My PRP Ject Document

Download as pdf or txt
Download as pdf or txt
You are on page 1of 87

A PROJECT REPORT ON

FAKE NEWS MISINFORMATION AND


DEEPFAKES: PRACTISING DISTRIBUTED
LEDGER TECHNOLOGIES AND BLOCKCHAIN TO
OVERCOME DIGITAL DECEPTION AND
FORGERY REALITY
A project report submitted in partial fulfillment of the requirements for
the award of the degree of
Bachelor of Technology
In
Computer Science and Engineering

By
MAYANA HEBA KHANAM 17F71A0525
SHAIK AFNAAN BANU 17F71A0503

PATAN GULFAM KHANAM 17F71A0521

Under the esteemed guidance of


S. SUMIYA SULTHANA, M.TECH.,
Assistant professor

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

SRI SAI INSTITUTE OF TECHNOLOGY & SCIENCE


(Approved by AICTE New Delhi& Affiliated to JNTUA, Ananthauramu)
Gollapalli, Rayachoty, Kadapa (Dist.), AP
2021
SRI SAI INSTITUTE OF TECHNOLOGY& SCIENCE
(Approved by AICTE New Delhi& Affiliated to JNTUA, Ananthapuramu)
Masapeta,Rayachoty,Kadapa(Dist), AP

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that the project report entitled “FAKE NEWS,


MISINFORMATION AND DEEPFAKES: PRACTISING DISTRIBUTED
LEDGER TECHNOLOGIES AND BLOCKCHAIN TO OVERCOME DIGITAL
DECEPTION AND FORGERY REALITY ” is a bonafide record of the project
work done by

M. HEBA KHANAM 17F71A0525


S. AFNAAN BANU 17F71A0503
P. GULFAM KHANAM 17F71A0521
in partial fulfillment of the requirements for the award of degree of BACHELOR OF
TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING
from SRI SAI INSTITUTE OF TECHOLOGY AND SCIENCE affiliated to
JNTUA, Ananthapuramu, during the year 2020-2021

Project Guide Head of the Department

S. SUMIYA SULTHANA, M Tech Mr. M. ATHEEQULLAH KHAN, M. Tech

Assistant Professor Associate Professor and HOD of CSE

Submitted For External Viva Voce Examination held on _______________

Internal Examiner External Examiner


DECLARATION BY THE CANDIDATE

We hereby declare that the Project Report entitled “FAKE NEWS


MISINFORMATION AND DEEPFAKES: PRACTISING DISTRIBUTED
LEDGER TECHNOLOGIES AND BLOCKCHAIN TO OVERCOME DIGITAl
DECEPTION AND FORGERY REALITY “under the guidance of
S. SUMIYA SULTHANA M. Tech., Assistant professor Department of C.S.E is
submitted in partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology in Computer Science and Engineering.

This is a Record of Bonafide work carried out by me and the results embodied
in this Project Report have not been reproduced or copied from any source. The results
embodied in this Project Report have not submitted to any other University or Institute
for the Award of any other Degree or Diploma.

BATCH MEMBERS
M.HEBA KHANAM 17F71A0525

S. AFNAAN BANU 17F71A0503

P. GULFAM KHANAM 17F71A0521


ACKNOWLEDGEMENT
An endeavor of a long period can be successful only with the advice of many well-wishers.
We take this opportunity to express our deep gratitude and appreciation to all those who
encouraged us for successfully completing the project work.

We deeply thank our chief patron Sri. K.P.V. SUBBAIAH Garu, Sri Sai Institute of
Technology and science, with whose support and provision this project has been carried out
with required infrastructure.

We are very grateful to our Assistant Director, Dr. M. SUDHAKAR REDDY, Ph.D. for
providing us with an environment to complete our project successfully.

We are very grateful to our Principal, Sri Dr V. BALAJI, Ph.D. for providing us with an
environment to complete our project successfully.

We are deeply indebted to our Head of the Department Mr. M. ATHEEQULLAH


KHAN MTech., who modeled us both technically and morally for achieving greater success
in life.

We express our deep sense of gratitude and thanks to our project guide Ms. S. SUMIYA
SULTHANA, MTech., Assistant Professor. under whose guidance and supervision this work
had been accomplished.

We are thankful to the Internal Department Committee who have invested their
valuable time to conduct our monthly presentations and provided their feedback with a lot of
useful suggestions. We also thank all the faculty members, Department of Computer Science
and Engineering for their encouragement and assistance.

We are deeply thankful to our Parents who supported a lot in aspects to complete our
Project work and also B.Tech course in a successful way.

BATCH MEMBERS
M. HEBA KHANAM 17F71A0525
S. AFNAAN BANU 17F71A0503
P. GULFAM KHANAM 17F71A0521
TABLE OF CONTENTS

TOPIC NAME PAGE NO


ABSTRACT i

LIST OF FIGURES ii
LIST OF SYMBOLS iii

LIST OF TABLES vi
LIST OF ABBREVATIONS vii
1. INTRODUCTION 1
2. SYSTEM ANALYSIS 3
2.1 EXISTING SYSTEM 3
2.2 DISADVANTAGES OF EXISTING SYSTEM 4
2.3 PROPOSED SYSTEM 4
2.4 ADVANTAGES OF PROPOSED SYSTEM 5
3. SYSTEM REQUIREMENTS AND SPECIFICATIONS 6
3.1 SOFTWARE REQUIREMENTS 6
3.2 HARD WARE REQUIREMENTS 6
3.3 PRELIMINARY INVESTIGATION 7
3.3.1 Request Clarification 7
3.3.2 Feasibility Study 8
3.3.3 Request Approval 9
4. SYSTEM DESIGN 10

4.1 DESIGN APPROACHES 10


4.2 MODULES 12
4.3 DATA FLOW DIAGRAMS 13
4.4 UML DIAGRAMS 16
5. SYSTEM CODING AND IMPLEMENTATION 24
5.1 ABOUT P ROGRAMMING LANGUAGE 24
5.2 SAMPLE CODE 38
6. SYSTEM TESTING 39
6.1 TYPES OF TESTS 39
6.2 SYSTEM TESTING APPROACHES 42
6.3 FUNCTIONAL TEST 42
6.4 PREPARATIONS OF TEST DATA 43
6.5 TEST CASES 44
6.6 USER TRAINING 45
6.7 MAINTENANCE 46
7. RESULTS 47
8.CONCLUSION & FUTURE ENHANCEMENT 59
9.BIBLIOGRAPHY 60
ABSTRACT

The rise of ubiquitous deep fakes, misinformation, disinformation, and post-


truth, often referred to as fake news, raises concerns over the role of the Internet and
social media in modern democratic societies. Due to its rapid and widespread
diffusion, digital deception has not only an individual or societal cost, but it can lead
to significant economic losses or to risks to national security. Block chain and other
distributed ledger technologies (DLTs) guarantee the provenance and traceability of
data by providing a transparent, immutable, and verifiable record of transactions
while creating a peer-to-peer secure platform for storing and exchanging information.
This overview aims to explore the potential of DLTs to combat digital deception,
describing the most relevant applications and identifying their main open challenges.
Moreover, some recommendations are enumerated to guide future researchers on
issues that will have to be tackled to strengthen the resilience against cyber-threats
on today’s online media.

i
LIST OF FIGURES

FIG.NO NAME OF THE FIGURE Page No

1.1 System Architecture 02

4.3.1 Data Flow Directions 13


4.3.2 Process Representation 13
4.3.3 Source/Person Representation 14
4.3.4 Store/Service Representation 14
4.3.5 DFD Diagram for User 15
4.4.1 Class Diagram 21
4.4.2 Sequence Diagram 22
4.4.3 Use case Diagram 23
5.1.1 Development Process of java Program 25

5.1.2 Program Running on a Java Platform 26

5.1.3 Java 2 Sdk 28

6.1 Types of Testing 39


7.1 Home Page 47

7.2 User Registration Page 48

7.3 User Login Page 49

7.4 Server Registration Page 50

7.5 Server Login n Page 51

7.6 Authorization Page 52

7.7 Server Menu Page 53

7.8 Adding News Category 54

7.9 Adding News Details 55

7.10 Adding Fake Filter 56

7.11 Viewing Fake News 57

7.12 Viewing News in the form of chart 58

ii
LIST OF SYMBOLS
S.NO SYMBOL SYMBOL DESCRIPTION
NAME
Class Name
Visibility Class represents a collection of
attribute: Type=initial similar entities grouped together.
1 Class value
Visibility
operation(arg
list):
return type()

role 1 role2 Association represents a static


2 Association Class1 Class2 relation between classes.

Aggregation is a form of
3 Aggregation association. It aggregates several
classes into single class.

A use case is an interaction use case


4 Use Case Use Case between the system and the external
environment

It is the
5 Communication communication between various use
cases.

Actors are the users of the system


Actor and other external entity that react
6
with the system.
Actor

iii
It represents the
7 decision, decision box
Decision Box making process from
a constant.

state
It represents the
8 State state of a state
process. Each
state goes
through various
flows.

9 Initial State It represents the


initial state of the
object.

It represents the
10 Final State final State of the
object.

11 A line that connects


Flow line
the various symbols
in an ordered way.

It represents any
communication
12 Transition
that occurs
between the
transition process.
Object life line
represents the
object lifeline
13 Object object
vertical dimension
that object
communicates

v
LIST OF TABLES
TABLE NO NAME OF THE TABLE Page No

6.5.1 Positive Test Cases 44

6.5.2 Negative Test Cases 45

vi
LIST OFABBREVATIONS

S.NO Acronym Abbreviation

1 USD United States Dollar

2 SQL Structured Query Language

3 JSP Java Server Pages

4 LAN Local Area Network

5 GA Genetic Algorithm

6 JDBC Java Database Connectivity

7 ODBC Oracle Database Connectivity

8 JDK Java Development Kit

9 SDK Software development Kit

10 DFD Data-Flow Diagram

11 UML Unified Modeling Language

12 DLT Distributed Ledger Technologies

13 DL Deep Learning

vii
INTRODUCTION
1. INTRODUCTION

As an increasing amount of our lives is spent interacting online through social media
platforms, more and more people tend to seek out and consume news from social media
rather than traditional news organizations. The reasons for this change in consumption
behaviors are inherent in the nature of these social media platforms: (i) it is often more
timely and less expensive to consume news on social media compared with traditional news
media, such as newspapers or television; and (ii) it is easier to further share, comment on,
and discuss the news with friends or other readers on social media.

Fake news is intentionally written to mislead readers, which makes it nontrivial


to detect simply based on news content. The content of fake news is
rather diverse in terms of topics, styles and media platforms and fake news attempts to
distort truth with diverse linguistic styles while simultaneously mocking true news. Social
media has proved to be a powerful source for fake news dissemination. There are some
emerging patterns that can be utilized for fake news detection in social media. A review on
existing fake news detection methods under various social media scenarios can provide a
basic understanding on the state-of-the-art fake news detection methods.

Fake news detection on social media is still in the early age of development, and
there are still many challenging issues that need further investigations. It is necessary to
discuss potential research directions that can improve fake news detection and mitigation
capabilities.

SSITS, RAYACHOTY Page 1


SYSTEM ARCHITECTURE:

Fig 1.1: System Architecture

SSITS, RAYACHOTY Page 2


SYSTEM ANALYSIS
2. SYSTEM ANALYSIS

System analysis explains about proposed scheme and its advantages over
existing system. Further it researches on modules framework of proposed architecture
with its context level design. System analysis in addition explains about feasible study
of the scheme and systems software and hardware requirements.

2.1 EXISTING SYSTEM


 Essentially, Linguistic Cue approaches detect fake news by catching the information
manipulators in the writing style of the news content.
 Fake news spreads like an echo chamber cycle; it identifies the value of extracting network-
based features to represent network patterns for fake news detection.
 The main methods that have been implemented under the Linguistic Cue approaches are
Data Representation, Deep Syntax, Semantic Analysis, and Sentiment.
 Network based features are extracted by creating specific networks among users who
authored related social media posts.
 Fake news detection is the task of detecting forms of news consisting of deliberate
disinformation or hoaxes spread via traditional news media.
 Fake news and hoaxes have been there since before the advent of the Internet.
 A number of studies have primarily focused on detection and classification of fake news
on social media platforms.
 We give an overview of existing fake news detection methods with a principled way to ...
an automatic scalable system to classify true and false claims.
 Detection of fake news online is important in today's society as fresh news content is
rapidly being produced as a result of the abundance of available technology.

SSITS, RAYACHOTY Page 3


SYSTEM ANALYSIS

2.2 DISADVANTAGES OF EXISTING SYSTEM

 Advances in technology like an AL digital animations and social engineering, the line
between fake and authentic content is only going to blur even more.

 The present study tries to explore the susceptibility of young social media users to fake
news on covid 19 and it focuses on the factors which make them vulnerable to fake news
on the pandemic

 Fake news articles that are intentionally and verifiable false designed to manipulate
people's perception of reality. But it has also become a method to stir up and intensify
social conflict.

 In a centralized control model one component is designated as the controller and is


responsible for managing the execution of other components

2.3 PROPOSED SYSTEM

 Blockchain and other DLT'S guarantee the provenance and traceability of data by
providing a transparent immutable and verifiable record of transaction while creating a
peer-to-peer Secure platform for storing and exchanging information.

 The blockchain based solutions has the potential to change the way information is
produced and disseminated while playing the major role to tackle Disinformation over the
longer term.

 The blockchain in news industry enables the content to be produced and distributed over
the internet in an immutable and secure way.

SSITS, RAYACHOTY Page 4


 Fake news is defined as a made-up story with an intention to deceive or to mislead we
present the solutions to the task of fake news detection by using deep learning architectures

 The recent achievements of deep learning techniques in complex natural language


processing tasks, make them a promising solution for fake news detection too.

2.4 ADVANTAGES OF PROPOSED SYSTEM

 In decentralized social networks communities can set their own moderation policies, but
there is no central authority to make network wide moderation decisions it looks at
technical approaches to decentralized moderation and points out areas that could use more
experimentation and research.

 Facebook has started dating rating its users’ trustworthiness in order to help the social
network know how much to value user reports that a certain news story might be fake

 The performance of different reputation algorithms when applied to a large portion of the
news our main result is that simple algorithms based on the identity of users spreading the
news as well as the words appearing in the titles and descriptions of the linked articles are
able to identify a large portion of fake misleading news.

 With traceable and transparent nature of the blockchain it can be possible to verify the
authenticity of the information or its sources and build trust in news displayed on th
internet.
 Fact checking is a form of knowledge-based study of fake news which focuses on assessing
the trust fullness of news.

SSITS, RAYACHOTY Page 5


SYSTEM
REQUIREMENT
SPECIFICATIONS
3. SYSTEM REQUIREMENT SPECIFICATIONS

3.1 SOFTWARE REQUIREMENTS

One of the most difficult takes is that the selection of software, once system
requirement is known. This section first summarizes the application requirement question
and then suggests more detailed comparisons.

SOFTWARE SPECIFICATIONS

• Operating System - Windows XP or Windows 7 or 8 or 10


• Coding Language - Java/J2EE (JSP, Servlet)
• Front End - J2EE
• Back End - MySQL
• Server - Apache Tomcat Server
• Editor - Edit Plus
• Documentation - MS Word

3.2 HARDWARE REQUIREMENTS


The selection of hardware is very important in the existence and proper working of any
software. In the selection of hardware, the size and capacity requirements are also important.

HARDWARE SPECIFICATIONS

• Processor - Pentium –IV


• RAM - 4GB

• Hard Disk - 40 GB
• Key Board - Standard Windows Keyboard
• Mouse - Two or Three Button Mouse
• Monitor - 15 VGA color

SSITS, RAYACHOTY Page 6


3.3 PRELIMINARY INVESTIGATION

The first and foremost strategy for development of a project starts from the thought
of designing a mail enabled platform for a small firm in which it is easy and convenient of
sending and receiving messages, there is a search engine, address book and also including
some entertaining games. When it is approved by the organization and our project guide
the first activity, i.e., preliminary investigation begins. The activity has three parts:

●Request Clarification

●Feasibility Study

● Request Approval

3.3.1 REQUEST CLARIFICATION

After the approval of the request to the organization and project guide, with an
investigation being considered, the project request must be examined to determine
precisely what the system requires. Here our project is basically meant for users within the
company whose systems can be interconnected by the Local Area Network (LAN).
In today’s busy schedule man need everything should be provided in a readymade manner.
So, taking into consideration of the vastly use of the net in day-to-day life, the
corresponding development of the portal came into existence.

3.3.2 FEASIBILITY STUDY

An important outcome of preliminary investigation is the determination that the


system request is feasible. This is possible only if it is feasible within limited resource and
time. The different feasibilities that have to be analyzed are:

SSITS, RAYACHOTY Page 7


● Operational Feasibility

● Feasibility

● Technical Feasibility

Operational Feasibility

Operational Feasibility deals with the study of prospects of the system to be


developed. This system operationally eliminates all the tensions of the admin and helps
him in effectively tracking the project progress. This kind of automation will surely reduce
the time and energy, which previously consumed in manual work. Based on the study, the
system is proved to be operationally feasible.

Economic Feasibility

Economic Feasibility or Cost-benefit is an assessment of the economic justification


for a computer-based project. As hardware was installed from the beginning & for lots of
purposes thus the cost on project of hardware is low. Since the system is a network based,
any number of employees connected to the LAN within that organization can use this tool
from at any time. The Virtual Private Network is to be developed using the existing
resources of the organization. So, the project is economically feasible.

Technical Feasibility

According to Roger S. Pressman, Technical Feasibility is the assessment of the


technical resources of the organization. The organization needs IBM compatible machines
with a graphical web browser connected to the Internet and Intranet. The system is
developed for platform independent environment. Java Server Pages, JavaScript, HTML,
SQL server and WebLogic Server are used to develop the system. The technical feasibility
has been carried out. The system is technically feasible for development and can be
developed with the existing facility.

SSITS, RAYACHOTY Page 8


3.3.3 REQUEST APPROVAL

Not all request projects are desirable or feasible. Some organization receives so
many project requests from client users that only few of them are pursued. However, those
projects that are both feasible and desirable should be put into schedule. After a project
request is approved, it cost, priority, completion time and personnel requirement is
estimated and used to determine where to add it to any project list. Truly speaking, the
approval of those above factors, development works can be launched.

SSITS, RAYACHOTY Page 9


SYSTEM DESIGN
4.SYSTEM DESIGN
The purpose of the design phase is to plan the solution of the problem
specified by the requirement. This phase is the first step in moving from problem domain to
solution domain. The design of the system is perhaps the most critical factor affecting the
quality of the software, and has a major impact on the later phases, particularly on testing and
maintenance. The output of this phase is the design document. This document is similar to the
blue print or plan of the solution, and is used later during the implementation, testing and
maintenance. System design shows framework of modules. Initially its shows data flow design
of different elements. Further it explains UML diagrams of modules.

4.1 DESIGN APPROACHES


INPUT DESIGN
The Input Design plays a vital role in the life cycle of software development, it
requires very careful attention of developers. The input design is to feed data to the application as
accurate as possible. So inputs are supposed to be designed effectively so that the errors occurring
while feeding are minimized. According to Software Engineering Concepts, the input forms or
screens are designed to provide to have a validation control over the input limit, range and other
related validations.
This system has input screens in almost all the modules. Error messages are
developed to alert the user whenever he commits some mistakes and guides him in the right way
so that invalid entries are not made. Let us see deeply about this under module design.
Input design is the process of converting the user created input into a computer-based
format. The goal of the input design is to make the data entry logical and free from errors. The
error is in the input are controlled by the input design. The application has been developed in user-
friendly manner. The forms have been designed in such a way during the processing the cursor is
placed in the position where must be entered. The user is also provided with in an option to select
an appropriate input from various alternatives related to the field in certain cases.

SSITS, RAYACHOTY Page 10


Validations are required for each data entered. Whenever a user enters an erroneous data, error
message is displayed and the user can move on to the subsequent pages after completing all the
entries in the current page

OUTPUT DESIGN

The Output from the computer is required to mainly create an efficient method of
communication within the company primarily among the project leader and his team members, in
other words, the administrator and the clients. The output of VPN is the system which allows the
project leader to manage his clients in terms of creating new clients and assigning new projects to
them, maintaining a record of the project validity and providing folder level access to each client
on the user side depending on the projects allotted to him. After completion of a project, a new
project may be assigned to the client. User authentication procedures are maintained at the initial
stages itself. A new user may be created by the administrator himself or a user can himself register
as a new user but the task of assigning projects and validating a new user rests with the
administrator only.

The application starts running when it is executed for the first time. The server has to be started
and then the internet explorer in used as the browser. The project will run on the local area network
so the server machine will serve as the administrator while the other connected systems can act as
the clients. The developed system is highly user friendly and can be easily understood by anyone
using it even for the first time.

SSITS, RAYACHOTY Page 11


4.2 MODULES: -

■ News Server
■ User

MODULES DESCRIPTON: -

News Server
In this module, the admin has to login by using valid user name and
password. After login successful he can perform some operations such as List
all users and authorize, Register with News channel name and login, Add
News Categories, Set news quantization date, Select category and add news,
List all news post and give option to update and delete, List all news post by
Distributed Ledger Technologies, List All News Posts by blocks based on
news cat, List All Users News transactions by keyword, View online product
Distributed Ledger Technologies by chart, View all news post rank in chart.
User
In this module, there are n numbers of users are present. User should register
before performing any operations. Once user registers, their details will be
stored to the database. After registration successful, he has to login by using
authorized user name and password. Once Login is successful user can
perform some operations like View your profile, Search news by content
keyword, select hash code to show all news titles, show all your search
transactions based on keyword and view all fake news.

SSITS, RAYACHOTY Page 12


4.3 DATA FLOW DIAGRAMS

A data-flow diagram (DFD) is a graphical depiction of the "flow" of information


over an information structure. DFDs can likewise be recycled for the conception of data
dealing out (structured design). A graphical tool used to describe and analyze the
moment of data through a system either manually or automated including the process,
stores of data, and delays in the system. DFDs are the central tool and the basis from
which other components are described logically and independently of the physical
components associated with the system.

DFDs are the models of the proposed system. They clearly show the requirements
on which the new system should be built. Later during design activity
this is taken as the basis for drawing the system’s structure charts.

The basic notation used to create a DFD’s are as follows:

Dataflow: Data move in a specific direction from an origin to a destination.

Fig 4.3.1: Data Flow Directions

Process: Persons, events, or strategies that use or Transform Data. The physical module
is not identified.

Fig 4.3.2: Process Representation

SSITS, RAYACHOTY Page 13


Sources: External sources or destination of data, which may be people programs
organizations

Fig 4.3.3: Source /Person Representation

Data Store: Here data is stored or referenced by a process in the system.

Fig 4.3.4: Store/ Service


Representation

The Data Flow Diagram is also called as bubble chart. It is a simple graphical
formalism that can be used to represent a system in terms of input data to the system,
many processing carried out on this data, and the output data is generated by this system.

1. The DFD is one of the best essential modeling tools. It is used to model the
system components. These components are the system process, the data used by
the process, an external entity that interacts with the system and the information
flows in the system.

2. DFD shows how the data flows (moves) through the system and how it is
changed by a series of changes. It is a graphical technique that illustrates data
flow and the conversions that are applied as data travels from input to output.

3. A DFD may be used to represent a system at any level of abstraction. DFD may
be divided into levels that represent growing data flow and functional detail.

SSITS, RAYACHOTY Page 14


DFD DIAGRAMS:

Fig 4.3.5: Data Flow Diagram

SSITS, RAYACHOTY Page 15


4.4 UML DIAGRAMS

The Unified Modeling Language (UML) is a standard language for writing software
blueprints. The UML may be used to visualize, specify, construct, and document the artifacts
of a software intensive system.

The UML is appropriate for modeling systems ranging from enterprise information
systems to distributed Web-based applications and even to hard real time embedded systems. It
is a very expressive language, addressing all the views needed to develop and then deploy such
systems. Even though it is expressive, the UML is not difficult to understand and to use.
Learning to apply the UML effectively starts with forming a conceptual model of the language,
which requires learning three major elements: the UML's basic building blocks, the rules that
dictate how these building blocks may be put together, and some common mechanisms that
apply throughout the language.

The UML is only a language and so is just one part of a software development method.
The UML is process independent, although optimally it should be used in a process that is use
case driven, architecture-centric, iterative, and incremental. UML stands for Unified Modeling
Language. UML is a uniform general purpose modeling language in the field of object-oriented
software engineering. The standard is achieved, and was created by, the OMG.

The aim is for UML to become a common language for creating models of object-
oriented computer software. In its existing form UML is included of two main modules: a Meta-
model and a notation. In the future, some process of technique or procedure may also be added
to or related with, UML.

The UML is a standard language for specifying, Visualization, Constructing and


documenting the objects of software system, as well as for commercial modeling and other non-
software systems. UML denotes a gathering of best engineering practices that have established
successful in the demonstrating of big and difficult schemes.

SSITS, RAYACHOTY Page 16


SYSTEM DESIGN

It is a very essential part of developing object-oriented software and the software improvement
process. It uses typically graphical representations to express the intention of software schemes.
Goals
The Main aims in the plan of the UML are as follows
1.Offer users a ready-to-use, expressive visual modeling Language so
that they can improve and conversation meaningful models.
2. Offer extendibility and specialization devices to extend the core models.
3. Be independent of specific programming languages and improvement
Process
4. Offer an official foundation for accepting the modeling language.
5. Inspire the development of OO tools market.
6. Support higher level improvement ideas such as collaborations,
Frameworks patterns and components.
7. Integrate best practices.

THE UML Is a Language

A language provides a vocabulary and the rules for combining words in that vocabulary
for the purpose of communication. A modeling language is a language whose vocabulary and
rules focus on the conceptual and physical representation of a system. A modeling language
such as the UML is thus a standard language for software blueprints.

The UML Is a Language for Visualizing

Some things are best modeled textually; others are best modeled graphically.
The UML is such a graphical language which includes both.

The UML Is a Language for Specifying

Specifying means building models that are precise, unambiguous and


complete. In particular, the UML addresses the specification of all the important
analysis and deploying a software intensive system.

SSITS, RAYACHOTY Page 17


The UML Is a Language for Constructing

The UML is not a visual programming language, but its models can be directly
connected to a variety of programming languages. This means that it is possible to map
from a model in the UML to a programming language such as Java, C++, or Visual
Basic, or even to tables in a relational database or the persistent store of an object-
oriented database.

The UML Is a Language for Documenting

The UML addresses the documentation of a system's architecture and all of its
details. The UML also provides a language for expressing requirements and for tests.
Finally, the UML provides a language for modeling the activities of project planning
and release management.

Uses of UML

The UML is intended primarily for software-intensive systems. It has been used
effectively for such domains as
• Banking and financial services
• Telecommunications
• Transportation
• Defense/aerospace
• Retail
• Medical electronics
• Scientific
• Distributed Web-based services
Rules of UML
The UML has semantic rules for:

▪︎ Names What you can call things, relationships, and diagrams


■ Scope The context that gives specific meaning to a name
▪︎ Visibility How those names can be seen and used by others

SSITS, RAYACHOTY Page 18


SYSTEM DESIGN

■ Integrity How things properly and consistently relate to one another

■ Execution What it means to run or simulate a dynamic model

Building Blocks Of UML

The vocabulary of the UML encompasses three kinds of building blocks:

1. Things

2. Relationships

3. Diagrams

Things in the UML

Things are the abstractions that are first-class citizens in a model.


There are four kinds of things in the UML:

1. Structural things

2. Behavioral things

3. Grouping things

4. Annotational things

SSITS, RAYACHOTY Page 19


SYSTEM DESIGN

Relationships in the UML

Relationships tie the things together.


There are four kinds of relationships in the UML:

1. Dependency

2. Association

3. Generalization

4. Realization

Diagrams in the UML

A diagram is the graphical presentation of a set of elements, most often rendered as


a connected graph of vertices (things) and arcs (relationships). UML includes nine such
diagrams. These nine diagrams are classified as:

1. Static Diagrams

2. Dynamic Diagrams

Static diagrams include:

• Class diagram

• Object diagram

• Component diagram

• Deployment diagram

Dynamic diagrams include:

• Use case diagram

• Sequence diagram

SSITS, RAYACHOTY Page 20


SYSTEM DESIGN

• Collaboration diagram

• State chart diagram

• Activity Diagram

Fig 4.4.1: Class Diagram

SSITS, RAYACHOTY Page 21


SYSTEM DESIGN

Fig 4.4.2 Sequence Diagram

SSITS, RAYACHOTY Page 22


SYSTEM DESIGN

Fig 4.4.3: Use case diagram

SSITS, RAYACHOTY Page 23


SYSTEM CODING
&
IMPLENTATION
5. SYSTEM CODING AND IMPLEMENTATION

5.1 ABOUT PROGRAMMING LANGUAGE

5.1.1 Java Technology

Java technology is both a programming language and a platform.

The Java Programming Language

The Java programming language is a high-level language that can be characterized


by all of the following buzzwords:
☆ Simple
☆ Architecture Neutral
☆ object oriented
☆ Portable
☆ Distributed
☆ High performance
☆ Multithreaded
☆ Robust
☆ Secure
☆ Dynamic

With most programming languages, you either compile or interpret a program so


that you can run it on your computer. The Java programming language is unusual in that
a program is both compiled and interpreted. With the compiler, first you translate a
program into an intermediate language called Java byte codes —the platform
independent codes interpreted by the interpreter on the Java platform. The interpreter
parses and runs each Java byte code instruction on the computer. Compilation happens
just once; interpretation occurs each time the program is executed. The following figure
illustrates how this works.

SSITS, RAYACHOTY Page 24


SYSTEM CODING & IMPLEMENTATION

FIG 5.1.1: Development process of java Program


You can think of Java byte codes as the machine code instructions for the Java
Virtual Machine (Java VM). Every Java interpreter, whether it’s a development tool or
a Web browser that can run applets, is an implementation of the Java VM. Java byte
codes help make “write once, run anywhere” possible. You can compile your program
into byte codes on any platform that has a Java compiler. The byte codes can then be
run on any implementation of the Java VM. That means that as long as a computer has
a Java VM, the same program written in the Java programming language can run on
Windows 2000, a Solaris workstation, or on an iMac.

The JAVA Platform


A platform is the hardware or software environment in which a program runs.
We’ve already mentioned some of the most popular platforms like Windows 2000,
Linux, Solaris, and MacOS. Most platforms can be described as a combination of the
operating system and hardware. The Java platform differs from most other platforms

SSITS, RAYACHOTY Page 25


SYSTEM CODING & IMPLEMENTATION

in that it’s a software-only platform that runs on top of other hardware-based platforms.
The Java platform has two components:

• The Java Virtual Machine (Java VM)


• The Java Application Programming Interface (Java API)
You’ve already been introduced to the Java VM. It’s the base for the Java platform
and is ported onto various hardware-based platforms.

The Java API is a large collection of ready-made software components that provide many
useful capabilities, such as graphical user interface (GUI) widgets. The Java API is grouped
into libraries of related classes and interfaces; these libraries are known as packages. The next
section, What Can Java Technology Do? Highlights what functionality some of the packages
in the Java API provide.

The following figure depicts a program that’s running on the Java platform. As the figure
shows, the Java API and the virtual machine insulate the program from the hardware.

FIG 5.1.2: Program running on a java platform

Native code is code that after you compile it, the compiled code runs on a specific hardware
platform. As a platform-independent environment, the Java platform can be a bit slower than
native code. However, smart compilers, well-tuned interpreters, and just-in-time byte code
compilers can bring performance close to that of native code without threatening portability.

SSITS, RAYACHOTY Page 26


SYSTEM CODING & IMPLEMENTATION

What Can Java Technology Do?

The most common types of programs written in the Java programming language
are applets and applications. If you’ve surfed the Web, you’re probably already familiar with
applets. An applet is a program that adheres to certain conventions that allow it to run within a
Java-enabled browser. However, the Java programming language is not just for writing cute,
entertaining applets for the Web. The general-purpose, high-level Java programming language
is also a powerful software platform. Using the generous API, you can write many types of
programs.
An application is a standalone program that runs directly on the Java platform. A
special kind of application known as a server serves and supports clients on a network.
Examples of servers are Web servers, proxy servers, mail servers, and print servers. Another
specialized program is a servlet. A servlet can almost be thought of as an applet that runs on
the server side. Java Servlets are a popular choice for building interactive web applications,
replacing the use of CGI scripts. Servlets are similar to applets in that they are runtime
extensions of applications. Instead of working in browsers, though, servlets run within Java
Web servers, configuring or tailoring the server.
How does the API support all these kinds of programs? It does so with packages of
software components that provides a wide range of functionality. Every full implementation of
the Java platform gives you the following features:
• The essentials: Objects, strings, threads, numbers, input and output, data
structures, system properties, date and time, and so on.

• Applets: The set of conventions used by applets.

• Networking: URLs, TCP (Transmission Control Protocol), UDP (User Data


gram Protocol) sockets, and IP (Internet Protocol) addresses.

• Internationalization: Help for writing programs that can be localized for users
worldwide. Programs can automatically adapt to specific locales and be
displayed in the appropriate language.

• Security: Both low level and high level, including electronic signatures, public
and private key management, access control, and certificates.

SSITS, RAYACHOTY Page 27


SYSTEM CODING & IMPLEMENTATION

• Software components: Known as Java Beans, can plug into existing


Component architecture

• Object serialization: Allows lightweight persistence and communication


via Remote Method Invocation

The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure depicts what is
included in the Java 2 SDK.

FIG 5.1.3: Java2 SDK

How Will Java Technology Change My Life?

We can’t promise you fame, fortune, or even a job if you learn the Java programming
language. Still, it is likely to make your programs better and requires less effort than
other languages. We believe that Java technology will help you do the following:

• Get started quickly: Although the Java programming language is a powerful


object-oriented language, it’s easy to learn, especially for programmers already
familiar with C or C++.

SSITS, RAYACHOTY Page 28


SYSTEM CODING & IMPLEMENTATION

• Write less code: Comparisons of program metrics (class counts, method counts,
and so on) suggest that a program written in the Java programming language can
be four times smaller than the same program in C++.

• Write better code: The Java programming language encourages good coding
practices, and its garbage collection helps you avoid memory leaks. Its object
orientation, its JavaBeans component architecture, and its wide-ranging, easily
extendible API let you reuse other people’s tested code and introduce fewer
bugs.

• Develop programs more quickly: Your development time may be as much as


twice as fast versus writing the same program in C++. Why? You write fewer
lines of code and it is a simpler programming language than C++.

• Avoid platform dependencies with 100% Pure Java: You can keep your
program portable by avoiding the use of libraries written in other languages.
The 100% Pure Java Product Certification Program has a repository of historical
process manuals, white papers, brochures, and similar materials online.

• Write once, run anywhere: Because 100% Pure Java programs are compiled
into machine-independent byte codes, they run consistently on any Java
platform.

• Distribute software more easily: You can upgrade applets easily from a central
server. Applets take advantage of the feature of allowing new classes to be
loaded “on the fly,” without recompiling the entire program.

SSITS, RAYACHOTY Page 29


SYSTEM CODING & IMPLEMENTATION

5.1.2 JDBC

In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database access
mechanism that provides a consistent interface to a variety of RDBMSs. This consistent
interface is achieved through the use of “plug-in” database connectivity modules, or drivers. If
a database vendor wishes to have JDBC support, he or she must provide the driver for each
platform that the database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. ODBC
has widespread support on a variety of platforms.

Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market much faster
than developing a completely new connectivity solution. JDBC was announced in March of
1996. It was released for a 90 days public review that ended June 8, 1996. Because of user
input, the final JDBC v1.0 specification was released soon after.

JDBC Goals

Few software packages are designed without goals in mind. JDBC is one that, because
of its many goals, drove the development of the API. These goals, in conjunction with early
reviewer feedback, have finalized the JDBC class library into a solid framework for building
database applications in Java.
The goals that were set for JDBC are important. They will give you some insight as to
why certain classes and functionalities behave the way they do. The design goals for JDBC are
as follows:

1. SQL Level API

The designers felt that their main goal was to define a SQL interface for Java. Although
not the lowest database interface level possible, it is at a low enough level for higher-level tools
and APIs to be created. Conversely, it is at a high enough level for application programmers

SSITS, RAYACHOTY Page 30


SYSTEM CODING & IMPLEMENTATION

use it confidently. Attaining this goal allows for future tool vendors to “generate” JDBC code
and to hide many of JDBC’s complexities from the end user.

2. SQL Conformance

SQL syntax varies as you move from database vendor to database vendor. In an effort
to support a wide variety of vendors, JDBC will allow any query statement to be passed through
it to the underlying database driver. This allows the connectivity module to handle non-standard
functionality in a manner that is suitable for its users.

3. JDBC must be implemental on top of common database interfaces

The JDBC SQL API must “sit” on top of other common SQL level APIs. This
goal allows JDBC to use existing ODBC level drivers by the use of a software interface.
This interface would translate JDBC calls to ODBC and vice versa.

4. Provide a Java interface that is consistent with the rest of the Java system

Because of Java’s acceptance in the user community thus far, the designers feel
that they should not stray from the current design of the core Java system.

5. Keep it simple

This goal probably appears in all software design goal listings. JDBC is no exception. Sun
felt that the design of JDBC should be very simple, allowing for only one method of completing
a task per mechanism. Allowing duplicate functionality only serves to confuse the users of the
API.

6. Use strong, static typing wherever possible

Strong typing allows for more error checking to be done at compile time; also, less error
appear at runtime.

SSITS, RAYACHOTY Page 31


SYSTEM CODING & IMPLEMENTATION

7. Keep the common cases simple

Because more often than not, the usual SQL calls used by the programmer are simple
SELECT’s, INSERT’s, DELETE’s and UPDATE’s, these queries should be simple to
perform with JDBC. However, more complex SQL statements should also be possible.

JDBC connectivity

The JDBC provides database-independent connectivity between the J2EE platform


and a wide range of tabular data sources. JDBC technology allows an Application
Component Provider to:

• Perform connection and authentication to a database server


• Manager transactions
• Move SQL statements to a database engine for preprocessing and execution
• Execute stored procedures
• Inspect and modify the results from Select statements.

5.1.3 JAVASCRIPT

JavaScript is a script-based programming language that was developed by Netscape


Communication Corporation. JavaScript was originally called Live Script and renamed as
JavaScript to indicate its relationship with Java. JavaScript supports the development of both
client and server components of Web-based applications.
On the client side, it can be used to write programs that are executed by a Web browser
within the context of a Web page. On the server side, it can be used to write Web server
programs that can process information submitted by a Web browser and then update the
browser’s display accordingly. Even though JavaScript supports both client and server Web
programming, we prefer JavaScript at Client-side programming since most of the browsers
supports it. JavaScript is almost as easy to learn as HTML, and JavaScript statements can be
included in HTML documents by enclosing the statements between a pair of scripting tags.

SSITS, RAYACHOTY Page 32


SYSTEM CODING & IMPLEMENTATION

<SCRIPT> ....</SCRIPT>.

<SCRIPT LANGUAGE = “JavaScript”>

JavaScript statements

</SCRIPT>

Here are a few things we can do with Java Script:

• Validate the contents of a form and make calculations.

• Add scrolling or changing messages to the Browser’s status line.

• Animate images or rotate images that change when we move the mouse over
them.

• Detect the browser in use and display different content for different browsers.

• Detect installed plug-ins and notify the user if a plug-in is required.

Advantages of JavaScript

• JavaScript can be used for Sever-side and Client-side scripting.

• It is more flexible than VBScript.

• JavaScript is the default scripting languages at Client-side since all the browsers
supports it.

5.1.4 Hyper Text Markup Language

Hypertext Markup Language (HTML), the languages of the World Wide Web
(WWW), allows users to produces Web pages that include text, graphics and pointer to
other Web pages (Hyperlinks).HTML is not a programming language but it is an

SSITS, RAYACHOTY Page 33


SYSTEM CODING & IMPLEMENTATION

application of ISO Standard 8879, SGML (Standard Generalized Markup Language),


but specialized to hypertext and adapted to the Web.

The idea behind Hypertext is that instead of reading text in rigid linear structure,
we can easily jump from one point to another point. We can navigate through the
information based on our interest and preference. A markup language is simply a series
of elements, each delimited with special characters that define how text or other items
enclosed within the elements should be displayed. Hyperlinks are underlined or
emphasized works that load to other documents or some portions of the same document.

HTML can be used to display any type of document on the host computer, which
can be geographically at a different location. It is a versatile language and can be used
on any platform or desktop.

HTML provides tags (special codes) to make the document look attractive.
HTML tags are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can
enhance the presentation of the document. Anything that is not a tag is part of the
document itself.

Basic HTML Tags:

<!-- --> Specifies comments

<A>………. </A> Creates hypertext links

<BIG>…… </BIG> Formats text in large font.

SSITS, RAYACHOTY Page 34


SYSTEM CODING & IMPLEMENTATION

<BODY>…</BODY> Contains all tags and text in the HTML document

<FORM>...</FORM> Encloses a fill-out form

<FRAME>...</FRAME> Defines a particular frame in a set of frames

<HEAD>...</HEAD>
Contains tags that specify information about a
document

<HTML>…</HTML> Contains all other HTML tags

<META>...</META> Provides meta-information about a document

<SCRIPT>…</SCRIPT> Contains client-side or server-side script

<TABLE>…</TABLE> Creates a table

SSITS, RAYACHOTY Page 35


SYSTEM CODING & IMPLEMENTATION

Advantages Of HTML
HTML document is small and hence easy to send over the net.

• HTML is platform independent.

• HTML tags are not case-sensitive.

5.1.5 Java Server Pages (JSP)

Java server Pages is a simple, yet powerful technology for creating and
maintaining dynamic-content web pages. Based on the Java programming language,
Java Server Pages offers proven portability, open standards, and a mature re-usable
component model. The Java Server Pages architecture enables the separation of content
generation from content presentation. This separation not eases maintenance headaches,
it also allows web team members to focus on their areas of expertise. Now, web page
designer can concentrate on layout, and web application designers on programming,
with minimal concern about impacting each other’s work.

Features of JSP

1. Portability

Java Server Pages files can be run on any web server or web-enabled application
server that provides support for them. Dubbed the JSP engine, this support involves
recognition, translation, and management of the Java Server Page lifecycle and its
interaction components.

2. Components
It was mentioned earlier that the Java Server Pages architecture can include
reusable Java components. The architecture also allows for the embedding of a scripting
language directly into the Java Server Pages file. The components current supported
include Java Beans, and Servlets.

SSITS, RAYACHOTY Page 36


SYSTEM CODING & IMPLEMENTATION

3. Processing

A Java Server Pages file is essentially an HTML document with JSP scripting or tags.
The Java Server Pages file has a JSP extension to the server as a Java Server Pages file.
Before the page is served, the Java Server Pages syntax is parsed and processed into a
Servlet on the server side. The Servlet that is generated outputs real content in straight
HTML for responding to the client.
Access Models:

A Java Server Pages file may be accessed in at least two different ways. A
client’s request comes directly into a Java Server Page. In this scenario, suppose the
page accesses reusable Java Bean components that perform particular well-defined
computations like accessing a database. The result of the Beans computations, called
result sets is stored within the Bean as properties. The page uses such Beans to generate
dynamic content and present it back to the client. In both of the above cases, the page
could also contain any valid Java code. Java Server Pages architecture encourages
separation of content from presentation.

Steps in the execution of a JSP Application:

1. The client sends a request to the web server for a JSP file by giving the name of
the JSP file within the form tag of a HTML page.

2. This request is transferred to the Java Webserver. At the server-side Java


Webserver receives the request and if it is a request for a jsp file server gives this
request to the JSP engine.

3. JSP engine is program which can understand the tags of the jsp and then it
converts those tags into a Servlet program and it is stored at the server side. This
Servlet is loaded in the memory and then it is executed and the result is given

SSITS, RAYACHOTY Page 37


SYSTEM CODING & IMPLEMENTATION

4. back to the Java Webserver and then it is transferred back to the result is
given back to the Java Webserver and then it is transferred back to the client.

5.2 SAMPLE CODE

A Sample jsp code to establish a connection with database and front end
<title></title>

<%@ page import="java.sql. *"%>

<%@ page import="java.util.*" %>

<%

Connection connection = null;


try {

Class.forName("com.mysql.jdbc.Driver");
connection=DriverManager.getConnection("jdbc: mysql://localhost:3306/
cc_saapd","root”, “root");
String sql="";

}
catch(Exception e)

System.out.println(e);

%>

SSITS, RAYACHOTY Page 38


SYSTEM TESTING
SYSTEM TESTING

6. SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of tests. Each test type addresses a specific testing requirement.

6.1. TYPES OF TESTS

Fig:6.1 Types of Testing

6.1.1 UNIT TESTING

Unit testing focus on each individual component to make sure that it functions
correctly as a unit and that program input produces appropriate outputs. Unit testing is
the technique of testing different units of application. Unit testing is structural testing
and is conducted by programmers with the knowledge of software component construction.
Unit testing is conducted on small components of the software. It
performs testing within the boundaries of component.

6.1.2 INTEGRATION TESTING


After all individual components are tested under unit testing; the components
must be integrated to become the whole software system. Test cases are planned to test the
integrated component. Integration testing is performed established on the design of the system.
Integration testing addresses the issues associated with the dual problems of verification and
program construction. After software has been integrated a set of high order tests are considered.

SSITS, RAYACHOTY Page 39


SYSTEM TESTING

The main objective in this testing process is to take unit tested modules and
builds a program structure that has been dictated by design. Software integration
testing is the incremental integration testing of two or more integrated software
components on a single platform to produce failures caused by interface defects
The task of the integration test is to check that components or software
applications, e.g., components in a software system or – one step up – software
applications at the company level – interact without error. Integration testing is
specifically aimed at exposing the problems that arise from the combination of
components
Two approaches are used for integration
1. Top-down integration
2. Bottom-up integration
1.Top-Down Integration
This method is an incremental approach to the construction of program
structure. Modules are integrated by moving downward through the control hierarchy,
beginning with the main program module. The module subordinates to the main
program module are incorporated into the structure in either a depth first or breadth
first manner. In this method, the software is tested from main module and individual
stubs are replaced when the test proceeds downwards
2.Bottom-up integration
This method begins the construction and testing with the modules at the lowest
level in the program structure. Since the modules are integrated from the bottom up,
processing required for modules subordinate to a given level is always available and
the need for stubs is eliminated. The bottom-up integration strategy may be
implemented with the following steps:
● The low-level modules are combined into clusters into clusters that perform
specific Software sub-function
● A driver (i.e.) the control program for testing is written to coordinate test case
input and output.
● The cluster is tested
● Drivers are removed and clusters are combined moving upward in the program
structure

SSITS, RAYACHOTY Page 40


SYSTEM TESTING

6.1.3 User Acceptance testing


. User Acceptance Testing is a critical phase of any project and requires
significant participation by the end user. It also ensures that the system meets the
functional requirements. User Acceptance of a system is the key factor for the success
of any system. The system under consideration is tested for user acceptance by
constantly keeping in touch with the prospective system users at the time of
developing and making changes wherever required. The system developed provides a friendly
user interface that can easily be understood even by a person who is new to
the system
6.1.4 OUTPUT TESTING
After performing the validation testing, the next step is output testing of the
proposed system, since no system could be useful if it does not produce the required
output in the specified format. Asking the users about the format required by them
tests the outputs generated or displayed by the system under consideration. Hence the
output format is considered in 2 ways – one is on screen and another in printed format.

6.1.5 VALIDATION TESTING

Validation checks are performed on the following fields.

Text Field:

The text field can contain only the number of characters lesser than or equal to its size.
The text fields are alphanumeric in some tables and alphabetic in other tables. Incorrect entry
always flashes and error message.

Numeric Field:
The numeric field can contain only numbers from 0 to 9. An entry of any character
flashes an error message. The individual modules are checked for accuracy and what it has to
perform. Each module is subjected to test run along with sample data. The individually tested
modules are integrated into a single system. Testing involves executing the real data
information is used in the program the existence of any program defect is inferred from the
output. The testing should be planned so that all the requirements are individually tested.
A successful test is one that gives out the defects for the inappropriate data and
produces and output revealing the errors in the system.

SSITS, RAYACHOTY Page 41


SYSTEM TESTING

6.2 SYSTEM TESTING APPROACHES

System testing performs on the requirements of the system. The test cases
are planned to make sure that the system chances its requirements or not. System
testing is implemented based on the process:
1. White box testing
2. Black box testing

6.2.1 WHITE BOX TESTING

It is also named as Open or Glass box testing. In this, by finding the specified
program that a software product has been planned or developed to perform or execute
the test can be applied and accompanied for the demonstrates each program or function in a
fully operated at the same time finding for errors in each program. White Box Testing is a
testing in which in which the software tester has knowledge of the inner workings, structure and
language of the software, or at least its purpose. It is purpose. It is used to test areas that cannot
be reached from a black box level

6.2.2 BLACK BOX TESTING

It is tested by understanding and knowing the various program internal


operation of an application or product or program, it can be conducted to assurance
that all gears mesh of the internal activities of the product or program or application
can be tested. The process provides an internal operation to check the performance and
specifications of all the internal mechanism which have been possibly exercised. Black Box
Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds
of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document. It is a testing
in which the software under test is treated, as a black box, you cannot “see” into it. The
test provides inputs and responds to outputs without considering how the software
works.

6.3 FUNCTIONAL TEST

Functional tests provide systematic demonstrations that functions tested are


available as specified by the business and technical requirements, system
documentation, and user manuals
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected. .
Output : identified classes of application outputs must be exercised.
Systems/Procedures : interfacing systems or procedures must be invoked

SSITS, RAYACHOTY Page 42


SYSTEM TESTING

6.4 PREPARATION OF TEST DATA

Taking various kinds of test data does the above testing. Preparation of test data
plays a vital role in the system testing. After preparing the test data the system under
study is tested using that test data. While testing the system by using test data errors are
again uncovered and corrected by using above testing steps and corrections are also
noted for future use.

6.4.1 USING LIVE TEST DATA

Live test data are those that are actually extracted from organization files. After
a system is partially constructed, programmers or analysts often ask users to key in a set
of data from their normal activities. Then, the systems person uses this data as a way to
partially test the system. In other instances, programmers or analysts extract a set of live
data from the files and have them entered themselves. It is difficult to obtain live data in
sufficient amounts to conduct extensive testing. And, although it is realistic data that
will show how the system will perform for the typical processing requirement, assuming
that the live data entered are in fact typical, such data generally will not test all
combinations or formats that can enter the system. This bias toward typical values then
does not provide a true system test and in fact ignores the cases most likely to cause
system failure.

6.4.2 USING ARTFICIAL TEST DATA

Artificial test data are created solely for test purposes, since they can be
generated to test all combinations of formats and values. In other words, the artificial
data, which can quickly be prepared by a data generating utility program in the
information systems department, make possible the testing of all login and control paths
through the program. The most effective test programs use artificial test data generated
by persons other than those who wrote the programs. Often, an independent team of
testers formulates a testing plan, using the systems specifications. The package “Virtual
Private Network” has satisfied all the requirements specified as per software
requirement specification and was accepted.

SSITS, RAYACHOTY Page 43


SYSTEM TESTING

6.5 TEST CASES

A Test case is a set of input data and estimated results that movements a
component with the purpose of producing failure and identifying faults. Test case is a
categorical set of commands considered to discover a specific class of fault in a software
system, by bringing about a failure. A Test case can offer increase to several tests. Test
cases can be classified in to two types. First one is Positive cases and second one is
negative cases. In positive cases are conducted by the developer intention is to get the
output. In negative cases are conducted by the developer intention is to do not get the
output.

Positive Test Cases:

Password Actual value Expected value Result


S.NO User name

1 Valid username Valid Login Login True


password successful successfully

2 Existing name Valid Login Login True


password successful successfully

Table 6.5.1: Positive Test Cases

SSITS, RAYACHOTY Page 44


SYSTEM TESTING

Negative Test Cases:

Expected
S. No User name Password Actual value Result
value

1 Valid user name Invalid The Check your False


password username and username and

password did password.


not match

2 Invalid user name Valid Data Transfer Check your False


password The username and

username and password.


password did
not match

3 Invalid username Invalid The user Check your False


password name and user name and

password did password


not match

Table 6.5.2: Negative Test Cases

6.6 USER TRAINING


Whenever a new system is developed, user training is required to educate them about
the working of the system so that it can be put to efficient use by those for whom the system has
been primarily designed. For this purpose, the normal working of the project was demonstrated
to the prospective users.

SSITS, RAYACHOTY Page 45


Its working is easily understandable and since the expected users are people who have good
knowledge of computers, the use of this system is very easy.

6.7 MAINTENANCE

This covers a wide range of activities including correcting code and design errors.
To reduce the need for maintenance in the long run, we have more accurately defined the
user’s requirements during the process of system development. Depending on the
requirements, this system has been developed to satisfy the needs to the largest possible
extent. With development in technology, it may be possible to add many more features
based on the requirements in future. The coding and designing are simple and easy to
understand which will make maintenance easier.

SSITS, RAYACHOTY Page 46


RESULTS
7.RESULTS

Fig 7.1: Home Page

It is the home page of this project. This page contains the Home, News publisher
server and user.

SSITS, RAYACHOTY Page 47


Fig 7.2: User Registration Page

This is the Registration page. The new user can be registered by entering all
the details.

SSITS, RAYACHOTY Page 48


Fig 7.3: User Login Page

This is the User Login page. The new user can login by entering all
the details.

SSITS, RAYACHOTY Page 49


Fig 7.4: Server Registration Page

This is the server registration page in which the user registers himself to add the
news in the server space.

SSITS, RAYACHOTY Page 50


Fig 7.5: Server Login Page

This is the Server Login page where a user can login in the server page.

SSITS, RAYACHOTY Page 51


Fig 7.6: Authorization Page

This is the Authorization page in which the registered users are authorized to get
access.

SSITS, RAYACHOTY Page 52


Fig 7.7: Server Menu Page

This is the Server menu page in which the user adds the news and can even add new
filter along with fake filters

SSITS, RAYACHOTY Page 53


Fig 7.8: Adding News Category

This is the page in which the news is added in the form of category.

SSITS, RAYACHOTY Page 54


Fig 7.9: Adding News Details

This is the page in which the news is added by the user by filling all the necessary
details related to news as shown above in the figure.

SSITS, RAYACHOTY Page 55


Fig 7.10: Adding Fake Filter

This is the page in which we can add the fake filters to categorize the news
accordingly as fake.

SSITS, RAYACHOTY Page 56


Fig 7.11: Viewing Fake News

This is the Authorization page in which the registered users are authorized to get
access.

SSITS, RAYACHOTY Page 57


Fig 7.12: News in the form of Chart

This is the page in which user can see the news in the form of graphical
representation such as chart.

SSITS, RAYACHOTY Page 58


CONCLUSION
&
FUTURE
ENHANCEMENT
CONCLUSION & FUTURE ENHANCEMENT

8. CONCLUSION & FUTURE ENHANCEMENT

With the increasing popularity of social media, more and more people consume news
from social media instead of traditional news media. However, social media has also been
used to spread fake news, which has strong negative impacts on individual users and
broader society. In this article, we explored the fake news problem by reviewing existing
literature in two phases: characterization and detection. In the characterization phase, we
introduced the basic concepts and principles of fake news in both traditional media and
social media. In the detection phase, we reviewed existing fake news detection approaches
from a data mining perspective, including feature extraction and model construction. We
also further discussed the datasets, evaluation metrics, and promising future directions in
fake news detection research and expand the field to other applications

SSITS, RAYACHOTY Page 59


BIBLIOGRAPHY
9.BIBLIOGRAPHY
[1] K. Panetta, Gartner Top Strategic Predictions for 2018 and
Beyond. Gartner, Stamford, CA, USA, 2017.
[2] . J Bayer, N. Bitiukova , P. Bard, j. Szak acs, A.Alemanno, and
E Uszkiewicz, Disinformation and Propaganda—Impact on the
Functioning of the Rule of Law in the EU and its Member State.
HEC Paris Research Paper LAW-2019-1341, 2019.
[3] C. Wardle and H. Derakhshan, “Information Disorder: Towards an
interdisciplinary framework for research and policy making,” Council
of Europe Policy Report DGI(2017)09, 2017.
[4] Z. Shae and J. Tsai, “AI block chain platform for trusting news,” in
Proc. IEEE 39th Int. Conf. Distrib.Comput. Syst., Dallas, TX, USA, 2019,
Pp 1610-1619.
[5] S. Vosoughi, D. Roy, and S. Aral, “The spread of true and false news
online,” Science, vol. 359, no. 6380,pp. 1146–1151, 2018.
[6] H. Kim et al., “Deep video portraits,” ACM Trans. Graph., vol. 37, no.
4, p. 163, 2018.
[7] A. Shahaab, B. Lidgey, C. Hewage, and I. Khan, “Applicability and
appropriateness of distributed ledgers consensus protocols in public and
private sectors: A systematic review,” IEEE Access, vol. 7,pp.
43622-43636, 2019.
[8] A. Qayyum, J. Qadir, M. U. Janjua, and F. Sher, “Using blockchain to
rein in the new post-truth world and check the spread of fake news
, “IT Professional, vol. 21,no. 4, pp. 16–24, 1 Jul./Aug. 2019.
[9] X. Zhang and A. A. Ghorbani, “An overview of online fake news:
Characterization, detection, and discussion,” Inf. Process. Manage.,
vol. 57, no. 2,2020, Art. no. 102025

SSITS, RAYACHOTY Page 60


BIBLIOGRAPHY

[10] Bit Press Official Webpage, Feb. 2020. [Online].Available


https://bitpress.news/

[11] Solid Official Webpage, Feb. 2020. [Online]. Available:


https://solid.mit.edu/

[12] Content Blockchain Project Official Webpage Feb. 2020. [Online],


. Available: https://irights-lab.de/en/launch-of-the-content-
blockchain-project/

[13] S. Wang, W. Ding, J. Li, Y. Yuan, L. Ouyang, and F. Wang,


“Decentralized autonomous organizations: Concept, model,
and applications,” IEEE Trans.Comput. Soc. Syst., vol.6, no.5,
pp. 870–878,Oct. 2019.

[14] H. R. Hasan and K. Salah, “Combating deep fake videos using


blockchain and smart contracts,” IEEE Access, vol. 7, pp. 41596-
41606, 2019.

[15] First Results of the EU Code of Practice Against Disinformation. Feb


2020. [Online]. Available: https://ec.europa.eu/digital-single-market
/en/news/firstresults-eu-code-practice-against-disinformation.

[16] G. Song, S. Kim, H. Hwang, and K. Lee, “Blockchain based


notarization for social media,” in Proc. IEEE Int. Conf. Consumer
Electron., Las Vegas, NV, USA, 2019, pp. 1–2.

[17] S. Huckle and M. White, “Fake news: A technological approach


to proving the origins of content, using block chains,” Big Data,
vol. 5, no. 4, pp. 356–371, 2017.

[18] W. Shang, M. Liu, W. Lin, and M. Jia, “Tracing the source of news
based on blockchain,” in Proc. IEEE/ACIS 17th Int. Conf. Computer.
Inf. Sci., Singapore,2018, pp. 377–381.

SSITS, RAYACHOTY Page 61


BIBLIOGRAPHY
.

[19] T. M. Fernandez-Caram es and P. Fraga-Lamas, “Towards


post-quantum blockchain: A review on blockchain cryptography
resistant to quantum computing attacks,” IEEE Access vol. 8,
pp. 21091–21116, Jan. 2020.

[20] “Blockchain and the GDPR,” Thematic Report, European union


Blockchain Observatory and Forum,2018.

SSITS, RAYACHOTY Page 62


BATCH MEMBERS

N NAME: P. GULFAM KHANAM

E -MA E- MAIL ID: [email protected]

Phone: 9704522817

NAME: S.AFNAAN BANU

E -MA E- MAIL ID: [email protected]

Phone: 9515786429

Name: M.HEBA KHANAM


E-MAIL ID: [email protected]
Phone: 7981656058
PROJECT GUIDE

NAME: Ms.S.SUMIYA SULTHANA

PROFESSION: M.TECH, ASSISTANT PROFESSOR

E- MAIL ID: [email protected]

PHONE: 9618607006

You might also like