Professional Documents
Culture Documents
MANASY M
NIVEDHITHA R
RANJINI PRIYA R
(211611104076)
(211611104092)
(211611104110)
BACHELOR OF ENGINEERING
IN
BONAFIDE CERTIFICATE
(211611104076),
RANJINI PRIYA.R
the
NIVEDHITHA.R
bonafide work of
(211611104092),
under my supervision.
SIGNATURE
SIGNATURE
Dr. G. SUJITHA
Mr.DHANASEKARAN .S
SUPERVISOR
Professor,
Assistant Professor,
Engineering,
Engineering,
1. MANASY. M
2. NIVEDHITHA. R
3. RANJINI PRIYA.R
INTERNAL EXAMINER
(211611104076)
(211611104092)
(211611104110)
EXTERNAL EXAMINER
ACKNOWLEDGEMENT
First we thank the Almighty god for the successful completion of the project.
Our sincere thanks to our Chairman Mr. S. MEGANATHAN, B.E., F.I.E., for
his sincere endeavour in educating us in his premier institution. We would
like to express our
deep gratitude
to
our
beloved Chairperson
our
college
Principal,
like to thank
We would like to express our sincere appreciation and gratitude to our guide
Mr. DHANASEKARAN.S, B.Tech., M.Tech for his guidance, constant
encouragement and support. We would like to thank our Project Coordinator
Mr. S.SURESH KUMAR, M.E., (Ph.D.) and Mr.S.VINOD KUMAR,
M.Tech., for their encouragement in successful completion of this project.We
also extend our sincere thanks to all the faculty members and supporting staffs
for their direct and indirect involvement in successful completion of the project.
We express our gratitude to our parents, friends and well wishers for their
encouragement and moral support.
ii
ABSTRACT
The major issue in todays Online Social Network (OSNs) is to give the users
the ability to control the messages posted on their own private wall to avoid
unwanted messages being posted. Online Social Networking (OSNs) provides
less support to this requirement. We propose a system allowing OSN users to
have a direct control on the messages posted on their wall. The present work is
to experimentally evaluate an automated system called Filtered Wall, able to
filter unwanted messages from Online Social Network user wall. This is
achieved through a flexible system that allows users to customize the filtering
criteria to be applied to their own private wall.
iii
TABLE OF CONTENTS
CHAPTER NO
TITLE
PAGE NO.
ABSTRACT
LIST OF TABLES
LIST OF FIGURES
xi
LIST OF ABBREVIATIONS
xii
INTRODUCTION
1.1Life Cycle Model
1.1.1 Advantages
LITERATURE SURVEY
2.1 Literature survey
SYSTEM ANALYSIS
3.1 Existing System
10
3.1.1 Disadvantages
3.2 Proposed System
10
10
vi
SYSTEM REQUIREMENTS
4.1 Requirement Description
4.1.1 Hardware requirements
12
12
12
12
4.2.1 Php
12
13
4.2.3 MYSQL
13
SYSTEM DESIGN
5.1 System Architecture
15
16
18
19
20
21
22
23
24
25
vii
SYSTEM IMPLEMENTATION
6.1 Module Description
27
28
28
6.1.2 Registration
28
28
29
29
29
29
TESTING
7.1Introduction
30
30
30
31
31
31
31
31
viii
32
33
34
APPENDIX I
35
APPENDIX II
47
REFERENCES
50
ix
LIST OF TABLES
NAME
TITLE
PAGE NO
Table 5.10.1
USER_DETAILS
25
Table 5.10.2
USER_PROFILE
25
Table 5.10.3
IMAGES_TBL
25
Table 5.10.4
FRND_REQ
25
Table 5.10.5
FRND
26
Table 5.10.6
POST
26
Table 5.10.7
BLOCKING
26
LIST OF FIGURES
NAME
TITLE
PAGE NO
Fig 5.1
System Architecture
15
Fig 5.2
Dataflow Diagram
16
Fig 5.3
18
Fig 5.4
Class Diagram
19
Fig 5.5
Object Diagram
20
Fig 5.6
Sequence Diagram
21
Fig 5.7
Activity Diagram
22
Fig 5.8
23
Fig 5.9
Component Diagram
24
xi
LIST OF ABBREVIATIONS
ABBREVIATION
ACRONYMS
OSN
FW
Filtered Wall
OSA
BL
Black listing
RBFN
xii
CHAPTER 1
INTRODUCTION
1.1 LIFECYCLE MODEL
The life cycle model we have choosen for our project is AGILE MODEL. Agile
development model is also a type of Incremental model. Software is developed in
incremental, rapid cycles.
1.1.1 ADVANTAGES:
Customer satisfaction by rapid, continuous delivery of useful software.
People and interactions are emphasized rather than process and tools.
Working software is delivered frequently (weeks rather than months).
Face-to-face conversation is the best form of communication.
the
intersection
of artificial
intelligence, machine
learning, statistics,
and database systems. The overall goal of the data mining process is to extract
information from a data set and transform it into an understandable structure for
further use. Aside from the raw analysis step, it involves database and data
management
aspects, data
documents and, more recently, web content. The aim of this is mainly to provide
users a classification mechanism to avoid they useless data. In OSNs, information
filtering can also be used for a different, more sensitive, purpose. This is due to the
fact that in OSNs there is possibility of posting or commenting other posts on
particular public or private areas, called in general walls. Information filtering can
therefore be used to give users the ability to automatically control the messages
written on their own walls by filtering out unwanted messages. Today OSNs
provide little support to prevent unwanted messages on user walls. There is no
content-based preferences are supported and therefore it is not possible to prevent
undesired messages such as political or vulguar ones, no matter of the user who
posts them. Information filtering systems are designed to classify a stream of
dynamically generated information dispatched asynchronously by an information
producer and present to the user those information that are likely to satisfy his or
her requirements.
The aim of the present work is therefore to propose and experimentally evaluate an
automated system, called Filtered Wall (FW), able to filter unwanted messages
from OSN user walls. We exploit text categorization techniques to automatically
assign with each short text message a set of categories based on its content. The
major efforts in building a robust short text classifier are concentrated in the
extraction and selection of a set of characterizing and discriminant features. The
original set of features, derived from endogenous properties of short texts, is
enlarged here including exogenous knowledge related to the context from which
messages originate. One of the most efficient solutions in text classification is the
use of neural learning in this model. The neural model has two level classification
strategy . In the first level, the RFBN categorizes short messages as Neural and
CHAPTER 2
LITERATURE SURVEY
2.1 LITERATURE SURVEY
1. Content-Based Book Recommending
Categorization (august 1999)
Using
Learning
for
Text
CHAPTER 3
SYSTEM ANALYSIS
3.1 EXISTING SYSTEM
Existing system provides little support to prevent the unwanted messages on user
walls.For example,Facebook allows users to state who is allowed to insert
messages in their walls(i.e.,friends,friends of friends,or defined groups of
friends).No content based preferences are supported and therefore it is not possible
to prevent undesired messages,such as political or vulguar ones,no matter of the
user who posts them.This is because wall messages are constituted by short text for
which traditional classification methods have serious limitations since short texts
do not provide sufficient word occurrences.
3.1.1 DISADVANTAGES
No content-based preferences are supported and therefore it is not to prevent
undesired messages, such as political or vulguar ones,no matter of the user
who posts them.
Providing this service is not only a matter of using previously defined web
content mining techniques for a different application, rather it requires to
design ad hoc classification strategies.
This is because wall messages are constituted by short text for which
traditional classification methods have serious limitations since short text do
not provide sufficient word occurrences.
3.2 PROPOSED SYSTEM
The aim of the proposed system is therefore to propose and experimentally
evaluate an automated system, called Filtered Wall (FW), able to filter unwanted
10
characteristics.
In particular, we base the overall short text classification strategy for their proven
capabilities in acting as soft classifiers, in managing noisy data and intrinsically
vague classes. Moreover, the speed in performing the learning phase creates the
premise for an adequate use in OSN domains, as well as facilitates the
experimental evaluation tasks. Non neural messages are classified producing
gradual estimates of appropriateness to each of the considered category. Besides
classification facilities, the system provides a powerful layer exploiting a flexible
language to specify Filtering method by users can state what contents should not be
displayed on their walls. Filtering can support a variety of different filtering criteria
that can be combined and customized according to the user needs. More precisely,
Filtering methods exploit user profiles, user relationships as well as the output of
the categorization process to state the filtering criteria to be enforced.
11
CHAPTER 4
SYSTEM REQUIREMENTS
4.1 REQUIREMENTS DESCRIPTION
4.1.1 HARDWARE REQUIREMENTS
Processor
Intel Core
RAM
4 GB
Speed
1.170GHz
Monitor
SVGA
Windows 8
Coding language :
php 5.5.12
Database
MySQL 5.6.17
usually in form of a part of the generated web page. php interpreters became
available on most existing 32-bit and 64-bit operating systems, either by building
them from the php source code, or by using pre-built binaries. The original, only
complete and most widely used php implementation is powered by the Zend
Engine and known simply as php. php includes various free and open-source
libraries in its source distribution or uses them in resulting php binary builts. php is
fundamentally an Internet-aware system with built-in modules for accessing File
Transfer Protocol (FTP) servers and many database servers. php can be deployed
on the most web servers, many operating systems and platforms and be used with
many relational database management systems. Most web hosting providers
support php for use by their clients. Originally designed to create dynamic web
pages, php now focuses mainly on server-side scripting languages that provide
dynamic content from a web server to a client.
4.2.2WAMP SERVER
WAMP Windows, Apache, MySQL and PHP, an application
server platform. WampServer is a Windows web development environment. It
refers to a software stack for the Microsoft Windows operating system. It consists
of Apache web server, OpenSSL for SSL support, MySQL database and PHP
programming language.
4.2.3 MYSQL DATABASE
MySQL database powers the most demanding web, Ecommerce and Online Transaction Processing applications. It is a fully integrated
transaction-safe, ACID compliant database with full commit, rollback, and crash
recovery and row level locking capabilities. MySQL delivers the ease of use,
13
scalability and performance that has made MySQL the worlds most popular open
source database.
14
CHAPTER 5
SYSTEM DESIGN
5.1 SYSTEM ARCHITECTURE
15
LEVEL 1:
16
LEVEL 2:
Fig 5.3 Use case diagram of filtered wall in online social networking
18
20
21
22
23
Fig 5.8 state chart diagram of filtered wall in online social networking
24
TYPE
Int(20)
Text
Varchar(30)
Varchar(10)
Varchar(10)
Text
CONSTRAINTS
NotNull(Priamry Key)
NotNull
NotNull
NotNull
NotNull
NotNull
5.10.2 USER_PROFILE:
COLUMN
ID
UNAME
STATUS
SCHOOL
COUNTRY
TYPE
Int(100)
Varchar(100)
Text
Varchar(20)
Text
CONSTRAINTS
Not Null(Primary Key)
Not Null
NotNull
NotNull
NotNull
TYPE
INT(100)
Int(100)
Varchar(200)
Date
CONSTRAINTS
NotNull(Primary Key)
NotNull(Foreign Key)
NotNull
NotNull
5.10.3 IMAGES_TBL:
COLUMN
IMAGES_ID
UID
IMAGES_PATH
SUBMISSION_DATE
25
5.10.4 FRND_REQ:
COLUMN
ID
FROM
TO
TYPE
Int(10)
Int(10)
Int(10)
CONSTRAINTS
NotNull(Primary Key)
NotNull
NotNull
TYPE
Int(10)
Int(10)
Int(10)
CONSTRAINTS
NotNull(Primary Key)
NotNull
NotNull
TYPE
Int(10)
Text
Int(10)
CONSTRAINTS
NotNull(Primary Key)
NotNull
NotNull(Foreign Key)
TYPE
Int(10)
Varchar(100)
CONSTRAINTS
NotNull(Primary Key)
NotNull
5.10.5 FRND:
COLUMN
ID
USER_ONE
USER_TWO
5.10.6 POST:
COLUMN
ID
PST
USERID
5.10.7 BLOCKING:
COLUMN
Blockid
Blockword
26
TYPE
Int(10)
text
Int(10)
FK
FK
COLUMN
IMAGES_ID
TYPE
INT(100)
UID
IMAGES_PATH
Int(100)
Varchar(200)
SUBMISSION_DA
TE
Date
FK
USER_DETAILS:
COLUMN
UID
NAME
EMAIL
PASWD
DOB
GENDER
TYPE
Int(20)
text
Varchar(30)
Varchar(10)
Varchar(10)
text
FRND:
COLUMN
ID
USER_ONE
USER_TWO
27
TYPE
Int(10)
Int(10)
Int(10)
CHAPTER 6
SYSTEM IMPLEMENTATION
6.1 MODULE DESCRIPTION:
The system consists of seven modules namely login authentication,
registration, profile generation, send friend request, accept friend request, post
status, filtering text based on categories.
6.1.1 LOGIN AUTHENTICATION:
The process of identifying an individual, usually based on a username and
password. In security systems, authentication is distinct from authorization, which
is the process of giving individuals access to system objects based on their identity.
The login form module presents visitors with a form with username and password
fields. If the user enters valid username and password then they will be granted
access to additional resources on the website
6.1.2 REGISTRATION:
The ability to create new users. New users have to give their details. It
verifies the user request and have their own account. Having their account gives
many features, including more editing options and user preferences
6.1.3 PROFILE GENERATION:
User's profile details like profile name, display picture and status are
entered by the user which gets stored in the database. Authorized users once
logged into their profile can see their details and if they wish to change any of their
information they can edit it.
28
29
CHAPTER 7
SYSTEM TESTING
7.1 TESTING
The purpose of testing is to discover errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way
to check the functionality of components, sub assemblies, assemblies and/or a
finished product. It is the process of exercising software with the intent of ensuring
that the Software system meets its requirements and user expectations and does not
fail in an unacceptable manner. There are various types of test. Each test type
addresses a specific testing requirement.
7.2 TYPES OF TESTING
7.2.1 UNIT TESTING
Unit testing involves the design of test cases that validate the internal program
logic is functioning properly, and that program input procedure valid outputs. All
decision branches and internal code flow should be validated. It is the testing of
individual software unit of the application. It is done after completion of an
individual unit before integration. This is a structural testing, that relays on
knowledge of its construction and is invasive. Unit test perform basic test at
component level and tests a specific business process, application and / or system
configuration. Unit test ensure that each unit path of a business process performs
accurately to the documented specifications, and contains clearly defined inputs
and expected results.
30
31
32
33
CHAPTER 8
CONCLUSION AND FUTURE WORK
CONCLUSION
In this work, we have presented a system to lter undesired messages from OSN
walls. The system exploits a soft classier to enforce customizable contentdependent filtering method. Moreover, the exibility of the system in terms of
ltering options is enhanced through the management of BLs.
FUTURE WORK
This work is the first step of a wider project .The early encouraging results we
have obtained on the classication procedure prompt us to continue with other
work that will aim to improve the quality of classication. In particular, future
plans contemplate a deeper investigation on two interdependent tasks. The rst
concerns the extraction and/or selection of contextual features that have been
shown to have a high discriminative power. The second task involves the learning
phase. Since the underlying domain is dynamically changing, the collection of preclassied data may not be representative in the longer term. The present batch
learning strategy, based on the preliminary collection of the entire set of labeled
data from experts, allowed an accurate experimental evaluation but needs to be
evolved to include new operational requirements. In future work, we plan to
address this problem by investigating the use of on-line learning paradigms able to
include label feedbacks from users. Additionally, we plan to enhance our system
with a more sophisticated approach to decide when a user should be inserted into a
BL.
34
APPENDIX I
CODING
MODULE 1 LOGIN AUUTHENTICATION MODULE
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="stylesheet" href="st.css" />
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Home</title>
</head>
<body bgcolor="#FFFFFF">
<div class="time"></div>
<?php
session_start();
$mail=$_SESSION['mail'];
$psd=$_SESSION['pasd'];
//echo $mail;
$host="localhost"; // Host name
$username="root"; // Mysql username
$password=""; // Mysql password
$db_name="sharepoint"; // Database name
35
FROM
`user_details`
WHERE
FROM
`images_tbl`
WHERE
$row=mysqli_fetch_array($res);
$a=$row["UID"];
//echo $a;
$b=mysqli_query($con,"SELECT
`images_id`=$a");
$rows=mysqli_fetch_array($b);
?>
<table width="1349" height="691" border="0">
<tr>
<td width="228" height="478">
<p><img src="<?php echo $rows["images_path"]; ?>" height=126 width="132"
align="top">
</p><h3>
<p>STUDIED IN <?php echo $_SESSION['schol']; ?></p>
<p>LIVES IN <?php echo $_SESSION['cntry']; ?></p></h3>
<hr color="#666666" width="204"/>
<div id="new">
36
<a href="try1.php">
<p><img src="wall.png" width="33" height="28" />Wall</p></a>
<a href="editprofile.php"><p><img src="edit.png" width="34" height="28" />Edit
Profile</p></a>
<a href="friends-list.php"><img
/>Friends</a>
src="frnd.jpg"
width="33"
height="28"
<a href="request.php">
<p><img src="req.png" width="33" height="28"/>Request</p></a>
<a href="members.php">
<p><img src="mem.png" width="33" height="28" />Members</p></a>
<a href="profile1.php"><p><img
/>Profile</p>
src="prof.jpg"
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
</a>
</td>
</div>
<td width="1099">
<div id="top"><h2>
<p class="uppercase">SHARE POINT</h2>
37
width="39"
height="33"
src="post.png"
width="42"
height="40"
<a
href="logout.php"><img
/>Logout</a>
src="logout.jpg"
width="42"
height="40"
</p></div>
<hr size="20" noshade width="1100"/>
<p class="uppercase"> WELCOME
<?php
echo $_SESSION['profn'];
?>
<form name="form1" method="post" action="insrtpost.php">
<p>
<label for="post"></label>
<textarea name="post" id="post" cols="40" rows="3"></textarea>
<input name="submit" type="submit" value="Post" />
</p>
</form>
<hr noshade="noshade" />
<h3>Recent Posts:</h3>
<p>
<?php
38
39
$user=$user_two;
}
else
{
$user=$user_one;
}
if($usrid==$user)
{
$querry=mysqli_query($con,"SELECT
UID='$user'");
FROM
user_details
WHERE
$run=mysqli_fetch_array($querry);
$uname=$run["NAME"];
$res=mysqli_query($con,"select * from images_tbl WHERE images_id='$user' " );
$runres=mysqli_fetch_array($res);
$pth=$runres["images_path"];?>
<img src="<?php echo $runres["images_path"]; ?>" height="50" width="50">
<?php
echo "Posted By::$uname::";
echo "<h4 class='box' style='display:block'> $txt </h4>";
echo "<br>";
}
}
}
40
?>
</td>
</tr>
</table>
</body>
</html>
MODULE 2: POST STATUS MODULE
<?php
session_start();
$host="localhost"; // Host name
$username="root"; // Mysql username
$password=""; // Mysql password
$db_name="sharepoint"; // Database name
// Connect to server and select databse.
$con=mysqli_connect($host, $username, $password,$db_name)or die("cannot
connect");
$messages =$_POST['post'];
//$text=$_POST['post'];
$_SESSION['txt']=$messages;
$currentid=$_SESSION['MY_ID'];
41
$removeword1 = array();
$query = "Select * from `blocking`";
$result = mysqli_query($con,$query);
while($removeword = mysqli_fetch_array($result))
{
array_push($removeword1, $removeword['Blockword']);
//print_r($removeword1);
}
$removearrlen=count($removeword1);
for($x=0;$x<$removearrlen;$x++)
{
//echo $removeword1[$x];
}
////$removeword=array("terror","militory","kill","murder","rape");
$chkstr= $messages;
$removearrlen=count($removeword1);
$chkarr=explode(" ",$chkstr);
$arrlen=count($chkarr);
$chkval=0;
42
$stopval=0;
for($x=0;$x<$removearrlen;$x++)
{
for($y=0;$y<$arrlen;$y++)
{
if($removeword1[$x]==$chkarr[$y])
{
$chkval+=1;
}
else
{
$stopval+=1;
}
}
}
if ($chkval>0)
{
header('location:dispmsg.php');
}
else
43
{
echo "great";
$query=mysqli_query($con,"INSERT
INTO
`post`
VALUES
('','$messages','$currentid')");
header('location:postfrndwall1.php');
}
?
MODULE 3:FILTERING TEXT BASED ON CATEGORIES
<?php
session_start();
$host="localhost"; // Host name
$username="root"; // Mysql username
$password=""; // Mysql password
$db_name="sharepoint"; // Database name
// Connect to server and select databse.
$con=mysqli_connect($host, $username, $password,$db_name)or die("cannot
connect");
$messages =$_POST['post'];
//$text=$_POST['post'];
$_SESSION['txt']=$messages;
$currentid=$_SESSION['MY_ID'];
$removeword1 = array();
44
if($removeword1[$x]==$chkarr[$y])
{
$chkval+=1;
}
else
{
$stopval+=1;
}
}
}
if ($chkval>0)
{
header('location:dispmsg.php');
}
else
{
echo "great";
$query=mysqli_query($con,"INSERT
('','$messages','$currentid')");
INTO
header('location:postfrndwall1.php');
}?>
46
`post`
VALUES
APPENDIX II
SNAPSHOTS
48
49
REFERENCES
[1] R.J. Mooney and L. Roy, "Content-Based Book Recommending Using
Learning for Text Categorization," Proc. Fifth ACM Conf. Digital Libraries, pp.
195-204, 2000.
[2] F. Sebastiani, "Machine Learning in Automated Text Categorization," ACM
Computing Surveys, vol. 34, no. 1, pp. 1-47, 2002.
[3] C. Apte, F. Damerau, S.M. Weiss, D. Sholom, and M. Weiss, "Automated
Learning of Decision Rules for Text Categorization," Trans. Information Systems,
vol. 12, no. 3, pp. 233-251, 1994.
[4] J. Golbeck, "Combining Provenance with Trust in Social Networks for
Semantic Web Content Filtering," Proc. Int'l Conf. Provenance and Annotation of
Data, L. Moreau and I. Foster, eds., pp. 101-108, 2006.
[5] D.D. Lewis, Y. Yang, T.G. Rose, and F. Li, "Rcv1: A New Benchmark
Collection for Text Categorization Research," J. Machine Learning Research, vol.
5, pp. 361-397, 2004.
REFERENCE WEBSITES:
www.w3schools.com
www.php.net
50