Professional Documents
Culture Documents
Acknowledgement: Dr. Gurrala Venkateswara Rao, The Head of Division of Computer Science and
Acknowledgement: Dr. Gurrala Venkateswara Rao, The Head of Division of Computer Science and
Acknowledgement: Dr. Gurrala Venkateswara Rao, The Head of Division of Computer Science and
All of what I learnt, experienced gained, is unquestionably impossible without the push given
by the following mentors. Ever encouraging and supportive, all of them helped my light shine
brighter. Indebted would be a small word. Nevertheless, a heartfelt gratitude to
Dr. Gurrala Venkateswara Rao, the head of Division of Computer Science and
Engineering and other faculty members for giving me an opportunity to learn and do this
internship.
And to all the concerned professors and fellow interns, without whose efforts, my journey
in RK INFOTECH wouldn't have been this fruitful.
I would like to thank Yellapu Jhansi who helped us a lot in successful completion of our
internship and internship report.
Your Sincerely,
K.Sudheer
TABLE OF CONTENTS
Abstract
About Organisation
Internship activities
Outcomes
Conclusion
Assessment of
Internship
Bibliography
ABSTRACT
I have done my internship in INFO BASE SYSTEM which is a start-up company in
Hyderabad. Internship cum training is an opportunity where we will be learning the new
things application of the knowledge gained. In this program we have undergone for 5
weeks of training cum internship. The purpose of this program is to enhance our
knowledge and use them to build the application.
· Convention Centres
· Retail Outlets
· Wholesale Suppliers
· Service Industries
· Import Merchants
· Information Brokers
· Public Administration
· Queensland Government.
SCHEDULE OF THE INTERNSHIP 01-MAY-2019 TO 31-MAY-2019
Wednesday,May1 Introduction
Thursday,May2 History of HTML
Friday,May3 Basic Syntax and basic concept of HTML
Saturday,May4 Basic concept of CSS
Monday,May6 Basic concept of Java
Tuesday,May7 Data structures condition statements
Wednesday,May8 Practice session of above topics
Thursday,May9 Introduction to new software called Netbeans
Friday,May10 Explained Various other data structures
Saturday,May11 Summary of the week that was explained
Monday,May13 Introduction to Functions
Tuesday,May14 Basic programs of functions
Wednesdy,May15 Explanation of JDBC
Thursday,May16 Various operations on java classes and programs
Friday,May17 Weekly assignment
Saturday,May18 Summary of the week that was explained
Monday,May20 Explained about data mining
Tuesday,May21 Motivation towards web development
Wednesday,May22 Started developing web based application
Thursday,May23 Techniques to develop application using front end
Friday,May24 Techniques to develop application using back end
Saturday,May25 Development of web application
Monday,May27 Development of web application
Tuesday,May28 Development of web application
Wednesday,May29 Documentation preparation
Thursday,May30 Some questions about about the project
Friday,May31 Evaluation
INTERNSHIP ACTIVITIES
INTRODUCTION
Web development
Web development refers to building website and deploying on the web. Web development
requires use of scripting languages both at the server end as well as at client end.
Web development process includes all the steps that are good to take to build an attractive,
effective and responsive website. These steps are shown in the following diagram:
Web development tools:
Web development tools helps the developer to test and debug the web sites. Now a days the
web development tool come with the web browsers as add-ons. All web browsers have built
in tools for this purpose.
These tools allow the web developer to use HTML, CSS and JavaScript etc.. These are
accessed by hovering over an item on a web page and selecting the “Inspect Element” from
the context menu.
Skills Required:
For being a successful web developer, one should possess the following skills:
Creating, editing and modifying templates for a CMS or web development framework.
Testing cross browser inconsistencies.
Testing for compliance to specified standards such as accessibility standards in the client
region.
TECHNOLOGIES LEARNED
The project experimental setup desires software system package Windows 7 and JDK one.6
and MySQL 2008 Databases. And to boot true cat server, SQL YOG required.
Java technology is used for programming language and a platform for both.
With most programming languages, you either compile or interpret a project with the
goal that you can run it on your PC. The Java programming dialect is irregular in that a project
is both arranged and deciphered. With the compiler, first you make an interpretation of a system
into a middle of the road dialect called Java byte codes — the platform-autonomous codes
deciphered by the translator on the Java platform. The translator parses and runs every Java
byte code direction on the PC. Aggregation happens just once;
understanding happens every time the project is executed. The accompanying figure outlines
how this works.
A platform is the hardware or software environment in which a project runs. I've specified
probably the most prevalent platforms like Linux, Windows 2000, Solaris, and MacOS. Most
platforms can be depicted as a mix of the working framework and hardware. The Java platform
varies from most different platforms in that it's a software-just platform that keeps running on
top of other hardware-dependent platforms.
The Java API is a huge collection of ready-made software components that offer many useful
abilities, such as graphical user interface (GUI) widgets. The Java API is assembled into
libraries of related classes and interfaces; these libraries are known as packages.
2.1.4. Functionalities of JAVA API
The taking after figure delineates a system that is running on the Java platform. As the figure
demonstrates, the Java API and the virtual machine protect the system from the hardware.
Native code is code that after you compile it, the compiled code runs on a particular hardware
platform. As a platform-free environment, the Java platform can be somewhat slower than local
code. Notwithstanding, brilliant compilers, all around tuned translators, and in the nick of time
byte code compilers can convey execution near that of local code without debilitating
portability.
The general common sorts of programs written in the Java programming dialect are applets
and applications. On the off chance that you've surfed the web, you're likely effectively
acquainted with applets. An applet is a system that holds fast to specific traditions that permit
it to keep running inside of a Java-empowered browser. However, the Java programming
language is not only to write adorable, enlivening applets for the Ib. The broadly useful,
abnormal state Java programming dialect is additionally an intense software platform. Utilizing
the liberal API, you can compose numerous sorts of programs.
2.1.6. JDBC
In an effort to set a free database standard API for Java; Sun Microsystems created Java
Database Connectivity, or JDBC. JDBC offers a bland SQL database access system that gives
a predictable interface to an assortment of RDBMSs. This predictable interface is accomplished
through the utilization of "module" database availability modules, or drivers. In
the event that a database seller wishes to have JDBC bolster, he or she must give the
driver to every stage that the database and Java run on.
To get a broad acceptance of JDBC, Sun construct JDBC's structure in light of ODBC.
As you found before in this part, ODBC has across the board support on an assortment of
stages. Constructing JDBC in light of ODBC will permit sellers to put up JDBC drivers for
sale to the public much speedier than adding to a totally new availability solution.
JDBC was proclaimed in March of 1996. It was released for a 90 day public review
that was ended June 8, 1996. Due to the user input, the final JDBC v1.0 specification was
released soon after.
The rest of this segment will sufficiently cover data about JDBC for you to recognize
what it is about and how to utilize it viably. This is in no way, shape or form a complete review
of JDBC. That would fill a whole book.
You can consider Java byte codes as the machine code instructions for the Java VM (Java
Virtual Machine). Each Java interpreter, whether it's a Java advancement instrument or a web
program that can run Java applets, is an execution of the Java VM. The Java VM can likewise
be actualized in hardware. Java byte codes make "compose once, run anyplace" possible. You
can accumulate your Java program into byte codes on my stage that has a Java compiler. The
byte codes can then be run any usage of the Java Virtual Machine. For example, the same Java
program can run Solaris, Windows NT, and Macintosh.
Because a large number of the errands included in web application advancement can be tedious
or require an overflow of standard code, web structures can be connected to reduce the
overhead connected with basic exercises. For instance, numerous structures, for example,
JavaServer Faces, give libraries to templating pages and session administration, and regularly
advance code reuse.
2.2.1 Java EE
Web Server is software that can handle the customer demand and send the reaction back to the
customer. For instance, Apache is a standout amongst the most generally utilized web server.
Web Server keeps running on some physical machine and listens to customer request on
specific port.
A web client is a software that assists in corresponding with the server. The absolute
most generally utilized web customers are Firefox, Google Chrome, Safari and so forth. When
I ask for something from server (through URL), web customer deals with making a solicitation
and sending it to server and after that parsing the server reaction and present it to the user.
2.3. MySQL:
MySQL, the popular Open Source SQL database management system, is
introduced, published, and supported by Oracle Corporation.
The MySQL Web site is http://www.mysql.com/ giving the updated information about
MySQL software.
3. SOFTWARE REQUIREMENT SPECIFICATION
The model that is being followed is the SOFTWARE DEVELOPMENT LIFE CYCLE
MODEL, which states that the phases are organised in order. First of all the feasibility study is
done. Once that part is completed, the requirement analysis and project planning begins. If
system exists once, then modifications and addition of new modules is needed, analysis of
present system can be used as basic model.
The design starts after the requirement analysis is completed and the coding begins after
the design is completed. Once the programming is completed, the testing is done. In this model
the sequence of activities performed in a software development project are
• Project planning
• Requirement definition
• Design
• Development
• Integration and testing
• Installation and acceptance
• For instance, now a days I can share any photo as I like on OSNs, regardless of whether
this photo contains other people (is a co-photo) or not. Currently there is no restriction with
sharing of co-photos, on the contrary, social network service providers like Facebook.
• In existing they provided a tool to enable users to restrict others from seeing their photos
when posted as a complementary strategy to protect privacy.
3.4 DISADVANTAGES
• May leak users privacy if they are allowed to access photos which is shared by user
Photo sharing added, the situation becomes more complicated
In this project, propose a novel consensus-based approach to achieve efficiency and privacy at
the same time.
The idea is to let each user only deal with his/her private photo set as the local train data and
use it to learn out the local training result. After this, local training results are exchanged among
users to form a global knowledge.
3.6 ADVANTAGES
Secret sharing photo unknown person cannot access the photos and any data its access
permission only.
DESIGN
4.1 INTRODUCTION
Software design sites at the technical kernel of the software engineering process and is applied
regardless of the development paradigm and the area of application. Design is the first step in
the development phase for any engineered product or system. The designer’s goal is to produce
a model or representation of an entity that will later be built. Beginning, once system
requirements have been specified and analysed, system design is the first of the three technical
activities – design, code and test that is required to build and verify software.
The following are the three important tests that have been conceded out for feasibility
Study.
• Technical Feasibility
• Economic feasibility
• Operational feasibility
4.3 UML DIAGRAM
4.3.1 CLASS DIAGRAMS
fig:4.3.1.CLASS diagrams
4.3.2 USE CASE DIAGRAMS
Registration
Login
User
Find friends
Share Photo
view Request
User
Access permissions
Access request
Loout
4.3.3:sequence diagrams
5. SYSTEM IMPLEMENTATION
%>
</tr>
<%
}
}
catch(Exception e)
{
out.println(e.getMessage());
}
%>
</table>
<p> </p>
<p align="left" class="style14"> </p>
<p align="left" class="style14"> </p>
<p align="left" class="style14"> </p>
<p align="left" class="style14"> </p>
<p align="left" class="style14"> </p>
<p align="left" class="style14"> </p>
<p align="left" class="style14"> </p>
<p align="left" class="style14"> </p>
<table width="476" border="0" cellspacing="2" cellpadding="2">
<tr>
<td width="468"><div align="right"><a href="SocialMain.jsp" class="style14">Back</a></div></td>
</tr>
</table>
<h2> </h2>
</div>
<div class="right">
<h2>Sidebar Menu</h2>
<ul>
<li><a href="SocialMain.jsp">Home</a></li>
<li><a href="SocialLogin.jsp">Logout</a></li>
</ul>
</div>
Mental Disorders Detection via Online Social Media Mining</div>
</div>
</div>
<div class="clr"></div>
</div>
</div>
<div align=center></div>
</body>
</html>
5. OUTPUTS
6. CONCLUSION
Photo sharing is one of the most popular features in online social networks such as
Facebook. Unfortunately, careless photo posting may reveal privacy of individuals in a posted
photo. To curb the privacy leakage, I proposed to enable individuals potentially in a photo to
give the permissions before posting a co-photo. I designed a privacy-preserving FR system to
identify individuals in a co-photo. The proposed system is featured with low computation cost
and confidentiality of the training set. Theoretical analysis and experiments were conducted to
show effectiveness and efficiency of the proposed scheme. I expect that our proposed scheme
be very useful in protecting users’ privacy in photo/image sharing over online social networks.
However, there always exist trade-off between privacy and utility. For example, in my current
Android application, the co-photo could only be post with permission of all the co-owners.
Latency introduced in this process will greatly impact user experience of OSNs. Moreover,
local FR training will drain battery quickly.
Internship Evaluation
Intern Details :
Name Kadari Sudheer
Evaluation :
S.No Evaluation Criteria Maximum Marks Marks Allotted
2. Performance 5 5
3. Professional Knowledge 5 5
4. Learning Aptitude 5 5
6. Presentation 5 5
This is to certify that Jalagam Lokesh Naidu has successfully completed the assignment on Face Recognition and has
secured 30 out of 30 for the same.
Evaluated by :
Mentor Mr.Vamsi
Designation Founder & CEO
Organization’s Name RK INFOTECH
Organization’s Address Plot no.1024,4th floor,Repunjaya,hitech-city,
Hyderabad-500081, Telangana.
Phone 040 64505666
Email ID info@ingeniousind.com
For RK INFOTECH
7. BIBILIOGRAPHY
[1] I. Altman. Privacy regulation: Culturally universal or culturally specific? Journal of Social
Issues, 33(3):66–84, 1977.
[2] A. Besmer and H. Richter Lipford.Moving beyond untagging: photo privacy in a tagged
world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
CHI ’10, pages 1563–1572, New York, NY, USA, 2010. ACM.
[3] S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein. Distributed optimization and
statistical learning via the alternating direction method of multipliers. Found. Trends Mach.
Learn., 3(1):1–122, Jan. 2011.
[4] B. Carminati, E. Ferrari, and A. Perego.Rule-based access control for social networks. In
R. Meersman, Z. Tari, and P. Herrero, editors, On the Move to Meaningful Internet Systems
2006: OTM 2006 Workshops, volume 4278 of Lecture Notes in Computer Science, pages
1734–1744. Springer Berlin Heidelberg, 2006.
[5] J. Y. Choi, W. De Neve, K. Plataniotis, and Y.-M. Ro. Collaborative face recognition for
improved face annotation in personal photo collections shared on online social networks.
Multimedia, IEEE Transactions on, 13(1):14–28, 2011.
[6] K. Choi, H. Byun, and K.-A.Toh.A collaborative face recognition framework on a social
network platform.In Automatic Face Gesture Recognition, 2008.FG ’08. 8th IEEE
International Conference on, pages 1–6, 2008.
[7] K.-B. Duan and S. S. Keerthi. Which is the best multiclass svm method? an empirical study.
In Proceedings of the 6th international conference on Multiple Classifier Systems, MCS’05,
pages 278–285, Berlin, Heidelberg, 2005. Springer-Verlag.
[9] B. Goethals, S. Laur, H. Lipmaa, and T. Mielik?inen. On private scalar product computation
for privacy-preserving data mining. In In Proceedings of the 7th Annual International
Conference in Information Security and Cryptology, pages 104–120. Springer-Verlag, 2004.