Win-Win Ad Sense – Effective Online Advertisement System (MCA)

1.1Abstract

Ad Sense is a wonderful advertising concept and it also lies at the heart of Advertising empire. Though new advertising concepts keep coming up all the time, this one is something that is altogether different. AdSense (Advertising program) presents an earning opportunity to the website owners by allowing to post advertisements on their websites. These advertisements are either text advertisements or image based advertisements

AdSense is content-targeted advertising program. It is the program that can give you advertising revenue - with a minimal investment in time and no additional resources. It delivers relevant text and image advertisement that are precisely targeted to your site and your site content. AdSense has become popular with bloggers and other people who run noncommercial sites. Blogger provides a simple way for you to make money with your blog.

When people visit your website they are able to see these advertisements. Your earnings are based on how many sponsored links are displayed on website and also based on how many times visitors to your website actually click on one of those links. The AdSense system calculates your revenue on per-click.




            DHS Informatics Private Limited is a training division of multi-national IT consulting and outsourcing firm Intersoft KK, which has head-quarters in Japan and branch offices in the United States, Singapore, Taiwan and an offshore development center in Bangalore, India. The company aims to give quality training on advanced IT related subjects those from different fields.

            DHS Informatics train people on various technologies and place them in On the JOB Training (OJT) at Intersoft KK development division and get them job at Intersoft KK and other IT companies. Also DHS Informatics conducts campus training for college students at college premises itself and corporate training for various corporate offices in and around Bangalore.

            Apart from this, DHS Informatics occasionally conducting special offshore training program for overseas students from various countries like Japan, Australia, Singapore, Malaysia, and Taiwan etc. For Offshore training candidates, DHS Informatics provides facilities like Accommodation, Travel, Cultural Knowledge, Entertainments and Tours.

            For overseas students those who are lacking in English language, DHS Informatics provides coaching on English together with technical training through bilingual trainers. For local students DHS Informatics provides coaching on Japanese or Chinese/Mandarin according to their wish and places them in India or Japan, Singapore, Malaysia and Taiwan.

            Some the other projects that DHS Informatics has undertaken are as follows:
I.                    Secret Hiding Techniques
II.                 Save Data Migration over Company Intranet
III.               HAWKEYE (Trade Surveillance System)






2.1SYSTEM CONCEPT
          There are many meanings for the word ‘system’ but in broad sense, a system is simply “An orderly grouping of independent components linked together according to a plan to achieve specific goal or an objective”. The word component linked together according to a plan, managerial steps or a subsystem in multilevel structure. The components may be simple or complex, basic or advanced.

          Each of the system depends more or less on abstract entity called information system. An information system is a set of devices, procedures and operating system designed around user-based criteria to produce information and communicate it user for planning, control and performance. The information system which I have used comprises of 3 categories of system. They are

§        Transaction  Processing System
§        Management Information System
§        Decision Support System



Transaction Processing System
          Transaction processing system is an operation-oriented system, which helps in carrying out day-to-day activities of an organization. Standard operation procedure, which facilitate handling of transactions are often embedded in computer program that control the entry of data, processing of details and storage and presentation of data and information.

Management Information System
          Management Information System is a decision-oriented system, which helps the top management in decision-making and problem solving. They draw on data storage as result of transaction processing but they may use other information as well. MIS provides input to be used in the managerial decision situation. MIS helps in taking issues that recur regularly i.e., weekly, quarterly, monthly.

Decision Support System (DSS) constitute of 3 words
§        Decision: “ Emphasis decision making in problem situation not information processing, retrieved or reporting”
§        Support:  “ requires computer aided decisions with enough structure to permit computer support”
§        System: “accentuates the integrated nature of problem solving, suggestion a combined man machine and environment”.

2.2SYSTEM DEVELOPMENT CYCLE (SDLC)
The most accepted phases in SDLC which I have used are
1.     Preliminary Investigation
2.     Detailed Investigation
3.     Requirement Analysis
4.     System Design
5.     System Development
6.     System Testing
7.     System Implementation and evaluation

1.     Preliminary Investigation
It is made when a request to the system is made
a.      Request Clarification
b.     Feasibility Study
c.     Request Approval

Request Clarification: It is very important to note before any further steps in the system development can take place, the project request must clearly be stated .It is because it may happen that the requester is asked for help without knowledge of what is wrong or why there is problem clarification is very essential.
a.     Feasibility Study: An important outcome of preliminary outcome of preliminary investigation is determination that the system is feasible. There are mainly 3 feasible. There are mainly 3 feasibility study
§       Technical Feasibility
§       Economic Feasibility
§       Operation Feasibility

b.     Request Approval: All requested projects are not feasible or desirable. Only those projects that are both desirable and feasible are both desirable and feasible are put into schedule.

2.     Detailed Investigation:
This phase begins after the approval of the project request detailed investigation help the analyst to have detailed understanding of the system .During this phase analyst interacts with the end user. This interaction is to collection information about

          What are the current systems?
          How do they function?
          What are the drawbacks of current system?

3.     Requirement Analysis:
          Analyzing the requirements of the new system is very essential for the further development of the approved system. During this phase the I/p and o/p of the system, methods and process, storage requirements, controls and to be provided, schedules, resource allocation.

4. System Design:
          This design of an information system produces the details that sate how a system will   meet the requirements identified during system analysis. Different ways such as charts, tables and special symbols. During this phase models are prepared, structured tools such as dataflow diagram, decision tree and decision tables are used to generate a complete picture of the system and its specification.

5.   System Development:
          Begins after the entire software is designed. Depending on the cost and availability of time and programmer software can be developed in the organization or else can be purchased from outside. The development phase consists of coding of computer program and compilation.

6.     System Testing:
     During system testing the system is used experimentally to ensure that the software does not fall i.e., it will run according to its specification and in the way the user expects.

There are two strategies of testing
1.     Code testing strategy examines logic of program
2.     Specification testing examines the specification stating what the program
      Should do how it should perform under various condition


2.3RISK MANAGEMENT
In risk management there are 2 processes
1.     Risk Identification
2.     Risk Analysis

1 Risk Identification:
          During risk identification we have to identify all the possible risk which we are going to face during the software development process, and can be named as Risk Description.

2 Risk Analysis:
          During the risk analysis process, each identified risk is concerned in turn and a judgment made about the probability and the seriousness of the risk.

Ø     The probability of risk can be accessed as
§        Very Low (<10%)
§        Low (10-25%)
§        Moderate (25-50%)
§        High (50-75%)
§        Very High (>75%)


Ø     The effect of the risk can be access as
§        1 – Catastrophic
§        2 – Critical
§        3 – Marginal
§        4 – Negligible





























3.1 System Environment
INTRODUCTION TO WIN-WIN ONLINE ADVERTISEMENT
            Advertisement is cost oriented work and some time very costlier advertisement also doesn’t work out. Now-a-days placing the advertisement in web site becomes popular and getting more response than any other advertisement which is practicing in earlier.

            Suppose a company wants to place an ad in a famous web site they have pay huge amount to the web site owner, which is not possible for smaller or middle size companies. Keeping this all in the mind this Ad- Sense System is developed.

            Here the advertisement company need not to give the huge amount at one stock, they are paying to the web site ad management company for the number of response they got for their ad like by click based, each click will cost very less amount almost less than one rupee. Similarly the web site owner also got amount for each click on the ads which are placed in their web site.

System Design & Implementation
Modules:
1.      Admin Session

·        Login Module
·        Admin (Add, Delete)
·        Member (Add, Edit, Delete)
·        Ads (Create, Edit, Delete & Allocate to members)
·        Change Password
·        Reports

Description :

            Admin will login and also have the permission to create new members, Ads (Sponsored Links). Admin user also has the privilege to delete & edit the Member User & Ads. And admin should only allocate the ads to all the member users. Admin also have the authority to view the AdSense points of member users. Admin also can change their password.


Member Module
Ø      Login Session
Ø      Product Details (Add, Edit, Delete)
Ø      Edit Profile
Ø      View

Description:
            Member will login by using login session. Here member means Organization (A Company). Member has the permission to add a product, so that end user can view the products. And then member also able to edit and delete the products corresponding to them. Then member also able to view the products and sponsored links corresponding to them. By using edit profile member can edit their profile.

            For members who want to advertise their products and services through the AdSense system, it’s just a matter of signing up through member login and letting know how much they want to spend towards advertising through AdSense. 


 End User Module

Ø      View
Ø      AdSense Points



Description:

            There is no registration for end users. Any one can use this website with out registration. End user has the permission to view all the products and sponsored links of all the members. When the end user clicks any one of the sponsored links some points will incremented to corresponding member.




3.2HARDWARE REQUIREMENTS
            The selection of hardware is very important for the proper working of the proposed system. The technologies that we will be using for developing our project depend on the hardware configuration. When selecting hardware, the size and capacity requirement are also important.

>         Operating System                  : Windows 98/2000/XP
:        Processor                              : Pentium III or above
p         Mother Board                                   : Genuine Intel X86 Family
=         Memory                                : Minimum 10GB & Maximum 40GB
7       Keyboard                              : Standard Windows 108 keys Keyboard
8  Mouse                                      : Scroll or Optical Mouse

SOFTWARE REQUIREMENTS
            Once the system requirements are finalized then we have to determine whether a particular software package fits system requirements or not. This section summarizes the software requirement.

ÿ .NET Technologies                   : Microsoft Visual Studio 2005
ÿ Front End                                 : ASP.NET with C#
ÿ Database Connectivity  : ODBC  connection
ÿ Client side Validations   : C#
ÿ  Browser                                  : Internet Explorer 5.0 and above
ÿ Back End                                 : SQL Server 2000




3.3.1 .NET Tools and Technologies:
            .NET is a library, one that is just as extensive as the Windows API. We can use it to call up all the same sorts of features that have traditionally been the role of the Windows operating systems; displaying windows and dialog boxes, verifying security credentials, calling on base operating systems services, creating threads and so on, as well as newer areas such as accessing databases or connecting to the internet or providing web services.

            .NET provides the environment in which our program is run. When .NET aware code is executed, it will be .NET that starts up your code, manage the running threads, provides various background services, and in real senses is the immediate environment seen by the code.

ADVANTAGES:
¨      Object Oriented Programming
¨      Good Design
¨      Language Independence
¨      Better support for dynamic web pages
¨      Efficient Data Access
¨      Code Sharing
¨      Improved Security

INTRODUCTION TO ASP.NET:

            ASP.NET is the latest version of Active Server Pages (ASP), Microsoft’s server-side web technology for building dynamic, interactive, and database-driven web sites.

            ASP.NET is a unified web platform that provides all the services necessary for to build enterprise-class applications. It hopes to do for the web what visual basic has done for windows. ASP.NET expects to reduce and replace coding with components. It is based on the .NET framework, which provides a platform independent of programming languages and operating systems for developing and deploying web applications.
ASP.NET is a unified web platform that provides all the services necessary for to build enterprise-class applications. It hopes to do for the web what visual basic has done for windows. ASP.NET expects to reduce and replace coding with components.
This section provides an overview of the ASP.NET infrastructure and subsystem relationships, as they relate to the subject of security. The following illustration shows the relationships among the security systems in ASP.NET.

urtarch
Fig 1.1: ASP .NET Architecture

As the illustration shows, all Web clients communicate with ASP.NET applications through IIS. IIS deciphers and optionally authenticates the request. If Allow Anonymous is turned on, no authentication occurs. IIS also finds the requested resource (such as an ASP.NET application), and, if the client is authorized, returns the appropriate resource.

Integrating with IIS:

This release of ASP.NET uses IIS 5.0 as the primary host environment. When considering ASP.NET authentication, you should understand the interaction with IIS authentication services. IIS always assumes that a set of credentials maps to a Windows NT account and uses them to authenticate a user. There are three different kinds of authentication available in IIS 5.0: basic, digest, and Integrated Windows Authentication (NTLM or Kerberos). You can select the type of authentication to use in the IIS administrative services.



ADVANTAGES:
¨      Support for programming languages
¨      Language-independence
¨      Support for separation of code and content
¨      Simplified development
¨      Client platform independence
¨      Web services
¨      Support for .NET framework
¨      Backward compatibility

ASP.NET ELEMENTS:
Web Forms:
            Web forms give the developer the ability to drag and drop ASP.NET server controls onto the form and easily program the events that are raised by the control. User controls, mobile controls and other third-party controls can be added to extend web forms.

Server Controls:
            A server control is a control that is programmable by writing server-side code. Server controls automatically maintain their state between calls to the server. Two types of server controls; HTML and web server controls.

View State:
            When a web form is rendered to the browser, a hidden HTML input tag is dynamically created, called view state. This input contains base64-encoded data that can be used by any object that inherits from system.

SCOPE OF THE CONTROLS OF ASP.NET:
WEBSERVER CONTROLS:
Label:
            Label is used to display that the user cannot change.


Textbox:
            It is used to assign a value to a text box or read a value that a user has entered into it. Multiline property is assigned the value Multi Line, a text area is displayed.

Button control:
            It renders the same form submit button as rendered by the normal HTML tag.

Image button:
            It is used to display an image.

Radio button list:
            It represents a group of mutually exclusive options. Each radio button can be either checked or unchecked. No more than one radio button in a group can be checked at the same time.

Dropdown list control:
            It is similar to radio button list control. It can represent a set of mutually exclusive options. Its options are displayed in a single-line pick list widget.

List box control:
            It enables a user to select only one option at a time, or create a multiselect list box.
Hyperlink control:
            It can display either text or an image as a link.

VALIDATION CONTROLS:
Requiredfieldvalidator control:
            It is used to check whether a control has a value. This control used in a textbox control. Other input controls such as radiobuttonlist are also used this validator.

Regularexpressionvalidator control:
It is used to match the value entered into a form field to a regular expression. This control to check whether a user has entered, for example, a valid e-mail address, telephone number, or username or password.
Comparevalidator control:
            It performs comparisons between the data entered into a form field and another value. The other value can be fixed value, such as a particular number, or a value entered into another control.


Rangevalidator control:
            It is used to check whether the value of a form field falls between a minimum and maximum value. The minimum and maximum values can be dates, numbers, currency amounts, or strings.

Validationsummary control:
            It is used to summarize the control with the validation controls. This control to summarize all the errors all the top of a page or wherever else we wish.

ADVANCED CONTROLS:
Panel control:
            Instead of setting the visible property for controls one by one, we can use the panel control to hide controls as a group.

AdRotator control:
            It is used to display banner advertisements randomly. The advertisements with this control that contains a list of the properties of banner advertisements to display.

Datagrid control:
            It is used to display the records without using templates. We can simply bind a data source to the data grid, and it automatically displays the records. We can create columns to control how records are formatted or to display links for editing records.

ADO.NET:
            It contains several namespaces with dozens of classes devoted to database access. The System.Data.Sqlclient namespace includes the following three classes:
¨      SqlConnection
¨      SqlCommand
¨      SqlDataReader

SqlConnection:
            This sqlconnection need to create and open a database connection. We create the connection in different ways depending on the type of database that we want to access.

SqlCommand:
            It is used to create a database command that represents the SQL select statement to execute.

SqlDataReader:        
            It represents a forward-only stream of database records. This means that the data reader represents only a single record at a time. To fetch next record in the stream we must call the read () method. To display all the records returned from a query, we must call the read () method repeatedly until we reach the end of the stream.

DATASET:
            A dataset can contain one or more Data Tables that represent database tables. Relationships between the tables can be defined using DataRelation classes.

DATAADAPTER:
            It represents the bridge between a Dataset and the data source it represents. We use a DataAdapter to populate a DataSet from an existing database table. We can also use a DataAdapter to update and existing database table with changes made to a DataSet. 

Open:
            Opens a specified database for the application.


3.3.2Microsoft SQL Server 2000

          Microsoft SQL Server 2000 extends the performance, reliability, quality, and ease-of-use of Microsoft SQL Server version 7.0. Microsoft SQL Server 2000 includes several new features that make it an excellent database platform for large-scale online transactional processing (OLTP), data warehousing, and e-commerce applications.
       The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000 Analysis Services. The term OLAP Services has been replaced with the term Analysis Services. Analysis Services also includes a new data-mining component.
Features of SQL Server 2000
  • Internet Integration
            The SQL Server 2000 database engine includes integrated XML support. It also has the scalability, availability, and security features required to operate as the data storage component of the largest Web sites. The SQL Server 2000 programming model is integrated with the Windows DNA architecture for developing Web applications, and SQL Server 2000 supports features such as English Query and the Microsoft Search Service to incorporate user-friendly queries and powerful search capabilities in Web applications.
  • Scalability and Availability
            The same database engine can be used across platforms ranging from laptop computers running Microsoft Windows® 98 through large, multiprocessor servers running Microsoft Windows 2000 Data Center Edition. SQL Server 2000 Enterprise Edition supports features such as federated servers, indexed views, and large memory support that allow it to scale to the performance levels required by the largest Web sites.

  • Enterprise-Level Database Features
            The SQL Server 2000 relational database engine supports the features required to support demanding data processing environments. The database engine protects data integrity while minimizing the overhead of managing thousands of users concurrently modifying the database. SQL Server 2000 distributed queries allow you to reference data from multiple sources as if it were a part of a SQL Server 2000 database, while at the same time, the distributed transaction support protects the integrity of any updates of the distributed data. Replication allows you to also maintain multiple copies of data, while ensuring that the separate copies remain synchronized. You can replicate a set of data to multiple, mobile, disconnected users, have them work autonomously, and then merge their modifications back to the publisher.
  • Ease of installation, deployment, and use
            SQL Server 2000 includes a set of administrative and development tools that improve upon the process of installing, deploying, managing, and using SQL Server across several sites. SQL Server 2000 also supports a standards-based programming model integrated with the Windows DNA, making the use of SQL Server databases and data warehouses a seamless part of building powerful and scalable systems. These features allow you to rapidly deliver SQL Server applications that customers can implement with a minimum of installation and administrative overhead.
  • Data warehousing.
            SQL Server 2000 includes tools for extracting and analyzing summary data for online analytical processing. SQL Server also includes tools for visually designing databases and analyzing data using English-based questions.


Databases

            A database in Microsoft SQL Server 2000 consists of a collection of tables that contain data and other objects, such as views, indexes and stored procedures defined to support activities performed with the data. The data stored in a database is usually related to a particular subject or process, such as inventory information for a manufacturing warehouse.
Views:
            Views are defined using a SELECT statement and are analogous to an object that contains the result set of this statement.
 Index:
Indexes can also enforce uniqueness on the rows in a table. SQL Server supports clustered and no clustered indexes. The primary key of a table is automatically indexed.
Stored Procedure:
SQL Server supplies stored procedures for managing SQL Server and displaying information about databases and users. SQL Server-supplied stored procedures are called system-stored procedures.











An Overview
Html

            HTML, an initialism of Hypertext Markup Language, is the predominant markup language for web pages. It provides a means to describe the structure of text-based information in a document — by denoting certain text as headings, paragraphs, lists, and so on — and to supplement that text with interactive forms, embedded images, and other objects. HTML is written in the form of labels (known as tags), surrounded by angle brackets. HTML can also describe, to some degree, the appearance and semantics of a document, and can include embedded scripting language code which can affect the behavior of web browsers and other HTML processors.

            HTML is also often used to refer to content of the MIME type text/html or even more broadly as a generic term for HTML whether in its XML-descended form (such as XHTML 1.0 and later) or its form descended directly from SGML

            Hypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allows users to produces Web pages that include text, graphics and pointer to other Web pages (Hyperlinks).

            HTML is not a programming language but it is an application of ISO Standard 8879, SGML (Standard Generalized Markup Language), but specialized to hypertext and adapted to the Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we can easily jump from one point to another point. We can navigate through the information based on our interest and preference. A markup language is simply a series of elements, each delimited with special characters that define how text or other items enclosed within the elements should be displayed. Hyperlinks are underlined or emphasized works that load to other documents or some portions of the same document.

            HTML can be used to display any type of document on the host computer, which can be geographically at a different location. It is a versatile language and can be used on any platform or desktop.

            HTML provides tags (special codes) to make the document look attractive. HTML tags are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation of the document. Anything that is not a tag is part of the document itself.

Basic HTML Tags:
<! --     -->                                                      specifies comments
<A>……….</A>                               Creates hypertext links
<B>……….</B>                                Formats text as bold
<BIG>……….</BIG>                        Formats text in large font.         <BODY>…</BODY> Contains all tags and text in the HTML document                                
<CENTER>...</CENTER>                 Creates text
<DD>…</DD>                                   Definition of a term
<DL>...</DL>                                                 Creates definition list
<FONT>…</FONT>                         Formats text with a particular font
<FORM>...</FORM>                        Encloses a fill-out form
<FRAME>...</FRAME>                    Defines a particular frame in a set of frames
<H#>…</H#>                                    Creates heading of different levels(1 – 6)
<HEAD>...</HEAD>                                      Contains tags that specify information about a document
<HR>...</HR>                                    Creates a horizontal rule
<HTML>…</HTML>                        Contains all other HTML tags
<META>...</META>                         Provides meta-information about a document
<SCRIPT>…</SCRIPT>                   Contains client-side or server-side script
<TABLE>…</TABLE>                      Creates a table
<TD>…</TD>                                    Indicates table data in a table
<TR>…</TR>                                    Designates a table row
<TH>…</TH>                                    Creates a heading in a table



Attributes

            The attributes of an element are name-value pairs, separated by "=", and written within the start label of an element, after the element's name. The value should be enclosed in single or double quotes, although values consisting of certain characters can be left unquoted in HTML (but not XHTML).Leaving attribute values unquoted is considered unsafe.

            Most elements take any of several common attributes: id, class, style and title. Most also take language-related attributes: lang and dir.

            The id attribute provides a document-wide unique identifier for an element. This can be used by stylesheets to provide presentational properties, by browsers to focus attention on the specific element or by scripts to alter the contents or presentation of an element. The class attribute provides a way of classifying similar elements for presentation purposes. For example, an HTML document (or a set of documents) may use the designation class="notation" to indicate that all elements with this class value are all subordinate to the main text of the document (or documents). Such notation classes of elements might be gathered together and presented as footnotes on a page, rather than appearing in the place where they appear in the source HTML.

            An author may use the style non-attributal codes presentational properties to a particular element. It is considered better practice to use an element’s son- id page and select the element with a style sheet, though sometimes this can be too cumbersome for a simple ad hoc application of styled properties. The title is used to attach sub textual explanation to an element. In most browsers this title attribute is displayed as what is often referred to as a tool tip. The generic inline span element can be used to demonstrate these various non-attributes.

            The preceding displays as HTML (pointing the cursor at the abbreviation should display the title text in most browsers).



Advantages
  • A HTML document is small and hence easy to send over the net.
  • It is small because it does not include formatted information.
  • HTML is platform independent.
  • HTML tags are not case-sensitive.


3.4CLIENT REQUEIREMENT
          Internet Explorer 5.0 or higher / Netscape Navigator / any compatible browser A Network that is connected to all the computers of an organization.


4.1 Study of current System
Purpose
            A new and novel way of Advertisement on Internet which will benefit both the advertisement company and web site owner.  Here the concept is WIN – WIN method, that is both the parties are mutually benefited.

            Advertisement is cost oriented work and some time very costlier advertisement also doesn’t work out. Now-a-days placing the advertisement in web site becomes popular and getting more response than any other advertisement which is practicing in earlier.

 


Scope of the project:

v     Ad Sense has a huge database of advertisers that are looking for space. Because of this huge base of advertisers, Ad Sense can provide you with a steady stream of advertisers.
v     This helps to both provide local advertisement opportunities to companies, as well as provide your site with relevant content.
v     In addition to these benefits you also are able to control what kinds of ads that you want displayed on your website. You can filter out ads from specific company genres.
v     Here both the advertisement company and web site owner get benefited. Here the concept is WIN – WIN method that is both the parties are mutually benefited.















4.2Problem And weakness Of current system


The objectives of this project are:
·        To develop an application that enables the user to create his own webpage, customize it according to his needs.

·        Each user will be provided a unique user id and password which he can use to edit and update his page.

·        User can use his web page to advertise his own products and also place links for other advertisements. Revenue can be earned by linking it with Google Ad Sense.

Benefits of the project

  • Allow the users to receive orders and sell his products.
  • The user can advertise his products on his web page.
·        Enable user to create and maintain his web page.























FEASIBILITY STUDY
                      
Feasibility is the determination of whether or not a project is worth doing. The process followed in making this determination is called feasibility Study. This type of study if a project can and should be taken. In the conduct of the feasibility study, the analyst will usually consider seven distinct, but inter-related types of feasibility.

Technical Feasibility

This is considered with specifying equipment and software that will successful satisfy the user requirement the technical needs of the system may vary considerably but might include

v     The facility to produce outputs in a given time.
                                 
v      Response time under certain conditions.

v      Ability to process a certain column of transaction at a particular speed.

Economic Feasibility
            Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system. More commonly known as cost / benefit analysis. The procedure is to determine the benefits and savings are expected form a proposed system and a compare them with costs. It benefits outweigh costs; a decision is taken to design and implement the system will have to be made if it is to have a chance of being approved. There is an ongoing effort that improves in accuracy at each phase of the system life cycle.

Operational Feasibility
It is mainly related to human organization and political aspects. These points are considered are
v     What changes will be brought with the system?
v     What organizational structures are distributed?
v     What new skills will be required?
v      Do the existing system staff members have these skills?
v     If not, can they be trained in the course of time?
SYSTEM DESIGN
            The most creative and challenging face of the system development is System Design. It provides the understanding and procedural details necessary for implementing the system recommended in the feasibility study. Design goes through the logical and physical stages of development.

            In designing a new system, the system analyst must have a clear understanding of the objectives, which the design is aiming to fulfill. The first step is to determine how the output is to be produced and in what format. Second, input data and master files have to be designed to meet the requirements of the proposed output. The operational phases are handled through program construction and testing.

            Design of a system can be defined as a process of applying various techniques and principles for the purpose of defining a device, a process or a system in sufficient detail to permit its physical realization. Thus system design is a solution to “how to” approach to the creation of a new system. Thus important phase provides the understanding and the procedural details necessary for implementing the system recommended in the feasibility study. The design step provides a data design, architectural design, and a procedural design.

OUTPUT DESIGN
            In the output design, the emphasis is on producing a hard copy of the information requested or displaying the output on the CRT screen in a predetermined format. Two of the most output media today are printers and the screen. Most users now access their reports from a hard copy or screen display. Computer’s output is the most important and direct source of information to the user, efficient, logical, output design should improve the systems relations with the user and help in decision-making.

            As the outputs are the most important source of information to the user, better design should improve the system’s relation and also should help in decision-making.


            The output device’s capability, print capability, print capability, response time requirements etc should also be considered form design elaborates the way output is presented and layout available for capturing information. It’s very helpful to produce the clear, accurate and speedy information for end users.

 INPUT DESIGN

            In the input design, user-oriented inputs are converted into a computer based system format. It also includes determining the record media, method of input, speed of capture and entry on to the screen. Online data entry accepts commands and data through a keyboard. The major approach to input design is the menu and the prompt design. In each alternative, the user’s options are predefined. The data flow diagram indicates logical data flow, data stores, source and destination. Input data are collected and organized into a group of similar data. Once identified input media are selected for processing.

            In this software, importance is given to develop Graphical User Interface (GUI), which is an important factor in developing efficient and user-friendly software. For inputting user data, attractive forms are designed. User can also select desired options from the menu, which provides all possible facilities.

            Also the important input format is designed in such a way that accidental errors are avoided. The user has to input only just the minimum data required, which also helps in avoiding the errors that the users may make. Accurate designing of the input format is very important in developing efficient software. The goal or input design is to make entry as easy, logical and free from errors.

LOGICAL DESIGN

            Logical data design is about the logically implied data. Each and every data in the form can be designed in such a manner to understand the meaning. Logical data designing should give a clear understanding and idea about the related data used to construct a form.

 DATA FLOW DIAGRAM

            A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the processes that change data throughout a system. It’s a structured analysis and design tool that can be used for flowcharting in place of or in association with information. Oriented and process oriented system flowcharts. When analysts prepare the Data Flow Diagram, they specify the user needs at a level of detail that virtually determines the information flow into and out of the system and the required data resources. This network is constructed by using a set of symbols that do not imply physical implementations. The Data Flow Diagram reviews the current physical system, prepares input and output specification, specifies the implementation plan etc.

            Four basic symbols are used to construct data flow diagrams. They are symbols that represent data source, data flows, and data transformations and data storage. The points at which data are transformed are represented by enclosed figures, usually circles, which are called nodes.













DataBase  Table

Table Name: M_Admin
Characteristic
Datatype
(Width)
NULL
(Y/N)
Constraint
Auto Inc. (Y/N)
Column Name
Admin_Id
Char(20)
N
Primary Key
N
Admin_pwd
char(15)
N

N
Admin_DOC
Date
Y

N
Admin_name
varchar(50)
Y

N


Table Name: M_Member
Characteristic
Datatype
(Width)
NULL
(Y/N)
Constraint
Auto Inc. (Y/N)
Column Name
Mem_No
int(10) unsigned
N
Primary Key
Y
Mem_User_id (Acts as Login Id)
varchar(50)
N

N
Mem_pwd
varchar(20)
N

N
Mem_Rep_Name
varchar(30)
N

N
Mem_Company_Name
varchar(50)
N

N
Mem_Points
int(10) unsigned
Y

N
Phone
varchar(15)
N

N
Email
varchar(50)
N

N
Cat_no
int(10)
N
Foreign Key
N
Page_Name
Varchar(100)
N

N
Pass_question
Varchar(300)
Y

N
Pass_answer
Varchar(50)
Y

N
Mem_DOC
Date
N

N
Mem_Exp_date
Date
N

N
Mem_status
Char(10)
Y
Active, Hold, Expired
N








Table Name: M_Product
Characteristic
Datatype
(Width)
NULL
(Y/N)
Constraint
Auto Inc. (Y/N)
Column Name
Mem_No
int(10) unsigned
N
Foreign Key
N
Product_no
Int(10)
N
Primary Key
Y
Product_name
varchar(200)
N

N
Product_desc
varchar(600)
N

N
Product_image
varchar(300)
N

N


Table Name: T_ads
Characteristic
Datatype
(Width)
NULL
(Y/N)
Constraint
Auto Inc. (Y/N)
Column Name
T_ad_no
int(10) unsigned
N
Primary Key
Y
Ad_no
int(10) unsigned
N
Foreign Key
N
Mem_User_id (Acts as Login Id)
varchar(50)
N

N
T_ad_start_date
Date
N

N
T_ad_exp_date
Date
N

N
T_ad_status
Char(10)
Y
Active, Hold, Expired
N

Table Name: M_Mem_Cat
Characteristic
Datatype
(Width)
NULL
(Y/N)
Constraint
Auto Inc. (Y/N)
Column Name
Cat_no
int(5) unsigned
N
Primary Key
Y
Cat_name
Varchar(200)
N

N
Cat_Desc
varchar(200)
N

N


 SYSTEM IMPLEMENTATION
            System Implementation is the process of making the newly designed system fully operational. The system is implemented after careful testing.

IMPLEMENTATION PLANNING
            Initially a primary implementation plan is prepared to schedule and manage different actives that must be completed for a successful system implementation. The preliminary plan serves as a basic for checking the availability of resources for implementation activities. A complete implementation plan includes the following items
Ø      System training plan
Ø      System test plan
Ø      System conversion plan
Ø      Overall implementation plan

USER TRAINING
            The training should include everyone associated with the implementation, use  operation or maintenance of a new system. Hands on training to a lab staff are essential to make the comfortable with the system.


POST IMPLEMENTATON REVIEW
            When computer based systems are built therefore we must develop mechanism for evaluating controlling and making modifications, maintenance issued to improve the case with which the changes can be accommodated and reduce the amount of expended on its maintenance activity occurs because it is unreasonable to assume that software testing will uncover all latest errors in a large software system. The final event in the post implementation flow is review that revalidates all elements of the system configuration and ensures correctness, after the software maintenance, software reviews is being conducted for future maintenance effort and provides feedback, which is important to effectively management of software organization.

CODING
First phase of implementation is coding. Coding can be done in two ways. One by automatic program code and other by programmer’s manually written code. A code generator is a suite of programs that matches the input to an appropriate code template and from these produces modules of code. The code is made simple in such a way that another programmer can easily understand and work on that in future. The crucial phase in the system development life cycle is the successful implementation of the new system design. The process of converting as new or revised system into an operational one is known as system implementation. This includes all those activities that take place to convert from an old system to a new system. The system can be implemented only after a through testing is done and if it is found to work according to the specifications. The most crucial stage in achieving a new successful system and giving confident on the new system for the users is that it will work effectively and efficiently. If involves careful planning,investigation of the current system and its constraints on implementation, design of methods to achieve the change over.

Introduction to System Analysis
System
            A system is an orderly group of interdependent components linked together according to a plan to achieve a specific objective. Its main characteristics are organization, interaction, interdependence, integration and a central objective.

System Analysis
            System analysis and design are the application of the system approach to problem solving generally using computers. To reconstruct a system the analyst must consider its elements output and inputs, processors, controls, feedback and environment.

Analysis
           Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate system should consider other related systems.
            During analysis data are collected on the available files decision points and transactions handled by the present system. This involves gathering information and using structured tools for analysis.

Existing System
            Advertising is carried out through different media such as print, online and broadcasting. In the online advertising system, companies have to pay huge amounts to advertise their products on a popular website.

Disadvantages of Existing System
  • In this system, advertising is a costly affair.
  • Advertising cost does not substantiate responses received by the ads.
  • Maximum viewership of the ads is not achieved.

Proposed System
  • This is a content-targeted advertising program
  • It delivers relevant text and image advertisement that are precisely targeted to the website
  • Earnings are according to the number of links displayed on the website and on the number of clicks on these links.
  • Businesses can specify the limits for display of ads.

Advantages of the Proposed System
  • Cost involved in advertising is relatively low.
  • Smaller and mid-sized companies can make use of this system effectively
  • The website owner also earns based on the clicks made on the sponsored links. Thus the advertising company as well as the website owner is benefited.
  • Unwanted ads are not displayed on the website
  • This mode of advertising is more effective and popular than any other modes of advertising.
  • Adsense increases visibility of the company’s business and increases traffic to the website.

Implementation Procedure

Technology

Front End         : ASP.Net with C #
GUI                 : Visual Studio 2005 / Framework 2.0
Back End         : MS-SQL 2000 Server
SQL Server User ID    : sa
SQL Server Password  : sqlserver

Developed by:

Installation Guide
  1. Restore the Database (Start->Program->Enterprice Manager->Open->Data Base->Right Click->Alltask->RestoreDatabase)
  2. Open the Source code directory and click on .sln file
  3. Run the Project

IIS Server
If u run this project to two or more system Means:
     1.  Install IIS Server in ur PC.
     2.  Go to Run->inetmgr->Website->Default Website->Right click->New -                       
        Virtual Directory->next->Alais Name->next->choice Directory->click                
          next-  >select all check boxs->click next->finish.
     3. Open ->Internet Explorer->Type->http://local/cms/login.aspx
          Local->ur system Name.
          cms->alais Name.
          Login.aspx->project start page.



*      Waterfall Model
*      Top to bottom approach
*      It will be executing one by one of the SDLC process
*      The design Starts after completing the requirements analysis coding begins after design …

Advantages
            Implementation cost is very less
            Execute the SDLC one by one in the sequential manner

Disadvantages
            Once implemented it is impossible change the requirements
            Want to change the requirement , have to take the revert back it will take too much of time .
            Time consuming


*      Unit Testing
*      Unit-smallest testable piece of software.
*      A Unit Can be compiled /assembled/linked/loaded.

*      Integration Testing
                        Testing needed as the elements of a system are being combined.

*      Regression Testing
*      To ensure that the code changes have not had an adverse affect to the other modules or an existing functions.
*      Retesting after fix the bug (or) after the modification in the application.
*      Regression test is done after fix the bug , it is done when new enhancements (or) changes are done in the application.

*      Stress /Volume Testing
*      To test the weakness of the system with respect handling of large amounts of data during the short time periods.

*      Usability Testing.
*      Usability means that systems are easy and fast to learn,efficient to use ,easy to remember.
*      Users can achieve their goal in the particular environment.



Complete Project Code
Admin Login Page
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Data.SqlClient;
using System.Web.SessionState;
using System.IO;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;

public partial class A_Login : System.Web.UI.Page
{
    SqlConnection con = new SqlConnection(ConfigurationSettings.AppSettings["ConnectionString"]);
    SqlDataAdapter adp;
    DataSet ds;
    protected void Page_Load(object sender, EventArgs e)
    {
        if (!this.IsPostBack)
        {
        }
    }
    protected void Button1_Click(object sender, EventArgs e)
    {

        adp = new SqlDataAdapter("select * from M_Admin where Admin_name='" + TextBox1.Text + "' and Admin_pwd='" + TextBox2.Text + "'", con);
        ds = new DataSet();
        adp.Fill(ds);
        if (ds.Tables[0].Rows.Count != 0)
        {
            Session["Admin_id"] = ds.Tables[0].Rows[0].ItemArray[1].ToString();
            Session["Admin_name"] = ds.Tables[0].Rows[0].ItemArray[2].ToString();
            Session["Admin_pwd"] = ds.Tables[0].Rows[0].ItemArray[3].ToString();
            Session["Admin_fname"] = ds.Tables[0].Rows[0].ItemArray[4].ToString();
            Response.Redirect("A_Home.aspx");
        }
        else
        {
            Label21.Visible = true;
            Label21.Text = "Invalid  User name & Password";
            TextBox1.Text = "";
            TextBox2.Text = "";

        }
    }
}

User Details code
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.ComponentModel;
using System.Web;
using System.Web.Security;
using System.Data.SqlClient;
using System.IO;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;

public partial class A_UserDetails : System.Web.UI.Page
{
    SqlConnection con = new SqlConnection(ConfigurationSettings.AppSettings["ConnectionString"]);
    //SqlCommand cmd;
    //DataSet ds;
    protected void Page_Load(object sender, EventArgs e)
    {
        Label3.Text = Session["Admin_fname"].ToString();
        if (!this.IsPostBack)
        {
            bind();
        }

    }
    private void bind()
    {      
        SqlDataAdapter sda = new SqlDataAdapter("select Admin_id,Admin_fname, left(Admin_DOC,11) As Admin_DOC from M_Admin", con);
        DataSet ds = new DataSet();
        sda.Fill(ds);
        GridView1.DataSource = ds;
        GridView1.DataBind();
    }

    protected void GridView1_RowDeleting(object sender,System.Web.UI.WebControls.GridViewDeleteEventArgs e)
    {       
        con.Open();
        GridViewRow r = GridView1.Rows[e.RowIndex];
        string c0 = r.Cells[0].Text;
        string d = "delete from M_Admin where Admin_id='" + c0 + "'";
        SqlCommand cmd = new SqlCommand(d, con);
        cmd.ExecuteNonQuery();
        bind();
        con.Close();
              
    }

    protected void LinkButton1_Click(object sender, EventArgs e)
    {
        Session["Admin_id"] = "";
        Session["Admin_name"] = "";
        Session["Admin_pwd"] = "";
        Response.Redirect("A_Login.aspx");
    }
}














Testing and Result
 Introduction for Testing
Definition

            Unit testing is a development procedure where programmers create tests as they develop software. The tests are simple short tests that test functionally of a particular unit or module of their code, such as a class or function.

            Using open source libraries like cunit, oppunit and nun it (for C, C++ and C#) these tests can be automatically run and any problems found quickly. As the tests are developed in parallel with the source unit test demonstrates its correctness.

            Software testing identifies errors at an early stage if included at each stage. A planned testing identifies the difference between the expected results and the actual results.This helps to make software more rugged and reliable. Testing is applied at different levels in the software development life cycle, but the testing done is different in nature and has different objectives at each label.

            Testing plays a very critical role in determining the reliability and efficiency of the software and hence is very important stage in software development. Tests are to be conducted on the software to evaluate its performance under a number of conditions. Ideally we should do so at the level of each module and also when all of them are integrated to form the complete system.


TYPES OF TESTING
The two main types of testing are:

1. WHITE BOX TESTING (OR STRUCTURAL TESTING)

            The white box testing focused on the structural requirements of the software. Here the test cases are decided based on the logic of the modules to be tested. This testing is used for testing lower levels.

2. BLACK BOX TESTING (OR FUNCTIONAL TESTING)

            The black box testing focused on the functional requirements of the software. That is for a designer the black box testing will give the desired results for what it is meant for, it means that he has to exercise all functional requirements of a program. The black box testing is done after the software is developed.

Validation and System Testing
            Validation testing is a concern which overlaps with integration testing. Ensuring that the application fulfils its specification is a major criterion for the construction of an integration test. Validation testing also overlaps to a large extent with System Testing, where the application is tested with respect to its typical working environment. Consequently for many processes no clear division between validation and system testing can be made. Specific tests which can be performed in either or both stages include the following.
  • Regression Testing: Where this version of the software is tested with the automated test harness used with previous versions to ensure that the required features of the previous version are skill working in the new version.

  • Recovery Testing: Where the software is deliberately interrupted in a number of ways off, to ensure that the appropriate techniques for restoring any lost data will function.

  • Security Testing: Where unauthorized attempts to operate the software, or parts of it, attempted it might also include attempts to obtain access the data, or harm the software installation or even the system software. As with all types of security determined will be able to obtain unauthorized access and the best that can be achieved is to make this process as difficult as possible.

  • Stress Testing: Where abnormal demands are made upon the software by increasing the rate at which it is asked to accept, or the rate t which it is asked to produce information. More complex tests may attempt to crate very large data sets or cause the soft wares to make excessive demands on the operating system.
  • Performance testing: Where the performance requirements, if any, are checked. These may include the size of the software when installed, type amount of main memory and/or secondary storage it requires and the demands made of the operating when running with normal limits or the response time.

  • Usability Testing: The process of usability measurement was introduced in the previous chapter. Even if usability prototypes have been tested whilst the application was constructed, a validation test of the finished product will always be required.

  • Alpha and beta testing: This is where the software is released to the actual end users. An initial release, the alpha release, might be made to selected users who be expected to report bugs and other detailed observations back to the production team. Once the application changes necessitated by the alpha phase can be made to larger more representative set users, before the final release is made to all users.

The final process should be a Software audit where the complete software project is checked to ensure that it meets production management requirements. This ensures that all required documentation has been produced, is in the correct format and is of acceptable quality. The purpose of this review is: firstly to assure the quality of the production process and by implication construction phase commences. A formal hand over from the development team at the end of the audit will mark the transition between the two phases.

  • Integration Testing:

Integration Testing can proceed in a number of different ways, which can be broadly characterized as top down or bottom up. In top down integration testing the high level control routines are tested first, possibly with the middle level control structures present only as stubs. Subprogram stubs were presented in section2 as incomplete subprograms which are only present to allow the higher. Level control routines to be tested.
Top down testing can proceed in a depth-first or a breadth-first manner. For depth-first integration each module is tested in increasing detail, replacing more and more levels of detail with actual code rather than stubs. Alternatively breadth-first would processed by refining all the modules at the same level of control throughout the application .in practice a combination of the two techniques would be used. At the initial stages all the modules might be only partly functional, possibly being implemented only to deal with non-erroneous data. These would be tested in breadth-first manner, but over a period of time each would be replaced with successive refinements which were closer to the full functionality. This allows depth-first testing of a module to be performed simultaneously with breadth-first testing of all the modules.

The other major category of integration testing is Bottom Up Integration Testing where an individual module is tested form a test harness. Once a set of individual module have been tested they are then combined into a collection of modules ,known as builds, which are then tested by a second test harness. This process can continue until the build consists of the entire application. In practice a combination of top down and bottom-up testing would be used. In a large software project being developed by a number of sub-teams, or a smaller project where different modules were built by individuals. The sub teams or individuals would conduct bottom-up testing of the modules which they were constructing before releasing them to an integration team which would assemble them together for top-down testing.

  • Unit Testing:

Unit testing deals with testing a unit as a whole. This would test the interaction of many functions but confine the test within one unit. The exact scope of a unit is left to interpretation. Supporting test code, sometimes called Scaffolding, may be necessary to support an individual test. This type of testing is driven by the architecture and implementation teams. This focus is also called black-box testing because only the details of the interface are visible to the test. Limits that are global to a unit are tested here.
In the construction industry, scaffolding is a temporary, easy to assemble and disassemble, frame placed around a building to facilitate the construction of the building. The construction workers first build the scaffolding and then the building. Later the scaffolding is removed, exposing the completed building.similarly, in software testing, one particular test may need some supporting software. This software establishes can a correct evaluation of the test take place. The scaffolding software may establish state and values for data structures as well as providing dummy external functions for the test. Different scaffolding software may be needed form one test to another test. Scaffolding software rarely is considered part of the system.

Some times the scaffolding software becomes larger than the system software being tested. Usually the scaffolding software is not of the same quality as the system software and frequently is quite fragile. A small change in test may lead to much larger changes in the scaffolding.

Internal and unit testing can be automated with the help of coverage tools. Analyzes the source code and generated a test that will execute every alternative thread of execution.  Typically, the coverage tool is used in a slightly different way. First the coverage tool is used to augment the source by placing information prints after each line of code. Then the testing suite is executed generating an audit trail. This audit trail is analyzed and reports the percent of the total system code executed during the test suite. If the coverage is high and the untested source lines are of low impact to the system’s overall quality, then no more additional tests are required.

Conclusion

            Adsense – Online Advertisement System is completely based on the Win-Win-Win concept as all the three will be profited. The admin will be profited by the amount paid by the clients who are allocated space in his website for advertising. Secondly the clients will be profited as the End user visits his sponsored links. Lastly the user is profited by viewing the valuable information that is present in the various advertised links.

            By this we can conclude that this project satisfies the desire and essentiality of all the three, who are involved in this scenario.

















Bibliography

REFERENCES

&       .NET Programmer’s Reference
                                                      By: Sussman
&       Professional SQL Server 2000 DTS (Data Transformation Services)
                                                      By: Chaffin
&       Introduction to Algorithms, 2nd edition. MIT Press, McGraw-Hill.


RELATED LINKS
Ø      .NET  Documentation  http://www.wrox.com/
Ø      Introduction to Web server http://www.howstuffworks.com/
Ø      www.google.com
Ø      www.codesource.com
Ø      RSAAlgorithm
Ø       
      en.wikipedia.org/wiki/piracy protection










Future Enhancement

\The objectives of this project are:
·        To develop an application that enables the user to create his own webpage, customize it according to his needs.

·        Each user will be provided a unique user id and password which he can use to edit and update his page.

·        User can use his web page to advertise his own products and also place links for other advertisements. Revenue can be earned by linking it with Google Ad Sense.

Benefits of the project

  • Allow the users to receive orders and sell his products.
  • The user can advertise his products on his web page.
·        Enable user to create and maintain his web page.

Comments

Popular posts from this blog

Chemical test for Tragacanth

MINOR DISORDERS OF NEW BORN AND ITS MANAGEMENT - NURSING ASSIGNMENT

KANGAROO CARE - NURSING ASSIGNMENT