Event management system is used to manage all the activity related to event. In any event many service providers work simultaneously and it is very hard to manage these providers. It is also important for event organizer that he has all the contacts details of these service providers so that he can contact them any time to plan an event at given time. To manage all these activity we have developed this software. To get success in the event management business, user should have strong network contacts of service provider. These contacts are essentially providers of specific services who can be mobilized quickly to participate in any given event. To make an event successful event manager needs different service provider like Sound systems services, Lighting providers, Canteen services, stage construction and so on. In present system event company have to do all management work manually. They keep all payment information on papers. There is no system to check the past expenses on any event. To do this they have to check payment register and this task is very time consuming and tiresome. Keeping all these problem in mind we have developed this system. This system helps the event management company to manage their paper work online and they can also retrieve report of last event they have completed.
Following are the main module in this system.
1.Title- “Event Management”
NC Techsoft is an Event Management agency established in 2000 to cater to growing potential of events in brand-awareness building. Huge universe of Events falls under different categories. Large technology firms may hold events, which are essentially seminars, and workshops that popularize or spread awareness on their products. An automobile company may hold an event to launch a new model of a car. A soft drink company may hold a series of events across many cities to get attention on their specific brand of soft drink and so on.
NC Techsoft realized that one of key ingredients of success in this business was the extent of networked contacts the company had at any point in time. These contacts are essentially providers of specific services who can be mobilized quickly to participate in any given event. For example, in a Rock Show event to popularize a brand of soft drink, several key service providers are required – Sound systems, Lighting providers, Canteen services, stage construction and so on. And since NC Techsoft was interested in carrying out operations in all metros in India, it was important to develop these contacts across the country and make it all available for NC Techsoft agents on the touch of a button.
NC Techsoft saw itself as a company completely backed by Information Technology. Although its main office was in Mumbai, its Account Managers would travel to all the metro locations, interacting with clients and soliciting their business. NC Techsoft decided to create an extremely efficient Information System in the backend and make their Account Managers use this system wherever they are through the Internet.
NC Techsoft sits with client to get details on all of the above parameters. NC Techsoft maintains an exhaustive list of Service Providers (or Vendors) who provide a specialized service, which forms part of the overall event. For example, there are more than 5-6 service providers in the category of Audio Systems providers, almost 3-4 entries each in every city for caterers, 10-12 entries for Disc Jockeys, 10 entries for stage lighting and so on. As you would observe, there are several categories of services under which vendors are classified. There are many vendors who may provide the same service and selection would be based on appropriate criteria for the event.
Another important entity in the Events business is Sponsors. Sponsors are either companies or specific departments within companies who have specific event budgets, which may be solicited for to host certain kinds of events. For example, as part of a Rock Festival event, 3 to 4 sponsors may be involved to cover specific areas of expenditure. A particular readymade Jeans brand company may sponsor ticket printing and sales, another company may sponsor lighting and so on. NC Techsoft is well networked with sponsors across the country. By bringing appropriate sponsors to events, event gets funded adequately and decisions are also taken in a speedy manner. Lack of funds often delay events, which means revenue losses for NC Techsoft.
After initial interactions happen with a client, the first thing to do is to create an estimate for the event for which NC Techsoft is responsible. Based on the requirements for the event, the various services needed are listed down and based on the rates of a specific service provider, the rates are quoted. Different services would have different specifications and units for quoting rate. For example, in the case of Sound Systems, the exact type and power of sound systems need to be specified and rates would be on a per-day basis. Catering would be on number of people with rate quoted per person.
The Estimate/proposal should also reflect the specific scheduling of tasks within the event. The overall event would have specific dates with a description of what would happen and when. The detailed proposal would also outline when a specific service would be delivered and in place. For example, in a Rock Show event slated for, say, November 10th, setting up the multi-layer stage would finish by 8th November, Sound systems would be in place by 9th November and so on. The proposal would schedule all required services and elements for event. One of the items in the estimate would be NC Techsoft Professional charges which would be a fixed amount depending on the event and its complexity.
After negotiations, a contract is signed after firming up the rates and the schedules. NC Techsoft assigns an Event Coordinator for the event who would have complete responsibility for the successful conduct of the event. The primary responsibility of the Event Coordinator is to ensure that the Service Providers are contacted, briefed and purchase orders generated for availing their service. Thereafter, there should be a strict monitoring of dates and the quality of service provided by the vendors. Delays should be trapped in time so that there is scope for corrective action. With events, the final event dates can never be changed and therefore Event Coordinators need information of every specific detail all the time. That is the role of Information Systems.
Currently, there is no formal system by which orders are generated to service providers or for recording when such services were delivered and if the services were of the right quality. So information is passed around verbally and this has caused considerable problems. Events often relied on the memory capacity of the Coordinators to remember every bit of what needs to be done, based on notes made on diaries and notes. Moreover, if services for an event were provided from a different city or if the event itself was conducted in multiple cities, it was extremely difficult to coordinate various activities and telephone calls were the only means of sharing information.
This project can be purely considered for the RDBMS category. Why? Well there are many reasons in support.
Spiral Model
This model has many cycles. The radial dimension represents the cumulative cost incurred in accomplishing the steps done so far, and angular dimension represents the progress made in completing each cycle of the spiral.
A spiral model is divided into a number of framework activities, also called task regions. Typically, there are between three and six task regions.
The spiral model is a realistic approach to the development of large-scale systems and software. Because software evolves as process progresses, the developer and customer better understand and react to risks at each evolutionary level. The spiral model uses prototyping as a risk reduction mechanism but more important enables the developer, to apply the prototyping approach at any stage in the evolution of the product. It maintains the systematic stepwise approach suggested by the classic lifecycle but incorporates it into an iterative framework that more realistically reflects the real world. The spiral model demands a direct consideration of technical risks at all stages of the project and, if properly applied, should reduce risks before they become problematic.
Tools / Platform:-
Technology and Environment
· Servers – SQL Server 2008, Microsoft Windows 2000
· Clients – Microsoft Internet Explorer
· Tools – Visual Studio 2010
· Services – Payment Gateway Web Services from Bank
Client End – Internet Explorer, Operating System(Any)
Development End – Visual Studio 2010, Operating System.
Servers – Microsoft Windows 2000, Microsoft SQL Server 2000
Services – ASP.NET XML Web Services
Which uses a calendar–oriented chart to represent the project schedule. Each activity is represented as a bar in the calendar, starting from the starting date of activity and ending at the ending date for that activity. The start and end of each activity become milestones (or check points) for the project. Coloring each milestone when completed can represent progress. The milestone or checkpoints are usually at the completion of each task.
Let us draw the Gantt chart for each task identified in these project .the horizontal bars indicates the duration of each task and all project tasks are listed in the left handed column. We estimate the no. of days for each task as follows: -Selection of Organization-10 days, Selection of problem-7days,Collection of information –25 days ,Analysis of information –10 days ,Designing application – 40 days ,Coding for the application -45 days , Review the specification –7days, Verification/Validation – 7 days, Testing -18 days , Dummy activity –5 days , Implementation and follow-up –10 days, user training –7 days.
Drawback of GANTT Chart: The main drawback of Gantt chart is that it does not depict the dependency relationships among the different activity.
The success of any large-scale project is very much dependent upon the quality of planning, scheduling and controlling of the various phase of the project. Unless some type of planning and coordinating tool is used, number of phases does not to be very large before management starts losing controls. One such OR tool used on large-scale project to aid management in expanding and controlling the utilization of personnel, material, facilities, and time is program evaluation and review technique (PERT). This technique is used to pinpoint critical areas in a project necessary adjustments can be made in order to meet the schedule completion date the project.
Project scheduling by PERT consist of four main steps:-
Planning
Scheduling
Allocating of resources
Controlling
The Pert chart of the overall implementation is shown in following figures:-
NODEDESCRIPTIONUTILIZE THE NO. OF DAYS1Selection of organization10 Days2Selection of problem7 Days3Collecting the information25 Days4Analysis of information10 Days5Designing of the Application40 Days6Coding for Application45 Days7Review the specification7 Days8Validation / Verification7 Days9Testing18 Days10Dummy activity5 DaysTHE PERT Chart is representing the interdependencies among tasks. The PERT provides quantitative tools that allow software planner to determine the critical path. The PERT Chart use is justified in large projects.
Data modeling is a method used to define and analyze data requirements needed to support the business processes of an organization. The data requirements are recorded as a conceptual data model with associated data definitions. Actual implementation of the conceptual model is called a logical data model. To implement one conceptual data model may require multiple logical data models. Data modeling defines the relationships between data elements and structures.[2] Data modeling techniques are used to model data in a standard, consistent, predictable manner in order to manage it as a resource. use of this standard is strongly recommended for all projects requiring a standard means of defining and analyzing the data resources within an organization.
The functional model shows how output values in an computation are derived from input values, without regard for the order in which the values are computed. The functional model consists of multiple data flow diagrams which show the flow from external inputs, through operations and internal data stores, to external outputs. The functional model also includes constraints among values within an object model.
Data Dictionary
A data dictionary is a “centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.” term may have one of several closely related meanings pertaining to databases and database management systems (DBMS):
DFD (Data flow diagram) of event management systme
A DFD is a graphical representation that depicts information flow and the transforms that are applied as data move from input to output. The DFD may be used to represent a system or software at any level of abstraction DFD’s may be partitioned into levels that represent increasing information flow and functional details. The DFD provides a mechanism for functional modeling as well as information flow modeling.
A level “O” DFD, also called a fundamental system model or a context model , represents the entire software element as single bubble with input and output data indicated by incoming and outgoing arrows respectively.
A level “1” DFD contain five or six bubbles with interconnecting arrows. Each of the processes represented at level 1 is a sub function of the overall system.
Similarly DFD level 1 can be refined into next level 2 .The information flow continuity has been maintained between each levels.
The general theme behind database design is to handle information as on integrated whole. There is none of the artificiality that is normally embedded in separate files or applications. A database is a collection of interrelated data stored with minimum redundancy to serve many users quickly and efficiently. The general objective is to make information access easy, quick, inexpensive and flexible for the user. In database design of this project several objectives were considered.
* The database tables that have been identified for storing data are:
C# is an elegant and type-safe object-oriented language that enables developers to build a wide range of secure and robust applications that run on .NET Framework. You can use C# to create traditional Windows client applications, XML Web services, distributed components, client-server applications, database applications, and much, much more. Microsoft Visual C# 2005 provides an advanced code editor, convenient user interface designers, integrated debugger, and many other tools to facilitate rapid application development based on version 2.0 of the C# language and the .NET Framework.
C# syntax is highly expressive, yet with less than 90 keywords, it is also simple and easy to learn. The curly-brace syntax of C# will be instantly recognizable to anyone familiar with C, C++ or Java. Developers who know any of these languages are typically able to begin working productively in C# within a very short time. C# syntax simplifies many of the complexities of C++ while providing powerful features such as null able value types, enumerations, delegates, anonymous methods and direct memory access, which are not found in Java. C# also supports generic methods and types, which provide increased type safety and performance, and iterations , which enable implementers of collection classes to define custom iteration behaviors that are simple to use by client code.
C# build process is simple compared to C and C++ and more flexible than in Java. There are no separate header files, and no requirement that methods and types be declared in a particular order. A C# source file may define any number of classes, structs, interfaces, and events.
C# programs run on the .NET Framework, an integral component of Windows that includes a virtual execution system called the common language runtime (CLR) and a unified set of class libraries. The CLR is Microsoft’s commercial implementation of the common language infrastructure (CLI), an international standard that is the basis for creating execution and development environments in which languages and libraries work together seamlessly.
Source code written in C# is compiled into an intermediate language (IL) that conforms to CLI specification. The IL code, along with resources such as bitmaps and strings, is stored on disk in an executable file called an assembly, typically with an extension of .exe or .dll. An assembly contains a manifest that provides information on the assembly’s types, version, culture, and security requirements..
SQL Server is a client/server database system. The server runs the SQL Server database software, which processes requests submitted by the database client software and sends the results back to the client. The SQL Executive and the SQL Server Database Engine service are examples of database services performed by SQL Server. The SQL Server software is arranged in multiple layers. The Net-Library layer, which accepts connections from clients, hides the network connectivity details when a client communicates with a server running SQL Server. Net-Libraries use interprocess communication (IPC) mechanisms such as named pipes, remote procedure calls (RPCs), and Windows Sockets. Several Net-Libraries are included with SQL Server for both the server and the client. Net-Libraries on server listen for client connection attempts.
The future is quite bright for the system. It has to reach all of the people on their mobile sets.
So the system will became more popular.
📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Software coding and Machine construction
🎓 Postgraduate/Undergraduate Research works
📥 Instant Whatsapp/Email Delivery
The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...
The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...
The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...
The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...
The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...
The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...
Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...
Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...
Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...