SlideShare a Scribd company logo
1 of 60
ABSTRACT
Auctions are among the least economic institutions in place. They have been used
since antiquity to sell a wide variety of goods, and their basic from has remained unchanged.
In this dissertation, we explore the efficiency of common auctions when values are
interdependent the values to particular bidder may depend on information available only to
others and a symmetric. In this setting, it is well known that sealed bid auctions do not
achieve efficient in allocations general since they do not allow the information held by
different bidders to be shared.
Typically in an auction, say of the kind used to sell art, the auctioneer sets a
relatively low initial price. This price is then increased until only one bidder is willing to buy
the object, and the exact manner in which this is done varies. In my model a bidder who
drops out at some price can “reenter” at a higher price.
Administration
This module handles the overall administration of the system.
Sellers
The seller’s module consisting of the product publishing and placing of the initial bid.
The sellers can watch the progress of their product’s bid.
Buyers
The buyer’s module handle the customers who want to participate on the bid. They can
view the product and can place bids for the products. When becoming a winner, they
can purchase the product using online banking.
Bidding
This module handles the bid placing by the buyers. The customers are allowed to place
the bid only within the duration of the bid.
Online banking and payment
This module demonstrates the online banking for payment, for the bid winners. This
include a number of WCF services that ensure security.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 2 | P a g e
CONTENTS
1. INTRODUCTION
1.1 PROJECT PROFILE
1.2 MODULES
1.3 OBJECTIVE OF THE PROJECT
1.4 LANGUAGES USED
2. SOFTWARE DESCRIPTION
2.1 INTRODUCTION TO JAVA
2.2 THE JAVA HISTORY TIMELINE
2.3 SPECIAL FEATURES OF JAVA
3. SYSTEM ANALYSIS
3.1 INTRODUCTION
3.2 EXISTING SYSTEM
3.3 LIMITATIONS OF EXISTING SYSTEM
3.4 PROPOSEDSYSTEM
3.5 FACT FINDING TECHNIQUES
3.6 FEASIBILITY STUDY
3.6.1 TECHNIICAL FEASIBILITY
3.6.2 ECONOMICAL FEASIBILITY
3.6.3 OPERATIONAL FEASIBILITY
4. SYSTEM SPECIFICATION
4.1 SOFTWARESPECIFICATION
4.2 HARDWARE SPECIFICATION
5. SYSTEM DESIGN
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 3 | P a g e
5.1 INTRODUCTION TO SYSTEM DESIGN
5.2 INPUT DESIGN
5.3 OUTPUT DESIGN
5.4 DATABASE DESIGN
5.5 FORM DESIGN
5.6 ARCHITECTURAL DESIGN
5.7 SYSTEM MODULES
6. DATA FLOW DIAGRAM (DFD)
6.1 INTRODUCTION TO DATA FLOW DIAGRAM
7. TABLE STRUCTURE
7.1 INTRODUCTION TO TABLE STRUCTURE
8. SYSTEM TESTING
8.1 INTRODUCTION TO SYSTEM TESTING
8.2 UNIT TESTING
8.3 INTEGRATION TESTING
8.4 VALIDATION TESTING
9. SYSTEM IMPLEMENTAION
9.1 INTRODUCTION TO SYSTEM IMPLEMENTATION
10. CONCLUSION
11. APPENDIXES
11.1 APPENDIX A
11.2 APPENDIX B
11.3 APPENDIX C
12. BIBILOGRAPHY
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 4 | P a g e
INTRODUCTION
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 5 | P a g e
1.1 PROJECT PROFILE
The project “CYBER BIDDING GATEWAY” is a well prepared project in ASP.NET
with C# and SQL 2008 plat form. This software whose objective is to show the various
details and other allotment made for a good management.
This project aims at managing the bidding. The existing system is a manual system.
So it is difficult to manage. So the administrator wants to computerized one, so all the process
in auction is very easy.
This project is user friendly software. This computerization leads to several
advantages. They are fast, time saving, accurate, easy etc. This data based project has
database table which consist of various fields.
This system has administrative and user property, this provides security features to the
system, and it can prevent unauthorized access of software. All this features are
implementing in my software in very flexible manner.
1.2 MODULES
The software includes 5 modules,
1. Administration
2. Seller
3. Buyer
4. Bidding
5. Online banking and payment
1.3 OBJECTIVE OF THE PROJECT
1. The Cyber Bidding Gateway provides a platform to sell products and buy products
using bidding.
2. Cyber Bidding Gateway consists of a data base which stores entire details.
3. Replaces lack of security.
4. Save time.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 6 | P a g e
5. To overcome the limitations of existing system.
1.4 LANGUAGES USED
 Front End : Microsoft ASP.NET
 Back End : SQL Server 2008
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 7 | P a g e
SOFTWARE DISCRIPTION
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 8 | P a g e
2.1 INTRODUCTION TO ASP.NET
The Microsoft .NET Framework is a software framework that can be installed on
computers running Microsoft Windows operating systems. It includes a large library of coded
solutions to common programming problems and a virtual machine that manages the
execution of programs written specifically for the framework. The .NET Framework is a
Microsoft offering and is intended to be used by most new applications created for the
Windows platform.
ASP. Net, the next version of ASP, is a programming framework used to create
enterprise-class Web Applications. These applications are accessible on a global basis leading
to efficient information management. The advantage ASP. Net offers are more than just the
next version of ASP.
The .NET Framework was introduced with a vision to create globally distributed
software with Internet functionality and interoperability. The .NET Framework consists of
many class libraries, includes multiple language support and a common execution platform.
It’s a very flexible foundation on which many different types of top class applications can be
developed that do different things. Developing Internet applications with the .NET Framework
is very easy. ASP.NET is to build into this framework, we can create ASP.NET applications
using any of the built-in languages.
2.2 HISTORY
After four years of development, and a series of beta releases in 2000 and 2001,
ASP.NET 1.0 was released on January 5, 2002 as part of version 1.0 of the .NET Framework.
Even prior to the release, dozens of books had been written about ASP.NET [4] and
Microsoft promoted it heavily as part of its platform for Web services. Scott Guthrie became
the product unit manager for ASP.NET, and development continued apace, with version 1.1
being released on April 24, 2003 as a part of Windows Server 2003. ASP.NET is loosely
based on HTML. This release focused on improving ASP.NET's support for mobile devices.
2.3 SPECIAL FEATURES OF ASP.NET
1. ASP.NET makes development simpler and easier to maintain with an event-driven,
server-side programming model.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 9 | P a g e
2. ASP.NET pages are easy to write and maintain because the source code and HTML
are together.
3. The source code is executed on the server. The pages have lots of power and
flexibility by this approach.
4. The source code is compiled the first time the page is requested. Execution is fast
as the Web Server compiles the page the first time it is requested. The server saves the
compiled version of the page for use next time the page is requested.
5. The HTML produced by the ASP.NET page is sent back to the browser. The
application source code you write is not sent and is not easily stolen.
6. ASP.NET makes for easy deployment. There is no need to register components
because the configuration information is built-in.
7. The Web server continuously monitors the pages, components and applications
running on it. If it notifies memory leaks, infinite loops, other illegal software or
activities and restarts itself.
8. ASP.NET validates information (validation controls) entered by the user without
writing a single line of code.
9. ASP.NET easily works with ADO .NET using data-binding and page formatting
features.
10. ASP.NET applications run faster and counter large volumes of users without
performance problems.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 10 | P a g e
SYSTEM ANALYSIS
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 11 | P a g e
3.1 INTRODUCTION
System analysis is concerned with investigating, analyzing and evaluating the
information system under considerations. It is detailed study of the various operations
performed by a system and their relationships within and outside the system. It is the process
of gathering and interpreting facts, diagnosing problems and using the information to
recommended improvements on the system
System analysis involves:
 System planning and initial investigations
 Information gathering
 Feasibility study
 Cost/Benefit analysis
3.2 EXISTING SYSTEM
Present system is manual. The project metrics has to enter all the details of project,
documents, and tasks. It also maintenance the team information and also efforts estimation.
For this purpose the organization maintain the size of the document, sources code and update
the information about team member’s details manually. Which is much of time consuming
process and more importantly it is error prone.
3.3 LIMITATIONS OF EXISTING SYSTEM
The main disadvantages of existing systems are:
 Lack of security
 Using Out Dated technology
 Not user friendly
 Lack of information
 More timing, not efficient and less storing capacity
 Automatic fine calculation is not available
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 12 | P a g e
 Error correction is difficult
 Searching for particular data is very difficult
3.4 PROPOSED SYSTEM
The primary objective of the proposed system design is to overcome the drawbacks of
the existing system and reduce the manual work. We can achieve this objective by
computerizing the whole activities that are carried out manually. Computerization will reduce
manual work and produce desired information efficiently and quickly.
The “Cyber Bidding Gateway” has been design to reduce the manual work in the
following manner.
 Data entry screens are designed such that they are very user friendly and
minimum typing is required from the user.
 Novice user can also use the system without any training.
 System provides various information through reports quickly and accurately in
easily understandable formats.
 The new system is more user friendly due to GUI feature of ASP.NET
 The system supports security at operational level i.e. it gives access to view and
manipulate the information based on the user login.
 It aimed to be a paperless software. There is no unnecessary printing of particular
documents.
 Faster access information.
 Taking into the speed of computer access large data in less time and facilities
provided by access.
 Duplication of data will be avoided.
 Menu driven interface provides ease of use.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 13 | P a g e
3.5 FACT FINDING TECHNIQUES
The specific method analysts use for collecting data about requirements are called
Fact finding. It encompasses all of that are go into the investigation, scoping and definition of
a new or altered system. The first activity in analysis phase is to do the preliminary
investigation. During preliminary investigation data collecting is a very important and for this
we can use the fact finding technique. The following fact finding techniques can be used for
collecting data.
 Data collection
 Correspondence & questionnaires
 Personal interviews
 Observation
 Research
Data Collection
In this fact-finding step, the analyst gathers and organizes all documentation related to
data carriers are forms, records, reports, manuals, procedures, and CRT display layouts. The
analyst cautious in relying upon the validity of collected documents.
Correspondence& Questionnaires
Correspondence enables the analyst to explain the purpose of investigation activities
and to inform people of what is expected from them. It is particularly important that
interviews be preceded by correspondence defining the subject area and the specific topics to
be reviewed. The questionnaire is an important and often effective type of correspondence.
Personal Interview
The personal interview is one of the most fruitful methods of obtaining information.
An interview is a person to person communication. The analyst is more of a receiver than a
sender when conducting an interview.
Observation
This is a skill which the analyst have to develop. The analyst have to identify the right
information and choose the right person and look at the right place to achieve his objective.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 14 | P a g e
He should have a clear vision of how each departments work and work flow between them
and for this he should be a good observer. Observation allows analyst to gain information
they cannot obtain by any fact finding method.
3.6 FEASIBILITY STUDY
One of the important outcomes of the preliminary investigation is the determination of
the feasibility of the system. These are different aspects of the feasibility study in the
investigation phase. After the documents reviewing the selected personnel, investigating the
various resources the following are the results for the three feasibility.
Three key combinations are involved in the feasibility study
 Economic feasibility
 Technical feasibility
 Operational feasibility
3.6.1 Economic Feasibility
Economic analysis is the most frequently used method for evaluating the
effectiveness of a candidate system. More commonly known as cost/benefit analysis,
the procedure is to determine the benefit and saving that are expected from a
candidate system and compare them with the term of time by automating the process
of report generation.
The system can be developed technically and if installed would still be good for the
organization. The cost is found to be lesser compared to the benefits of the proposed system.
The workload of a user will decrease to half of the current workload. Hence the proposed
system is found to be economic feasible.
3.6.2 Technical Feasibility
Technical study is a study of hardware and software requirements. All the technical
issue related to the proposed system is dealt during feasibility stage of preliminary
investigation produced. Technical feasibility analysis makes a comparison between the levels
of technology available that is needed for the development of the project. The levels of
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 15 | P a g e
technology consist of factors like software tools, machine environment, platform developed
and so on.
The consideration that is normally associated with technical feasibility includes resources
availability of the organization, where the project is to be developed and implemented. By
taking these factors into consideration before developing, the resources available are
adequate. Thus the project is considered technically feasible for development.
3.6.3 Operational Feasibility
The developed system is completely driven and user friendly. Also the system is
developed in ASP.NET. There is little need skill for new user to operate the software. Reports
will be exactly as per the requirement. The maintenance and modification of the new system
needs very less human effort. Using command buttons throughout the application programs
enhances the operational feasibility. The new system is operationally feasible and makes the
operations simpler and quite easier.
At the beginning of preliminary investigation work all the personnel approached
responded positively this reduces the chance of resistance to the proposed system.
Considering all the issue stated above makes the proposed system operationally feasible.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 16 | P a g e
SYSTEM SPECIFICATION
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 17 | P a g e
4.1 SOFTWARE SPECIFICATION
Operating System : Windows 7
Front End : ASP.NET 2012
Back End : Microsoft SQL Server 2008
Server Side Scripting : C#.NET
Browser : Any Browser with JavaScript & XML Support
4.2 HARDWARE SPECIFICATION
Processor : Intel Pentium IV
Processor Speed : 1GHz
Monitor : Compactable Monitor
RAM : 2 GB
Hard Disk : 40 GB (Including DB Requirements)
Keyboard : Multimedia Keyboard
Mouse : Optical Mouse
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 18 | P a g e
SYSTEM DESIGN
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 19 | P a g e
5.1 INTRODUCTION TO SYSTEM DESIGN
System designs main aim is to identify the modules that should be in the
system, and the specifications of these modules and how they interact with each other
to produce the desired results. At the end of the system design all the major data
structures, file formats and the major modules in the system and their specification are
decided.
Activities in the design phase are described briefly as follows:
Allocation of function: The data flow diagrams prepared during the study phase and
reviewed and expanded in order to allocate function between manual tasks, equipment
functions and computer program function.
Manual task definition: Requirements resulting from human interfaces with the computer-
based component of the system are described.
Reference manual identification: Reference manuals required by user personnel
programmers, and equipment operations are identified.
Equipment function definition: The functions to be performed by hardware (rather than by
computer programs or manual operations) are defined.
Equipment specification: The hardware configuration used to convert input data to
meaningful output information is described.
Computer program function definition: The specific functions of the computer program
component of the overall system are defined, and design requirements for external system
inputs are established.
Database design: The storage requirements of all the data elements on which the computer
programs operate are calculated, taking into account the size and volume of the records to be
stored and the methods of file organization and access.
5.2 INPUT DESIGN
The input is the set of values that is provided by the user to the system. The input
design must enable the user to provide the error free input to the system for efficient
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 20 | P a g e
processing. The input data have to be validated, edited, organized, and accepted by the
system before being proposed to produce the outputs.
The main objectives of input design are as follows:
 Produce effective method of input
 Achieve high level accuracy
 Ensure that the input is acceptable and understood by the user
The different types of input data handled by the system are:
External
They are the primary inputs to the system. The external input is what the user supplies
to the system. The user can give different types of external inputs in this project such as add
new thread, post reply etc.
Internal
When the external inputs are obtained from the user, these inputs are transferred to the
system as message. These message are captured and handled as input for further processing.
The necessary external inputs are given to the system by Graphical User Interface
(GUI) technology. The GUI system applied to this project enables the user to avoid error and
confusion arises while entering the input.
5.3 OUTPUT DESIGN
Outputs are the most important direct source of information to the user and to the
management. Efficient and eligible output design should improve the system’s relationship
with the user and help in decision making,
Output design generally deals with the results generated by the system i.e., reports.
These reports can be generated from stored or calculated values. Reports are displayed either
as screen window preview or printed form. Most end users will not actually operate the
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 21 | P a g e
information system or enter data through workstation, but they will use the output from the
system.
Outputs from computer systems are required primarily to communicate the results of
processing to the user. They are also used to provide a permanent copy of these results for
later consultation.
While designing output, the system analyst must accomplish the following:
 Determine what information to present
 Decide where to display
 Give each output a specific name or title
 Select the output medium
 Give facility to print the information if necessary
5.4 DATABASE DESIGN
Relationships between data elements, functions to be performed, and techniques for
file organization are studied in detail so the most appropriate storage device can be selected
and an efficient data base design can be achieved.
The storage requirements for all data elements on which the computer programs
operate are calculated, taking into account the size and volume of the records to be stored and
the methods of file organization and access. The interfaces between the system data base and
other data bases are identified by specifying the data that must flow between them.
Databases are designed to manage large bodies of information. One of the major
purpose of a data base system is to provide users with an abstract view of data. A database is
designed so that it can be used both to specify the overall logical structure of the database and
provide a higher level description of the implementation
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 22 | P a g e
5.5 FORM DESIGN
People read from forms, write on forms, and spend billions of hours handling forms
and filling forms. The data that forms carry comes from people, and the information output of
the system goes to people. So the form is a tool with a message, it is a physical carrier of the
data of information. It is also can constitute authority for action. Each form is a request for
action. It provides information for making decisions and improving operations.
Requirements of Form Design
Form design allows analyzing forms, evaluating present documents, and creating new
or improved forms. Bear in mind that detailed analysis occurs only after the problem
definition stage and the beginning of candidate system. Since the purpose of a form is to
communicate effectively through form design, there are several requirements:
 Reduced development time
 Increased reuse of code
 Enhanced user experience
Principles behind good form design
Layout should be simple and clear. Try to split your form into section with
appropriate subheadings. This will help the user understand what is being requested. It will
also encourage you to place data entries in a logical sequence, which is often what a user
expects. Prototypes are very helpful during the design process.
Details about Form Elements
There are a number of points to consider regarding form elements, as follow
 Limit the number of items in your select lists.
 Put the most often-selected entries at top of the selected list.
 When possible, use the size attribute with select lists.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 23 | P a g e
 Don’t present long vertical lists of checkboxes or radio buttons.
 Avoid using Reset buttons except in applications that support continuous data
entry.
5.6 ARCHITECTURAL DESIGN
Architecture is an overall structure of a system. Architecture takes into consideration
the overall working of the system. Larger system can be decomposed into subsystems that
provide some related set of services. The initial design process of identifying these sub
systems and establishing a framework for subsystem control and communication is called
architecture design. Architecture design usually comes before detailed system specification.
Architecture decomposition is necessary to structure and organize the specification. There is
no generally accepted process depends on application knowledge and on the skill and
intuition of the system architect.
Assessment Collection System follows 2-tier architecture. In the client side, user select
forms and submits pages (first tier). Then it passes to the main server where the data and the
business process are stored (second tier). Then, server responds with appropriate information
as pages or text.
Architectural design is the back born for building successful software intensive
system. A good software structure design results in the development of a project working
system. For the development of the software, modules were identified. This software was
developed into separate named and addressable components that are integrated to satisfy the
problem requirements
5.7 SYSTEM MODULES
Registration
Add category
Approve Registration
Approve item
Add an item
View bid item
View winner
My uploads
View profile
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 24 | P a g e
DATA FLOW DIAGRAM
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 25 | P a g e
6.1 INTRODUCTION TO DATA FLOW DIAGRAM
Data flow diagram is a network that describes the flow of data throughout the system.
Data stores and the process that changed or transform data flows. The data flow diagram
network is logical abstract of a system that may have mainly possible physical configuration.
Data flow diagrams are constructed from four basic symbols. Using these symbols a
system analyst can construct a logic network that traces data streams throughout a system.
A level zero DFD is also called a fundamental system or context model, represents the entire
software element of a single bubble with input and output data indicated by incoming and
outgoing arrows. These are expanded level by level each explaining its process in detail.
Process are numbered for easy identification and are normally labeled in block letters. Each
data flow is labeled for easy understanding. The various symbols used are
Source or destination of data
Data flow
Process that transforms data flow
Data store
Te
ac
he
rs
Gr
adi
ng
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 26 | P a g e
TABLE STRUCTURE
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 27 | P a g e
7.1 INTRODUCTION TO TABLE STRUCTURE
Table is a collection of complete details about a particular subject. These data
are saved in rows and columns. The data of each row are different units. Hence, rows are
called RECORDS and Columns of each row are called FIELDS. Table design means how
data should be organized around user requirements. How data are organized depends on the
data and response requirements that determine hardware configurations. An integrated
approach to file design is the database. The general theme around in the database is to handle
information as an integrated whole.
Data is stored in tables, which is available in the back end. The items and data, which
are entered in the input, form id directly stored in this table using linking of database. We link
more than one table to input forms. We can collect the details from the different tables to
display on the output screen.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 28 | P a g e
SYSTEM TESTING
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 29 | P a g e
8.1 INTRODUCTION TO SYSTEM TESTING
Software testing is a critical element of software quality assurance and represents the
ultimate reviews of specification, design and coding. Testing present an interesting anomaly
for the software. Testing is vital to the success of the system. Errors can be injected at any
stage during development. System testing makes a logical assumption that if all the parts of
the system are correct, the goal will be successfully achieved.
During testing, the program to be tested is executed with set of test data and the
output of the program for the test data is evaluated to determine if the program is performing
as expected. A series of testing are performed for the proposed system before the system is
ready for user acceptance testing.
8.2 UNIT TESTING
Unit testing focuses verification effort on the smallest unit of the software design, the
module this is known as module testing. Since the proposed system has modules the testing is
individually performed on each module.
Using the details description as a guide, important control paths are tested to uncover
errors within the boundary of the modules. This testing was carried out during programming
stage itself. In this testing step each module is found to be working satisfactorily as regards to
the expected output from the module .
Module interface is tested to ensure that the information properly flow and out of the program
under test.
 Data consistency is tested to ensure that the data stored maintains its integrity
during all steps in algorithm execution.
 All independent paths are examined to ensure that all the statement in the module
have been executed at least once.
8.3 INTEGRATION TESTING
Data can be test across an interface; one module can have adverse effect on another,
sub function when combined may not produce the desired function. Integration testing is a
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 30 | P a g e
systematic technique for constructing the program structure while at the same time
conducting test to uncover errors associated within the interface.
The objective is to take unit tested modules and built a program structure that has
been dictated by design. All modules are combined in this testing step. The entire program is
tested as a whole. Correction is difficult at this stage because the isolation of causes is
complicated by the vast expense of the program. Thus in the integration testing step all the
errors uncover are corrected for the next testing step.
8.4 VALIDATION TESTING
At the culmination of integration testing, software is completely assembled as a
package. Interfacing errors have been uncovered and corrected and a final series of software
test-validation testing begins. Validation testing can be defined in many ways, but a simple
definition is that validation succeeds when the software functions in manner that is
reasonably expected by the user. Software validation is achieved through a series of tests that
demonstrate conformity with requirement. After validation test has been conducted, one of
two conditions exists.
 The function or performance characteristics confirm to specifications and are
accepted.
 A validation from specification is uncovered and a deficiency created.
Deviation or error discovered at this step in this project is corrected prior to
completion of the project with the help of the user. Thus the proposed system under
consideration has been tested by using validation testing and found to be working
satisfactorily.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 31 | P a g e
SYSTEM IMPLEMENTATION
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 32 | P a g e
9.1 INTRODUCTION TO SYSTEM IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned into a
working system and is giving confidence on the new system for the users that it will work
efficiently and effectively. It involves careful planning, investigation of the current system
and its constraints on implementation, design of methods to achieve the changeover, an
evaluation, of change over methods.
Implementation is the final and important phase. The most critical stage in achieving a
successful new system and in giving the users confidence that the new system will work and
be effective. The system can be implemented only after thorough testing is done and if it
found to working according to the specification. This method also offers the greatest security
since the old system can take over if the errors are found or inability to handle certain type of
transactions while using the new system.
At the beginning of the development phase a preliminary implementation plan is
created to schedule and manage the many different activities must be integrated into plan.
The implementation plan is updated throughout the development phase, culminating in a
changeover plan for the operation phase. The major elements of implementation plan are
test plan, training plan, equipment installation plan and a conversion plan.
There are three types of implementation:
 Implementation of a computer system to replace a manual system.
 Implementation of a new computer system to replace an existing one.
Implementation of a modified application to replace an existing one, using the same
computer. Implementation includes all those activities that place to convert from the old
system to the new one. The new system may be totally new, replacing an external system
manual or automated system or it may be a modification to an external system. The process
of putting the developed system in actual use is called system implementation. This includes
all those activities that take place to convert to old system to new one.
The most crucial stage is achieving a new successful system and giving confidence in
new system that it will work efficiently and effectively. The system is implemented only after
through checking is done and if it is found working according to the specifications.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 33 | P a g e
It involves careful planning, investigation of the current system and constrains on
implementation, design of methods to achieve. Two checking is done and if it is found
working according to the specification, major task of preparing the implementation are
educating, training the users. The more complex the system being implemented, the more
involved will be the system analysis and the design effort required just for implementation.
The method of implementation and the time scale adopted are found out initially. Next the
system is rested properly and the same time user are trained in the new product.
Issues to consider in the Evaluation of Information System
1. How have information systems changed the cost of operation?
2. How have information systems changed the way in which operations are
performed?
3. How have information systems changed the accuracy of information that users
receive?
4. How have information systems changed the timeliness of information and reports
users receive?
5. How has information systems brought about organization changes? Are these
changes for the better or for the worse?
6. How have information systems changed the completeness of the information?
7. How have information systems changed control or centralization? What is the
effect of such changes?
8. How have information systems changed the attitude of systems users or persons
affected by the system?
9. How have information systems changed the number of users?
10. How have information systems changed the interactions between members of the
organization?
11. How have information systems changed productivity?
12. How have information systems changed the efforts that must be expended to
receive information for decision making?
System Maintenance
The maintenance phase of the software cycle is the time in which a software product
performs the useful work. After a system is successfully implemented, it should be
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 34 | P a g e
maintained in a proper manner. System maintenance is an important aspect in software
development cycle.
The system should be maintained and upgraded according to the technological
advancements. It ensures the data control and security. The system must be protected from
fire and other natural calamities. The backup copies of data must be maintained daily so that
to prevent the loss of data due to various reasons.
Software maintenance is of course far more than finding mistakes we may define
maintenance by describing four activities that are undertaken to after a program is released
for use
Software maintenance activities can be classified in to
 Corrective maintenance
 Adaptive maintenance
 Perfective maintenance
 Preventive maintenance
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 35 | P a g e
CONCLUSION
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 36 | P a g e
10. CONCLUSION
The project entitled ‘Cyber Bidding Gateway’ is done to make manual process
easier by making it a computerized system for user registration and bidding. Cyber
bidding gateway is an integrated web application that handle the online
bidding.
The project was successfully completed within the time span allotted. The drawbacks
of the existing system as listed before are fully evacuated. All the existing inconsistencies are
fully solved as this system is implemented. This reduced the burden of the administration of
the system. All the modules are tested separately and put together to form the main system.
Finally the system is tested with real data and it worked successfully. Thus the system has
fulfilled the entire objective defined.
The system has been developed in an interactive manner; the reports generated by the
system are clear. The system is flexible, user friendly and has its own full data security and
all data recovery facility. The developed system has mainly for modules administrator, seller,
buyer, and bidding. It is developed using ASP.Net and Microsoft SQL Server.
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 37 | P a g e
APPENDIXES
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 38 | P a g e
11.1 APPENDIXA: TABLES
Table 1: tbl_login
Foreign Key: username
Field Name Data Type Description
username Varchar(50) To specify the username
password Varchar(50) To identify the user
role Varchar(50) To identify the role
Table 2: tbl_registration
Primary Key: username
Field Name Data Type Description
firstname Varchar(50) To specify the first name
lastname Varchar(50) To specify the last name
house_name Varchar(50) To specify the address
location Varchar(50) To specify the location
Street Varchar(50) To specify the street
city Varchar(50) To specify city
pincode Int To specify the pin
district Varchar(50) To specify the district
state Varchar(50) To specify the state
Email_id Varchar(50) To specify the mail
mobile Bigint To specify the number
User_Name Varchar(50) To specify the username
status Bit Approve or not
Password Varchar(50) To identify the user
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 39 | P a g e
Table 3: tbl_categorys
Primary Key: categorys_id
Table 4: tbl_item
Primary Key: item_id
Field Name Data Type Description
Category_id Int To specify the category id
Category_name Varchar(50) To specify the category
Field Name Data Type Description
Item_id Int To specify the itemid
username Varchar(50) To specify the username
Category_id Int To specify the categoryid
Item_name Varchar(50) To specify the item name
Description Varchar(50) To specify the description
Min_rate Float To specify rate
Increment_value Int To specify the rate increment
Start_date Date To specify the bid start date
End_date Date To specify bid end date
status Bit To specify the status
bidstatus Int To specify the bidstatus
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 40 | P a g e
Table 5: tbl_image
Primary Key: image_id
Foreign key: item_id
Table 6: tbl_bid_details
Primary Key: bid_details_id
Field Name Data Type Description
Bid_details_id Int To specify the biddetailsid
Item_id Int To specify the itemid
Username Varchar(50) To specify the username
Mobile Varchar(50) To specify the mobile
Email Varchar(50) To specify the email
bidrate Float To specify bidrate
Table 7: tbl_userbid
Primary Key: user_bid_id
Foreign key: item_id
Field Name Data Type Description
Image_id Int To specify the imageid
Image_path Varchar(max) To specify the image path
Item_id Int To specify the itemid
Field Name Data Type Description
User_bid_id Int To specify the bidid
Username Varchar(50) To specify the username
Item_id Int To specify the itemid
Rate Float To specify the rate
date Varchar(50) To specify the biddate
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 41 | P a g e
11.2 APPENDIXB: DFD
LEVEL 0
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 42 | P a g e
LEVEL 1
ADMI
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 43 | P a g e
USER
GUEST
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 44 | P a g e
LEVEL 2
ADMIN
USER
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 45 | P a g e
GUEST
11.1 APPENDIXB: SCREEN SHOTS
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 46 | P a g e
WELCOME PAGE
REGISTRATION
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 47 | P a g e
FORGET PASSWORD
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 48 | P a g e
LOGIN
USER-HOME PAGE
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 49 | P a g e
ADD ITEM
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 50 | P a g e
MY UPLOADS
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 51 | P a g e
CHANGE PASSWORD
UPDATE PROFILE
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 52 | P a g e
VIEW BID ITEMS
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 53 | P a g e
BUY BID ITEM
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 54 | P a g e
VIEW WINNER
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 55 | P a g e
PAYMENT
ADMIN-HOME PAGE
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 56 | P a g e
ADD CATEGORY
APPROVE REGISTRATION
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 57 | P a g e
APPROVE / UN APPROVE ITEM
APPROVE BID WINNER
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 58 | P a g e
LOGOUT
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 59 | P a g e
BIBLIOGRAPHY
12. BIBLIOGRAPHY
CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE
COLLEGE 60 | P a g e
 Mastering visual c#.NET by Jason Price
 Professional visual studio 2010 by Bruce Johnson
 Sql server 2008 for Developers
 www.stackoverflow.com
 www.codeproject.com
 www.auction.indiatimes.com
 www.ubid.com
 www.msdn.com

More Related Content

What's hot

Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Projecthani2253
 
University android app
University android app University android app
University android app ADI ADARSH
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET Journal
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
project
projectproject
projectdnraj
 
IRJET - Code Compiler Shell
IRJET -  	  Code Compiler ShellIRJET -  	  Code Compiler Shell
IRJET - Code Compiler ShellIRJET Journal
 
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report 6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report c-tac
 
Online News Portal System
Online News Portal SystemOnline News Portal System
Online News Portal SystemRajib Roy
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET Journal
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application AuthenticationRapidValue
 
Airline report
Airline reportAirline report
Airline reportSimranBani
 

What's hot (19)

Project report
Project reportProject report
Project report
 
SarojKumarDash
SarojKumarDashSarojKumarDash
SarojKumarDash
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Project
 
University android app
University android app University android app
University android app
 
perl-java
perl-javaperl-java
perl-java
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
IRJET- An Efficient Technique for Finding SQL Injection using Reverse Proxy S...
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
project
projectproject
project
 
E farming
E farmingE farming
E farming
 
IRJET - Code Compiler Shell
IRJET -  	  Code Compiler ShellIRJET -  	  Code Compiler Shell
IRJET - Code Compiler Shell
 
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report 6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
6 Week / Month Industrial Training in Hoshiarpur Punjab- PHP Project Report
 
Online News Portal System
Online News Portal SystemOnline News Portal System
Online News Portal System
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
Security Testing In Application Authentication
Security Testing In Application AuthenticationSecurity Testing In Application Authentication
Security Testing In Application Authentication
 
Learning%20%20 port
Learning%20%20 portLearning%20%20 port
Learning%20%20 port
 
Airline report
Airline reportAirline report
Airline report
 
Ijcatr04041018
Ijcatr04041018Ijcatr04041018
Ijcatr04041018
 
Flows in mule
Flows in muleFlows in mule
Flows in mule
 

Similar to Cyber bidding gateway report on ASP .net

127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentationNitesh Kumar
 
Online Real Estate Management System
Online Real Estate Management SystemOnline Real Estate Management System
Online Real Estate Management Systemshahrukh Nawandish
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management SystemMike Taylor
 
ProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentationProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentationkomkar98230
 
Report on mall automation
Report on mall automationReport on mall automation
Report on mall automationSonu Patel
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxkrushnaborade2
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management SystemIRJET Journal
 
IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)IRJET Journal
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking SystemBharat Kalia
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportkomkar98230
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitectureABDEL RAHMAN KARIM
 
SRS for online examination system
SRS for online examination systemSRS for online examination system
SRS for online examination systemlunarrain
 
departmental store
departmental storedepartmental store
departmental storeFreelancer
 

Similar to Cyber bidding gateway report on ASP .net (20)

127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
Online Real Estate Management System
Online Real Estate Management SystemOnline Real Estate Management System
Online Real Estate Management System
 
Web Based Investment Management System
Web Based Investment Management SystemWeb Based Investment Management System
Web Based Investment Management System
 
ProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentationProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentation
 
Documentation
DocumentationDocumentation
Documentation
 
Report on mall automation
Report on mall automationReport on mall automation
Report on mall automation
 
Job portal
Job portalJob portal
Job portal
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Shopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docxShopping-Portal online shopping saystam.docx
Shopping-Portal online shopping saystam.docx
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
IRJET- Crime Management System
IRJET- Crime Management SystemIRJET- Crime Management System
IRJET- Crime Management System
 
Crime security.
Crime security.Crime security.
Crime security.
 
IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)
 
Srs
SrsSrs
Srs
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation report
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitecture
 
Print report
Print reportPrint report
Print report
 
SRS for online examination system
SRS for online examination systemSRS for online examination system
SRS for online examination system
 
departmental store
departmental storedepartmental store
departmental store
 

More from Georgekutty Francis

Simple self introduction in interview
Simple self introduction in interview Simple self introduction in interview
Simple self introduction in interview Georgekutty Francis
 
Cyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .netCyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .netGeorgekutty Francis
 
Raspberry pi on seminar documentation
Raspberry pi on seminar documentationRaspberry pi on seminar documentation
Raspberry pi on seminar documentationGeorgekutty Francis
 
Seminar Presentation on raspberry pi
Seminar Presentation on raspberry piSeminar Presentation on raspberry pi
Seminar Presentation on raspberry piGeorgekutty Francis
 
seminar presentation on Project ara
seminar presentation on Project araseminar presentation on Project ara
seminar presentation on Project araGeorgekutty Francis
 
Holographic seminar documentation
Holographic seminar documentationHolographic seminar documentation
Holographic seminar documentationGeorgekutty Francis
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Intel Compute stick presentation
Intel Compute stick presentationIntel Compute stick presentation
Intel Compute stick presentationGeorgekutty Francis
 
Intel Compute stick documentation
Intel Compute stick documentationIntel Compute stick documentation
Intel Compute stick documentationGeorgekutty Francis
 
Autonomic computing seminar documentation
Autonomic computing seminar documentationAutonomic computing seminar documentation
Autonomic computing seminar documentationGeorgekutty Francis
 

More from Georgekutty Francis (12)

Simple self introduction in interview
Simple self introduction in interview Simple self introduction in interview
Simple self introduction in interview
 
Cyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .netCyber bidding gateway abstract in ASP .net
Cyber bidding gateway abstract in ASP .net
 
Raspberry pi on seminar documentation
Raspberry pi on seminar documentationRaspberry pi on seminar documentation
Raspberry pi on seminar documentation
 
Seminar Presentation on raspberry pi
Seminar Presentation on raspberry piSeminar Presentation on raspberry pi
Seminar Presentation on raspberry pi
 
Project ara report 2
Project ara report 2Project ara report 2
Project ara report 2
 
seminar presentation on Project ara
seminar presentation on Project araseminar presentation on Project ara
seminar presentation on Project ara
 
Holographic seminar documentation
Holographic seminar documentationHolographic seminar documentation
Holographic seminar documentation
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Intel Compute stick presentation
Intel Compute stick presentationIntel Compute stick presentation
Intel Compute stick presentation
 
Intel Compute stick documentation
Intel Compute stick documentationIntel Compute stick documentation
Intel Compute stick documentation
 
Autonomic computing seminar documentation
Autonomic computing seminar documentationAutonomic computing seminar documentation
Autonomic computing seminar documentation
 

Recently uploaded

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Recently uploaded (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Cyber bidding gateway report on ASP .net

  • 1. ABSTRACT Auctions are among the least economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic from has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent the values to particular bidder may depend on information available only to others and a symmetric. In this setting, it is well known that sealed bid auctions do not achieve efficient in allocations general since they do not allow the information held by different bidders to be shared. Typically in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price. This price is then increased until only one bidder is willing to buy the object, and the exact manner in which this is done varies. In my model a bidder who drops out at some price can “reenter” at a higher price. Administration This module handles the overall administration of the system. Sellers The seller’s module consisting of the product publishing and placing of the initial bid. The sellers can watch the progress of their product’s bid. Buyers The buyer’s module handle the customers who want to participate on the bid. They can view the product and can place bids for the products. When becoming a winner, they can purchase the product using online banking. Bidding This module handles the bid placing by the buyers. The customers are allowed to place the bid only within the duration of the bid. Online banking and payment This module demonstrates the online banking for payment, for the bid winners. This include a number of WCF services that ensure security.
  • 2. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 2 | P a g e CONTENTS 1. INTRODUCTION 1.1 PROJECT PROFILE 1.2 MODULES 1.3 OBJECTIVE OF THE PROJECT 1.4 LANGUAGES USED 2. SOFTWARE DESCRIPTION 2.1 INTRODUCTION TO JAVA 2.2 THE JAVA HISTORY TIMELINE 2.3 SPECIAL FEATURES OF JAVA 3. SYSTEM ANALYSIS 3.1 INTRODUCTION 3.2 EXISTING SYSTEM 3.3 LIMITATIONS OF EXISTING SYSTEM 3.4 PROPOSEDSYSTEM 3.5 FACT FINDING TECHNIQUES 3.6 FEASIBILITY STUDY 3.6.1 TECHNIICAL FEASIBILITY 3.6.2 ECONOMICAL FEASIBILITY 3.6.3 OPERATIONAL FEASIBILITY 4. SYSTEM SPECIFICATION 4.1 SOFTWARESPECIFICATION 4.2 HARDWARE SPECIFICATION 5. SYSTEM DESIGN
  • 3. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 3 | P a g e 5.1 INTRODUCTION TO SYSTEM DESIGN 5.2 INPUT DESIGN 5.3 OUTPUT DESIGN 5.4 DATABASE DESIGN 5.5 FORM DESIGN 5.6 ARCHITECTURAL DESIGN 5.7 SYSTEM MODULES 6. DATA FLOW DIAGRAM (DFD) 6.1 INTRODUCTION TO DATA FLOW DIAGRAM 7. TABLE STRUCTURE 7.1 INTRODUCTION TO TABLE STRUCTURE 8. SYSTEM TESTING 8.1 INTRODUCTION TO SYSTEM TESTING 8.2 UNIT TESTING 8.3 INTEGRATION TESTING 8.4 VALIDATION TESTING 9. SYSTEM IMPLEMENTAION 9.1 INTRODUCTION TO SYSTEM IMPLEMENTATION 10. CONCLUSION 11. APPENDIXES 11.1 APPENDIX A 11.2 APPENDIX B 11.3 APPENDIX C 12. BIBILOGRAPHY
  • 4. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 4 | P a g e INTRODUCTION
  • 5. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 5 | P a g e 1.1 PROJECT PROFILE The project “CYBER BIDDING GATEWAY” is a well prepared project in ASP.NET with C# and SQL 2008 plat form. This software whose objective is to show the various details and other allotment made for a good management. This project aims at managing the bidding. The existing system is a manual system. So it is difficult to manage. So the administrator wants to computerized one, so all the process in auction is very easy. This project is user friendly software. This computerization leads to several advantages. They are fast, time saving, accurate, easy etc. This data based project has database table which consist of various fields. This system has administrative and user property, this provides security features to the system, and it can prevent unauthorized access of software. All this features are implementing in my software in very flexible manner. 1.2 MODULES The software includes 5 modules, 1. Administration 2. Seller 3. Buyer 4. Bidding 5. Online banking and payment 1.3 OBJECTIVE OF THE PROJECT 1. The Cyber Bidding Gateway provides a platform to sell products and buy products using bidding. 2. Cyber Bidding Gateway consists of a data base which stores entire details. 3. Replaces lack of security. 4. Save time.
  • 6. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 6 | P a g e 5. To overcome the limitations of existing system. 1.4 LANGUAGES USED  Front End : Microsoft ASP.NET  Back End : SQL Server 2008
  • 7. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 7 | P a g e SOFTWARE DISCRIPTION
  • 8. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 8 | P a g e 2.1 INTRODUCTION TO ASP.NET The Microsoft .NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform. ASP. Net, the next version of ASP, is a programming framework used to create enterprise-class Web Applications. These applications are accessible on a global basis leading to efficient information management. The advantage ASP. Net offers are more than just the next version of ASP. The .NET Framework was introduced with a vision to create globally distributed software with Internet functionality and interoperability. The .NET Framework consists of many class libraries, includes multiple language support and a common execution platform. It’s a very flexible foundation on which many different types of top class applications can be developed that do different things. Developing Internet applications with the .NET Framework is very easy. ASP.NET is to build into this framework, we can create ASP.NET applications using any of the built-in languages. 2.2 HISTORY After four years of development, and a series of beta releases in 2000 and 2001, ASP.NET 1.0 was released on January 5, 2002 as part of version 1.0 of the .NET Framework. Even prior to the release, dozens of books had been written about ASP.NET [4] and Microsoft promoted it heavily as part of its platform for Web services. Scott Guthrie became the product unit manager for ASP.NET, and development continued apace, with version 1.1 being released on April 24, 2003 as a part of Windows Server 2003. ASP.NET is loosely based on HTML. This release focused on improving ASP.NET's support for mobile devices. 2.3 SPECIAL FEATURES OF ASP.NET 1. ASP.NET makes development simpler and easier to maintain with an event-driven, server-side programming model.
  • 9. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 9 | P a g e 2. ASP.NET pages are easy to write and maintain because the source code and HTML are together. 3. The source code is executed on the server. The pages have lots of power and flexibility by this approach. 4. The source code is compiled the first time the page is requested. Execution is fast as the Web Server compiles the page the first time it is requested. The server saves the compiled version of the page for use next time the page is requested. 5. The HTML produced by the ASP.NET page is sent back to the browser. The application source code you write is not sent and is not easily stolen. 6. ASP.NET makes for easy deployment. There is no need to register components because the configuration information is built-in. 7. The Web server continuously monitors the pages, components and applications running on it. If it notifies memory leaks, infinite loops, other illegal software or activities and restarts itself. 8. ASP.NET validates information (validation controls) entered by the user without writing a single line of code. 9. ASP.NET easily works with ADO .NET using data-binding and page formatting features. 10. ASP.NET applications run faster and counter large volumes of users without performance problems.
  • 10. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 10 | P a g e SYSTEM ANALYSIS
  • 11. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 11 | P a g e 3.1 INTRODUCTION System analysis is concerned with investigating, analyzing and evaluating the information system under considerations. It is detailed study of the various operations performed by a system and their relationships within and outside the system. It is the process of gathering and interpreting facts, diagnosing problems and using the information to recommended improvements on the system System analysis involves:  System planning and initial investigations  Information gathering  Feasibility study  Cost/Benefit analysis 3.2 EXISTING SYSTEM Present system is manual. The project metrics has to enter all the details of project, documents, and tasks. It also maintenance the team information and also efforts estimation. For this purpose the organization maintain the size of the document, sources code and update the information about team member’s details manually. Which is much of time consuming process and more importantly it is error prone. 3.3 LIMITATIONS OF EXISTING SYSTEM The main disadvantages of existing systems are:  Lack of security  Using Out Dated technology  Not user friendly  Lack of information  More timing, not efficient and less storing capacity  Automatic fine calculation is not available
  • 12. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 12 | P a g e  Error correction is difficult  Searching for particular data is very difficult 3.4 PROPOSED SYSTEM The primary objective of the proposed system design is to overcome the drawbacks of the existing system and reduce the manual work. We can achieve this objective by computerizing the whole activities that are carried out manually. Computerization will reduce manual work and produce desired information efficiently and quickly. The “Cyber Bidding Gateway” has been design to reduce the manual work in the following manner.  Data entry screens are designed such that they are very user friendly and minimum typing is required from the user.  Novice user can also use the system without any training.  System provides various information through reports quickly and accurately in easily understandable formats.  The new system is more user friendly due to GUI feature of ASP.NET  The system supports security at operational level i.e. it gives access to view and manipulate the information based on the user login.  It aimed to be a paperless software. There is no unnecessary printing of particular documents.  Faster access information.  Taking into the speed of computer access large data in less time and facilities provided by access.  Duplication of data will be avoided.  Menu driven interface provides ease of use.
  • 13. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 13 | P a g e 3.5 FACT FINDING TECHNIQUES The specific method analysts use for collecting data about requirements are called Fact finding. It encompasses all of that are go into the investigation, scoping and definition of a new or altered system. The first activity in analysis phase is to do the preliminary investigation. During preliminary investigation data collecting is a very important and for this we can use the fact finding technique. The following fact finding techniques can be used for collecting data.  Data collection  Correspondence & questionnaires  Personal interviews  Observation  Research Data Collection In this fact-finding step, the analyst gathers and organizes all documentation related to data carriers are forms, records, reports, manuals, procedures, and CRT display layouts. The analyst cautious in relying upon the validity of collected documents. Correspondence& Questionnaires Correspondence enables the analyst to explain the purpose of investigation activities and to inform people of what is expected from them. It is particularly important that interviews be preceded by correspondence defining the subject area and the specific topics to be reviewed. The questionnaire is an important and often effective type of correspondence. Personal Interview The personal interview is one of the most fruitful methods of obtaining information. An interview is a person to person communication. The analyst is more of a receiver than a sender when conducting an interview. Observation This is a skill which the analyst have to develop. The analyst have to identify the right information and choose the right person and look at the right place to achieve his objective.
  • 14. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 14 | P a g e He should have a clear vision of how each departments work and work flow between them and for this he should be a good observer. Observation allows analyst to gain information they cannot obtain by any fact finding method. 3.6 FEASIBILITY STUDY One of the important outcomes of the preliminary investigation is the determination of the feasibility of the system. These are different aspects of the feasibility study in the investigation phase. After the documents reviewing the selected personnel, investigating the various resources the following are the results for the three feasibility. Three key combinations are involved in the feasibility study  Economic feasibility  Technical feasibility  Operational feasibility 3.6.1 Economic Feasibility Economic analysis is the most frequently used method for evaluating the effectiveness of a candidate system. More commonly known as cost/benefit analysis, the procedure is to determine the benefit and saving that are expected from a candidate system and compare them with the term of time by automating the process of report generation. The system can be developed technically and if installed would still be good for the organization. The cost is found to be lesser compared to the benefits of the proposed system. The workload of a user will decrease to half of the current workload. Hence the proposed system is found to be economic feasible. 3.6.2 Technical Feasibility Technical study is a study of hardware and software requirements. All the technical issue related to the proposed system is dealt during feasibility stage of preliminary investigation produced. Technical feasibility analysis makes a comparison between the levels of technology available that is needed for the development of the project. The levels of
  • 15. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 15 | P a g e technology consist of factors like software tools, machine environment, platform developed and so on. The consideration that is normally associated with technical feasibility includes resources availability of the organization, where the project is to be developed and implemented. By taking these factors into consideration before developing, the resources available are adequate. Thus the project is considered technically feasible for development. 3.6.3 Operational Feasibility The developed system is completely driven and user friendly. Also the system is developed in ASP.NET. There is little need skill for new user to operate the software. Reports will be exactly as per the requirement. The maintenance and modification of the new system needs very less human effort. Using command buttons throughout the application programs enhances the operational feasibility. The new system is operationally feasible and makes the operations simpler and quite easier. At the beginning of preliminary investigation work all the personnel approached responded positively this reduces the chance of resistance to the proposed system. Considering all the issue stated above makes the proposed system operationally feasible.
  • 16. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 16 | P a g e SYSTEM SPECIFICATION
  • 17. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 17 | P a g e 4.1 SOFTWARE SPECIFICATION Operating System : Windows 7 Front End : ASP.NET 2012 Back End : Microsoft SQL Server 2008 Server Side Scripting : C#.NET Browser : Any Browser with JavaScript & XML Support 4.2 HARDWARE SPECIFICATION Processor : Intel Pentium IV Processor Speed : 1GHz Monitor : Compactable Monitor RAM : 2 GB Hard Disk : 40 GB (Including DB Requirements) Keyboard : Multimedia Keyboard Mouse : Optical Mouse
  • 18. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 18 | P a g e SYSTEM DESIGN
  • 19. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 19 | P a g e 5.1 INTRODUCTION TO SYSTEM DESIGN System designs main aim is to identify the modules that should be in the system, and the specifications of these modules and how they interact with each other to produce the desired results. At the end of the system design all the major data structures, file formats and the major modules in the system and their specification are decided. Activities in the design phase are described briefly as follows: Allocation of function: The data flow diagrams prepared during the study phase and reviewed and expanded in order to allocate function between manual tasks, equipment functions and computer program function. Manual task definition: Requirements resulting from human interfaces with the computer- based component of the system are described. Reference manual identification: Reference manuals required by user personnel programmers, and equipment operations are identified. Equipment function definition: The functions to be performed by hardware (rather than by computer programs or manual operations) are defined. Equipment specification: The hardware configuration used to convert input data to meaningful output information is described. Computer program function definition: The specific functions of the computer program component of the overall system are defined, and design requirements for external system inputs are established. Database design: The storage requirements of all the data elements on which the computer programs operate are calculated, taking into account the size and volume of the records to be stored and the methods of file organization and access. 5.2 INPUT DESIGN The input is the set of values that is provided by the user to the system. The input design must enable the user to provide the error free input to the system for efficient
  • 20. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 20 | P a g e processing. The input data have to be validated, edited, organized, and accepted by the system before being proposed to produce the outputs. The main objectives of input design are as follows:  Produce effective method of input  Achieve high level accuracy  Ensure that the input is acceptable and understood by the user The different types of input data handled by the system are: External They are the primary inputs to the system. The external input is what the user supplies to the system. The user can give different types of external inputs in this project such as add new thread, post reply etc. Internal When the external inputs are obtained from the user, these inputs are transferred to the system as message. These message are captured and handled as input for further processing. The necessary external inputs are given to the system by Graphical User Interface (GUI) technology. The GUI system applied to this project enables the user to avoid error and confusion arises while entering the input. 5.3 OUTPUT DESIGN Outputs are the most important direct source of information to the user and to the management. Efficient and eligible output design should improve the system’s relationship with the user and help in decision making, Output design generally deals with the results generated by the system i.e., reports. These reports can be generated from stored or calculated values. Reports are displayed either as screen window preview or printed form. Most end users will not actually operate the
  • 21. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 21 | P a g e information system or enter data through workstation, but they will use the output from the system. Outputs from computer systems are required primarily to communicate the results of processing to the user. They are also used to provide a permanent copy of these results for later consultation. While designing output, the system analyst must accomplish the following:  Determine what information to present  Decide where to display  Give each output a specific name or title  Select the output medium  Give facility to print the information if necessary 5.4 DATABASE DESIGN Relationships between data elements, functions to be performed, and techniques for file organization are studied in detail so the most appropriate storage device can be selected and an efficient data base design can be achieved. The storage requirements for all data elements on which the computer programs operate are calculated, taking into account the size and volume of the records to be stored and the methods of file organization and access. The interfaces between the system data base and other data bases are identified by specifying the data that must flow between them. Databases are designed to manage large bodies of information. One of the major purpose of a data base system is to provide users with an abstract view of data. A database is designed so that it can be used both to specify the overall logical structure of the database and provide a higher level description of the implementation
  • 22. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 22 | P a g e 5.5 FORM DESIGN People read from forms, write on forms, and spend billions of hours handling forms and filling forms. The data that forms carry comes from people, and the information output of the system goes to people. So the form is a tool with a message, it is a physical carrier of the data of information. It is also can constitute authority for action. Each form is a request for action. It provides information for making decisions and improving operations. Requirements of Form Design Form design allows analyzing forms, evaluating present documents, and creating new or improved forms. Bear in mind that detailed analysis occurs only after the problem definition stage and the beginning of candidate system. Since the purpose of a form is to communicate effectively through form design, there are several requirements:  Reduced development time  Increased reuse of code  Enhanced user experience Principles behind good form design Layout should be simple and clear. Try to split your form into section with appropriate subheadings. This will help the user understand what is being requested. It will also encourage you to place data entries in a logical sequence, which is often what a user expects. Prototypes are very helpful during the design process. Details about Form Elements There are a number of points to consider regarding form elements, as follow  Limit the number of items in your select lists.  Put the most often-selected entries at top of the selected list.  When possible, use the size attribute with select lists.
  • 23. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 23 | P a g e  Don’t present long vertical lists of checkboxes or radio buttons.  Avoid using Reset buttons except in applications that support continuous data entry. 5.6 ARCHITECTURAL DESIGN Architecture is an overall structure of a system. Architecture takes into consideration the overall working of the system. Larger system can be decomposed into subsystems that provide some related set of services. The initial design process of identifying these sub systems and establishing a framework for subsystem control and communication is called architecture design. Architecture design usually comes before detailed system specification. Architecture decomposition is necessary to structure and organize the specification. There is no generally accepted process depends on application knowledge and on the skill and intuition of the system architect. Assessment Collection System follows 2-tier architecture. In the client side, user select forms and submits pages (first tier). Then it passes to the main server where the data and the business process are stored (second tier). Then, server responds with appropriate information as pages or text. Architectural design is the back born for building successful software intensive system. A good software structure design results in the development of a project working system. For the development of the software, modules were identified. This software was developed into separate named and addressable components that are integrated to satisfy the problem requirements 5.7 SYSTEM MODULES Registration Add category Approve Registration Approve item Add an item View bid item View winner My uploads View profile
  • 24. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 24 | P a g e DATA FLOW DIAGRAM
  • 25. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 25 | P a g e 6.1 INTRODUCTION TO DATA FLOW DIAGRAM Data flow diagram is a network that describes the flow of data throughout the system. Data stores and the process that changed or transform data flows. The data flow diagram network is logical abstract of a system that may have mainly possible physical configuration. Data flow diagrams are constructed from four basic symbols. Using these symbols a system analyst can construct a logic network that traces data streams throughout a system. A level zero DFD is also called a fundamental system or context model, represents the entire software element of a single bubble with input and output data indicated by incoming and outgoing arrows. These are expanded level by level each explaining its process in detail. Process are numbered for easy identification and are normally labeled in block letters. Each data flow is labeled for easy understanding. The various symbols used are Source or destination of data Data flow Process that transforms data flow Data store Te ac he rs Gr adi ng
  • 26. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 26 | P a g e TABLE STRUCTURE
  • 27. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 27 | P a g e 7.1 INTRODUCTION TO TABLE STRUCTURE Table is a collection of complete details about a particular subject. These data are saved in rows and columns. The data of each row are different units. Hence, rows are called RECORDS and Columns of each row are called FIELDS. Table design means how data should be organized around user requirements. How data are organized depends on the data and response requirements that determine hardware configurations. An integrated approach to file design is the database. The general theme around in the database is to handle information as an integrated whole. Data is stored in tables, which is available in the back end. The items and data, which are entered in the input, form id directly stored in this table using linking of database. We link more than one table to input forms. We can collect the details from the different tables to display on the output screen.
  • 28. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 28 | P a g e SYSTEM TESTING
  • 29. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 29 | P a g e 8.1 INTRODUCTION TO SYSTEM TESTING Software testing is a critical element of software quality assurance and represents the ultimate reviews of specification, design and coding. Testing present an interesting anomaly for the software. Testing is vital to the success of the system. Errors can be injected at any stage during development. System testing makes a logical assumption that if all the parts of the system are correct, the goal will be successfully achieved. During testing, the program to be tested is executed with set of test data and the output of the program for the test data is evaluated to determine if the program is performing as expected. A series of testing are performed for the proposed system before the system is ready for user acceptance testing. 8.2 UNIT TESTING Unit testing focuses verification effort on the smallest unit of the software design, the module this is known as module testing. Since the proposed system has modules the testing is individually performed on each module. Using the details description as a guide, important control paths are tested to uncover errors within the boundary of the modules. This testing was carried out during programming stage itself. In this testing step each module is found to be working satisfactorily as regards to the expected output from the module . Module interface is tested to ensure that the information properly flow and out of the program under test.  Data consistency is tested to ensure that the data stored maintains its integrity during all steps in algorithm execution.  All independent paths are examined to ensure that all the statement in the module have been executed at least once. 8.3 INTEGRATION TESTING Data can be test across an interface; one module can have adverse effect on another, sub function when combined may not produce the desired function. Integration testing is a
  • 30. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 30 | P a g e systematic technique for constructing the program structure while at the same time conducting test to uncover errors associated within the interface. The objective is to take unit tested modules and built a program structure that has been dictated by design. All modules are combined in this testing step. The entire program is tested as a whole. Correction is difficult at this stage because the isolation of causes is complicated by the vast expense of the program. Thus in the integration testing step all the errors uncover are corrected for the next testing step. 8.4 VALIDATION TESTING At the culmination of integration testing, software is completely assembled as a package. Interfacing errors have been uncovered and corrected and a final series of software test-validation testing begins. Validation testing can be defined in many ways, but a simple definition is that validation succeeds when the software functions in manner that is reasonably expected by the user. Software validation is achieved through a series of tests that demonstrate conformity with requirement. After validation test has been conducted, one of two conditions exists.  The function or performance characteristics confirm to specifications and are accepted.  A validation from specification is uncovered and a deficiency created. Deviation or error discovered at this step in this project is corrected prior to completion of the project with the help of the user. Thus the proposed system under consideration has been tested by using validation testing and found to be working satisfactorily.
  • 31. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 31 | P a g e SYSTEM IMPLEMENTATION
  • 32. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 32 | P a g e 9.1 INTRODUCTION TO SYSTEM IMPLEMENTATION Implementation is the stage in the project where the theoretical design is turned into a working system and is giving confidence on the new system for the users that it will work efficiently and effectively. It involves careful planning, investigation of the current system and its constraints on implementation, design of methods to achieve the changeover, an evaluation, of change over methods. Implementation is the final and important phase. The most critical stage in achieving a successful new system and in giving the users confidence that the new system will work and be effective. The system can be implemented only after thorough testing is done and if it found to working according to the specification. This method also offers the greatest security since the old system can take over if the errors are found or inability to handle certain type of transactions while using the new system. At the beginning of the development phase a preliminary implementation plan is created to schedule and manage the many different activities must be integrated into plan. The implementation plan is updated throughout the development phase, culminating in a changeover plan for the operation phase. The major elements of implementation plan are test plan, training plan, equipment installation plan and a conversion plan. There are three types of implementation:  Implementation of a computer system to replace a manual system.  Implementation of a new computer system to replace an existing one. Implementation of a modified application to replace an existing one, using the same computer. Implementation includes all those activities that place to convert from the old system to the new one. The new system may be totally new, replacing an external system manual or automated system or it may be a modification to an external system. The process of putting the developed system in actual use is called system implementation. This includes all those activities that take place to convert to old system to new one. The most crucial stage is achieving a new successful system and giving confidence in new system that it will work efficiently and effectively. The system is implemented only after through checking is done and if it is found working according to the specifications.
  • 33. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 33 | P a g e It involves careful planning, investigation of the current system and constrains on implementation, design of methods to achieve. Two checking is done and if it is found working according to the specification, major task of preparing the implementation are educating, training the users. The more complex the system being implemented, the more involved will be the system analysis and the design effort required just for implementation. The method of implementation and the time scale adopted are found out initially. Next the system is rested properly and the same time user are trained in the new product. Issues to consider in the Evaluation of Information System 1. How have information systems changed the cost of operation? 2. How have information systems changed the way in which operations are performed? 3. How have information systems changed the accuracy of information that users receive? 4. How have information systems changed the timeliness of information and reports users receive? 5. How has information systems brought about organization changes? Are these changes for the better or for the worse? 6. How have information systems changed the completeness of the information? 7. How have information systems changed control or centralization? What is the effect of such changes? 8. How have information systems changed the attitude of systems users or persons affected by the system? 9. How have information systems changed the number of users? 10. How have information systems changed the interactions between members of the organization? 11. How have information systems changed productivity? 12. How have information systems changed the efforts that must be expended to receive information for decision making? System Maintenance The maintenance phase of the software cycle is the time in which a software product performs the useful work. After a system is successfully implemented, it should be
  • 34. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 34 | P a g e maintained in a proper manner. System maintenance is an important aspect in software development cycle. The system should be maintained and upgraded according to the technological advancements. It ensures the data control and security. The system must be protected from fire and other natural calamities. The backup copies of data must be maintained daily so that to prevent the loss of data due to various reasons. Software maintenance is of course far more than finding mistakes we may define maintenance by describing four activities that are undertaken to after a program is released for use Software maintenance activities can be classified in to  Corrective maintenance  Adaptive maintenance  Perfective maintenance  Preventive maintenance
  • 35. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 35 | P a g e CONCLUSION
  • 36. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 36 | P a g e 10. CONCLUSION The project entitled ‘Cyber Bidding Gateway’ is done to make manual process easier by making it a computerized system for user registration and bidding. Cyber bidding gateway is an integrated web application that handle the online bidding. The project was successfully completed within the time span allotted. The drawbacks of the existing system as listed before are fully evacuated. All the existing inconsistencies are fully solved as this system is implemented. This reduced the burden of the administration of the system. All the modules are tested separately and put together to form the main system. Finally the system is tested with real data and it worked successfully. Thus the system has fulfilled the entire objective defined. The system has been developed in an interactive manner; the reports generated by the system are clear. The system is flexible, user friendly and has its own full data security and all data recovery facility. The developed system has mainly for modules administrator, seller, buyer, and bidding. It is developed using ASP.Net and Microsoft SQL Server.
  • 37. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 37 | P a g e APPENDIXES
  • 38. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 38 | P a g e 11.1 APPENDIXA: TABLES Table 1: tbl_login Foreign Key: username Field Name Data Type Description username Varchar(50) To specify the username password Varchar(50) To identify the user role Varchar(50) To identify the role Table 2: tbl_registration Primary Key: username Field Name Data Type Description firstname Varchar(50) To specify the first name lastname Varchar(50) To specify the last name house_name Varchar(50) To specify the address location Varchar(50) To specify the location Street Varchar(50) To specify the street city Varchar(50) To specify city pincode Int To specify the pin district Varchar(50) To specify the district state Varchar(50) To specify the state Email_id Varchar(50) To specify the mail mobile Bigint To specify the number User_Name Varchar(50) To specify the username status Bit Approve or not Password Varchar(50) To identify the user
  • 39. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 39 | P a g e Table 3: tbl_categorys Primary Key: categorys_id Table 4: tbl_item Primary Key: item_id Field Name Data Type Description Category_id Int To specify the category id Category_name Varchar(50) To specify the category Field Name Data Type Description Item_id Int To specify the itemid username Varchar(50) To specify the username Category_id Int To specify the categoryid Item_name Varchar(50) To specify the item name Description Varchar(50) To specify the description Min_rate Float To specify rate Increment_value Int To specify the rate increment Start_date Date To specify the bid start date End_date Date To specify bid end date status Bit To specify the status bidstatus Int To specify the bidstatus
  • 40. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 40 | P a g e Table 5: tbl_image Primary Key: image_id Foreign key: item_id Table 6: tbl_bid_details Primary Key: bid_details_id Field Name Data Type Description Bid_details_id Int To specify the biddetailsid Item_id Int To specify the itemid Username Varchar(50) To specify the username Mobile Varchar(50) To specify the mobile Email Varchar(50) To specify the email bidrate Float To specify bidrate Table 7: tbl_userbid Primary Key: user_bid_id Foreign key: item_id Field Name Data Type Description Image_id Int To specify the imageid Image_path Varchar(max) To specify the image path Item_id Int To specify the itemid Field Name Data Type Description User_bid_id Int To specify the bidid Username Varchar(50) To specify the username Item_id Int To specify the itemid Rate Float To specify the rate date Varchar(50) To specify the biddate
  • 41. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 41 | P a g e 11.2 APPENDIXB: DFD LEVEL 0
  • 42. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 42 | P a g e LEVEL 1 ADMI
  • 43. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 43 | P a g e USER GUEST
  • 44. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 44 | P a g e LEVEL 2 ADMIN USER
  • 45. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 45 | P a g e GUEST 11.1 APPENDIXB: SCREEN SHOTS
  • 46. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 46 | P a g e WELCOME PAGE REGISTRATION
  • 47. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 47 | P a g e FORGET PASSWORD
  • 48. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 48 | P a g e LOGIN USER-HOME PAGE
  • 49. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 49 | P a g e ADD ITEM
  • 50. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 50 | P a g e MY UPLOADS
  • 51. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 51 | P a g e CHANGE PASSWORD UPDATE PROFILE
  • 52. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 52 | P a g e VIEW BID ITEMS
  • 53. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 53 | P a g e BUY BID ITEM
  • 54. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 54 | P a g e VIEW WINNER
  • 55. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 55 | P a g e PAYMENT ADMIN-HOME PAGE
  • 56. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 56 | P a g e ADD CATEGORY APPROVE REGISTRATION
  • 57. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 57 | P a g e APPROVE / UN APPROVE ITEM APPROVE BID WINNER
  • 58. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 58 | P a g e LOGOUT
  • 59. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 59 | P a g e BIBLIOGRAPHY 12. BIBLIOGRAPHY
  • 60. CYBER BIDDING GATEWAY DEPARTMENT OF COMPUTER SCIENCE COLLEGE 60 | P a g e  Mastering visual c#.NET by Jason Price  Professional visual studio 2010 by Bruce Johnson  Sql server 2008 for Developers  www.stackoverflow.com  www.codeproject.com  www.auction.indiatimes.com  www.ubid.com  www.msdn.com