Final Document of e Commerce
Final Document of e Commerce
LIST OF FIGURES
LISTOF TABLES
LIST OF ABBREVIATION
ABSTRACT
CHAPTER-1- INTRODUCTION
1.1 BackGround…………………………………………………………1
1.2 Problem Statement………………………………………………….1
1.3 Purpose Of This Document…………………………………………1
1.4 Scope Of The Development Project………………………………..2
1.5 Existing System……………………………………………………...2
1.6 Proposed System…………………………………………………….3
CHAPTER-8- REFERENCES
8.1 References………………………………………………………54
LIST OF FIGURES
1. Literature Survey 15
ACRONYM EXPANSION
We consider the problem of building online machine-learned models for detecting auction
frauds in e-commence web sites. Since the emergence of the World Wide Web, online shopping
and online auction have gained more and more popularity. While people are enjoying the benefits
from online trading, criminals are also taking advantages to conduct fraudulent activities against
honest parties to obtain illegal profit. Hence proactive fraud-detection moderation systems are
commonly applied in practice to detect and prevent such illegal and fraud activities. Machine-
learned models, especially those that are learned online, are able to catch frauds more efficiently
and quickly than human-tuned rule-based systems. In this paper, we propose an online probit
model framework which takes online feature selection, coefficient bounds from human knowledge
and multiple instances learning into account simultaneously. By empirical experiments on a real-
world online auction fraud detection data we show that this model can potentially detect more
frauds and significantly reduce customer complaints compared to several baseline models and the
human-tuned rule-based system.
CHAPTER 1
INTRODUCTION
1.1 BACKGROUND
The continuous growth in the size and use of the World Wide Web imposes new methods
of design and development of online information services. Most Web structures are becoming
complicated and users often miss the goal of their inquiry, or receive ambiguous results when they
try to navigate through them which lead a user to untrusted websites, products and links. On the
other hand, the E-business sector is rapidly evolving and the needs for web market places that
anticipate the needs of the customers and the trust towards a product are equally more evident than
ever. While people are enjoying the benefits from online trading, criminals are also taking
advantages to conduct fraudulent activities against honest parties to obtain illegal profits.
Therefore the requirement for predicting user needs and trust providence towards a product in
order to improve the usability and user retention of a website can be addressed by personalizing
and using a fraud product detection system.
The application for storage of data has been planned to use the SQL and all the user
interfaces has been designed using the ASP.NET Technologies. The application takes care of
different modules and their associated functionalities as per the applicable strategies.
1
• Most importantly, keep the process simple. Stay focused on the business goals, tackle
manageable projects, measure the success or failure of your changes, and learn from your
mistakes.
• Improves the productivity by simplifying access to information
• More likely to increase sales of trusty companies
The traditional online shopping business model allows sellers to sell a product or
service at a preset price, where buyers can choose to purchase if they find it to be a good deal.
Online auction however is a different business model by which items are sold through price
bidding. There is often a starting price and expiration time specified by the sellers. Once the
auction starts, potential buyers bid against each other, and the winner gets the item with their
highest winning bid.
2
1.6 PROPOSED SYSTEM
We propose an online profit model framework which takes online feature selection, coefficient
bounds from human knowledge and multiple instances learning into account simultaneously. By
empirical experiments on a real-world online auction fraud detection data we show that this model
can potentially detect more frauds and significantly reduce customer complaints compared to
several baseline models and the human-tuned rule-based system. Human experts with years of
experience created many rules to detect whether a user is fraud or not. If the fraud score is above
a certain threshold, the case will enter a queue for further investigation by human experts. Once it
is reviewed, the final result will be label as Boolean, i.e, fraud or clean. Cases with higher scores
have higher priorities in the queue to be reviewed. The cases whose frauds Score are below the
threshold are determined as clean by the system without any human judgment.
3
CHAPTER 2
OVERVIEW AND PLANNING
2.2 CHALLENGES
Fraud product detection allows a user or a customer to know about the product
trustworthiness through the other user’s feedback for that product. Fraud detection and web
personalization are the key technologies needed in various e-business applications to,
2.3 ASSUMPTIONS
Product it was once acceptable for companies to sell their products to very defined and
localized markets within certain logical timeframes, the advent of online shopping has completely
redefined the way companies now market themselves in order to establish a market presence.
However, the introduction of this dynamic medium of conducting business has brought with it its
4
own complex set of problems. Fraud product detection allows a user or a customer to know about
the product trustworthiness through the other user’s feedback for that product.
5
2.7 SOFTWARE SPECIFICATION
Microsoft Visual Studio dot Net is used as front end tool. The reason for selecting Visual
Studio dot Net as front end tool is as follows.
6
through the help menu. For example, to get help on any keyword in the Visual Basic
language, place the insertion point on that keyword in the code window and press F1.
• Visual Studio interprets our code as we enter it, catching and highlighting most syntax
or spelling errors on the fly. It’s almost like having an expert watching over our
shoulder as we enter our code.
2.7.3 FEATURES OF. NET
Microsoft .NET is a set of Microsoft software technologies for rapidly building and
integrating XML Web services, Microsoft Windows-based applications, and Web solutions.
The .NET Framework is a language-neutral platform for writing programs that can easily and
securely interoperate. There’s no language barrier with .NET, there are numerous languages
available to the developer including Managed C++, C#, Visual Basic and Java Script. The
.NET framework provides the foundation for components to interact seamlessly, whether
locally or remotely on different platforms. It standardizes common data types and
communications protocols so that components created in different languages can easily
interoperate.
“.NET” is also the collective name given to various software components built upon
the .NET platform. These will be both products (Visual Studio.NET and Windows.NET
Server, for instance) and services (like Passport, .NET My Services, and so on.
The CLR is described as the “execution engine” of .NET. It provides the environment
within which programs run. The most important features are
Conversion from a low-level assembler-style language, called
Intermediate Language (IL), into code native to the platform being
executed on.
Memory management, notably including garbage collection.
7
Checking and enforcing security restrictions on the running code.
Loading and executing programs, with version control and other such
features.
The following features of the .NET framework are also worth description.
2.7.5 MANAGED CODE
The code that targets .NET, and which contains certain extra Information “metadata”
to describe itself. While both managed and unmanaged code can run in the runtime, only
managed code contains the information that allows the CLR to guarantee, for instance, safe
execution and interoperability.
With Managed Code comes Managed Data. CLR provides memory allocation and
Deal location facilities, and garbage collection. Some .NET languages use Managed Data by
default, such as C#, Visual Basic.NET and JScript.NET, whereas others, namely C++, do not.
Targeting CLR can depending on the language using, impose certain constraints on the
features available.
As with managed and unmanaged code, one can have both managed and unmanaged
data in .NET applications, data that doesn’t get garbage collected but instead is looked after
by unmanaged code.
The CLR uses something called the Common Type System (CTS) to strictly enforce
type-safety. This ensures that all classes are compatible with each other, by describing types
in a common way. CTS define how types work within the runtime, which enables types in one
language to interoperate with types in another language, including cross-language exception
handling. As well as ensuring that types are only used in appropriate ways.
8
2.7.8 COMMON LANGUAGE SPECIFICATION
The CLR provides built-in support for language interoperability. To ensure that you
can develop managed code that can be fully used by developers using any programming
language, a set of language features and rules for using them called the Common Language
Specification (CLS) has been defined. Components that follow these rules and expose only
CLS features are considered CLS-compliant.
.NET provides a single-rooted hierarchy of classes, containing over 7000 types. The
root of the namespace is called System; this contains basic types like Byte, Double, Boolean,
and String, as well as Object. All objects derive from System. Object. As well as objects, there
are value types. Value types can be allocated on the stack, which can provide useful flexibility.
There are also efficient means of converting value types to object types if and when necessary.
The set of classes is pretty comprehensive, providing collections, file, screen, and
network I/O, threading, and so on, as well as XML and database connectivity.
The class library is subdivided into a number of sets (or namespaces), each providing
distinct areas of functionality, with dependencies between the namespaces kept to a minimum.
The multi-language capability of the .NET Framework and Visual Studio .NET
enables developers to use their existing programming skills to build all types of applications
and XML Web services. The .NET framework supports new versions of Microsoft’s old
favorites Visual Basic and C++ (as VB.NET and Managed C++), but there are also a number
of new additions to the family.
Visual Basic .NET has been updated to include many new and improved language
features that make it a powerful object-oriented programming language. These features
include inheritance, interfaces, and overloading, among others. Visual Basic also now
supports structured exception handling, custom attributes and also supports multi-threading.
9
Visual Basic .NET is also CLS compliant, which means that any CLS-compliant
language can use the classes, objects, and components you create in Visual Basic .NET.
Managed Extensions for C++ and attributed programming are just some of the
enhancements made to the C++ language. Managed Extensions simplify the task of migrating
existing C++ applications to the new .NET Framework.
VB is Microsoft’s new language. It’s a C-style language that is essentially “C++ for
Rapid Application Development”. Unlike other languages, its specification is just the
grammar of the language. It has no standard library of its own, and instead has been designed
with the intention of using the .NET libraries as its own.
Microsoft Visual J# .NET provides the easiest transition for Java-language developers
into the world of XML Web Services and dramatically improves the interoperability of Java-
language programs with existing software written in a variety of other programming
languages.
Active State has created Visual Perl and Visual Python, which enable .NET-aware
applications to be built in either Perl or Python. Both products can be integrated into the Visual
Studio .NET environment. Visual Perl includes support for Active State’s Perl Dev Kit.
2. Supports fully managed, but also a hyrid mix of managed and native through P/Invoke
and Managed/Unmaged C++, which means that its easier to write code that doesn't have
lots of memory leaks
3. WPF and WCF are the new way of buildign UI's and Communicating between processes
and systems
10
6. Many languages available, both dynamic (IronPython and IronRuby) and static (C#,
VB.NET, C++), both object oriented (C#, VB.NET, C++) and functional (F#)
• Multi platform support isn't available from MS and isn't available straight after installing
Visual Studio
Microsoft SQL SERVER 2005 is used as back end tool. The reason for selecting SQL
SERVER 2000 as a back end tool is as follows:
The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server
2005 Analysis Services. The term OLAP Services has been replaced with the term Analysis
Services. Analysis Services also includes a new data mining component. The Repository
component available in SQL Server version 7.0 is now called Microsoft SQL Server 2000 Meta
Data Services. References to the component now use the term Meta Data Services. The term
repository is used only in reference to the repository engine within Meta Data Services.
2.7.15 SQL-SERVER
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
11
1) TABLE:
A database is a collection of data about a specific topic. We can View a table in two
ways,
a) Design View
b) Datasheet View
a) Design View
To build or modify the structure of a table, we work in the table design view. We
can specify what kind of datas will be holded.
b) Datasheet View
To add, edit or analyses the data itself, we work in tables datasheet view mode.
2) QUERY:
A query is a question that has to be asked to get the required data. Access gathers
data that answers the question from one or more table. The data that make up the answer is either
dynaset (if you edit it) or a snapshot (it cannot be edited).Each time we run a query, we get latest
information in the dynaset. Access either displays the dynaset or snapshot for us to view or perform
an action on it, such as deleting or updating.
3) FORMS:
A form is used to view and edit information in the database record. A form displays only
the information, we want to see in the way we want to see it. Forms use the familiar controls
such as textboxes and checkboxes. This makes viewing and entering data easy.
We can work with forms in several views. Primarily there are two views,
They are,
a) Design View
b) Form View
a) Design View
To build or modify the structure of a form, we work in form’s design view. We can add control
to the form that are bound to fields in a table or query, includes textboxes, option buttons, graphs
and pictures.
12
4) REPORT:
A report is used to view and print the information from the database. The report
can ground records into many levels and compute totals and average by checking values
from many records at once. Also the report is attractive and distinctive because we have
control over the size and appearance of it.
5) MACRO:
A macro is a set of actions. Each action in a macro does something, such as opening a
form or printing a report .We write macros to automate the common tasks that work easily
and save the time.
13
2.9 WORK BREAKDOWN STRUCTURE
Off-line
Website infrastructure
Product’s
image ready Web server
Hardware
Installed Installed
Internal capacity
on maintenance of
web server
14
CHAPTER 3
Disadvantage Year of
Title Description
Publish
1. Bart:Bayesian 1. BART is a nonparametric • The method does not
Additive Regression Bayesian regression approach provide a principled 2010
which uses dimensionally
Trees adaptive random basis assessment of
elements. uncertainty about the
2. BART can be viewed as a prediction
Bayesian nonparametric • It has strong feature
approach that fits a parameter independence
rich model using a strongly assumptions.
influential prior distribution.
15
3. Experimental results indicate rather one which is
that the proposed MIL method convenient
is more accurate than previous
MIL algorithms and selects a
much smaller set of useful
features.
16
4. A Machine- 1. Online auction and shopping • Most online auction
Learned Proactive are gaining popularity with the houses agree to 2011
Moderation System growth of web-based passive approaches to
for Auction Fraud eCommerce. the coordination of
Detection reputation systems
2. Proactive moderation
and management
systems are deployed to detect
policies that could
suspicious events for further
address fraudulent
inspection by human experts.
schemes.
3. In both offline evaluations
and online bucket tests, the
proposed system significantly
outperforms the rule-based
system on various metrics,
including area under ROC
(AUC), loss rate of labeled
frauds and customer
complaints.
17
CHAPTER 4
SYSTEM DESIGN
1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be used
to represent a system in terms of input data to the system, various processing carried out
on this data, and the output data is generated by this system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to
model the system components. These components are the system process, the data used by
the process, an external entity that interacts with the system and the information flows in
the system.
3. DFD shows how the information moves through the system and how it is modified by a
series of transformations. It is a graphical technique that depicts information flow and the
transformations that are applied as data moves from input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system at any level
of abstraction. DFD may be partitioned into levels that represent increasing information
flow and functional detail.
18
LEVEL 0
Admin
Yes No
Che
ck
Unauthorized
View new
user
seller
Allow new
sellers
View Products
View
complaints
Set untrusted
19
LEVEL 1
Seller
Yes No
Che
ck
Unauthorized
Launch
user
products
View Products
Offers for
products
End Process
20
LEVE1 2
User
Yes No
Chec
k
Unauthorized
View offer
user
Purchase
products
Send
Complaints
End Process
21
4.2 LOW-LEVEL DESIGN
22
Fig 4.4 Class Diagram
23
Fig 4.5 Use case Diagram
1 : upload products()
2 : upload offers()
3 : view products()
4 : view compalints()
7 : purchase products()
8 : send complaint()
25
Fig 4.7 Activity Diagram
26
Start
User login
Registered
Browse do:/examine
all items
Select
NotWantItem
Item checked Item Review /getNewItem
(not all checked)
/ Get Next Item
Want item
Bid
Accepted
Not Accepted Payment
Do:/send payment
Item
Item Received
27
Fig 4.9 ER Diagram
28
• Program should be simple, clear and easy to understand.
• Naming conventions
• Value conventions
• Script and comment procedure
• Message box format
• Exception and error handling
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the functionality
of components, sub assemblies, assemblies and/or a finished product. It is the process of exercising
software with the intent of ensuring that the Software system meets its requirements and user
29
expectations and does not fail in an unacceptable manner. There are various types of test. Each test
type addresses a specific testing requirement.
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation and user manuals.
Business process flows; data fields, predefined processes, and successive processes must
be considered for testing. Before functional testing is complete, additional tests are identified and
the effective value of current tests is determined.
System testing ensures that the entire integrated software system meets requirements. It tests
a configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions and
flows, emphasizing pre-driven process links and integration points.
30
4.5.4 WHITE BOX TESTING
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests, must
be written from a definitive source document, such as specification or requirements document,
such as specification or requirements document. It is a testing in which the software under test is
treated, as a black box .you cannot “see” into it. The test provides inputs and responds to outputs
without considering how the software works.
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program input produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
31
configuration. Unit tests ensure that each unique path of a business process performs accurately to
the documented specifications and contains clearly defined inputs and expected results.
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as two
distinct phases.
Field testing will be performed manually and functional tests will be written in detail.
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.
32
4.5.11 TEST RESULTS:
All the test cases mentioned above passed successfully. No defects encountered.
TESTING
Expected
S.No Procedure Test Condition Test Data Data
Result on
3.click login 3.Authentication Fail / Pass database
button verification verification
33
INTEGRATION TESTING
Expected
S.No Procedure Test Test Data Data
Condition
SYSTEM IMPLEMENTATION
Frmadmin.Aspx
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Diagnostics;
{
protected void Page_Load(object sender, EventArgs e)
{
}
35
Process p = new Process();
p.Start();
Categorylist.Aspx
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.IO;
using ShoppingCart.BL;
36
if (!IsPostBack)
BindList();
panelCategoryTop.Visible = true;
panelNewCategory.Visible = false;
DataSet ds = ProductController.getALLCategories();
lblMsg.Text = "";
if (ds.Tables[0].Rows.Count > 0)
dlCategory.DataSource = ds;
dlCategory.DataBind();
else
37
lblNewCAtegoryHeader.Text = "Add New Category";
panelCategoryTop.Visible = false;
panelNewCategory.Visible = true;
IbtnCatSubmit.AlternateText = "Submit";
txtCategoryName.Text = "";
txtCatDescriptrion.Text = "";
// imgCatLogo.Visible = false;
//lblImage.Visible = false;
if (txtCategoryName.Text.Trim().Length > 0)
catname = txtCategoryName.Text.Trim();
else
description = txtCatDescriptrion.Text.Trim();
fileCat.SaveAs(Server.MapPath(imageurl));
image=fileCat.FileName;
38
else
{
if (imgCatLogo.ImageUrl != null)
{
image = Path.GetFileName(imgCatLogo.ImageUrl);
}
else
image = "na.jpg";
}
if (IbtnCatSubmit.AlternateText == "Submit")
{
ProductController.InsertCategory(catname, description, image);
}
else
{
int catid = int.Parse(lblCatID.Text);
ProductController.UpdateCategory(catid,catname, description, image);
}
BindList();
panelCategoryTop.Visible = true;
panelNewCategory.Visible = false;
}
protected void dlCategory_ItemCommand(object source, DataListCommandEventArgs e)
{
if (e.CommandName == "Edit")
{
lblNewCAtegoryHeader.Text = "Update Category";
DataSet ds =
ProductController.GetAllCategoriesBYCategoryID(int.Parse(e.CommandArgument.ToString()))
;
if (ds.Tables[0].Rows.Count > 0)
39
{
lblCatID.Text = e.CommandArgument.ToString();
txtCategoryName.Text = ds.Tables[0].Rows[0]["Name"].ToString();
txtCatDescriptrion.Text = ds.Tables[0].Rows[0]["Description"].ToString();
imgCatLogo.ImageUrl = String.Format("~/Browse/Images/{0}",
ds.Tables[0].Rows[0]["Image"].ToString());
IbtnCatSubmit.AlternateText = "Update";
panelCategoryTop.Visible = false;
panelNewCategory.Visible = true;
}
}
if (e.CommandName == "Delete")
{
lblCatID.Text = e.CommandArgument.ToString();
int catid = int.Parse(lblCatID.Text);
//Response.Write(catid);
ProductController.DeleteCategory(catid);
BindList();
40
}
Userlist.aspx
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.IO;
using ShoppingCart.BL;
41
lblMsg.Text = "";
if (ds.Tables[0].Rows.Count > 0)
{
dlBrand.DataSource = ds;
dlBrand.DataBind();
}
else
{
lblMsg.Text = "No such Item !!! Please add one";
}
country();
state();
city();
}
protected void ddlcountry_SelectedIndexChanged(object sender, EventArgs e)
{
DataSet dsState =
ProductController.getAllStatesByCountryID(int.Parse(ddlcountry.SelectedValue));
BindDDL(ddlstate, dsState, "Name", "ID");
DataSet dscity = ProductController.getCitydetailsByStateID(int.Parse(ddlstate.SelectedValue));
BindDDL(ddlcity, dscity, "Name", "ID");
}
protected void ddlstate_SelectedIndexChanged(object sender, EventArgs e)
{
DataSet dscity = ProductController.getCitydetailsByStateID(int.Parse(ddlstate.SelectedValue));
BindDDL(ddlcity, dscity, "Name", "ID");
}
private void state()
{
DataSet dsState = ProductController.getAllStatedetails();
BindDDL(ddlstate, dsState, "Name", "ID");
42
}
private void country()
{
DataSet dsCountry = ProductController.getCountrydetails();
BindDDL(ddlcountry, dsCountry, "Name", "ID");
}
private void BindDDL(DropDownList ddl, DataSet ds, string txtField, string valField)
{
ddl.DataSource = ds;
ddl.DataTextField = txtField;
ddl.DataValueField = valField;
ddl.DataBind();
}
private void city()
{
DataSet dscity = ProductController.getCitydetails();
BindDDL(ddlcity, dscity, "Name", "ID");
}
protected void IbtnBrandSubmit_Click(object sender, ImageClickEventArgs e)
{
string BrandName = "", Description = "", imageurl = "", Logo = "";
int AddressID = Convert.ToInt32(lblAddressID.Text.Trim());
int UserID = Convert.ToInt32(lblUserID.Text.Trim());
UserController.UpdateUserDetails(txtuser.Text, txtfname.Text, txtlname.Text,
GMDatePicker1.Date, txtcontact.Text, rdSex.SelectedValue, txtmail.Text, txtaddr.Text,
int.Parse(ddlcountry.SelectedValue), int.Parse(ddlstate.SelectedValue),
int.Parse(ddlcity.SelectedValue), txtZipCode.Text, AddressID, UserID);
lblres.Text = "Done!!!";
BindList();
panelTop.Visible = true;
panelupdate.Visible = false;
43
}
protected void dlBrand_ItemCommand(object source, DataListCommandEventArgs e)
{
ListItem li = null;
if (e.CommandName == "Edit")
{
DataSet ds = UserController.GetUserBYUserID(int.Parse(e.CommandArgument.ToString()));
if (ds.Tables[0].Rows.Count > 0)
{
lblUserID.Text = e.CommandArgument.ToString();
lblAddressID.Text = ds.Tables[0].Rows[0]["AddressId"].ToString();
txtuser.Text = ds.Tables[0].Rows[0]["UserName"].ToString();
txtaddr.Text = ds.Tables[0].Rows[0]["Address"].ToString();
txtcontact.Text = ds.Tables[0].Rows[0]["ContactNo"].ToString();
txtfname.Text = ds.Tables[0].Rows[0]["FirstName"].ToString();
txtlname.Text = ds.Tables[0].Rows[0]["LastName"].ToString();
txtmail.Text = ds.Tables[0].Rows[0]["EmailID"].ToString();
txtZipCode.Text = ds.Tables[0].Rows[0]["ZipCode"].ToString();
li = ddlcity.Items.FindByText(ds.Tables[0].Rows[0]["CityName"].ToString());
if(li!=null)
{
ddlcity.ClearSelection();
li.Selected = true;
}
li = ddlcountry.Items.FindByText(ds.Tables[0].Rows[0]["CountryName"].ToString());
if (li != null)
{
ddlcountry.ClearSelection();
li.Selected = true;
}
li = ddlstate.Items.FindByText(ds.Tables[0].Rows[0]["StateName"].ToString());
44
if (li != null)
{
ddlstate.ClearSelection();
li.Selected = true;
}
li = rdSex.Items.FindByText(ds.Tables[0].Rows[0]["Gender"].ToString());
if (li != null)
{
rdSex.ClearSelection();
li.Selected = true;
}
GMDatePicker1.Date = Convert.ToDateTime(ds.Tables[0].Rows[0]["DOB"].ToString());
panelTop.Visible = false;
panelupdate.Visible = true;
}
}
if (e.CommandName == "Delete")
{
lblUserID.Text = e.CommandArgument.ToString();
int UserId = int.Parse(lblUserID.Text);
UserController.DeleteUserByUserID(UserId);
BindList();
}
}
protected void IBtnBrandCancel_Click(object sender, ImageClickEventArgs e)
{
panelupdate.Visible = false;
panelTop.Visible = true;
45
CHAPTER 6
RESULTS AND DISCUSSION
6.1 OUTPUT/RESULTS
6.1.1 CUSTOMER SIGN IN
46
6.1.3 ADD TO CARD
47
6.1.5 PAYMENT OPTION
48
6.1.7 ADMIN PROCESS
49
6.1.9 CATEGORY LIST
50
6.1.11 PRODUCT LIST
51
CHAPTER 7
7.1 CONCLUSION
Since the emergence of the World Wide Web (WWW), electronic commerce, commonly
known as e-commerce, has become more and more popular, websites benefits everyone in terms
of convenience and profitability. The traditional online shopping business model allows sellers to
sell a product or service at a preset price, where buyers can choose to purchase find it to be a good
deal but we build online model for fraud product detection while concentrating on customer needs.
In this proposed system we provide the responsibility of selling the trustful products by the website
itself managed by the admin. So when a customer wishes to buy a product he will get an idea about
the product to how much extent he can believe in that product. If he has faced any problem he can
make others aware of that product by complaining about the product. This model though it cannot
be the ideal way of detecting frauds but it can do the maximum extent in detecting the sellers
selling the fraud products.
The true online shopping is that which discovers each customer’s known interests and
needs on an individual level and gives a much more powerful platform from which to optimize
content and offers, a vital key to long-term brand engagement and loyalty.
52
7.2 FUTURE WORK
Regarding to future work, one direction is to include the adjustment of the selection bias
in the online model training process. It has been proven to be very effective for offline models.
The main idea there is to assume all the unlabeled samples have response equal to 0 with a very
small weight. Since the unlabeled samples are obtained from an effective moderation system, it is
reasonable to assume that with high probabilities they are non-fraud.
This can be easily extended to too many other applications, such as web spam detection,
content optimization and so forth websites that delivers highly personalized and trusted
experiences top the traffic and revenue rankings across the globe.
Web spam has been an important problem affecting both the consumers and web service
providers since the invention of World Wide Web. So we can attempt to build a spam detection
system for classification of websites as spam or non-spam. Here we try to explore if the spam web-
sites follow certain pattern in terms of the links they are out linked/in linked to or in terms of
contents of such websites. For this, we use various features based on the link graph or the contents
of only the host pages. The benefit of host based labelling instead of individual page based
labelling is that we can cover a larger number of websites to build the model. We define spam city
as the probability with which a page can be classified as spam (0 for non-spam page and 1 for
spam page).
53
CHAPTER 8
REFERENCES
8.1 REFERENCES
1. By Hugh A. Chipman, Edward I. George and Robert E. McCulloch” Bart: Bayesian
Additive Regression Trees” 2010
2. Liang Zhang Jie Yang Belle Tseng, “Online Modeling of Proactive Moderation System for
Auction Fraud Detection” April 16–20, 2012.
3. Wei Chu, Wei Chu, Lihong Li, “Unbiased Online Active Learning in Data Streams” 2011.
4. Liang Zhang, Jie Yang, “A Machine-Learned Proactive Moderation System for Auction
Fraud Detection” Apr 16, 2012.
5. H. Chipman, E. George, and R. McCulloch. Bart: Bayesian additive regression trees. The
Annals of Applied Statistics, 4(1):266–298, 2010.
6. W. Chu, M. Zinkevich, L. Li, A. Thomas, and B. Tseng. Unbiased online active learning
in data streams. In Proceedings of the 17th ACM SIGKDD international conference on
Knowledge discovery and data mining, pages 195–203. ACM, 2011.
7. C. Chua and J. Wareham. Fighting internet auction fraud: An assessment and proposal.
Computer, 37(10):31–37, 2004.
8. R. Collins, Y. Liu, and M. Leordeanu. Online selection of discriminative tracking features.
IEEE Transactions on Pattern Analysis and Machine Intelligence, pages 1631–1643, 2005.
9. N. Cristianini and J. Shawe-Taylor. An introduction to support Vector Machines: and other
kernel-based learning methods. Cambridge university press, 2006.
54
55