Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. INTRODUCTION
. Some social media sites have greater virality - defined as a greater likelihood that users will
re-share content posted (by another user) to their social network. Many social media sites
provide specific functionality to help users re-share content. Users can share contents like
images, videos and texts. The shared videos can be reviewed by the viewers by liking,
commenting or by expressing their dislike. When the response from users exceeds a limit the
content becomes viral which will bring concerned authorities to about the content.
The main purpose of this application is to provide a social media platform to post contents
anonymously (users are provided with options to reveal their identity or not) and fearlessly.
This doesnt mean that they are allowed to share any adult content or abusive texts. These
types of contents will be automatically filtered. If somebody witness a crime or suppose a
scene where some official accepting bribe, user who has captured visual can upload video
fearlessly since his identity remain unrevealed.
The android module helps users to capture and upload video and images using the device
camera. The android application will have the same features of the website module like,
viewing, sharing, commenting etc. In order to upload contents a user must specify the
category in which the content belongs.
The content filtering techniques are based on Image filtering technique, Dynamic Threshold
using Multi-Colour Space and text filtering based on rules and settings. The proposed
filtering technique is based on multi color space of RGB,YCbCr and HSV. These color spaces
will be used to model skin pixels.
Here, we present
Viral
facebook or instagram Today social networks provide very little support to prevent unwanted
messages or abusive materials or adult contents. For example, Facebook allows users to state
who is allowed to insert messages in their walls (i.e., friends, friends of friends, or defined
groups of friends). However, no content-based preferences are supported and therefore it is
not possible to prevent undesired messages, such as political or vulgar ones, no matter of the
user who posts them. Providing this service is not only a matter of using previously defined
web content mining techniques for a different application, rather it requires to design ad-hoc
classification strategies. Skin colour modelling is used to separate the skin and non skin
pixels by building a decision rules. For instance, explicit threshold, statistical-based method
and neural network are general categories of skin colour modelling. The explicit threshold
technique uses single or multiple fixed boundaries for each colour space. Skin pixels are the
pixels that fall within these boundaries and others are classified as non-skin. In nonparametric technique, a histogram for the given colour space is built and then converted to a
probability density function (PDF). If the PDF of a given pixels exceeds a predefined
threshold it is considered as skin. On the other hand, parametric techniques used a modelled
colour space with a prescribed shape.
Today, social networking applications are implemented as centralized services,
forcing users to trust corporations with their personal data. Although decentralized designs
for such applications can provide privacy, they are difficult to achieve on current devices due
to constraints on connectivity, energy, and bandwidth. Centralized solutions come at the cost
of user privacy. Individuals are forced to trust corporations to not misuse their data or sell it
to third parties. They must also trust companies to guard their data against malicious hackers
or repressive governments. These concerns are amplified by the very personal nature of data
generated on mobile devices. But there are some disadvantages such as contents may not be
suitable for users of all age groups, little support for privacy, filtering techniques are complex
and time consuming, less secure, chances for misuse of data. The main features of this system
are security and privacy of users, automatic filtering of content, safe for users of any age ,it
will bring social issues to limelight, users can share contents to other communities like
whatsapp etc.
Viral
2.LITERATURE SURVEY
Viral
synchronisation overhead which permits frequent synchronisation even for bandwidth limited
device.For this reasons , Cimbiosys is adopted preferably.
3. SYSTEM ANALYSIS
Dept. of Computer Science & Engineering
Viral
5
We have to now analyse the existing system so that the actual need for a new system
can be determined. On analysing we are able to determine the drawbacks and can overcome
those in our developing system. System analysis helps us in developing an effective and
efficient system.
Viral
3.2PROBLEM STATEMENTS
Contents in the recent systems may not be suitable for users of all age groups. It provides a
little support for privacy. Filtering techniques are complex and time consuming. It is less
secure. Chances for misuse of data is high.
Viral
4. FEASIBILITY STUDY
This is done by investigating the existing system in the area under investigation or
generally ideas about a new system.It is the test of a system proposal according to its work
ability, impact on organization, ability to meet user needs and effective needs of
resources.The objective of feasibility study is to acquire a sense of the scope of the problem.
The feasibility study categorizes as follows :
Technical feasibility
Operational feasibility
Economic feasibility
4.1TECHNICAL FEASIBILITY
Technical Feasibility centres on existing system and checks up to what extent it can
support the proposed modifications.Java and IDE Eclipse with android platform along with
.net and visual studio is used for the development of proposed system and is considered as the
best tools for the applications.The assessment of technical feasibility must be based on an
outline design of system requirements .Visual studio and Android SDK are used.Microsoft
SQL is used to store related data.The hardware requirements involve only a PC.The proposed
system is a combination of an android application and a web module.Hence the system is
technically feasible due to above reasons.
4.2OPERATIONAL FEASIBILITY
It visualises whether the software will operate after it is developed and be operative
once it is installed. Also analyses whether users will adapt to new software.. System is
developed by giving prime importance to the ease with which the end users can operate on
the system. Anyone can use it by installing the application on their phone, without any help
of others. Proper authentication methods will be installed in the system so that it has nothing
to do with the people who are not well informed of the system. It also analyses whether users
will adapt to new software. Security and privacy of users are considered.
Viral
Viral
5. COST ESTIMATION
Cost estimation is one of the most important steps in the project management. The
cost estimation establishes the base line of the project cost at different stages of project
development .For proper application of the app we need a smart phone (Rs 4000) and a dual
core processor (Rs 23000)The cost of this project is derived from effort, hardware cost etc.
Effort: As this project is completely computerized, less number of manpower will be used.
Training Cost: One Software personnel will be allotted for providing training to the
manpower allotted for developing the project.
Required Hardware
Estimated Cost
24000/-
Android phone
4000/-
Viral
10
A software lifecycle is the series of identifiable stages that a software undergoes
REQUIREMENT ANALYSIS
FEASIBILITY STUDY
DESIGN
IMPLEMENTATION
TESTING
MAINTANANCE.
1)REQUIREMENT ANALYSIS
Viral
11
It involves gathering information about what the customer needs and defining the problem
that the product is expected to solve.It is done by making questionnaire,arranging the
interview by sampling etc.
2)SYSTEM DESIGN
Defining the software and hardware architecture, components, modules,interface and data
satisfies the specified requirements.
3)IMPLEMENTATION
Constructing the product as per design specification developed in the previous step.
Performed by a development team consists of programmer,interface designers and other
specialist using tools such as compiler, interpreter, debugger, assembler and media editor.
4)EDITING
Methodically verify to ensure that they are error free and fully meet the requirements in the
first step.
5)INSTALLATION
Once the product has been tested and certified as fit for use,and involves preparing system or
product for installation and use at the customer site.
6)MAINTENANCE
After installation and involves making modification to the system or an individual component
to alter attitudes or improve performance.
7. REQUIREMENT SPECIFICATION
Dept. of Computer Science & Engineering
Viral
12
Registration and login: Any user or admin needs to be registered to access an account which
does have a corresponding id and password, using which he/she could enter into the
registered account and enjoy the facilities provided by the application.
Uploading and downloading: Being the key feature of the viral app, uploading is done
automatically as soon as the media is being captured. in case if the user requires any media
which is present in the website to be downloaded to the mobile, it could be done.
Rating the posts: Rating of the posts by the registered users enhances the concept of viral.
The more the post is rated ,the more viral it is.
Accessing location and rate based medias: The process of searching and accessing post
based on its location and rating is possible.
Providing feedback and notification: The communication between application
Viral
13
Core and the users are enhanced by providing feedback (user to admin) and notification
(admin to user).
Content removing: Presence of any irrelevant posts can be removed by any user from his
account or by the admin from the entire site, rather than the filtering process which is done
automatically.
Security
Reliability
Viral
14
Registration
View
content
Upload/
Download
Rating
Content
Removal
USER
Blacklisting
ADMIN
Feedback
.
Notification
ACTOR
Viral
15
USE CASE
ASSOCIATION
SYSTEM BOUNDARY
Fig 7.2: Symbols used in Use Case Diagram
8. SYSTEM REQUIREMENTS
8.1 SOFTWARE REQUIREMENTS
It is the specifications of the software components used in the project
Operating system
IDE
SQL
Languages
Technologies
:
:
:
:
:
Android ,Windows 8
Visual studio, Eclipse
Server 2008
c#.Net , java, HTML, XML
Asp.net , Android
8.1.1 Android
Android is a mobile operating system (OS) currently developed by Google, based on the
Linux kernel and designed primarily for touch screen mobile devices such as smart phones
and tablets. Android's user interface is based on direct manipulation, using touch gestures that
loosely correspond to real-world actions, such as swiping, tapping and pinching, to
manipulate on-screen objects, along with a virtual keyboard for text input. In addition to
Dept. of Computer Science & Engineering
Viral
16
touch screen devices, Google has further developed Android TV for televisions, Android
Auto for cars, and Android Wear for wrist watches, each with a specialized user interface.
Variants of Android are also used on notebooks, game consoles, digital cameras, and other
electronics. As of 2015, Android has the largest installed base of all operating systems.[11] It is
the second most commonly used mobile operating system in the United States, while iOS is
the first.[12]
Initially developed by Android, Inc., which Google bought in 2005, [13] Android was unveiled
in 2007, along with the founding of the Open Handset Alliance a consortium of hardware,
software, and telecommunication companies devoted to advancing open standards for mobile
devices.[14] As of July 2013, the Google Play store has had over one million Android
applications ("apps") published, and over 50 billion applications downloaded.[15] An April
May 2013 survey of mobile application developers found that 71% of developers create
applications for Android,[16] and a 2015 survey found that 40% of full-time professional
developers see Android as their priority target platform, which is comparable to Apple's iOS
on 37% with both platforms far above others. [17] At Google I/O 2014, the company revealed
that there were over one billion active monthly Android users, up from 538 million in June
2013.[18]
Android's source code is released by Google under open source licenses, although most
Android devices ultimately ship with a combination of open source and proprietary software,
including proprietary software required for accessing Google services. [3] Android is popular
with technology companies that require a ready-made, low-cost and customizable operating
system for high-tech devices. Its open nature has encouraged a large community of
developers and enthusiasts to use the open-source code as a foundation for community-driven
projects, which add new features for advanced users or bring Android to devices originally
shipped with other operating systems. At the same time, as Android has no centralised update
system most Android devices fail to receive security updates: research in 2015 concluded that
almost 90% of Android phones in use had known but unpatched security vulnerabilities due
to lack of updates and support. The success of Android has made it a target for patent
litigation as part of the so-called "smart phone wars" between technology companies.
8.1.2 Windows 8
Dept. of Computer Science & Engineering
Viral
17
Windows 8 is a personal computer operating system developed by Microsoft as part
8.1.3 Eclipse
Eclipse is an integrated development environment (IDE). It contains a base workspace
and an extensible plug-in system for customizing the environment. Written mostly in Java,
Eclipse can be used to develop applications. By means of various plug-ins, Eclipse may also
be used to develop applications in other programming languages : Ada, ABAP, C, C++,
COBOL, Fortran, Haskell, JavaScript, Lasso, Lua, Natural, Perl, PHP, Prolog, Python, R,
Ruby, Scala, Clojure, Groovy, Scheme and Erlang. It can also be used to develop packages
for the software Mathematica. Development environments include the Eclipse Java
development tools (JDT) for Java and Scala, Eclipse CDT for C/C++ and Eclipse PDT for
PHP, among others.
Dept. of Computer Science & Engineering
Viral
18
8.1.5 SQL
Structured Query Language is a special purpose programming language designed
for managing data held in a relational database management system(RDBMS).Originally
based upon relational algebra and tuple relational calculus, SQL consist of a data definition
language and a data manipulation language. The scope of SQL includes data insert, query,
update and delete, scheme creation and modification, and data access control. Although SQL
is often described as, and to a great extend is, a declarative languages (4GL), it also includes
procedural elements.SQL was one of the first commercial languages for Edgar.F.Codds
relational model. Despite not entirely adhering to the relational model as described by code, it
became the most widely used database language.
8.1.6 C#.NetC#
syntax is highly expressive, yet it is also simple and easy to learn. The curly-brace syntax of
C# will be instantly recognizable to anyone familiar with C, C++ or Java. Developers who
know any of these languages are typically able to begin to work productively in C# within a
very short time. C# syntax simplifies many of the complexities of C++ and provides powerful
features such as nullable value types, enumerations, delegates, lambda expressions and direct
memory access, which are not found in Java. C# supports generic methods and types, which
provide increased type safety and performance, and iterators, which enable implementers of
collection classes to define custom iteration behaviors that are simple to use by client code.
Language-Integrated Query (LINQ) expressions make the strongly-typed query a first-class
language construct.As an object-oriented language, C# supports the concepts of
encapsulation, inheritance, and polymorphism. All variables and methods, including the Main
method, the application's entry point, are encapsulated within class definitions. A class may
inherit directly from one parent class, but it may implement any number of interfaces.
Methods that override virtual methods in a parent class require the override keyword as a way
to avoid accidental redefinition. In C#, a struct is like a lightweight class; it is a stackallocated type that can implement interfaces but does not support inheritance.C# programs
run on the .NET Framework, an integral component of Windows that includes a virtual
execution system called the common language runtime (CLR) and a unified set of class
libraries. The CLR is the commercial implementation by Microsoft of the common language
infrastructure (CLI), an international standard that is the basis for creating execution and
Dept. of Computer Science & Engineering
Viral
19
8.1.7 Java
Java is a general purpose, high-level programming language developed by
Sun Microsystems. A small team of engineers, known as the Green Team,
initiated the language in 1991. Java was originally called OAK, and was designed
for handheld devices and set-top boxes. Oak was unsuccessful, so in 1995 Sun
changed the name to Java and modified the language to take advantage of the
burgeoning World Wide Web.Later, in 2009, Oracle Corporation acquired Sun
Microsystems and took ownership of two key Sun software assets: Java and
Solaris.Java is an object-oriented language similar to C++, but simplified to
Viral
20
Java is a general purpose programming language with a number of features that make the
language well suited for use on the World Wide Web. Small Java applications are called Java
applets and can be downloaded from a Web server and run on your computer by a Javacompatible Web browser.Applications and websites using Java will not work unless Java is
installed on your device. When you download Java, the software contains the Java Runtime
Environment (JRE) which is needed to run in a Web browser. A component of the JRE, the
Java Plug-in software allows Java applets to run inside various browsers.
8.1.8 HTML
HTML is a computer language devised to allow website creation. These websites can then be
viewed by anyone else connected to the Internet. It is relatively easy to learn, with the basics
being accessible to most people in one sitting; and quite powerful in what it allows you to
create. It is constantly undergoing revision and evolution to meet the demands and
requirements of the growing Internet audience under the direction of the W3C, the
organisation charged with designing and maintaining the language.The definition of HTML is
HyperText Markup Language.HyperText is the method by which you move around on the
web by clicking on special text called hyperlinks which bring you to the next page. The
fact that it is hyper just means it is not linear i.e. you can go to any place on the Internet
whenever you want by clicking on links there is no set order to do things in.Markup is
what HTML tags do to the text inside them. They mark it as a certain type of text (italicised
text, for example).HTML is a Language, as it has code-words and syntax like any other
language.HTML consists of a series of short codes typed into a text-file by the site author
these are the tags. The text is then saved as a html file, and viewed through a browser, like
Internet Explorer or Netscape Navigator. This browser reads the file and translates the text
into a visible form, hopefully rendering the page as the author had intended. Writing your
own HTML entails using tags correctly to create your vision. You can use anything from a
rudimentary text-editor to a powerful graphical editor to create HTML pages.
8.1.9 XML
Extensible Markup Language (XML) is a markup language that defines a set of
rules for encoding documents in a format which is both human-readable and
Viral
21
including
Microsoft
Office
(Office
Open
XML),
OpenOffice.org
and
LibreOffice (OpenDocument), and Apple's iWork. XML has also been employed as
the base language for communication protocols, such as XMPP. Applications for
the Microsoft .NET Framework use XML files for configuration. Apple has an
implementation of a registry based on XML. [8]XML has come into common use for
the interchange of data over the Internet. IETF RFC 7303 gives rules for the
construction of Internet Media Types for use when sending XML.
8.1.10 ASP.NET
ASP.NET is an open-source server-side Web application framework designed for Web
development to produce dynamic Web pages. It was developed by Microsoft to allow
programmers to build dynamic web sites, web applications and web services.It was first
released in January 2002 with version 1.0 of the .NET Framework, and is the successor to
Microsoft's Active Server Pages (ASP) technology. ASP.NET is built on the Common
Language Runtime (CLR), allowing programmers to write ASP.NET code using any
supported .NET language. The ASP.NET SOAP extension framework allows ASP.NET
components to process SOAP messages.ASP.NET is in the process of being re-implemented
as a modern and modular web framework, together with other frameworks like Entity
Framework. The new framework will make use of the new open-source .NET Compiler
Platform (code-name "Roslyn") and be cross platform. ASP.NET MVC, ASP.NET Web API,
and ASP.NET Web Pages (a platform using only Razor pages) will merge into a unified MVC
6. The project is called "ASP.NET vNext".
Viral
22
: Intel Pentium IV
: 256 MB
Hard disk
: 80 GB
Device
8.2.1 Processor
A processor is logic circuitry that responds to and process the basic instruction that
drive a computer. Here we use Pentium 4 processor. Pentium 4 is a line of single core desktop
and laptop central processing unit introduced by Intel on November 2000. The two classical
matrices of CPU performance is IPC and clock speed.
8.2.2 RAM
Random Access Memory is a form of data storage. It allows stored data to be accessed
directly in any random order. Today random access memory takes the form of integrated
circuits. Strictly speaking modem types of DRAM are not random access as data is read in
bursts, although the name DRAM/RAM has sheet. In addition, sensing as temporary storage
and working space for the OS and application, Ram is used in numerous other ways.
Viral
23
Viral
24
9. SYSTEM DESIGN
System design is the process of defining the architecture, components, modules and
data for a system to satisfy specific requirements. Systems design could be seen as the
application of systems theory to product development. It is widely used for modelling
software systems and is increasingly used for high design non-software systems and
organizations.
9.1
MODULE DESCRIPTION
Consist of 3 modules:
Android device: It consist of a single element:Camera app: An android phone having a camera module will support this
app. When
the user downloads the app the software camera part of the android phone he/she uses will be
related to the camera settings of the VIRAL app.
Web Service: Web services are provided through the web methods.
Web methods: This act as an interface between the android device and the web module. The
web methods provides all the services which act as a link.
Viral
25
Viral
26
Viral Counting And Rating: Rating is the key feature of viral of the application and based on
the count of the rating, the post is listed as a viral post or a non viral post.
Viral
27
user could login to access the common website page. Once the application is downloaded the
users android phone camera will be related to a set of software through which the physical
camera is linked to the viral application. This makes it possible for the user to access the
mobile phone camera on behalf of this particular application. Thus, when an image or video
is captured by accessing the camera through the viral application, the captured media is
automatically uploaded to the viral website. Any registered member of the application who
has login to the website can view any such uploaded medias. The concept of viral become
prominent when the visitors of the website rate the post by liking and commenting it. More
the rating more viral is that particular post. Once any post acquires high rating in a limited
time, that is if the post is viral it is automatically send as a mail to a privileged group related
to the website (other than the admin) named as the authority. The authorities are those
members who has designations in different socially relevant jobs (example :collector). Each
person in the authority will receive only those post related to their job. If a person is
continuously posting an irrelevant post then the admin can able to block that person.
Viral
28
2. PROCESS
A process is a business activity or function where the manipulation and transformation of
data take place.A process can be decomposed finer level of details,representing how data is
being processed within the process.
3. DATA FLOW
Dept. of Computer Science & Engineering
Viral
29
A data flow represents the flow of information with its direction represented by an arrow
head that shows at the end(s) of flow connector .
Authority
Viral
30
Admin
Viral
31
A database is a collection of interrelated data stored with minimum redundancy to
serve many use to make quickly and efficiently.The general way is to make information
accessing easy, quick, inexpensive and flexible for the user.In the data base design several
objectives are considered controlling redundancy, ease of learning and use, data dependence,
more information at low cost,accuracy and integrity are some of them.
In this phase,information from the ER diagram is used to design the data base.The
entities in the ER diagram represent the table that have to be created and the attributes
represent the fields that are in each table.
Viral
32
Content Table
Viral
33
from user, proper validation, checks are performed in the input page to check whether the
user let the required field blank or incorrect data has been placed if so, message will be
generated by the system.
User registration: In order to use this application first time, user must register here. User
provide their personal details for this registration. Then user can easily use this app. This is
similar to sign up process.
User login page: Once a user register in this website, they need only login process same as
the sign in process. This does not need all the personal details.User details: There are IMEI
number and IP address as the user details. Using this admin can take actions against user.
Location: This will help to identify the place where the media is posted.
Medias: The information posted is the important feature of this app. This includes audios,
videos, images etc. Automatic filtering of medias are helps to reduce the misuse of app.
Medias can be uploaded/ downloaded or removed.
Like, Comment, Feedback: All these things are the part of user. User can like or dislike,
comment on the medias and able to give the feedback about this app. Based on the rating
information will reach at the authority.
View comments: Any user can view the comments that may given by other users. Rating is
determined from comments.
View notification: Admin may send some notifications to user. That may include reply for
feedback or blacklisting etc.
Viral
34
View rating: Each user can rate the medias according to the quality of it. The top rated
contents will automatically send to corresponding authority.
View comments: Any user can view the comments that may given by other users. Rating is
determined from comments.
View notification: Admin may send some notifications to user. That may include reply for
feedback or blacklisting etc.
11. TESTING
Software testing is a critical element of software quality assurance and represents the
ultimate reviews of specification, design, and coding. Testing is vital to the success of the
system. Errors can be injected at any stage during development. System testing makes a
logical assumption that if all the parts of the system are correct, the goal will be successfully
achieved. During testing, the program to be tested is executed with set of test data and the
output of the program for the test data is evaluated to determine if the program is performing
as expected. A series of testing are performed for the proposed system before the system is
ready for user acceptance testing.
The testing tips are:
Unit testing
Integration testing
System testing
Black box testing
Viral
35
Data can be tested across an interface, one module can have adverse effect on another,
sub function when combined may not produced the desired function. Integration testing is a
systematic technique for constructing the program structure while at the same time
conducting test to uncover errors associated within interface.
completion of the project with the help of the user by negotiation to establish a method for
resolving deficiencies. Thus the proposed system under consideration has been tested by
using system testing and found to be working satisfactorily.
12. CONCLUSION
We believe that we are able to implement our project in a fair and good manner with
respect to the existing system. The system is a new concept which changes the outlook of
social medias. The viral application helps in bringing the importance of social media in
Dept. of Computer Science & Engineering
Viral
36
human life to a productive form by easily making it possible to bring socially impact events
into the limelight. Since this is very user friendly and easily available in play stores and
above all due to its relevance it is expected to be a success.
REFERENCES
[1] https://www.facebook.com/FacebookIndia?brand_redir=1
[2] https://about.twitter.com/
[3] https://www.whatsapp.com/android/current/whatsapp.apk
Viral
37
GLOSSARY
1. SDLC
2. SQL-
3. User-
4. Testing-
Viral
38