A PROJECT REPORT
Shraddha Modhvadia 
Neha Chhabalani 
Hemali Devani 
In partial fulfillment for the award of the degree
BACHELOR OF ENGINEERING
Computer Science & Engineering/Information Technology
Dr. Subhash Technical Campus - Junagadh
Gujarat Technological University, Ahmadabad
Dr. Subhash Technical Campus, Junagadh
Department of Computer Science & Engineering
This is to certify that the dissertation entitled 'KINDNESS' has been carried out by Shraddha Modhvadia(120830131016), Neha Chhablani(120830131015) and Hemali Devani(120830131023) under my guidance in fulfilment of the degree of Bachelor of Engineering in Computer science & Engineering 7th Semester of Gujarat Technological University, Ahmedabad during the academic year 2015-16.
Head of the Department
First we would like to express our best regards to our project guide Prof. Renish Ratanpara whose valuable guidance, encouragement and provision of necessary facilities made this project work.
This project report has been benefited from the many useful comments provided to me by the numerous of my colleagous. In addition many other of my friends have checked it and have offered many suggestions and comments. Besides there are some books and some online helps.
Last but not the least, I thank all others, and especially my classmates and my family members who in one way or another helped me in the successful completion of this work.
Our project 'Kindness' is designed for communication and sharing purpose along with development and welfare of society. Here people can sign up in the website and can be a member of this site. It is the platform where members/participants expose, discuss, reveal, and expound on their personal lives, activities, hopes, dreams, and even fantasies for others to see, marvel and make responsible comments.
It is mainly develop for development and welfare of society. It works as organized civil society, to advocate, promote and monitor the development of society with the human right issues, education, health, environment and other welfare and development causes, aims, objects and issues.
Sr.No. Topic Name
Introduction to Project
Data Flow System
Data Flow Diagram
Use Case Diagram
Implementation & Result Analysis
2 | P a g e
Chapter 1 Introduction to Project 1.1 Project Profile 1.2 Definition 1.3 Objective 1.4 Feature 1.5 Current System
1.6 New System
3 | P a g e
1.1 Project Profile Project title: Kindness Front-End System: Sublime text editor Back-End System: WAMP server Project Duration: March ' October 2015 Project Guide: Prof. Renish Ratanpara Submitted By: Shraddha Modhvadia Neha chhablani Hemali Devani Submitted To:
Prof. Renish Ratanpara
4 | P a g e
1.2 Definition The goal of this website is to provide easy access of site. User can easily understand the way how to use the function and can easily take the advantage of all the features of our website. It will provide a common platform where people can
' Voice out violations, injustice, inhumanity, corruption happening in their vicinity.
' Endorse someone else's concern and augment with more proofs, details etc.
' Call for an online debate or discussion on certain topics of broad applicability.
1.3 Objective Any user can join the website by sign-up. The members have to make them profile by providing some basic information while sigh-up that can be update or modify anytime. They can make their own page and group or join others, also have the features like add images, post, like or unlike, comment etc. There are different strategies are used to suggestion of member. Member also can use the different options to find the friends related with age, interest, education, area they live etc. 1.4 Feature The main feature of this website is that it can fulfill the education, professional, business, marketing, entertainment and so many other purposes. Loading is main problem with the any application. We provide the fast interaction with the website. So that user can easily switch from one page to other or one tab to other tab. We provide data confidentiality, data integrity and authentication that are the main objectives that are at the heart of network security. We provide security for the personal data. User can manage their security as they want by ticking the option provided 1.5 Current System
Now a day's many social networking sites are available on the internet where any user can join the website by sign-up.
5 | P a g e
The members have to make their profile by providing some basic information while sigh-up that can be update or modify anytime. They can make their own page and group or join others, also have the features like add images, post, like or unlike, comment etc. Communicate by chatting or messaging, voice chat, video call etc. There are different strategies are used to suggestion of member. Member also can use the different options to find the friends related with age, interest, education, area they live etc. Online communities represent a growing class of marketplace communities where participants can provide and exchange information on products, services, or common interests. Brands are, or have been, the commercial enterprises' approach to building social networks. They have created brand cohorts through logos, colors, and clever icons. All of these 'brands,' and the imagery and mystics behind them, have really been nothing more than attempts by the marketer to create a social network that was accepted and that engaged people to purchase or continued to purchase products or services. Companies are increasingly using online communities to create value for the firm and their customers. Ensuring that brand activity is relevant to a social network's core audience is crucial for advertisers wanting to tap into niche communities. 1.6 New System This website will be highly dynamic, with minimal static content as framework and maximum content created by site participants. It will be highly extensible to the extent technically possible. Users would be able to add content, add small pieces of new functionality and change their portion of the site (not just colors, look & feel).
The site provides various measures for fellow citizens to rate control and monitor the social responsibility of a given individual. For example, if you find your classmate did a good job at the college function arrangements, you can increase his service-orientation score by +1. If you find your neighbor smoking in public in front of children, you can decrement his responsibility score by 1. When everyone assess &
6 | P a g e
reward a person for his social actions this way, one can see a true scale of where he stands vis-''-vis where he thinks he really is. If a police cop demanded for bribe, he may not be dismissed in system, but this website could show his corruption level as utterly bad. Authenticity for adding users are important utmost for such a website. Definitely one should not be allowed to have more than one profile. There should be a placeholder for dealing with disputing situations for the site as it is quite possible for recipients of negative reward to resist. The dispute resolution mechanism should not be like traditional court, it should again be based on social forum like multiple opinions, group actions etc.
The focus of this scenario is not on designing a website as flashy as it could
7 | P a g e
Chapter 2 System Profile 2.1 System Analysis 2.2 Feasibility study 2.3 User Requirements
2.4 User Characteristics
8 | P a g e
2.1 System Analysis 2.1.1 System Development Life Cycle 2.1.2 Study About Project Requirement .
The goal of requirement analysis & specification and face is to clearly understand the student requirement and to systematically organization the requirement into a specification documents. Requirement analysis invoice obtaining a clear and thought understanding of the product to develop, with view removing all and inconsistencies from the initial patient perception of the problem.
9 | P a g e
For any system, it is necessary to gather and interpret facts, and using the information to recommand an improvements or enhancements in the system. After deep analyzing our intention of this project on Kindness system will become user friendly output and reliable. 2.2 Feasibility Study In this mode, studied for the feasibility of the requested system with our colleagues and friends who were familier with the information system techniques. For that technical feasibility, economical feasibility, and operational feasibility need to be considered. 2.2.1 Technical Feasibility Project is technically feasible, Here the study of available resources, existing software technolgy are to be considered. At develop the project, sufficient resources like computers, software tools are available. A study of resources availability may affect the ability to achieve an acceptable system. It is essential that the process analysis and definition be conducted in parallel with an assessment of Technical feasibility. 2.2.2 Economical Feasibility Project is also economical feasible. This doesn't require any costly software or any hardware tools.Freely available those Software tools which are required for this project. 2.2.3 Operational Feasibility
Application has such a user friendly GUI that any person having a sound knowledge of computer can operate the system.
10 | P a g e
2.3 User Requirements Functional Requirements: To avoid the calculational errors the process should be limited to only providing input. Also the input should be in the format of table or database relation. Time required for processing data and presenting user with output should be minimal. Non Functional Requirements: 1) Flexibility: The Software should be flexible enough to incorporate the facility to update the values. 2) Reliability: It should be assured by carrying out several tests for various test data as real life data and output results should match the actual result the system should be tested thoroughly. 3) Security: There should be no ambiguous data resulting during functioning of the software. 4) Usability: The software should use terms and concepts, which are drawn from the experience of the people who will make the most of the system. 5) Efficiency: The system must provide easy and fast access without consuming more cost and time.
11 | P a g e
2.4 User Characteristics User: User can select any type of file for the purpose of compression or decompression, to send it over the network with grater speed. End Users:
1) He must know how to operate the computer
2) He must have basic knowledge of computer
12 | P a g e
Chapter 3 Project Management 3.1 Project Planning 3.2 Project schedule
3.3 Cost Estimation
13 | P a g e
3.1 Project Planning Project planning is concerned with identifying and measuring activity milestone and deliverables produced by projects. The effectiveness of the subsequent planning activities is based on the accuracy of this estimation. ' Scheduling man power and other resources ' Staff organization and staffing plan ' Risk identification ' Miscellaneous plans such as quality assurance plan, configuration management plan etc Project management involves planning, monitoring, and control of people, process and the events that occurs as software evolves fram a preliminary concept to an operational implementation. The project must strically follow the Software Development Life Cycle. Planning- Establishing the plans for creating a system by defining the system to be developed based on the requirements. Analysis- The users and IT specialists collaborates to collect and formalize business requirement by gathering the business requirements. Designing- Designing the technical architecture and graphically creating a system model from GUI. Development-It execute the design into a physical system by technical architecture and build the database and programs. Testing- Testing the developed system.
Maintenance-The system keeping up to date with the changes in the organization and building a help desk to support the system users.
14 | P a g e
3.2 Project Schedule Project scheduling is one of the key aspects of any project. Any project must be schedule before developing it. It describes dependency between activities. The estimated time required to allocation of people to activities. This describes the way in which the development team is organized the people involved and their roles in team.
Project Definition and study of tools
14th July 2014 to 25th July 2014
Analysis of the system
25th July 2014 to 16th Aug 2014
16th Aug 2014 to 30th Aug 2014
30thAug 2014 to 20th Sept 2014
20th Sept 2014 to 03rd Oct 2014
Integration and Testing
3rd Oct 2014 to 17th Oct 2014
17th Oct 2014 to 24th Oct 2014
3.3 Cost Estimation Development in such applications requires programming skills and sound knowledge in the tools and various functionalities. The cost spent in the making of the project is categorized into two parts. Direct Cost: This is in terms of money. In this project in terms of cost is ' Hardware ' Software ' System Study
15 | P a g e
Indirect Cost: This is in terms of labor or the manual work. In this project in terms of cost is ' Time spent in system analysis and design ' Managing time for coding ' Generating Report and Referring other sources like the internet
16 | P a g e
Chapter 4 Design Analysis 4.1 Data Flow System 4.2 Data Flow Diagram 4.3 ER Diagram 4.4 Use Case Diagram 4.5 Class Diagram
17 | P a g e
4.1Data Flow System One of the tools of Structured Analysis is the data flow diagram. A Data flow Diagram is a graphical representation of the system. The analyst can use Data Flow Diagram to explain his understanding about the System. Application: ' Data Flow models are an intuitive way of showing how data is processed by a system. ' At analysis level analyst should be used to model the way in Which data is processed in the existing system. ' Data flow models are used to show how data flows through a Sequence of Processing steps. Description: ' A graphical tool used to describe and analyze the movement of data through a system manual or automated including the process store of data and delays in the system. ' The transformation of data from input to output through processes may be described logically and independently of the physical component associated with system. ' The data transformation at each step before moving on to the next stage. These Processing steps or transformation are programs function when data flow diagrams are used to document a software design.
18 | P a g e
4.2Data Flow Diagram Level-0: Level-1: 1st level DFD for user
19 | P a g e
1st level DFD for admin 1st level DFD for guest
20 | P a g e
Level-2: 2nd level DFD for user
' Login module
' Home module
21 | P a g e
' Profile module 2nd level DFD for admin
' Login module
' Control module
22 | P a g e
4.3 E-R Diagram
23 | P a g e
24 | P a g e
25 | P a g e
Chapter 5 Implementation 5.1 Data Dictionary 5.2 Validation 5.3 Application 5.4 Requirements 5.5 Security
26 | P a g e
5.1 Data Dictionary Database Table Member Table
27 | P a g e
28 | P a g e
Like Table Photos Table
5.2 Validation Required Field Validator It indicates field must be required to enter. Regular Expression Validator: it indicates the regular expression.
e.g. \w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-.]\w+)* It shows the E-Mail ID.
29 | P a g e
Renge Validator: It indicates the range and shows that field must be entering between the ranges which are given. 5.3 Application ' Worldwide Connectivity You can connect with different users from all over the world. It is beneficial to gain knowledge around the world. ' Real time information sharing You can exchange information via chat or group messages or broadcast. Data can be shared around world rapidly. ' Maintain information about the all users and other details. 5.4 Security Security is of prime concern while carrying out this online system. This system has implemented proper security measures such as creating secure space between client machine and proper access rights control is been implemented, So the system will provide the secure environment to each system user on terminal to make work easily as well as return required information in easiest way. For security purpose, we have used 'Session Tracking'. The HTTP session API is an essential component in constructing interactive web sites. This is required because the Hypertext Transfer Protocol (HTTP) employed for web browser to web server requests is a stateless protocol. As a result, a web server has no means of associating a series of requests with a specific browser or user. 5.5 Requirements 1. Login (system should be able to give authentication to user.) 2. System should be able to prompt user to enter password and code. 3. System should be able to retrieved information and also able to check code and password.
30 | P a g e
4. System should be able to store new information the new user. 5. System should be able to send feedback. 6. System should be check to validation. 5.6 Advantages ' Easy to Maintenance. ' Easy to use for all User.
' Easy to maintain wholes system through one us.
31 | P a g e
Chapter 6 Testing 6.1 Testing Principle
6.2 Testing Methods
32 | P a g e
6.1 Testing Principle Following are the testing principles, which are used: All tests should be traceable to user requirements. Tests should be planned long before testing begins. Testing should begin in small and progress toward testing in the large. Exhaustive testing is not possible. To be mo st effective testing should be conducted by an independent third party. Testability: Software testability is simply how easily a computer program can be tested. The checklist that follows provides a set of characteristics that lead to testable software. 1. Operability 2. Observable 3. Controllability 4. Decomposability 5. Simplicity 6. Stability 7. Understandability Models of Testing: There are several models for testing module some of them are as follows: 1. White Box Testing:
White-box testing, sometimes called glass-box testing is a test case design that uses the control structure described as part of component level design to derive the test cases. As per our project, we have used White Box Testing Model because Independent Paths of .aspx files and loop are the cornerstones of the majority of all algorithms implemented in the software. There are five different classes of the loops, which can be defined as follows:
33 | P a g e
1. Simple Loops 2. Nested Loops 3. Concatenated Loops 4. Unstructured Loops 5. Continuous loops As per our project, we have used simple loops. The concatenate loops can be tested with the different aspx files of the project; all independent of each other. 2. Black Box Testing: White-box testing, also called behavioral testing, focuses on the functional requirements of the software. Blake-box testing is not an alternative to white-box testing. Blake-box testing attempts to find errors in following categories: 1. Incorrect or missing function 2. Interface errors 3. Errors in fetching external data 4. Behavior or performance errors 5. Initialization and terminal errors Black-box testing is implementing on our project through test each and every independent aspx file. For dependent files, we check the dependency and interface after integrating all the files. For behavior or performance testing we first made demo give it to our project guide and some employees to use and check performance. 3. Testing Strategies:
A strategy provides a road map that describes the step to be undertaken, and how much effort, time and resources will be required. A testing strategy must incorporate test planning, test design, test execution, and resultant data collection and evaluation. The testing strategy followed by us constituted the following component parts as: To accomplish this there are some methods defined. They are:
34 | P a g e
Equivalence Partitioning: This method divides the input domain of a program into classes of data from which test cases can be derived. These classes, known as Equivalence Classes, represent a set of valid or invalid input conditions. It helps in a manner that one test case alone uncovers number of errors that might otherwise require more number of cases. Test Strategies: Testing is a setoff activities that can be planned in advance and conducted systematically, for this reason a template for software testing, Consisting a set of steps into which we can place specific test cases & testing methods, should be defined. Testing is just like assurance to review of software product and related documents for correctness, completeness, reliability, and maintainability and it includes assurance that the system meets the specification and requirements for its intended use and performance. The common view of the testing is to prove that are no error. System testing is too much expensive as well as it is not possible for analyst to prove that software is free and clear of error. We can use various kinds of test strategies. 6.2Testing Methods Various testing strategies that were use for testing the modules are as follows: Unit Testing: The testing that is performed on smallest piece of software. Unit Test Plan: A Unit test plan is used as a guide for testing. It contains detailed test cases should be designed to insure the completeness of the test & provide highest like hood for uncovering error. Unit test plan was drafted based on Program specification. The Programmer did testing based on UTP first. All Defects marked on UTP. The programmer is modified to remove errors. Error handled by the Programmer. Unit testing plan is sub divided into following parts:- ' Functional Test ' Code Test ' Navigational Test
35 | P a g e
' Cosmetic Test Various Level Testing:- ' Field Level Testing ' Query Level Testing
Various Test Cases: Testing which find out the most errors, is consider as the most Successful testing but for that it has to depend on carefully chosen test Cases. A good guideline that we follow during the selecting test cases is to choose test cases on the
36 | P a g e
Chapter 7 Conclusion
37 | P a g e
At the end of the projects it conclude that the use of Kindness for a development and welfare of society will be revolutionary idea to make this world habitable for mankind, to bring faith, humanity and peace, to help people who need help, to give justice. It helps in education to spread knowledge around world and learn from others, in business to marketing products.Also as other social network site it is useful for communicating with friends, family and also to share personal lives, likes, dislike, hopes, dreams, activities etc.
38 | P a g e
REFERENCES Books PHP 5 Social Networking by Michael Peacock Social Networking by Peter K. Ryan
...(download the rest of the essay above)