My PRP Ject Document
My PRP Ject Document
My PRP Ject Document
By
MAYANA HEBA KHANAM 17F71A0525
SHAIK AFNAAN BANU 17F71A0503
CERTIFICATE
This is a Record of Bonafide work carried out by me and the results embodied
in this Project Report have not been reproduced or copied from any source. The results
embodied in this Project Report have not submitted to any other University or Institute
for the Award of any other Degree or Diploma.
BATCH MEMBERS
M.HEBA KHANAM 17F71A0525
We deeply thank our chief patron Sri. K.P.V. SUBBAIAH Garu, Sri Sai Institute of
Technology and science, with whose support and provision this project has been carried out
with required infrastructure.
We are very grateful to our Assistant Director, Dr. M. SUDHAKAR REDDY, Ph.D. for
providing us with an environment to complete our project successfully.
We are very grateful to our Principal, Sri Dr V. BALAJI, Ph.D. for providing us with an
environment to complete our project successfully.
We express our deep sense of gratitude and thanks to our project guide Ms. S. SUMIYA
SULTHANA, MTech., Assistant Professor. under whose guidance and supervision this work
had been accomplished.
We are thankful to the Internal Department Committee who have invested their
valuable time to conduct our monthly presentations and provided their feedback with a lot of
useful suggestions. We also thank all the faculty members, Department of Computer Science
and Engineering for their encouragement and assistance.
We are deeply thankful to our Parents who supported a lot in aspects to complete our
Project work and also B.Tech course in a successful way.
BATCH MEMBERS
M. HEBA KHANAM 17F71A0525
S. AFNAAN BANU 17F71A0503
P. GULFAM KHANAM 17F71A0521
TABLE OF CONTENTS
LIST OF FIGURES ii
LIST OF SYMBOLS iii
LIST OF TABLES vi
LIST OF ABBREVATIONS vii
1. INTRODUCTION 1
2. SYSTEM ANALYSIS 3
2.1 EXISTING SYSTEM 3
2.2 DISADVANTAGES OF EXISTING SYSTEM 4
2.3 PROPOSED SYSTEM 4
2.4 ADVANTAGES OF PROPOSED SYSTEM 5
3. SYSTEM REQUIREMENTS AND SPECIFICATIONS 6
3.1 SOFTWARE REQUIREMENTS 6
3.2 HARD WARE REQUIREMENTS 6
3.3 PRELIMINARY INVESTIGATION 7
3.3.1 Request Clarification 7
3.3.2 Feasibility Study 8
3.3.3 Request Approval 9
4. SYSTEM DESIGN 10
i
LIST OF FIGURES
ii
LIST OF SYMBOLS
S.NO SYMBOL SYMBOL DESCRIPTION
NAME
Class Name
Visibility Class represents a collection of
attribute: Type=initial similar entities grouped together.
1 Class value
Visibility
operation(arg
list):
return type()
Aggregation is a form of
3 Aggregation association. It aggregates several
classes into single class.
It is the
5 Communication communication between various use
cases.
iii
It represents the
7 decision, decision box
Decision Box making process from
a constant.
state
It represents the
8 State state of a state
process. Each
state goes
through various
flows.
It represents the
10 Final State final State of the
object.
It represents any
communication
12 Transition
that occurs
between the
transition process.
Object life line
represents the
object lifeline
13 Object object
vertical dimension
that object
communicates
v
LIST OF TABLES
TABLE NO NAME OF THE TABLE Page No
vi
LIST OFABBREVATIONS
5 GA Genetic Algorithm
13 DL Deep Learning
vii
INTRODUCTION
1. INTRODUCTION
As an increasing amount of our lives is spent interacting online through social media
platforms, more and more people tend to seek out and consume news from social media
rather than traditional news organizations. The reasons for this change in consumption
behaviors are inherent in the nature of these social media platforms: (i) it is often more
timely and less expensive to consume news on social media compared with traditional news
media, such as newspapers or television; and (ii) it is easier to further share, comment on,
and discuss the news with friends or other readers on social media.
Fake news detection on social media is still in the early age of development, and
there are still many challenging issues that need further investigations. It is necessary to
discuss potential research directions that can improve fake news detection and mitigation
capabilities.
System analysis explains about proposed scheme and its advantages over
existing system. Further it researches on modules framework of proposed architecture
with its context level design. System analysis in addition explains about feasible study
of the scheme and systems software and hardware requirements.
Advances in technology like an AL digital animations and social engineering, the line
between fake and authentic content is only going to blur even more.
The present study tries to explore the susceptibility of young social media users to fake
news on covid 19 and it focuses on the factors which make them vulnerable to fake news
on the pandemic
Fake news articles that are intentionally and verifiable false designed to manipulate
people's perception of reality. But it has also become a method to stir up and intensify
social conflict.
Blockchain and other DLT'S guarantee the provenance and traceability of data by
providing a transparent immutable and verifiable record of transaction while creating a
peer-to-peer Secure platform for storing and exchanging information.
The blockchain based solutions has the potential to change the way information is
produced and disseminated while playing the major role to tackle Disinformation over the
longer term.
The blockchain in news industry enables the content to be produced and distributed over
the internet in an immutable and secure way.
In decentralized social networks communities can set their own moderation policies, but
there is no central authority to make network wide moderation decisions it looks at
technical approaches to decentralized moderation and points out areas that could use more
experimentation and research.
Facebook has started dating rating its users’ trustworthiness in order to help the social
network know how much to value user reports that a certain news story might be fake
The performance of different reputation algorithms when applied to a large portion of the
news our main result is that simple algorithms based on the identity of users spreading the
news as well as the words appearing in the titles and descriptions of the linked articles are
able to identify a large portion of fake misleading news.
With traceable and transparent nature of the blockchain it can be possible to verify the
authenticity of the information or its sources and build trust in news displayed on th
internet.
Fact checking is a form of knowledge-based study of fake news which focuses on assessing
the trust fullness of news.
One of the most difficult takes is that the selection of software, once system
requirement is known. This section first summarizes the application requirement question
and then suggests more detailed comparisons.
SOFTWARE SPECIFICATIONS
HARDWARE SPECIFICATIONS
• Hard Disk - 40 GB
• Key Board - Standard Windows Keyboard
• Mouse - Two or Three Button Mouse
• Monitor - 15 VGA color
The first and foremost strategy for development of a project starts from the thought
of designing a mail enabled platform for a small firm in which it is easy and convenient of
sending and receiving messages, there is a search engine, address book and also including
some entertaining games. When it is approved by the organization and our project guide
the first activity, i.e., preliminary investigation begins. The activity has three parts:
●Request Clarification
●Feasibility Study
● Request Approval
After the approval of the request to the organization and project guide, with an
investigation being considered, the project request must be examined to determine
precisely what the system requires. Here our project is basically meant for users within the
company whose systems can be interconnected by the Local Area Network (LAN).
In today’s busy schedule man need everything should be provided in a readymade manner.
So, taking into consideration of the vastly use of the net in day-to-day life, the
corresponding development of the portal came into existence.
● Feasibility
● Technical Feasibility
Operational Feasibility
Economic Feasibility
Technical Feasibility
Not all request projects are desirable or feasible. Some organization receives so
many project requests from client users that only few of them are pursued. However, those
projects that are both feasible and desirable should be put into schedule. After a project
request is approved, it cost, priority, completion time and personnel requirement is
estimated and used to determine where to add it to any project list. Truly speaking, the
approval of those above factors, development works can be launched.
OUTPUT DESIGN
The Output from the computer is required to mainly create an efficient method of
communication within the company primarily among the project leader and his team members, in
other words, the administrator and the clients. The output of VPN is the system which allows the
project leader to manage his clients in terms of creating new clients and assigning new projects to
them, maintaining a record of the project validity and providing folder level access to each client
on the user side depending on the projects allotted to him. After completion of a project, a new
project may be assigned to the client. User authentication procedures are maintained at the initial
stages itself. A new user may be created by the administrator himself or a user can himself register
as a new user but the task of assigning projects and validating a new user rests with the
administrator only.
The application starts running when it is executed for the first time. The server has to be started
and then the internet explorer in used as the browser. The project will run on the local area network
so the server machine will serve as the administrator while the other connected systems can act as
the clients. The developed system is highly user friendly and can be easily understood by anyone
using it even for the first time.
■ News Server
■ User
MODULES DESCRIPTON: -
News Server
In this module, the admin has to login by using valid user name and
password. After login successful he can perform some operations such as List
all users and authorize, Register with News channel name and login, Add
News Categories, Set news quantization date, Select category and add news,
List all news post and give option to update and delete, List all news post by
Distributed Ledger Technologies, List All News Posts by blocks based on
news cat, List All Users News transactions by keyword, View online product
Distributed Ledger Technologies by chart, View all news post rank in chart.
User
In this module, there are n numbers of users are present. User should register
before performing any operations. Once user registers, their details will be
stored to the database. After registration successful, he has to login by using
authorized user name and password. Once Login is successful user can
perform some operations like View your profile, Search news by content
keyword, select hash code to show all news titles, show all your search
transactions based on keyword and view all fake news.
DFDs are the models of the proposed system. They clearly show the requirements
on which the new system should be built. Later during design activity
this is taken as the basis for drawing the system’s structure charts.
Process: Persons, events, or strategies that use or Transform Data. The physical module
is not identified.
The Data Flow Diagram is also called as bubble chart. It is a simple graphical
formalism that can be used to represent a system in terms of input data to the system,
many processing carried out on this data, and the output data is generated by this system.
1. The DFD is one of the best essential modeling tools. It is used to model the
system components. These components are the system process, the data used by
the process, an external entity that interacts with the system and the information
flows in the system.
2. DFD shows how the data flows (moves) through the system and how it is
changed by a series of changes. It is a graphical technique that illustrates data
flow and the conversions that are applied as data travels from input to output.
3. A DFD may be used to represent a system at any level of abstraction. DFD may
be divided into levels that represent growing data flow and functional detail.
The Unified Modeling Language (UML) is a standard language for writing software
blueprints. The UML may be used to visualize, specify, construct, and document the artifacts
of a software intensive system.
The UML is appropriate for modeling systems ranging from enterprise information
systems to distributed Web-based applications and even to hard real time embedded systems. It
is a very expressive language, addressing all the views needed to develop and then deploy such
systems. Even though it is expressive, the UML is not difficult to understand and to use.
Learning to apply the UML effectively starts with forming a conceptual model of the language,
which requires learning three major elements: the UML's basic building blocks, the rules that
dictate how these building blocks may be put together, and some common mechanisms that
apply throughout the language.
The UML is only a language and so is just one part of a software development method.
The UML is process independent, although optimally it should be used in a process that is use
case driven, architecture-centric, iterative, and incremental. UML stands for Unified Modeling
Language. UML is a uniform general purpose modeling language in the field of object-oriented
software engineering. The standard is achieved, and was created by, the OMG.
The aim is for UML to become a common language for creating models of object-
oriented computer software. In its existing form UML is included of two main modules: a Meta-
model and a notation. In the future, some process of technique or procedure may also be added
to or related with, UML.
It is a very essential part of developing object-oriented software and the software improvement
process. It uses typically graphical representations to express the intention of software schemes.
Goals
The Main aims in the plan of the UML are as follows
1.Offer users a ready-to-use, expressive visual modeling Language so
that they can improve and conversation meaningful models.
2. Offer extendibility and specialization devices to extend the core models.
3. Be independent of specific programming languages and improvement
Process
4. Offer an official foundation for accepting the modeling language.
5. Inspire the development of OO tools market.
6. Support higher level improvement ideas such as collaborations,
Frameworks patterns and components.
7. Integrate best practices.
A language provides a vocabulary and the rules for combining words in that vocabulary
for the purpose of communication. A modeling language is a language whose vocabulary and
rules focus on the conceptual and physical representation of a system. A modeling language
such as the UML is thus a standard language for software blueprints.
Some things are best modeled textually; others are best modeled graphically.
The UML is such a graphical language which includes both.
The UML is not a visual programming language, but its models can be directly
connected to a variety of programming languages. This means that it is possible to map
from a model in the UML to a programming language such as Java, C++, or Visual
Basic, or even to tables in a relational database or the persistent store of an object-
oriented database.
The UML addresses the documentation of a system's architecture and all of its
details. The UML also provides a language for expressing requirements and for tests.
Finally, the UML provides a language for modeling the activities of project planning
and release management.
Uses of UML
The UML is intended primarily for software-intensive systems. It has been used
effectively for such domains as
• Banking and financial services
• Telecommunications
• Transportation
• Defense/aerospace
• Retail
• Medical electronics
• Scientific
• Distributed Web-based services
Rules of UML
The UML has semantic rules for:
1. Things
2. Relationships
3. Diagrams
1. Structural things
2. Behavioral things
3. Grouping things
4. Annotational things
1. Dependency
2. Association
3. Generalization
4. Realization
1. Static Diagrams
2. Dynamic Diagrams
• Class diagram
• Object diagram
• Component diagram
• Deployment diagram
• Sequence diagram
• Collaboration diagram
• Activity Diagram
in that it’s a software-only platform that runs on top of other hardware-based platforms.
The Java platform has two components:
The Java API is a large collection of ready-made software components that provide many
useful capabilities, such as graphical user interface (GUI) widgets. The Java API is grouped
into libraries of related classes and interfaces; these libraries are known as packages. The next
section, What Can Java Technology Do? Highlights what functionality some of the packages
in the Java API provide.
The following figure depicts a program that’s running on the Java platform. As the figure
shows, the Java API and the virtual machine insulate the program from the hardware.
Native code is code that after you compile it, the compiled code runs on a specific hardware
platform. As a platform-independent environment, the Java platform can be a bit slower than
native code. However, smart compilers, well-tuned interpreters, and just-in-time byte code
compilers can bring performance close to that of native code without threatening portability.
The most common types of programs written in the Java programming language
are applets and applications. If you’ve surfed the Web, you’re probably already familiar with
applets. An applet is a program that adheres to certain conventions that allow it to run within a
Java-enabled browser. However, the Java programming language is not just for writing cute,
entertaining applets for the Web. The general-purpose, high-level Java programming language
is also a powerful software platform. Using the generous API, you can write many types of
programs.
An application is a standalone program that runs directly on the Java platform. A
special kind of application known as a server serves and supports clients on a network.
Examples of servers are Web servers, proxy servers, mail servers, and print servers. Another
specialized program is a servlet. A servlet can almost be thought of as an applet that runs on
the server side. Java Servlets are a popular choice for building interactive web applications,
replacing the use of CGI scripts. Servlets are similar to applets in that they are runtime
extensions of applications. Instead of working in browsers, though, servlets run within Java
Web servers, configuring or tailoring the server.
How does the API support all these kinds of programs? It does so with packages of
software components that provides a wide range of functionality. Every full implementation of
the Java platform gives you the following features:
• The essentials: Objects, strings, threads, numbers, input and output, data
structures, system properties, date and time, and so on.
• Internationalization: Help for writing programs that can be localized for users
worldwide. Programs can automatically adapt to specific locales and be
displayed in the appropriate language.
• Security: Both low level and high level, including electronic signatures, public
and private key management, access control, and certificates.
The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure depicts what is
included in the Java 2 SDK.
We can’t promise you fame, fortune, or even a job if you learn the Java programming
language. Still, it is likely to make your programs better and requires less effort than
other languages. We believe that Java technology will help you do the following:
• Write less code: Comparisons of program metrics (class counts, method counts,
and so on) suggest that a program written in the Java programming language can
be four times smaller than the same program in C++.
• Write better code: The Java programming language encourages good coding
practices, and its garbage collection helps you avoid memory leaks. Its object
orientation, its JavaBeans component architecture, and its wide-ranging, easily
extendible API let you reuse other people’s tested code and introduce fewer
bugs.
• Avoid platform dependencies with 100% Pure Java: You can keep your
program portable by avoiding the use of libraries written in other languages.
The 100% Pure Java Product Certification Program has a repository of historical
process manuals, white papers, brochures, and similar materials online.
• Write once, run anywhere: Because 100% Pure Java programs are compiled
into machine-independent byte codes, they run consistently on any Java
platform.
• Distribute software more easily: You can upgrade applets easily from a central
server. Applets take advantage of the feature of allowing new classes to be
loaded “on the fly,” without recompiling the entire program.
5.1.2 JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database access
mechanism that provides a consistent interface to a variety of RDBMSs. This consistent
interface is achieved through the use of “plug-in” database connectivity modules, or drivers. If
a database vendor wishes to have JDBC support, he or she must provide the driver for each
platform that the database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. ODBC
has widespread support on a variety of platforms.
Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market much faster
than developing a completely new connectivity solution. JDBC was announced in March of
1996. It was released for a 90 days public review that ended June 8, 1996. Because of user
input, the final JDBC v1.0 specification was released soon after.
JDBC Goals
Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with early
reviewer feedback, have finalized the JDBC class library into a solid framework for building
database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to
why certain classes and functionalities behave the way they do. The design goals for JDBC are
as follows:
The designers felt that their main goal was to define a SQL interface for Java. Although
not the lowest database interface level possible, it is at a low enough level for higher-level tools
and APIs to be created. Conversely, it is at a high enough level for application programmers
use it confidently. Attaining this goal allows for future tool vendors to “generate” JDBC code
and to hide many of JDBC’s complexities from the end user.
2. SQL Conformance
SQL syntax varies as you move from database vendor to database vendor. In an effort
to support a wide variety of vendors, JDBC will allow any query statement to be passed through
it to the underlying database driver. This allows the connectivity module to handle non-standard
functionality in a manner that is suitable for its users.
The JDBC SQL API must “sit” on top of other common SQL level APIs. This
goal allows JDBC to use existing ODBC level drivers by the use of a software interface.
This interface would translate JDBC calls to ODBC and vice versa.
4. Provide a Java interface that is consistent with the rest of the Java system
Because of Java’s acceptance in the user community thus far, the designers feel
that they should not stray from the current design of the core Java system.
5. Keep it simple
This goal probably appears in all software design goal listings. JDBC is no exception. Sun
felt that the design of JDBC should be very simple, allowing for only one method of completing
a task per mechanism. Allowing duplicate functionality only serves to confuse the users of the
API.
Strong typing allows for more error checking to be done at compile time; also, less error
appear at runtime.
Because more often than not, the usual SQL calls used by the programmer are simple
SELECT’s, INSERT’s, DELETE’s and UPDATE’s, these queries should be simple to
perform with JDBC. However, more complex SQL statements should also be possible.
JDBC connectivity
5.1.3 JAVASCRIPT
<SCRIPT> ....</SCRIPT>.
JavaScript statements
</SCRIPT>
• Animate images or rotate images that change when we move the mouse over
them.
• Detect the browser in use and display different content for different browsers.
Advantages of JavaScript
• JavaScript is the default scripting languages at Client-side since all the browsers
supports it.
Hypertext Markup Language (HTML), the languages of the World Wide Web
(WWW), allows users to produces Web pages that include text, graphics and pointer to
other Web pages (Hyperlinks).HTML is not a programming language but it is an
The idea behind Hypertext is that instead of reading text in rigid linear structure,
we can easily jump from one point to another point. We can navigate through the
information based on our interest and preference. A markup language is simply a series
of elements, each delimited with special characters that define how text or other items
enclosed within the elements should be displayed. Hyperlinks are underlined or
emphasized works that load to other documents or some portions of the same document.
HTML can be used to display any type of document on the host computer, which
can be geographically at a different location. It is a versatile language and can be used
on any platform or desktop.
HTML provides tags (special codes) to make the document look attractive.
HTML tags are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can
enhance the presentation of the document. Anything that is not a tag is part of the
document itself.
<HEAD>...</HEAD>
Contains tags that specify information about a
document
Advantages Of HTML
HTML document is small and hence easy to send over the net.
Java server Pages is a simple, yet powerful technology for creating and
maintaining dynamic-content web pages. Based on the Java programming language,
Java Server Pages offers proven portability, open standards, and a mature re-usable
component model. The Java Server Pages architecture enables the separation of content
generation from content presentation. This separation not eases maintenance headaches,
it also allows web team members to focus on their areas of expertise. Now, web page
designer can concentrate on layout, and web application designers on programming,
with minimal concern about impacting each other’s work.
Features of JSP
1. Portability
Java Server Pages files can be run on any web server or web-enabled application
server that provides support for them. Dubbed the JSP engine, this support involves
recognition, translation, and management of the Java Server Page lifecycle and its
interaction components.
2. Components
It was mentioned earlier that the Java Server Pages architecture can include
reusable Java components. The architecture also allows for the embedding of a scripting
language directly into the Java Server Pages file. The components current supported
include Java Beans, and Servlets.
3. Processing
A Java Server Pages file is essentially an HTML document with JSP scripting or tags.
The Java Server Pages file has a JSP extension to the server as a Java Server Pages file.
Before the page is served, the Java Server Pages syntax is parsed and processed into a
Servlet on the server side. The Servlet that is generated outputs real content in straight
HTML for responding to the client.
Access Models:
A Java Server Pages file may be accessed in at least two different ways. A
client’s request comes directly into a Java Server Page. In this scenario, suppose the
page accesses reusable Java Bean components that perform particular well-defined
computations like accessing a database. The result of the Beans computations, called
result sets is stored within the Bean as properties. The page uses such Beans to generate
dynamic content and present it back to the client. In both of the above cases, the page
could also contain any valid Java code. Java Server Pages architecture encourages
separation of content from presentation.
1. The client sends a request to the web server for a JSP file by giving the name of
the JSP file within the form tag of a HTML page.
3. JSP engine is program which can understand the tags of the jsp and then it
converts those tags into a Servlet program and it is stored at the server side. This
Servlet is loaded in the memory and then it is executed and the result is given
4. back to the Java Webserver and then it is transferred back to the result is
given back to the Java Webserver and then it is transferred back to the client.
A Sample jsp code to establish a connection with database and front end
<title></title>
<%
Class.forName("com.mysql.jdbc.Driver");
connection=DriverManager.getConnection("jdbc: mysql://localhost:3306/
cc_saapd","root”, “root");
String sql="";
}
catch(Exception e)
System.out.println(e);
%>
6. SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of tests. Each test type addresses a specific testing requirement.
Unit testing focus on each individual component to make sure that it functions
correctly as a unit and that program input produces appropriate outputs. Unit testing is
the technique of testing different units of application. Unit testing is structural testing
and is conducted by programmers with the knowledge of software component construction.
Unit testing is conducted on small components of the software. It
performs testing within the boundaries of component.
The main objective in this testing process is to take unit tested modules and
builds a program structure that has been dictated by design. Software integration
testing is the incremental integration testing of two or more integrated software
components on a single platform to produce failures caused by interface defects
The task of the integration test is to check that components or software
applications, e.g., components in a software system or – one step up – software
applications at the company level – interact without error. Integration testing is
specifically aimed at exposing the problems that arise from the combination of
components
Two approaches are used for integration
1. Top-down integration
2. Bottom-up integration
1.Top-Down Integration
This method is an incremental approach to the construction of program
structure. Modules are integrated by moving downward through the control hierarchy,
beginning with the main program module. The module subordinates to the main
program module are incorporated into the structure in either a depth first or breadth
first manner. In this method, the software is tested from main module and individual
stubs are replaced when the test proceeds downwards
2.Bottom-up integration
This method begins the construction and testing with the modules at the lowest
level in the program structure. Since the modules are integrated from the bottom up,
processing required for modules subordinate to a given level is always available and
the need for stubs is eliminated. The bottom-up integration strategy may be
implemented with the following steps:
● The low-level modules are combined into clusters into clusters that perform
specific Software sub-function
● A driver (i.e.) the control program for testing is written to coordinate test case
input and output.
● The cluster is tested
● Drivers are removed and clusters are combined moving upward in the program
structure
Text Field:
The text field can contain only the number of characters lesser than or equal to its size.
The text fields are alphanumeric in some tables and alphabetic in other tables. Incorrect entry
always flashes and error message.
Numeric Field:
The numeric field can contain only numbers from 0 to 9. An entry of any character
flashes an error message. The individual modules are checked for accuracy and what it has to
perform. Each module is subjected to test run along with sample data. The individually tested
modules are integrated into a single system. Testing involves executing the real data
information is used in the program the existence of any program defect is inferred from the
output. The testing should be planned so that all the requirements are individually tested.
A successful test is one that gives out the defects for the inappropriate data and
produces and output revealing the errors in the system.
System testing performs on the requirements of the system. The test cases
are planned to make sure that the system chances its requirements or not. System
testing is implemented based on the process:
1. White box testing
2. Black box testing
It is also named as Open or Glass box testing. In this, by finding the specified
program that a software product has been planned or developed to perform or execute
the test can be applied and accompanied for the demonstrates each program or function in a
fully operated at the same time finding for errors in each program. White Box Testing is a
testing in which in which the software tester has knowledge of the inner workings, structure and
language of the software, or at least its purpose. It is purpose. It is used to test areas that cannot
be reached from a black box level
Taking various kinds of test data does the above testing. Preparation of test data
plays a vital role in the system testing. After preparing the test data the system under
study is tested using that test data. While testing the system by using test data errors are
again uncovered and corrected by using above testing steps and corrections are also
noted for future use.
Live test data are those that are actually extracted from organization files. After
a system is partially constructed, programmers or analysts often ask users to key in a set
of data from their normal activities. Then, the systems person uses this data as a way to
partially test the system. In other instances, programmers or analysts extract a set of live
data from the files and have them entered themselves. It is difficult to obtain live data in
sufficient amounts to conduct extensive testing. And, although it is realistic data that
will show how the system will perform for the typical processing requirement, assuming
that the live data entered are in fact typical, such data generally will not test all
combinations or formats that can enter the system. This bias toward typical values then
does not provide a true system test and in fact ignores the cases most likely to cause
system failure.
Artificial test data are created solely for test purposes, since they can be
generated to test all combinations of formats and values. In other words, the artificial
data, which can quickly be prepared by a data generating utility program in the
information systems department, make possible the testing of all login and control paths
through the program. The most effective test programs use artificial test data generated
by persons other than those who wrote the programs. Often, an independent team of
testers formulates a testing plan, using the systems specifications. The package “Virtual
Private Network” has satisfied all the requirements specified as per software
requirement specification and was accepted.
A Test case is a set of input data and estimated results that movements a
component with the purpose of producing failure and identifying faults. Test case is a
categorical set of commands considered to discover a specific class of fault in a software
system, by bringing about a failure. A Test case can offer increase to several tests. Test
cases can be classified in to two types. First one is Positive cases and second one is
negative cases. In positive cases are conducted by the developer intention is to get the
output. In negative cases are conducted by the developer intention is to do not get the
output.
Expected
S. No User name Password Actual value Result
value
6.7 MAINTENANCE
This covers a wide range of activities including correcting code and design errors.
To reduce the need for maintenance in the long run, we have more accurately defined the
user’s requirements during the process of system development. Depending on the
requirements, this system has been developed to satisfy the needs to the largest possible
extent. With development in technology, it may be possible to add many more features
based on the requirements in future. The coding and designing are simple and easy to
understand which will make maintenance easier.
It is the home page of this project. This page contains the Home, News publisher
server and user.
This is the Registration page. The new user can be registered by entering all
the details.
This is the User Login page. The new user can login by entering all
the details.
This is the server registration page in which the user registers himself to add the
news in the server space.
This is the Server Login page where a user can login in the server page.
This is the Authorization page in which the registered users are authorized to get
access.
This is the Server menu page in which the user adds the news and can even add new
filter along with fake filters
This is the page in which the news is added in the form of category.
This is the page in which the news is added by the user by filling all the necessary
details related to news as shown above in the figure.
This is the page in which we can add the fake filters to categorize the news
accordingly as fake.
This is the Authorization page in which the registered users are authorized to get
access.
This is the page in which user can see the news in the form of graphical
representation such as chart.
With the increasing popularity of social media, more and more people consume news
from social media instead of traditional news media. However, social media has also been
used to spread fake news, which has strong negative impacts on individual users and
broader society. In this article, we explored the fake news problem by reviewing existing
literature in two phases: characterization and detection. In the characterization phase, we
introduced the basic concepts and principles of fake news in both traditional media and
social media. In the detection phase, we reviewed existing fake news detection approaches
from a data mining perspective, including feature extraction and model construction. We
also further discussed the datasets, evaluation metrics, and promising future directions in
fake news detection research and expand the field to other applications
[18] W. Shang, M. Liu, W. Lin, and M. Jia, “Tracing the source of news
based on blockchain,” in Proc. IEEE/ACIS 17th Int. Conf. Computer.
Inf. Sci., Singapore,2018, pp. 377–381.
Phone: 9704522817
Phone: 9515786429
PHONE: 9618607006