- Open Access
- Total Downloads : 5
- Authors : G. Logeswari, K. Sangeetha
- Paper ID : IJERTCONV3IS15040
- Volume & Issue : NCACS – 2015 (Volume 3 – Issue 15)
- Published (First Online): 24-04-2018
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Mobile Auction System using Internet
G. Logeswari, K. Sangeetha
PG-Scholar, Assistant Professor SNS College of Technology, Coimbatore
Abstract:- Online Auction services handle many transactions per day. Users can access a client, via the Internet, and view or modify investments, query up-to-date stock information, and purchase or trade shares. The client software can request trade information from many sources. Therefore, the client must adhere to the distributed computing paradigm to obtain data from external servers. Web services a technology that can be used to accomplish these tasks. This project presents a simulation of the how trading companies can interface with web services, and tap into external sources to obtain information. The project attempts to unfold the issues that companies face when building client software to access services.
Keywords: Auction Service, android mobile, Administrator
An Auction is Latin work which means augment. Auction is a bid, a process of selling; buying and services offered take place. There are several different types of auctions and certain rules exist for each auction. There are variations for an auction which may include minimum price limit, maximum price limit and time limitations etc. Depending upon the auction method bidder can participate remotely or in person. Remote auction include participating through telephone, mail, and internet. Shopping online has widely grown; online auction system is increasing rapidly. Online auction is becoming more and more popular in electronic commerce and hence it should system must increase its quality and security.
I I TYPES OF AUCTION SYSTEM
In live terms, English auctions are where bids are announced by either an auctioneer or by the bidders and winners pay what they bid to receive the object. English auctions are claimed to be the most common form of third- party on-line auction format used and is deemed to appear the most simplistic of all the forms. The common operational method of the format is that it is an ascending bid auction in which bids are open for all to see. The winner is the highest bidder and the price is the highest bid. The popularity of the English auction is due to the fact that it uses a mechanism that people find familiar and intuitive and therefore reduces transaction costs. It also transcends the boundaries of a traditional English auction where physical presence is required by the bidders, making it increasingly popular even though there is a susceptibility to various forms of cheating.
Type of forward auction, in which usually a single item is offered for sale. Bidding starts with a low price, and is raised incrementally as progressively higher bids are solicited, until either the auction is closed or no higher bids are received. Often the seller sets a reserve price below which the item is not sold and the auction is aborted. Perhaps the most common form of auction, it allows a seller to secure the highest price for an item.
Dutch auctions are the reverse of English auctions whereby the price begins high and is systematically lowered until a buyer accepts the price. Sites that offer Dutch auction services are usually misleading and the term 'Dutch' tends to have become common usage for the use of a uniform- price rule in a single unit auction as opposed to how it is originally intended for that of a declining price auction. However, with actual on-line Dutch auctions where the price is descending, it was found that auctions have on average a 30% higher ending price than first-price auctions with speculation pointing to bidder impatience or the effect of endogenous entry on the Dutch auction.
First-price sealed-bid auctions are when a single bid is made by all bidding parties and the single highest bidder wins, and pays what they bid. The main difference between this and English auctions is that bids are not openly viewable or announced as apposed to the competitive nature which is generated by public bids. From the game-theoretic point of view, the first-price sealed-bid auction is strategically equivalent to the Dutch auction; that is, in both auctions the players will be using the same bidding strategies.
A Vickrey auction, sometimes known as a second-price sealed-bid auction, uses very much the same principle as a first-price sealed bid. However, the highest bidder and winner will only pay what the second highest bidder had bid. Online auctions where bidders utilize a proxy bidding system is a close resemblance to that of a Vickrey design for single item auctions, however due to the fact that the bidder is able to change their bid at a later date means it is not a true representation of the Vickrey auction. The Vickrey auction is suggested to prevent the incentive for buyers to bid strategically, due to the fact it requires them to speak the truth by giving their true value of the item.
Reverse auctions are where the roles of buyer and seller are reversed. Multiple sellers compete to obtain the buyer's
business and prices typically decrease over time as new offers are made. They do not follow the typical auction format in that the buyer can see all the offers and may choose which they would prefer. Reverse auctions are used predominantly in a business context for procurement.
III WIRELESS COMMUNICATIONS
The necessary networking infrastructure for wireless mobile computing in general combines various wireless networks including cellular, wireless LAN, private and public radio, satellite services, and paging. In wireless networks, digital signals are modulated into electro- magnetic carriers that propagate through space with about at the speed of light. The carriers used are radio waves or infrared light. In wireless telecom networks, the carrier frequencies used are around 900 MHz (European GSM),
1.8 GHz (GSM in America, DECT in Europe). 2.4 GHz and 5.8 GHz are also allocated for wireless networks. There are numerous modulation techniques developed for digital signals that suit to different environment, including frequency and amplitude modulation, frequency shift modulation, as well as pulse coded modulation. The basic benefit of digital communications over analog ones is that there are only two different values (zero and one) to be modulated to the carrier and thus optimal schemes can be chosen. As a net result, bandwidth can be freed to other usage whenever analog wireless communications are replaced by digital ones. The physical layer design of the wireless networks is not directly important in this context, although all the consequences are derived from the properties of the radio waves (infrared connections are not interesting in this context).
The handsets in the wireless radio networks are normally not always communicating with the network infrastructure,
they are unreachable. There are numerous reasons for this behaviour that can be described under C(communication)- autonomy. First, disconnections may be voluntary, e.g., when the user deliberately avoids network access during night time, or while in a meeting, or in other places where the user does not want to be disturbed. In the case where the handset does not have voice capabilities, and thus disturbing is not a big issue, it is still often reasonable to cut the wireless communications with the network to reduce cost, power consumption, or bandwidth use. The break in on-going communication orincapability to set up any communication can also happen against the will of the user, e.g. when a user enters a physical area where there is not any ornot enough field strength for a successful communication (a typical example is the train entering a tunnel, which often leads to an abrupt decrease in the field from the device point of view), battery becomes suddenly empty, or hand-over between base stations does not succeed and the connection is therefore lost.When analyzing the different situations, one must differentiate between non-reachability of the device from the network because the user wants to exhibit her C- autonomy and non-reachability of the device against the
will of the user. The latter can be called disconnection in the strong sense, if there was an ongoing connection between the terminal and the network when the device became unreachable for the network. But if the user just shut down the radio transmitter in the middle of a connection, then this is a disconnection only from the network point of view. It is a voluntary disconnection from the user's point of view. Disconnections can be categorized in various ways from the point of view of the user, hand- held terminal, or the network infrastructure. Disconnections are either predictable or sudden from some point of view. For example, voluntary disconnections are predictable from the user point of view. From the device point of view they can be sudden. Clearly predictable disconnections from the device point of view include those that can be detected by changes in the signal strength, by predicting the battery lifetime, or by utilizing knowledge of the bandwidth distribution. They become predictable to the user only if the device informs her about them in advance. Sudden are the disconnections that cannot be predicted by any of the parties. In general, if the disconnection can be predicted by the device, it ca usually inform the network infrastructure and the user of the immediate disconnection and then perform it properly. If it is sudden from the device point of view, there is no time or possibility to do anything before the connection breaks. Afterwards, the device can of course inform the user about loss of connection. These are the most difficult situations from the application point of view. From the communication infrastructure point of view, there is not much difference whether the connection just breaks or whether it knows about it just before it happens; sometime after the disconnection it will anyhow release the resources allocated for the connection if nothing happens anymore.
In the case of many wireless networks, such as in cellular or satellite networks, communication channels have much less transfer capacity than wireline network. This is caused by the fact that the used modulation and channel allocation schemes designed for voice traffic have rather modest upper bounds. Further, the wireless communications are much more error prone than the wireline communications and require much redundancy in the channel coding of the payload. In spite of the redundancy in the channel coding that makes correcting bit errors in large scale possible at the receiving end, retransmission of the data is required more often than in the wireline network. Further, the protocol overhead (headers) requires certain amount of the channel capacity, as in any network. Therefore, the available nominal transfer capacity of a channel is used rather inefficiently. E.g. GSM network offers typically 9.6 or 14.4 kbits/s transfer capacity for both downlink and uplink directions for the application data over CSD, although the nominal capacity of a logical channel used is 30 kbits/s.
Mobile devices that are of interest to MEC can be divided into four categories based on their processor, memory and battery capacity, application capabilities (SMS, WAP, Web), as well as physical size and weight. These categories are (from weakest to strongest): usual voice handsets with SMS capability, WAP phones, Communicators/PDA+wireless communication capability, and finally laptops with wireless communication facilities. To be easily carried around, mobile devices must be physically light and small. Everybody, who has dragged a 3 kg laptop would say that it is not practical for anywhere anytime computing. On the other hand, a usual wireless phone weighing less than 100 g is easy to carry but cumbersome to write anything long due to the small multifunction keypad. PDA class is a compromise that has already the WAP and/or Web capabilities. Such considerations, in conjunction with a given cost and level of technology, will keep mobile elements having less resources than static elements
IV CUSTOMER TO CUSTOMER (C2C)
Auction-based electronic commerce has become more popular in the past few years. Numerous Web-based auction sites have been set up to support both consumer- oriented and business-oriented transactions. To complement the existing Internet auction services, software agents (or simply agents) are expected to become more commonly used to provide sophisticated and fully automated auction services.
To achieve this goal, many agent-based auction systems are being developed worldwide. we investigate the design of auction agents for a mobile based auction system called the Consumer-to-Consumer (C2C) Mobile based Internet Commerce System . Our focus is to design auction agents with different bidding strategies to facilitate mobile application.
The Online Auctioning System was successfully designed and is tested for accuracy and quality. During this project we have accomplished all the objectives and this project meets the needs of the organization. The developed will be used in searching, retrieving and generating information for the concerned requests.
Reduces the entry work.
Easy retrieval of information.
Reduced errors due to human intervention.
User friendly screens to enter the data.
Portable and flexible for further enhancement.
Fast finding of information requested.
. It is not possible to develop a system that makes all the requirements of the user. User requirements keep changing as the system is being used. Some of the future enhancements that can be done to this system are: As the technology emerges, it is possible to upgrade the system and can be adaptable to desired environment.
Because it is based on object-oriented design, any further changes can be easily adaptable.
Based on the future security issues, security can be improved using emerging technologies.
Sub admin module can be added.
Security is a key issue in MEC transactions. In general, security and trust in e-commerce transactions can be achieved with the following security functions Authentication and non-repudiation: each party needs to be able to authenticate its counterpart, i.e. to make sure that the counterpart is the one s/he claims to be and that s/he doesnt deny later on agreements s/he has approved earlier Integrity: each party needs to make sure that received messages are not altered or fabricated by other than their counterpart
Confidentiality: each party wants to keep the content of their communication secret
Message Authentication: each party wants to make sure that the received messages do really come from his counterpart
Techniques like the asymmetric cryptographic algorithm (also called Public Key algorithm) are used to achieve these results, with a Certification Authority (CA) which issues certificates and a Public Key Infrastructure (PKI) for generating, revoking, updating, recovering etc. certificates and keys
As Online Auction System applications and wireless devices are evolving rapidly, one will take forward the other one towards empowering innovation, versatility and power in them. There are a number of business opportunities and grand challenges of bringing forth viable and robust wireless technologies ahead for fully ralizing the enormous strength of m-commerce in this Internet era and thereby meeting both the basic requirements and advanced expectations of mobile users and providers.
Dr.K.Ravikumar, A.Udhayakumar :Secure Multiparty Electronic Payments In Mobile Computing International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 1, January 2013
A. T. Bhole1, Sheetal Chaudhari2: Web Based Security using Online Password Authentication in Mobile Application International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Nandini Sidnal and S. S. Manvi: Automated Bidding in English Auctions Using Cognitive Agents in Mobile Commerce International Journal of Information and Education Technology, Vol. 2, No. 2, April 2012.
Wen-Hsi Chang a,, Jau-Shien Chang b: An effective early fraud detection method for online auctions Electronic Commerce Research and Applications 11 (2012) 346360
Chonho Lee, Ping Wang, Dusit Niyato: A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications
Daniel Granlund, Dan Johansson, Karl Andersson, Robert BrÃ¤nnstrÃ¶m: A Case Study of Application Development for Mobile and Location- Based Services.
Kholekile L. Gwebu: Decision Support In Multi-Attribute Reverse Auctions Commerce International Journal of Information and EducationTechnology.