149
views
0
recommends
+1 Recommend
1 collections
    0
    shares
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      ADMINISTRATION SYSTEM FOR END TO END LUXURY APARTMENT MANAGEMENT SOFTWARE

      Preprint
      In review
      research-article
        1 ,
      ScienceOpen Preprints
      ScienceOpen
      Bookmark

            Abstract

            A majority of unpleasant issues faced by landlords and tenants seem to grow due to lack of communication. Late rent payments turns into an eviction. A non-functional AC or a broken window becomes a reason to break a lease. Fortunately, building a positive relationship doesn't take much effort and it all starts with one basic idea: communication.

            This project is entitled as “Administration System for end to end luxury apartment management software”, which is a software for managing highly customizable multiple apartments, flat, building or any kind of real estate properties.

            The software is to ease property management burdens on small and independent landlords.The challenge was to conceptualize and develop a simple,streamlined managementtool for smaller property owners.The toolneeded tobe able to managemarketing for the property, encourageon-time payments by tenants, keeptrack of transactions, and handle maintenance requests.

            The key technologies used for creating the software are HTML, CSS, Bootstrap, JavaScript, Python, MySQL and jQuery.

            In Existing security system there is authentication at user level the user id and password submitted by user is verified at login process end if the user id and password exist then the user would be able to access the system. But some smart user usually uses SQL injection in order to violate the security of database using wild character of SQL. They sometime use SQL statement too in order to get the login process confused. They pass the sub query of sql in password field instead of password in order to get the confirmation. Here we have to develop a secure system for authentication access and apply SQL INJECTION attack to check its security.

            Content

            Author and article information

            Journal
            ScienceOpen Preprints
            ScienceOpen
            23 April 2021
            Affiliations
            [1 ] cse, karunya institute of technology and science
            Article
            10.14293/S2199-1006.1.SOR-.PPR0HQ1.v1
            73223594-9c0d-494e-a2a6-9148881b79b5

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .


            The datasets generated during and/or analysed during the current study are available in the repository: http://worksbot
            Software engineering,Computer science

            Comments

            Comment on this article