Vous êtes sur la page 1sur 41

INDEX

S.NO CONTENTS PAGE.NO

ABSTRACT
1 INTRODUCTION
2 SYSTEM ANALYSIS
2.1 Existing System
2.2 Proposed System
3 PROBLEM DEFINITION
4 PROJECT DESCRIPTION
5 SYSTEM REQUIREMENTS
5.1 Hardware Requirements
5.2 Software Requirements
6 SOFTWARE DESCRIPTION
6.1 Programming Language
7 HARDWARE DESCRIPTION
8 SYSTEM DESIGN
9 FUTURE ENHANCEMENT
10 CONCLUSION
11 APPENDIX
11.1 Source Code
11.2 Screen Shots
11.3 Bibliography
ABSTRACT

Search Engine Optimization (SEO) is important for websites to improve the rank for search
results and get more page views requested by the user. This search engine ranks provide the
better and optimized result to user, which will help them to view the popular page among the
number of pages available in the search results. Apart from this search engine ranking, it also
enables the websites to compete with other rival’s website as each and every website owner
expects to see their own website on the list before other’s websites. This paper puts forward
idea about SEO principles and basic strategies. It also expresses different techniques that are
employed by search engines to improve its results. Also it presents the observation section,
which gives the comparative analysis of SEO techniques. Update concepts sent to concern
SEO search member.
INTRODUCTION

Search Engine Optimization (SEO) is a method to get a better ranking for a website in search
engines such as Google, Yahoo or Bing. A search engine optimization campaign pairs onsite
optimization with off-site tactics which means that one makes changes to the site itself while
they build a portfolio of natural looking back links to increase their organic rankings. When
internet users search for the product or service related, the website relevance to specific
keywords which internet users search for online. The process of optimizing search engine
includes researching keywords, creating content, building links and making sure that the
website is visible in the search engines. According to incomplete statistics, the number of
Internet users in China in 2008 reached 200 million people, 89% of those internet users
mainly use the internet to obtain information, of which 88.8% will make use of internet
search engines search information, second only to send and receive e-mail. Web search
engines have become an important part. Searching some kind of information on the web
became hectic. The complete SEO procedure works with two types of optimization
techniques, on-page and off-page SEO optimization. Both techniques have their personal,
discrete and extensive processes to rank websites on top of search engines. The SEO process
starts with on-page SEO optimization. Just the once the whole on-page SEO optimization is
complete, the off-page SEO optimization starts. Off-page SEO includes tricks which are
chosen to make relevant back links towards the website to make the web page appropriately
in front of search engine spiders. Second off-page SEO is doing the responsibility to improve
our site's search engine rankings outside of our site. The only thing one can do off-site to
increase the rankings is building up more links
SYSTEM ANALYSIS

2.1 Existing System

Search Engine Optimization (SEO) is important for websites to improve the rank for search
results and get more page views requested by the user. This search engine ranks provide the
better and optimized result to user, which will help them to view the popular page among the
number of pages available in the search results. Apart from this search engine ranking, it also
enables the websites to compete with other rival’s website as each and every website owner
expect to see their own website on the list before other’s websites.
DISADVANTAGE
 More time consuming
 There's no guarantee
Keeping up with the search engines themselves
2.2 Proposed System

This paper puts forward idea about SEO principles and basic strategies. It also expresses
different techniques that are employed by search engines to improve its results. Also it
presents the observation section, which gives the comparative analysis of SEO techniques.
SEO techniques make use of original results, which are analyzed by search engines to
increase the popularity of website. These techniques help government and business
organizations to promote their websites and increase the movement of traffic in and out of
their websites. Also, to increase the ranking of website, SEO considers various parameters
such as, the response time of search engine for a particular website, frequently being visited
websites by users, type of search terms entered into URL and type of search engines
preferred by users.
ADVANTAGE
 People trust search results
 It's free
 Searchers are often ready to get results.
PROBLEM DEFINITION

Search engine optimization (SEO) is the process of affecting the online visibility of
a website or a web page in a web search engine's unpaid results—often referred to as
"natural", "organic", or "earned" results. In general, the earlier (or higher ranked on the
search results page), and more frequently a website appears in the search results list, the more
visitors it will receive from the search engine's users; these visitors can then be converted
into customers. SEO may target different kinds of search, including image search, video
search, academic search,[2]news search, and industry-specific vertical search engines. SEO
differs from local search engine optimization in that the latter is focused on optimizing a
business' online presence so that its web pages will be displayed by search engines when a
user enters a local search for its products or services. The former instead is more focused on
national or international searches. As an Internet marketing strategy, SEO considers how
search engines work, the computer programmed algorithms which dictate search engine
behavior, what people search for, the actual search terms or keywords typed into search
engines, and which search engines are preferred by their targeted audience. Optimizing a
website may involve editing its content, adding content, doing HTML, and associated coding
to both increase its relevance to specific keywords and to remove barriers to the indexing
activities of search engines. Promoting a site to increase the number of back links, or inbound
links, is another SEO tactic. By May 2015, mobile search had surpassed desktop search. In
2015, it was reported that Google is developing and promoting mobile search as a key feature
within future products. In response, many brands are beginning to take a different approach
to their Internet marketing strategies.
PROJECT DESCRIPTION

The majority of search engines users are more likely to click on one of the top 5 suggestions
in the results pages (SERPS). To take advantage of this and gain visitors to your web site or
customers to your online store, your website needs to appear in one of the top positions. SEO
is not only about search engines but good SEO practices improve the user experience and
usability of a web site. Users trust search engines and having a presence in the top positions
for the keywords the user is searching, increases the web site’s trust. SEO is good for the
social promotion of your web site. People who find your web site by searching Google or
Yahoo are more likely to promote it on Face book, Twitter, Google+ or other social media
channels.SEO is important for the smooth running of a big web site. Web sites with more
than one author can benefit from SEO in a direct and indirect way. Their direct benefit is
increase in search engine traffic and their indirect benefit is having a common framework
(checklists) to use before publishing content on the site. SEO can put you ahead of the
competition. If two web sites are selling the same thing, the search engine optimized web site
is more likely to have more customers and make more sales.
SYSTEM REQUIREMENTS

5.1 Hardware Requirements

Processor - Intel core i3


Ram - 2GB
HDD - 160GB
Monitor - 15”
5.2 Software Requirements

Front End - C#.NET or ASP.NET


Back End - SQL Server
IDE - Visual Studio 2015
SOFTWARE DESCRIPTION

6.1 Programming Language

Overview of Visual Studio .NET


C# is an elegant and type-safe object-oriented language that enables developers to build a
variety of secure and robust applications that run on the.NET Framework. You can use C# to
create Windows client applications, XML Web services, distributed components, client-
server applications, database applications, and much, much more. Visual C# provides an
advanced code editor, convenient user interface designers, integrated debugger, and many
other tools to make it easier to develop applications based on the C# language and the.NET
Framework. The Visual C# documentation assumes that you have an understanding of basic
programming concepts. If you area complete beginner, you might want to explore Visual C#
Express, which is available on the Web. You can also take advantage of books and Web
resources about C# to learn practical programming skills. C# syntax is highly expressive, yet
it is also simple and easy to learn. The curly-brace syntax of C# will be instantly
recognizable to anyone familiar with C, C++ or Java. Developers who know any of these
languages are typically able to begin to work productively in C# within a very short time. C#
syntax simplifies many of the complexities of C++ and provides powerful features such as
null able value types, enumerations, delegates, lambda expressions and direct memory
access, which are not found in Java. C# supports generic methods and types, which provide
increased type safety and performance, and iterates, which enable implementers of collection
classes to define custom iteration behaviors that are simple to use by client code. Language-
Integrated Query (LINQ) expressions make the strongly-typed query a first-class language
construct. As an object-oriented language, C# supports the concepts of encapsulation,
inheritance, and polymorphism. All variables and methods, including the Main method, the
application's entry point, are encapsulated within class definitions. A class may inherit
directly from one parent class, but it may implement any number of interfaces. Methods that
override virtual methods in a parent class require the override keyword as a way to avoid
accidental redefinition. In C#, a struck is like a lightweight class; it is a stack-allocated type
that can implement interfaces but does not support inheritance. In addition to these basic
object-oriented principles, C# makes it easy to develop software components through several
innovative language constructs, including the following: Encapsulated method signatures
called delegates, which enable type-safe event notifications. Properties, which serves
accesses for private member variables. Attributes, which provide declarative metadata about
types at run time. Inline XML documentation comments. Language-Integrated Query (LINQ)
which provides built-in query capabilities across a variety of data sources. If you have to
interact with other Windows software such as COM objects or native Win32 DLLs, you can
do this in C# through a process called "Interop". Interop enables C# programs to do almost
anything that a native C++ application can do. C# even supports pointers and the concept of
"unsafe" code for those cases in which direct .NET Framework Platform Architecture
memory access is absolutely critical. The C# build process is simple compared to C and C++
and more flexible than in Java. There are no separate header files, and no requirement that
methods and types be declared in a particular order. A C# source file may define any number
of classes, structs, interfaces, and events. The following are additional C# resources: For a
good general introduction to the language, see Chapter 1 of the C# Language Specification.
For detailed information about specific aspects of the C# language, seethe C# Reference. For
more information about LINQ, seal INQ (Language-Integrated Query). C# programs run on
the.NET Framework, an integral component of Windows that includes a virtual execution
system called the common language runtime (CLR) and a unified set of class libraries. The
CLR is the commercial implementation by Microsoft of the common language infrastructure
(CLI), an international standard that is the basis for creating execution and development
environments in which languages and libraries work together seamlessly. Source code
written in C# is compiled into an intermediate language (IL) that conforms to the CLI
specification. Their code and resources, such as bitmaps and strings, restored on disk in an
executable file called an assembly, typically with an extension of .exe or .dll. An assembly
contains a manifest that provides information about the assembly's types, version, culture,
and security requirements. When the C# program is executed, the assembly is loaded into the
CLR, which might take various actions based on the information in the manifest. Then, if the
security requirements are met, the CLR performs just in time (JIT) compilation to convert the
IL code to native machine instructions. The CLR also provides other services related to
automatic garbage collection, exception handling, and resource management. Code that is
executed by the CLR is sometimes referred to as "managed code," in contrast to "unmanaged
code" which is compiled into native machine language that targets a specific system. The
following diagram illustrates the compile-time and run-time relationships of C# source code
files, the.NET Framework class libraries, assemblies, and the CLR. Language
interoperability is a key feature of the.NET Framework. Because the IL code produced by the
C# compiler conforms to the Common Type Specification (CTS), IL code generated from C#
can interact with code that was generated from the.NET versions of Visual Basic, Visual
C++, or any of more than 20 other CTS compliant languages. A single assembly may contain
multiple modules written in different .NET languages, and the See also types can reference
each other just as if they were written in the same language.
Overview of SQL
SQL is a language to operate databases; it includes database creation, deletion, fetching rows,
modifying rows, etc. SQL is an ANSI (American National Standards Institute) standard
language, but there are many different versions of the SQL language.
What is SQL?
SQL is Structured Query Language, which is a computer language for storing, manipulating
and retrieving data stored in a relational database.
SQL is the standard language for Relational Database System. All the Relational Database
Management Systems (RDMS) like MySQL, MS Access, Oracle, Sybase, Informix, Postgres
and SQL Server use SQL as their standard database language.
Also, they are using different dialects, such as −
 MS SQL Server using T-SQL,
 Oracle using PL/SQL,
 MS Access version of SQL is called JET SQL (native format) etc.
Why SQL?SQL is widely popular because it offers the following advantages :
 Allows users to access data in the relational database management systems.
 Allows users to describe the data.
 Allows users to define the data in a database and manipulate that data.
 Allows embedding within other languages using SQL modules, libraries & pre-
compilers.
 Allows users to create and drop databases and tables.
 Allows users to create view, stored procedure, functions in a database.
HARDWARE DESCRIPTION
Intel Core is a line of mid- to high-end consumer, workstation, and enthusiast central
processing units (CPU) marketed by Intel Corporation. These processors displaced the
existing mid- to high-end Pentium processors of the time, moving the Pentium to the entry
level, and bumping the Celeron series of processors to the low end. Identical or more capable
versions of Core processors are also sold as Xeon processors for the server and workstation
markets. As of June 2017, the lineup of Core processors includes the Intel Core i9, Intel Core
i7, Intel Core i5, and Intel Core i3, along with the X-series Intel Core CPUs. In early 2018,
news reports indicated that security flaws, referred to as "Meltdown" and "Specter", were
found "in virtually all Intel processors [made in the past two decades] that will require fixes
within Windows, macOS and Linux". The flaw also affected cloud servers. At the time, Intel
was not commenting on this issue. According to a New York Times report, "There is no easy
fix for Specter as for Meltdown, the software patch needed to fix the issue could slow down
computers by as much as 30 percent". In mid 2018, the majority of Intel Core processors
were found to possess a defect (the Foreshadow vulnerability), which undermines the
Software Guard Extensions (SGX) feature of the processor. ntel intended the Core i3 as the
new low end of the performance processor line from Intel, following the retirement of
the Core 2 brand. The first Core i3 processors were launched on January 7, 2010. The first
Nehalem based Core i3 was Clarkdale-based, with an integrated GPU and two cores. The
same processor is also available as Core i5 and Pentium, with slightly different
configurations. The Core i3-3xxM processors are based on Arrandale, the mobile version of
the Clarkdale desktop processor. They are similar to the Core i5-4xx series but running at
lower clock speeds and without Turbo Boost. According to an Intel FAQ they do not
support Error Correction Code (ECC) memory. According to motherboard manufacturer
Super micro, if a Core i3 processor is used with a server chipset platform such as Intel
3400/3420/3450, the CPU supports ECC with UDIMM. When asked, Intel confirmed that,
although the Intel 5 series chipset supports non-ECC memory only with the Core i5 or i3
processors, using those processors on a motherboard with 3400 series chipsets it supports the
ECC function of ECC memory. A limited number of motherboards by other companies also
support ECC with Intel Core ix processors; the Asus P8B WS is an example, but it does not
support ECC memory under Windows non-server operating systems.
Random-access memory (RAM /ræm/) is a form of computer data storage that stores data
and machine code currently being used. A random-access memory device allows data items
to be read or written in almost the same amount of time irrespective of the physical location
of data inside the memory. In contrast, with other direct-access data storage media such as
hard disks, CD-RWs, DVD-RWs and the older magnetic tapes and drum memory, the time
required to read and write data items varies significantly depending on their physical
locations on the recording medium, due to mechanical limitations such as media rotation
speeds and arm movement. RAM contains multiplexing and de multiplexing circuitry, to
connect the data lines to the addressed storage for reading or writing the entry. Usually more
than one bit of storage is accessed by the same address, and RAM devices often have
multiple data lines and are said to be "8-bit" or "16-bit", etc. devices. In today's technology,
random-access memory takes the form of integrated circuits. RAM is normally associated
with volatile types of memory (such as DRAM modules), where stored information is lost if
power is removed, although non-volatile RAM has also been developed. Other types of non-
volatile memories exist that allow random access for read operations, but either do not allow
write operations or have other kinds of limitations on them. These include most types of
ROM and a type of flash memory called NOR-Flash. Integrated-circuit RAM chips came into
the market in the early 1970s, with the first commercially available DRAM chip, the Intel
1103, introduced in October 1970.
A hard disk drive (HDD), hard disk, hard drive, or fixed disk,[b] is an electromechanical data
storage device that uses magnetic storage to store and retrieve digital information using one
or more rigid rapidly rotating disks (platters) coated with magnetic material. The platters are
paired with magnetic heads, usually arranged on a moving actuator arm, which read and
write data to the platter surfaces. Data is accessed in a random-access manner, meaning that
individual blocks of data can be stored or retrieved in any order and not only sequentially.
HDDs are a type of non-volatile storage, retaining stored data even when powered off.
Introduced by IBM in 1956, HDDs became the dominant secondary storage device for
general-purpose computers by the early 1960s. Continuously improved, HDDs have
maintained this position into the modern era of servers and personal computers. More than
200 companies have produced HDDs historically, though after extensive industry
consolidation most units are manufactured by Seagate, Toshiba, and Western Digital. HDDs
dominate the volume of storage produced (exabytes per year) for servers. Though production
is growing slowly, sales revenues and unit shipments are declining because solid-state drives
(SSDs) have higher data-transfer rates, higher areal storage density, better reliability,[7] and
much lower latency and access times. The revenues for SSDs, most of which use NAND,
slightly exceed those for HDDs. Though SSDs have nearly 10 times higher cost per bit, they
are replacing HDDs in applications where speed, power consumption, small size, and
durability are important. The primary characteristics of an HDD are its capacity and
performance. Capacity is specified in unit prefixes corresponding to powers of 1000: a 1-
terabyte (TB) drive has a capacity of 1,000 gigabytes (GB; where 1 gigabyte = 1 billion
bytes). Typically, some of an HDD's capacity is unavailable to the user because it is used by
the file system and the computer operating system, and possibly inbuilt redundancy for error
correction and recovery. Also there is confusion regarding storage capacity, since capacities
are stated in decimal Gigabytes (powers of 10) by HDD manufacturers, whereas some
operaring systems report capacities in binary Gibibytes, which results in a smaller number
than advertised. Performance is specified by the time required to move the heads to a track or
cylinder (average access time) adding the time it takes for the desired sector to move under
the head (average latency, which is a function of the physical rotational speed in revolutions
per minute), and finally the speed at which the data is transmitted (data rate). The two most
common form factors for modern HDDs are 3.5-inch, for desktop computers, and 2.5-inch,
primarily for laptops. HDDs are connected to systems by standard interface cables such as
PATA (Parallel ATA), SATA (Serial ATA), USB or SAS (Serial Attached SCSI) cables.
SYSTEM DESIGN

MODULES
RESEARCH

There are many keyword finders available, which will take input in the form of keywords and
gives the output in the form of how many times that keyword was entered by users i.e. the
number of occurrences of that keyword. However, if a particular keyword has the highest
number of occurrences in the search results, that keyword will become the greatest
competitor within the search results.

After the keyword analysis phase, competitive analysis of the subject website is performed
against its competitors websites. To perform competitive analysis of websites, different
parameters are considered such as, incoming and outgoing links, ranking of website on
search results, number of visitors for the website, view rate or bounce rate, appearance of
web contents on webpage etc.

REPORTING & GOAL SETTING

Most important step in Reporting and Goal Setting is to analyze the sites traffic. Site’s traffic
mainly depends on type of search engine, number of occurrences of keywords in search
engine, popularity of web contents, number of visitors etc. Sometimes the parameters from
SEO metrics are also used to calculate the site’s traffic. Most important factor considered
while calculating site’s traffic is the number of incoming and outgoing links. If the site has
more number of outgoing links to other website as well as incoming links from another
websites, the number of visitors will be more for that website. This will ultimately increase
the bounce rate, which will result in high traffic rate.

CONTENT BUILDING

Content is the important factor of search engine optimization. The website with the high-
quality content will provide the better competitive environment in search engine
optimization. Content building phase is divided into two steps. First, a site is loaded with
high-quality content, which gives reason to user to stay on the website and to come back to
the website. If user finds most relevant information on particular website, then instead of
visiting other sites, he/she always stick to that particular website. The main aim of the user to
stay or to come back on site is just to find or search information.
WEBPAGE OPTIMIZATION

This phase considers all the parameters, which are related to Graphical User Interface (GUI)
of the website. Along with the Content building phase, the appearance of the media
components on the webpage is equally important. The webpage optimization is carried out in
four steps, namely, webpage titles, web content exploration, prominence of targeted keyword
phrases and site outline.

SOCIAL & LINK BUILDING

Now a day’s billion number of users are using social media for various purposes. In
marketing, sharing of web contents through various social media provides number of options
for organizations to establish a best customer relationship and also emphasize on other clients
to use those social media for sharing of site contents and improves connectivity with other
potential customers

MAINTAINING PROGRESS REPORT OF SEO PLAN

At the start and end of each SEO phase, progress report is generated to analyze the activities
performed in particular SEO phase. The outcome of the phase is recorded for further
analysis. Rankings, site’s traffic levels and some other parameters are considered to measure
the ranking results.

FUTURE ENHANCEMENT
As a future work we would to develop tools which can add a site to a search engine whenever
user wants and can remove the sites which are not good for Mankind.

CONCLUSION
This paper proposed the novel methods or search engine optimization for driving more and
more users to a website. We used the methods continuously for 24 weeks and discovered
more and more users accessing our project website. The rank of the website was raised from
1 to 4; In addition to it sub links were assigned by Google which is assigned to a website
which has more number of users according to Google.

APPENDIX
11.1 Source Code
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace CRNServer
{
public partial class frmRequest : Form
{
public String strusername = "";
public frmRequest(String strname)
{
strusername = strname;
InitializeComponent();
}
private void btnApply_Click(object sender, EventArgs e)
{
DataBase db = new DataBase();
db.SetRequest(strusername, cmbreq.SelectedIndex.ToString());
}
private void frmRequest_Load(object sender, EventArgs e)
{
cmbprior.Items.Add("1");
cmbprior.Items.Add("2");
cmbprior.Items.Add("3");
cmbprior.Items.Add("4");
cmbprior.SelectedIndex = 0;
cmbreq.Items.Add("Reject");
cmbreq.Items.Add("Accept");
cmbreq.SelectedIndex = 0;
cmbspeed.Items.Add("50 mbs");
cmbspeed.Items.Add("100 mbs");
cmbspeed.Items.Add("200 mbs");
cmbspeed.Items.Add("300 mbs");
cmbspeed.SelectedIndex = 0;
}
}
}
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;

namespace CRNServer
{
public partial class frmReg : Form
{
public frmReg()
{
InitializeComponent();
}
public void Getallreginfo()
{
DataTable tbl = new DataTable();
DataBase db = new DataBase();
db.GetAllDetailsTable(ref tbl);
dttable.DataSource = tbl;
}
private void frmReg_Load(object sender, EventArgs e)
{
cmbdataSize.Items.Add("128 KB");
cmbdataSize.Items.Add("512 KB");
cmbdataSize.Items.Add("1 MB");
cmbdataSize.Items.Add("2 MB");
cmbdataSize.Items.Add("5 MB");
cmbdataSize.SelectedIndex = 0;
Getallreginfo();
}
private void button1_Click(object sender, EventArgs e)
{
if (txtFName.Text == "")
{
MessageBox.Show("First Name Should not be empty");
return;
}
if (txtLName.Text == "")
{
MessageBox.Show("Last Name Should not be empty");
return;
}

if (txtUsername.Text == "")
{
MessageBox.Show("User Name Should not be empty");
return;
}

if (txtPassword.Text == "")
{
MessageBox.Show("Password Should not be empty");
return;
}
if (txtContact.Text == "")
{
MessageBox.Show("Contact Should not be empty");
return;
}

if (txtMail.Text == "")
{
MessageBox.Show("Mail Should not be empty");
return;
if (txtAddr.Text == "")
{
MessageBox.Show("Mail Should not be empty");
return;
}
DataBase db = new DataBase();
if (db.insertReg(txtFName.Text, txtLName.Text, txtUsername.Text, txtPassword.Text,
txtContact.Text, txtMail.Text, txtAddr.Text.Replace("\r\n", ","), cmbdataSize.Text))
{
txtFName.Text = "";
txtLName.Text = "";
txtUsername.Text = "";
txtPassword.Text = "";
txtContact.Text = "";
txtAddr.Text = "";
cmbdataSize.SelectedIndex = 0;

Getallreginfo();
}
}
}
}

using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Collections;

namespace CRNServer
{
public partial class frmHome : Form
{
Hashtable hsmap;
public frmHome()
{
InitializeComponent();
}
private void btnreg_Click(object sender, EventArgs e)
{
frmReg frm = new frmReg();
frm.ShowDialog();
}

private void frmHome_Load(object sender, EventArgs e)


{
hsmap = new Hashtable();
lstDetails.Columns.Add("Sno", 80);
lstDetails.Columns.Add("Name", 80);
lstDetails.Columns.Add("Secondry User", 180);

timer1.Interval = 1000;
timer1.Start();
}

private void timer1_Tick(object sender, EventArgs e)


{
timer1.Stop();

DataTable tbl = new DataTable();


DataBase db = new DataBase();
db.GetUserInfo(ref tbl);

for(int rows =0; rows <tbl.Rows.Count; rows ++ )


{
ListViewItem item = new ListViewItem();
String strusername = tbl.Rows[rows][0].ToString();
String strsnotify = tbl.Rows[rows][1].ToString();
String straccept = tbl.Rows[rows][2].ToString();
if (straccept == "1")
{
if (strsnotify.Length > 0)
{
db.UpdateTraffic(strusername, strsnotify);
db.UpdateSentTraffic(strusername, "");
}
}

int index = lstDetails.Items.Count;


if( hsmap[strusername] == null )
{
index++;
hsmap[strusername] = lstDetails.Items.Count;
item.Text = index.ToString();
item.SubItems.Add(strusername);
if (straccept == "1")
{
item.SubItems.Add("Request Acccepted");
}
else
{
if( strsnotify.Length > 0 )
item.SubItems.Add("Request From Secondary User");
else
item.SubItems.Add("");
}
lstDetails.Items.Add(item);
}
else
{
index = (int)hsmap[strusername];
if (straccept == "1")
{
lstDetails.Items[index].SubItems[2].Text = "Request Acccepted";
}
else
{
if (strsnotify.Length > 0)
lstDetails.Items[index].SubItems[2].Text = "Request From Secondary User";
else
lstDetails.Items[index].SubItems[2].Text = "";
}

}
}

timer1.Start();
}

private void lstDetails_DoubleClick(object sender, EventArgs e)


{
if (lstDetails.Items.Count < 0)
return;

if (lstDetails.SelectedItems.Count < 0)
return;

ListViewItem item = lstDetails.SelectedItems[0];


if (item.SubItems[2] == null)
return;

if (item.SubItems[2].Text.Length > 0)
{
frmRequest frm = new frmRequest(item.SubItems[1].Text);
frm.ShowDialog();
}

}
}
}

using System;
using System.Collections.Generic;
using System.Linq;
using System.Windows.Forms;

namespace CRNServer
{
static class Program
{
/// <summary>
/// The main entry point for the application.
/// </summary>
[STAThread]
static void Main()
{
Application.EnableVisualStyles();
Application.SetCompatibleTextRenderingDefault(false);
Application.Run(new Form1());
}
}
}

using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Data.SqlClient;
using System.Configuration;
using System.Windows.Forms;
using System.Collections;
using System.Data;

namespace CRNServer
{
class DataBase
{
public String Connstr = "";
public DataBase()
{
Connstr = ConfigurationManager.AppSettings["ConnString"];
}

public bool isValidUser(String UserName, String Password)


{
bool retval = false;
String strQuery = "SELECT [username], [Password] FROM tbladmin WHERE
[username]='" + UserName + "' AND [Password]='" + Password + "'";
try
{
String Connstr = ConfigurationManager.AppSettings["ConnString"];
SqlConnection conns = new SqlConnection(Connstr);
conns.Open();
SqlCommand cmd = new SqlCommand(strQuery, conns);
SqlDataReader reader = cmd.ExecuteReader();
if (reader.Read())
{
String strName = reader[0].ToString();
String strPass = reader[1].ToString();

if (strName == UserName && Password == strPass)


retval = true;
}
conns.Close();
}
catch (Exception ex)
{

return retval;
}

public bool GetAllDetailsTable(ref DataTable tbl)


{
bool retval = false;
String strQuery = "SELECT [Firstname], [LastName], [Username], [Passeord], [Contact],
[Mail], [Address], [DataSize] FROM tblLogin";
try
{
String Connstr = ConfigurationManager.AppSettings["ConnString"];
SqlConnection conns = new SqlConnection(Connstr);
conns.Open();
SqlCommand cmd = new SqlCommand(strQuery, conns);
SqlDataReader reader = cmd.ExecuteReader();
tbl.Load(reader);
retval = true;
conns.Close();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}

return retval;
}

public bool insertReg(String strfname, String strlname, String strusername, String strpass,
String strcontact, String strmail, String strAddr, String strdatesize)
{
bool retval = false;
String strQuery = "INSERT INTO tblLogin( [Firstname], [LastName], [Username],
[Passeord], [Contact], [Mail], [Address], [DataSize] ) VALUES ('" + strfname + "','" +
strlname + "','" + strusername + "','" + strpass + "','" + strcontact + "','" + strmail + "','" +
strAddr + "','" + strdatesize + "')";
try
{
String Connstr = ConfigurationManager.AppSettings["ConnString"];
SqlConnection conns = new SqlConnection(Connstr);
conns.Open();
SqlCommand cmd = new SqlCommand(strQuery, conns);
cmd.ExecuteNonQuery();
retval = true;
conns.Close();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}

return retval;
}

public bool GetUserInfo(ref DataTable tbl)


{
bool retval = false;
String strQuery = "SELECT [Username], [SentTraffic], [TrafficAccpt] FROM tblLogin";
try
{
String Connstr = ConfigurationManager.AppSettings["ConnString"];
SqlConnection conns = new SqlConnection(Connstr);
conns.Open();
SqlCommand cmd = new SqlCommand(strQuery, conns);
SqlDataReader reader = cmd.ExecuteReader();
tbl.Load(reader);
retval = true;
conns.Close();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}

return retval;
}

public bool SetRequest(String strname, String strrequet )


{
bool retval = false;
String strQuery = "UPDATE tblLogin SET [TrafficAccpt]='" + strrequet + "' WHERE
[Username]='" + strname + "'";
try
{
String Connstr = ConfigurationManager.AppSettings["ConnString"];
SqlConnection conns = new SqlConnection(Connstr);
conns.Open();
SqlCommand cmd = new SqlCommand(strQuery, conns);
cmd.ExecuteNonQuery();
retval = true;
conns.Close();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}

return retval;
}

public bool UpdateTraffic(String strname, String strrequet)


{
bool retval = false;
String strQuery = "UPDATE tblLogin SET [Traffic]='" + strrequet + "' WHERE
[Username]='" + strname + "'";
try
{
String Connstr = ConfigurationManager.AppSettings["ConnString"];
SqlConnection conns = new SqlConnection(Connstr);
conns.Open();
SqlCommand cmd = new SqlCommand(strQuery, conns);
cmd.ExecuteNonQuery();
retval = true;
conns.Close();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}

return retval;
}

public bool UpdateSentTraffic(String strname, String strrequet)


{
bool retval = false;
String strQuery = "UPDATE tblLogin SET [SentTraffic]='" + strrequet + "' WHERE
[Username]='" + strname + "'";
try
{
String Connstr = ConfigurationManager.AppSettings["ConnString"];
SqlConnection conns = new SqlConnection(Connstr);
conns.Open();
SqlCommand cmd = new SqlCommand(strQuery, conns);
cmd.ExecuteNonQuery();
retval = true;
conns.Close();
}
catch (Exception ex)
{
MessageBox.Show(ex.Message);
}

return retval;
}

}
}

11.2 Screen Shots


11.3 Bibliography
[1] (2011)Wikipedia[Online].Available:http://en.wikipedia.org /wiki/PageRank

[2] S.Mukherjee, “A probabilistic model for optimal searching of the deep Web”, 2003.

[3] (2011)Wikipedia[Online]Available:http://en.wikipedia.org /wiki/PageRank

[4] Zhen Liu and Philippe Nain, “Optimization issues in Web search Engines”, IBM
research,. 2006, VI, 981- 1015, DOI: 10.1007/978-0- 387-30165-5_34

[5] (2011) Affordable SEO services website. [Online]. Available: http://www.affordable-


seo-services.com/on-page- optimization.html

[6] (2011) Affordable SEO services website. [Online]. Available: http://www.affordable-


seo-services.com/off-page- optimization.html

[7] (2011) Search engine optimization website [Online] Available:http://seo.yu-


hu.com/glossary/off_page _optimization.htm

[8] (2011) Google website [Online] Available: http://www .google.com/.../search-engine-


optimization-Starter-guide.pdf

[9] Fuxue Wang; Yi Li; Yiwen Zhang; Coll. of Econ. & manage, “An empirical study on
the search engine optimization technique and its outcomes,” Artificial Intelligence,
Management Science and Electronic Commerce (AIMSEC), Aug. 2011.

[10] (2011) HubspotBlog [Online] Available: http://blog.hubspot


.com/blog/tabid/6307/bid/5014/Study-Shows-BusinessBlogging-Leads-to-55-More-
Website-Visitors.aspx

Vous aimerez peut-être aussi