Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

Technical Project Report

ON
“behavior detection of online users on a
social network”
Submitted in partial Fulfillment of the requirement for the Degree

BACHELOR OF TECHNOLOGY
IN

Computer Science & Engineering


BY
ABHIJIT SAHOO REGD. NO. : 0701287078
BIJAYA KUMAR DASH REGD. NO. : 0701287105
MAHAPRASAD JENA REGD. NO. : 0701287115

SUPERVISED BY:
PROF. SRINIVAS PRASAD

GANDHI INSTITUTE FOR TECHNOLOGICAL


ADVANCEMENT
(G.I.T.A.), BHUBANESWAR
APRIL 2010
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING

GANDHI INSTITUTE FOR TECHNOLOGICAL


ADVANCEMENT
(At: Badaraghunathpur, P.o.: Janla via Bhubaneswar.Pin-752054 Dist: Khurda, Orissa)

Ref. No.: ………………. Date: …………………….

Certificate
This is to certify that the project report entitled “behavior detection of
users of a social network” submitted by ABhijit sahoo,bijaya kumar
dash and mahaprasad jena bearing University Registration no.
0701287078, 0701287105 & 0701287115 respectively in the batch 2007-
2011 is an authentic work carried out by them at Gandhi Institute For
Technological Advancement under my guidance. . The matter embodied
in this project work has not been submitted earlier for the award of any
degree or diploma to the best of my knowledge and belief.

prof. manoranjan pradhan prof. srinivas prasad

(head of the department) (project -in- charge)

DEPT OF CSE, GITA


Acknowledgement

We would like to take this opportunity to express our profound sense


of gratitude and respect to all those who helped us throughout the duration
of this project. The social networking site in particular has been the source
of inspiration for us. We acknowledge the effort of those who have
contributed significantly to our project. We express our sincere gratitude
and thankfulness towards our H.O.D. PROF. MANORANJAN PRADHAN,
PROF.srin ivas prasad for their valuable time and guidance throughout this
course.

We feel privileged to offer our sincere thanks and deep sense of


gratitude to H.O.D. PROF. MANORANJAN PRADHAN, PROF. TARINI
PRASAD PANIGRAHI, PROF. B.K. PANDA and all the C.S.E. DEPT.
faculties for expressing their confidence in us by letting us work on a project
of this magnitude and using the latest technologies and providing their
support, help & encouragement in implementing this Project.

We would like to express our sincere gratitude towards all our


teachers, for their skillful Teaching, precious suggestions and
encouragements. I regret any inadvertent omissions.

Abhijit Sahoo Email:abhijitsahoo0790@gmail.com

Bijaya Kumar Dash Email:bijaya.k.dash@gmail.com

Mahaprasad Jena Email:mahaprasadjena@gmail.com

DEPT OF CSE, GITA


ABSTRACT
.

This project entitled “BEHAVIOUR DETECTION OF ONLINE


USER IN A SOCIAL NETWORK ” has been designed for the benefit of
user those who are facing lots of problems for getting unnecessary
messages, spam ,advisement for which they have no interest. It will be
implemented completely at any place.

The project has been an enriching experience for us in the field of


detecting the behavior of a person. by detecting the behavior particular
advertisement, messages can be sent to the user on which he has some
interest. interest is calculated numerically by mathematical functions using
various user data. The project has been developed to fulfill the requirements
of the both user and developer. as well as it helps to develop a business
environment for quality advertisement and marketing.

The tools and technologies used for developing the software are PHP
as scripting language and JAVASCRIPT& HTML are used as front ends.
both are used for coding, implementation, designing and developing phases.

APACHE web server is used along with mysql server as backend and
php interpreter with a single open source package for all windows and
xwindows platform known as XAMPP tool.

DEPT OF CSE, GITA


TABLE OF CONTENTS
Topics

 INTRODUCTION

 SYSTEM ANALYSIS AND DESIGN

 DESIGN OF THE SYSTEM

 DATA FLOW DIAGRAM (DFD’S)

 TESTING AND IMPLEMENTATION

 SCREENSHOTS

 RESULT AND CONCLUSION

 REFERENCES

DEPT OF CSE, GITA


INTRODUCTION
On an online environment people checks their mails and visits social network for being
connected with the friends. according to the facebook statistics there are more than 500
million active users and 50% of the active users log on to facebook in any given day.
People spend over 700 billion minutes per month on Facebook.

As we find people are active for such a long time in internet so it became
important place for the business world to place advertisements. but the advertisements
are making the scenario of internet very ugly by their bulk mails and large no of adds.
That is why we have number of messages in our spam folder .

Therefore to overcome this problem detecting the interest and behavior of


people is going to be necessary for sending them better advertisements. it helps us to
have citation for those advertisements of our interest and benefits.

The primary focus for better advertisements is to know the background,


profession, most importantly the interest, likes and dislikes of the users.

There are over 900 million objects that people interact with (pages, groups, events and
community pages). Average People spend over 700 billion content (web links, news
stories, blog posts, notes, photo albums, etc.) shared each month.user is connected to 80
community pages, groups and events. Average user creates 90 pieces of content each
month. More than 30 billion pieces of Determining users behavior is possible because
according to the statistics of Facebook average user has 130 friends.

People’s interest is determined by the advertisements. This system scans


individual words, its type and it has algorithms to find the weight of each word and its
type for predicting the behavior up to a extent. The behavior can be predicted from the
chatting , messages and types of community and posts in the community . Numbers of
websites he redirected to, and finally his interest is determined by the advertisements to

DEPT OF CSE, GITA


which he react to. a learning algorithm is implemented to find how correctly he is
predicted.

At the time of registration user is asked to fill up a form asking him/her for his/her
interest in all aspects and his basic community like his schooling and college etc.

Surveys using probability about the basic actions of a particular


community is also determined. Using probability number of user will log in is also
determined and algorithms are implemented to find how many user of a particular
interest are available when.

This system not only provides good advertisements but also decreases the
irritations of seeing unnecessary advertisements for example a B.Tech student is getting
a adds of joining diploma .a female is getting advertise of men’s ware etc.This system
also provides a good statistics to develop business strategy and environment for
business.

Along with all the benefits the privacy of individual is also concerned and
personal information like user id is encrypted and unavailable for all the third parties.

OBJECTIVE OF THE SYSTEM:-

This Web Application provides facility to detect the behavior so that anybody
can get rid of the unnecessary scraps or messages . It saves time as it allows number of
users to see the advertisement of their interest. the purpose of behavior detection is to
intelligent detection of behavior for better adds.

The purpose of this application are as follows :

DEPT OF CSE, GITA


The system can be implemented in any social network and behavior
detection algorithm can be used with any mailing system to find user’s taste
for providing them accurate service and involving them with the
advertisement of their interest.

JUSTIFICATION AND NEED OF SYSTEM:


As we have seen in the previous system, we can not judge the users taste and
number of user login of a particular interest. so for displaying advertisements

They cant not find the number of the user interested for the given advertisements so
they display the advertisement in my profile, which not only consumes web page space
but also have no use for the user.

The number of advertisement that can be displayed is also get limited.

Therefore this system objectively defines the weight of different behavior of


different user and helps to decide the distribution and priority of the advertisement.

ADVANTAGES OVER TRADITIONAL SYSTEMS AND FEATURES


 More interested users get the advertisements for longer periods
 According to the priority of the interest the special advertisement got displayed in
proper profile.
 Probability and priority is also calculated for specific type advertisements.

DRAWBACKS OF PRESENT SYSTEM

 It is a newly implemented system and required highly expertise people to think


and design the algorithm.
 More memory space is require to store the behavior of all user and vocabulary
dictionary is also to be defined.
 Overheads of processing the behavior is also incurred which may slow down the
system while login for those computers which do not have a high speed internet
connection.

PREVIOUS WORK AND RELATED WORKS:

DEPT OF CSE, GITA


There are a rich set of studies on analyzing the workloads of Web 2.0 services. Mislove
studied graph theoretic properties of OSNs, based on the friends network of Orkut,
Flickr, LiveJournal, and YouTube. They confirmed the power-law, small-world, and
scale-free properties of these OSN services. Ahn studied the network properties of
Cyworld, a popular OSN in South Korea. They compared the explicit friend
relationship network with the implicit network created by messages exchanged on
Cyworld's guestbook. They found similarities in both networks: the in-degree and out-
degree were close to each other and social interaction through the guestbook was highly
reciprocal. Liben-Nowell analyzed the geographical location of LiveJournal users and
found a strong correlation between friendship and geographic proximity. Krishna
Murthyet analyzed an OSN formed by users on Twitter. they examined geographical
spread of Twitter usage and also analyzed user behavior in this environment.
Second, we are interested in understanding content distribution patterns across multiple
OSNs. We would like to know to what extent content is shared across OSN sites as well
as explore the impact of age, content, and geographical locality in object popularity.
Given that users participate in multiple social networks, we expect that a user may share
the same content across multiple sites. Answering these questions will let us explore
opportunities for efficient content distribution, for example, caching and pre fetching, as
well as advertisement and recommendation strategies. For instance, certain types of
content may be popular either in a special geographical region or in a single social
network, in which case advertisement algorithms should be based on this characteristic.
On the other hand, if content is easily replicated across sites, then we can detect rising
content from one social networking site and implant it into another site. Lastly, based
on our analysis, we plan to build a social network including the statistical distributions
of sessions and requests and scraps and community and we scanned them and processed
them for determining user’s behavior.

ASSUMPTIONS:

DEPT OF CSE, GITA


For making the system working we assume that the user interact with other users with
scrap and by joining communities. While designing the system we assumed the session
service is switched on for storing session data.multiples users can access the database
and database server guarantees deadlock free and fast access environment.ther is no run
time error or critical bug in the existing softwares like for example XAMPP package

DESIGNING OF SYSTEM:-
Feasibility Study :

In feasibility study phase we had undergone through various steps which are describe
as

//about d PRJ

Technology used:

Front end: html,javascript.

Back end: mysql,apache server.

Scripting language: php.

Hardware and software requirement:=

We recommend the following MINIMAL specifications:


 512MB+ of RAM
 1GHz+ cpu (preferably Multi-Core Intel based)
 A fast storage system any 32 bit or 64 bit micro processor with 32 bit or 64 bit
operating system.
 Any web server (e.g Apache, Tomcat).
 A PHP interpreter.
 Mysql Database server as backend.
 Any Java script supported web browser.

DEPT OF CSE, GITA


All the services like PHP interpreter, Mysql server, web server are built into a single
software known as XAMPP.

Features of XAMPP and installation


XAMPP is a small and light Apache distribution containing the most common
web development technologies in a single package. Its contents, small size, and
portability make it the ideal tool for students developing and testing applications in PHP
and MySQL.

XAMPP is available as a free download in two specific packages:-full and


lite.While the full package download provides a wide array of development tools, this
article will focus on using XAMPP lite which contains the necessary technologies that
meet the Ontario Skills Competition standards.

As the name implies, the light version is a small package containing Apache
HTTP Server, PHP, MySQL, phpMyAdmin, Open ssl, and SQLite.
Hardware requirement for XAMPP
In order to be able to successfully run XAMPP Lite, you will require 17 MB for the
self-extracting ZIP.
Installation archive and at least 118 MB after it has been extracted on a local hard
disk or USB drive.
SOFTWARE REQUIREMENTS
A Personal Computer (laptop) with the following software configuration:

 Any 32 bit or 64 bit microprocessor with 32 bit or 64 bit operating system


 Apache Web Server
 PHP enabled
 MySQL Database Server

DEPT OF CSE, GITA


 Mozilla Firefox 3.5.2 or above (any browser).

Linux
XAMPP is designed to work on any Debian based distribution.

The following distributions were tested and known to work with XAMPPDebian
2.6+Ubuntu 8.04+
Note: There are versions for 32bit and 64bit, please make sure to download the
right version.
Windows:-

XAMPP was tested on XP based and should work on any NT based windows server.

Web server
A web server is a computer program that delivers (serves) content, such as web
pages, using the Hypertext Transfer Protocol (HTTP), over the World Wide Web. The
term web server can also refer to the computer or virtual machine running the program.
In large commercial deployments, a server computer running a web server can be rack-
mounted with other servers to operate a web farm.
Apache 2.2
PHP 5.2.9
Data Base
MySQL 5
System Development Life cycle
The structured sequence of operation required imaging developing and Making
operationally a new information system it’s a cycle because the System will need
replacement and Development, cycle will begin.

Phases of sdlc
 system Analysis
 System Design
 Coding

DEPT OF CSE, GITA


 System Testing
 system Implementation
 System Maintenance

System Development Life Cycle


System development life cycle is a process of developing software on the basis of
the requirement of the end user to develop efficient and good quality software. It is
necessary to follow a particular procedure. The sequence of phases that must be
followed to develop good quality software is known as SDLC {system development life
cycle}.The software is said to have a life cycle composed of several phases. Each of
these phases results in the development of either a part of the system or something
associated with the system, such as a test plan or a user manual. In the life cycle model,
called the “spiral model,” each phase has well-defined starting and ending points, with
clearly identifiable deliverables to the next phase. In practice, it is rarely so simple. As
with most undertakings, planning is an important factor in determining the success or
failure of any software project. Essentially, good project planning will eliminate many
of the mistakes that would otherwise be made, and reduce the overall time required to
complete the project. As a rule of thumb, the more complex the problem is, and the
more thorough the planning process must be. Most professional software developers
plan a software project using a series of steps generally referred to as the software
development life cycle. A number of models exist that differ in the number of stages
defined, and in the specific activities that take place within each stage. The following
example is a generic model that should give you some idea of the steps involved in a
typical software project.
A generic software development life cycle Analysis of user requirements During this
stage, the problem is defined so that a clear understanding can be gained of what the
system should do, i.e. what the inputs to the system are, what the output should be, and
the operational parameters within which the system is expected to work. If the new
system is to replace an existing system, the problem may be defined in terms of the

DEPT OF CSE, GITA


additional or enhanced functionality that is required.
Program design
In this stage, a solution to the problem is designed by logical sequence of steps
that will achieve each of the stated system objectives Such a sequence of steps is often
referred to as an algorithm.
Some of the methods used to define program algorithms aredescribed later in
this section, and include flowcharts and pseudo code.
These tools allow the program designer to break a given problem down into a
series of small tasks which the computer can perform to solve the problem. The user
interface will also be designed during this stage, and will determine how input is
obtained, how output is displayed, and what controls are available to the user.

Program coding
This stage, sometimes known as the implementation stage, is where the
algorithms are translated into a programming language, and tends to be the longest
phase of the development life-cycle. In this case, we are using Visual Basic to write the
program.

IMPLEMENTATION AND CODING ::---


A crucial phase in the system life cycle is the successful implementation of the
new system design. Implementation simply means converting a new system design into
operation.
This involves creating computer compatible files, training the operating staff and
installing hardware terminals, and telecommunication networkbefore the system is up
and running.
In system implementation, user training is crucial for minimizing resistance to change
and giving the new system a chance to prove its worth. Training aids such as user-
friendly manuals, a data dictionary and job performance aids that communicate
formation about the new system and help screens.

DEPT OF CSE, GITA


Provide the user with a good start on the new system. In the coding phase session
variable is implemented and is set to one on successful login. It prevents unauthorized
access in the login module we checked the databases directly and equate it to one for
authentic and consistent access.

DOCUMENTATION AND TESTING


The documentation of the program fulfils two main objectives. The first is to provide a
technical reference to facilitate ongoing maintenance and development of the software
itself.
The second is to provide user documentation, i.e. a set of instructions that inform
the user about the features of the software and how to use them.

The aim of software testing is to find any errors ("bugs") in the program, to
eliminate those errors (a process known as "debugging"), and as far as is reasonably
practicable should be sufficiently rigorous to ensure that the software will function as
expected under all foreseeable circumstances.
Operating and maintaining the system
Once the software has been "rolled out" and any necessary user training has been
completed, it will be necessary to monitor the performance of the system over time to
ensure that it is behaving as expected. The system will need to be maintained, and parts
of it will need to be upgraded from time to time to handle evolving user needs or to
cope with new problems. Eventually, as the system ages, it may no longer be able to
adequately cope with the demands of a growing number of users, take advantage of
advances in hardware technology, or adapt to a constantly changing environment.
Hence, the software development life cycle will begin gain.

SYSTEM TESTING
System testing is actually a series of different tests whose primary purpose is
to fully exercise the computer-based system. During testing I tried to make sure that the

DEPT OF CSE, GITA


product does exactly what is supposed to do. In the testing stage, I try to achieve the
following goals; to affirm the quality of the product, to find and eliminate any residual
errors from previous stages, to validate the software as a solution to the original
problem, to demonstrate the presence of all specified functionality in the product, to
estimate the operational reliability of the system.
During testing the major activities are concentrated on the examination and
modification of the source code and the functionality. The various system-testing
methodologies such as
Recovery testing, Stress testing and Performance testing are carried out for testing
the application.
The stages of testing process are : -
Unit Testing : -
Individual components are tested to ensure that they operate correctly. Each
component is tested independently, without other system component.
Module testing : -
A module is a collection of dependant components such as on object class, an
abstract data type or some looser collection of procedures and function. A module
encapsulates related components so can be tested with other system modules.
Acceptance testing : -
This is the final stage in the testing process before the system is accepted for
operational use. The system is tested with data supplied by the system procurer rather
than imulated test data. Acceptance testing may reveal error and omission in the system
requirement definition because the real data exercises the system in different ways from
the test data. Acceptance testing may also reveal the requirement problems where the
system’s facilities do not really meet the user’s needs or the system performance is
acceptable.
Recovery Testing ; -
In this test the system is tested by forcing it to fail in a Varity of ways and

DEPT OF CSE, GITA


verifies that the recovery is properly performed. The re-initialization, data recovery, and
restart are each evaluated for correctness.
Performance testing : -
Performance testing for the application is performed for finding the actual run-
time performance. Time taken for search and locate the required data is tested. The data
conversion accuracy and speed for the converter tool is also tested. Connectivity and
data transfer performance for live update facility of the application is tested by using
test data sets provided by the system testing specialists of the company.
INTEGRATION TESTING
Integration testing is concern with knowledge about validating that software
component, which have been unit tested separately, interact correctly when they are put
together to perform higher order function. In this application bottom up integration
testing is done.

Data base tables

Table structures

DFD

FUTURE SCOPE OF APPLICATION :-


This application can be easily implemented under various situations. We can add new
features as and when we require. Reusability is possible as and when require in this
application. There is flexibility in all the modules. This project has widespread in
market due to its attractive features.
SOFTWARE SCOPE:]
Extensibility:----
This software is extendable in ways that its original developers may not expect.

DEPT OF CSE, GITA


The following principles enhance extensibility like hide data structure, avoid traversing
multiple links or methods, avoid case statements on object type and distinguish public
and private operations.

Reusability:
Reusability is possible as and when require in this application. We can update it
next version. Reusable software reduces design, coding and testing cost by amortizing
effort over several designs. Reducing the amount of code also simplifies understanding,
which increases the likelihood that the code is correct. We follow up both types of
reusability: Sharing of newly written code within a project and reuse of previously
written code on new projects.

Understandability:
A method is understandable if someone other than the creator of the method
can understand the code (as well as the creator after a time lapse). We use the method,
which small and coherent helps to accomplish this.
Cost-effectiveness:--
Its cost is under the budget and make within given time period. It is
desirable to aim for a system with a minimum cost subject to the condition that it must
satisfy the entire requirement.

DEPT OF CSE, GITA

You might also like