Final Report TTTTT TTTTT
Final Report TTTTT TTTTT
Final Report TTTTT TTTTT
CHAPTER 1
INTRODUCTION
Ongoing years have seen the quickly extending web based business and is supplanting conventional
trade. A huge number of items from different traders have been offered on the web. These sites
additionally gives a stage to purchasers to post surveys on a large number of items. Such various
customer audits contain rich and profitable learning and have turned into a significant asset for the two
purchasers and firms. Customers ordinarily look for quality data from online audits before acquiring an
item , while numerous organizations utilize online surveys as significant inputs in their item
advancement, promoting, and purchaser relationship the board.
1.1 MOTIVATION:
Most of popular online shopping sites like amazon, flipkart, snapdeal, myntra and other official
company portals promotes large number of products through internet services. The products review and
rating are both independent factors, the consumer will mainly focus on ratings rather than the textual
feedback and review. The main motivation is to make the effective use of rating for the online
consumer.
The quantity of online shoppers who read and trust online surveys is expanding. As indicated
by a study by BrightLocal, 88 percent of purchasers trust online audits as much as an individual
suggestion—which is dumbfounding, considering most online surveys are posted by all out outsiders. A
similar study found that solitary 12 percent of the populace did not consistently perused audits for
purchaser items.
This means not offering client surveys (or overlooking them as a potential advertising
opportunity) is much the same as estranging 88 percent of your purchasing populace, denying them of
data they need to enable them to settle on their purchasing choices.
NIE,Mysure. Page 1
Secure and Efficient Information Retrieval 2018-19
Sentiment analysis is the most essential and significant work in separating clients intrigue
inclinations. As a rule, sentiment is utilized to portray clients claim frame of mind on item or things. It is
seen that in numerous commonsense cases, it is more critical to give numerical scores instead of paired
choices. By and large, audits are separated into two gatherings, positive and negative.
1.3 OBJECTIVE
1.4 SCOPE
It is hard for clients to settle on a decision when all hopeful items reflect positive sentiment or negative
sentiment. To settle on a buy choice, clients not just need to know whether the item or thing is great, yet
additionally need to know how great the thing is. Its additionally concurred that various individuals may
have distinctive sentimental articulation inclinations.
NIE,Mysure. Page 2
Secure and Efficient Information Retrieval 2018-19
CHAPTER 2
LITERATURE SURVEY
The existing work mainly focuses on classifying users into binary sentiment (i.e. positive or
negative).
The existing approaches mainly leverage product category information or tag information to study the
interpersonal influence.
These methods are all restricted on the structured data. However, user reviews can provide us ideas in
mining interpersonal inference and user preferences.
First, we extract product features from user reviews. Then, we find out the sentiment words, which
are used to describe the product features. Besides, we leverage sentiment dictionaries to calculate
sentiment of a specific user on an item/product.
We propose a user sentimental measurement approach, which is based on the sentiment words from
user reviews.
We make use of sentiment for rating prediction. User sentiment similarity focuses on the user interest
preferences. Item reputation similarity shows the potential relevance of items.
We fuse the three factors: user sentiment similarity, interpersonal sentimental influence, and item
reputation similarity into a probabilistic matrix factorization framework to carry out an accurate
recommendation. Here user’s social sentiment that we mined is a key factor in improving rating
prediction performances.
NIE,Mysure. Page 3
Secure and Efficient Information Retrieval 2018-19
The .NET Framework is a computing platform that simplifies application development in the
highly distributed environment.
The .NET Framework introduces a completely new model for the programming and deployment
of applications. .NET is Microsoft's vision of "software as a service", a development environment in
which we can build,
create and deploy our applications and the next generation of components, the ability to use the Web
rather than our own computer for various services.
The .NET Framework is not a single application, it’s actually a collection of different
technologies bundled into one marketing term. The .NET Framework includes new languages like C#
and VB.NET, an engine for hosting programmable web pages and web services (ASP.NET), a new
model for interacting with databases (ADO.NET) and a class library stocked with tools for everything
from sending email to encrypting a password. The .NET technology facilitates to learn about
component based programming, structured error handling and how to access the files, XML and
relational databases.
The .NET language : These include C# and Visual Basic .NET, the object-oriented and
modernized successor to Visual Basic 6.0, as well as Jscript.NET ( a server side version of Java
Script), J# ( a Java Clone), and C++ with manage extensions.
ASP.NET: This is the engine that includes both web applications and web services, with almost
any feature from the .NET class library. ASP.NET also includes a set of web specific services.
Windows Form: This is the engine that is used to develop Windows based applications which is
also known as standalone applications. Like ASP this also has various controls and tools which
can be used to design the user interface. Windows forms are best suited for the applications of
installation type
Visual Studio .NET: This optional development tool contains a rich set of productivity and
debugging features.
NIE,Mysure. Page 4
Secure and Efficient Information Retrieval 2018-19
To provide a code execution environment that minimizes software deployment and versioning
conflicts.
To provide a code-execution environment that guarantees safe execution of code, including code
created by an unknown or semi-trusted third party.
To make the developer experience consistent across widely varying types of applications such as
Windows based and Web based applications.
To build all communications on industry standards to ensure that code based on the .NET Framework
can integrate with any other code.
Microsoft introduced great technologies like COM, DCOM, COM+ etc. to enable reuse of
Software. Although these technologies are very powerful to reuse Software, they required a huge learning
curve. According to this aspect, Microsoft realized that its time to come up with a new technology, a better
one, an easier one, a new Framework, within which each programming task is easy accomplished.
NIE,Mysure. Page 5
Secure and Efficient Information Retrieval 2018-19
Common Runtime Engine - Programming languages on the .NET Framework compile into an
intermediate language known as the Common Intermediate Language or CIL. Microsoft's
implementation of CIL is known as Microsoft Intermediate Language or MSIL. In Microsoft's
implementation, this intermediate language is not interpreted but rather compiled in a manner
known as just-in-time compilation (JIT) into native code. The combination of these concepts is
called the Common Language Infrastructure (CLI), a specification; Microsoft's implementation of
the CLI is known as the Common Language Runtime (CLR).
Base Class Library - The Base Class Library, sometimes referred to as the Framework Class
Library, is a library of types available to all languages using the .NET Framework. The BCL
provides classes which encapsulate a number of common functions such as file reading and writing,
graphic rendering, database interaction, XML document manipulation, and so forth.
Simplified Deployment - Installation and deployment of Windows applications has been the base of
many developers' existence. Registry settings, file distribution and DLL hell have been nearly
completely eliminated by new deployment mechanisms in the .NET Framework.
Security - .NET allows for code to be run with different trust levels without the use of a separate
sandbox.
NIE,Mysure. Page 6
Secure and Efficient Information Retrieval 2018-19
The design of the .NET framework is such that it supports platform independence. That is, a
program written to use the framework should run without change on any platform for which the framework
is implemented. At present, Microsoft has implemented the full framework only on the Windows operating
system. Microsoft and others have implemented portions of the framework on non-Windows platforms, but
to date those implementations are not widely used.
2.3.4 Introduction to C#
C# is a simple, modern, object oriented and type-safe programming language derived from C and
C++. C# (pronounced "C sharp") is firmly planted in the C and C++ family tree of languages, and will
immediately be familiar to C and C++ programmers. C# is built specifically to program the microsoft.NET
framework.
C# aims to combine the high productivity of Visual Basic and the raw power of C++. C# is provided
as part of Microsoft Visual Studio 7.0. In addition to C#, Visual Studio supports Visual Basic, Visual C++,
and the scripting languages VBScript and JScript. All of these languages provide access to the Microsoft
.NET platform, which includes a common execution engine and a rich class library. For C# developers,
even though C# is a newer language, it has complete access to the same rich class libraries that are used by
second tools such as Visual Basic and Visual C++. C# itself does not include a class library. It's built with
the Web in mind and claims to provide an environment that's in sync with HTML, XML, and SOAP.
Compared to C and C++, the language is restricted or enhanced in a number of ways, including but
not limited to the following:
True support for pointers. However pointers can only be used within unsafe scopes, and only programs
with appropriate permissions can execute code marked as unsafe. Most object access is done through
safe references, which cannot be made invalid, and most arithmetic is checked for overflow. An unsafe
pointer can be made to not only value-types, but to subclasses of System. Object as well. Also safe code
can be written that uses a pointer (System.IntPtr).
Managed memory cannot be explicitly freed, but instead is garbage collected when no more references to
the memory exist. Multiple inheritance is prohibited (although a class can implement any number of
interfaces).
NIE,Mysure. Page 7
Secure and Efficient Information Retrieval 2018-19
Enumeration members are placed in their own namespace. C# 1.0 lacks templates;
however, C# 2.0 provides generics.
Properties are available which results in syntax that resembles C++ member field access, similar to VB.
Following its immediate predecessors HTML 4.01 and XHTML 1.1, HTML5 is a response to the
fact that the HTML and XHTML in common use on the World Wide Web are a mixture of
features introduced by various specifications, along with those introduced by software products
such as web browsers, those established by common practice, and the many syntax errors in existing
web documents. It is also an attempt to define a single markup language that can be written in either
HTML or XHTML syntax. It includes detailed processing models to encourage more interoperable
implementations; it extends, improves and rationalises the markup available for documents, and
introduces markup and application programming interfaces (APIs) for complex web applications. For
the same reasons, HTML5 is also a potential candidate for cross-platform mobile applications. Many
features of HTML5 have been built with the consideration of being able to run on low-powered devices
such as smartphones and tablets. In December 2011, research firm Strategy Analytics forecast sales of
HTML5 compatible phones would top 1 billion in 2013.
In particular, HTML5 adds many new syntactic features. These include the new <video>, <audio> and
<canvas> elements, as well as the integration of scalable vector graphics (SVG) content (that replaces the
uses of generic <object> tags) and MathML for mathematical formulas. These features are idesignedi itoi
NIE,Mysure. Page 8
Secure and Efficient Information Retrieval 2018-19
imakei iiti ieasyi itoi iincludei iandi ihandlei imultimediai iandi igraphicali icontenti ioni ithei iwebi iwithouti
ihavingi itoi iresorti itoi iproprietaryi ipluginsi iandi iAPIs.i iOtheri inewi ielements,i isuchi iasi i<section>,i
i<article>,i i<header>and<nav>,i iarei idesignedi itoi ienrichi ithei isemantici icontenti iofi idocuments.i iNewi
iattributesi ihavei ibeeni iintroducedi ifori ithei isamei ipurpose,i iwhilei isomei ielementsi iandi iattributesi ihavei
ibeeni iremoved.i iSomei ielements,i isuchi iasi i<a>,i i<cite>i iandi i<menu>i ihavei ibeeni ichanged,i iredefinedi
iori istandardized.i iThei iAPIsi iandi iDocumenti iObjecti iModeli i(DOM)i iarei inoi ilongeri iafterthoughts,i ibuti
iarei ifundamentali ipartsi iofi ithei iHTML5i ispecification.HTML5i ialsoi idefinesi iini isomei idetaili ithei
irequiredi iprocessingi ifori iinvalidi idocumentsi isoi ithati isyntaxi ierrorsi iwilli ibei itreatedi iuniformlyi ibyi ialli
2.3.5i iASP.Net
ASP.NETi iisi iani iopeni isourcei iserver-sidei iWebi iapplicationi iframeworki idesignedi ifori iWebi idevelopmenti
itoi iproducei idynamici iWebi ipages.i iIti iwasi idevelopedi ibyi iMicrosofti itoi iallowi iprogrammersi itoi ibuildi
idynamici iwebi isites,i iwebi iapplicationsi iandi iwebi iservices. Iti iwasi ifirsti ireleasedi iini iJanuaryi i2002i iwithi
iversioni i1.0i iofi ithei i.NETi iFramework,i iandi iisi ithei isuccessori itoi iMicrosoft'si iActivei iServeri iPagesi
i(ASP)i itechnology.i iASP.NETi iisi ibuilti ioni ithei iCommoni iLanguagei iRuntimei i(CLR),i iallowingi
iprogrammersi itoi iwritei iASP.NETi icodei iusingi ianyi isupportedi i.NETi ilanguage.i iThei iASP.NETi iSOAPi
iextensioni iframeworki iallowsi iASP.NETi icomponentsi itoi iprocessi iSOAPi imessages.
ASP.NETi iisi iini ithei iprocessi iofi ibeingi ire-implementedi iasi iai imoderni iandi imodulari iwebi iframework,i
itogetheri iwithi iotheri iframeworksi ilikei iEntityi iFramework.i iThei inewi iframeworki iwilli imakei iusei iofi ithei
inewi iopen-sourcei i.NETi iCompileri iPlatformi i(code-namei i"Roslyn")i iandi ibei icrossi iplatform.i iASP.NETi
iMVC,i iASP.NETi iWebi iAPI,i iandi
ASP.NET Web Pages (a platform using only Razor pages) will merge into a unified MVC 6
NIE,Mysure. Page 9
Secure and Efficient Information Retrieval 2018-19
Microsoft provides "Express" editions of its Visual Studio at no cost. Commercial versions of Visual Studio
along with select past versions are available for free to students via Microsoft's DreamSpark program
NIE,Mysure. Page 10
Secure and Efficient Information Retrieval 2018-19
Features of MSSQL
iAlways on availability groups -- This feature takes database mirroring to a whole new level.
iColumnstore Indexes -- This a cool new feature that is completely unique to SQL Server. They are
special type of read-only index designed to be use with Data Warehouse queries. Basically, data is grouped
and stored in a flat, compressed column index, greatly reducing I/O and memory utilization on large
queries.
i iUser-Defined Server Roles -- DBAs have always had the ability to create custom database role, but
never server wide.
iEnhanced Auditing Features -- Audit is now available in all editions of SQL Server. New filtering
features give greater flexibility in choosing which events to write to the log.
iBI Semantic Model -- This is replacing the Analysis Services Unified Dimensional Model (or cubes
most people referred to them). It's a hybrid model that allows one data model will support all BI
experiences in SQL Server.
iSequence Objects -- A sequence is just an object that is a counter -- a good example of it's use would be
to increment values in a table, based a trigger. SQL has always had similar functionality with identity
columns, but now this is a discrete object.
iiEnhanced PowerShell Support -- Windows and SQL Server admins should definitely start brushing up
on their PowerShell scripting skills.
iDistributed Replay -- Distributed replay allows you to capture a workload on a production server, and
replay it on another machine. This way changes in underlying schemas, support packs, or hardware changes
can be tested under production conditions.
iPowerView -- You may have heard of this under the name "Project Crescent" it is a fairly
powerful self-service BI toolkit that allows users to create mash ups of BI reports from all over
the Enterprise.
NIE,Mysure. Page 11
Secure and Efficient Information Retrieval 2018-19
Relational Database System: Like almost all other database systems on the market, MSSQL is a
relational database system.
Client/Server Architecture: MSSQL is a client/server system. There is a database server (MSSQL) and
arbitrarily many clients (application programs), which communicate with the server; that is, they query
data, save changes, etc. The clients can run on the same computer as the server or on another computer
(communication via a local network or the Internet).
SQL compatibility: MSSQL supports as its database language -- as its name suggests – SQL (Structured
Query Language). SQL is a standardized language for querying and updating data and for the
administration of a database. There are several SQL dialects (about as many as there are database systems).
MSSQL adheres to the current SQL standard , although with significant restrictions and a large number of
extensions.
NIE,Mysure. Page 12
Secure and Efficient Information Retrieval 2018-19
CHAPTER 3
3.1 INTRODUCTION
Software Requirement Specification (SRS) is a fundamental document, which forms the foundation
of the software development process. SRS not only lists the requirements of a system but also has a
description of its major features. These recommendations extend the IEEE standards. The
recommendations would form the basis for providing clear visibility of the product to be developed
serving as baseline for execution of a contract between client and the developer.
A system requirement is one of the main steps involved in the development process. It follows
after a resource analysis phase that is the task to determine what a particular software product does.
The focus in this stage is one of the users of the system and not the system solutions. The result of
the requirement specification document states the intention of the software, properties and
constraints of the desired system.
SRS constitutes the agreement between clients and developers regarding the contents of the
software product that is going to be developed. SRS should accurately and completely represent the
system requirements as it makes a huge contribution to the overall project plan.
The software being developed may be a part of the overall larger system or may be a complete
standalone system in its own right. If the software is a system component, the SRS should state the
interfaces between the system and software portion.
NIE,Mysure. Page 13
Secure and Efficient Information Retrieval 2018-19
• Rating prediction:-
Based on the review given by the customer, rating is predicted. These ratings given by the
customer, helps others to view the products which is top rated.
• Reviews analysis:-
The products are reviewed based on the rating given by each customer. The top rated
products are will always be in top of the list, and the least rated products will be in the bottom.
Reliability:
The system should not crash and should identify invalid input and produce suitable error message.
Usability:
The interface should be intuitive and easily navigable and user friendly.
Integrity:
The software does not store any cache data or doesn’t use system resources in background.
NIE,Mysure. Page 14
Secure and Efficient Information Retrieval 2018-19
• Hard Disk : 40 GB
Software Requirements
• Coding Language : C#
NIE,Mysure. Page 15
Secure and Efficient Information Retrieval 2018-19
CHAPTER 4
SYSTEM ANALYSIS
4.1 DETAILED DESCRIPTION OF THE PROJECT
System Feasibility
The feasibility study is carried out to determine whether the proposed system can be developed with
the available resources.
Technical Feasibility
Economical Feasibility
Behavioral Feasibility
Motivational Feasibility
Schedule Feasibility
Operational Feasibility
NIE,Mysure. Page 16
Secure and Efficient Information Retrieval 2018-19
NIE,Mysure. Page 17
Secure and Efficient Information Retrieval 2018-19
CHAPTER 5
SYSTEM DESIGN
5.1 USE CASE DIAGRAM
Use case diagram is a graph of actors, a set of use cases enclosed by a system boundary,
communication associations between the actor and the use case.
The use case diagram describes how a system interacts with outside actors; each use case
represents a piece of functionality that a system provides to its users. A use case is known as an ellipse
containing the name of the use case and an actor is shown as a stick figure with the name of the actor below
the figure. The use cases are used during the analysis phase of a project to identify and partition system
functionality. They separate the system into actors and use case. Actors represent roles that are played by
user of the system. Those users can be humans, other computers, pieces of hardware, or even other software
systems.
The below figure 5.1.1 defines the use case diagram of user, where user can login to view the
products in the application which are categorized based on ranking and add up his comments on his
purchase.
The above figure 5.1.2 defines the use case diagram of admin, where admin has to login to add the
products and view the users, who had purchased the products. Admin manages all the products in respect of
adding, viewing, deleting.
NIE,Mysure. Page 18
Secure and Efficient Information Retrieval 2018-19
NIE,Mysure. Page 19
Secure and Efficient Information Retrieval 2018-19
Basic Notations
Initial Activity
This shows the starting point or first activity of the flow. It is denoted by a solid circle.
Final Activity
The end of the Activity diagram is shown by a bull's eye symbol, also called as a final
activity.
Activity
Decisions
A logic where a decision is to be made is depicted by a diamond.
NIE,Mysure. Page 20
Secure and Efficient Information Retrieval 2018-19
Workflow
Workflow is depicted with an arrow. It shows the direction of the workflow in the activity diagram.
NIE,Mysure. Page 21
Secure and Efficient Information Retrieval 2018-19
NIE,Mysure. Page 22
Secure and Efficient Information Retrieval 2018-19
Purpose
The sequence diagram is used primarily to show the interactions between objects in the sequential
order that those interactions occur. One of the primary uses of sequence diagrams is in the transition
from requirements expressed as use cases to the next and more formal level of refinement.
NIE,Mysure. Page 23
Secure and Efficient Information Retrieval 2018-19
The above figure 5.2.1 defines the sequence diagram of user, where user has to login from his local
system and the validation process is done by the server checking through the database, and he can search
the products by placing the queries and view the products based on the rating prediction.
NIE,Mysure. Page 24
Secure and Efficient Information Retrieval 2018-19
5.7 FLOWCHART
5.8 ALGORITHM
NIE,Mysure. Page 25