CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM

Similar documents
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

A Fast Pattern-Matching Algorithm for Network Intrusion Detection System

LOAD BALANCING AS A STRATEGY LEARNING TASK

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Content Inspection Director

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Accessing Private Network via Firewall Based On Preset Threshold Value

Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET

Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU

ISSN Vol.04,Issue.19, June-2015, Pages:

Load balancing as a strategy learning task

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Contributing Efforts of Various String Matching Methodologies in Real World Applications

The Design and Implementation of Content Switch On IXP12EB

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

A Prediction-Based Transcoding System for Video Conference in Cloud Computing

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

Research Article. ISSN (Print) *Corresponding author Shi-hai Zhu

Efficient Iceberg Query Evaluation for Structured Data using Bitmap Indices

Data Deduplication Scheme for Cloud Storage

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

Network Attack Platform

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Developing a CRM Platform: a Bulgarian case

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

ACCESS DEFINED CLOUD BASED MULTIVARIANT RESPONSE SYSTEM WITH CACHING

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

DRAFT Gigabit network intrusion detection systems

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) STUDENT INFORMATION MANAGEMENT SYSTEM (SIMS) HEMN BARZAN BDALLA 2, 3 1, 2*

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

DEVELOPING AND ENHANCING THE METHOD OF DISTRIBUTED FIREWALLS MONITORING DATABASE IN HOME USER SYSTEM

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

PROCEDURE Issued: October 5, 2001 Effective Date: September 14, 2000

A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

A Study of Network Security Systems

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Knowledge, Innovations and Technologies Integration Nurturing Electronic Insurance Business

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Floating Point Fused Add-Subtract and Fused Dot-Product Units

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

An Enhanced B+ Packet Search for Cloud Network Security

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification

Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August ISSN

SOCIAL CUSTOMER RELATIONSHIP MANAGEMENT (SCRM) IN INDIAN RETAIL INDUSTRY

Protecting Websites from Dissociative Identity SQL Injection Attacka Patch for Human Folly

2.1. The Notion of Customer Relationship Management (CRM)

Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks

Spam Detection Using Customized SimHash Function

Implementation of Video Voice over IP in Local Area Network Campus Environment

Cisco Prime Network Analysis Module Software 5.1 for WAAS VB

Exploring Resource Provisioning Cost Models in Cloud Computing

Data Integration Models for Operational Data Warehousing

Deadline Based Task Scheduling in Cloud with Effective Provisioning Cost using LBMMC Algorithm

CLOUD BASED PEER TO PEER NETWORK FOR ENTERPRISE DATAWAREHOUSE SHARING

Challenges and Approaches in Providing QoS Monitoring

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB _v02

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

A STUDY ON THE INTEGRATION OF QFD-PMMM IN CLOUD COMPUTING SYSTEM QUALITY. Received June 2010; accepted September 2010

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Profile Based Personalized Web Search and Download Blocker

LDA Based Security in Personalized Web Search

Accelerating High-Speed Networking with Intel I/O Acceleration Technology

DATA MINING ANALYSIS TO DRAW UP DATA SETS BASED ON AGGREGATIONS

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

Harnessing the power of advanced analytics with IBM Netezza

A Low Cost Two-Tier Architecture Model For High Availability Clusters Application Load Balancing

Data management using Virtualization in Cloud Computing

Res. J. Appl. Sci. Eng. Technol., 5(7): , 2013

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.

Trusted Platforms for Homeland Security

Associate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2

Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 8, February 2015

Chapter 3: Dynamic Performance Provisioning with

Transcription:

CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM 1 G.VIJAY, 2 S.PORKAMALAM 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai. ABSTRACT: Customer Relationship Management or CRM is a business strategy designed to optimize revenue and increasing customer satisfaction, attracting new customer, retaining existing customers and understanding customers better. A successful CRM implementation can improve the business process by improving selling and servicing functions. Because of the internet, markets move faster and competition is much more fierce. Currently they employ diverse information system to maintain different aspect of customer relationships separate system often give incomplete and outdated information on the customer. CRM provides an integrated system to maintain good relationship with customer. CRM is the fastest growing segment of the enterprise application market today. The major driver of this growth is the internet. The rapid growth of E-commerce has caused the most significant change in CRM application. CRM packages allow the organization to internet with, sell to and service Customers through different channels. Keywords: CRM, WEB ANALYSIS. I. INTRODUCTION Because of internet, customers have more choices. Offering good products alone is not enough. Meeting their needs so thoroughly that they keep coming back will help us a lot. Web enabled interaction and information delivery helps us to meet their needs easily. System Analysis is first stage according to System Development Life Cycle model. This System Analysis is a process that starts with the analyst. Analysis is a detailed study of the various operations performed by a system and their relationships within and outside the system. One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate should consider other related systems. During analysis, data is collected from the available files, decision points, and transactions handled by the present system. Logical system models and tools are used in analysis. Training, experience, and common sense are required for collection of the information needed to do the analysis. Page 375

II.EXISTING SYSTEM: Customer Relationship management system is a web application; it is a client-server base application. Sales, Service is very important for product and it requires well-equipped and good software for accuracy and fast service. PROBLEM DEFINITION Maintained by VB and Oracle. No data security is ensured. Any query requires time consuming in searching records. Information cannot be given in time. Difficult to keep track of records. PROPOSED SYSTEM Deliver an efficient computerized system. Provides user-friendly interface. Avoid data inconsistency and maintain integrity. Mailing facility helps to give feedback. Easy maintenance of data and customer service made easier through mobile interface. IV.MODULES Customer Relationship Management is a system, which provides a good relationship between dealer and the customer. The main work starts after selling of the product to the customer. If any customer is purchasing any product and after few days if they got any problem in the purchased product then customer only has to logon to the systems and enter there customer-id and secret password. The project consists of two Modules: Dealer Module Customer Module Page 376

Reports Module Customer Module: In this module the customer enters into the website as soon as he finds a problem with the product he bought from the dealer for registration of the problem. For this initially the customer has to get himself registered into the website then only he can sign in into the website and give the complaint. Although the customer is a valid person he also must be with in the warranty and guarantee periods for the customer has to pay or not to pay the money. Dealer Module: In this module the work of the dealer or the administrator is to manage all the contents in the website and also to verify and update all the data of the customers i.e. who ever are with in the Guarantee and Warranty periods so that the system allows them not to pay the money when they enter into the website for the registration of their problem with the product. He also has to search for the system engineer who ever is located nearby to the customer house in order to rectify the problem associated with the customer. Dealer also has to verify the information provided by the customer during his registration of the complaint i.e. whether he is a valid customer or not and all the details related to his address and mobile numbers. Reports Module: The system has to send message to the engineer with all the details of customer and their product s problem. The engineer has to enter time while going to the customers place and he has to send an online message to the dealer if he has any requirement of the spare parts and then thy will be provided to the engineer. Submission Module: Page 377

At the end of the work engineer has to enter the work duration and customer remark. On this basis only the higher authority will find out the efficiency of the engineer. V. CONCLUSIONS The project has been appreciated by all the users in the organization. It is easy to use. User friendly screens are provided. The usage of web application increases the efficiency, decreases the effort. It also provides the user with variable options in exporting. It has been thoroughly tested and implemented. Although the current system is confined to a local LAN network it can be enhances to provide support internet related services within the same IDE. Improvements can be done to provide better security to the sources so as to protect from illegal tampering and theft of data. VI. REFERENCES [1] Chieh-Jen Cheng, Chao-Ching Wang, Wei-Chun Ku, Tien-Fu Chen, and Jinn- Shyan Wang, Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security Commun. vol. 51, pp. 62 70,2011. [2] O. Villa, D. P. Scarpazza, and F. Petrini, Accelerating real-time string searching with multicore processors, Computer, vol. 41, pp. 42 50,2008. [3] D. P. Scarpazza, O. Villa, and F. Petrini, High-speed string searching against large dictionaries on the Cell/B.E. processor, in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2008, pp. 1 8. [4] D. P. Scarpazza, O. Villa, and F. Petrini, Peak-performance DFA based string matching on the Cell processor, in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2007, pp. 1 8. [5] L. Tan and T. Sherwood, A high throughput string matching architecture for intrusion detection and prevention, in Proc. 32nd Annu. Int. Symp. Comput. Arch., 2005, pp. 112 122. [6] S. Dharmapurikar, P. Krishnamurthy, and T. S. Sproull, Deep packet inspection using parallel bloom filters, IEEE Micro, vol. 24, no. 1, pp.52 61, Jan. 2004. Page 378

Powered by TCPDF (www.tcpdf.org) International Journal of Advanced Research in [7] R.-T. Liu, N.-F. Huang, C.-N. Kao, and C.-H. Chen, A fast string matching algorithm for network processor-based intrusion detection system, ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614 633, 2004. [8] F. Yu, R. H. Katz, and T. V. Lakshman, Gigabit rate packet pattern matching using TCAM, in Proc. 12th IEEE Int. Conf. Netw. Protocols, 2004, pp. 174 178.intrusion detection system, ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614 633, 2004. [9] R. S. Boyer and J. S. Moore, A fast string searching algorithm, Commun. ACM, vol. 20, pp. 762 772, 1977. [10] V. Aho and M. J. Corasick, Efficient string matching: An aid to bibliographic search, Commun. ACM, vol. 18, pp. 333 340, 1975 Page 379