Sei sulla pagina 1di 38

Viral

1. INTRODUCTION
. Some social media sites have greater virality - defined as a greater likelihood that users will
re-share content posted (by another user) to their social network. Many social media sites
provide specific functionality to help users re-share content. Users can share contents like
images, videos and texts. The shared videos can be reviewed by the viewers by liking,
commenting or by expressing their dislike. When the response from users exceeds a limit the
content becomes viral which will bring concerned authorities to about the content.
The main purpose of this application is to provide a social media platform to post contents
anonymously (users are provided with options to reveal their identity or not) and fearlessly.
This doesnt mean that they are allowed to share any adult content or abusive texts. These
types of contents will be automatically filtered. If somebody witness a crime or suppose a
scene where some official accepting bribe, user who has captured visual can upload video
fearlessly since his identity remain unrevealed.
The android module helps users to capture and upload video and images using the device
camera. The android application will have the same features of the website module like,
viewing, sharing, commenting etc. In order to upload contents a user must specify the
category in which the content belongs.
The content filtering techniques are based on Image filtering technique, Dynamic Threshold
using Multi-Colour Space and text filtering based on rules and settings. The proposed
filtering technique is based on multi color space of RGB,YCbCr and HSV. These color spaces
will be used to model skin pixels.
Here, we present

a communication platform that enables efficient, decentralized social

networks on smartphones. Contrail is centered on a simple cloud-based messaging layer that


enables basic connectivity between smartphones, letting them efficiently and securely
exchange encrypted data with other devices.
A viral video or image is that becomes popular through a viral process of Internet sharing,
typically through content sharing websites, social media and email. The proposed application
is a social networking concept mainly having two modules one android module along with a
website. The VIRAL app is entirely different from existing social media application like
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

facebook or instagram Today social networks provide very little support to prevent unwanted
messages or abusive materials or adult contents. For example, Facebook allows users to state
who is allowed to insert messages in their walls (i.e., friends, friends of friends, or defined
groups of friends). However, no content-based preferences are supported and therefore it is
not possible to prevent undesired messages, such as political or vulgar ones, no matter of the
user who posts them. Providing this service is not only a matter of using previously defined
web content mining techniques for a different application, rather it requires to design ad-hoc
classification strategies. Skin colour modelling is used to separate the skin and non skin
pixels by building a decision rules. For instance, explicit threshold, statistical-based method
and neural network are general categories of skin colour modelling. The explicit threshold
technique uses single or multiple fixed boundaries for each colour space. Skin pixels are the
pixels that fall within these boundaries and others are classified as non-skin. In nonparametric technique, a histogram for the given colour space is built and then converted to a
probability density function (PDF). If the PDF of a given pixels exceeds a predefined
threshold it is considered as skin. On the other hand, parametric techniques used a modelled
colour space with a prescribed shape.
Today, social networking applications are implemented as centralized services,
forcing users to trust corporations with their personal data. Although decentralized designs
for such applications can provide privacy, they are difficult to achieve on current devices due
to constraints on connectivity, energy, and bandwidth. Centralized solutions come at the cost
of user privacy. Individuals are forced to trust corporations to not misuse their data or sell it
to third parties. They must also trust companies to guard their data against malicious hackers
or repressive governments. These concerns are amplified by the very personal nature of data
generated on mobile devices. But there are some disadvantages such as contents may not be
suitable for users of all age groups, little support for privacy, filtering techniques are complex
and time consuming, less secure, chances for misuse of data. The main features of this system
are security and privacy of users, automatic filtering of content, safe for users of any age ,it
will bring social issues to limelight, users can share contents to other communities like
whatsapp etc.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

2.LITERATURE SURVEY

CONTRAIL: DECENTRALIZED AND PRIVACY-PRESERVING SOCIAL NETWORKS


ON SMART PHONES.
Mobile devices are increasingly used for social networking applications, which share
data between devices belonging to different users. forcing users to trust corporations with
their personal data. Although decentralisation designs provide privacy, they are difficult to
achieve on current devices due to the constraints on connectivity, energy and bandwidth.
Contrail is a communication platform that allows decentralized social networks that achieves
privacy preservation following all the above constraints.
PESCA: A Peer-to-Peer Social Network Architecture with Privacy-enabled Social
Communication and Data availability.
OSN providers are able to use users social data for different purposes or shutdown
OSN services without note since the provider is the only decision maker in the OSN.Users
are not able to share their social data with their friends with complete access control. Users
data must be available in the OSN when authorised data audiences want to access them.We
propose a P2P-OSN architecture which is composed of a privacy enabled setup for users
social communications. It has considerable improvements in providing data privacy and
availability compared with the existing approaches.
DEVA:
Event-based interaction is an attractive paradigm because its use can lead to highly
flexible and adaptable systems.Event anomalies can lead to unreliable, error-phone and hard
to debug behaviour in an event based system.DEvA automatically detects event anomalies ,
and exhibits high precision.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

IMPROVED SKIN DETECTION BASED ON DYNAMIC THRESHOLD USING MULTI


COLOUR SPACE:
Skin colour detection is used in applications such as adult image filtering , constant based
image retrieval(CBIR) , face tracking ,etc.Dynamic skin colour detection produce high false
positives result which lowers the accuracy of skin detection.Skin detection based on online
sample learning approach is more beneficial and does not require offline training dataset.
CIMBIOSYS: A platform for content based partial replication.
A replication platform that permits each device to define its own content based criteria
and to share updates with any other device. Compact

representation enables low

synchronisation overhead which permits frequent synchronisation even for bandwidth limited
device.For this reasons , Cimbiosys is adopted preferably.

3. SYSTEM ANALYSIS
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

5
We have to now analyse the existing system so that the actual need for a new system

can be determined. On analysing we are able to determine the drawbacks and can overcome
those in our developing system. System analysis helps us in developing an effective and
efficient system.

3.1 EXISTING SYSTEM


One fundamental issue in today Social Networks is to give users the ability to control the
messages posted on their own private space to avoid that unwanted content is displayed.
Today they provide very little support to prevent unwanted messages or abusive materials or
adult contents. For example, Facebook allows users to state who is allowed to insert messages
in their walls (i.e., friends, friends of friends, or defined groups of friends). However, no
content-based preferences are supported and therefore it is not possible to prevent undesired
messages, such as political or vulgar ones, no matter of the user who posts them. Providing
this service is not only a matter of using previously defined web content mining techniques
for a different application, rather it requires to design ad-hoc classification strategies.
Skin color modeling is used to separate the skin and nonskin pixels by building a
decision rules. For instance, explicit threshold, statistical-based method and neural network
are general categories of skin colour modeling. The explicit threshold technique uses single
or multiple fixed boundaries for each colour space. Skin pixels are the pixels that fall within
these boundaries and others are classified as non-skin. In non-parametric technique, a
histogram for the given colour space is built and then converted to a probability density
function (PDF). If the PDF of a given pixels exceeds a predefined threshold it is considered
as skin. On the other hand, parametric techniques used a modeled colour space with a
prescribed shape.
Today, social networking applications are implemented as centralized services,
forcing users to trust corporations with their personal data. Although decentralized designs
for such applications can provide privacy, they are difficult to achieve on current devices due
to constraints on connectivity, energy, and bandwidth. Centralized solutions come at the cost
of user privacy. Individuals are forced to trust corporations to not misuse their data or sell it
to third parties. They must also trust companies to guard their data against malicious hackers
or repressive governments. These concerns are amplified by the very personal nature of data
generated on mobile devices
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

3.2PROBLEM STATEMENTS
Contents in the recent systems may not be suitable for users of all age groups. It provides a
little support for privacy. Filtering techniques are complex and time consuming. It is less
secure. Chances for misuse of data is high.

3.3 PROPOSED SYSTEM


Some social media sites have greater virality - defined as a greater likelihood that users will
re-share content posted (by another user) to their social network. Many social media sites
provide specific functionality to help users re-share content. Users can share contents like
images, videos and texts. The shared videos can be reviewed by the viewers by liking,
commenting or by expressing their dislike. When the response from users exceeds a limit the
content becomes viral which will bring concerned authorities to about the content.
The main purpose of this application is to provide a social media platform to post contents
anonymously (users are provided with options to reveal their identity or not) and fearlessly.
This doesnt mean that they are allowed to share any adult content or abusive texts. These
types of contents will be automatically filtered. If somebody witness a crime or suppose a
scene where some official accepting bribe, user who has captured visual can upload video
fearlessly since his identity remain unrevealed.
The android module helps users to capture and upload video and images using the device
camera. The android application will have the same features of the website module like,
viewing, sharing, commenting etc. In order to upload contents a user must specify the
category in which the content belongs.
The content filtering techniques are based on Image filtering technique, Dynamic Threshold
using Multi-Colour Space and text filtering based on rules and settings. The proposed
filtering technique is based on multi color space of RGB,YCbCr and HSV. These color spaces
will be used to model skin pixels.
Here, we present

a communication platform that enables efficient, decentralized social

networks on smartphones. Contrail is centered on a simple cloud-based messaging layer that


enables basic connectivity between smartphones, letting them efficiently and securely
exchange encrypted data with other devices.
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

4. FEASIBILITY STUDY
This is done by investigating the existing system in the area under investigation or
generally ideas about a new system.It is the test of a system proposal according to its work
ability, impact on organization, ability to meet user needs and effective needs of
resources.The objective of feasibility study is to acquire a sense of the scope of the problem.
The feasibility study categorizes as follows :

Technical feasibility
Operational feasibility
Economic feasibility

4.1TECHNICAL FEASIBILITY
Technical Feasibility centres on existing system and checks up to what extent it can
support the proposed modifications.Java and IDE Eclipse with android platform along with
.net and visual studio is used for the development of proposed system and is considered as the
best tools for the applications.The assessment of technical feasibility must be based on an
outline design of system requirements .Visual studio and Android SDK are used.Microsoft
SQL is used to store related data.The hardware requirements involve only a PC.The proposed
system is a combination of an android application and a web module.Hence the system is
technically feasible due to above reasons.

4.2OPERATIONAL FEASIBILITY
It visualises whether the software will operate after it is developed and be operative
once it is installed. Also analyses whether users will adapt to new software.. System is
developed by giving prime importance to the ease with which the end users can operate on
the system. Anyone can use it by installing the application on their phone, without any help
of others. Proper authentication methods will be installed in the system so that it has nothing
to do with the people who are not well informed of the system. It also analyses whether users
will adapt to new software. Security and privacy of users are considered.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

4.3 ECONOMIC FEASIBILITY


Economic feasibility is used to determine the benefits expected from the candidate
system and to compare them with costs incurred. The staff does not requires any basic
training to operate the system as well as users require no special training. Thus intensive
training cost could be saved. The benefits that we obtain from this system like reducing man
power, reducing errors, publishing online notifications and less time consumption etc are
quite high when compared with the total cost involved in developing this system. Thus we
can say that the system is economically feasible. The user requires only an android phone
with camera as hardware requirements.No special charges on the user for downloading and
using the application.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

5. COST ESTIMATION
Cost estimation is one of the most important steps in the project management. The
cost estimation establishes the base line of the project cost at different stages of project
development .For proper application of the app we need a smart phone (Rs 4000) and a dual
core processor (Rs 23000)The cost of this project is derived from effort, hardware cost etc.
Effort: As this project is completely computerized, less number of manpower will be used.
Training Cost: One Software personnel will be allotted for providing training to the
manpower allotted for developing the project.

Required Hardware

Estimated Cost

Pentium dual core

24000/-

Android phone

4000/-

6. SOFTWARE ENGINEERING PARADIGM


Dept. of Computer Science & Engineering

AWH Engineering College

Viral

10
A software lifecycle is the series of identifiable stages that a software undergoes

during its lifetime. This is software development lifecycle(SDLC).SDLC adheres to


important phases essential for developers such as planning, analysis, design and
implementation. Many SDLC models have been created we use waterfall model. It is a
sequence of stages in which the output each stage becomes the input for the next .The various
phases of SDLC are
1)
2)
3)
4)
5)
6)

REQUIREMENT ANALYSIS
FEASIBILITY STUDY
DESIGN
IMPLEMENTATION
TESTING
MAINTANANCE.

Fig 6.1: Software Development Life Cycle

1)REQUIREMENT ANALYSIS

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

11

It involves gathering information about what the customer needs and defining the problem
that the product is expected to solve.It is done by making questionnaire,arranging the
interview by sampling etc.
2)SYSTEM DESIGN
Defining the software and hardware architecture, components, modules,interface and data
satisfies the specified requirements.
3)IMPLEMENTATION
Constructing the product as per design specification developed in the previous step.
Performed by a development team consists of programmer,interface designers and other
specialist using tools such as compiler, interpreter, debugger, assembler and media editor.
4)EDITING
Methodically verify to ensure that they are error free and fully meet the requirements in the
first step.
5)INSTALLATION
Once the product has been tested and certified as fit for use,and involves preparing system or
product for installation and use at the customer site.
6)MAINTENANCE
After installation and involves making modification to the system or an individual component
to alter attitudes or improve performance.

7. REQUIREMENT SPECIFICATION
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

12

7.1 FUNCTIONAL REQUIREMENTS


In software engineering, a functional requirement defines a function of a system and
its components. A function is described as a set of inputs, the behaviour, and the outputs.
Functional requirements may be calculations, technical details, data manipulation and
processing and other specific functionality that define what a system is supposed to
accomplish.
The functional requirements in viral are :
1)Registration and Login
2)Uploading and downloading
3)Rating the posts
4)Accessing location and rate based medias
5)Providing feedback and notification
6)Content removing

Registration and login: Any user or admin needs to be registered to access an account which
does have a corresponding id and password, using which he/she could enter into the
registered account and enjoy the facilities provided by the application.
Uploading and downloading: Being the key feature of the viral app, uploading is done
automatically as soon as the media is being captured. in case if the user requires any media
which is present in the website to be downloaded to the mobile, it could be done.
Rating the posts: Rating of the posts by the registered users enhances the concept of viral.
The more the post is rated ,the more viral it is.
Accessing location and rate based medias: The process of searching and accessing post
based on its location and rating is possible.
Providing feedback and notification: The communication between application

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

13

Core and the users are enhanced by providing feedback (user to admin) and notification
(admin to user).
Content removing: Presence of any irrelevant posts can be removed by any user from his
account or by the admin from the entire site, rather than the filtering process which is done
automatically.

7.2 NON-FUNCTIONAL REQUIREMENTS


A non-functional requirement is a requirement that specifies criteria that can also be
used to judge the operation of a system. The following are the non-functional requirements of
this application :
1)Performance
2)Security
3)Reliability
4)Maintainability
5)Portability
Performance

: It is faster than the existing system.

Security

: Provides high security by preventing unauthorised access.

Reliability

: The system can able to perform its required functions.

Maintainability: Any new changes can be accommodated easily.


Portability

: The system is portable to other operating system with .NET framework.

7.3 USECASE DIAGRAM


A use case diagram at its simplest is a representation of a users interaction with the
system and depicting the specifications of a use case. A use case diagram can portray the
different types of users of a system and the various ways that they interact with the system.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

14

Registration
View
content
Upload/
Download

Rating
Content
Removal
USER

Blacklisting

ADMIN

Feedback
.

Notification

Fig 7.1 : Use Case Diagram

ACTOR

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

15

USE CASE

ASSOCIATION

SYSTEM BOUNDARY
Fig 7.2: Symbols used in Use Case Diagram

8. SYSTEM REQUIREMENTS
8.1 SOFTWARE REQUIREMENTS
It is the specifications of the software components used in the project

Operating system
IDE
SQL
Languages
Technologies

:
:
:
:
:

Android ,Windows 8
Visual studio, Eclipse
Server 2008
c#.Net , java, HTML, XML
Asp.net , Android

8.1.1 Android
Android is a mobile operating system (OS) currently developed by Google, based on the
Linux kernel and designed primarily for touch screen mobile devices such as smart phones
and tablets. Android's user interface is based on direct manipulation, using touch gestures that
loosely correspond to real-world actions, such as swiping, tapping and pinching, to
manipulate on-screen objects, along with a virtual keyboard for text input. In addition to
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

16

touch screen devices, Google has further developed Android TV for televisions, Android
Auto for cars, and Android Wear for wrist watches, each with a specialized user interface.
Variants of Android are also used on notebooks, game consoles, digital cameras, and other
electronics. As of 2015, Android has the largest installed base of all operating systems.[11] It is
the second most commonly used mobile operating system in the United States, while iOS is
the first.[12]
Initially developed by Android, Inc., which Google bought in 2005, [13] Android was unveiled
in 2007, along with the founding of the Open Handset Alliance a consortium of hardware,
software, and telecommunication companies devoted to advancing open standards for mobile
devices.[14] As of July 2013, the Google Play store has had over one million Android
applications ("apps") published, and over 50 billion applications downloaded.[15] An April
May 2013 survey of mobile application developers found that 71% of developers create
applications for Android,[16] and a 2015 survey found that 40% of full-time professional
developers see Android as their priority target platform, which is comparable to Apple's iOS
on 37% with both platforms far above others. [17] At Google I/O 2014, the company revealed
that there were over one billion active monthly Android users, up from 538 million in June
2013.[18]
Android's source code is released by Google under open source licenses, although most
Android devices ultimately ship with a combination of open source and proprietary software,
including proprietary software required for accessing Google services. [3] Android is popular
with technology companies that require a ready-made, low-cost and customizable operating
system for high-tech devices. Its open nature has encouraged a large community of
developers and enthusiasts to use the open-source code as a foundation for community-driven
projects, which add new features for advanced users or bring Android to devices originally
shipped with other operating systems. At the same time, as Android has no centralised update
system most Android devices fail to receive security updates: research in 2015 concluded that
almost 90% of Android phones in use had known but unpatched security vulnerabilities due
to lack of updates and support. The success of Android has made it a target for patent
litigation as part of the so-called "smart phone wars" between technology companies.

8.1.2 Windows 8
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

17
Windows 8 is a personal computer operating system developed by Microsoft as part

of the Windows NT family of operating systems. Development of Windows 8 started before


the release of its predecessor, Windows 7 in 2009. It was announced at CES 2011, and
followed by the release of three pre-release versions from September 2011-May 2012. The
operating system was released to manufacturing on August 1, 2012, and was released for
general availability on October 26, 2012.

8.1.2 Microsoft Visual Studio 2010


Microsoft Visual Studio is an integrated development environment (IDE) from
Microsoft. It is used to develop computer programs for Microsoft Windows, as well as
websites, web applications and web services. Visual Studio uses Microsoft software
development platforms such as Windows API, Windows Forms, Windows Presentation
Foundation, Windows Store and Microsoft Silverlight. It can produce both native code and
managed code.
Visual Studio supports different programming languages and allows the code editor
and the debugger to support (to varying degrees) nearly any programming language, provided
a language-specific service exists. Build-in languages include C,C++,C++/CLI (via Visual C+
+), VB .NET (via Visual Basic .NET), C# (via Visual C#), and F# (as of Visual Studio 2010).
Support for other languages such as M, Python, and Ruby among others is available via
language services installed separately. It also supports XML/XSLT, HTML/XHTML,
JavaScript and CSS.

8.1.3 Eclipse
Eclipse is an integrated development environment (IDE). It contains a base workspace
and an extensible plug-in system for customizing the environment. Written mostly in Java,
Eclipse can be used to develop applications. By means of various plug-ins, Eclipse may also
be used to develop applications in other programming languages : Ada, ABAP, C, C++,
COBOL, Fortran, Haskell, JavaScript, Lasso, Lua, Natural, Perl, PHP, Prolog, Python, R,
Ruby, Scala, Clojure, Groovy, Scheme and Erlang. It can also be used to develop packages
for the software Mathematica. Development environments include the Eclipse Java
development tools (JDT) for Java and Scala, Eclipse CDT for C/C++ and Eclipse PDT for
PHP, among others.
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

18

8.1.5 SQL
Structured Query Language is a special purpose programming language designed
for managing data held in a relational database management system(RDBMS).Originally
based upon relational algebra and tuple relational calculus, SQL consist of a data definition
language and a data manipulation language. The scope of SQL includes data insert, query,
update and delete, scheme creation and modification, and data access control. Although SQL
is often described as, and to a great extend is, a declarative languages (4GL), it also includes
procedural elements.SQL was one of the first commercial languages for Edgar.F.Codds
relational model. Despite not entirely adhering to the relational model as described by code, it
became the most widely used database language.

8.1.6 C#.NetC#
syntax is highly expressive, yet it is also simple and easy to learn. The curly-brace syntax of
C# will be instantly recognizable to anyone familiar with C, C++ or Java. Developers who
know any of these languages are typically able to begin to work productively in C# within a
very short time. C# syntax simplifies many of the complexities of C++ and provides powerful
features such as nullable value types, enumerations, delegates, lambda expressions and direct
memory access, which are not found in Java. C# supports generic methods and types, which
provide increased type safety and performance, and iterators, which enable implementers of
collection classes to define custom iteration behaviors that are simple to use by client code.
Language-Integrated Query (LINQ) expressions make the strongly-typed query a first-class
language construct.As an object-oriented language, C# supports the concepts of
encapsulation, inheritance, and polymorphism. All variables and methods, including the Main
method, the application's entry point, are encapsulated within class definitions. A class may
inherit directly from one parent class, but it may implement any number of interfaces.
Methods that override virtual methods in a parent class require the override keyword as a way
to avoid accidental redefinition. In C#, a struct is like a lightweight class; it is a stackallocated type that can implement interfaces but does not support inheritance.C# programs
run on the .NET Framework, an integral component of Windows that includes a virtual
execution system called the common language runtime (CLR) and a unified set of class
libraries. The CLR is the commercial implementation by Microsoft of the common language
infrastructure (CLI), an international standard that is the basis for creating execution and
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

19

development environments in which languages and libraries work together seamlessly.Source


code written in C# is compiled into an intermediate language (IL) that conforms to the CLI
specification. The IL code and resources, such as bitmaps and strings, are stored on disk in an
executable file called an assembly, typically with an extension of .exe or .dll. An assembly
contains a manifest that provides information about the assembly's types, version, culture,
and security requirements.When the C# program is executed, the assembly is loaded into the
CLR, which might take various actions based on the information in the manifest. Then, if the
security requirements are met, the CLR performs just in time (JIT) compilation to convert the
IL code to native machine instructions. The CLR also provides other services related to
automatic garbage collection, exception handling, and resource management. Code that is
executed by the CLR is sometimes referred to as "managed code," in contrast to "unmanaged
code" which is compiled into native machine language that targets a specific system. The
following diagram illustrates the compile-time and run-time relationships of C# source code
files, the .NET Framework class libraries, assemblies, and the CLR.

8.1.7 Java
Java is a general purpose, high-level programming language developed by
Sun Microsystems. A small team of engineers, known as the Green Team,
initiated the language in 1991. Java was originally called OAK, and was designed
for handheld devices and set-top boxes. Oak was unsuccessful, so in 1995 Sun
changed the name to Java and modified the language to take advantage of the
burgeoning World Wide Web.Later, in 2009, Oracle Corporation acquired Sun
Microsystems and took ownership of two key Sun software assets: Java and
Solaris.Java is an object-oriented language similar to C++, but simplified to

eliminate language features that cause common programming errors. Java


source code files (files with a .java extension) are compiled into a format
called bytecode (files with a .class extension), which can then be executed
by a Java interpreter. Compiled Java code can run on most computers
because Java interpreters and runtime environments, known as Java
Virtual Machines (VMs), exist for most operating systems, including UNIX,
the Macintosh OS, and Windows. Bytecode can also be converted directly
into machine language instructions by a just-in-time compiler (JIT). In
2007, most Java technologies were released under the GNU General Public
License.
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

20

Java is a general purpose programming language with a number of features that make the
language well suited for use on the World Wide Web. Small Java applications are called Java
applets and can be downloaded from a Web server and run on your computer by a Javacompatible Web browser.Applications and websites using Java will not work unless Java is
installed on your device. When you download Java, the software contains the Java Runtime
Environment (JRE) which is needed to run in a Web browser. A component of the JRE, the
Java Plug-in software allows Java applets to run inside various browsers.

8.1.8 HTML
HTML is a computer language devised to allow website creation. These websites can then be
viewed by anyone else connected to the Internet. It is relatively easy to learn, with the basics
being accessible to most people in one sitting; and quite powerful in what it allows you to
create. It is constantly undergoing revision and evolution to meet the demands and
requirements of the growing Internet audience under the direction of the W3C, the
organisation charged with designing and maintaining the language.The definition of HTML is
HyperText Markup Language.HyperText is the method by which you move around on the
web by clicking on special text called hyperlinks which bring you to the next page. The
fact that it is hyper just means it is not linear i.e. you can go to any place on the Internet
whenever you want by clicking on links there is no set order to do things in.Markup is
what HTML tags do to the text inside them. They mark it as a certain type of text (italicised
text, for example).HTML is a Language, as it has code-words and syntax like any other
language.HTML consists of a series of short codes typed into a text-file by the site author
these are the tags. The text is then saved as a html file, and viewed through a browser, like
Internet Explorer or Netscape Navigator. This browser reads the file and translates the text
into a visible form, hopefully rendering the page as the author had intended. Writing your
own HTML entails using tags correctly to create your vision. You can use anything from a
rudimentary text-editor to a powerful graphical editor to create HTML pages.

8.1.9 XML
Extensible Markup Language (XML) is a markup language that defines a set of
rules for encoding documents in a format which is both human-readable and

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

21

machine-readable. It is defined by the W3C's XML 1.0 Specification[2] and by


several other related specifications, [3] all of which are free open standards.[4]The
design goals of XML emphasize simplicity, generality and usability across the
Internet.[5] It is a textual data format with strong support via Unicode for different
human languages. Although the design of XML focuses on documents, it is widely
used for the representation of arbitrary data structures[6] such as those used in
web services.Several schema systems exist to aid in the definition of XML-based
languages, while many application programming interfaces (APIs) have been
developed to aid the processing of XML data.Hundreds of document formats
using XML syntax have been developed,[7] including RSS, Atom, SOAP, and
XHTML. XML-based formats have become the default for many office-productivity
tools,

including

Microsoft

Office

(Office

Open

XML),

OpenOffice.org

and

LibreOffice (OpenDocument), and Apple's iWork. XML has also been employed as
the base language for communication protocols, such as XMPP. Applications for
the Microsoft .NET Framework use XML files for configuration. Apple has an
implementation of a registry based on XML. [8]XML has come into common use for
the interchange of data over the Internet. IETF RFC 7303 gives rules for the
construction of Internet Media Types for use when sending XML.

8.1.10 ASP.NET
ASP.NET is an open-source server-side Web application framework designed for Web
development to produce dynamic Web pages. It was developed by Microsoft to allow
programmers to build dynamic web sites, web applications and web services.It was first
released in January 2002 with version 1.0 of the .NET Framework, and is the successor to
Microsoft's Active Server Pages (ASP) technology. ASP.NET is built on the Common
Language Runtime (CLR), allowing programmers to write ASP.NET code using any
supported .NET language. The ASP.NET SOAP extension framework allows ASP.NET
components to process SOAP messages.ASP.NET is in the process of being re-implemented
as a modern and modular web framework, together with other frameworks like Entity
Framework. The new framework will make use of the new open-source .NET Compiler
Platform (code-name "Roslyn") and be cross platform. ASP.NET MVC, ASP.NET Web API,
and ASP.NET Web Pages (a platform using only Razor pages) will merge into a unified MVC
6. The project is called "ASP.NET vNext".

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

22

8.2 HARDWARE REQUIREMENTS


List of hardware we use are :
Processor
RAM

: Intel Pentium IV
: 256 MB

Hard disk

: 80 GB

Device

: android mobile with camera

8.2.1 Processor
A processor is logic circuitry that responds to and process the basic instruction that
drive a computer. Here we use Pentium 4 processor. Pentium 4 is a line of single core desktop
and laptop central processing unit introduced by Intel on November 2000. The two classical
matrices of CPU performance is IPC and clock speed.

8.2.2 RAM
Random Access Memory is a form of data storage. It allows stored data to be accessed
directly in any random order. Today random access memory takes the form of integrated
circuits. Strictly speaking modem types of DRAM are not random access as data is read in
bursts, although the name DRAM/RAM has sheet. In addition, sensing as temporary storage
and working space for the OS and application, Ram is used in numerous other ways.

8.2.3 Hard Disk


A hard disk drive is a data storage device used for storing and returning digital
information using rapidly rotating disk coated with magnetic material. A hard disk contain
data even when power off. Data is read in a random access manner, mainly individual blocks
of data can be stored or returned in any order rather than sequentially. Hard disk became the
dominant secondary storage device for general purpose computer. The primary character of
an HDD are its capacity and performance.
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

23

8.2.4 Android mobile with camera


Android phones are highly customisable and as such can be altered to suit your tastes and
needs with wallpapers, themes and launchers which completely change the look of your
device's interface. You can download applications to do all sorts of things like check your
Facebook and Twitter feeds, manage your bank account, order pizza and play games. You can
plan events on from your phone's calendar and see them on your computer or browse
websites on your desktop and pick them up on your phone.Another neat feature of Android is
that it automatically backs up your contacts for you. When you set up an Android phone
youll need to create a Google Account or sign in with an existing one. Every time you save a
number to the address book of your Android phone it will be synced to your Google
Account.The benefit of this is that if you lose your phone all of your numbers will be saved.
The next time you get an Android phone (or and iPhone or Windows Phone if you prefer) and
sign in with your Google Account, all of your contacts and friend's numbers will be displayed
in your new phones address book immediately, no need to transfer or back them up
anywhere else.Syncing is a way for your phone to keep all your information; websites,
contacts, calendar entries and apps up-to-date. This can happen over your phone's mobile data
or WiFi connection, seamlessly, in the background.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

24

9. SYSTEM DESIGN
System design is the process of defining the architecture, components, modules and
data for a system to satisfy specific requirements. Systems design could be seen as the
application of systems theory to product development. It is widely used for modelling
software systems and is increasingly used for high design non-software systems and
organizations.

9.1

MODULE DESCRIPTION

Consist of 3 modules:
Android device: It consist of a single element:Camera app: An android phone having a camera module will support this

app. When

the user downloads the app the software camera part of the android phone he/she uses will be
related to the camera settings of the VIRAL app.

Web Service: Web services are provided through the web methods.
Web methods: This act as an interface between the android device and the web module. The
web methods provides all the services which act as a link.

Web:A website, also written as web site,[1] or simply site,[2] is a set of


related web pages typically served from a single web domain. A website is
hosted on at least one web server, accessible via a network such as the
Internet or a private local area network through an Internet address
known as a uniform resource locator (URL). All publicly accessible
websites collectively constitute the World Wide Web.Web pages, which are
the building blocks of websites, are documents, typically written in plain
text interspersed with formatting instructions of Hypertext Markup
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

25

Language (HTML, XHTML). They may incorporate elements from other


websites with suitable markup anchors. Webpages are accessed and
transported with the Hypertext Transfer Protocol (HTTP), which may
optionally employ encryption (HTTP Secure, HTTPS) to provide security
and privacy for the user of the webpage content. The user's application,
often a web browser, renders the page content according to its HTML
markup instructions onto a display terminal.The pages of a website can
usually be accessed from a simple Uniform Resource Locator (URL) called
the web address. The URLs of the pages organize them into a hierarchy,
although hyperlinking between them conveys the reader's perceived site
structure and guides the reader's navigation of the site which generally
includes a home page with most of the links to the site's web content, and
a supplementary about, contact and link page.Some websites require a
subscription to access some or all of their content. Examples of
subscription websites include many business sites, parts of news
websites, academic journal websites, gaming websites, file-sharing
websites, message boards, web-based email, social networking websites,
websites providing real-time stock market data, and websites providing
various other services (e.g., websites offering storing and/or sharing of
images, files and so forth).
Filtering Module: A filtering module acts in between the process requesting for uploading and
the decision of whether to upload the corresponding media or not.
Skin Tone detection Module: Based on the parametric and non parametric methods the color
detection is carried out and adult images are filtered away. This makes the application more
relevant to all kind of users. The skin tone detection does the process automatically without
any assistance from the admin or related persons.
Content percentage: It measures the amount of data in the webpage.
Block: Admin can block both users and data,while the users can block the data on his/her
account.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

26

Viral Counting And Rating: Rating is the key feature of viral of the application and based on
the count of the rating, the post is listed as a viral post or a non viral post.

9.2 SYSTEM ARCHITECTURE


A system architecture can comprise system components, the externally visible
properties of those components, the relationships (eg. behaviour) between them.

Fig 9.1: System architecture

9.3 WORKING PRINCIPLE


The application works with the concept that its name denotes. The three modules
being an android phone, Web services and the viral website.
The whole process begins with, the user downloading the viral app from the store
into his personal mobile. The user could register himself to be a part and have the benefits of
the application. Using the id and the password provided during the registration process, the
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

27

user could login to access the common website page. Once the application is downloaded the
users android phone camera will be related to a set of software through which the physical
camera is linked to the viral application. This makes it possible for the user to access the
mobile phone camera on behalf of this particular application. Thus, when an image or video
is captured by accessing the camera through the viral application, the captured media is
automatically uploaded to the viral website. Any registered member of the application who
has login to the website can view any such uploaded medias. The concept of viral become
prominent when the visitors of the website rate the post by liking and commenting it. More
the rating more viral is that particular post. Once any post acquires high rating in a limited
time, that is if the post is viral it is automatically send as a mail to a privileged group related
to the website (other than the admin) named as the authority. The authorities are those
members who has designations in different socially relevant jobs (example :collector). Each
person in the authority will receive only those post related to their job. If a person is
continuously posting an irrelevant post then the admin can able to block that person.

9.4 DATA FLOW DIAGRAM


The DFD is also known as bubble chart.It is simple graphical formalism that can be
used to represent a system in terms of the input data to the system,various processing cared
out in this data and the output data generated by the system.The main reason why this DFD
technique is so popular is probably because of the facts that DFD is very simple formalism.It
is simple to understand and use.A DFD model uses a very limited number of primitive
symbols to represent the functions performed by a system and data flow among these
systems.Starting with a set of high level functions that is system performance of DFD is
hierarchically it represent various sub functions.The data flow diagram technique also follows
a simple set of initiative concepts and rules.
DESIGN NOTATION
In DFD the main symbols used are :
1. EXTERNAL ENTITY
An external entity can represent a human,system or subsystem .It is where certain data
comes from or goes to.It is external to the system space we study. In terms of the business
process for this reason people used to draw external entity on the edge of a diagram.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

28

Source or Destination of data

Fig 9.2 : Design notation-External entity

2. PROCESS
A process is a business activity or function where the manipulation and transformation of
data take place.A process can be decomposed finer level of details,representing how data is
being processed within the process.

Fig 9.3 Design notation-Process

3. DATA FLOW
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

29

A data flow represents the flow of information with its direction represented by an arrow
head that shows at the end(s) of flow connector .

Fig 9.4: Design notation-Direction of data flow


RULES USED IN CONSTRUCTING DFD ARE :
1
2
3
4

Process should be named and numbered .


The direction of flow is from top to bottom and left to right .
After exploding, lower level details of process are to be numbered .
The name of data stores ,sources and destination are written in upper case .

9.4 DATAFLOW DIAGRAMS

Authority

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

30

Admin

9.5 DATA BASE DESIGN


Dept. of Computer Science & Engineering

AWH Engineering College

Viral

31
A database is a collection of interrelated data stored with minimum redundancy to

serve many use to make quickly and efficiently.The general way is to make information
accessing easy, quick, inexpensive and flexible for the user.In the data base design several
objectives are considered controlling redundancy, ease of learning and use, data dependence,
more information at low cost,accuracy and integrity are some of them.
In this phase,information from the ER diagram is used to design the data base.The
entities in the ER diagram represent the table that have to be created and the attributes
represent the fields that are in each table.

Authority Registration Table

Admin Registration Table

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

32

User Registration Table

Content Table

9.6 INPUT DESCRIPTION


It is the process of converting a user oriented description of the input to a computer
based system into a programmer oriented specification. Here in this system we collect input
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

33

from user, proper validation, checks are performed in the input page to check whether the
user let the required field blank or incorrect data has been placed if so, message will be
generated by the system.
User registration: In order to use this application first time, user must register here. User
provide their personal details for this registration. Then user can easily use this app. This is
similar to sign up process.
User login page: Once a user register in this website, they need only login process same as
the sign in process. This does not need all the personal details.User details: There are IMEI
number and IP address as the user details. Using this admin can take actions against user.
Location: This will help to identify the place where the media is posted.
Medias: The information posted is the important feature of this app. This includes audios,
videos, images etc. Automatic filtering of medias are helps to reduce the misuse of app.
Medias can be uploaded/ downloaded or removed.
Like, Comment, Feedback: All these things are the part of user. User can like or dislike,
comment on the medias and able to give the feedback about this app. Based on the rating
information will reach at the authority.
View comments: Any user can view the comments that may given by other users. Rating is
determined from comments.
View notification: Admin may send some notifications to user. That may include reply for
feedback or blacklisting etc.

9.7 OUTPUT DESCRIPTION


The system output is the most important and direct source of information to the user.
So intelligible output design improves the relationship with user and help in decision making.
Outputs from the computer system are required to communicate the results of processing to
the users. They provide a permanent copy of these results for later consultation.
View contents: All the data that were posted by any user can be viewed by a particular user.
The only condition is that user must be register in the application at one time.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

34

View rating: Each user can rate the medias according to the quality of it. The top rated
contents will automatically send to corresponding authority.
View comments: Any user can view the comments that may given by other users. Rating is
determined from comments.
View notification: Admin may send some notifications to user. That may include reply for
feedback or blacklisting etc.

11. TESTING
Software testing is a critical element of software quality assurance and represents the
ultimate reviews of specification, design, and coding. Testing is vital to the success of the
system. Errors can be injected at any stage during development. System testing makes a
logical assumption that if all the parts of the system are correct, the goal will be successfully
achieved. During testing, the program to be tested is executed with set of test data and the
output of the program for the test data is evaluated to determine if the program is performing
as expected. A series of testing are performed for the proposed system before the system is
ready for user acceptance testing.
The testing tips are:

Unit testing
Integration testing
System testing
Black box testing

11.1 UNIT TESTING


Unit testing focuses verification effort on the smallest unit of the software design, the
module this is known as module testing. Since the proposed system has modules the testing is
individually performed on each module. Using the detailed description as a guide, important
control paths are tested to uncover errors within the boundary of the module. This testing was
carried out during programming stage itself. In this testing step each module is found to be
working satisfactorily as regards to the expected output from the module.

11.2 INTEGRATION TESTING

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

35
Data can be tested across an interface, one module can have adverse effect on another,

sub function when combined may not produced the desired function. Integration testing is a
systematic technique for constructing the program structure while at the same time
conducting test to uncover errors associated within interface.

11.3 SYSTEM TESTING


System testing can be defined in many ways, but a simple definition is that validation
succeeds when the software functions in manner that is reasonably expected by the customer.
System testing is achieved through a series of black box tests that demonstrate conformity
with requirement. After system testing has been conducted, one of two conditions exists.

The function or performance characteristics confirm to specification and are accepted.


A testing from specification is uncovered and a deficiency created.
Deviation or errors discovered at this step in this project is corrected prior to

completion of the project with the help of the user by negotiation to establish a method for
resolving deficiencies. Thus the proposed system under consideration has been tested by
using system testing and found to be working satisfactorily.

11.4 BLACK BOX TESTING


Black box testing is a method of software testing that examines the functionality of an
application without peering into its internal structures or workings. This method of testing
can be applied to virtually every level of software testing: unit, integration, system and
acceptance. It typically comprises most if not all higher level testing, but can also dominate
unit testing as well.

12. CONCLUSION
We believe that we are able to implement our project in a fair and good manner with
respect to the existing system. The system is a new concept which changes the outlook of
social medias. The viral application helps in bringing the importance of social media in
Dept. of Computer Science & Engineering

AWH Engineering College

Viral

36

human life to a productive form by easily making it possible to bring socially impact events
into the limelight. Since this is very user friendly and easily available in play stores and
above all due to its relevance it is expected to be a success.

13. FUTURE ENHANCEMENT


We expect to make a whole lot of modifications to our project in the future. The
features can be advanced and the working of app can be made more better. Group chat feature
can be extended to personal chat between the family members.Photo and video sharing
feature can be made added to the existing system. There are possibilities for bringing new
features to take our project to another level.

REFERENCES
[1] https://www.facebook.com/FacebookIndia?brand_redir=1
[2] https://about.twitter.com/
[3] https://www.whatsapp.com/android/current/whatsapp.apk

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

37

GLOSSARY
1. SDLC

The systems development life cycle (SDLC), also referred to as the


application development life cycle, is a term used in systems, information
systems and softwareengineering to describe a process for planning, creating,
testing, and deploying an information system.

2. SQL-

Structured Query Language is a special purpose programming language


designed for managing data held in a relational database management system
(RDBMS).

3. User-

It is a person who uses a computer or network service.

4. Testing-

Software testing is a critical element of software quality assurance and


represents the ultimate reviews of specification, design and coding.

Dept. of Computer Science & Engineering

AWH Engineering College

Viral

Dept. of Computer Science & Engineering

38

AWH Engineering College

Potrebbero piacerti anche