Professional Documents
Culture Documents
Number of Modules and Their Description : Raghvendra Pratap Singh - MCA-873
Number of Modules and Their Description : Raghvendra Pratap Singh - MCA-873
Number of Modules and Their Description : Raghvendra Pratap Singh - MCA-873
com
3. Projects category
6. Scope of solution
11. Bibliography.
SearchBuddies.com
We define social network sites as web-based services that allow individuals to (1) construct a public or
semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a
connection, and (3) view and traverse their list of connections and those made by others within the
system. The nature and nomenclature of these connections may vary from site to site.
The purpose of this introduction is to provide a conceptual, historical, and
scholarly context for the articles in this collection. We begin by defining what constitutes a social
network site and then present one perspective on the historical development of SNSs, drawing from
personal interviews and public accounts of sites and their changes over time. Following this, we review
recent scholarship on SNSs and attempt to contextualize and highlight key works. We conclude with a
description of the articles included in this special section and suggestions for future research.
Since their introduction, social network sites (SNSs) such as My
Space, Face book, Cyworld, and Bebo have attracted millions of users, many of whom have integrated
these sites into their daily practices. Most sites support the maintenance of pre-existing social networks,
but others help strangers connect based on shared interests, political views, or activities. Some sites
cater to diverse audiences, while others attract people based on common language or shared racial,
sexual, religious, or nationality-based identities. Sites also vary in the extent to which they incorporate
new information and communication tools, such as mobile connectivity, blogging, and photo/video-
sharing.
Scholars from disparate fields have examined SNSs in order to
understand the practices, implications, culture, and meaning of the sites, as well as users' engagement
with them. This special theme section of the Journal of Computer-Mediated Communication brings
together a unique collection of articles that analyze a wide spectrum of social network sites using
various methodological techniques, theoretical traditions, and analytic approaches. By collecting these
articles in this issue, our goal is to showcase some of the interdisciplinary scholarship around these sites.
What makes social network sites unique is not that they allow individuals to meet
strangers, but rather that they enable users to articulate and make visible their social networks.
Objective :-
The Objective of my project is to connect with friends and family using
scraps and instant messaging .Also we can search new friends through friends and communities and
share our videos, pictures, and passions all in one place.
Through this website we can interact with different people.
We make new friends.
Faster, robust and efficient in processing of information.
We can share valuable data with them.
We can make a big network of friends using this site.
Project category:
TOOLS/PLATFORM USED:
Front End : JEE 5.0 (JSP, Servlet, Struts)
Features of JEE(5.0):
Features are:
CD writer 52x
Component Specification
Processor 333 MHz Intel Pentium-4
Memory 128 MB DDR(Recommended)
Hard drive 40GB or higher(Min 30MB virtual Memory)
Modem 56 KBPS
Monitor 17” color work monitor
Keyboard Microsoft Standard 102 keys OR Normal keyboard.
Mouse Optical
CD writer 52x
Component Specification
Processor 1.0 GHz Intel Pentium-4
Memory 1 GB DDR
Hard drive 40 GB or higher
Modem 56 KBPS
Monitor 17” color work monitor
Keyboard Microsoft Standard 102 keys OR Normal keyboard.
Mouse Optical
CD writer 52x
Requirement Specification:
Conventions are as follows:
Raghvendra Pratap Singh |MCA-
873
Search Buddies.com
R - Required
– Optional
C - Conditional
Non-Functional Requirement:
“Non-functional requirement deal with the characteristics of the system that can not be
expressed functionally”.
Performance:
The manual handling of the record is time consuming and highly prone to error. To improve
the performance of the Social Networking Sited, the online computerized system is to be
undertaken. This project is fully computerized and user friendly even that any of the
members can see the profile of another user and send a friend request.
Efficiency:
The basic need of this website is efficiency. The website should be efficient so that
whenever a new user submits his/her details the website is updated automatically. This
record will be useful for other users instantly.
Control:
The complete control of the project is under the hands of authorized person who has the
password to access this project and illegal access is not supposed to deal with. All the
control is under the administrator and the other members have the rights to just see the
records not to change any transaction or entry.
Security:
Security is the main criteria for the proposed system. Since illegal access may corrupt the
database. So security has to be given in this project.
The objective of software project planning is to provide a framework that enables the manager to
make reasonable estimates of resources, cost, and schedule. Here I have prepared the PERT chart for
planning.
PERT Chart:
Scheduling PERT Chart and Gantt chart are the major parts of it. Program Evaluation
and Review Technique (PERT) and Critical Path Method (CPM) are two project-scheduling methods that
can be applied to software development. Interdependencies among tasks may be defined using a task
network. A task network, also called an activity network is a graphic representation of a task flow for a
project. Activities and their descriptions for the PERT chart are given below
7 8 9
10
11
12 13 14 15
16
17
18
19
20
PERT Chart
Gantt Chart:
Gantt chart is the breakup of the project into a number of smaller tasks. The start date,
duration and the effort are defined for each task. The tasks are listed on the y-axis and the horizontal
bars against each task indicate the duration of the task.
Gantt chart
Task No. Task 5-7 weeks 3-6 weeks 4-6 weeks 1-2 weeks 1-2 weeks 1 Weeks
1 Requirement
Analysis
2 Design
3 Coding
4 Testing&quality
Assurance
5 Documentation
6 Implementation
Scope of solution:
When designing any solution there are three factors that affect the solution: Time, Cost, Scope.
I have found that our clients generally have a clear definition of the Time allowed for any solution along
with a level of the amount of investment (cost) they are prepared to invest. This leaves only scope as a
major variable in solution design.In my project I add the extra features like adding new friends through
friends and communities and share our videos, pictures, and passions all in one place. Through this
website we can interact with different people. We make new friends. Faster, robust and efficient in
Raghvendra Pratap Singh |MCA-
873
Search Buddies.com
processing of information. We can share valuable data with them. We can make a big network of friends
using this site.
stop
yes no
Is valid
User? no
LOGOUT
yes
USER Privileges
Expert Vedio
Chat Room
Carrier Forum
c Carrier
Chat Room Forum
Expert Vedio
Usser
Raghvendra Pratap Singh |MCA-
873
Search Buddies.com
ER-Diagram
Forum Module:-
In this module user creates forum and post to their friend’s .Admin can
define forum type. User can create different types of forum post it and get reply from their friends.
Message Module:-
Photo Module:-
Users maintain this module. Users can add their photos to their profile.
Through this module user can create his or her account with valuable
information on the site.
Raghvendra Pratap Singh |MCA-
873
Search Buddies.com
Users maintain this module. Users can edit their profiles and
make changes in it. Users can also add their picture to their profiles. In this module users can give
their detailed information.
The Administrator provided the facilities of the subject expert vedio that
bassed on the special topics in computer science and the subjects relatyed presentations.
Tab
le Name - ForumType
Field Name Data Type Size (Bit) Key
name Varchar 30
lastmodifiedby Varchar 10
lastmodifiedon Date 01
createdbyon Character 01
thumbphotopath Varchar 25
lastmodifiedby Varchar 10
lastmodifiedon Date 01
aboutcategory Varchar 50
lastmodifiedby Varchar 10
lastmodifiedon Date 01
iii. It generates the update message info to the user as well as to the admin.It also updated the
database info.
Photo Module :
i. It takes photos details from users.
ii. After receiving all above details it process and generates the following information to the end users.
iii. It sends the path of photos to the database and stores the photos of users at the server.
i. It takes Whiteboard details from User and whiteboard description detail from the admin.
ii. After receiving all above details it process and generates WhiteBoard information to the end users.
iii. It generates whiteboard info to the user & whiteboard reply info to the admin as well as update the
info to the database.
Report generation :
Spiral Model
Expert Vedio
Chat Room
Carrier Forum
Need of Security
Security should be a very important and concerning issue in our every day
activity. No matter you are parts of a company or a home user, it is very important to protect
your work. You need good security software. Every organization and individual possesses
certain vital information - a unique formula, specialized customer database, a personal diary,
annual financial data, etc. The organization would be compromised if such data fell into the
wrong hands. Until a few years ago, protecting such information was relatively easy. All one
required was a strong safe with a single key to access it. However, such privacy does not exist
anymore. Encryption is now the only way to protect your valuables. Currently, except for a few
strong encryption packages, there are no means available to perform this critical encryption
function.
Authentication:
Authentication usually involves a username and a password, but can include any other method
of demonstrating identity, such as a smart card, retina scan, voice recognition, or fingerprints.
Since browsers first started implementing basic authentication, website administrators have
wanted to know how to let the user log out. Since the browser caches the username and password
with the authentication realm.
Authorization :
Authorization is the process of giving someone permission to do or have something. In
multi-user computer systems, a system administrator defines for the system which users are
allowed access to the system and what privileges of use (such as access to which file directories,
hours of access, amount of allocated storage space, and so forth). Authorization is the process of
controlling access and rights to resources, such as services or files.
We can do many enhancements in future in this project. We can also add many modules in it such
as:
I am very glad to inform that during the making of this proposal, I have taken
help of various books. They were very helpful to me and provided a lot of guidance. I am very
grateful to the writers of those books, some of them are as follows:
Java :The Complete Reference, By: Herbert Schildt, Published By: McGraw
Hill Higher Education.
JSP Tag Libraries, Manning Publication co., Gal Sachor, Adam chace, Magnus
Rydin.
J2EE Complete reference, for Servlet and JSP, publication Tata McGraw-Hill.
Raghvendra Pratap Singh |MCA-
873
Search Buddies.com