Focusing on enhanced user-interaction avoiding a simple like button by adding a post-interaction rate feature that technically creates an extra dimension into liking a post. User is able to save pictures to the cloud. Saving memory effectively and creating on-time content. The main purpose is to enhance Privacy and creating an advanced user interface/interaction allowing a fair share of reaction to a post. When a user posts a picture, the following user interacts with the picture after tapping the PIB (Post Interaction Button). The picture will be evaluated as long as the user has the post in view. Also allow no duplication to the post shared by the user. When a user posts a p icture it shouldn’t be devalued. Our app ensures that the post will be rated according to the user interaction. Able to publish posts on other social medias, making it uni-directional. Introducing this unique social networking mobile-based application where a user can share photos, videos and texts with extreme privacy, uploading them even by making them anonymous to the group. Assuring a reliable place to take and share and save posts from anywhere around the world.
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGEijcsit
This paper presents the results of an online survey which was conducted to analyse the use of social web in
the context of daily news. Users’ motivation and habit in the news consumption were focused. Moreover,
users’ news behaviour was distinguished in three purposes such news consumption, news production and
news dissemination to find out if the usage has a passive or active character. In a second step it was
questioned which social software is used for which purpose. In conclusion users appreciate social software
for features such as interactivity and information that traditional media does not provide. Among the social
web platforms users prefer social networking sites as well as videoshare platforms. Social networking sites
also rank first in the news production and dissemination.
Copy of presentation made at Comcast on social media that looks at trends in SBI and how social media listening & engagement can be used to solve simple and complex problems.
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGEijcsit
This paper presents the results of an online survey which was conducted to analyse the use of social web in
the context of daily news. Users’ motivation and habit in the news consumption were focused. Moreover,
users’ news behaviour was distinguished in three purposes such news consumption, news production and
news dissemination to find out if the usage has a passive or active character. In a second step it was
questioned which social software is used for which purpose. In conclusion users appreciate social software
for features such as interactivity and information that traditional media does not provide. Among the social
web platforms users prefer social networking sites as well as videoshare platforms. Social networking sites
also rank first in the news production and dissemination.
Copy of presentation made at Comcast on social media that looks at trends in SBI and how social media listening & engagement can be used to solve simple and complex problems.
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"One to One
This study presents an analysis of user engagement with social media via Digg.com. Understanding the behavior of Digg.com users will help marketers to better represent and promote their material on Digg.com as well as provide insights into the practices of social media users in general.
PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...Rendy Marojahan Ompusunggu
Nowadays, mobile phone is not only used by many people to communicate, but also used to manage some
informations. One of several informations that can managed in mobile phone is the financial transaction. Managing
the information about financial transaction is the basic activity in personal financial management. The financial
transaction is used to analyze the personal financial resources, set financial budget, manage tax, cash, credit card,
borrowing, investment, career and retirement planning. There are many ways to record the financial transaction,
write note about the transaction in the notebook, collect the transaction bill are some of them. The purpose of this
paper is to develop a hybrid mobile application to help people manage their personal financial, utilize social media
activity like update status as the trigger to record the financial transaction and support the mobility of user in either
online or offline internet connection.
OTOinsights "An Analysis of Digg.com Engagement and User Behavior"One to One
This study presents an analysis of user engagement with social media via Digg.com. Understanding the behavior of Digg.com users will help marketers to better represent and promote their material on Digg.com as well as provide insights into the practices of social media users in general.
PERSONAL FINANCIAL APPLICATION BASED ON HYBRID MOBILE PLATFORM (UTILIZE SOCIA...Rendy Marojahan Ompusunggu
Nowadays, mobile phone is not only used by many people to communicate, but also used to manage some
informations. One of several informations that can managed in mobile phone is the financial transaction. Managing
the information about financial transaction is the basic activity in personal financial management. The financial
transaction is used to analyze the personal financial resources, set financial budget, manage tax, cash, credit card,
borrowing, investment, career and retirement planning. There are many ways to record the financial transaction,
write note about the transaction in the notebook, collect the transaction bill are some of them. The purpose of this
paper is to develop a hybrid mobile application to help people manage their personal financial, utilize social media
activity like update status as the trigger to record the financial transaction and support the mobility of user in either
online or offline internet connection.
Social Media App Development An Ultimate Guide 2024.pdfJPLoft Solutions
This development guide will provide you with the information you require before establishing the social media platform of your choice. It will also help you determine whether creating a social media platform is a feasible business option. Let's get right into the specifics.
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networksrahulmonikasharma
From last few years many online Social Media Networks (SMN) platforms came into existence only those users who connected through similar site network can communicate each other by exchanging their information. For example, a Facebook user can connect only with Facebook user not with cross site user like Twitter so to connect users through multiple cross site network we have introduced a new social networking site calledCross platform network. Cross platform is a site which helps people to connect with huge number of different online Social Media Networks such as Facebook, Twitter,and Wechat. Using Cross platform networkpeople can communicate each other by exchanging the information from different sites.
So, there you have it. Everything you need to know to get started on creating your social media app. It’s important to consider all of the features and costs involved, as well as the benefits for both users and businesses before diving in. With the right planning and execution, your social media app can be a huge success. Have you created a social media app? What were some of the toughest challenges you faced? Let us know in the comments below!
Social media platforms are not just for a certain age group or segment of society; rather, they are widely used and have become an instant hit among people all over the world to discover, talk about different things, and share their feelings from anywhere at any time.
Social Network in marketing (Social Media Marketing) Opportunities and Risksijmpict
The most well-known social software applications are weblogs, wikis, social networking sites and instant messaging. Social networking at a high level is described as the convergence of technologies that make it possible for individuals to easily communicate, share information, and form new communities online. But the big question today is not what social networking is, but rather what it means for businesses.
Application of mobile apps in financial services institutes:with special refe...Room to Read
Mobile application is a set of software/set of programs that runs on a mobile device and performs certain tasks for the user. Mobile application is a new and fast developing Segment of the global Information and Communication Technology.
Mobile application is easy, user friendly, inexpensive, downloadable and run able in most of the mobile phone including inexpensive and entry level phone. The main feature of this cell phone was it had a fantastic platform which allowed running very dynamic application based on internet. The mobile application has wide uses for its vast functioning area like calling, messaging, browsing, chatting, social network communication, audio, video, game etc.
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGMijait
Web 3.0 promises to have a significant effect in users and businesses. It will change how people work and
play, how companies use information to market and sell their products, as well as operate their businesses.
The basic shift occurring in Web 3.0 is from information-centric to knowledge-centric patterns of
computing. Web 3.0 will enable people and machines to connect, evolve, share and use knowledge on an
unprecedented scale and in new ways that make our experience of the Internet better. Additionally,
semantic technologies have the potential to drive significant improvements in capabilities and life cycle
economics through cost reductions, improved efficiencies, enhanced effectiveness, and new functionalities
that were not possible or economically feasible before. In this paper we look to the semantic web and Web
3.0 technologies as enablers for the creation of value and appearance of new business models. For that, we
analyze the role and impact of Web 3.0 in business and we identify nine potential business models, based in
direct and undirected revenue sources, which have emerged with the appearance of semantic web
technologies.
All things considered, as a bundle, social media applications are flawed, nor are they static. Like most technologies, these remain imperfect and are dependent upon future developments.
Identity Resolution across Different Social Networks using Similarity Analysisrahulmonikasharma
Today the Social Networking Sites have become very popular and are used by most of the people. This is because the Social Networking sites are playing different roles in different fields and facilitating the needs of its users from time to time. The most common purpose why people join in to these websites is to get connected with people and sharing information. An individual may be signed in on more than one Social Networking Site so identifying the same individual on different Social Networking sites is a task. To accomplish this task the proposed system uses the Similarity Analysis method on the available information details.
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Enhancement of Privacy and User Interaction in a Social Network with the Aid of Adaptive Intelligence
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
17
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Enhancement of Privacy and User Interaction in a Social Network with the Aid
of Adaptive Intelligence
Puneet Palagi
Assistant Professor,
CSE Department,
NHCE, Bangalore.
Dr. Ashok Kumar PS
Professor and Head,
Department Of ISE
DBIT, Bangalore
ABSTRACT: Focusing on enhanced user-interaction avoiding a simple like button by adding a post-interaction rate feature that technically
creates an extra dimension into liking a post. User is able to save pictures to the cloud. Saving memory effectively and creating on-time content.
The main purpose is to enhance Privacy and creating an advanced user interface/interaction allowing a fair share of reaction to a post. When a
user posts a picture, the following user interacts with the picture after tapping the PIB (Post Interaction Button). The picture will be evaluated as
long as the user has the post in view. Also allow no duplication to the post shared by the user. When a user posts a p icture it shouldn’t be
devalued. Our app ensures that the post will be rated according to the user interaction. Able to publish posts on other social medias, making it
uni-directional. Introducing this unique social networking mobile-based application where a user can share photos, videos and texts with extreme
privacy, uploading them even by making them anonymous to the group. Assuring a reliable place to take and share and save posts from
anywhere around the world.
__________________________________________________*****_________________________________________________
1. INTRODUCTION
Enhanced privacy and an advanced User-Interface is what
is lacking in our current world. We need an app that can
fulfill all these issues and come up with something that is
essential, that creates urgency in using it when it comes to
photography.
Introducing a unique social networking mobile-based
application where a user can share photos, videos and texts,
with extreme privacy, uploading them even by making them
anonymous to the group. Assuring a reliable place to take
and share and save posts for the people and users.
Storing the posts onto the cloud, by our cloud storage
system, saves the phone memory to its fullest. Hence,
allowing the user to produce on-time content.
Irrelevant suggestions from our social media networks,
leading to duplication is eradication by our app-alone
upload system. Unrestricted access to other accounts or
viewing them compromising a private connection letting
them see users activities. Mandatory response to posts
made by our friends and followers and thus, making it an
unavoidable actions due to prioritization.
Such interactions prevent a media to have its anonymity as
well as being social enough to others. We focus on
enhanced user- interaction avoiding a simple like button by
adding a post- interaction rate feature that technically
creates an extra dimension into liking and enjoying a post.
2. PROBLEM DEFINITION
We define social networking application as a
mobile-based services that allow individuals to construct a
public or semi-public profile within a bounded system,
articulate a list of other users with whom they share a
connection and view and traverse their list of connections
and those made by others within the system. The nature and
nomenclature of these connections may vary from app to
app.
Since their introduction, social network sites (SNSs) such
as Facebook, Instagram have attracted millions of users,
many of whom have integrated these sites into their daily
practices. As of this writing, there are thousands of SNSs,
with various technological affordances, supporting a wide
range of interests and practices. While their key
technological features are fairly consistent, the cultures that
emerge around SNSs are varied. Most sites support the
maintenance of pre-existing social networks but others help
strangers connect based on shared interests, political views,
or activities. Some sites cater to diverse audiences, while
others attract people based on common language or shared
racial, sexual, religious, or nationality-based identities.
Sites also vary in the extent to which they incorporate new
information and communication tools, such as mobile
connectivity, blogging and photo/video-sharing.
Social networking sites are not only for you to
communicate or interact with each other globally but, this
is also one effective way for business promotion. A lot of
business minded people these days are now doing business
online and use these social networking sites/app to respond
to customer queries. It isn’t just a social media site used to
socialize with your friends but also, represents a huge pool
of information from day today living.
A social networking service is an online service,
platform, site or a mobile application that focuses on
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
18
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
messaging. Online community services are sometimes
considered as a social network service, though a broader
sense, social network service usually means an individual-
centered service whereas online community services are
group-centered. Social networking sites/app allow users to
share ideas, activities, events and interests within their
individual networks or through their own Smartphone.
3. PROJECT PURPOSE
Allow no duplication to the post shared by the
user. When a user post a picture it shouldn’t be devalued.
Our app ensures that the post will be rated according to the
user interaction. Genuine content which can be posted once.
Uploading pictures captured from the app alone. User is
able to save pictures to the cloud. The main purpose is
Enhanced Privacy and an advanced and unique user
interface/interaction allowing a fair share of reaction to a
post.
4. PROJECT FEATURES
When a user posts a picture, the following user
interacts with the picture after tapping the PIB (Post
Interaction Button). The picture will be evaluated as long as
the user has the post in view, based on the algorithm
developed in - PHP. Both Public or Private accounts will
have 3 intro images in their home page. Activities of the
users are only shown anonymously. Hence privacy is a
main feature – algorithm that checks if the user has
permission to view the post first before displaying it – PHP,
Search bar used in the app used to display contents from
around the globe .Notification log file that interacts with the
server to check if data is available to display. Also a
floating notification button
– ease of access to home/profile/search/notification. Able to
publish posts on other social medias .Making it uni-
directional. Any new updates will be notified to the user.
Elite users - Users with higher number of post : response
ratio, once hits a threshold turns into an Elite. With less
resistance in Post-Interaction Rate. Additionally every post
has a report/abuse icon, allowing the user to respond to the
post instantly if it contains any abuse content. The owner of
the post will be notified about the same to delete the
5. SYSTEM REQUIREMENTS
5.1 Literature Survey
Advances in mobile technology have enabled a
wide range of applications to be developed that can be used
by people on the move. Developers sometimes overlook the
fact that users will want to interact with such devices while
on the move. Small screen sizes, limited connectivity, high
power consumption rates and limited input modalities are
just some of the issues that arise when designing for small,
portable devices. One of the biggest issues is the context in
which they are used. As these devices are designed to
enable users to use them while mobile, the impact that the
use of these devices has on the mobility of the user is a
critical factor to the success or failure of the application.
Current research has demonstrated that cognitive overload
can be an important aspect of usability (Adams, 2007;
Adams, 2006). It seems likely that mobile devices may be
particularly sensitive to the effects of cognitive overload,
due to their likely deployment in multiple task settings and
limitations of size.
The Mobile-based social networking services
make it possible to connect people who share interests and
activities across political, economic and geographic
borders. Through email and instant messaging, online
communities are created where a gift economy and
reciprocal altruism are encouraged through cooperation.
The first photo sharing sites originated during mid to late
1990’s and provided photofinishing service(i.e. online
ordering of prints). Later, during early 2000’s , many more
sites came into market with the goal of providing
permanent and centralized access to a user’s photos and in
some cases video clips too. Webshots, SmugMug, Yahoo!
Photos and Flickr were among them.
5.2 EXISTING SYSTEM
Photo sharing application is used to share pictures
with their friends. An application like instagram allows
users to post pictures and value the pictures based on likes.
The privacy option of such application is minimal. When a
user wants to follow another user, user can see only the
thumbnail picture of the other user. User will not be able to
figure out the face of the user, this causes confusion in
users mind whether to follow the user or not.
Disadvantages:
Liking and disliking a post with wrong purpose to value or
devalue the content.
Compromised privacy connections.
Unavoidable actions on a content post by other user
(friends, families, etc) due to priorities.
5.3 PROPOSED SYSTEM
The project allows users to interact with the
picture posted. And value the content of the post based on
user interaction. It helps the post to get the appreciation
based on the amount of effort the user has put to capture
the picture and the outcome of the captured picture.
Advantages:
Value the content based on user interaction.
Give rating based on the user( those who viewed the picture)
liking.
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
19
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Enhanced privacy by providing intro images.
It reduces the confusion of the user whether to follow or not.
Gives importance to the efforts put by the user to capture the
picture.
6. REQUIREMENT ANALYSIS
6.1 FUNCTIONAL REQUIREMENTS
In software engineering, a functional requirement defines a
function of a software system or its component. A function
is described as a set of inputs, the behavior, and outputs.
Functional requirements may be calculations, technical
details, data manipulation and processing and other specific
functionality that define what a system is supposed to
accomplish. Behavioral requirements describing all the
cases where the system uses the functional requirements are
captured in use cases.
Here, the system has to perform the following tasks:
Take username and password, match it with
corresponding database entries. If a match is found then
continue else raise an error message.
Login the application
Post pictures
Interact with the picture of the following user
Edit profile info
Post intro images
6.2 NON-FUNCTIONAL REQUIREMENTS
In systems engineering and requirements
engineering, a non-functional requirement is a requirement
that specifies criteria that can be used to judge the operation
of a system, rather than specific behaviors. This should be
contrasted with functional requirements that define specific
behavior or functions. The plan for implementing
functional requirements is detailed in the system design.
The plan for implementing non-functional requirements is
detailed in the system architecture.
Other terms for non-functional requirements are
"constraints", "quality attributes", "quality goals", "quality
of service requirements" and "non-behavioral requirements".
Some of the quality attributes are as follows:
6.2.1 ACCESSIBILITY:
Accessibility is a general term used to describe the degree to
which a product, device, service, or environment is
accessible by as many people as possible.
In our project people who have registered with the
application can access the social network to post their
picture.
User interface is simple and efficient and easy to use.
6.2.2 MAINTAINABILITY:
In software engineering, maintainability is the ease with
which a software product can be modified in order to:
Correct defects
Meet new requirements
New functionalities can be added in the project based on the
user requirements just by adding the appropriate functions to
existing project using AngularJS and PHP programming
languages.
It is easier to find and correct the defects and to make the
changes in the project.
6.2.3 SCALABILITY:
Application can run in any conditions (24 X 7) and
there are no fixed number of users to log in and use the
application.
7. DESIGN
7.1 MODULAR DESIGN
The application comprises the following major modules:
7.1.1 MEMBER MODULE
This module provides functionalities for those people who
wants to open an account. Applicants can post their views
with personal and professional details. They can also update
the profile as frequently as required. The member can also
browse through the friends profile available. Members can
also get message when their friends message them.
7.1.2 PROFILE MODULE
This module provides functionalities related to members
profile. Logged users can see their details and if they wish to
change any of their information they can edit it.
7.1.3 ADMIN MODULE
This module provides administrator related functionalities.
Administrator manages entire application and maintain the
profile of all the registered users and their activities.
7.2 DATA FLOW DIAGRAM
Data flow diagrams model the flow of data into, through,
and out of an information system:
Show the processes that change or transform data
Show the movement of data between processes
Represent a system as a network of processes which
transform data flowing between them
7.3 USE CASE DIAGRAM
A use case diagram is a graphic depiction of the interaction
among the elements of a system. A use case methodology
is used in system analysis to identify clarify and organize
system requirements. In this context the term system refers
to something being developed or operated, such as
messaging between two users. Use case diagrams are
employed in UML, a standard notation for modeling of
real-world objects and systems.
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
20
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
The actors, usually individuals involved with the system
defined according to their roles.
The use cases, which are the specific roles played by the
actors within and around the system.
The relationship between and among the actors and the use
cases.
7.4. DATABASE
A database is an organized collection of data. It is the
collection of schemas, tables, queries, reports, views and
other objects. The data are typically organized to model the
aspects of reality in a way that supports processes requiring
information, such as modeling the availability of rooms in a
hotel in a way that supports finding a hotel with vacancies.
A database management system (DBMS) is a computer
software application that interacts with the user, other
applications, and the database itself to capture and analyze
data. A general-purpose DBMS is designed to allow the
definition, creation, querying, update, and administration of
databases. A database is not generally portable across
different DBMSs, but different DBMS can interoperate by
using standards such as SQL and ODBC or JDBC to allow
a single application to work with more than one DBMS.
Database management systems are often classified
according to the database model that they support; the most
popular database systems since the 1980s have all
supported the relational model as represented by the SQL
language. Sometimes a DBMS is loosely referred to as a
"database".
Formally, a "database" refers to a set of related data and the
way it is organized. Access to this data is usually provided
by a "database management system" (DBMS) consisting of
an integrated set of computer software that allows users to
interact with one or more databases and provides access to
all of the data contained in the database (although
restrictions may exist that limit access to particular data).
The DBMS provides various functions that allow entry,
storage and retrieval of large quantities of information and
provides ways to manage how that information is
organized.
Because of the close relationship between them, the term
"database" is often used casually to refer to both a database
and the DBMS used to manipulate it.
Outside the world of professional information technology,
the term database is often used to refer to any collection of
related data (such as a spreadsheet or a card index). This
article is concerned only with databases where the size and
usage requirements necessitate use of a database
management system.
Existing DBMSs provide various functions that allow
management of a database and its data which can be
classified into four main functional groups:
Data definition – Creation, modification and removal
of definitions that define the organization of the data.
Update – Insertion, modification, and deletion of the
actual data.
Retrieval – Providing information in a form directly
usable or for further processing by other applications.
The retrieved data may be made available in a form
basically the same as it is stored in the database or in a
new form obtained by altering or combining existing
data from the database.
Administration – Registering and monitoring users,
enforcing data security, monitoring performance,
maintaining data integrity, dealing with concurrency
control, and recovering information that has been
corrupted by some event such as an unexpected
system failure.
Both database and its DBMS conform to the principles of a
particular database model. Database system refers
collectively to the database model, DBMS and database.
Physically, database servers are dedicated computers that
hold the actual databases and run only the DBMS and
related software. Database servers are usually
multiprocessor computers, with generous memory and
RAID disk arrays used for stable storage. RAID is used for
recovery of data if any of the disks fail. Hardware database
accelerators, connected to one or more servers via a high-
speed channel, are also used in large volume transaction
processing environments. DBMS are found at the heart of
most database applications. DBMS may be built around a
custom multitasking kernel with built-in networking
support, but modern DBMSs typically rely on a standard
operating system to provide these functions.
Since DBMSs comprise a significant market, computer and
storage vendors often take into account DBMS
requirements in their own development plans.
Databases and DBMSs can be categorized according to the
database model(s) that they support (such as relational or
XML), the type(s) of computer they run on (from a server
cluster to a mobile phone), the query language(s) used to
access the database (such as SQL or XQuery), and their
internal engineering, which affects performance, scalability,
resilience, and security.
5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 6 Issue: 7 17 - 21
______________________________________________________________________________________
21
IJRITCC | July 2018, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Fig 4.4.1 List of tables
7.5 TEST CASES
Table 6.1: Test Case for User Registration (Signup)
S.
NO INPUT
TEST
CASE
CONDITIO
NS
BEING
CHECKED RESULT
1
USERNA
ME
ALRE
ADY
EXIST
OR
NOT
USERNAM
E
SHOULD
BE
UNIQUE
SUCCES
SFUL
2
USERN
AME
EMPT
Y
ENTER
VALID
USERNAM
E
SUCCES
SFUL
3 EMAIL
EMPT
Y
ENTER
VALID
EMAIL
SUCCES
SFUL
4 EMAIL
ALRE
ADY
EXIST
OR
NOT
ENTER
UNIQUE
EMAIL
SUCCESS
FUL
5
PASSW
ORD
EMPT
Y
ENTER
VALID
PASSWO
SUCCES
SFUL
6
CONFI
RM
PASSW
ORD
EMPT
Y
PASSWOR
D AND
CONFIRM
ATION
PASSWOR
D MUST
BE SAME
SUCCES
SFUL
CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMENT
8.1 CONCLUSION
While developing the system a conscious effort
has been made to create and develop a software package,
making use of available tools, techniques and resources that
would generate a proper system for a Social Media.
While making the system, an eye has been kept on
making it as user- friendly. As such on may hope that the
system will be acceptable to any user and will adequately
meet user needs. As in case of any system development
process, where there are a number of short comings, there
have been some shortcomings in the development of this
system also.
There are some of the areas of improvement
which couldn’t be implemented due to time constraints.
One such feature was Photo Sharing based on Location.
8.2 FUTURE ENHANCEMENT
Photo sharing based on Location
Suggestion of pictures based on Location
Editing of Pictures
Capture Picture from app alone camera and
produce on-time content
Sites Referred:
[1]. http://www.angularjs.org
[2]. https://w3techs.com/sites
[3]. https://.codeconquest.com
[4]. http://www.computer.org/publications/dlib
[5]. http://www.developerfusion.com/