You are on page 1of 25

Secure and Efficient Information Retrieval 2018-19

CHAPTER 1

INTRODUCTION
Ongoing years have seen the quickly extending web based business and is supplanting conventional
trade. A huge number of items from different traders have been offered on the web. These sites
additionally gives a stage to purchasers to post surveys on a large number of items. Such various
customer audits contain rich and profitable learning and have turned into a significant asset for the two
purchasers and firms. Customers ordinarily look for quality data from online audits before acquiring an
item , while numerous organizations utilize online surveys as significant inputs in their item
advancement, promoting, and purchaser relationship the board.

1.1 MOTIVATION:
Most of popular online shopping sites like amazon, flipkart, snapdeal, myntra and other official
company portals promotes large number of products through internet services. The products review and
rating are both independent factors, the consumer will mainly focus on ratings rather than the textual
feedback and review. The main motivation is to make the effective use of rating for the online
consumer.

The quantity of online shoppers who read and trust online surveys is expanding. As indicated
by a study by BrightLocal, 88 percent of purchasers trust online audits as much as an individual
suggestion—which is dumbfounding, considering most online surveys are posted by all out outsiders. A
similar study found that solitary 12 percent of the populace did not consistently perused audits for
purchaser items.

This means not offering client surveys (or overlooking them as a potential advertising
opportunity) is much the same as estranging 88 percent of your purchasing populace, denying them of
data they need to enable them to settle on their purchasing choices.

1.2 PROBLEM STATEMENT


The undertaking of aspect choice turns out to be all the more testing with the various of information.
The audits have various sorts, at the point when surveys are in literary arrangement all things
considered it requires recognizing the aspects then nostalgic characterization and choose whether it is
sure or negative kind of survey. So we are executing such framework which can do all the preparing by
utilizing different calculations for positioning of aspects.

NIE,Mysure. Page 1
Secure and Efficient Information Retrieval 2018-19

Sentiment analysis is the most essential and significant work in separating clients intrigue
inclinations. As a rule, sentiment is utilized to portray clients claim frame of mind on item or things. It is
seen that in numerous commonsense cases, it is more critical to give numerical scores instead of paired
choices. By and large, audits are separated into two gatherings, positive and negative.

1.3 OBJECTIVE

1.4 SCOPE
It is hard for clients to settle on a decision when all hopeful items reflect positive sentiment or negative
sentiment. To settle on a buy choice, clients not just need to know whether the item or thing is great, yet
additionally need to know how great the thing is. Its additionally concurred that various individuals may
have distinctive sentimental articulation inclinations.

NIE,Mysure. Page 2
Secure and Efficient Information Retrieval 2018-19

CHAPTER 2
LITERATURE SURVEY

2.1 EXISTING SYSTEM

The existing work mainly focuses on classifying users into binary sentiment (i.e. positive or
negative).

The existing approaches mainly leverage product category information or tag information to study the
interpersonal influence.

These methods are all restricted on the structured data. However, user reviews can provide us ideas in
mining interpersonal inference and user preferences.

2.2 PROPOSED SYSTEM

We propose a sentiment-based rating prediction method in the framework of matrix factorization. In


our work, we make use of social users’ sentiment to infer ratings.

First, we extract product features from user reviews. Then, we find out the sentiment words, which
are used to describe the product features. Besides, we leverage sentiment dictionaries to calculate
sentiment of a specific user on an item/product.

We propose a user sentimental measurement approach, which is based on the sentiment words from
user reviews.

We make use of sentiment for rating prediction. User sentiment similarity focuses on the user interest
preferences. Item reputation similarity shows the potential relevance of items.

We fuse the three factors: user sentiment similarity, interpersonal sentimental influence, and item
reputation similarity into a probabilistic matrix factorization framework to carry out an accurate
recommendation. Here user’s social sentiment that we mined is a key factor in improving rating
prediction performances.

2.3 TOOLS/TECHNOLOGY SURVEYv

2.3.1 Overview of .NET Framework

NIE,Mysure. Page 3
Secure and Efficient Information Retrieval 2018-19

The .NET Framework is a computing platform that simplifies application development in the
highly distributed environment.

The .NET Framework introduces a completely new model for the programming and deployment
of applications. .NET is Microsoft's vision of "software as a service", a development environment in
which we can build,

create and deploy our applications and the next generation of components, the ability to use the Web
rather than our own computer for various services.

The .NET Framework is not a single application, it’s actually a collection of different
technologies bundled into one marketing term. The .NET Framework includes new languages like C#
and VB.NET, an engine for hosting programmable web pages and web services (ASP.NET), a new
model for interacting with databases (ADO.NET) and a class library stocked with tools for everything
from sending email to encrypting a password. The .NET technology facilitates to learn about
component based programming, structured error handling and how to access the files, XML and
relational databases.

.NET is a cluster of different technologies which includes:

The .NET language : These include C# and Visual Basic .NET, the object-oriented and
modernized successor to Visual Basic 6.0, as well as Jscript.NET ( a server side version of Java
Script), J# ( a Java Clone), and C++ with manage extensions.

ASP.NET: This is the engine that includes both web applications and web services, with almost
any feature from the .NET class library. ASP.NET also includes a set of web specific services.

Windows Form: This is the engine that is used to develop Windows based applications which is
also known as standalone applications. Like ASP this also has various controls and tools which
can be used to design the user interface. Windows forms are best suited for the applications of
installation type

Visual Studio .NET: This optional development tool contains a rich set of productivity and
debugging features.

The framework is designed to fulfill the following objectives:

To provide a consistent object-oriented programming environment whether object code is stored


and executed locally, executed locally but internet distributed or executed remotely

NIE,Mysure. Page 4
Secure and Efficient Information Retrieval 2018-19

To provide a code execution environment that minimizes software deployment and versioning
conflicts.

To provide a code-execution environment that guarantees safe execution of code, including code
created by an unknown or semi-trusted third party.

To provide a code-execution environment that eliminates the performance problems of scripted or


interpreted environments.

To make the developer experience consistent across widely varying types of applications such as
Windows based and Web based applications.

To build all communications on industry standards to ensure that code based on the .NET Framework
can integrate with any other code.

Microsoft introduced great technologies like COM, DCOM, COM+ etc. to enable reuse of
Software. Although these technologies are very powerful to reuse Software, they required a huge learning
curve. According to this aspect, Microsoft realized that its time to come up with a new technology, a better
one, an easier one, a new Framework, within which each programming task is easy accomplished.

2.3.2 The major Components (Layers) of the .NET framework


The major components of the .NET framework are shown in the below diagram:

Fig. 2.3.2 The .NET Framework Overview

NIE,Mysure. Page 5
Secure and Efficient Information Retrieval 2018-19

2.3.3 Features Of .NET


Interoperability - Because so many COM libraries have already been created, the .NET Framework
provides methods for allowing interoperability between new code and existing libraries.

Common Runtime Engine - Programming languages on the .NET Framework compile into an
intermediate language known as the Common Intermediate Language or CIL. Microsoft's
implementation of CIL is known as Microsoft Intermediate Language or MSIL. In Microsoft's
implementation, this intermediate language is not interpreted but rather compiled in a manner
known as just-in-time compilation (JIT) into native code. The combination of these concepts is
called the Common Language Infrastructure (CLI), a specification; Microsoft's implementation of
the CLI is known as the Common Language Runtime (CLR).

Language Independence - The .NET Framework introduces a Common Type System or


CTS. The CTS specification defines all possible data types and programming constructs
supported by the CLR and how they may or may not interact with each other. Because o of
this feature , the

.NET Framework supports development in multiple programming languages.

Base Class Library - The Base Class Library, sometimes referred to as the Framework Class
Library, is a library of types available to all languages using the .NET Framework. The BCL
provides classes which encapsulate a number of common functions such as file reading and writing,
graphic rendering, database interaction, XML document manipulation, and so forth.

Simplified Deployment - Installation and deployment of Windows applications has been the base of
many developers' existence. Registry settings, file distribution and DLL hell have been nearly
completely eliminated by new deployment mechanisms in the .NET Framework.

Security - .NET allows for code to be run with different trust levels without the use of a separate
sandbox.

NIE,Mysure. Page 6
Secure and Efficient Information Retrieval 2018-19

The design of the .NET framework is such that it supports platform independence. That is, a
program written to use the framework should run without change on any platform for which the framework
is implemented. At present, Microsoft has implemented the full framework only on the Windows operating
system. Microsoft and others have implemented portions of the framework on non-Windows platforms, but
to date those implementations are not widely used.

2.3.4 Introduction to C#
C# is a simple, modern, object oriented and type-safe programming language derived from C and
C++. C# (pronounced "C sharp") is firmly planted in the C and C++ family tree of languages, and will
immediately be familiar to C and C++ programmers. C# is built specifically to program the microsoft.NET
framework.

C# aims to combine the high productivity of Visual Basic and the raw power of C++. C# is provided
as part of Microsoft Visual Studio 7.0. In addition to C#, Visual Studio supports Visual Basic, Visual C++,
and the scripting languages VBScript and JScript. All of these languages provide access to the Microsoft
.NET platform, which includes a common execution engine and a rich class library. For C# developers,
even though C# is a newer language, it has complete access to the same rich class libraries that are used by
second tools such as Visual Basic and Visual C++. C# itself does not include a class library. It's built with
the Web in mind and claims to provide an environment that's in sync with HTML, XML, and SOAP.

Applications written in C# require an implementation of the Common Language Runtime(CLR) to


execute. Unlike Java classes, CLI applications are compiled in 2 passes. First compiled to platform abstract
byte code, and secondly, it's compiled at first runtime of the application to the native client's machine code.

Compared to C and C++, the language is restricted or enhanced in a number of ways, including but
not limited to the following:

True support for pointers. However pointers can only be used within unsafe scopes, and only programs
with appropriate permissions can execute code marked as unsafe. Most object access is done through
safe references, which cannot be made invalid, and most arithmetic is checked for overflow. An unsafe
pointer can be made to not only value-types, but to subclasses of System. Object as well. Also safe code
can be written that uses a pointer (System.IntPtr).

Managed memory cannot be explicitly freed, but instead is garbage collected when no more references to
the memory exist. Multiple inheritance is prohibited (although a class can implement any number of
interfaces).
NIE,Mysure. Page 7
Secure and Efficient Information Retrieval 2018-19

Enumeration members are placed in their own namespace. C# 1.0 lacks templates;
however, C# 2.0 provides generics.

Properties are available which results in syntax that resembles C++ member field access, similar to VB.

Full type reflection and discovery is available.

About Front End: HTML5


HTML5 is a core technology markup language of the Internet used for structuring
and presenting content for the World Wide Web. It is the fifth revision of the HTML standard (created in 1990
and standardized as HTML 4 as of 1997) and, as of December 2012, is a candidate recommendation of
the World Wide Web Consortium (W3C).Its core aims have been to improve the language with support
for the latest multimedia while keeping it easily readable by humans and consistently understood by
computers and devices (web browsers, parsers, etc.). HTML5 is intended to subsume not only HTML 4,
but also XHTML 1 and DOM Level 2 HTML.

Following its immediate predecessors HTML 4.01 and XHTML 1.1, HTML5 is a response to the
fact that the HTML and XHTML in common use on the World Wide Web are a mixture of
features introduced by various specifications, along with those introduced by software products
such as web browsers, those established by common practice, and the many syntax errors in existing
web documents. It is also an attempt to define a single markup language that can be written in either
HTML or XHTML syntax. It includes detailed processing models to encourage more interoperable
implementations; it extends, improves and rationalises the markup available for documents, and
introduces markup and application programming interfaces (APIs) for complex web applications. For
the same reasons, HTML5 is also a potential candidate for cross-platform mobile applications. Many
features of HTML5 have been built with the consideration of being able to run on low-powered devices
such as smartphones and tablets. In December 2011, research firm Strategy Analytics forecast sales of
HTML5 compatible phones would top 1 billion in 2013.

In particular, HTML5 adds many new syntactic features. These include the new <video>, <audio> and
<canvas> elements, as well as the integration of scalable vector graphics (SVG) content (that replaces the
uses of generic <object> tags) and MathML for mathematical formulas. These features are idesignedi itoi

NIE,Mysure. Page 8
Secure and Efficient Information Retrieval 2018-19

imakei iiti ieasyi itoi iincludei iandi ihandlei imultimediai iandi igraphicali icontenti ioni ithei iwebi iwithouti

ihavingi itoi iresorti itoi iproprietaryi ipluginsi iandi iAPIs.i iOtheri inewi ielements,i isuchi iasi i<section>,i

i<article>,i i<header>and<nav>,i iarei idesignedi itoi ienrichi ithei isemantici icontenti iofi idocuments.i iNewi

iattributesi ihavei ibeeni iintroducedi ifori ithei isamei ipurpose,i iwhilei isomei ielementsi iandi iattributesi ihavei

ibeeni iremoved.i iSomei ielements,i isuchi iasi i<a>,i i<cite>i iandi i<menu>i ihavei ibeeni ichanged,i iredefinedi

iori istandardized.i iThei iAPIsi iandi iDocumenti iObjecti iModeli i(DOM)i iarei inoi ilongeri iafterthoughts,i ibuti

iarei ifundamentali ipartsi iofi ithei iHTML5i ispecification.HTML5i ialsoi idefinesi iini isomei idetaili ithei

irequiredi iprocessingi ifori iinvalidi idocumentsi isoi ithati isyntaxi ierrorsi iwilli ibei itreatedi iuniformlyi ibyi ialli

iconformingi ibrowsersi iandi iotheri iuseri iagents.

2.3.5i iASP.Net
ASP.NETi iisi iani iopeni isourcei iserver-sidei iWebi iapplicationi iframeworki idesignedi ifori iWebi idevelopmenti
itoi iproducei idynamici iWebi ipages.i iIti iwasi idevelopedi ibyi iMicrosofti itoi iallowi iprogrammersi itoi ibuildi
idynamici iwebi isites,i iwebi iapplicationsi iandi iwebi iservices. Iti iwasi ifirsti ireleasedi iini iJanuaryi i2002i iwithi
iversioni i1.0i iofi ithei i.NETi iFramework,i iandi iisi ithei isuccessori itoi iMicrosoft'si iActivei iServeri iPagesi
i(ASP)i itechnology.i iASP.NETi iisi ibuilti ioni ithei iCommoni iLanguagei iRuntimei i(CLR),i iallowingi
iprogrammersi itoi iwritei iASP.NETi icodei iusingi ianyi isupportedi i.NETi ilanguage.i iThei iASP.NETi iSOAPi
iextensioni iframeworki iallowsi iASP.NETi icomponentsi itoi iprocessi iSOAPi imessages.

ASP.NETi iisi iini ithei iprocessi iofi ibeingi ire-implementedi iasi iai imoderni iandi imodulari iwebi iframework,i
itogetheri iwithi iotheri iframeworksi ilikei iEntityi iFramework.i iThei inewi iframeworki iwilli imakei iusei iofi ithei
inewi iopen-sourcei i.NETi iCompileri iPlatformi i(code-namei i"Roslyn")i iandi ibei icrossi iplatform.i iASP.NETi
iMVC,i iASP.NETi iWebi iAPI,i iandi

ASP.NET Web Pages (a platform using only Razor pages) will merge into a unified MVC 6

Fig 2.3.5 ASP .Net Architecture

NIE,Mysure. Page 9
Secure and Efficient Information Retrieval 2018-19

2.3.6 Visual Studio 2010


Visual Studio includes a code editor supporting IntelliSense (the code completion component) as well as
code refactoring. The integrated debugger works both as a source-level debugger and a machine-level
debugger. Other built-in tools include a forms designer for building GUI applications, web designer, class
designer, and database schema designer. It accepts plug-ins that enhance the functionality at almost every
level—including adding support for source-control systems (like Subversion) and adding new toolsets like
editors and visual designers for domain-specific languages or toolsets for other aspects of the software
development lifecycle (like the Team Foundation Server client: Team Explorer). Visual Studio supports
different programming languages and allows the code editor and debugger to support nearly new
programming language provided a language-specific service exists. Built-in languages include C,C++ and
C++/CLI(via Visual C++), VB.NET (via Visual Basic .NET), C# (via Visual C#), and F# (as of Visual
Studio 2010). Support for other languages such as M, Python, and Ruby among others is available via
language services installed separately. It also supports XML/XSLT, HTML/XHTML, JavaScript and CSS.
Java (and J#) were supported in the past.

Microsoft provides "Express" editions of its Visual Studio at no cost. Commercial versions of Visual Studio
along with select past versions are available for free to students via Microsoft's DreamSpark program

Fig 2.3.6 Visual Studio Architecture

NIE,Mysure. Page 10
Secure and Efficient Information Retrieval 2018-19

2.3.7 About Back End: MSSQL


Microsoft SQL Server is a relational database management system developed by
Microsoft. As a database, it is a software product whose primary function is to store and
retrieve data as requested by other software applications, be it those on the same computer or those
running on another computer across a network(including the internet). There are at least a dozen
different editonsof Microsoft SQL Server aimed at different audiences and for workloads ranging
from small single-machine applications to large Internet-facing applications with many concurrent
users. Its primary query languages are T-SQL and ANSI SQL.

Features of MSSQL
iAlways on availability groups -- This feature takes database mirroring to a whole new level.

iColumnstore Indexes -- This a cool new feature that is completely unique to SQL Server. They are
special type of read-only index designed to be use with Data Warehouse queries. Basically, data is grouped
and stored in a flat, compressed column index, greatly reducing I/O and memory utilization on large
queries.

i iUser-Defined Server Roles -- DBAs have always had the ability to create custom database role, but
never server wide.

iEnhanced Auditing Features -- Audit is now available in all editions of SQL Server. New filtering
features give greater flexibility in choosing which events to write to the log.

iBI Semantic Model -- This is replacing the Analysis Services Unified Dimensional Model (or cubes
most people referred to them). It's a hybrid model that allows one data model will support all BI
experiences in SQL Server.

iSequence Objects -- A sequence is just an object that is a counter -- a good example of it's use would be
to increment values in a table, based a trigger. SQL has always had similar functionality with identity
columns, but now this is a discrete object.

iiEnhanced PowerShell Support -- Windows and SQL Server admins should definitely start brushing up
on their PowerShell scripting skills.

iDistributed Replay -- Distributed replay allows you to capture a workload on a production server, and
replay it on another machine. This way changes in underlying schemas, support packs, or hardware changes
can be tested under production conditions.

iPowerView -- You may have heard of this under the name "Project Crescent" it is a fairly
powerful self-service BI toolkit that allows users to create mash ups of BI reports from all over
the Enterprise.
NIE,Mysure. Page 11
Secure and Efficient Information Retrieval 2018-19

Relational Database System: Like almost all other database systems on the market, MSSQL is a
relational database system.

Client/Server Architecture: MSSQL is a client/server system. There is a database server (MSSQL) and
arbitrarily many clients (application programs), which communicate with the server; that is, they query
data, save changes, etc. The clients can run on the same computer as the server or on another computer
(communication via a local network or the Internet).

SQL compatibility: MSSQL supports as its database language -- as its name suggests – SQL (Structured
Query Language). SQL is a standardized language for querying and updating data and for the
administration of a database. There are several SQL dialects (about as many as there are database systems).
MSSQL adheres to the current SQL standard , although with significant restrictions and a large number of
extensions.

Fig 2.3.7 Architecture of MSSQL Server

NIE,Mysure. Page 12
Secure and Efficient Information Retrieval 2018-19

CHAPTER 3

SYSTEM REQUIREMENT SPECIFICATION

3.1 INTRODUCTION
Software Requirement Specification (SRS) is a fundamental document, which forms the foundation
of the software development process. SRS not only lists the requirements of a system but also has a
description of its major features. These recommendations extend the IEEE standards. The
recommendations would form the basis for providing clear visibility of the product to be developed
serving as baseline for execution of a contract between client and the developer.
A system requirement is one of the main steps involved in the development process. It follows
after a resource analysis phase that is the task to determine what a particular software product does.
The focus in this stage is one of the users of the system and not the system solutions. The result of
the requirement specification document states the intention of the software, properties and
constraints of the desired system.
SRS constitutes the agreement between clients and developers regarding the contents of the
software product that is going to be developed. SRS should accurately and completely represent the
system requirements as it makes a huge contribution to the overall project plan.
The software being developed may be a part of the overall larger system or may be a complete
standalone system in its own right. If the software is a system component, the SRS should state the
interfaces between the system and software portion.

3.2 FUNCTIONAL REQUIREMENT


Functional requirements capture the intended behavior of the system. This behavior may be
expressed as services, tasks or functions the system is required to perform.
Uploading Items:-
In order to provide the service to customer, admin has to upload some products on application. So that
the user can view those products and make some purchase based on his wish.

• Sentimental analysis process:-


This module contains the sentimental analysis of the review provided by the customer. It
makes use of social users’ sentiment to infer ratings.

NIE,Mysure. Page 13
Secure and Efficient Information Retrieval 2018-19

• Rating prediction:-
Based on the review given by the customer, rating is predicted. These ratings given by the
customer, helps others to view the products which is top rated.

• Reviews analysis:-
The products are reviewed based on the rating given by each customer. The top rated
products are will always be in top of the list, and the least rated products will be in the bottom.

3.3 NON-FUNCTIONAL REQUIREMENT


3.3.1 Performance Requirements:
The product should support the end users requirements. The product is capable of processing
when the large number of files are provided as input.

3.3.2 Safety Requirements:


The system should be designed in a secured way by applying safety measures. Special
exception handling mechanism should be in place to avoid system errors.

3.3.3 Security Requirements:


The use of cryptographic algorithms and MAC address to create secure channel for the query
transactions made the database to be trusted.
3.3.4 Software Quality Attribute:
Availability:
The application will not hang and opens quickly and with 99.9% uptime.

Reliability:
The system should not crash and should identify invalid input and produce suitable error message.

Usability:
The interface should be intuitive and easily navigable and user friendly.

Integrity:
The software does not store any cache data or doesn’t use system resources in background.

NIE,Mysure. Page 14
Secure and Efficient Information Retrieval 2018-19

3.4 HARDWARE REQUIREMENT

Minimum Hardware Requirements

• Processor : Intel i3 2.4 GHz

• Hard Disk : 40 GB

• Ram : 2GB or above

3.5 SOFTWARE REQUIREMENTS

Software Requirements

• Operating system : Windows 7

• Coding Language : C#

• Front End : ASP.NET with C#

• Framework : .Net 4.0

• Tools used : MS Visual Studio 2010

NIE,Mysure. Page 15
Secure and Efficient Information Retrieval 2018-19

CHAPTER 4
SYSTEM ANALYSIS
4.1 DETAILED DESCRIPTION OF THE PROJECT

4.2 HIGH LEVEL DESIGN

4.3 FEASIBILITY STUDY


The feasibility study proposes one or more feasible conceptual solutions to the problem set of the
project. The conceptual solutions give an idea of what the new system will look like. They indicate what
inputs are needed by the system and what outputs will be produced. Three things to be done to
established feasibility. First, it must be checked that the project is technically feasible. Second,
operational feasibility must be established. For this, it is necessary to consult the system users to see if
the proposed solution satisfies user objectives and can be fitted in to current system operation. Third,
economic feasibility must be checked. The study must determine whether the project’s goal can be
achieved within the resource limits allocated to it. It must also determine whether it is worthwhile to
proceed with the project at all or whether the benefits obtained from the new system are not worth the
cost, in which case the project will be terminated.
Feasibility study is necessary to determine whether the proposed system is feasible considering
the technical, operational and economical factors. By having detailed feasibility study one can have a
clear view of the proposed system with respect to its benefits and draw backs.

System Feasibility
The feasibility study is carried out to determine whether the proposed system can be developed with
the available resources.

Technical Feasibility
Economical Feasibility
Behavioral Feasibility
Motivational Feasibility
Schedule Feasibility
Operational Feasibility

NIE,Mysure. Page 16
Secure and Efficient Information Retrieval 2018-19

4.3.1 Technicl Feasibility


Technical feasibility is the study of resource availability that may affect the ability to
achieve an acceptable system. Technical feasibility is the most difficult area to ensure at initial
stages. Since the objectives functions and performance cannot be predicted to its fullest, everything
seems possible provided proper assumptions are made. It is essential that the process of technical
feasibility. The consideration that is normally associated with technical feasibility included resource
availability at the organization where the project is to be developed and implemented.

4.3.2 Economical Feasibility


An evaluation of development cast weighted against the ultimate income or benefit derived from
the developed system. Economical economic justification includes a broad range of concerns that
include cost-benefit analysis. Cost benefit delineates costs for project development and weighs them
against tangible and intangible benefits of a system. Regarding the cost and benefits, the project,
which is to man-hours with compared to man that are required to record data about activity task report
manually and also in terms of money benefits by the selling of this system as a product. Thus this
project work is economically feasible for the development in any company.

4.3.3 Motivational Feasibility


An evaluation of the probability that the company is significantly motivated to support the
development and implementation of the application with necessary user participation, resources,
training etc. the participation and support by the organization during system study was encouraging
thus eliminating any resistance in this regard. So from behavioral aspect the new system is supposed
to have efficient from the company.

4.3.4 Schedule Feasibility


The time schedule required for the development of this project is very important since over-runs
result in escalated projects costs and also hinders in the development of the other systems.

4.3.5 Operational Feasibility


The project is going to be used by the organization under different circumstances. Anyone can
work with this application as it supports user-friendly approach. It provides graphical user interfaces
to the user, so that user can easily interact with the system. Users no need to have the knowledge
about ASP.Net, MSSQL concepts to use the application. The application is designed in such a way
that it can be easily implemented in any android version device or cell.

NIE,Mysure. Page 17
Secure and Efficient Information Retrieval 2018-19

CHAPTER 5
SYSTEM DESIGN
5.1 USE CASE DIAGRAM
Use case diagram is a graph of actors, a set of use cases enclosed by a system boundary,
communication associations between the actor and the use case.

The use case diagram describes how a system interacts with outside actors; each use case
represents a piece of functionality that a system provides to its users. A use case is known as an ellipse
containing the name of the use case and an actor is shown as a stick figure with the name of the actor below
the figure. The use cases are used during the analysis phase of a project to identify and partition system
functionality. They separate the system into actors and use case. Actors represent roles that are played by
user of the system. Those users can be humans, other computers, pieces of hardware, or even other software
systems.

The below figure 5.1.1 defines the use case diagram of user, where user can login to view the
products in the application which are categorized based on ranking and add up his comments on his
purchase.
The above figure 5.1.2 defines the use case diagram of admin, where admin has to login to add the
products and view the users, who had purchased the products. Admin manages all the products in respect of
adding, viewing, deleting.

NIE,Mysure. Page 18
Secure and Efficient Information Retrieval 2018-19

Fig 5.1.1 User Use Case:

Fig 5.1.2 Admin Use Case:

NIE,Mysure. Page 19
Secure and Efficient Information Retrieval 2018-19

5.2DATA FLOW DIAGRAM

5.3 LOW LEVEL DESIGN

5.4 ACTIVITY DIAGRAM


Activity diagrams represent the business and operational workflows of a system. An
Activity diagram is a dynamic diagram that shows the activity and the event that causes the
object to be in the particular state. It is a simple and intuitive illustration of what happens
in a workflow, what activities can be done in parallel, and whether there are alternative
paths through the workflow.

Basic Notations

Initial Activity
This shows the starting point or first activity of the flow. It is denoted by a solid circle.

Final Activity
The end of the Activity diagram is shown by a bull's eye symbol, also called as a final
activity.

Activity

Represented by a rectangle with rounded (almost oval) edges

Decisions
A logic where a decision is to be made is depicted by a diamond.

NIE,Mysure. Page 20
Secure and Efficient Information Retrieval 2018-19

Workflow
Workflow is depicted with an arrow. It shows the direction of the workflow in the activity diagram.

Fig 5.3.1 Admin Activity


The above figure 5.3.1 defines the activity diagram of admin, where to login from his local system and
the validation process is done. valid user he can manage the products, users and reviews.

NIE,Mysure. Page 21
Secure and Efficient Information Retrieval 2018-19

Fig 5.3.2 User Activity


The above figure 5.3.2 defines the sequence diagram of user, where user has to login from his local
system and the validation process is done. If he is a valid user he can search the products by placing the
queries and view the products based on the rating prediction.

NIE,Mysure. Page 22
Secure and Efficient Information Retrieval 2018-19

5.5 SEQUENCE DIAGRAM


A sequence diagram shows object interactions arranged in time sequence. It depicts the
objects and classes involved in the scenario and the sequence of messages exchanged between the
objects needed to carry out the functionality of the scenario. Sequence diagrams are sometimes
called event diagrams, event scenarios.
UML sequence diagrams are used to represent or model the flow of messages, events and actions
between the objects or components of a system. Time is represented in the vertical direction showing
the sequence of interactions of the header elements, which are displayed horizontally at the top of the
diagram Sequence Diagrams are used primarily to design, document and validate the architecture,
interfaces and logic of the system by describing the sequence of actions that need to be performed to
complete a task or scenario. UML sequence diagrams are useful design tools because they provide a
dynamic view of the system behavior.

Purpose
The sequence diagram is used primarily to show the interactions between objects in the sequential
order that those interactions occur. One of the primary uses of sequence diagrams is in the transition
from requirements expressed as use cases to the next and more formal level of refinement.

Fig 5.2.1 User Sequence

NIE,Mysure. Page 23
Secure and Efficient Information Retrieval 2018-19

The above figure 5.2.1 defines the sequence diagram of user, where user has to login from his local
system and the validation process is done by the server checking through the database, and he can search
the products by placing the queries and view the products based on the rating prediction.

Fig 5.2.2 Admin Sequence


The above figure 5.2.2 defines the sequence diagram of admin, where admin has to login from
his local system and the validation process is done by the server checking through the database, and
he can manage the products in the application along with the users.

5.6 SCHEMA DIAGRAM

NIE,Mysure. Page 24
Secure and Efficient Information Retrieval 2018-19

5.7 FLOWCHART

5.8 ALGORITHM

5.9 MATHEMATICAL MODEL

NIE,Mysure. Page 25

You might also like