Professional Documents
Culture Documents
College Social Networking Website PDF
College Social Networking Website PDF
INTRODUCTION
1.INTRODUCTION
We know about the increasing use of social networking sites, people use various social media
platforms depending on their requirements and interest. Social media is a dynamic platform that
In this project a social media platform for college campus has been created where everyone
associated with the college campus such as students, staff members can socialize with each
other and share their knowledge about academics, projects, placements and all other activities
It will promote teaching and learning through a more dynamic platform without causing any
threat to privacy. They’ll be only allowed to view the details which are relevant to them from
academic or professional point of view. They’ll be able to view the research conducted by
Students can register and login into the system once their registration is approved by the admin.
Once the student logged in into the system, he/she can write and post an articles on various
topic of his/her choice. Also he/she chat with the other students. Students can also upload
images with their post. All students can view News Feed posted by individual student.
All the student registration will be approved/rejected by the admin as well as, all the post will
The core function of campus social network system is to facilitate and encourage knowledge
sharing and knowledge creation on campus. Specifically, the core functions of campus social
network system are to support online communication, sharing and collaboration in learning,
teaching and research activities of campus users. Knowledge sharing and knowledge creation
are closely related with and continuously influenced by each other. Because college social
network system provides direct support to knowledge sharing and indirect support to
knowledge creation
Campus members such as students, faculty members are among the most active users of Internet
services, especially emerging services including social networking services. As this social
networking site is confined to the college campus activities, it will increase the likelihood of
usage by the faculty members. This is the major advantage of this project as it will promote the
students and faculty alike to strengthen their educational communications and collaborations.
THEORETICAL BACKGROUND
DEFINITION OF PROBLEM
3. THEORETICAL BACKGROUND
DEFINITION OF PROBLEM
and information, through network like the web. While doing this, participants develop bonds with each other and
We define college social network sites as web-based services that allow individuals to
(2) Articulate a list of other users with whom they share a connection.
The main idea behind it is to share the job related details posted by faculty member via adding
a post which can be read by all the student as well as other faculty using the website.
This web application can be handled by the admin and manage student as well as faculty.
When the number of records increased, it is difficult to maintain the information of each
Maintaining the records manually leads to error prone and required more man power
it’s also regarded as the third revolutionary application of the Internet after search engine and
Web 2.0 applications. Campus members including students and staff members are among the
most active users of Internet services, especially emerging services including social networking
services.
Although public social network services like Facebook, Twitter, Sina Weibo and RenRen
provide good individual and group communication services to their users. For this reason,
public social network services have two disadvantages. On one hand, because it cannot be
connected with the real environment and activities of college, it cannot support the learning,
teaching, research and cultural activities on campus closely and timely; on the other public
social network systems cannot provide strict information and privacy protection to their users
and organizations that users are belonged to because of their consideration on commercial
interest.
Social interaction positively influences the quality of the knowledge created on other hand,
social network can help students to share experiences and collaborate on relevant topics
This social media platform will become an asset for the campus and can be used for
4.1System Analysis:
System analysis is the first and foremost step performed in developing the software to solve a
particular problem. In the analysis part, a software developer examines the requirements.
Carrying out preliminary investigation identifies the requirements. Analysis consists of two sub
During planning phase, cost estimates and work schedules will be planned. Requirement
definition is a specification that describes the processing environment, the required software
functions, performance constrains (size, speed, machine configuration) and exception handling.
occur.
a) Functionality:
Students can register and login into the system once their registration is approved by the
admin.
Once the student logged in into the system, he/she can write and post an articles on
various topic of his/her choice. Also he/she chat with the other students.
All the student registration will be approved/rejected by the admin as well as, all the
post will be kept pending until admin approves/rejects each and every post.
b) Efficiency:
The main idea behind it is to share the job related details posted by placement officer via adding
a post which can be read by all the student as well as faculty using the website. This web
application can be handled by the admin and manage student as well as faculty.
c) Accessibility:
Students can register and login into the system once their registration is approved by the admin.
Students post are first sent to admin for approval. It keeps the system stable by not posting
very general plan for the project and some cost estimates. During system analysis the feasibility
study of the proposed system is to be carried out. This is to ensure that the proposed system is
not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential. Three key considerations involved in the feasibility
a) Economical Feasibility: This study is carried out to check the economic impact that the
system will have on the organization. The amount of fund that the company can pour into the
research and development of the system is limited. The expenditures must be justified. Thus
the developed system as well within the budget and this was achieved because most of the
technologies used are freely available. Only the customized products had to be purchased.
b) Operational Feasibility: Students will get efficient access to information which will help
them grow. Faculty Members can use this platform to share concepts which are relevant in the
current market.
c) Technical Feasibility: Any system developed must not have a high demand on the available
technical resources .The technologies which our System is using are free as XAMPP , Bootstrap
d) Social Feasibility: The aspect of study is to check the level of acceptance of the system by
the user. This includes the process of training the user to use the system efficiently. The user
must not feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate the user
regardless of the development paradigm and area of application. Design is the first step in the
development phase for any engineered product or system. The designer’s goal is to produce a
model or representation of an entity that will later be built. Beginning, once system requirement
system design is the first of the three technical activities- design, code and test that is required
to build and verify software. The importance can be stated with a single word “Quality”. Design
is the place where quality is fostered in software development. Design provides us with
representations of software that can assess for quality. Design is the only way that we can
accurately translate a customer’s view into a finished software product or system. System
design serves as a foundation for all the software engineering steps that follow. Without a strong
design we risk building an unstable system- one that will be difficult to test, one whose quality
The client-server architecture is the most common distributed system architecture which
Client − This is the first process that issues a request to the second process i.e. the
server.
Server − This is the second process that receives the request, carries it out, and sends a
Advantages
processing.
environment.
It also makes effective use of resources when a large number of clients are accessing a
high-performance server.
1) Admin module
In the Admin Module the system allows the admin to login with username and password and
there is a Menu Bar provided with menu items in which there are items like Register Student,
2) Faculty module
In the Faculty Module the System allows the Faculty Member to Login with Username and Password
which has been provided by the Admin to faculty members via SMS there is a Menu Bar Provided with
Menu items such as Send Notifications where the Faculty Member can Post a Notification that will be
Visible to the Students and Faculty can also view the Earlier Posted Notifications and the Faculty
3) Student module
In the Student Module the System allows the Students to Login with Username and Password which has
been provided by the Admin to Students via SMS there is a Menu Bar Provided with the Menu items
such as Home where Students can Post Images and Post on the News Feed and the Students can also
projects, to be successful. This is where many projects fail, in that they do not specify correctly
what the system should do. In fact many systems have just been given a deadline for delivery,
a budget to spend, and a value notion of what it should do. The root of this problem is:
ers have little idea of what a computer system could achieve for them.
In fact it can be a big disadvantage. A requirements for a computer system specifies what you
want or desire from a system. For business in particular this is, “What you want or desire you
a business advantage” This advantage need not just be a reduction in costs, In fact many
systems justified on a reduction in operating costs, fail to deliver as low skilled but relatively
cheap staff, have to be replaced by high skilled, and more expensive staff.
The advantage can be a reduction in time to process something, which will lead to a reduction
in costs, or being able to better use the unique knowledge base belonging to a business. As you
start to specify what you want or desire, you hit up against technical language of requirements.
-functional Requirements
The Web Application should validate the limit of marks given to the users.
The Web Application should generate a PDF of students which are deleted.
The Web Application should allow users to Upload PDF and images.
b) Non-functional Requirements:
Secure.
Portable
c) Gantt Chart:
The interface provided to the user should be a very user-friendly one and it should provide an
optional interactive help for each of the service listed. The interface provided is a menu driven
Login screen is provided in the beginning for entering the required username, password.
An unsuccessful login leads to a reattempt screen for again entering the same information.
The successful login leads to a screen to the displaying the homepage of the user logged in.
Administrator is also provided with a screen that enables him to Register a Student and
Faculty and Admin has the authority to delete a student and Approve and Reject Post
Uploaded.
In case of deleting a student the Administrator must enter appropriate Semester and also
After the login, a screen with a number of options is then shown to the user. It contains all the
options along with their brief description to enable the user to understand their functioning
Another screen should be provided to the users to reset password. If the user has forgotten
the password. A Screen will be provided to the user to check their profile.
project planning helps to minimize the additional costs incurred while it is in progress. For
effective system planning, some principles are followed. These principles are listed below:
Before starting the project, senior management and the project management
team should consider the risks that may affect the system. For example, the user may desire
changes in requirement while the project is in progress in such a case, the estimation of time
modified accordingly.
identify processes by which the project management team can ensure quality in software, based
on the process selected for ensuring quality, the time and cost for the project is estimated.
recorded in the form of a project plan, which should allow new changes to be accommodated
METHODOLOGY ADOPTED
6. METHODOLOGY ADOPTED
A software development methodology is a framework that is used to structure, plan, and control
the process of developing an information system, this includes the pre-definition of specific
deliverables and artefacts that are created and completed by a project team to develop or
maintain an application. A wide variety of such frameworks have evolved over the years, each
with its own recognized strengths and weakness. Each of the available methodology
frameworks are best suited to specific kinds of projects, based on various technical,
organizational, project and team considerations. The methodology framework is often defined
in some kind of formal documentation. To implement the project goals, the following
design tools.
(SDLC) that focuses on an initial, simplified implementation, which then progressively gains
more complexity and a broader feature set until the final system is complete. Unlike the more
stages, the iterative model is best thought of as a cyclical process. After an initial planning
phase, a small handful of stages are repeated over and over, with each completion of the cycle
recognized and implemented throughout each iteration, allowing the next iteration to be at least
Planning & Requirements: As with most any development project, the first step is go through
an initial planning stage to map out the specification documents, establish software or
hardware requirements, and generally prepare for the upcoming stages of the cycle.
Analysis & Design: Once planning is complete, an analysis is performed to nail down the
appropriate business logic, database models, and the like that will be required at this stage in
the project. The design stage also occurs here, establishing any technical requirements
(languages, data layers, services, etc) that will be utilized in order to meet the needs of
Implementation: With the planning and analysis out of the way, the actual implementation and
coding process can now begin. All planning, specification, and design docs up to this point are
Testing: Once this current build iteration has been coded and implemented, the next step is to
go through a series of testing procedures to identify and locate any potential bugs or issues that
Evaluation: Once all prior stages have been completed, it is time for a thorough evaluation of
development up to this stage. This allows the entire team, as well as clients or other outside
parties, to examine where the project is at, where it needs to be, what can or should change, and
so on.
criteria
PHP code may be embedded into HTML code, or it can be used in combination with
various web template systems, web content management systems, and web frameworks. PHP
code is usually processed by a PHP interpreter implemented as a module in the web server or
as a Common Gateway Interface (CGI) executable. The web server combines the results of the
interpreted and executed PHP code, which may be any type of data, including images, with the
generated web page. PHP code may also be executed with a command-line interface (CLI) and
The standard PHP interpreter, powered by the Zend Engine, is free software released under
the PHP License. PHP has been widely ported and can be deployed on most web servers on
The PHP language evolved without a written formal specification or standard until 2014,
leaving the canonical PHP interpreter as a de facto standard. Since 2014 work has gone on to
PHP is an html-embedded scripting language. Much of its syntax is borrowed from c, java and
Perl with a couple of unique PHP-specific features thrown in. the goal of the language is to
allow web developers to write dynamically generated pages quickly. This is generally a good
definition of PHP. However, it does contain a lot of terms you may not be used to.
Another way to think of PHP is a powerful, behind the scenes scripting language that your
visitors won't see! When someone visits your PHP webpage, your web server processes the
PHP code. It then sees which parts it needs to show to visitors (content and pictures) and hides
the other stuff (file operations, math calculations, etc.) then translates your PHP into html. After
the translation into html, it sends the webpage to your visitor's web browser.
Before we talk about PHP's syntax, let us first define what syntax is referring to.
• Syntax - The rules that must be followed to write properly structured code.
PHP's syntax and semantics are similar to most other programming languages (c, java, perl)
with the addition that all PHP code is contained with a tag, of sorts. all PHP code must be
A variable is a means of storing a value, such as text string "hello world!" or the integer
value 4. A variable can then be reused throughout your code, instead of having to type out the
If you forget that dollar sign at the beginning, it will not work. This is a common mistake for
The Apache HTTP Server, colloquially called Apache, is the world's most widely used web
server software. Originally based on the NCSA HTTP server, development of Apache began in
early 1995 after work on the NCSA code stalled. Apache played a key role in the initial growth
of the World Wide Web, quickly overtaking NCSA HTTP as the dominant HTTP server, and
has remained the most popular HTTP server since April 1996. In 2009, it became the first web
server software to serve more than 100 million websites.
A database is a separate application that stores a collection of data. Each database has one or
more distinct APIs for creating, accessing, managing, searching and replicating the data it
holds. Other kinds of data stores can be used, such as files on the file system or large hash
tables in Memory but data fetching and writing would not be so fast and easy with those types
and manage huge volume of data. This is called relational database because all the data is
stored into different tables and relations are established using primary keys or other keys
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish company.
MySQL is released under an open-source license. So you have nothing to pay to use it.
MySQL is a very powerful program in its own right. It handles a large subset of the
MySQL works on many operating systems and with many languages including PHP,
MySQL works very quickly and works well even with large data sets.
MySQL is very friendly to PHP, the most appreciated language for web development.
SOFTWARE USED.
Implementation is the stage in the project where the theoretical design is turned into a working
system and is giving confidence on the new system for the users, which it will work efficiently
and effectively. It involves careful planning, investigation of the current system and its
change over methods. Apart of planning major task of preparing the implementation are
education and training of users. The more complex system being implemented, the more
involved will be the system analysis and the design effort required just for implementation.
been appointed. The implementation process begins with preparing a plan for the
implementation of the system. According to this plan, the activities are to be carried out,
discussions made regarding the equipment and resources and the additional equipment has to
this space, and the web server serves the content to web users who request it.
Domain-Name: The unique address where people can find your website,
registrar.
In addition, We require a File Transfer Protocol (FTP) program (see How much does it cost:
software for more details) to actually transfer the website files over to the server. FTP programs
vary widely, but generally we have to log on to your web server using details provided by your
Database -- MySQL
EVALUATION
information systems are effective and efficient or otherwise. The process of monitoring
System Maintenance is an ongoing activity, which covers a wide variety of activities, including
removing program and design errors, updating documentation and test data and updating user
support. For the purpose of convenience, maintenance may be categorized into three classes,
which might have crept in the system due to faulty design or wrong assumptions. Thus, in
the information system to satisfy the information needs of the user. This type of maintenance
ds of managers.
the existing programs to enhance the performance of the information system. This type of
Maintenance undertaken to respond to user’s additional needs which may be due to the changes
within or outside of the organization. Outside changes are primarily environmental changes,
which may in the absence of system maintenance, render the information system in effective
Keep our site secure because websites get hacked, and hacked sites lose visitors and
traffic.
link.
Keep regular visitor happy by giving them fresh, updated information and exciting
news.
issues are: alignment with customer priorities, staffing, which organization does maintenance,
estimating costs.
measurement.
work. The purpose is to preserve the value of software over the time. The value can be enhanced
by expanding the customer base, meeting additional requirements, becoming easier to use.
Maintenance may span for 20 years, whereas development may be 1-2 years.
8.2 Evaluation:
8.2.1 Hardware Evaluation Factors:
When we evaluate computer hardware, we should first investigate specific physical and
performance characters for each hardware component to be acquired. These specific questions
must be answered concerning many important factors. These hardware evaluation factors are:
hardware then determining the fastest and cheapest computing device. For example the question
Software can be evaluated according to many factors similar to hardware evaluation. Thus the
evaluate proposed software acquisitions. In addition, however, the software evaluation factors
are summarized below. For example some software packages required too much memory
capacity and are notoriously slow, hard to use are poorly documented. They
are not a good selection for most end users, even if offered at attractive prices.
b) Flexibility: Can it handle its processing assignments easily without major modifications
c) Security: Does it provide control procedures for error, malfunctions and improper use?
that is used?
instructions?
f) Hardware: Does existing hardware have the pictures required to best use this software?
The Constructive Cost Model (COCOMO) is an algorithmic software cost estimation model
developed by Barry Boehm. The model uses a basic regression formula with parameters that
are derived from historical project data and current as well as future project characteristics.
In detailed COCOMO, the effort is calculated as function of program size and a set of cost
drivers given according to each phase of software life cycle. A Detailed project schedule is
provides the organization with profits. Profits can be monetary or in the form of an improved
working environment. However, it carries risks, because in some cases an estimate can be
wrong. And the project might not actually turn out to be beneficial. Cost benefit analysis helps
to give management a picture of the cost, benefits and risks. Cost benefit determines the benefits
and saving that are expected the system and compares them with the expected costs. In
performing cost and benefit analysis it is important to identify cost and benefit factors. Cost
• Development Costs: Development costs is the costs that are incurred during the development
• Operating Costs: Operating costs are the expenses required for the day to day running
of the system. Examples of operating costs are Wages, Supplies and Overheads.
• Hardware/Software Costs: It includes the cost of purchasing or leasing of computers and its
• Personnel Costs: It is the money spent on the people involved in the development of the
system.
Benefits can be accrued by: Increasing Income, Decreasing costs and both.
The estimated income is 15,000 and cost involved in development is 11,160, so the benefit
establishing a system project plan, because it gives overall list of processes and sub processes
required for developing a system. Development life cycle means combination of various
activities. In other words we can say that various activities put together are referred as system
development life cycle. In the system analysis and design terminology, the system development
life cycle means software development life cycle. The different phases of software development
cycle: System study, Feasibility study, System analysis, System design, Coding, Database
specifies the existential entities but also the standard relations through which the system exists
and the cardinalities that are necessary for the system state to continue. The Entity Relationship
The ERD is the notation that is used to conduct the date modelling activity the attributes of each
data object noted is the ERD can be described resign a data object descriptions. The primary
The set of primary components that are identified by the ERD are:
a object
butes
A data flow diagram is graphical tool used to describe and analyse movement of data through
a system. These are the central tool and the basis from which the other components are
Developed . The transformation of data from input to output, through processed, may be
described logically and independently of physical components associated with the system.
These are known as the logical data flow diagrams. In the DFD, there are four symbols
outgoing
data flows.
A use case diagram is a graphic depiction of the interactions among the elements of a system.
A use case is a methodology used in system analysis to identify, clarify and organize system
requirements. The use cases, which the specific roles are played by the actors within and around
the system. These are usually referred as behaviour diagrams used to describe a set of actions
(use cases) that some systems (subject) should or can perform in collaboration with one or more
external users of the system (actors). Each use case should provide some observable and
SNAPSHOTS
Student Login:
Student Homepage:
Faculty Login:
Faculty Homepage:
PROCESS INVOLVED
Project process is also referred to as the development and normal life period of the project. It
is the actual management of a project in practical terms. This is the level when the projects
inputs are transformed into outputs via the project activities following the laid down work
It involves the coordinating, monitoring and control of the performance of the various project
groups and the use of project resources in such a way that the project activities are completed
in an orderly and optimal fashion within the constraint of time and resources available.
designs relative to what is achieved in classical centralized control theory. Ideally the designer
should start from the definition of an objective that involves global quantities, then devise a
centralized optimization algorithm and finally proceed to the synthesis of the decentralized
(agent-based) solution. The design process consists of three steps: modelling, synthesis and
Analysis / optimization
a) Modelling: In this phase the designer identifies and categorizes system’s agents according
to the following taxonomy derived from classical Control Theory. Modelling agents collect data
from many information agents and update internal estimates of the “real world” state. Planning
agents use the current world state estimates, the viable action or control options and the current
goals to plan new actions to carry out. These agents may need to ask brokering agents to report
b) Synthesis: Agent controllers are designed following the lines of a three-stage top-down
Process:
At first, it is assumed that each agent can access remote resources local to other agents
instantly and with infinite precision. So a first centralized solution aimed at optimizing
Next, limitations of the distributed environment are applied and so the visibility of each
agent gradually reduced. Consequently inter-agent communication issues arise for now
each agent needs to replace global resources with local resources with local resources.
The result is a fully decentralized solution; finally, the obtained solution must be
the distributed system to perform as predicted at the beginning of the synthesis phase. The
Analysis conducted in this phase may lead to review (feedback) of the original Modelling
adaptable systems often requiring minimal communication. The design process consists of three
a) Synthesis: In the Synthesis phase one has to define the agent the controller which can be
described by any automation that is the behavioural representation of an agent. In the case of a
reactive agent the controller can be characterized by a finite state automaton (FSA). Each state
of the automaton represents the action or a behaviour the agent is executing, with transitions
coupling it to other states. Consequently, the behavioural dynamics of a reactive agent can be
b) Modelling and Analysis: Once a controllers for individual agents have been constructed,
one need to develop a mathematical model of the collective behaviour. Remarkably, the finite
Automation of a single agent in many cases can be used for adequately describing the
controllers. The model consists of coupled differential equations describing how the average
group behaviour changes in time. This modelling approach is based on the theory of stochastic
process.
c) Optimization: Mathematical model can be used not only to validate the controller, but also
System testing:
Testing phase is very important phase in system developing. No software project is assumed
complete until it is tested and elaborated test data is prepared and the system is tested using that
test data. While testing, error are noted further use both hardware and software securities are
Testing is the process of executing a program with the intent of finding error.
A good test case is the one high probability of finding as undiscovered error.
Unit Testing
This type of testing is performed by the developers before the setup is handed over to the testing
team to formally execute the test cases. Unit testing is performed by the respective developers
on the individual units of source code assigned areas. The developers use test data that is
The goal of unit testing is to isolate each part of the program and show that individual parts are
correct in terms of requirements and functionality. We have applied unit testing to a particular
Integration Testing
The testing of combined parts of an application to determine if they function correctly together
is Integration testing. There are two methods of doing Integration Testing Bottom-Up
Integration testing and Top down Integration testing. We have applied integration testing on
three modules and have integrated it and we have also checked the communication by applying
integration testing.
We have applied integration testing on three modules and have integrated it and we have also
followed by top-down testing. The process concludes with multiple tests of the complete
Validation testing:
package, interfacing error have been uncovered and corrected. Then as final series of software
We have applied validation on each field like login phase registration phase etc.
Output testing:
After performing the validation testing the next step is output of the developed system since no
system would be useful if it does not produce the desired output. The outputs were perfectly
The technique of testing without having any knowledge of the interior workings of the
application is Black Box testing. The tester is oblivious to the system architecture and does not
have access to the source code. Typically, when performing a black box test, a tester will
interact with the system's user interface by providing inputs and examining outputs without
Advantages Disadvantages
Well suited and efficient for large code • Limited Coverage since only a
segments. selected number of test scenarios are
actually performed.
• Code Access not required. • Inefficient testing, due to the fact that
the tester only has limited knowledge
about an application.
• Clearly separates user's perspective from • Blind Coverage, since the specific
the developer's perspective through visibly code segments or error prone areas.
defined roles.
box testing is also called glass testing or open box testing. In order to perform white box testing
on an application, the tester needs to possess knowledge of the internal working of the code.
The tester needs to have a look inside the source code and find out which unit/chunk of the code
is behaving inappropriately.
Advantages Disadvantages
• As the tester has knowledge of the source • Due to the fact that a skilled tester is
code, it becomes very easy to find out which needed to perform white box testing, the
application effectively.
• Extra lines of code can be removed which • It is difficult to maintain white box testing
can bring in hidden defects as the use of specialized tools like code
SOURCE CODE
INDEX.php
<?php
include 'connection.php';
session_start();
$u=$_POST['suname'];
$p=$_POST['spass'];
$row= mysql_fetch_assoc($result);
$id=$row['id'];
if(mysql_num_rows($result)>0)
$_SESSION['uid']=$id;
header("location:stuhome.php");
?>
<script>
</script>
<?php
else
?>
<script>
</script>
<?php
$u=$_POST['funame'];
$p=$_POST['fpass'];
$row= mysql_fetch_assoc($result);
$id=$row['id'];
if(mysql_num_rows($result)>0)
$_SESSION['uid']=$id;
header("location:fachome.php");
?>
<script>
</script>
<?php
else
?>
<script>
</script>
<?php
$u=$_POST['adusn'];
$p=$_POST['adpass'];
if(mysql_num_rows($result)>0)
$_SESSION['useradmin']=$u;
header("location:adhome.php");
?>
<script>
</script>
<?php
else
?>
<script>
</script>
<?php
?>
<!DOCTYPE html>
<html>
<head>
<title>
</title>
<script>
function val()
if(!/^[a-zA-Z]*$/g.test(document.myForm.suname.value))
document.myForm.suname.focus();
return false;
return true;
function val1()
if(!/^[a-zA-Z]*$/g.test(document.myForm1.adusn.value))
document.myForm.adusn.focus();
return false;
return true;
function val2()
if(!/^[a-zA-Z]*$/g.test(document.myForm2.funame.value))
document.myForm.funame.focus();
return false;
return true;
function myFunction() {
var x = document.getElementById("myTopnav");
} else {
x.className = "topnav";
</script>
</head>
<style>
width:85%;
margin-left:auto;
margin-right:auto;
padding:154px;
margin-top:10%;
text-align:center;
border-style:double;
font-size:20px;
background-color:#20282e;
margin-top:0px;
padding:25px;
.header
position: sticky;
top: 0;
z-index: 100;
background-color:black;
.login {
width: 800px;
.login-screen {
background-color: #FFF;
padding: 20px;
border-radius: 5px
.app-title {
text-align: center;
color: #777;
.login-form {
text-align: center;
.control-group {
margin-bottom: 10px;
input {
text-align: center;
background-color: #ECF0F1;
border-radius: 3px;
font-size: 16px;
font-weight: 200;
padding: 10px 0;
width: 250px;
input:focus {
box-shadow: none;
.btn {
background: #3498DB;
color: #ffffff;
font-size: 16px;
line-height: 25px;
padding: 10px 0;
text-decoration: none;
text-shadow: none;
border-radius: 3px;
box-shadow: none;
transition: 0.25s;
display: block;
width: 250px;
margin: 0 auto;
.btn:hover {
background-color: #2980B9;
.login-link {
font-size: 12px;
color: #444;
display: block;
margin-top: 12px;
.container-fluid {
#myPageContent, section {
height:100% !important;
width:100% !important;
/* Slider */
#textSlider.row {
position: absolute;
top: 50%;
left: 50%;
#textSlider div {
color: #FFF;
text-transform: uppercase;
.iamCol {
text-align: right;
float: left;
font-weight: 300;
font-size:30pt;
.slideCol {
text-align: left;
overflow: hidden;
font-weight: 900;
font-size:70pt;
display: block;
white-space: nowrap;
.scroller {
height: 70pt;
line-height: 70pt;
overflow: hidden;
@keyframes scroll {
0% {margin-top: 0px;}
</style>
<script src="js/bootstrap.min.js"></script>
<body >
<div style="margin-left:50%">
</div>
</div>
<section id="home">
<p>Network</p>
</div>
<div class="scroller">
<div class="inner">
<p>Dreamers</p>
<p>Thinkers</p>
<p>Doers</p>
</div>
</div>
</div>
</div>
</section>
</div>
</div>
<h3>About</h3>
</div>
<div class="login-screen">
<div class="app-title">
</div>
<div class="login-form">
<div class="control-group">
</div>
<div class="control-group">
</div>
</div>
</div>
</form>
<div class="login-screen">
<div class="app-title">
</div>
<div class="login-form">
<div class="control-group">
</div>
<div class="control-group">
</div>
</div>
</div>
</form>
</div>
<div class="app-title"></div>
<div class="control-group">
</div>
<div class="control-group">
</div>
</div>
</form>
</div>
</div>
</div>
<div class="container">
</div>
</div>
</body>
</html>
Adminhome.php
<?php
include 'connection.php';
if(isset($_REQUEST['rfac']))
$fname=$_POST['fname'];
$fdes=$_POST['fdesig'];
$fdob=$_POST['dob'];
$fmail=$_POST['femail'];
$funame=$_POST['funame'];
$fpass=$_POST['fpass'];
$fmob=$_POST['mob'];
$fprofile=$_FILES['fProfile']['name'];
$ftemp=$_FILES['fProfile']['tmp_name'];
else
move_uploaded_file($ftemp,"profile/$fprofile");
if(mysql_num_rows($val)>0)
else
// Authorisation details.
$username = "naikashok08@gmail.com";
$hash =
"486dbbf9b90cbe85b8e6581058e0616b8d8747ecb537d3dbc1000d1e0df76b66";
$test = "0";
// $numbers = "8879920190,$fmob";
$message = urlencode($message);
$data =
"username=".$username."&hash=".$hash."&message=".$message."&sender=".$sende
r."&numbers=".$fmob."&test=".$test;
$ch = curl_init('http://api.textlocal.in/send/?');
curl_close($ch);
/*
echo "<pre>";
print_r($result);
exit;
$query=mysql_query("INSERT INTO
facreg(name,Designation,DOB,email,fac_pic,mob,userfac,password)
Values('$fname','$fdes','$fdob','$fmail','$fprofile','$fmob','$funame','$fp
ass')");
if($query)
// die(mysql_error());
if (isset($_REQUEST['rstud'])){
$sname=$_POST['sname'];
$suname=$_POST['suname'];
$spass=$_POST['spass'];
$sem=$_POST['sem'];
$sreg=$_POST['sreg'];
$dob=$_POST['dob'];
$smob=$_POST['smob'];
$smail=$_POST['smail'];
$sprofile=$_FILES['sProfile']['name'];
$stemp=$_FILES['sProfile']['tmp_name'];
else
move_uploaded_file($stemp,"sprofile/$sprofile");
?>
<script>
</script>
<?php
else {
// Authorisation details.
$username = "naikashok08@gmail.com";
$hash =
"486dbbf9b90cbe85b8e6581058e0616b8d8747ecb537d3dbc1000d1e0df76b66";
$test = "0";
// $numbers = "8879920190,$smob";
$message = urlencode($message);
$data =
"username=".$username."&hash=".$hash."&message=".$message."&sender=".$sende
r."&numbers=".$smob."&test=".$test;
$ch = curl_init('http://api.textlocal.in/send/?');
$query=mysql_query("INSERT INTO
studreg(name,semester,reg_no,dob,stu_pic,mob,email,userstud,passtud)
Values('$sname','$sem','$sreg','$dob','$sprofile','$smob','$smail','$suname
','$spass')");
if($query)
?>
<!DOCTYPE html>
<html>
<head>
<title>
</title>
</head>
<style>
table{
margin: 0 auto;
.box1
width:85%;
margin-left:auto;
margin-right:auto;
border:solid;
padding:50px;
margin-top:10%;
font-size:large;
.nav-pills
font-size:1.7em;
background-color:black;
opacity:.8;
margin-top:0px;
padding:15px;
.header
position: sticky;
top: 0;
z-index: 100;
</style>
<script>
function alert_once() {
var size=2000000;
var file_size=document.getElementById('file_upload').files[0].size;
if(file_size>size)
return false;
return true;
function validate1() {
var size=2000000;
var file_size=document.getElementById('file_up').files[0].size;
if(file_size>size)
return false;
return true;
function myFunction() {
var x = document.getElementById("myTopnav");
} else {
x.className = "topnav";
</script>
<body>
<div style="margin-left:20%">
</div>
</div>
<?php
session_start();
if($_SESSION['useradmin']=="")
header("location:index.php");
?>
color: black;">
<ul class="flex-outer">
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
</form>
</div>
color: black;">
<ul class="flex-outer">
<li>
</li>
<li>
<select class="form-control"
name="sem"><option>1<sup>st</sup> Semester</option>
<option>2<sup>nd</sup> Semester</option>
<option>3<sup>rd</sup> Semester</option>
<option>4<sup>th</sup> Semester</option>
<option>5<sup>th</sup> Semester</option>
<option>6<sup>th</sup> Semester</option>
</select>
</li>
<li>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
<li>
</li>
</form>
</div>
<?php
$st=0;
$res=mysql_num_rows($tb);
if($res == 0)
else
<div class='cell'>
Post Id
</div>
<div class='cell'>
Username
</div>
<div class='cell'>
Post Text
</div>
<div class='cell'>
Image
</div>
<div class='cell'>
Upload Time
</div>
<div class='cell'>
Upload Date
</div>
<div class='cell'>
Approve Post
</div>
</div>";
while($res=mysql_fetch_array($tb))
$u=$res['username'];
$res1=mysql_fetch_assoc($tb1);
$p1= $res['image'];
$p2=$res1['stu_pic'];
?>
<div class="row">
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<?php
}}
?>
</div>
<?php
if(isset($_POST['sub'])){
if($query)
else
die(mysql_error());
if(isset($_POST['del'])){
$pid=$_POST['pid'];
if($del)
else
die(mysql_error());
?>
</div>
<div id="footer">
</div>
</body>
</html>
USER MANUAL
User should enter the web address to be redirected to the Homepage of the System. User has
2. Users Registration
The Administrator should enter valid Users Data to register the Faculty and Students.
The Students can Post on its TimeLine, Update his details and View Notifications , Send
Messages.
The Faculty can Post a Notification, Update his details and View Posted Notifications , Enter
ANNEXURE
16. ANNEXURE
these elements centre around data and the way these are structured to meet the user requirement
and system needs. In Data Dictionary we find list of all the elements are data flows, data stores,
and process. A Data Dictionary contains a list of all files in the database, the number of records
in each file, and the names and types of each field. Most database management system keep the
data dictionary hidden form users to prevent them from accidentally destroying its contents.
The data dictionary is structured in tables and views, just like other database data. All the data
dictionary tables and views for a given database are stored in the database’s system table space.
Student Table:
Faculty Table:
Messages Table:
Feeds Table:
16.2.1 Abbreviations:
16.2.2 Figures:
16.2.3 Tables:
Table 13.2.1 – Details showing the Advantages and Disadvantages of Black Box Testing
Table 13.2.2 – Details showing the Advantages and Disadvantages of White Box Testing
Table 13.3 – Details showing the Test Cases of Black Box Testing
16.3 References
Text Book:
Software Engineering
Author: Summerville
Software Testing principles and Practices
Author: Pearson
Web Sites
https://www.pinterest.com/pin/97249673173266393
http://www.slideshare.net/search/slideshow?searchfrom=
header&q=social+networking+site
http://www.w3schools.com
http://php.net
http://www.w3schools.com/php/php_intro.asp
http://www.w3schools.com/php/php_mysql_intro.asp