Secure Net Auction System full report
#1

[attachment=15403]
1. INTRODUCTION
Auctions are among the oldest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared.
Secure Net Auction System website which is used to bid from the comfort of ones own home has seen a change like never seen before. This is done through JAVA technologies. This has various technical areas. It includes WINDOWS XP as the operating System, Oracle as Database. The front end deals with GUI and source code deals with Oracle (Backend).
With the point and click of the mouse, one may bid on an item they may need or just want, and in moments they find that either they are the top bidder or someone else wants it more, and you’re outbid! , while meeting the needs of its users.
1.1 VISION OF THE PROJECT:
“The Interface has to be simple to use, as the target end-users for the system are non-technical persons. Our system also aims to provide a complete IT solution for Bidding.”
1.2 MISSION OF THE PROJECT:
• Any user can see the details of the product.
• Only the Registered user can participate in Auction.
• Bid winner can pay the money through credit card.
• The users can see their purchased products and posted items
1.3 AIM OF THE PROJECT:
The process of an online auction is much the same as a live auction. This means that users place bids for items, and the goods get sold to the highest bidder. You are notified through email on the status of your bids, which is when you place a bid, when you've been outbid and when you've won an item.
Our system aims to provide powerful functionalities to the user by making use of simple easy-to-easy interface.
1.4 OVERVIEW
The World Wide Web is an attractive target to many attackers. It has a lot of valuable information that can easily be accessed to a person with the right knowledge. With the increasing number of electronic commerce sites popping up everyday, we are very concerned with the security of transactions.
There are several different payment methods to use for online purchases. Some of these include; credit cards, micro payments, smart cards, and online billing. However, "the top three credit cards companies handle over 98% of all purchases made on the Web." (174, Korper) We wanted to address some of the security issues that web developers should take to safeguard their sites. Specifically, we are interested in the protection of credit card numbers and data that users transmit over the Web.
In this site we will address some of the security issues and solutions for web developers to implement when creating e-commerce sites. We have discussed ways to secure your server, protect the network from outside intrusion, and the use of digital certificates to secure transactions. We have also listed some software solutions we recommend that can be beneficial to your site.
1.5 PROPOSED SYSTEM
The opportunity to shop from the comfort of ones own home has seen a change like never seen before. Within the span of a few short years, what may have began as an experimental idea has grown to an immensely popular hobby, and in some cases, a means of livelihood, the online auction gathers tremendous response everyday, all day. With the point and click of the mouse, one may bid on an item they may need or just want, and in moments they find that either they are the top bidder or someone else wants it more, and you’re outbid! The excitement of an auction all from the comfort of home.
With this opportunity to buy sight unseen also comes the opportunity to be scammed sight unseen as well. There are over 30 million ‘hits’ each month on the online auction sites, and that is opportunity waiting to be taken for those with the criminal intent of defrauding others.
However with a little care and caution, one can have a positive experience doing business on an online auction, and each party can leave satisfied with their ‘deal’, whether they are the buyer, the seller, or the conveyance that brought it all together.
1.5.1 Features of the proposed system:
• User friendly.
• User can get the Timely Information from the database with out any delay regarding the query.
• This reduces the delay of response given to the Customer.
• User can generate reports very easily.
1.5.2 Advantages of the proposed system:
• The proposed system is automated that is faster than the existing manually maintained system and can handle data easily.
• Computerization of the details of the buyers and sellers.
• Maintenance time and cost are greatly reduced.
• Accurate information can be generated easily and quickly at different levels.
• Report can be generated easily and quickly.
2. FEASIBILTIY
2.1 TECHNICAL FEASIBILITY:

Evaluating the technical feasibility is the trickiest part of a feasibility study. This is because, .at this point in time, not too many detailed design of the system, making it difficult to access issues like performance, costs on (on account of the kind of technology to be deployed) etc. A number of issues have to be considered while doing a technical analysis.
Understand the different technologies involved in the proposed system before commencing the project we have to be very clear about what are the technologies that are to be required for the development of the new system. Find out whether the organization currently possesses the required technologies. Is the required technology available with the organization?
2.2 OPERATIONAL FEASIBILITY:
Proposed projects are beneficial only if they can be turned into information systems that will meet the organizations operating requirements. Simply stated, this test of feasibility asks if the system will work when it is developed and installed. Are there major barriers to Implementation? Here are questions that will help test the operational feasibility of a project:
Is there sufficient support for the project from management from users? If the current system is well liked and used to the extent that persons will not be able to see reasons for change, there may be resistance.
Are the current business methods acceptable to the user? If they are not, Users may welcome a change that will bring about a more operational and useful systems.
Have the user been involved in the planning and development of the project?
Early involvement reduces the chances of resistance to the system and in general and increases the likelihood of successful project.
Since the proposed system was to help reduce the hardships encountered. In the existing manual system, the new system was considered to be operational feasible.
2.3 ECONOMIC FEASIBILITY:
Economic feasibility attempts 2 weigh the costs of developing and implementing a new system, against the benefits that would accrue from having the new system in place. This feasibility study gives the top management the economic justification for the new system.
A simple economic analysis which gives the actual comparison of costs and benefits are much more meaningful in this case. In addition, this proves to be a useful point of reference to compare actual costs as the project progresses. There could be various types of intangible benefits on account of automation. These could include increased customer satisfaction, improvement in product quality better decision making timeliness of information, expediting activities, improved accuracy of operations, better documentation and record keeping, faster retrieval of information, better employee morale.
Reply
#2
Hi
I want the full project of secure net auction. Please send it to my mail I'd divyareddy6589[at]gmail.com
Reply
#3


to get information about the topic" Secure Net Auction System full report" refer the page link bellow


http://studentbank.in/report-secure-net-...5#pid60825
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: online auction in asp net with csharp, e auction system in asp net project documentation file free download, dot net code for online auction, online auction project in asp net, auction project report, ppt for net auction system, secure net auction abstract,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,727 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,833 08-01-2018, 02:33 PM
Last Post: RaymondGom
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 897 14-02-2017, 03:49 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,737 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,785 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Employee Cubicle Management System full report computer science technology 4 5,093 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 25,855 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,094 29-11-2015, 02:37 PM
Last Post: Guest
  steganography full report project report tiger 31 33,691 07-07-2015, 02:57 PM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,919 25-02-2015, 07:17 AM
Last Post: Guest

Forum Jump: