Sample Student

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 26

1.

PROJECT TITLE

Online Art
Gallery

1
2. INTRODUCTION

Online Art Gallery is an online application, which is used to display and sell art works of artist
irrespective of their nationality, gender and other narrow consideration, through auction. Artist
can register online for being a member in the art gallery and each artist can upload the digital
copy of their art work under the respective categories. They can host their art work either for
auction or for fixed price. The artist is liable to pay a fraction of the price of each art work to the
web site to find the running fund for site. Art lovers have to go to the art exhibition to collect
their favorite arts or painting. But now-a-days they are not getting enough time to go to the
galleries and collect the arts and paintings.

Existing System:
Customer can also register online and they can browse art works that are arranged in
different categories scientifically. Each Customer can create their own gallery to see his favorite
art works with out much difficult. And each user has the right to purchase an art work using the
integrated payment gateway and participate in auction by submitting their bids. Qualified bidder
should remit the amount using payment gateway and after each valid payment the art work will
be shipped within some days.

Proposed System:

ONLINE ART GALLERY is a web application software and it is very helpful for the art lovers
and others who wants to know the addresses where this kind of arts will we sold.

This application helps the end-users to search their arts and paintings and they can place order
for the selected pieces. The end-user can also get the information about the art exhibition and the
respective address, so, that they can visit to those exhibitions.

Art Gallery brings you an opportunity to view online art exhibitions at our Online Art Gallery
we bring you details of all art exhibitions held in the past and the forthcoming show. The Online
Art Gallery is updated daily, so the user can view and buy the latest collection of contemporary
art online from any where in the world. You can view and buy the latest Indian contemporary art
collection available at their exhibitions and also at their online gallery.

2
3. OBJECTIVE

The objectives of developing the Art Gellery are as given below: -

 To store data of the entire user who are registered in the site.

 To solve the user’s problem in time efficient manner. Helping the user to search different
Art with a robust search tools

 To facilitate easy and efficient retrieval of data as and when required for Art by the user.

 Online updating of all type of Art, updating data using web based interfaces and with the
help of buttons and links in an easy and convenient way.

 Data security is maintained to relatively high level by implementing it at Database level,


so as to ensure that only authorized users have access to confidential User information.
 Developing a viable candidate system that fulfill the Faster and accurate information
retrieval
 Easy registration
 Login dependent information retrieval and updating.Correct and consistent maintenance
of data and its quick retrieval
 Improving the switches button and hyperlink so that the candidate shall find all the
queries they need at first sight.

3
4. SURVEY OF TECHNOLOGY

 SERVER SIDE COMPONENTS: ACTIVE SERVER PAGES

In the world of web-accessible ASP.NET application Active server pages and Servlets
occupy a central position between enabled clients and application servers. ASP working in the
environment of the web container that provides connection and services. By means of these
connections, ASP control the presentation of data derived from operations on database to
network-connected clients. This client role is suggested in figure-
Client Presentation
Web Browsers Internet
HTML pages Aware Devices
ASP

HTML, Multimedia, XML Objects

Web Server / Web container

Server presentation control Active Server Pages

Binary files, Query, Result, XML

ADO.NET

Business Logic

Binary files, Query, Result, XML


Back End Database SQL Database, Object Database
File System

4
 SQL DATABASE MANAGEMENT SYSTEM
Database systems have become ubiquitous across the computing landscape. This
is partly because of the basic facilities offered by database management systems: physical
data independence, ACID transaction properties, a high-level query language, stored
procedures, and triggers. These facilities permits sophisticated applications to ‘push’
much of their complexity into the database itself. The proliferation of database systems in
the mobile and embedded market segments is due, in addition to the features above, to
the support for two-way database replication and synchronization offered by most
commercial database management systems. Data synchronization technology makes it
possible for remote users to both access and update corporate data at a remote, off-site
location. With local (database) storage, this can be accomplished even when disconnected
from the corporate network.

SQL is a realational database management system.

A relational database management system (RDBMS) is a program that lets you


create, update, and administer a relational database. Most commercial RDBMS's use the
Structured Query Language (SQL) to access the database, although SQL was invented
after the development of the relational model and is not necessary for its use.

The leading RDBMS products Microsoft's SQL Server. Despite repeated


challenges by competing technologies, as well as the claim by some experts that no
current RDBMS has fully implemented relational principles, the majority of new
corporate databases are still being created and managed with an RDBMS.

5
5. PROJECT CATEGORY

“Web Based RDBMS”

The relational model was propounded by E.F. codd of the IBM in 1972. One of the main
advantages of the relational model is that it is conceptually simple and more importantly based
on mathematical theory of relation. It is also frees the users from details of storage structure and
access methods.

A database can be understood as a collection of related files. How those files are related
depends on the model used. Early models included the hierarchical model (where files are related
in a parent/child manner, with each child file having at most one parent file), and the network
model (where files are related as owners and members, similar to the network model except that
each member file can have more than one owner).
FUTURE OR RDBMS: -
 Data are the values stored in the database. On its own, data means very little.
 A database is a collection of tables.
 Each table contains records, which are the horizontal rows in the table. These are also
called tuples.
 Each record contains fields, which are the vertical columns of the table. These are also
called attributes.
 Fields can be of many different types. There are many standard types, and each DBMS
(database management system, such as Oracle or SQL) can also have their own specific
types, but generally they fall into at least three kinds - character, numeric and date
 The domain refers to the possible values each field can contain (it's sometimes called a
field specification).
 An index is a physical mechanism that improves the performance of a database. Indexes
are often confused with keys
 A view is a virtual table made up of a subset of the actual tables.

6
6. HARDWARE & SOFTWARE SPECIFICATION

The hardware & software specification and environment specifications used by


programmers are:
HARDWARE:
 Computer system: Standard pc/at compatible with Pentium 3 or Pentium 4 CPU or more.
 Primary memory: This Information System works within 1 G.B. if user memory (RAM)
addressed by MS windows.
 Hard disk having 1GB free space.
 Input device: Mouse & keyboard compatible with PC/ AT, video adapters and
monitors. It is a colored program so better to use a colored monitor
 Color monitors for best performance.
SOFTWARE:
 Windows xp or above
 Ms Visual Studio 2008
 Ms Sql Srver 2005
 Internet explorer 5.0.
 IIS 5.0 or above
 The hardware & software specification and environment specifications to run the
application.

7
7. DESIGN SPECIFICATION

7.1 DFD Level 0 :

MEMBERB ART ARTIST


GALLERY

ADMIN

8
7.2 DFD Level 1 member:

REGEST
MEMBER ATION

DATA BASE
CHANGE
LOG
PASS
IN WORD

VIEW SEARC
GET ART H ADD SELEC
PROFILE GALLE ARTIST CART T ART
RY WISE

BILLI CON
ORD PAY
NG & FIRM
ER MEN
SHIP ATIO
NOW T
PING N

9
7.3 DFD Level 1 Artist:

REGES
ARTIST TRATIO
N

CHANG
EPASS
LOGIN WORD
DATA BASE

GET VEW SEARCH UPLOA


PROFI GALLE BY D ART
LE RY ARTIST

10
7.4 DFD Level 1 Admin:

ARTIST

MEMBER ART DATA


GALLERY BASE

ADMIN

11
7.5 Context Diagram:

login
login

MEMBER register ART register


ARTIST
GALLERY
Get details Get details

transactions Activate &


deactivation

ADMIN

12
7.6 ENTITY RELATIONSHIP DIAGRAM

13
7.7 OBJECT DIAGRAM

1:1 1:1
A:Admin

1:1 1:1 1:1


1:*
1:*
1:*
1:*

M:Member L:Login R:Register T:Transactions G:Gallery

7.8 ACTIVITY DIAGRAM FOR MEMBER

Registration

Input details

Store details

Display details

Login

No Yes
Valid

Get profile

View gallery

Add to cart

password

Payment

14
7.9 ACTIVITY DIAGRAM FOR ARTIST

Registration

Input details

Store details

Display details

Login

No Yes
Valid

Get profile

View gallery

Update Gallery

15
8. DATABASE STRUCTURE

 Login table

Field Name Data Type Size Description


User id Integer , Primary key 10 User code
User name Varchar 50 Name of the user
Password Varchar 50 Password
User Type Varchar 50 Type of the user
Security Code Varchar 50 Security Code
Status Varchar 50 Status
Date Date/Time Login date

 SoldArt table

Field name Data Type Size Description


SoldArtID Int,Primarykey,Identity(1,1) 50 Auto Generated Sold Art Id

User ID Int 50 User ID

Art ID Int 50 Id of Art

Art Title Varchar 250 Title of Art

Art List Varchar 50 List of Art

Art Path Varchar 50 Path of Art

Art Cost Varchar 15 Cost of an Art

Date Date/Time Art Submit Date

16
 Shipping table

Field Name Data Type Size Description


Shipping Id Int,Primarykey,Identity Auto Generated Shipping Id
(1,1)
User Id Integer, [Foreign Key] 10 User id
First Name Varchar 50 First Name of User
Last Name Varchar 50 Last Name of User
Gender Varchar 50 Gender Detail of User
Email Varchar 50 Email of User
City Varchar 50 City
State Varchar 50 State
Mobile No Varchar 10 Mobile no of User
Date Date/Time Date of Shipping

 Contact table

Field Name Data Type Size Description


Contact Id Int,Primarykey,Identity Auto Generated Contact Id
(1,1)
User Id Integer, [Foreign Key] 10 User id
First Name Varchar 50 First Name of User
Last Name Varchar 50 Last Name of User
Gender Varchar 50 Gender Detail of User
Email Varchar 50 Email of User
City Varchar 50 City
State Varchar 50 State
Mobile No Varchar 10 Mobile no of User
Date Date/Time Date of Contacting
 Card Type table

Field Name Data Type Size Description


Card Checked ID Int,Primarykey,Identity(1,1 50 Auto Generated Card Id
)
User Id Integer, [Foreign Key] User ID
Card Name Varchar 50 Name of Card
Date Date/Time Date

17
 Card Type table

Field Name Data Type Size Description


Art ID Int,Primarykey,Identity(1,1 50 Auto Generated Art Id
)
User Id Integer, [Foreign Key] User ID
Art Title Varchar 150 Title Of Art
Art Cost Decimal Price of Art
Art Path Varchar 50 Path of Art
Date Date/Time Date

 AddToCart table

Field Name Data Type Size Description


Cart ID Int,Primarykey,Identity(1,1 50 Auto Generated Cart Id
)
User Id Integer, [Foreign Key] User ID
Art Title Varchar 150 Title Of Art
Artist Varchar 50 Name of Artist
Art Cost Decimal Price of Art
Art Path Varchar 50 Path of Art
Date Date/Time Date
9. PROCESS LOGIC

18
Registration

member
getprofile

ViewGallery

Admin
SearchbyArtist

Addtocart

Shippingdetails

Artist
payment

Login

10. MODULES

19
The project include following main modules:-

 Login of the User and Aplicant


 Registration of user.
 Art description.
 User profile information.
 The validation master
 Report genaration
 Brief description of the all modules.
Login of the Art Gellery -applicant and administrator
This module is considered with login of new user and administrator. Every user must enter his
some details about itself for login the home page and after submitted he can Cart and ship Art
online. The administrator can also login from this module. He can insert, delete or update the
user login name and password.this module check the authenticity of the person accessing the
project. The main objective behind this module is to provide security to the project so that access
is restricted to the authorized users.
Input is taken as login and password that the user Enters.
This login id and password sent back to the activeX exe through DLL to check the
information in the database.
If the login id and password entered by the user matches those of the database file then it
will return and redirected to respective control panel, other wise give a Error massage “login
denied”.

 Registration of user: It takes the information the user and enter it into the database. This
module uses the table ‘Documantations for its operation
This table has following sub module.
 Add
 Edit
 Save

20
 Delete
 Art description: It takes the information form the Art and enters it into database.
This module user the table ‘Art’ for its operation.
This table has following sub module.
 Add
 Edit
 Update
 Delete

 Art info: It takes the information form the user and enters it into database. This module
user the table. ‘ Art ’ for its operation

 Artist profile info: It table the information the user enters it into database. This module
user the table ‘Arist for its operation. This table user has following sub module:-
 add
 update
 delete

 Validation master: This module validation the entry made by user if the entry is not as
per the specification a wrong message is given.

 Cart module: With the user of this module user can cart the multiple arts simultaneously
this modules user the table ‘Passport and “Cart” for its operation.

21
11. REPORT GENERATION

 Report generation: This system will generate the report for the file software like.
Following reports are genreaded:-
 How many user are currently wring the site.
 How many Artist are are currently wring the site.
 How many Art are are currently wring the site.
 Report on Purchased Arts.
 For Art seeker on the basis of Art search by option.
 Search by User Name.
 Search by data
 Report of Shipped Records.
 Report on the basis of user perticulars.
 Report of the registered user who have user id and password.

22
12. FUTURE SCOPE

Enhancement of our proposed system after successfully implementing the it can be added in the
system that displays the Art and his details when the User want to purchased any art then he can
car and ship this art on billing address.When the developed system runs successfully.
Online User register facility could be brought on Web that would enable the User to
register and can see the detail in the system itself by entering his login id No.
There should be some page like Payment Gateway, Cash on delivery can give the better option
forPurchasing an Art.
If user want to send Art detail to his friend then there is option to mail Art detail to friend
is necessary in Art page.
Each of these tasks serves describes the problem so that an overall approach or solution
may be synthesized.

1: Registered Module:
In this module, User enters a login & password and the software checks its validity. If the
login & password is valid then he is allowed to enter, otherwise “Invalid User/Password”
message is displayed. Different data access rights are assigned to different users.

2: Master Module.
This module is used to add and manage user, Art and Artist Detail details etc.

3: Shipping Module:
In this module, User purchased art and get this art his location by shipping with two
option, Online Cash Payment and Cash on delivery.

4: Modifying/Updating Existing Entries:


In this module, whenever an existing entity is required to be modified the corresponding
forms are opened and the database is manipulated and the data is fetched. Now the user can made
the required changes and then accordingly, he updates the data. Again, the checks are followed in
case there is any invalid entry.

23
5: Searching:
In this module, User can search on the requirement their choice that mean, it (search
engine) will help to search in all record/ information of available Art/Artist.

6: Validation of Data Entered by the User & Error Handling:


In this module, the validity of data entered by the user during the various business
processes is checked through various validation checks. For example, there should not be any
characters entered in the numeric fields, likewise if there is any error occurs than it should handle
that particular error and give the required messages.

24
13. SECURITY MESAURES

Security in database involves both policies and mechanisms to protect the data and ensure that it
is not accessed, altered or deleted without proper authorization. Integrity implies that any properly
authorized access, alternation or deletion of the data in the database does not change the validity of the
data. The economic or strategic reasons for protecting data from unauthorized access, corruption or
destruction, there is a privacy dimension for data security or integrity. Privacy is the ethical and legal
rights that individual have with regard to control over the dissemination and use of their personal
information.
Data has to be protected in the database. There is a similar need for protection in a non database
environment. The operating system must ensure that files belonging to the database are not used directly
without proper authorization.

 IDENTIFICATION AND AUTHORIZATION


The authorization mechanism prepares the user profile for a user and indicates the portion
of the database accessible to that user and mode of the access allowed. The enforcement of the
security policies in the database system requires that the system knows the identity of the user
making the requests. This in turn requires that before making any request, the user has to identify
herself or himself to the system and the authenticate identification to confirm that the user is in
fact the correct person.

 AUTHENTICATION
The simplest and most common authentication scheme used is a password to authenticate
the user. The user enters the user name or number and then authenticates her /him by the
password. A number of methods can be used in the authentication: by something known only by
the user, by something that only the user possesses, or by some physical/physiological
characteristics of the user.

25
14. BIBLIOGRAPHY

 www.w3school.com
 www.dotnetfounda.com
 www.sqlauthority.com
 Elsevier Inc, C# 2.0 Practical Guide for Programmers
 Wrox.Press-Professional ADO.NET Programming
 Addison.Wesley ASP.NET Solutions—23 Case Studies: Best Practices for Developers
 Premier Press - Ado.net Professional Projects
 Wrox.Press-Professional ASP.NET Programming

26

You might also like