e-deal management system

Upload: sudharsan-santharam

Post on 08-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 E-Deal Management System

    1/50

    ABSTRACT

    The project entitled E-Deal Management System is developedon behalf of Elysium Group Of Companies.

    A system for generating, in a retail store, a printable discount coupon

    image solely in response to a customer's action concerning the purchase of

    an item.

    The system includes at least one customer checkout terminal, a store

    controller, a file for storing the terms of at least one coupon deal . The triggering product in the customer order, associates it with the coupon

    deal, and automatically generates data defining at least one discount

    coupon for a product........

  • 8/6/2019 E-Deal Management System

    2/50

    ACKNOWLEDGEMENT

    First and foremost I concede the surviving presence and the

    flourishing refinement of ALMIGHTY GOD for his concealed hand yetsubstantial all through the project.

    My sincere thanks to Dr.M.Sachithanantham B.E., M.Tech.,

    Ph.D., Principal, K.L.N. College of Information Technology , for

    providing facilities to successfully carry the project work.

    My sincere thanks to Mr.N.Ayyanathan

    MCA.,P.G.D.C.A.,P.G.M.M.., (Ph.D.,)

    Director of Department of Computer Applications, K.L.N. College of

    Information Technology , for his encouragement throughout the project

    work.

    I sincerely thank Mrs.B.Sarojini MCA, M.Phil(COMP.SC.),(PH.D) , for

    her valuable guidance and constant encouragement that helped me to

    complete the project. I also thank my Guide Ms.M.Seethalakshmi

    M.C.A., M.Phil, Lecturer, Department of M.C.A for her constant

    encouragement, kind co-operation, valuable suggestions and support

    rendered in making my project a success.

    I offer my whole hearted thanks to Mr.K.Rajasekar M.C.A External

    Guide, AMAIN INFOTECH for her kind cooperation in office development lab

    & culminating in the successful completion of project work.

    I also thank all the other Staff Members of the department of

    Computer Applications who gave me many suggestions from time-time

    that made my project work better and well furnished.

    2

  • 8/6/2019 E-Deal Management System

    3/50

    I take this beautiful opportunity to thank my Parents and my

    Friends for giving me so much confidence and strength to work on our

    project.

    Saravan

    an.S.S.

    TABLE OF CONTENTS

    CHAPTER NO TITLE PAGE NO

    Abstract iList of Tables viii

    List of Figures ix

    1 INTRODUCTION 9

    1.1. Introduction

    1.2. Corporate profile

    1.3. Problem Definition

    2 SYSTEM ANALYSIS & DESIGN 13

    2.1. Problem Analysis

    2.2. System requirements

    2.3. H/W & S/W Specification

    2.4. System Design

    2.5. Modular Design

    2.5.1. Context Flow Diagrams

    2.5.2. Data Flow Diagrams

    2.6. Algorithms

    2.7. Coding implementation

    3 TESTING & IMPLEMENTATION 32

    3.1. Testing

    3

  • 8/6/2019 E-Deal Management System

    4/50

    3.1.1. Unit Testing

    3.1.2. Integration Testing

    3.1.3. User Acceptance Testing

    3.2. Implementation & Maintenance3.3. Enhancements & Future work

    3.4. Conclusion

    4 APPENDICES 39

    A Screen Shots

    B Overall Table DesignC References

    4

  • 8/6/2019 E-Deal Management System

    5/50

  • 8/6/2019 E-Deal Management System

    6/50

    LIST OF FIGURES

    FIGURE NO FIGURE NAME PAGE NO

    1 usecase diagram 282 Context flow diagram 293 Sequence Diagram 304 Data flow diagram 31

    CHAPTER 1

    1. INTRODUCTION

    6

  • 8/6/2019 E-Deal Management System

    7/50

    The vast majority of computer and communication systems use

    passwords in order to identify users. Unfortunately, in ubiquitous alpha-

    numeric password schemes, users tend to choose passwords withpredictable characteristics, related to how easy they are to remember. To

    overcome the vulnerabilities of textual passwords, a lot of alternative

    techniques have been proposed such as visual or graphical login, biometric

    systems and fingerprint verification. In this paper we focus on graphical

    password techniques

    1.1. ORGANIZATION PROFILEElysium Group Of Companies

    Introduction:

    To illuminate the world we started Elysium Technologies to

    serve humanity utmost to their satisfaction. Our propensity to

    service induce us to expand our horizons as we plunge into eleventh

    year and our growth stands as landmarks in the field of excellence.

    Elysium knows knowledge is unbound and realizes the margin fades

    forever and ever as it moves.

    But within its boundaries, the disseminated knowledge

    embodies the spirit of enquiry, research and quality. Our search is

    incessant, our service is ceaseless and our perseverance untiring.

    Distribution of right knowledge, dispersal of wisdom and creation of

    individuals of distinction is our pursuit.

    7

  • 8/6/2019 E-Deal Management System

    8/50

    Elysium has grown and matured with every successful project

    delivered. The challenges and hurdles we have faced over the years

    have helped us to streamline and build strong processes. Elysium

    has emerged as a strong and stable organization that our clients can

    entrust on without any risk. In fact, our client list has grown, and

    most importantly we have retained each and every client that we

    have served so far. These achievements have given Elysium the

    strength to surge ahead into a promising future.

    About Us

    Elysium group of companies have grown to its current position as the

    largest global solutions firm in Asia on the basis of its outstanding service

    record, collaborative partnerships, innovative and corporate responsibility.

    We are proud of our heritage, which is founded in 1999.

    Our mission reflects the Elysium Group's longstanding commitment

    to provide excellence to help customers to achieve their business

    objectives and by providing innovative ideas, best in solutions and

    services. Our vision is to be one of the top 10 global service providers by

    the year 2010. Our values: Leading change, Integrity, Respect for the

    individual, Excellence, Learning and sharing. Our ability is to deliver high-

    quality services and solutions.

    8

  • 8/6/2019 E-Deal Management System

    9/50

    Elysium Technologies, leading digitization solutions provider

    catering to the needs of enterprises in Tamil Nadu Founded in 1999

    by a band of offspring's from some of the leading software

    companies in Madurai. Engineers at Elysium Technologies gained

    their expertise by executing projects varying from Website roll out to

    e-commerce portal development. We have experts in Web

    development and design, Multimedia CD presentation for Corporatist.

    Vision And Mission

    Elysium is a social utility that helps people to excel in their

    profession and communicate more efficiently with their friends,

    family and coworkers. The company develops technologies that

    facilitate the sharing of information through this site.

    Mission Statement

    "Elysium will actively promote and preserve the highest

    standards of quality and ethical values in customer care, education,

    training and research and will pursue excellence in all these areas

    while consciously meeting the expectations of the people it serves

    without prejudice and in all fairness stay socially meaningful in its

    propagation of support and strength to humanity at large".

    9

  • 8/6/2019 E-Deal Management System

    10/50

    Our mission reflects the Elysium Group's longstanding

    commitment to provide excellence to help customers to achieve their

    business objectives and by providing innovative ideas, best in

    solutions and services. Our vision is to be one of the top 10 global

    service providers by the year 2010. Our values: Leading change,

    Integrity, Respect for the individual, Excellence, Learning and

    sharing. Our ability is to deliver high-quality services and solutions.

    1.2. PROBLEM DEFINITION.

    we investigated the security of the Pass-Points graphical password scheme

    and the suitability of the underlying images, by providing a model that

    predicts the

    users' click points and their saliency value. From this we predicted the

    entropy of a click point in a graphical pass-word.

    We tested our model experimentally on two images. We analyzed the

    password security of those underlying images by computing the entropy of

    a click point, and we compared

    the predictions produced by our model with data consisting of roughly 100

    actual passwords selected by users

    . Inthese (very small) images our model was able to predict 70-80% of the

    user click positions (Table 2). The results show that our model can be used

    10

  • 8/6/2019 E-Deal Management System

    11/50

    to evaluate the suitability of an underlying image for the PassPoints

    system.

    Our model could be improved by extending the FoA mapso that, in additionto centroids of regions, it includes midand end points of edges in the

    image, as well as corner points

    or tips of pointy regions. Moreover, in image segmentation,texture

    information may be included to get better results in natural images. A

    more dicult, but very important

    improvement of the model would be to include \high-level" factors of

    attraction (i.e., based on image \content").

    we only considered individual click points. In order to predict entire

    passwords we must consider the correlations between click points in a

    graphical password. Finally, for

    a better experimental test of our model we would need to collect

    thousands of graphical password data for types of images

    11

  • 8/6/2019 E-Deal Management System

    12/50

    CHAPTER 2

    2. SYSTEM ANALYSIS & DESIGN

    2.1 PROBLEM ANALYSIS

    EXITSING SYSTEM

    1.3.2. PROPOSED SYSEM

    In the online shopping, internet marketing and every e-commerce

    site is launching new features and offering something new to attract more

    and more customers.

    The latest talks about online discount coupons. That means one get rebate

    in a particular outlet on various products.

    High discounts are given on the products to gain more satisfiedcustomers.

    12

  • 8/6/2019 E-Deal Management System

    13/50

    FEASIBILITY STUDY

    In the system survey we conduct the feasibility study. The key

    considerations involved in the feasibility are:

    Economic feasibility

    Technical feasibility

    Behavioral feasibility

    Operational feasibility

    The proposed system must be evaluated from a technical view point first,

    and if technical feasibility their impact on the organization must be

    assessed. If compatible, behavioral system can be devised. Then they

    must be tested for economical feasibility.

    TECHNICAL FEASIBILITY

    The assessment of technical feasibility must be based on an outline

    design of system requirements in terms of input, output, fields, programs,

    and procedures. This can be qualified in terms of volumes of data, trends,

    frequency of updating, cycles of activity etc, in order to give an

    introduction of technical system.

    BEHAVIORAL FEASIBILITY

    People are inherently resisted to change and computers have been

    known to facilitate change. Since the new proposed system is nothing to

    do with the ordinary customers and worker resistance to the system is very

    13

  • 8/6/2019 E-Deal Management System

    14/50

    much less. On the other hand the user of the system are accessing this

    system through Internet and they are computer literate, so resistance from

    that side is also very less.

    ECONOMICAL FEASIBILITY

    Justification of any capital outlay is that it will reduce expenditure or

    improve the quality of service or goods, which in turn may be expected to

    provide increased profits. The technique of cost benefit analysis is often used a basis for assessing

    economic feasibility

    OPERATIONAL FEASIBILITY

    Operational feasibility can be determined by visualizing if the

    resources that are required to implement or install are already available in

    the organization. The fact that the organization basically being involved in

    software development clearly states that the personals are in need of no

    exposure to computer. Hence the system, its development and

    implementation is very much desired. The management also being

    convinced about the system, the project can be termed as operationally

    feasible.

    PROJECT FEASIBILITY STUDY

    Our project is feasible in all ways in satisfying the requirements

    needed by the clients due to the above reasons.

    14

  • 8/6/2019 E-Deal Management System

    15/50

    2.2 SYSTEM REQUIREMENTS

    .NET FRAME WORK

    The .NET Frame work is many things, but it is worth while listing its

    most important aspects. In short the .NET Frame work is :

    A Platform designed form the start for writing. Internet-aware and

    Internet -enabled applications that embrace and adopt open standards

    such as XML, HTTP, and SOAP.

    A platform that provides a number of very rich and powerfulapplication development technologies, such as Windows Forms, used to

    build the classic GUI applications, and of course ASP.NET,used to build web

    applications.

    A Platform with an extensive class library that provides extensive

    support for date access (relational and XML), a director services, message

    queuing, and much more.

    A Platform that has a base class library that contains hundreds of

    classes for performing common tasks such as file manipulation, registry

    access, security, threading, and searching of text using regular

    expressions.

    15

  • 8/6/2019 E-Deal Management System

    16/50

    A Platform that doesnt forget it origins, and has great

    interoperability support for existing components that you or third parties

    have written , sing COM or standard DLLs.

    A Platform with an independent code execution and management

    environment called the Common Language Runtime(CLR), which ensures

    code is safe to run, and provides an abstract layer on top of the operating

    system, meaning that elements of the .NET framework can run on many

    operating systems and devices.

    ASP.NET

    ASP.NET is part of the whole. NET framework, built on the top of the

    Common Language Runtime (also known as the CLR) a rich and flexible

    architecture, designed not just to cater for the needs of developers today,

    but to allow for the long future we have ahead of us. What you might not

    realize is that, unlike previous updates of ASP, ASP.NET is very much more

    than just an upgrade of existing technology- it is the gateway to a whole

    new era of web development.

    ASP.NET is a feature at the following web server releases

    Microsoft IIS 5.0 on WINDOWS 2000 SERVER

    Microsoft IIS 5.1 on WINDOWS XP

    16

  • 8/6/2019 E-Deal Management System

    17/50

    ASP.NET has been designed to try and maintain syntax and run-time

    compatibility with existing ASP pages where ever possible. The motivation

    behind this is to allow ASP Pages to be initially migrated ASP.NET by simply

    renaming the file to have an extension of .aspx. For the most part this goalhas been achieved although there are typically some basic code changes

    that have to be made, since VBScript is no longer supported, and the VB

    language is it has changed.

    Some of the key goals of ASP.NET were to

    Reduce the amount of code required to develop web applications.

    Make ASP.NET well factored, allowing customers to add in their own

    custom functionality, and extend/replace built-in ASP.NET functionality.

    Make ASP.NET a logical evolution of ASP, where existing ASP investment

    and therefore code can be reused with little, if any, change.

    Realize that bugs are a fact of life, as ASP.NET should be as fault

    tolerant as possible.

    BENEFITS OF ASP.NET

    The .NET Frame work includes a new data access technology named

    ADO.NET, an evolutionary improvement to ADO. Though the new data

    access technology is evolutionary, the classes that make up ADO.NET bear

    little resemblance to the ADO objects with which you might be familiar.

    Some fairly significant changes must be made to existing ADO applications

    to convert them to ADO.NET. The changes dont have to be made

    immediately to existing ADO applications to run under ASP.NET, however.

    17

  • 8/6/2019 E-Deal Management System

    18/50

    ADO will function under ASP.NET. However, the work necessary to

    convert ADO applications to ADO.NET is worthwhile. For disconnected

    applications, ADO.NET should offer performance advantages over ADO

    disconnected record sets. ADO requires that transmitting and receivingcomponents be COM objects.ADO.NET transmits data in a standard XML-

    format file so that COM marshaling or data type conversions are not

    required.

    ASP.NET has several advantages over ASP

    The following are some of the benefits of ASP.NET: Make code cleaner

    Improve deployment, scalability, and reliability.

    Provide better support for different browsers and devices.

    Enable a new breed of web applications.

    C#

    C# is a general purpose programming object oriented language

    invented around 1999 or 2000 by Anders Hejlsberg at Microsoft. It is very

    similar to Java in its syntax with a major difference being that all variable

    types are descended from a common ancestor class.

    The purpose of C# is to precisely define a series of operations that a

    computer can perform to accomplish a task. Most of these operations

    18

  • 8/6/2019 E-Deal Management System

    19/50

  • 8/6/2019 E-Deal Management System

    20/50

    from the connected, tightly coupled style of programming that

    characterized the client/server era, where a connection was held open for

    the duration of the programs lifetime ad no special handling of state was

    required.

    In designing tools and technologies to meet the needs of todays

    developer, Microsoft recognized that an entirely new programming model

    for data access was needed, one that is built upon the .NET Framework.

    Building on the .NET Framework ensured that the data access technology

    would be uniform-components would share a common type system, designpatterns and naming conventions.

    ADO.NET was designed to meet the needs of this new programming

    model: disconnected data architecture, tight integration with XML,

    common data representation with the ability to combine data from multiple

    and varied data sources, and optimized facilities for interacting with a

    database, all native to the .NET Framework.

    XML SUPPORT

    XML and data access are intimately tied-XML is all about encoding

    data, and data access is increasingly becoming all about XML. The .NET

    Framework does not just support Web standards-it is built entirely on the

    top of them.

    20

  • 8/6/2019 E-Deal Management System

    21/50

    2.3.1 Hardare Requirement

    : Processor : Pentium IV (Compatible).

    RAM : 512 MB.

    Hard disk : 80 GB.

    2.3.2 Software Requirement

    Server : IIS (Internet Information Service) 6.0.

    Operating System: Windows 2000 & Above.

    Database : SQL Server 2005.

    Web technology : ASP.Net v 2.0# .Net

    Scripting Tool : HTML

    21

  • 8/6/2019 E-Deal Management System

    22/50

    2.4 SYSTEM DESIGN

    Modules Description

    The project contains following modules:

    LIST OF MODULES:

    Administration

    Customer

    Vendor

    MODULE DESCRIPTION:

    Administration:-

    Sub Modules:-

    Login

    Manage The Customer And Vendor Details

    Update The Coupon Details

    Send The Offer Details Via Sms/E-Mail

    Manage The Payment SystemValidate The Coupon Details

    22

  • 8/6/2019 E-Deal Management System

    23/50

    Login:-

    In login there are two types of login is specified one type of login

    is for administrator and another type of login is user login in

    admin only admin can login and in the user all the user those

    who will have the id can able to login in our portal .

    Manage The Customer And Vendor Details:-

    In this module the customer and vendor will be managed here if

    once customer registered he may not be getting the

    authenticated rights only if the admin allow then the customer

    is allowed to interact with the system, that means he can get

    into the portal in our portal the both vendor as well as the

    customer will be having account and their account should beeffectively maintained by the admin.

    Update The Coupon Details:-

    The coupon should be updated properly and it should be

    updated periodically so the coupon displayed here should beupdated and the work should be updated correctly

    Send The OfferDetails Via Sms/E-Mail:-

    23

  • 8/6/2019 E-Deal Management System

    24/50

    Offers should be properly intimated to the customer in such a

    way through his mobile or E-Mail...........

    Manage The Payment System:-

    Here all(Customer and Vendor) the transaction are managed

    by adminstrator..

    And It Manage Properly....

    Validate The Coupon Details:-

    Here Coupons are validated by administrator. Whether coupon

    is validate means offers are intimated to that appropriate

    customer. Otherwise coupon will be considered as expired one.

    Customer

    Sub-Modules:-

    Registration

    Product Choosen

    Vendor

    Sub-Modules

    24

  • 8/6/2019 E-Deal Management System

    25/50

    Registration

    Validation

    Type of Offers

    USECASE DIAGRAM

    25

    QueryDatabase

    Authentication

    Authentication by

    username, pwd

    Authentication by

    graphicalimage

  • 8/6/2019 E-Deal Management System

    26/50

    Context flow diagram:

    a

    26

    User(admin) User name password Finger print Bank proces

    Data base

    verify

    I image check

  • 8/6/2019 E-Deal Management System

    27/50

    Data flow diagram

    27

  • 8/6/2019 E-Deal Management System

    28/50

    user

    Image Separation

    Deposit

    MiniStatement

    Transaction

    Report

    WithdrawData

    base

    28

  • 8/6/2019 E-Deal Management System

    29/50

    Sequence Diagram:

    29

    ImageUser MiniStmtAuthendicationWithdraw/Deposit

    Click choosen

    ImageDisplay

    Click correctclick oints Provide password

    authendication

    Applying formini report

    Receiving minireport

    ReciveWithdraw amount

    Apply towithdraw/

    Depositamount

  • 8/6/2019 E-Deal Management System

    30/50

  • 8/6/2019 E-Deal Management System

    31/50

    Specific

    Practical

    Justified

    The testing Strategy provides the overall guidelines from which all future

    testing decisions are made. A well-crafted Testing Strategy allows the rest

    of the testing process to be defined more effectively.

    The test strategy is formal description of how a software product will

    be tested. A test strategy is developed for all levels of testing, as required.

    The test team analyses the requirements, writes the test strategy andreview a plan with the project team. The test plan may include test cases,

    conditions, and the environment, a list of related tasks, pass/fail criteria

    and risk assessment. Inputs for this process:

    A description of the required hardware and software components,

    including test tools. This informations comes from the test environment,

    including test tool data.

    A description of roles and responsibilities of the resources required for

    the test and schedule constraints. This information comes from man-hours

    and schedules.

    Functional and technical requirements of the application. This

    information comes form requirements, change request and technical and

    functional design documents.

    Requirements that the system cannot provide, e.g. system limitations

    Output for this process:

    An approved and signed off test strategy documents, test plan,

    including test cases.

    Testing issues requiring resolution. Usually this requires additional

    negotiation at the project management level.

    31

  • 8/6/2019 E-Deal Management System

    32/50

    3.1.1. UNIT TEST

    The first test in the development process is the unit test. The sourcecode is normally divided into modules, which in turn are divided into

    smaller unites called units. These units have specific behavior. The test

    done on these units of code is called unit test.

    Unit test depends upon the language on which path of the project

    performs accurately to the documented specifications and contains clearly

    defined inputs and expected results.

    3.1.2 INTEGRATION TESTING

    Integration testing is the logical extension of Unit Testing. In simpler

    form, two units that have already been tested are combined into a

    component and the system is tested.

    Here, after integrating each module with the system, testing is done.

    After Integration, the system is working properly.

    3.1.3 USER ACCEPTANCE TESTING

    An Acceptance testing is an important testing which is an exercise of

    the completed system by a group of end users to determine whether the

    system is ready for deployment. Here we can know how well we

    understood the requirements of the project. If the requirements are not

    understood properly, then there will be more errors in this level of testing.

    Here the system is tested and it is accepted by the user.

    3.2 IMPLEMENTATION

    32

  • 8/6/2019 E-Deal Management System

    33/50

    Implementation means converting a new system design into

    effective operation. This involves creating compatible files, training the

    operating staff before the system is up and running. The major factor is not

    disturbing function organization OBJECTIVE.

    In this phase, the system modifications are installed and

    made operational in a production environment. The phase is initiated after the system has been tested

    and accepted by the user and project manager.

    Activities in this phase include notification of implementation to end users, execution of the previously

    defined training plan, data entry or conversion, and post

    implementation review.

    NOTIFY USERS OF NEW IMPLEMENTATION

    The implementation notice should be sent to all users andorganizations affected by the implementation. Additionally, it is good policy

    to make internal organizations not directly affected by the implementation

    aware of the schedule so that allowances can be made for a disruption in

    the normal activities of that section.

    The schedule of the implementation:

    A brief synopsis of the benefits of the system; The difference between the old and new system;

    33

  • 8/6/2019 E-Deal Management System

    34/50

    Responsibilities of end user affected by the

    implementation during this phase; The process to obtain system support, including contact

    names and phone numbers.

    TRAINING PLAN

    It is always a good business practice to provide training before the

    end user uses the new system. Because there has been a previously

    designed training plan established, complete with the system user manual,

    the execution of the plan should be relatively simple.

    PERFORM DATA ENTRY CONVERSION

    With the implementation of any system, typically there is old data

    which is to be included in the new system. This data can be in a manual or

    an automated form. Regardless of the format of the data, the task in this

    section is two fold, data input and data verification. When replacing amanual system, hard copy data will need to be entered into the automated

    system. Some sort of verification that the data is being entered correctly

    should be conducted throughout this process.

    This is also the case in data transfer, where data fields in the old

    system may have been entered inconsistently and there affect the

    integrity of the new database. Verification of the old data becomes

    imperative to useful computer system. One of the ways verification of both

    system operation and integrity can be accomplished is through parallel

    operations.

    34

  • 8/6/2019 E-Deal Management System

    35/50

    Parallel operations consist of funning the old process or system and

    the new system simultaneously until the new system is certified. In this

    way if the new system fails in any way, the operations can proceed on the

    old system while the bugs are worked out.

    CONDUCT POST IMPLIMENTATION REVIEW

    After the system has been fielded a post-implementation review isconducted to determine the success of the project through its

    implementation phase. The purpose of this review is to document

    implementation experiences to recommend system enhancements and

    provide guidance for feature projects.

    MAINTAIN SYSTEM/SOFTWARE

    Daily operations of the system/ software may necessitate that

    maintenance personnel identify potential medications needed to ensure

    that the system continues to operate as intended and produces quality

    data.

    Daily maintenance activities for the system, takes place to ensure

    that any previously undetected errors are fixed. Maintenance personnel

    may determine that modifications to the system and database are needed

    to resolve errors or performance problems.

    Also modifications may be needed to provide new capabilities or to

    take advantage of hardware upgrades or new

    35

  • 8/6/2019 E-Deal Management System

    36/50

    New capabilities may take the form of routine maintenance or may

    constitute enhancements to the system or database as a response to user

    requests for new/improves capabilities. Revise previous documentation.

    At this phase of the SDLC all security has been completedAn update must be made to the system security plan; an update

    and test of the contingency plan should be completed. The project

    manager must be sure that security operating procedures are kept

    updated accordingly.

    3.3 Enhancement & Future Works

    A project can be solving some particular problems but at the same time,

    project is continuous process to maintain and upgrade in all times. In this

    project may enhance the modules and from that modules we can provide

    more details about customer and can give more services. In future there

    are lot of new technology may come, regarding that technologies we

    should upgrade it.

    All software products aim at lesser degree of maintenance. This is quite

    natural, but enhancements also pour in, in due course of time, which is

    unavoidable Better technologies developers aiming for sophistication and

    increasing need of customers are all part and parcel of the software.

    36

  • 8/6/2019 E-Deal Management System

    37/50

    3.4 Conclusion

    In this project we found that there were few significant

    differences among several images of everyday scenes. Using

    guidance from psychology as well as intuition one may be able

    to choose images that are sufficiently good password images

    and avoid at least the worst images that interfere with

    memorability. However, further work on password images isneeded to determine to what extent images have hot spots

    that attract many users to choose password points in the same

    small areas. If hot spots occur frequently, then they reduce

    entropy of the system.

    This phenomenon has been shown in face recognition

    graphical passwords but the danger may be less in our system

    with good choice of images to avoid hot spots. We plan to begin

    studying hot spots by collecting a large number of password

    points on multiple images.

    37

  • 8/6/2019 E-Deal Management System

    38/50

    APPENDICS A

    Screen shot

    Registration:

    38

  • 8/6/2019 E-Deal Management System

    39/50

    39

  • 8/6/2019 E-Deal Management System

    40/50

    Login Form:

    Admin Login:

    40

  • 8/6/2019 E-Deal Management System

    41/50

    41

  • 8/6/2019 E-Deal Management System

    42/50

    Deposit:

    42

  • 8/6/2019 E-Deal Management System

    43/50

    WithDraw:

    43

  • 8/6/2019 E-Deal Management System

    44/50

    Transaction:

    44

  • 8/6/2019 E-Deal Management System

    45/50

    Report:

    45

  • 8/6/2019 E-Deal Management System

    46/50

    APPENDICES B

    Table Design

    DatabaseDesign:

    1.[dbo].[BankAccount]

    Fieldname DatatypeAcc_id

    userid

    Acc_name

    Acc_No

    Branch_Id

    Img_id

    Createddate

    Int

    Int

    Varchar

    Varchar

    Int

    Int

    Varchar

    46

  • 8/6/2019 E-Deal Management System

    47/50

    2 .[dbo].[Bank_Details ]

    Fieldname DatatypeBranch_id

    Branch_name

    Address1

    Address2userid

    Acc_name

    Acc_NoPincode

    Phone

    Description

    City_id

    Createddate

    Int

    varchar

    Varchar

    Varchar

    Int

    IntVarchar

    Varchar

    Varchar

    int

    datetime

    3. deposit

    Fieldname Datatype

    Doposit id intAcc no varcharDept_name varcharamount numericProcess id int

    date datetime

    47

  • 8/6/2019 E-Deal Management System

    48/50

    4. Image date

    Fieldname Datatype

    Img_id intimage image

    5.transaction

    Fieldname Datatype

    Trans id intAcc_no varcharamount numeric

    6.users

    Fieldname Datatype

    User id intUser name nvarcharemail nvarcharCreation date varcharFirst name nvarcharLast name nvarchargender charAddress 1 nvarcharAddress 2 nvarcharcity nvarcharzip nvarcharphone nvarchar

    state nvarcharcountry nvarcharImg_id int

    48

  • 8/6/2019 E-Deal Management System

    49/50

    APPENDICES C

    REFERENCES

    Books References:

    Asp.Net Data Web Controls - by Scott Mitchell

    Asp.Net - by Stephen Walther

    Asp.Net for Web Designers -by Peter Ladka

    Asp.Net Developer's Jumpstart - by Paul D Sheriff, Ken Getz

    C# : The Complete Reference . By Schildt, Herbert.

    NET and Microsoft Visual C# Step by Step" by Robin A.

    Reynolds-Haertle

    Asp.Net Solutions - 23 Case Studies: Best Practices forDevelopers - by Rick Leinecker

    Asp.net 2.0 Cookbook - by Geoffrey T Leblond, Michael A

    Kittel

    Inside Asp.Net - by Scott Worley

    SQL : The Complete Reference , Second Edition. by James

    R Groff & Paul N. Weinberg Transact- SQL Language Reference Guide. Published By:

    www.DyessConsulting.Com

    I.

    49

    http://books.google.co.in/books?vid=ISBN0672325012&id=gWqg3kyQ8aEC&pg=PA1&lpg=PA1&ots=Id3JBgb7Ao&dq=ASP.NET+BOOKS&sig=Q6_6edMPKGrHy-4zKDbqKR1cDwYhttp://books.google.co.in/books?vid=ISBN0672324768&id=Std_w2T7T2cC&pg=PA1&lpg=PA1&ots=Wvii70nSbj&dq=ASP.NET+BOOKS&sig=MqzOmbfWHfVrJNWgmUB_PkWcrH0http://books.google.co.in/books?vid=ISBN0672323575&id=2NpMDIV_BmQC&pg=PA1&lpg=PA1&ots=pSqGUR15Zm&dq=ASP.NET+BOOKS&sig=cjrkAGEIFKDB6plbMKX7L36jNjIhttp://books.google.co.in/books?vid=ISBN0321159659&id=IROYj3XjnzwC&pg=PA1&lpg=PA1&ots=CU1llht_RX&dq=ASP.NET+BOOKS&sig=eMCnWV_pQazhAhIiFIxw_QjEmm8http://books.google.co.in/books?vid=ISBN0321159659&id=IROYj3XjnzwC&pg=PA1&lpg=PA1&ots=CU1llht_RX&dq=ASP.NET+BOOKS&sig=eMCnWV_pQazhAhIiFIxw_QjEmm8http://books.google.co.in/books?vid=ISBN0596100647&id=sUZ31K2fXWgC&pg=PA1&lpg=PA1&ots=DfQsT-HSAX&dq=ASP.NET+BOOKS&sig=xHKvnTugOA4Og8f86xz9BRFfSIYhttp://books.google.co.in/books?vid=ISBN0735711356&id=w7kTKQDfxPQC&pg=PA3&lpg=PA3&ots=sT9qJqqj1X&dq=ASP.NET+BOOKS&sig=LMn93Sq5ZpMvKlXoe3R-YA3yisYhttp://books.google.co.in/books?vid=ISBN0672325012&id=gWqg3kyQ8aEC&pg=PA1&lpg=PA1&ots=Id3JBgb7Ao&dq=ASP.NET+BOOKS&sig=Q6_6edMPKGrHy-4zKDbqKR1cDwYhttp://books.google.co.in/books?vid=ISBN0672324768&id=Std_w2T7T2cC&pg=PA1&lpg=PA1&ots=Wvii70nSbj&dq=ASP.NET+BOOKS&sig=MqzOmbfWHfVrJNWgmUB_PkWcrH0http://books.google.co.in/books?vid=ISBN0672323575&id=2NpMDIV_BmQC&pg=PA1&lpg=PA1&ots=pSqGUR15Zm&dq=ASP.NET+BOOKS&sig=cjrkAGEIFKDB6plbMKX7L36jNjIhttp://books.google.co.in/books?vid=ISBN0321159659&id=IROYj3XjnzwC&pg=PA1&lpg=PA1&ots=CU1llht_RX&dq=ASP.NET+BOOKS&sig=eMCnWV_pQazhAhIiFIxw_QjEmm8http://books.google.co.in/books?vid=ISBN0321159659&id=IROYj3XjnzwC&pg=PA1&lpg=PA1&ots=CU1llht_RX&dq=ASP.NET+BOOKS&sig=eMCnWV_pQazhAhIiFIxw_QjEmm8http://books.google.co.in/books?vid=ISBN0596100647&id=sUZ31K2fXWgC&pg=PA1&lpg=PA1&ots=DfQsT-HSAX&dq=ASP.NET+BOOKS&sig=xHKvnTugOA4Og8f86xz9BRFfSIYhttp://books.google.co.in/books?vid=ISBN0735711356&id=w7kTKQDfxPQC&pg=PA3&lpg=PA3&ots=sT9qJqqj1X&dq=ASP.NET+BOOKS&sig=LMn93Sq5ZpMvKlXoe3R-YA3yisY
  • 8/6/2019 E-Deal Management System

    50/50

    50