine it, ensuring it’s polished and ready to impress your prof.
Firebase is a real-time backend for applications. It is based on NOSQL, which means it does not support SQL queries that were used to interact with the database. It is a real-time database which serves users to interact with each other in real-time. The developer do not need to worry about writing server side code, handling the real-time environment is up to the developer which he can manipulate in whatever way he wants. Data is always synced with other clients over the network and remains available when offline.
The understanding of how firebase works is important to learn so we know what we can or cannot do when using this technology. It maintains the local copy of data structure and when users wants to exchange information with each other it simply changes the local copy and then it propagates the changes to other users.
Firebase is a no SQL based real-time database. Learning firebase is important because it will provide real-time database for our application so developers do not need to write the backend of the application database.
Send us your draft and goals—our editors enhance clarity, fix errors, and keep your style. You’ll get a pro-level paper fast.
The learning phase of our project includes following firebase features:
Android software development is the process by which new applications are created for the Android operating system. Applications are usually developed in Java programming language using the Android software development kit (SDK), but other development environments are also available.
The Android software development kit (SDK) includes a comprehensive set of development tools. These include a debugger, libraries, sample code, and tutorials. Currently supported development platforms include computers running Linux (any modern desktop Linux distribution), Mac OS X 10.5.8 or later, and Windows 7 or later. As of March 2015, the SDK is not available on Android itself, but software development is possible by using specialized Android applications
The Atmel ATmega328/P is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. By executing powerful instructions in a single clock cycle, the ATmega328/P achieves throughputs close to 1MIPS per MHz. This empowers system Designed to optimize the device for power consumption versus processing speed.
High Performance, Low Power Atmel®AVR® 8-Bit Microcontroller Family
Yep! We’ll suggest ideas tailored to your field—engaging and manageable. Pick one, and we’ll build it into a killer paper.
Figure 2.1 Arduino ATMega328p
The PN532 is the most popular NFC chip, and is what is embedded in pretty much every phone or device that does NFC. It can pretty much do it all, such as read and write to tags and cards, communicate with phones (say for payment processing), and ‘act’ like a NFC tag. If you want to do any sort of embedded NFC work
Yes! Need a quick fix? Our editors can polish your paper in hours—perfect for tight deadlines and top grades.
Sure! We’ll sketch an outline for your approval first, ensuring the paper’s direction is spot-on before we write.
Definitely! Our writers can include data analysis or visuals—charts, graphs—making your paper sharp and evidence-rich.
______________________________
CHAPTER 3
SOFTWARE AND HARDWARE
REQUIREMENT
_______________________________
This chapter described the hardware, software analysis and requirements for need this application run successful.
The following is the software requirements for TapToGo are include:
The supported operating system for TapToGo is the following:
Windows 7,8,10 and above |
Linux |
MAC OSX 10.9.5 and above |
Table 3.1 Supported Operating System
Android 4.4 or Above version |
We’ve got it—each section delivered on time, cohesive and high-quality. We’ll manage the whole journey for you.
Table 3.2 Supported Mobile Operating System
TapToGo prerequisite installer installs the following software:
The following software’s are:
Yes! UK, US, or Aussie standards—we’ll tailor your paper to fit your school’s norms perfectly.
Below list of tables describe the minimum and recommended hardware requirements for the deploying the project.
Components | Minimum | Recommended |
Processor | 3.0 Gigahertz (GHz) | 1.5Gigahertz (GHz) |
RAM | 4 gigabyte (GB) | 2 gigabyte (GB) |
Hard Disk | 250 megabyte (MB) available disk space | 200 megabyte (MB) available disk space |
Display | 1024 x 768 | 1024 x 768 or higher resolution |
Network | 512 kilobits per second (Kbps) | 1 megabit (MB) or faster |
Table 3.3 hardware requirements for PC
Components | Minimum | Recommended |
ROM | 20 megabyte (MB) available disk space | 60 megabyte (MB) available disk space |
RAM | 1 gigabyte (GB) | 2 gigabyte (GB) |
Table 3.4 hardware requirements for Mobile Devices
NFC Reader PN532 |
Microcontroller Ardino Atmega 328p (8-bit) |
Table 3.5 hardware requirements for NFC Devices
If your assignment needs a writer with some niche know-how, we call it complex. For these, we tap into our pool of narrow-field specialists, who charge a bit more than our standard writers. That means we might add up to 20% to your original order price. Subjects like finance, architecture, engineering, IT, chemistry, physics, and a few others fall into this bucket—you’ll see a little note about it under the discipline field when you’re filling out the form. If you pick “Other” as your discipline, our support team will take a look too. If they think it’s tricky, that same 20% bump might apply. We’ll keep you in the loop either way!
For the TapToGo web application you can use any of the following supported web browsers:
Google Chrome 30.1 and above |
Internet Explorer 10.0 and above |
Safari (Latest Version) |
Mozilla Firefox (Latest Version) |
Table 3.6 Supported Web Browsers
Our writers come from all corners of the globe, and we’re picky about who we bring on board. They’ve passed tough tests in English and their subject areas, and we’ve checked their IDs to confirm they’ve got a master’s or PhD. Plus, we run training sessions on formatting and academic writing to keep their skills sharp. You’ll get to chat with your writer through a handy messenger on your personal order page. We’ll shoot you an email when new messages pop up, but it’s a good idea to swing by your page now and then so you don’t miss anything important from them.
User documentation includes:
The following assumptions are made:
CHAPTER 4
METHODOLOGY
_________________________________
This chapter will specifically cover the whole methodology about our project which will be followed by us to a complete success. In this project we use agile model of SDLC (Software Development Life Cycle), we will be using scrum methodology and sprints.
The development processes in each scrum are to be present below:
Figure 4.1 Software Development Life Cycle) model
The start and very first phase is planning, which is most valuable phase of any development process and will determine the success or failure of the project.
Arranging period of the product improvement model is one of the most basic stages, in this stage we arranged, and surveyed the necessities and how to handle the issues confronted amid the advancement procedure of the project ‘TapToGo’ extend.
The principle aim of this stage is to asses, expand, characterize, arrange, and build up the Project
The things which will be accomplished through this eliminate are well perspectives and exercises required to harden the project prosperity and make an effortlessly justifiable movement of arrangements.
The Deliverables which will be given toward the end of the project (which are recorded in our extend proposition) are:
UI (User Interface): The principal deliverable which demonstrates that how our project looks like in this segment. Characterize every last capacity that gives enough thought to client that how our application looks like.
Diagrams (UML, DFD): Define your project’s usefulness by outlines and work process like USECASE, SEQUENCE, FLOWCHART, and DFD ought to be drawn in such way that they will portray your project’s fundamental topic.
Security check: In this area security of the project is measured on the off chance that we neglect to determine the security issues so user will dependably want from utilizing your item. Security keeps an eye on Application through which guarantee the project is safe from malfunctions.
The parts which are appointed in our sanction are expressed as:
Syed Sumair and Muhammad Azmul Haq will mostly focusing on the Planning, Requirement, Analysis, Coding, Testing, and Deployment wile Abdul Moiz will take part in Designing and Maintenance of the project.
Since we are following a scrum based agile model, the task and activities change after each sprint, the tasks are assigned by the group leader.
Toward the end of every sprint, the status of project is looked into, and the endorsement to continue to the following. This procedure is on the other hand rehashed in the following sprint.
The conclusion for the procedure can be expressed as that toward the end of every sprint, an arrangement of UML charts will be conveyed so that the following stage can be actualized easily. Documentation will likewise be dealt with at the examination stage also. We also figure out what will be built and how it should be built, how much it will likely cost to build after analyzing requirement analysis.
In every scrum’s planning stage it will be assessed that how every one of the necessities can be changed into definite determinations which will cover all parts of the framework, moreover as yet taking after the fundamental prerequisites of the framework. The evaluation and getting ready for security dangers which can prompt to framework’s disappointment of each scrum will be done here.
Toward the end the objective of the planning stage is to cover the necessities into totally particular and itemized framework outline determination. In the event that the plan of the framework is acknowledged at that point the scrum can continue to advancement stage.
The deliverables for the necessity examination would be, which are expressed in our sanction of the project, and the case of every deliverable is connected underneath:
Note: Not these deliverables are relevant for the Requirement Analysis in each sprint.
The main conclusion for the procedure can be expressed as that toward the end of every sprint, an arrangement of UML charts will be conveyed so that the following stage can be executed effortlessly. Documentation will likewise be dealt with at the investigation stage too.
Our main purpose in designing is to transform specific requirements identified during previous phases, into a detailed system architecture which is feasible, robust and brings value to the organization.
In every scrum’s outlining stage it will be assessed that how every one of the necessities can be changed into point by point details which will cover all parts of the framework. The appraisal and anticipating security issues which can prompt to project’s disappointment of each scrum will be carefully checked here.
Toward the end the objective of the planning stage is to cover the prerequisites into totally particular and specific framework plan detail. On the off chance that the outline of the framework is acknowledged at that point the scrum can continue to advancement stage.
Our fundamental reason in designing phase is to change particular necessities distinguished amid past stages, into a point by point framework which is practical, powerful and conveys esteem to the association.
Plans are developing on a continuous basis but they’re not characterized in advance. Our general framework configuration will develop after some time, to satisfy new necessities, exploit new innovations as suitable. Starting design demonstrating done at earliest reference point of our ongoing project which will be sufficient to get our group going.
Then comes the coding/ implementation phase in which we will create the actual product. Product implementation can be an exciting phase because the idea for the project becomes something tangible. If the second phase work properly and first phase gathered accurately, the coding process is more streamlined.
On the off chance that the product application is planned legitimately and prerequisites are accumulated precisely, the coding procedure is more smooth-running.
To implemented proper coding within a specified period of time.
To actualize appropriated coding inside a predetermined time frame.
Once the design is complete, most of the major decisions about the system have been made. The goal of the coding phase is to translate the design of the system into code in a given programming language. For a given design, the aim of this phase is to implement the design in the best possible manner.
This phase of the development was used to test out the overall standards of the project.
We always try to find out the general nature of our project advancement and to solve any problem which had occurred during testing process (which we have done so far).
The purpose of this stage in every sprint is to:
The main objective of this stage is to ensure that the framework is effectively constructed and tried, and every one of the prerequisites and outline parameters are met.
The deliverables for this stage is just the general testing of each and every module, thus to produce physical deliverables which is fully functional after complete testing.
After the confirmation of this stage the extend modules can move onto the accompanying sprint organizing stage.
In this phase our final product is implemented in the actual environment.
A deployment project is basically a container for holding the software project which we are deploying: Our Modules which have been constructed and tried, and the situations to which these modules are conveyed as final output.
To provided a functional and complete project.
This phase is the final phase of SSDLC where the final software of our project ‘TapToGo’ is implemented in the production environment.
In our project, we will finally gave a working android application which can be deployed in hotels through which customer can easily access to their rooms and different zones of the hotel without any inconvenience. Our system is deployed in various sections of the hotel which requires only authorized specific customers to enter in it, not allowing general public to enter.
In this phase we will define how the module will work and integrated with each other, firstly we will separate into three parts, Guest Booking module, Guest Arriving module and Access Control module.
In this phase user select the hotel room packages regarding their own choice and fill the form if availability is conform. Now fill the registration form and booked our reservation. Complete the reservation process successfully.
This is one of the most important module of our project ‘TapToGo’ through which user will just have to tap his android smart phone in front of his designated room lock enabled with NFC technology and after confirmation of UID with the server system the door will be unlocked.
________________________________
CHAPTER 5
SOFTWARE DESIGN AND
MODELING
_________________________________
In these diagrams we can show how user use performs different type of roles and actions.
Figure 5.1 Low Level Use Case Diagram
The Low Level use Case Diagram which is Figure 5.1 defines what type of actions or events will be attempt by user and receptionist.
Figure 5.2 High Level User Use Case Diagram
Figure 5.3 High Level Admin Use Case Diagram
In Figure 5.2 and Figure 5.3 defines the user specific actions or roles to be done any guest and admin have different set of action is available which are not assign user and receptionist.
InFigure 5.4 defines the sequence of how user check the room availability in the hotel, each request will be checked.
Figure 5.4 Sequence diagram of Check Availability
In Figure 5.5 defines how to register any device in the system, it must be brought to special registration device. At this point, server generates unique key-identification (the UID) and then sends it to the device, together with public-key of the system (the p-key), which is used to encrypt transmitted data and system-id. If system-id, UID and p-key are successfully received, then server permanently stores UID in database. Now device can be used to lock/unlock the doors.
Figure 5.5 Sequence diagram of Guest UID Key Registration
In Figure 5.6shows how unlock the door, device must be brought to the reader close enough (approx. 1-2 cm) for the start of data transmission. UID is encrypted with p-key of corresponding system and is sent to the server. At serve side, it is validated with data from database and if there is a presence of such UID in the database, then the command for opening the door is sent back.
Figure 5.6 Sequence diagram of Door Access
In Figure 5.7 defines the whole process of website starting up to till the end.
Figure 5.7 Web App Activity Diagram
In this Figure 5.8 shows the whole process of mobile application start to till end.
Figure 5.8 Mobile App Activity Diagram
The Figure 5.9 shows the four packages of TapToGo project, in which Client side applications, Server Side applications, Database model and Ardino model.
Figure 5.9 Packages Diagram
In Figure 5.10 shows how component of the application related with each other
Figure 5.10 Component Diagram
In Figure 5.11 defines all class activity of project ‘tapTogo’
Figure 5.11 Class Diagram
________________________________
CHAPTER 6
ALGORITHM ANALYSIS AND
PSEUDO CODE COMPLEXITY
_________________________________
Step 1: Select Date, Room, no. of adults n Children —————————————————— 1
Step 2: Check Room available ——————————————————— 1
Step 3: If Success then: ——————————————————— log(n)
Step 3.1 allocate room ——————————————————— 1
Step 3.2 set Username and password ——————————————————— 1
Step 3.3 register user in DB ——————————————————— 1
else 3.4 Popup User to select another room type ——————————————————— 1 Step 4: Confirm Booking
Step 1: Get email, password ——————————————————— 1
Step 2: Validate email and password with requirements ——————————————————— 1 Step 3: Request Database to Sign In user ——————————————————— 1 Step 4: if Success then ———————————————————
Login Step 4.1: Check if UID is given then ———————————————————
Login Step 4.1.1 Transit user to Dashboard ——————————————————— 1
Else Step 4.1.2 get UID from server via NFC ——————————————————— 1
Step 4.1.3 store UID in Phone ——————————————————— 1
Else Step 4.2: Request user to re-enter data ——————————————————— 1
______________________________
CHAPTER 7
TESTING
_________________________________
Unit Testings:
Test BuildSelectApdu Results:
Tested on Android Studio using tool JUnit Class.
CPU Load Testing Results:
Memory Usage Testing Results:
Per Frame Rendering Time Results:
Network Statistics while calling Google Maps API for Nearby Locations:
_________________________________
CHAPTER 8
CONCLUSION
_________________________________
The proposed system will help in making the access system time efficient and effortless. NFC is becoming one of the most important advances in wireless communications technologies hence using this future technology will lead to a evolved and efficient system.
Access control systems are always in demand and are used everywhere. Reducing the number of physical keys and cards people need to carry and using smart phone as a single device to access to multiple locations is a good choice against lost, left at home or work keys. In addition, even if smart phone is lost, no need to change the lock at door or make duplicate keys, just disable or delete lost devices UID, registered in system from centralized DB. In the future, we plan to replace the connection to the wireless connection as well as improve the safety aspects, including replacing system time to something more efficient.
This project leads us to understand advance technology that is NFC which is being used different sectors to provided secure communication between devices.
The making of TapToGo have taught us many great things, some of which range from different programming languages to professional activities, to tools, following are few things that we have learnt in performing FYP
_________________________________
CHAPTER 9
FUTUR ENHANCEMENT
_________________________________
This project opens many possibilities in future for better enhancement. Our project main them is to use the NFC technologies and this technology used in many different sector of industry. The different approaches are follows:
Payment module method is the main enhancement in the future of this project because in this project we targeted Hotel industries and our business model in not handle online payment methodologies. This method connected with Bank and third party security system to ensure the online and secure transaction of payment.
With this technology, customers can securely link their smart devices to bank accounts and credit cards. At brick-and-mortar stores that use near-field communication (NFC) terminals, these customers can wave their mobile devices across the reader to initiate transactions and complete their purchases.
One day, we’ll all be paying for things with our phones, and NFC is the ticket to that future. In light of the many recent credit card data breaches, now is an especially good time to present a solution that finally shields our wallets from theft and fraud.
Our project business model structure is the access controlling on doors in the hotel. In the future, this project converted into complete smart hotel management system. Some new features added are:
This application used in the many different sectors of inductors just like in School management system, Super store mart system and many more.
_________________________________
CHAPTER 10
REFERENCES
https://firebase.google.com/docs/database/web/start
https://firebase.google.com/docs/android/setup
https://firebase.google.com/docs/database/web/read-and-write
http://getbootstrap.com/javascript/
https://www.tutorialspoint.com/javascript/
https://www.tutorialspoint.com/bootstrap/
https://www.adafruit.com/product/364
http://nearfieldcommunication.org/
_________________________________
CHAPTER 11
PLAGIARISM REPORTS
_________________________________
________________________________
CHAPTER 12
Annexure
________________________________
________________________________
_________________________________
TapToGo
Name: Syed Muhammad Sumair
Roll Number: 13B-121-BS
Name: Muhammad Azmul Haq
Roll Number: 13B-101-BS
Name: Abdul Moiz Khan
Roll Number 13B-089-BS
Batch-2013B (BS)
Date: 21st Oct, 2016
Department of Computer Science
USMAN INSTITUTE OF TECHNOLOGY
HAMDARD UNVIERSITY
Usman Institute of Technology
Department Of Computer Science
FINAL PROJECT APPROVAL FORM
The Head of Department, Date: 21st Oct, 2016
Computer Science Department, Batch: _2013B (BS)
Usman Institute of Technology,
Karachi.
Subject: Bachelor of Science in Computer Science Final Year Project
Respect Sir,
We, the below listed students of final Year BS ___CS__ class, desire to undertake work on the following project.
TapToGo
We request you to kindly grant approval for undertaking the work on the above-cited project. I abide by all terms and conditions mentioned below.
The selected projects will be rewarded as follows:
First Price 100,000 1 Lac PKR
Second Price 75,000 Seventy Thousand PKR
Third Price 50,000 Fifty Thousand PKR
Yours sincerely,
S.No. Roll No. Name Email Signature
1. 13B-121-BS Syed M. Sumair [email protected]
2. 13B-101-BS M. Azmul Haq [email protected]
3. 13B-089-BS Abdul Moiz Khan [email protected]
TABLE OF CONTENTS
2 Introduction
2.1 1.1.1 Problem Statement……………………………………………
The Purpose of this Project is to introduce a system through which a hotel can manage their guests’ access controls by providing them a desktop application. While the guests just have to install a mobile application, which will replace all the keys or identification cards and unifies them under a mobile app. By using these applications hotels can minimize the interaction of their guest from the staff and management. This application therefore it would be easier for guests to make their stay in hotel more pleasant, time saving and inspire them to use the service again. This application therefore provides ease of use for guests as they can use mobile as NFC tag by using NFC technology.
Today Smart phones are so commonly used, that we don’t even have to explain its popularity but all of its features either not being known or not being used. NFC (Near Field Communication) technology is one of them. As far as its business value is concern this technology is under process of adaption in many Sectors for e.g. (Banking (Smart payments), different Firms, Hospitals, and Hotels for access control and attendance purpose, etc.). Of course, locks and keys have their drawbacks. Locks can be picked. Keys can be lost. They don’t allow access rights to be easily transferred. They don’t provide any additional data, such as who gained access and when. And perhaps most significantly, physical locks and keys have limited applications. So we are considering a hotel’s system for this project. This project contains a Web application in which user select the different accommodation according to their choices, then user complete their transaction process through online booking form provided on website. Users receive the confirmation mail consisting of username and password, which can be provided only if the user successfully authenticate the overall process. Users use these username and password through Sign-In page in android application. Android application that uses NFC utility of a device for control Access in different areas of Hotel and provide different types of services for the guests which are using this application. For example room service, news/events, and dinner/lunch. On the other hand for the staff and admin there is a desktop application through which the users (it could be an admin, receptionist or a kitchen panel user) would be maintaining data of their guests.
The mobile application includes the features of different packages/deals of different places with in the hotel like rooms, gym, pool, parking, etc. Once the guest is registered, now he/she can avail the services of hotel. Guests can give suggestions and can query any question using this application, which would be entertained by staff or management.
The ‘TapToGo’ project will meet the following objectives:
The scope of this project includes and excludes the following items.
An android based Application that provides amenities of room service, access control, food order placement within hotel, call a cab, news or upcoming events about hotel.
User fills the booking form and the payment for the selected rooms.
A Hardware module (NFC reader and microcontroller) for access control
A web application that provides the interface to the management or staff to manage guest’s data and kitchen order placements.
Providing GPS system which will guide the customer from Airport or different areas to the Hotel
Project estimated effort/cost/duration
Effort:
1350hrs/3 people
450hrs/Person
Cost:
Server/Database Cost Rs.5000/= PKR
Development Cost Rs.50000/= PKR (3Persons
Hardware Cost:
Total = Rs.21000/= PKR
Grand Total = Rs.76000/=PKR
Milestone | Date completed | Deliverable(s) completed |
Project planning | 4/7/2016 to |
You Want The Best Grades and That’s What We Deliver
Our top essay writers are handpicked for their degree qualification, talent and freelance know-how. Each one brings deep expertise in their chosen subjects and a solid track record in academic writing.
We offer the lowest possible pricing for each research paper while still providing the best writers;no compromise on quality. Our costs are fair and reasonable to college students compared to other custom writing services.
You’ll never get a paper from us with plagiarism or that robotic AI feel. We carefully research, write, cite and check every final draft before sending it your way.