-
Use Of Network Activity Monitoring System To Solve Problems Case Study Of Benue Internal Revenue Service
APPENDIX A -- [Total Page(s) 4]
Page 1 of 4
-
-
-
APPENDIX A (Program PHP Codes)
Admin.php
<?php
include('adminlock.php'); include("config.php"); session_start();
if(isset($_POST['view']) || isset($_POST['view2'])){
$acct_name = trim($_POST['acct_name']);
$acct_num = trim($_POST['acct_num']); if($acct_name == '' && $acct_num == ''){
$msg = "Please Insert Acount Name or Number";
}
else{
$sql="SELECT * FROM activities WHERE acct_name='$acct_name' or acct_number='$acct_num' ORDER BY sn DESC LIMIT 1";
$result=mysql_query($sql);
$row=mysql_fetch_array($result);
$active=$row['active'];
$count=mysql_num_rows($result);
$_SESSION['acctt']=$row['acct_type'];
/* // If result matched $myusername and $mypassword, table row must be 1 row if($count > 0){
session_register("myusername");
$_SESSION['login_user']=$myusername; header ('Location: client.php');
}
else {
$msg="Your Login Name or Password is invalid";
} */
}
}
if(isset($_POST['view3']) || isset($_POST['view4']) ){
$acct_name2 = trim($_POST['acct_name2']);
$acct_num2 = trim($_POST['acct_num2']); if($acct_name2 == '' && $acct_num2 == ''){
$msg = "Please Insert Acount Name or Number";
}
APPENDIX A -- [Total Page(s) 4]
Page 1 of 4
-
-
ABSRACT - [ Total Page(s): 1 ]Abtsract coming soon ... Continue reading---
APPENDIX B - [ Total Page(s): 6 ] ... Continue reading---
CHAPTER ONE - [ Total Page(s): 2 ]The objective of this work is to develop a system that should be able to;➢   Detect active users.➢   Provide accurate evidence on corporate fraud when investigation is being carried out in an organization.➢   Monitor the daily activities of every user in a network in real time.➢   Has a good memory management for efficient carrying out of activities.1.4   Significance of StudyTherefore some of the significance and benefits of this work include:➢   ... Continue reading---
CHAPTER TWO - [ Total Page(s): 5 ]The Pathneck technique uses a
carefully constructed packet train to locate bottleneck links, making
it easier to diagnose available-bandwidth related problems. Pathneck only needs single-end control and is extremely light-weight. Those
properties make it attractive for both regular network users and ISP
network operators.The BRoute system uses a novel concept source and
sinks trees to capture end-user routing structures and network-edge
bandwidth information. Equipped with path- edge ... Continue reading---
CHAPTER THREE - [ Total Page(s): 3 ]CHAPTER THREESYSTEM ANALYSIS AND RESEARCH METHODOLOGY3.1Â Â Â IntroductionSystem analysis is the study of a system, with the view to determine the bottlenecks and desired end product and establish the most efficient method of obtaining this end (American Heritage Dictionary, 2003). It is the analysis of the requirements of a task, and expression of these tasks in a form that enables a computer to perform the task. System analysis also refers to the process through which an existing system is ex ... Continue reading---
CHAPTER FOUR - [ Total Page(s): 7 ] ... Continue reading---
CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVE SUMMARY AND CONCLUSION5.1Â Â Â SummaryThe topic of this work was reviewed in chapter one with the view of solving the problems encountered in the Ministry of Benue Internal Revenue Service, Benue state. During the course of the research, the present system was analysed in other to detect the bottlenecks using Structured System Analysis and Design Methodology. Object oriented analysis and design methodology was found sufficient and efficient in the design of the proposed system.5.2Â ... Continue reading---
REFRENCES - [ Total Page(s): 1 ]ReferencesBalasubramania. N. A. Balasubramania and A. Venkataramani (2009) Energy consumption in mobile phone: A measurement study and implication for network application.Christopher Wiggins () Network Engineer at Micro Technology Consultants, Inc Fitzgerald, GeorgiaKuenning, G.H. et al (2001) Detecting Insider Threats by Monitoring System Call Activity, Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point.Ningning Hu 2006) Network Monitoring ... Continue reading---