www.seminarsonly.com

 

 

E-Bidding

 

Abstract

Auctions are among the latest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared.

Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price. This price is then increased until only one bidder is willing to buy the object, and the exact manner in which this is done varies. In my model a bidder who drops out at some price can "reenter" at a higher price.

With the invention of E-commerce technologies over the Internet the opportunity to bid from the comfort of ones own home has seen a change like never seen before. Within the span of a few short years, what may have began as an experimental idea has grown to an immensely popular hobby, and in some cases, a means of livelihood, the Auction Patrol gathers tremendous response everyday, all day. With the point and click of the mouse, one may bid on an item they may need or just want, and in moments they find that either they are the top bidder or someone else wants it more, and you're outbid! The excitement of an auction all from the comfort of home is a completely different experience.

Society cannot seem to escape the criminal element in the physical world, and so it is the same with Auction Patrols. This is one area wherein a question can be raised as to how safe Auction Patrols.

Proposed system

  1. To generate the quick reports
  2. To make accuracy and efficient calculations
  3. To provide proper information briefly
  4. To provide data security
  5. To provide huge maintenance of records
  6. Flexibility of transactions can be completed in time

After understanding the existing system and understanding the need for developing a new system different people involved in the related activities have been consulted. The data needed for the study has been collected from company records.

The computerization of this system would avoid the wrong interpretation and bad calculation of data .The system help the user to see any documents, source code, tasks, activities, team information with details at the click of a button. The record data is maintained and backed up such a way that data is not loss. The speed of the system could also increase.

The general description gives an "executive overview" and is very client-oriented. It expounds on the functional and data requirements of the application. It also lists the limitations, assumptions and dependencies of the application. Section 3.0, the specific requirements section, includes the developers' technical view of the client's expectation of the application. It also touches on the performance and quality requirements of the application and provides a solid definition of the interface

The entire system is divided into 2 major modules

1. Admin

2. Buyer

HARDWARE REQUIREMENTS:

  • RAM : 128MB
  • HARD DISK : MINIMUM 20 GB

SOFTWARE REQUIREMENTS:

  • OPERATING PLATFORM : WINDOWS 2000/NT/XP
  • RDBMS : SQLSERVER 2000
  • SOFTWARE : VS.NET 2005
  • FRONT END TOOL : ASP.NET

 

 

 

 

<< back

Related Projects : Diamond Web-Hosting , Digital Signature , Distributed Computing For E-Learing ,Document Manager ,Drive 2 Destiny ,E-Bidding ,E-Buy ,e-FASHION ,E-Gift Shoppe ,E-Post Office ,E-Pricing ,E-Tutor Online Jobs ,E2M Conference ,Easy Leave , Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks ,Effective Scheduling In Infrastructure-Based Cognitive Radio Networks ,Efficient Location Training Protocols for Heterogeneous Sensor and Actor Networks ,Electronic Cash Controller ,Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computing ,Energy Maps for Mobile Wireless Networks ,Ensuring Data Storage Security in Cloud Computing ,Enterprise Fleet Management System ,Enterprise Security Services ,ERP System ,Examination Branch System ,Exam Experts ,Extended XML Tree Pattern Matching ,Ezee Mail System ,Fast Detection Of Mobile Replica Node Attacks ,A Fault-Tolerant Token Based Atomic Broadcast Algorithm

 
Copyright © V2computers 2006 through 2017