Project Report On Blogging Website
Project Report On Blogging Website
Project Report On Blogging Website
1.1 OVERVIEW
Blogging has become such a mania that a new blog is being created every second of every
minute of every hour of every day. A blog is your best bet for a voice among the online crowd.
Blogs were usually the work of a single individual occasionally of a small group, and often
covered a single subject. More recently, "multi-author blogs" (MABs) have developed, with
posts written by large numbers of authors and professionally edited. MABs from newspapers,
other media outlets, universities, think tanks, advocacy groups, and similar institutions account
for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems
helps integrate MABs and single-author blogs into societal new streams. Blog can also be used
as a verb, meaning to maintain or add content to a blog.A novel is a long, fictional narrative
which describes intimate human experiences.WEBLOG is a combination of both Blog as well as
Novels. Blog contain the Information of various things related to Technology, Education, News,
International, Business, Sports,Entertainment and ongoing college activities. The main aim of
this project is to provide data to students in only one site. Students can gather the information
from one site as wellas give their feedback and create their own blog. Students can post their
views and thoughtand analyze themselves. Besides all such core functionalities, the application
also includes features like FAQ, request, feedback etc. so as to provide a satisfactory user
experience.
1.1 DESCRIPTION
In recent past time Blogs are store in the paper files and difficult to search or modify any
information, for expanding the Blogs infrastructure, Awareness of environmental issues or any
other issues related to education, health, digital technology, and search for greater safety give to
information to all persons in all age groups and a new role within the education system, I choose
this project. As a result of these project initiatives phenomenal growth has taken place in all the
activities of blogs and any user can share its information related to any topic to all users.
Existing system is manual system. It requires a lot of file work to be done. It is a time consuming
system. All customer information is maintained manually. Any searching requires so much
effort manually. There is no way of spreading the information so fast and in cheapest manner. In
previous system all information does not get in one place. Here people can write whatever they
want to write.
a) Data redundancy and formatting: The various files are likely to have different formats and
therefore lead to redundancy and inconsistency.
b) Maintaining registers is costly: Traditionally documents have been stored in batches and
they field in file cabinets and boxes. A numerical system is they assigned. Specifically a
consumer number assigned to organize the files.
c) Error prone: Existing systems are error prone, since manual work is required. More time is
consumed and errors may propagate due to human mistakes.
1
d) Low security feature: Due to maintenance's of records manually and shared and could view
easily by anyone. Also these could be possible loss of data and confidential information due to
some disaster in the form of fire, theft etc.
This is a very simple design and implement. It has got following features:
Data can be saved safely
No other person cannot view other person’s detail
Greater efficiency
User friendliness
Minimum time required
Free of cost
1.5 APPLICATION
TechBlog enables the users to create innovative and attractive information with photos in just
few simple steps. The user just needs to upload some images of his choice and can also upload
the information or can select from the given category list. This website will provide a
personalized environment that would contain the data in motion with images.
2
2. SOFTWARE DEVELOPMENT LIFE CYCLE
Software Development Life Cycle (SDLC) is a process used by the software industry to design,
develop and test high quality software’s. The SDLC aims to produce a high-quality software that
meets or exceeds customer expectations, reaches completion within times and cost estimates.
SDLC is a process followed for a software project, within a software organization. It consists of
a detailed plan describing how to develop, maintain, replace and alter or enhance specific
software. The life cycle defines a methodology for improving the quality of software and the
overall development process.
The following figure is a graphical representation of the various stages of a typical SDLC.
3
A typical Software Development Life Cycle consists of the following stages −
Planning for the quality assurance requirements and identification of the risks associated with
the project is also done in the planning stage. The outcome of the technical feasibility study is to
define the various technical approaches that can be followed to implement the project
successfully with minimum risks.
This DDS is reviewed by all the important stakeholders and based on various parameters as risk
assessment, product robustness, design modularity, budget and time constraints, the best design
approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along with its
communication and data flow representation with the external and third party modules (if any).
The internal design of all the modules of the proposed architecture should be clearly defined
with the minutest of the details in DDS.
Developers must follow the coding guidelines defined by their organization and programming
tools like compilers, interpreters, debuggers, etc. are used to generate the code. Different high
4
level programming languages such as C, C++, Pascal, Java and PHP are used for coding. The
programming language is chosen with respect to the type of software being developed.
Then based on the feedback, the product may be released as it is or with suggested
enhancements in the targeting market segment. After the product is released in the market, its
maintenance is done for the existing customer base.
SDLC Models
There are various software development life cycle models defined and designed which are
followed during the software development process. These models are also referred as Software
Development Process Models". Each process model follows a Series of steps unique to its type
to ensure success in the process of software development.
Following are the most important and popular SDLC models followed in the industry −
Waterfall Model
Iterative Model
Spiral Model
V-Model
Big Bang Model
Other related methodologies are Agile Model, RAD Model, Rapid Application Development
and Prototyping Models.
5
2 METHODOLOGY
The term methodology means the technique and procedure adopted by conducting a research
study. It outlines how data will be collected and the tools for collecting data, system
methodology, the proposed system input and output, users and systems development tools.
System development methodology is a technique that is used to show how the proposed system
will be developed. In this case, the methodology used will be a SDLC.
It is comprised of the stages that the developer will use when developing the system. It is a
sequential model hence, the name waterfall. The developer has to finish with one stage before
going to the next one. It comprises of the feasibility study, analysis phase, design phase, coding
phase, testing phase, implementation phase and finally the maintenance phase. It is a simple
model and easy to use and understand. With waterfall development based methodologies, the
analysts and users proceed sequentially from one phase to the next. The deliverables from each
phase are voluminous and are presented to the project sponsor for approval as the project moves
from phase to phase. Once the phase is approved by the sponsor it ends and the next phase
begins.
Here, I will carry out a study to gain an understanding of the customers (tenants) current system
and problems experienced in this system through interviews, observations, and participations. I
will use the obtained data to determine the viability of the system being proposed in terms of
technical, economic and social feasibility.
At this stage, I will gather information about what the customer needs and define the problems
the system is expected to solve. I will also include customers‟ business context, products
functions and its compatibility. I will gather requirement such as software like the programming
language to use, database model and hardware needed such as laptop, printers etc.
6
2.1.1.3 Design
At this stage, I will make an overall design of the system architecture and physical design which
includes User Interface and Database design. It is at this stage that I will identify any faults
before moving onto the next stage. The output of this stage is the design specification which is
used in the next stage of implementation.
2.1.1.4 Coding/Implementation
At this stage, I will begin coding as per the design specification(s). The output of this step is one
or more product components built according to a pre-defined coding standard and debugged,
tested and integrated to satisfy the system architecture requirement.
7
3.1.15 Testing
At this stage, I will ensure both individual and integrated whole are methodically verified to
ensure they are error free and satisfy customer requirement. I will involve both unit testing of
individual code module, system testing of the integrated product and acceptance testing
conducted by or on behalf of customer. I will ensure bugs found are corrected before moving to
the next stage. I will also prepare, review and publish product documentation at this stage.
3.1.1.6 Installation
It is done once the product has been tested and certified as fit for use. The system is prepared for
use at customer site.
3.1.1.7 Maintenance
This stage occurs after installation. It involves modifications on the system to improve
performance. Such changes are user initiated or as a result of bug being discovered which were
initially not known. These modifications are recorded for documentation and system update.
8
4. SYSTEM MODULE:-
The modules involved in this project are
1. User
2. Admin
In this module:
User can signup.
User can login
User can upload multiple images
User can choose images from database
User can add information
User can add comments
User can select any categories
Update Account information like Name, Address, Email ID and their detail.
9
Log in Information
Comment Information
4.5Output Requirements of the System :-
• Blog Information
• Novel Information
• Assigned information of users
• Categories information
• FAQ
• Request
4.6 Maintenance: -
10
5. SYSTEM ANALYSIS:-
]Before developing this project, we first analyse existing system of study. In existing
system all greetings are given manually. As we know, now a day computer is used in every
field. We can remove the manual work by using automatic system. We see it first that if it is
feasible or not whether technically, economically, operationally. We test that whether it properly
works or not. Its technical requirements are feasible or not. We analysed the system properly and
then start designing it. After designing, we implement this project that whether this project works
properly or not. After implementing the project, we check that whether there is any problem for
the user while using this project. Prior to stating whether the system we have to develop is
feasible or not we believe that we should emphasize on what is implied by the word “Analysis”.
Analysis is the measure of how beneficial or practical the development of the system will be to
the organization. It is a preliminary survey for the systems investigation. It aims to provide
information to facilitate a later in-depth investigation
Types
There are various measures of analysis that helps to decide whether a particular project is
feasible or not.
These measures include –
Operational Analysis
11
Technical Analysis
Economic Analysis Each of these types will be explained in detail
A proposed system is beneficial only if it can be turned into an information system that will meet
the operational requirements of an organization. A system often fails if it does not fit within
existing operations and if users resist the change. Important issues a systems developer must look
into are:
Will the new system be used if implemented in an organization?
Are there any major barriers to implementation or is proposed system accepted without
destructive resistance? The whole purpose of computerizing it is to handle the work much more
accurately and efficiently with less time consumption. There will be additional work to be
completed, because now the website will have to maintain database of both their admins as well
as their Customers. Compared to the semicomputerized system the chances of avoiding errors in
a computerized system is much higher because the user need not stress himself unnecessarily
resulting in recklessness. Unlike the semi-computerized system there would be backup data for
all the information concerning the daily transactions occurred. Another important fact to be
regarded is the security control, which is handled by the system. Since data regarding each
Customer is confidential, security is a key issue. Information falling into the wrong hands could
jeopardize the entire website organisation. Unlike in semi-computerized systems, the proposed
system offers adequate control to protect against fraud and embezzlement and guarantees the
accuracy and Security of data and information. This is handled by the system providing
individuals with separate login names and passwords. The new system is user-friendlier, which
enables the end-user to complete his/her work efficiently and accurately with interest. After
taking the above fact into consideration we can state the operating of the proposed system is
feasible.
In making recommendations a study of the economics of the proposed system should be made.
Even though finding out the costs of the proposed project is difficult we assume and estimate the
costs and benefits as follows. According to the computerized system we propose, the costs can
be broken down in two categories.
1. Costs associated with the development of the system.
2. Costs associated with operating the system.
Phase is also the part of the project where you identify the overall direction that the project will
take through the creation is a vital aspect when it comes to developing a system. The system
should ensure the facility of preventing unauthorized personnel from accessing the information
12
and the data within the system. The system should provide total protection for each user’s
information so that the integrity of data is sustained and also prevent hackers from hacking the
system. The proposed system ensures the security and the integrity of data. This is done by
providing a password login system for each authorized users. And for example the System
Administrator has access to all kinds of information. By providing this facility information is
properly managed and information is protected. For example the system administrator’s day to
day tasks are lessened and easier because he doesn’t have to have a constant eye on the system
and worry about hackers hacking the system. The Analysis Phase is where the project lifecycle
begins. The Analysis Phase is where you break down the deliverables in the high-level Project
Charter into the more detailed business requirements. The Analysis of the project .
Gathering requirements is the main attraction of the Analysis Phase. The process of gathering
requirements is usually more than simply asking the users what they need and writing their
answers down. Depending on the complexity of the application, the process for gathering
requirements has a clearly defined process of its own. This process consists of a group of
repeatable processes that utilize certain techniques to capture, document, communicate, and
manage requirements. This formal process, which will be developed in .
1. Elicitation – I ask questions, you talk, I listen
2. Validation – I analyze, I ask follow-up questions
3. Specification – I document, I ask follow-up questions
4. Verification – We all agree
Although gathering requirements is the main focus during the Analysis Phase, there are other
important activities during this phase as well. One is to create a Requirement Management Plan
to define how the requirements will be documented, communicated, tracked and changed
throughout the rest of the project lifecycle. This plan will specifically address establishing a
baseline, a change control process, and a way to track the requirements through the rest of the
lifecycle. Another important activity is to set the overall direction for work that does not take
place until later. This is accomplished through a series of direction-setting strategy documents.
For instance, once you have your requirements, you can start to set the overall direction for
training in a Training Strategy document. The strategies are at a high-level and are later defined
at a lower level before they are finally implemented toward the end of the project.
13
5. TOOLS AND TECHNIQUES:-
Platform:
a. Front End Technology: HTML, CSS, JAVASCRIPT, JQUERY, BOOTSTRAP, AJAX.
b. Back End Technology: JAVA, Concepts of JSP and SERVLETS
c. Database: MySQL
HTML Tags:
5.1.2 CSS:-
CSS Syntax:
A CSS rule has two main parts: a selector, and one or more declarations:
14
The selector is normally the HTML element you want to style.
Each declaration consists of a property and a value.
The property is the style attribute you want to change. Each property has a value.
5.1.3 JAVASCRIPT:-
JavaScript is a prototype-based scripting language that is dynamic, weakly typed and has first-
class functions. It is a multi-paradigm language, supporting object-oriented, imperative, and
functional programming styles. JavaScript was formalized in the ECMA Script language
standard and is primarily used in the form of client-side JavaScript, implemented as part of a
Web browser in order to provide enhanced user interfaces and dynamic websites. This enables
programmatic access to computational objects within a host environment. JavaScript's use in
applications outside Web pages — for example in PDF documents, site-specific browsers, and
desktop widgets — is also significant. Newer and faster JavaScript VMs and frameworks built
upon them (notably Node.js) have also increased the popularity of JavaScript for server-side web
applications. JavaScript uses syntax influenced by that of C. JavaScript copies many names and
naming conventions from Java, but the two languages are otherwise unrelated and have very
different semantics. The key design principles within JavaScript are taken from the self and
Scheme programming languages.
JavaScript was basically used for client-side validation.
JavaScript is compatible with all versions of Microsoft Internet
Explorer and Netscape Navigator.
5.1.4 JQUERY:-
jQuery is an open source JavaScript library that simplifies the interactions between an
HTML/CSS document, or more precisely the Document Object Model (DOM), and JavaScript.
Elaborating the terms, jQuery simplifies HTML document traversing and manipulation, browser
event handling, DOM animations, Ajax interactions, and cross-browser JavaScript development.
It is incredibly popular, which is to say it has a large community of users and a healthy
amount of contributors who participate as developers and evangelists.
It normalizes the differences between web browsers so that you don’t have to.
It is intentionally a lightweight footprint with a simple yet clever plugin architecture.
Its repository of plugins is vast and has seen steady growth since jQuery’s release.
15
Its API is fully documented, including inline code examples, which in the world of
JavaScript libraries is a luxury. Heck, any documentation at all was a luxury for years.
It is friendly, which is to say it provides helpful ways to avoid conflicts with other
JavaScript libraries.
jQuery is widely famous with its philosophy of “Write less, do more.” This philosophy can be
further elaborated as three concepts:
Finding some elements (via CSS selectors) and doing something with them (via jQuery
methods) i.e. locate a set of elements in the DOM, and then do something with that set
of elements.
Chaining multiple jQuery methods on a set of elements
Using the jQuery wrapper and implicit iteration
5.1.5 BOOTSTRAP:-
Bootstrap is a web framework that focuses on simplifying the development of informative web
pages (as opposed to web apps). The primary purpose of adding it to a web project is to apply
Bootstrap's choices of color, size, font and layout to that project. As such, the primary factor is
whether the developers in charge find those choices to their liking. Once added to a project,
Bootstrap provides basic style definitions for all HTML elements. The result is a uniform
appearance for prose, tables and form elements across web browsers. In addition, developers can
take advantage of CSS classes defined in Bootstrap to further customize the appearance of their
contents. For example, Bootstrap has provisioned for light- and dark-colored tables, page
headings, more prominent pull quotes, and text with a highlight.
Bootstrap also comes with several JavaScript components in the form of jQuery plugins. They
provide additional user interface elements such as dialog boxes, tooltips, and carousels. Each
Bootstrap component consists of an HTML structure, CSS declarations, and in some cases
accompanying JavaScript code. They also extend the functionality of some existing interface
elements, including for example an auto-complete function for input fields.
Bootstrap is a free front-end framework for faster and easier web development
Bootstrap includes HTML and CSS based design templates for typography, forms,
buttons, tables, navigation, modals, image carousels and many other, as well as optional
JavaScript plugins
Bootstrap also gives you the ability to easily create responsive designs
5.1.6 AJAX:-
Asynchronous JavaScript and XML. Ajax is a technique for creating fast and dynamic web
pages. Ajax allows web pages to be updated asynchronously by exchanging small amounts of
data with server behind the scenes. This means that it is possible to update parts of web page,
without reloading the whole page. Scripting Languages:-
1. HTML, XML, XSL, XHTML
2. DHTML – CSS, JavaScript, DOM
3. AJAX
16
4. Bootstrap
5. AngularJS
5.2.1 JAVA:-
Java is a popular programming language, created in 1995.
It is owned by Oracle, and more than 3 billion devices run Java.
It is used for:
Mobile applications (specially Android apps)
Desktop applications
Web applications
Web servers and application servers
Games
Database connection
And much, much more!
Java programming language was originally developed by Sun Microsystems which was initiated
by James Gosling and released in 1995 as core component of Sun Microsystems' Java platform
(Java 1.0 [J2SE]).
The latest release of the Java Standard Edition is Java SE 8. With the advancement of Java and
its widespread popularity, multiple configurations were built to suit various types of platforms.
For example: J2EE for Enterprise Applications, J2ME for Mobile Applications.
The new J2 versions were renamed as Java SE, Java EE, and Java ME respectively. Java is
guaranteed to be Write Once, Run Anywhere.
Java is −
Object Oriented − In Java, everything is an Object. Java can be easily extended since it
is based on the Object model.
Platform Independent − Unlike many other programming languages including C and
C++, when Java is compiled, it is not compiled into platform specific machine, rather
into platform independent byte code. This byte code is distributed over the web and
interpreted by the Virtual Machine (JVM) on whichever platform it is being run on.
Simple − Java is designed to be easy to learn. If you understand the basic concept of
OOP Java, it would be easy to master.
Secure − With Java's secure feature it enables to develop virus-free, tamper-free
systems. Authentication techniques are based on public-key encryption.
Architecture-neutral − Java compiler generates an architecture-neutral object file
format, which makes the compiled code executable on many processors, with the
presence of Java runtime system.
Portable − Being architecture-neutral and having no implementation dependent aspects
of the specification makes Java portable. Compiler in Java is written in ANSI C with a
clean portability boundary, which is a POSIX subset.
17
Robust − Java makes an effort to eliminate error prone situations by emphasizing mainly
on compile time error checking and runtime checking.
Multithreaded − With Java's multithreaded feature it is possible to write programs that
can perform many tasks simultaneously. This design feature allows the developers to
construct interactive applications that can run smoothly.
Interpreted − Java byte code is translated on the fly to native machine instructions and
is not stored anywhere. The development process is more rapid and analytical since the
linking is an incremental and light-weight process.
High Performance − With the use of Just-In-Time compilers, Java enables high
performance.
Distributed − Java is designed for the distributed environment of the internet.
Dynamic − Java is considered to be more dynamic than C or C++ since it is designed to
adapt to an evolving environment. Java programs can carry extensive amount of run-
time information that can be used to verify and resolve accesses to objects on run-time.
5.3 DATABASE:-
5.31 MYSQL:-
The data in MySQL is stored in database objects called tables. A table is a collection of related
data entries and it consists of columns and rows. Databases are useful when storing information
categorically. A company may have a database with the following tables: "Employees",
"Products", "Customers" and "Orders".
18
6. DESIGN CONSIDERATIONS:-
JDK
◦ Java SE Development Kit (JDK) 7
Web Server
◦ Apache 2.4.9x
Web Scripting Language
◦ PHP 5.5x
Database
◦ MySQL 5.6x
Environment
◦ NetBeans IDE 8.0.2x
Supported Operating Systems
◦ Windows 2000/XP/2003/Vista / Windows 7/ Windows 8/ XP64 / Vista64 /
Windows 7 64 /
6.2Hardware Requirements:-
19
8. SYSTEM DESIGN
8.1 DATABASE:-
Data base is used to store the relevant information of the individuals. A database is a collection
of rows and columns in which rows indicates the tuple and column indicates the domain of table.
Database design is the process of producing a detailed data model of a database. This logical data
model contains all the needed logical and physical design choices and physical storage
parameters. Need to generate a design in a data definition language, which can then be used to
create a database. A fully attributed data model contains detailed attributes for each entity. The
term database design can be used to describe many different parts of the design of an overall
database system. Principally, and most correctly, it can be thought of the logical design of the
relation of the base data structures used to store the data. In the relational model these are the
classes and named relationships. However, the term database design could also be used to apply
to overall process of designing, not just the base data structure, but also the forms and queries
used as part of the overall database application within the database management system
(DBMS).
20
Fig 5. Database table of categories
21
Fig 7. Database table of posts
22
9 SOFTWARE TESTING
Is it possible to invoke each menu function using logical assumptions that if all parts of the
system are correct, the goal will be successfully achieved? In adequate testing or non-testing will
leads to errors that may appear few months later. That’s why it is very important to always test
the new software. This create two problems. The purpose of the system testing is to consider all
the likely variations to which it will be suggested and push the systems to limits. The testing
process focuses on the logical intervals of the software ensuring that all statements have been
tested and on functional interval is conducting tests to uncover errors and ensure that defined
input will produce actual results that agree with the required results. Program level testing,
modules level testing integrated and carried out. There are two major type of testing they are
1. White Box Testing.
2. Black Box Testing.
White box sometimes called “Glass box testing” is a test case design that uses the control
structure of the procedural design to drive test case. Using white box testing methods, the
following tests were made on the system
a) All independent paths within a module have been exercised once. In our system, ensuring that
case was selected and executed checked all case structures. The bugs that were prevailing in
some part of the code where fixed
b) All logical decisions were checked for the truth and falsity of the values.
Black box testing focuses on the functional requirements of the software. This is black box
testing enables the software engineering to derive a set of input conditions that will fully exercise
all functional requirements for a program. Black box testing is not an alternative to white box
testing rather it is complementary approach that is likely to uncover a different class of errors
that white box methods like..
1) Interface errors
2) Performance in data structure
3) Performance errors
4) Initializing and termination errors.
23
Figure 9 Black&White Box Testing
24
10 REQUIRED OUTPUT WITH SCREENSHOTS:-
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55