5TH SEM(C.E.-A)
INTRODUCTION
MATRIMONIAL
5TH SEM(C.E.-A)
Introduction
MATRIMONIAL
5TH SEM(C.E.-A)
Since internet is a pivot for modern business, our project which is based on internet paves a path for modernization in trade.
Once the person would like to married. In our community there are lot of relative searching a partner and providing the bio-data to oppose person. If the biodata is suitable then the middle ware person is contacting to both the person. This is current scenario of gujarati community. This is called a matrimonial service.
Our Web site will be having the same physical concept but the major advantage of our website is you can contact of anybody from website profile.
MATRIMONIAL
5TH SEM(C.E.-A)
OBJECTIVE:It is a service base as well automated system. Where person can register them self and search suitable profile. After searching he/she can contact them. Our Thought behind this website is search suitable life parent your self
The main objective of Matrimonial Web Application is to provide Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true potential partner. Keeping our objective in mind, we have created a world renowned online matchmaking services that will touch the souls of millions of people all over the globe.
MATRIMONIAL
5TH SEM(C.E.-A)
What are the purposes of Matrimonial Web Application? The purposes of the Matrimonial Web Application are: The main purpose of this application is to facilitate matchmaking business by applying the information in the field. It helps the user by providing profiles of perspective bride or groom and other information regarding them online. User can get information regarding their dream life partner at his/her home at his/her convenience. This application also provides a search utility which helps those users who have a certain criteria of qualities in mind to make online matrimonial easier. Since internet is a pivot for modern business, our project which is based on internet paves a path for modernization in trade.
MATRIMONIAL
5TH SEM(C.E.-A)
PROJECT PROFILE
MATRIMONIAL
5TH SEM(C.E.-A)
Project Profile
:::-
Matrimonial Web Site Gujarati Community. Ms. Khushbu Unziya Ms. Devhuti Vyas Ms. Priyal Patel
:::::-
Microsoft Visual Studio-2008 Microsoft SQL Server Microsoft Windows XP Mr. Nital Patel C.E. Department, Excel Institute of diploma Studies, Kalol, 382721.
MATRIMONIAL
5TH SEM(C.E.-A)
MATRIMONIAL
5TH SEM(C.E.-A)
HARDWARE (Server): RAM PROCESSOR MONITOR KEYBOARD MOUSE HARD DISK PRINTER
:::::::-
1024MB Dual Core Server 1360*768 Resolutions (21 color LCD) TVS GOLD Logitech Minimum 10 GB Dot-matrix & laser printer
: Microsoft WINDOWS XP : Microsoft Visual Studio-2008 Microsoft SQL Server 2005 / 2008
MATRIMONIAL
5TH SEM(C.E.-A)
10
MATRIMONIAL
5TH SEM(C.E.-A)
Proposed System:
Current system is manual based while proposed system is internet based web application so any user can Microsoft SQL Server full database from anywhere. ASP.net is the web based application so that we can launch this project over the internet.
Project Platform:
(sometimes called machine instructions or machine language) and consists entirely of zeros and ones, each corresponding to electrical current flowing or not flowing through this or that part of the chip. When you are using a PC with an Intel or competing processor, this language is more specifically known as x86 machine instructions.
11
MATRIMONIAL
5TH SEM(C.E.-A)
If you wrote an application with Visual Basic 6, you had to compile it into a set of x86 machine instructions before you could deploy it. This machine code would then be installed and executed on any machine that supported x86 instructions and was also running Windows. If you write an application with Visual Basic 2005, you still have to compile the code. However, you do not compile the Visual Basic 2005 code directly into x86 machine instructions, because that would mean that the resulting program would run only on processors that support this languagein other words, the program would run only on Intel chips and their compatible competitors. Instead, compilation creates something called Microsoft Intermediate Language (MSIL). This language is not dependent on any processor. It is a layer above the traditional machine code. MSIL code will not just run on any processor, because processors do not understand MSIL. To run the code, it has to be further compiled, as shown in Figure 2-2, from MSIL code into the native code that the processor understands. However, this approach also provides the industry with a subtle problem. In a world where .NET is extremely popular (some might say dominant), who is responsible for developing an MSIL-to-native compiler when a new processor is released? Is the new processor at the mercy of Microsofts willingness to port .NET to the chip? Time, as they say, will tell! Take a look at the thing that makes .NET work: the Common Language Runtime.
12
MATRIMONIAL
5TH SEM(C.E.-A)
13
MATRIMONIAL
5TH SEM(C.E.-A)
Application Isolation
One important premise of modern operating systems like Windows and Linux is that applications are isolated from one another. This is critically important from both security and stability standpoints. Imagine that you have a badly written program and it crashes the PC. Should this happen? No, you want only the badly behaved program to crash, as you do not want other applications or the operating system itself to be affected by a program running on it. For example, if your e-mail program crashes, you do not want to lose any unsaved changes in your word processor. With proper application isolation, one application crashing should not cause others to crash. In some instances, even under Windows XP, a badly behaved program can do something so horrendous that the entire machine crashes. This is commonly known as a Blue Screen of Death, or BSOD, so called because your attractive Windows desktop is replaced with a stark blue screen with a smattering of white text explaining the problem. This problem should be alleviated in .NET, but it is unlikely to be completely solved.
The other aspect to application isolation is one of security. Imagine that you are writing a
personal and sensitive e-mail. You do not want other applications running on your computer to be able to grab, or even stumble across, the contents of the e-mail and pass it on to someone else. Applications running in
Security .NET has powerful support for the concept of code security. This was designed to give
system administrators, users, and software developers a fine level of control over what a program can and cannot do. Imagine that you have a program that scans your computers hard disk looking for Word documents. You might think this is a useful program if it is the one that you run yourself to find documents that are missing. Now imagine that this program is delivered through e-mail and it automatically runs and e-mails copies of any interesting documents to someone else. You are less likely to find that useful. This is the situation you find yourself in today with old-school Windows development. To all intents and purposes, Windows 14
MATRIMONIAL
5TH SEM(C.E.-A)
applications have unrestricted Microsoft SQL Server over your computer and can do pretty much anything they want. That is why the Melissa and I Love You-type viruses are possibleWindows does not understand the difference between a benign script file you write yourself that, say, looks through your address book and sends e-mails to everyone, and those written by someone else and delivered as viruses. With .NET this situation changes because of the security features built into the Common Language Run time. Under the CLR, code requires evidence to run. This evidence can be policies set by you and your system administrator, as well as the origin of the code (for example, whether it came off your local machine, off a machine on your office network, or over the Internet). Security is a very involved topic and is not covered in this book. However, you can find more information in . NET Security Programming (ISBN 0-471-22285-2), written by Donis Marshall and published by Wiley.
Interoperation
Interoperation in the .NET Framework is achieved on various levels not covered here. However, we must point out some of the types of interoperation that it provides. One kind of interoperation is at the core of the framework, where data types are shared by all managed languages. This is known as the Common Type System (CTS). This is a great improvement for language interoperability (see the section The Common Type System and Common Language Specification later in this chapter). The other type of interoperation is that of communicating with existing Component Object Model (COM) interfaces. Because a large application software base is written in COM, it was inevitable that .NET should be able to communicate with existing COM libraries. This is also known as COM interlope.
Exception Handling
Exception handling is the concept of dealing with exceptional happenings when you are running the code. Imagine that you have written a program that opens a file on disk. What if that file is not there?
15
MATRIMONIAL
5TH SEM(C.E.-A)
Well, the fact that the file is not there is exceptional, and you need to deal with it in some way. It could be that you crash, or you could display a window asking the user to supply a new filename. Either way ,you have a fine level of control over what happens when an error does occur.
.NET provides a powerful exception handler that can catch exceptions when they occur and give your programs the opportunity to react and deal with the problem in some way. Chapter 9 talks about exception handling in more detail, but for now, think of exception handling as something provided by the Common Language Runtime to all applications.
MATRIMONIAL
5TH SEM(C.E.-A)
window on the screen, you do not care whether it is on a Windows operating system or on a Mac. The .NET Framework is actually a set of classes called base classes. The base classes in the .NET Framework are rather extensive and provide the functionality for just about anything that you need to do in a Windows or Web environment, from working with files to working with data to working with forms and controls. The class library itself is vast, containing several thousand objects available to developers, although in your day-to-day development you will only need to understand a handful of these to create powerful applications. Another really nice thing about the base classes in the .NET Framework is that they are the same irrespective of the language used. So, if you are writing a Visual Basic 2005 application, you use the same object as you would from within a C# or J# application. That object will have the same methods, properties, and events, meaning that there is very little difference in capabilities between the languages, since they all rely on the framework.
Executing Code
The base class library is only half the equation. After you have written the code that interacts with the classes, you still need to run it. This poses a tricky problem; to remove the reliance on the platform is to remove the reliance on the processor. Whenever you write software for Windows, you are guaranteed that this code will run on an Intel x8chip. With .NET, Microsoft does not want to make this guarantee. It might be that the dominant chip in 2008 is a Transmute chip, or something you have never even seen. What needs to be done is to abstract.NET away from the processor, in a similar fashion to the way .NET is abstracted from the underlying subsystem implementations. Programming languages are somewhere in between the languages that people speak every day and the language that the computer itself understands. The language that a computer uses is the machine code.
17
MATRIMONIAL
5TH SEM(C.E.-A)
About Microsoft SQL Server: Microsoft SQL Server is a relational database server, developed by Microsoft: It is a software product whose primary function is to store and retrieve data as requested by other software applications, be it those on the same computer or those running on another computer across a network (including the Internet). There are at least a dozen different editions of Microsoft SQL Server aimed at different audiences and for different workloads (ranging from small applications that store and retrieve data on the same computer, to millions of users and computers that Microsoft SQL Server huge amounts of data from the Internet at the same time).
SECURITY:Microsoft uses several security features such as an encryption/ description, assigning users and group permissions using show and hide objects in database window.
PERFORMANCE:Microsoft SQL Server provides a monitor and tuning features that highlight critical areas in database performance and provides suggestions in improving it. The Full-text search functionality has been integrated with the database engine. According to a Microsoft technical article, this simplifies management and improves performance.
EXPLORING DATA:It helps exporting tables in various formats, can also load an output of table. T-SQL is a helpful for getting records from the tables. We have used Stored procedure to exploring data and outputting to the end users.
18
MATRIMONIAL
5TH SEM(C.E.-A)
MATRIMONIAL
5TH SEM(C.E.-A)
5. A common scheduling dialog that allows you to perform action of the management dialogs at a later time. 6. Exporting and importing SQL Server Management Studio server registration from one Management Studio environment to another. 7. Save or print XML Showplan or Deadlock files generated by SQL Server Profiler, review them later, or send them to administrators for analysis. 8. A new error and informational message box that presents much more information, allows you to send Microsoft a comment about the messages, allows you to copy messages to the clipboard, and allows you to easily e-mail the messages to your support team. 9. An integrated Web browser for quick browsing of MSDN or online help. 10. Integration of Help from online communities. 11. A tutorial on SQL Server Management Studio to help you take advantage of the many new features and become more productive right away. To take the tutorial, go to Tutorials. 12. A new activity monitor with filtering and automatic refresh. 13. Integrated Database Mail interfaces.
Built-In functions:
Microsoft SQL Server includes small programs known as function that perform simple calculation on data formatting. Microsoft SQL Server includes mathematical, financial, date, time and string functions. 20
MATRIMONIAL
5TH SEM(C.E.-A)
SYSTEM ANALYSIS
21
MATRIMONIAL
5TH SEM(C.E.-A)
MATRIMONIAL
5TH SEM(C.E.-A)
contact detail of his/her. Full profile view should be available in this system. Downloadable matrimonial should be available and each and every registered user should get credential detail so that they can login to the system. By signing the system they can search the desired profile and generate the request for contact information of selected profile.
All the above conditions must be satisfied to start the project. This is why in depth analysis of feasibility is carried out. There are five different ways feasibility can be tested
1. TECHNICAL FEASIBILITY
The large part of determining resources has to do with assessing Technical Feasibility. The analyst must find out whether current technical resources can be upgraded or added in a manner that fulfills the request under consideration. If exiting systems cannot be added on to, then the next question becomes whether there is technology in existence that meets the specifications. If new technology is required then, it needs to be checked the likely hold that, it can be develop. Thus technical Feasibility checks for following requirement satisfaction.
23
MATRIMONIAL
5TH SEM(C.E.-A)
Adequacy of available technology Adequacy of hardware Availability of computer Support facilities etc.
24
MATRIMONIAL
5TH SEM(C.E.-A)
The client will want assurance that the schedule for developing and installing the proposed system is realistic and reasonable in light of the business requirements. Business cycles should be taken into consideration Are the deadlines mandatory or desirable? Scope can change if time (Longer) Careful in mandatory (scope no change) Missed schedules are bad, inadequate systems are worse! Are the project deadlines reasonable? This applications each and Module is develop and submitted within its deadline, and time schedule is properly maintained.
25
MATRIMONIAL
5TH SEM(C.E.-A)
3. OPERATIONAL FEASIBILITY
Major the urgency of the problem or acceptability of the solution. a. Whether the system will operate, when installed b. Whether the system will be used
Suppose for a moment that technical and economical resources are both judged Adequate. The system analyst must still consider the operational Feasibility of the requested project. Operational Feasibility is depended on human resources available for the project and involves projecting whether the system will operate and be used once it is installed. If user are virtually wed to the present system, see no problem with it, and generally are not involved in requesting a new system then implementing the new system will not be strong. Chances for it ever becoming operational are low. Some aspects, which we considered in operational Feasibility, are as follow: What is the use of proposed application? What is the period within which information is required? What is the content of each database? What is the level of skill of each person and where can it be utilized in the proposed application?
26
MATRIMONIAL
5TH SEM(C.E.-A)
After the collection of all information, documents were prepared to list down the user requirements which helped to understand the application better and made the work convenient.
4. IMPLEMENTATION FEASIBILITY
Under the study of Implementation feasibility certain issue Need to study like Is it possible to install the software within the given environment? Will organization management and users support for the installation of the software? Will proposed system cause any harm to the operation of the organization?
Operationally, this application can be installed and it can work according to its functionalities. There would be very little barriers in implementation. The management has already approved this Application to be developed and it wont cause any harm to users operation or day-to-day activities.
5. ECONOMIC FEASIBILITY
Economic feasibility asks following question. Are there sufficient in creating the system to make the cost acceptable? Are the costs of not creating the system so great so that the project must be undertaken?
27
MATRIMONIAL
5TH SEM(C.E.-A)
To measure the cost effectiveness of the project or the solution is often called cost benefit analysis. Benefits are easier to determine at earlier stage. Costs are impossible to estimate before requirements and technical solutions have been identified. The basic resources to consider are: your time and that of the systems analysis team,
the cost of doing the full system study (including time of employees you will be working with), cost of the business employee time, estimated cost of hardware and estimated cost of software and /or software development. He concern business must be able to see the value of investment it is pondering before committing to entire system study..In our application no extra cost for the modification or addition of the software was required and the cost involved in designing and developing the system was beneficial for the organization. Thus project was found economically feasibility.
28
MATRIMONIAL
5TH SEM(C.E.-A)
PROCESS MODEL
29
MATRIMONIAL
5TH SEM(C.E.-A)
30
MATRIMONIAL
5TH SEM(C.E.-A)
31
MATRIMONIAL
5TH SEM(C.E.-A)
This model has the following activities. 1. System/Information Engineering and Modeling. 2. Software Requirements Analysis. 3. Systems Analysis and Design. 4. Code Generation. 5. Testing Automated and Manual Testing
MATRIMONIAL
5TH SEM(C.E.-A)
during this phase. Code Generation.The design must be translated into a machine-readable form. The code generation step performs this task. If design is performed in a detailed manner, code generation can be accomplished with out much complication.
Code Generation
The design must be translated into a machine-readable form. The code generation step performs this task. If design is performed in a detailed manner, code generation can be accomplished with out much complication.
Testing
Once the code is generated, the program testing begins. Different testing methodologies are available to unravel the bugs that were committed during the previous phases. Different testing tools and methodologies are already available. Some companies build their own testing tools that are tailor made for their own development operations.
Maintenance
Software will definitely undergo change once it is delivered to the customer. There are many reasons for the change. Change could happen because of some unexpected input values into the system. In addition, the changes in the system could directly affect the software operations. The software should be developed to accommodate changes that could happen during the post implementation period.
33
MATRIMONIAL
5TH SEM(C.E.-A)
SYSTEM DESIGN
34
MATRIMONIAL
5TH SEM(C.E.-A)
35
MATRIMONIAL
5TH SEM(C.E.-A)
MODELING
36
MATRIMONIAL
5TH SEM(C.E.-A)
Data-Flow Diagram
Data flow strategies shows the use of data in the system pictorially. The tools used in this strategy show all the essential features of the system and how they Fit together. A graphical tool used to describe and analyze the movement of the data through a system manual or automated including the processes, stores of Data and display in the system. The transformation of the data from the input to output, through processes, may be described logically and independently of the physical components associated with the System. Special symbols or icons and the annotations that associate them with our system are as understand: Data flow:-
Process:-
Source or destination:-
Data store:-
37
MATRIMONIAL
5TH SEM(C.E.-A)
0 Level Diagram
38
MATRIMONIAL
5TH SEM(C.E.-A)
39
MATRIMONIAL
5TH SEM(C.E.-A)
40
MATRIMONIAL
5TH SEM(C.E.-A)
Member id Member shiptype Domain Fname Lname Age Country City Cast
About myself
Mobileno
Address
Sta te1
or d1
Mother Country Resident occupation Horoscope code city Interest Description Phoneno Exsport
Area code
u Ed n1 tio ca
Do ma in1 Dr ink
Coun
Pa ss
C n1 dre hil Sp
ns ze ty Ci
Movie1 Movie2
p1 hi
S e Ag m fro
t2 por
3 Sport 4 Sport
Read1 Read2
Register
Movie3
e4 M ovi v Exmo ie
ht Heig from
Read3
Weight
Heig Re ht ad4
Sta r
Raasi Family value Family status Family type
ng La
2 es bi 1 2 3 es ob ge ge bi H ua ua ob H
ic 4
ng La
t igh He o t
us
Ho bb
3 ies
Intere st4 Exint erest Resid en status t 1 Mother tongue1 No of brother Ageto
Ho bb
h Ex
No of sister
ob s bie
4 ies
Income
Smoke
Eatinghabits
Occupation
Education
41
MATRIMONIAL
5TH SEM(C.E.-A)
Register
1 1 1
Female
Male
Msgto
Story
1 Story
Emsgtable
Id
Msg from
Msg
Has loan
Emailid
Memberid
Msgto
Pmsgtable
Loan
Msg from
Msg
Landlineno1
Landlineno2
42
MATRIMONIAL
5TH SEM(C.E.-A)
Add/Update Records
Sending Mail
Delete Records
1.0 Use case Name Admin 1.1 Basic Flow Admin starts this use case. It provides the capability for the admin to verify different procedures. He can perform various types of operations like edit, update, delete, sending the mail etc.
43
MATRIMONIAL
5TH SEM(C.E.-A)
2.0 Flow of Events 2.1 Basic Flow Admin perform the four main activity like store the information of the customer, sending the mail to the customer, searching for perfect matching etc. Customer Information:The admin maintain the information about the customer in the database whenever he/she fill up the form. Sending the mail:The admin will send the email to the customer according to its requirement for male/female. He will also send the mail if any new thing is introduce in our system. Add/Update/Delete records:The admin can add, update or delete the records in the database. 2.2 Alternate Flows 2.2.1 Invalid Password An invalid password is entered. The user can re-enter a password or terminate the use case. 2.2.2 Invalid Username: The system informs the user that the username is invalid. The user can re-enter the username or terminate the use case. 3.0 Special Requirements There are no special requirements for this use case.
44
MATRIMONIAL
5TH SEM(C.E.-A)
4.0 Preconditions There are no special requirements for this use case. 5.0 Post Conditions There are no post conditions. 6.0 Extension Points There are no extension points.
45
5TH SEM(C.E.-A)
Registration
Login
Edit Profile
Searching
1.0 Use case Name User. 1.1 Brief Description User can perform several operations on the system like registration, login. He or she can also edit his or her profile, searching facility is also there. 2.0 Flow of Events 2.1 Basic Flow User can perform mainly four activities. Registration:-
46
MATRIMONIAL
5TH SEM(C.E.-A)
Before using this system the user must have to register in the system. He have to fill up the form and enter his/her profile in the database. Login:The existing users are giving his/her userid & password to access their accounts. If they are successfully login then they can edit or update their accounts. Edit profile:The user can also edit his/her personal profile in the system but first he/she have to login in the system. 2.2 Alternate Flows 2.2.1 Invalid Password An invalid password is entered. The user can re-enter a password or terminate the use case. 2.2.2 Invalid Username: The system informs the user that the username is invalid. The user can reenter the username or terminate the use case. 3.0 Special Requirements The user must be first login to access his accounts. 4.0 Preconditions The user must be first login to access his accounts. 5.0 Post Conditions There are no post conditions. 6.0 Extension Points There are no extension points. 47
MATRIMONIAL
5TH SEM(C.E.-A)
48
MATRIMONIAL
5TH SEM(C.E.-A)
Our system will work as mentioned below. Any person can register to the system them self. He will get an email from our website He will needs to approve from email. After Approval, he/she needs to complete their profile. He/She can search profile by providing suitable criteria. He/She can select any profile and view full details of the oppose person. If He/She find good profile then he/she can contact him/her. Oppose person will get an email from contacted member of our website. If he will approve the request then he/she can view his/her contact detail and then both person can meet personally.
49
MATRIMONIAL
5TH SEM(C.E.-A)
Conclusion
Matrimonial Web Application is to provide Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true potential partner. Matrimonial website which will provide platform to a lot of Bride/Groom for finding perfect match. There are different sectors like Registration, Partner , Search, etc. So the Bride/Groom can get their interest for find their partner. Bride/Groom can directly search Partner according to their required criteria. The Bride/Groom can use match By Email functionality so he/she can get directly E-mail alert for the match which fulfill their required criteria. It helps the user by providing profiles of perspective Bride or Groom and other information regarding them online.
50
MATRIMONIAL
5TH SEM(C.E.-A)
Bibliography
Books ASP.NET(Black Book). Professional ASP.NET (Wrox Publication). C# Vijaymukhi. ASP.NET Complete Reference. Software engineering Concepts By Roger S. Presman UML IN A NUTSHELL By Alhir Fundamentals of Software Engineering By Rajib Mall SQL Server 2008 (Wrox Publication).
Web Sites
www.bharatmatrimonial.com www.shadi.com www.jeevansathi.com www.patelvivah.com www.simplymary.com www.google.com (Search for Image and content)
51