Vimala
Vimala
searching is part of our life to all generation. This project aims towards
various search queries and the pages visited by the user. The pages
visited by the user are indexed using personalized weights based on the
factors that affect personalization like, user actions, page-view time and
page hits. The search matrix over a period of time increases in its
the original search matrix. The reduced search matrix is then clustered
1
CHAPTER – I
INTRODUCTION
tracked.
as number of users per month or the mostly followed hyperlink, and thus
log analysis have been studied previously, in digital libraries, web search
2
The common belief seems to be that users prefer searching to
browsing. Our usability studies show that more than half of all users are
straight for the search button when they enter a website: they are not
interested in looking around the site; they are task-focused and want to
dominant users prefer to follow the links around a site: even when they
following promising links from the home page. Only when they get
hopelessly lost will link-dominant users admit defeat and use a search
a number of issues that might have not yet been recognized. One such
issue is, for example, the role of the web page layout in “favouring”
strategies and implications for design of web search engines. The study
to users. Even within the CUBB project, an initial belief about potential
3
After the browsing interface had been built, it showed that browsing was
much favoured.
The overall purpose of the project is to gain insights into real users
the CUBB service which offers a large LSI,PSO browsing structure. The
typical entry points, referring sites, points of failure and exit points.
Because of the high cost of full usability lab studies, we also wanted to
and working hypotheses as the basis for good usage and usability
BACKGROUND
CUBB service
experts select quality resources for their users, usually within the
provide a high quality and valued service, but encounters problems with
4
the ever increasing number of resources available on the Internet. CUBB
quality controlled web resources, not the actual resources. There are
two ways to search the service, either through a simple search box that
started from, normally one level above and two levels below in the
The feature “Search entry into the browsing pages” offers a short-cut to
5
CHAPTER – II
important a page is on the web. Goggle figures that when one page links
to another page, it is effectively casting a vote for the other page. The
more votes that are cast for a page, the more important the page must
be.
To calculate the Page Rank for a page, all of its outbound links are
taken into account. And also to calculate number of pages that matches
External site A, B,C,D these are the outgoing links to the page links
= (1-0.85) + 0.85(1+2+0.6)
6
= (1-0.85) + 0.85(3.6)
= (1-0.85) + 0.51
= 0.15 + 0.51
= 0.66.
OPERATION
page with query string parameters for the method to call and the
parameter order.
SOAP
this is the proper way to call a Web Service in .Net and it's also
Browser Creation
how many rooms it has, for example. Room type controls the
7
data notes. A form can contain fields for containing data and employ
scripts to process and compute data. A page is the basic vehicle for
browser to server.
widen the evidence used for relevance feedback from simply the
searching and show that this information can lead to more successful
1. Domain expertise
2. Search experience
8
3. Cognitive style
4. Goal type
5. Mode of seeking
6. Situational idiosyncrasies
The local page is calculated using the web using some search
links. In this local page we can search the ordinary searches and words.
Here the repeated words and simple definitions are calculated. Then
using this local page we can search the web in word calculation process
also. Here we can browse some links on the web. Also some local
browser history can be find out. We know which user use which browser.
gain quality one way links and get a high performance. Once we stop
page (SERP), it gets more exposure and lots of targeted traffic for free.
9
by getting backward links or simply back links. The higher the quality
and relevancy of those inward links, the better it is for higher ranking in
search engines
CHAPTER – III
HARDWARE REQUIREMENT
RAM : 1GB
SOFTWARE REQUIREMENTS:
10
Back End : SQL Server 2000
CHAPTER – IV
SYSTEM STUDY
EXISTING SYTEM
The semantics of the user query and also the intention of the user,
the conceptual link between the search query and the relevant
users.
PROPOSED SYSTEM
11
is represented by search matrix. The proposed system also focuses
effectively search for relevant pages from the Search matrix, Latent
Search Existing
User searchInterface Search
Engine WWW
Query
Page Track
Recommen user’s
dation search
behavior
Search
Preprocessing Matrix
construction
Dimensionality
reduction (LSI) Phase I
12
Semantically
related user Phase II
search
User data
Search matrix
Preprocessing
Clustering (PSO)
TF * IDF
13
Proposed work for phase I
PHASE I
14
Proposed work foe phase II:
PHASE II
15
DATABASE DESIGN
16
TABLE NAME: BOOK MASTER:
DEFINED
17
DATE & TIME DATE NO PRIMARY KEY
CHAPTER –V
IMPLEMENTATION
time of testing only the development company can know that, how far
effective project:
This examines the logic of the system. If we are getting the output
that is required by the user, then we can say that the logic is perfect.
SPECIFICATION TESTING
18
We can set with, what program should do and how it should
UNIT TESTING
the date stored temporarily maintains its integrity during all steps in the
processing.
INTEGRATION TESTING
19
Data can be tested across an interface. One module can have an
VALIDATION TESTING
PERFORMANCE TESTING
are often coupled with stress testing and require both software
instrumentation.
20
OUTPUT TESTING
useful until it does produce the required output in the specified format.
Output format is considered in two ways, the screen format and the
printer format.
User Acceptance Testing is the key factor for the success of any
SYSTEM DESIGN
of the system and how the components relate to each other. The design
of the system reflects the strength of the software. Better the design;
ELELMENTS OF DESIGN
21
The elements to be designed are as follows.
Data Flows:
Data Stores:
Processes:
Controls:
Roles:
22
CHAPTER –VI
SOFTWARE DESCRIPTION
company's Web strategy. There are four main principles of .NET from
23
Users will have access to their information on the Internet from
HTTP
XML
SOAP
UDDI
integrate fax, e-mail and phone services, centralize data storage and
updated.
code instead of native codes and the MSIL, which is nothing but an
instruction set, in turn creates the native code for running the
application.
24
The main advantage of language and platform independent
feature of .NET Framework can be attributed to CLR and the same CLR
you can make use of the various infrastructures that have been provided
of .NET Framework and they are CLR and .Net Framework class library.
applications can run. Further, the various capabilities of CLR can enable
any developer to write even big applications with ease using the
predefined functional sets that are very useful while developing the
ASP.NET
WINDOWS FORMS
ADO.NET
With the .Net Framework you can make your codes written in
fewer lines and other favourable features such as easy web settings,
25
Web configuration makes the .NET Framework a great platform to work
and implementation and to have an effective control over the flow of the
application sequence.
Another great feature that any developer can take note of is the
feature of .NET Framework taking into cognisance all the Web controls,
server-side blocks of codes and Web forms and getting them compiled
machine, the compiled version can easily be uploaded with all the
pages with the relevant components and you also need to register them
operating system is enough and you need not carry out the complicated
operating system.
With the help of an XML based web.config file you can carry out
the web settings which is nothing but configuring the .NET applications
for successful running. The XML based web.config file can be modified
through a program and when any such modification is done, the system
26
recognises the change and registers it immediately that makes
and frequently used resources and data will get loaded onto the memory
for easy and fast access. There are three types of caching in .Net
Framework and they are output caching, data caching, and fragment
caching.
anybody can consume web services from anywhere and from any
information.
their data, code, and description are widely moved across different
27
Though SOAP is the default protocol for web services, .Net
Framework has in built options that allow you to expose or consume web
Resource Indicator (URI) through which you can call the required web
warehouse for all the incoming responses from the network resource.
the sender of web services to sign through XML Digital Signature. Apart
from XML Encryption and XML Digital Signature methods, W3C is also
ASP.NET Web Server Controls are controls that run at the web
HTML controls. The only difference is that HTML controls run at the
client-side and the developers have to write the code for each type of
browsers. The ASP.NET Web Server Controls run at the server-side and
28
ASP.NET Web Server Controls also encapsulates and generates
All web controls are obtained from a common base class. This
form you can specify the Web control Tab Index property. This is very
difficult while using normal HTML. You can also disable a particular web
A web server delivers requested web pages to users who enter the
web server program runs is also usually called a "web server". So,
internet/intranet and has software called 'web server'. The web server
29
program will be always running in the computer. When any users try to
access a website hosted by the web server, it is actually the web server
program which delivers the web page which client asks for.
All web sites in the internet are hosted in some web servers sitting in
The browser breaks up the URL into these parts and then it tries to
communicate with the server looking up for the server name. Actually,
server is identified through an IP address but the alias for the IP address
requested and gets the site and gets the HTML tags for the web page.
When the user try to access a web site, he/she does't really need
to know where the web server is located. The web server may be
30
located in another city or country, but all we need to do is, type the URL
of the web site you want to access in a web browser. The web browser
will send this information to the internet and find the web server. Once
the web server is located, it will request the specific web page from the
process the user request and send the resulting web page to the user
site
Typically, there is only one web server required for a web site. But
large web sites like Yahoo, Google, MSN etc will have millions of visitors
A web server can host hundreds of web sites. Most of the small
web sites in the internet are hosted on shared web servers. There are
several web hosting companies who offer shared web hosting. If we buy
a shared web hosting from a web hosting company, they will host our
web site in their web server along with several other web sites for a Fee.
31
Visual Studio .NET allows to easily create web pages. Some of the
We can simply drag and drop html controls to the web page and
Start typing an HTML tag and VS.NET will complete it. When we
start typing a tag, VS.NET will show you the HTML tags starting
If we type any HTML tags wrong, VS.NET will highlight the errors
one place, rather than copied redundantly in lots of places. There are
model.
(phones, handhelds, desktops, etc.) can all be supported with the same
32
Thirdly, by controlling real-time access to some of the distributed
example, .NET has been built upon open standard technologies like XML
and SOAP.
desktop applications).
code compiled for the .NET platform. The CLR has two interesting
the CLR will support them. This has led one commentator to claim that
33
Not all of the supported languages fit entirely neatly into the .NET
framework, however (in some cases the fit has been somewhat
ADO .NET
making the application interact with a database, where all the data is
access. VB .NET uses ADO .NET (Active X Data Object) as it's data
Evolution of ADO.NET
The first data access model, DAO (data access model) was created
for local databases with the built-in Jet engine which had performance
and functionality issues. Next came RDO (Remote Data Object) and ADO
(Active Data Object) which were designed for Client Server architectures
but soon ADO took over RDO. ADO was a good architecture but as the
34
access, which means that when a connection to the database is
Leaving the connection open for the lifetime of the applications raises
they are serving more people, a connected data access model makes us
data access may do well when connected to two clients, the same may
ADO .NET came into existence. ADO .NET addresses the above
35
provides maximum security for databases and also has less impact on
database uses XML and converts all the data into XML format for
DataSet
database for updating. The data in DataSet can be loaded from any valid
36
Data Access in ADO.NET relies on two components: DataSet and Data
Provider.
Data Provider
two DataProviders: the SQL Data Provider which is designed only to work
37
with Microsoft's SQL Server 7.0 or later and the OleDb DataProvider
database
with the database. The command object provides direct execution of the
38
which can provide connections to a wide range of database types like
Microsoft Access and Oracle. The Connection object contains all of the
the database:
single value from a database query Execute Reader: Returns a result set
39
logic when you do not need to keep the data cached in memory.
DataReader.
is used either to fill a DataTable or DataSet with data from the database
with it's Fill method. After the memory-resident data has been
SelectCommand
InsertCommand
DeleteCommand
UpdateCommand
40
SQL Server
SQL Server is much more powerful than Access and provides several
Uses
Access can also be used as the database for basic web based
Server.
41
standalone applications that serve as tools for on-the-road salesmen.
applications that are used by more than a handful of people tend to rely
product.
Features
may be viewed and edited as SQL statements, and SQL statements can
tables. In this case, "relatively compatible" means that SQL for Access
contains many quirks, and as a result, it has been dubbed "Bill's SQL" by
industry insiders. Users may mix and use both VBA and "Macros" for
42
MSDE (Microsoft SQL Server Desktop Engine) 2000, a mini-version of MS
SQL Server 2000, is included with the developer edition of Office XP and
syntax that allows creating queries with parameters, in a way that looks
like creating stored procedures, but these procedures are limited to one
table (as long as the modifications are done only with that form), and it
modules are stored in the ADP file (the other objects are stored in the
back-end database).
MSDE Facts
43
are several third party management tools available. Or, you can
database at the same time (Microsoft does not want you to use
MSDE for high traffic applications ! Instead, they want you to buy
SQL Server)
Migrating from MSDE to SQL Server is very easy. All you have to
do is, uninstall MSDE and install SQL Serer. Your databases and
licensing conditions.
44
Features like Full-text search, profiler, import/export wizards,
CHAPTER-VII
CONCLUSION
The aim of this project was to support the user to get the result of
their search in an efficient way and in less time. Whilst computers and
45
behavior which is represented using a search matrix. The search matrix
differs for each user based on the search queries and personalized
weight based. And the search matrix supports the user to find the
user Browser.
BIBLIOGRAPHY
CYCLE
46
ASP ASP.NET FOR ASP PROGRAMMERS BUDI KURNIAWAN
47