0% found this document useful (0 votes)
43 views57 pages

Final Doc Strees Detection

The document discusses detecting psychological stress from social media data. It proposes using attributes from tweets' content and users' social interactions, along with a hybrid model combining a factor graph and CNN, to improve stress detection performance. Analyzing social interaction data revealed stressed users have less connected social structures than non-stressed users.

Uploaded by

Dhinesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views57 pages

Final Doc Strees Detection

The document discusses detecting psychological stress from social media data. It proposes using attributes from tweets' content and users' social interactions, along with a hybrid model combining a factor graph and CNN, to improve stress detection performance. Analyzing social interaction data revealed stressed users have less connected social structures than non-stressed users.

Uploaded by

Dhinesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 57

FEDERATED DEPRESSION DETECTION FORM MULTI SOURCE MOBILE

HEALTH DATA

ABSTRACT:

Psychological stress is threatening people's health. It is non-trivial to detect stress timely


for proactive care. With the popularity of social media, people are used to sharing their daily
activities and interacting with friends on social media platforms, making it feasible to leverage
online social network data for stress detection. In this paper, we find that users stress state is
closely related to that of his/her friends in social media, and we employ a large-scale dataset
from real-world social platforms to systematically study the correlation of users' stress states and
social interactions. We first define a set of stress-related textual, visual, and social attributes from
various aspects, and then propose a novel hybrid model - a factor graph model combined with
Convolutional Neural Network to leverage tweet content and social interaction information for
stress detection. Experimental results show that the proposed model can improve the detection
performance by 6-9 percent in F1-score. By further analyzing the social interaction data, we also
discover several intriguing phenomena, i.e., the number of social structures of sparse connections
(i.e., with no delta connections) of stressed users is around 14 percent higher than that of non-
stressed users, indicating that the social structure of stressed users' friends tend to be less
connected and less complicated than that of non-stressed users.
CHAPTER -I

INTRODUCTION

Psychological Stress is becoming a Threat to People’s Health Nowadays. With the rapid pace of
life, more and more people are feeling stressed. According to a worldwide survey reported by
New business in 2010,1 over half of the population have experienced an appreciable rise in stress
over the last two years. Though stress itself is non-clinical and common in our life, excessive and
chronic stress can be rather harmful to people’s physical and mental health. According to
existing research works, long-term stress has been found to be relatedto many diseases, e.g.,
clinical depressions, insomnia etc..Moreover, according to Chinese Center for Disease Control
and Prevention, suicide has become the top cause of deathamong Chinese youth, and excessive
stress is considered tobe a major factor of suicide. All these reveal that the rapidincrease of stress
has become a great challenge to humanhealth and life quality.Thus, there is significant
importance to detect stress before it turns into severe problems. Traditional psychological stress
detection is mainly based on face-to face interviews, self-report questionnaires or wearable
sensors. However, traditional methods are actually reactive, which are usually
laborconsuming,time-costing and hysteretic.

Objective
The objective of the system is in defining a set of attributes for stress detection from
tweet-level and user-level aspects respectively:

1) tweet-level attributes from content of user’s single tweet,

2) user-level attributes from user’s weekly tweets. The tweet-level attributes are mainly
composed of linguistic, visual, and social attention (i.e., being liked, re tweeted, or commented)
attributes extracted from a single-tweet’s text, image, and attention list. The user-level attributes
however are composed of: (a) posting behavior attributes as summarized from a user’s weekly
tweet postings; and (b) social interaction attributes extracted from a user’s social interactions
with friends.
Problem Statement
Beyond user’s tweeting contents, the system analyzes the correlation of users’ stress
states and their social interactions on the networks, and addresses the problem from the
standpoints of:
(1) Social interaction content, by investigating the content differences between stressed
and non-stressed users’ social interactions;
(2) Social interaction structure, by investigating the structure differences in terms of
structural diversity, social influence, and strong/weak tie.

Scope
The scope of the project is in detecting users’ psychological stress states from users’
weekly social media data, leveraging tweets’ content as well as users’ social interactions and also
in user-level emotion detection in social networks.
CHAPTER – II

LITERATURE SURVEY
LITERATURE SURVEY (REF ID+SUMMARY TABLE)

Introduction

IntroductionStress is a universal phenomenon of modern life. In a recent study by


American Psychological Association, three quarter of Americans is reported to have stress
related symptoms [1]. While repeated or chronic stress can cause adverse physiological problems
likes obesityand hypertension, inability to cope with stress can cause mental disorder like anxiety
and depression.

Emotional wellness environments encouragement a noteworthy level of the world’s


adult residents every year. Counting depression, ingestion complaints like anorexia and
bulimia, bipolar disorder and post-traumatic stress disorder (PTSD). Endless concern
increases the vulnerability of producing medical issues, for example, a sleeping disorder,
corpulence, heart ailments so on. Hence, there is striking consequence to identify stress
some time before it converts into serious issues. Conventional emotional stress recognition
is principally based on interviews, self-report surveys or wearable sensors. With the
increase the use of social networks individual’s shares their day to day occasions,
preferences, and interact with companions through the social media. As these operational
interacting data positive mirror’s client’s genuine states and feelings in a positive way.

Disadvantage

 More time uncontrollable.


 It is a task to construct a dataset with dependable ground truth labels from large-scale blaring
social media data.
 A physical classification way is not achievable due to the uncontainable charge and
superiority.

Many methodologies have been proposedto detect communities insocial networks. The
proposed methodologies use different data mining algorithms, graph mining algorithms to
achieve the task of detection of communities. Few proposed techniques are like, detection of
community and sub community detection in web scale network [3], detection for distributed
environment inweb scale network[4], detectionin integrated internet of things and social network
architecture [7], and detectionin weighted networks. Personality has been shown to be relevant to
many types of interactions; it has been shown to be useful in predicting job satisfaction,
professional and romantic relationship success, and even preference for different interfaces.Until
now, to accurately gauge users' personalities, it needs to take a personality test and this made it
impractical to use personality analysis in many social media domains.It describes the type of data
collected, our methods of analysis, and the machine learning techniques that allow us to
successfully predict personality. It has the discussion about implications; this has for social
media design, interface design, and broader domains.

Advantages:
 Recommender systems may also benefit from integrating predicted personality values.
 It achieves large and significant improvements over baseline classification on each
personality factor.

Disadvantages:
 A personality trait affects job performance and satisfaction
Algorithm:
 Regression Algorithm
 Gaussian Process
 ZeroR
Traditional psychological stress detection usually relies on the active individual
participation, which makes the detection labor-consuming, time-costing and hysteretic.An
automatic stress detection method from cross-media microblog data is proposed.It constructs a
three-level framework to formulate the problem.It first obtains a set of low-level features from
the tweets and then it defines and extracts middle-level representations based on psychological
and art theories.A Deep Sparse Neural Network is designed to learn the stress categories
incorporating the cross-media attribute.
Advantages:
 The proposed method is effective and efficient on detecting psychological stress from
microblog data.
 Using the framework, the proposed method can help to automatically detect
psychological stress from social networks.

Disadvantages:
 Long-term stress may lead to many severe physical and mental problems, such as clinical
depressions, insomnia and even suicide.

Generator the Sentimental Analysis

1. Form if algorithm contents conclusion standards


2. Processor information-theoretic criteria for all attributes
3. Indicate best attribute conferring to the information theoretic criteria
4. Generate a decision node based on the best attribute in step 3
5. Bring (i.e. split) the dataset based on newly created decision node in step 4
6. For all sub dataset in step 5, call C4.5 algorithm to get a sub tree (recursive call)
7. Attribute the tree obtained in step 6 to the decision node in step 4
Title 1: Predicting Personality From Twitter
Author: Jennifer Golbeck, Cristina Robles, Michon Edmondson and Karen Turner
Year: 2011

Description:
 Personality has been shown to be relevant to many types of interactions, it has been
shown to be useful in predicting job satisfaction, professional and romantic relationship
success, and even preference for different interfaces.
 Until now, to accurately gauge users' personalities, it needs to take a personality test and
this made it impractical to use personality analysis in many social media domains.
 It describes the type of data collected, our methods of analysis, and the machine learning
techniques that allow us to successfully predict personality.
 It has the discussion about implications; this has for social media design, interface design,
and broader domains.

Advantages:
 Recommender systems may also benefit from integrating predicted personality values.
 It achieves large and significant improvements over baseline classification on each
personality factor.

Disadvantages:
 A personality trait affects job performance and satisfaction.

Technique:
 Machine learning technique

Algorithm:
 Regression Algorithm
 Gaussian Process
 ZeroR
Title 2: Psychological Stress Detection From Cross-Media Microblog Data Using Deep
SparseNeural Network
Author: Huijie Lin, Jia Jia, Quan Guo, Yuanyuan Xue, Jie Huang, Lianhong Cai and Ling Feng
Year: 2014

Description:
 Traditional psychological stress detection usually relies on the active individual
participation, which makes the detection labor-consuming, time-costing and hysteretic.
 An automatic stress detection method from cross-media microblog data is proposed.
 It constructs a three-level framework to formulate the problem.
 It first obtains a set of low-level features from the tweets and then it defines and extracts
middle-level representations based on psychological and art theories.
 A Deep Sparse Neural Network is designed to learn the stress categories incorporating
the cross-media attributes.

Advantages:
 The proposed method is effective and efficient on detecting psychological stress from
microblog data.
 Using the framework, the proposed method can help to automatically detect
psychological stress from social networks.

Disadvantages:
 Long-term stress may lead to many severe physical and mental problems, such as clinical
depressions, insomnia and even suicide.
TITLE 3: Mood Cast: Emotion Prediction via Dynamic Continuous Factor Graph Model.

AUTHOR NAME: Yuan Zhang, Joe Tang, Jinmen Sun, Yiran Chen, and Jinghai Rao_

DESCRIPTION:

 Human emotion is one important underlying force affecting and affected by the dynamics
of social networks.
 A Mood Cast method based on a dynamic factor graph model for modeling and
predicting users’ emotions in a social network.
 The evolving social ecosystem and our emotion statuses are often influenced by a
complex set of factors.

ADVANTAGES

 It can effectively model each user’s emotion status and the prediction performance is
better than several baselines for emotion prediction.
 Mass storage capacity and high-speed computing power.
 Users need to type the tags whenever they post a resource, so that a good tag
recommendation system can ease the process of finding some useful.

ALGORITHM: MH Algorithm (Metropolis-Hastings)

TECHNIQUES: Baseline Methods


SYSTEM STUDY

PRELIMINARY INVESTIGATION

The first and foremost strategy for development of a project starts from the thought of
designing a mail enabled platform for a small firm in which it is easy and convenient of sending
and receiving messages, there is a search engine ,address book and also including some
entertaining games. When it is approved by the organization and our project guide the first
activity, ie. Preliminary investigation begins. The activity has three parts:

 Request Clarification

 Feasibility Study

 Request Approval

REQUEST CLARIFICATION

After the approval of the request to the organization and project guide, with an
investigation being considered, the project request must be examined to determine precisely what
the system requires. Here our project is basically meant for users within the company whose
systems can be interconnected by the Local Area Network (LAN). In today’s busy schedule man
need everything should be provided in a readymade manner. So taking into consideration of the
vastly use of the net in day to day life, the corresponding development of the portal came into
existence.

FEASIBILITY ANALYSIS

An important outcome of preliminary investigation is the determination that the system


request is feasible. This is possible only if it is feasible within limited resource and time. The
different feasibilities that have to be analyzed are

 Operational Feasibility
 Economic Feasibility
 Technical Feasibility
Operational Feasibility
Operational Feasibility deals with the study of prospects of the system to be developed.
This system operationally eliminates all the tensions of the Admin and helps him in effectively
tracking the project progress. This kind of automation will surely reduce the time and energy,
which previously consumed in manual work. Based on the study, the system is proved to be
operationally feasible.

Economic Feasibility

Economic Feasibility or Cost-benefit is an assessment of the economic justification for a


computer based project. As hardware was installed from the beginning & for lots of purposes
thus the cost on project of hardware is low. Since the system is a network based, any number of
employees connected to the LAN within that organization can use this tool from at anytime. The
Virtual Private Network is to be developed using the existing resources of the organization. So
the project is economically feasible.

Technical Feasibility
According to Roger S. Pressman, Technical Feasibility is the assessment of the technical
resources of the organization. The organization needs IBM compatible machines with a graphical
web browser connected to the Internet and Intranet. The system is developed for platform
Independent environment. Java Server Pages, JavaScript, HTML, MYSQL server and WebLogic
Server are used to develop the system. The technical feasibility has been carried out. The system
is technically feasible for development and can be developed with the existing facility.

REQUEST APPROVAL

Not all request projects are desirable or feasible. Some organization receives so many
project requests from client users that only few of them are pursued. However, those projects that
are both feasible and desirable should be put into schedule. After a project request is approved, it
cost, priority, completion time and personnel requirement is estimated and used to determine
where to add it to any project list. Truly speaking, the approval of those above factors,
development works can be launched.
SYSTEM DESIGN AND DEVELOPMENT

INPUT DESIGN

Input Design plays a vital role in the life cycle of software development, it requires very
careful attention of developers. The input design is to feed data to the application as accurate as
possible. So inputs are supposed to be designed effectively so that the errors occurring while
feeding are minimized. According to Software Engineering Concepts, the input forms or screens
are designed to provide to have a validation control over the input limit, range and other related
validations.

This system has input screens in almost all the modules. Error messages are developed to
alert the user whenever he commits some mistakes and guides him in the right way so that
invalid entries are not made. Let us see deeply about this under module design.

Input design is the process of converting the user created input into a computer-based
format. The goal of the input design is to make the data entry logical and free from errors. The
error is in the input are controlled by the input design. The application has been developed in
user-friendly manner. The forms have been designed in such a way during the processing the
cursor is placed in the position where must be entered. The user is also provided with in an
option to select an appropriate input from various alternatives related to the field in certain cases.

Validations are required for each data entered. Whenever a user enters an erroneous data,
error message is displayed and the user can move on to the subsequent pages after completing all
the entries in the current page.
Output Design
The Output from the computer is required to mainly create an efficient method of
communication within the company primarily among the project leader and his team members,
in other words, the administrator and the clients. The output of VPN is the system which allows
the project leader to manage his clients in terms of creating new clients and assigning new
projects to them, maintaining a record of the project validity and providing folder level access to
each client on the user side depending on the projects allotted to him. After completion of a
project, a new project may be assigned to the client. User authentication procedures are
maintained at the initial stages itself. A new user may be created by the administrator himself or
a user can himself register as a new user but the task of assigning projects and validating a new
user rests with the administrator only.

The application starts running when it is executed for the first time. The server has to be started
and then the internet explorer in used as the browser. The project will run on the local area
network so the server machine will serve as the administrator while the other connected systems
can act as the clients. The developed system is highly user friendly and can be easily understood
by anyone using it even for the first time.
CHAPTER – III

SYSTEM ANALYSIS
EXISTING SYSTEM:

Psychological wellness conditions influence a noteworthy level of the world’s adult


population every year. Including depression, eating disorders like anorexia and bulimia,
bipolar disorder and post-traumatic stress disorder (PTSD). Endless anxiety expands the
danger of creating medical issues, for example, a sleeping disorder, corpulence, heart
ailments so on. Hence, there is noteworthy significance to identify stress some time
before it transforms into serious issues. Conventional mental stress recognition is
predominantly based on interviews, self-report surveys or wearable sensors. With the
increase the use of social networks individual’s shares their day to day occasions,
inclinations, and interact with companions through the social media. As these online networking
information auspicious mirror’s client’s genuine states and feelings in an auspicious way.

DISADVANTAGES:

 More time consuming.


 It is a challenge to construct a dataset with reliable ground truth labels from large-scale noisy
social media data.
 A manual labeling method is not feasible due to the uncontrollable cost and quality.
PROPOSED SYSTEM:

In this paper, we presented a framework for detecting users’ psychological stress states
from users’ weekly social media data, leveraging tweets’ content as well as users’ social
interactions. Employing real-world social media data as the basis, we studied the correlation
between user’ psychological stress states and their social interaction behaviors. To fully leverage
both content and social interaction information of users’ tweets, we proposed a hybrid model
which combines the factor graph model (FGM) with a convolutional neural network (CNN).

In this work, we also discovered several intriguing phenomena of stress. We found that the
number of social structures of sparse connection (i.e., with no delta connections) of stressed
users is around 14 percent higher than that of non-stressed users, indicating that the social
structure of stressed users’ friends tend to be less connected and less complicated than that of
non-stressed users. These phenomena could be useful references for future related studies.

ADVANTAGES:

 It improves the detection performance.


 Less time consuming.
 The social structures of stressed users are less connected and less complicated than those of
non-stressed users.
CHAPTER- IV

SYSTEM SPECIFICATION
Hardware specification:

Processor - Pentium –IV

Speed - 1.1 Ghz

RAM - 256 MB(min)

Hard Disk - 20 GB

Floppy Drive - 1.44 MB

Key Board - Standard Windows Keyboard

Mouse - Two or Three Button Mouse

Monitor - SVGA

Software specification:

Operating System : Windows95/98/2000/XP

Application Server : Tomcat5.0/6.X

Front End : HTML, Java, Jsp

Scripts : JavaScript.

Server side Script : Java Server Pages.

Database : MyMYSQL 5.0

Database Connectivity : JDBC.


SOFTWARE REQUIREMENT SPECIFICATIONS

JAVA OVERVIEW

Java is a high-level language that can be characterized by all of the following exhortations.

 Simple

 Object Oriented

 Distributed

 Multithreaded

 Dynamic

 Architecture Neutral

 Portable

 High performance

 Robust

 Secure

In the Java programming language, all the source code is first written in plain text files
ending with the .java extension. Those source files are then compiled into .class files by the Java
compiler (javac). A class file does not contain code that is native to your processor; it instead
contains byte codes - the machine language of the Java Virtual Machine. The Java launcher tool
(java) then runs your application with an instance of the Java Virtual Machine.

JAVA PLATFORM:

A platform is the hardware or software environment in which a program runs. The most
popular platforms are Microsoft Windows, Linux, Solaris OS and MacOS. Most platforms can
be described as a combination of the operating system and underlying hardware. The java
platform differs from most other platforms in that it’s a software-only platform that runs on the
top of other hardware-based platforms.

The java platform has two components:

 The Java Virtual Machine.

 The Java Application Programming Interface(API)

Java Virtual Machine is the base for the java platform and is pored onto various
hardware-based platforms.

The API is a large collection of ready-made software components that provide many
useful capabilities, such as graphical user interface (GUI) widgets. It is grouped into libraries of
related classes and interfaces, these libraries are known as packages.

As a platform-independent environment, the Java platform can be a bit slower than native
code. However, advances in compiler and virtual machine technologies are bringing performance
close to that of native code without threatening portability.

Development Tools:

The development tools provide everything you’ll need for compiling, running,
monitoring, debugging, and documenting your applications. As a new developer, the main tools
you’ll be using are the Java compiler (javac), the Java launcher (java), and the Java
documentation (javadoc).

Application programming Interface (API):

The API provides the core functionality of the Java programming language. It offers a
wide array of useful classes ready for use in your own applications. It spans everything from
basic objects, to networking and security.

Deployment Technologies:
The JDK provides standard mechanisms such as Java Web Start and Java Plug-In, for
deploying your applications to end users.

User Interface Toolkits:

The Swing and Java 2D toolkits make it possible to create sophisticated Graphical User
Interfaces (GUIs).

Drag-and-drop support:

Drag-and-drop is one of the seemingly most difficult features to implement in user


interface development. It provides a high level of usability and intuitiveness.

Drag-and-drop is, as its name implies, a two step operation. Code must to facilitate
dragging and code to facilitate dropping. Sun provides two classes to help with this namely
DragSource and DropTarget

Look and Feel Support:

Swing defines an abstract Look and Feel class that represents all the information central to a
look-and-feel implementation, such as its name, its description, whether it’s a native look-and-
feel- and in particular, a hash table (known as the “Defaults Table”) for storing default values for
various look-and-feel attributes, such as colors and fonts.

Each look-and-feel implementation defines a subclass of Look And Feel (for example,
swing .plaf.motif.MotifLookAndFeel) to provide Swing with the necessary information to
manage the look-and-feel.

The UIManager is the API through which components and programs access look-and-feel
information (They should rarely, if ever, talk directly to a LookAndFeelinstance). UIManager is
responsible for keeping track of which LookAndFeel classes are available, which are installed,
and which is currently the default. The UIManager also manages access to the Defaults Table for
the current look-and-feel.

Dynamically Changing the Default Look-and-Feel:


When a Swing application programmatically sets the look-and-feel, the ideal place to do
so is before any Swing components are instantiated. This is because the
UIManager.setLookAndFeel() method makes a particular Look And Feel the current default by
loading and initializing that LookAndFeel instance, but it doesnot automatically cause any
existing components to change their look-and-feel.

Remember that components initialize their UI delegate at construct time, therefore, if the
current default changes after they are constructed, they will not automatically update their UIs
accordingly. It is up to the program to implement this dynamic switching by traversing the
containment hierarchy and updating the components individually.

Integrated Development Environment (IDE)


IDE Introduction
An Integrated Development Environment (IDE) or interactive development environment
is a software application that provides comprehensive facilities to computer programmers for
software development. An IDE normally consists of a source code editor, build automation
tools and a debugger. Most modern IDEs have intelligent code completion. Some IDEs
contain a compiler, interpreter, or both, such as Net Beans and Eclipse. Many modern IDEs
also have a class browser, an object browser, and a class hierarchy diagram, for use in object-
oriented software development. The IDE is designed to limit coding errors and facilitate error
correction with tools such as the “Eclipse ” Find Bugs to locate and fix common Java coding
problems and Debugger to manage complex code with field watches, breakpoints and
execution monitoring.

An Integrated Development Environment (IDE) is an application that facilitates


application development. In general, an IDE is a graphical user interface (GUI)-based
workbench designed to aid a developer in building software applications with an integrated
environment combined with all the required tools at hand. Most common features, such as
debugging, version control and data structure browsing, help a developer quickly execute
actions without switching to other applications. Thus, it helps maximize productivity by
providing similar user interfaces (UI) for related components and reduces the time taken to
learn the language. An IDE supports single or multiple languages.
One aim of the IDE is to reduce the configuration necessary to piece together multiple
development utilities, instead providing the same set of capabilities as a cohesive unit.
Reducing that setup time can increase developer productivity, in cases where learning to use
the IDE is faster than manually integrating all of the individual tools. Tighter integration of
all development tasks has the potential to improve overall productivity beyond just helping
with setup tasks.

IDE Supporting Languages

Some IDEs support multiple languages, such as Eclipse, ActiveState Komodo, IntelliJ
IDEA, MyEclipse, Oracle JDeveloper, Eclipse , Codenvy and Microsoft Visual studio GNU
Emacs based on C and Emacs Lisp, and IntelliJ IDEA, Eclipse, MyEclipse or Eclipse , all
based on Java, or MonoDevelop, based on C#. Eclipse and Eclipse have plugins for C/C++,
Ada, GNAT (for example AdaGIDE), Perl, Python, Ruby, and PHP.

IDE Tools

There are many IDE tools available for source code editor, built automation tools and
debugger. Some of the tools are,

 Eclipse
 Eclipse
 Code::Blocks
 Code Lite
 Dialog Blocks

Eclipse IDE 8.0 and new features for Java 8

Eclipse IDE 8.0 is released, also providing new features for Java 8 technologies. It has code
analyzers and editors for working with Java SE 8, Java SE Embedded 8, and Java ME Embedded
8. The IDE also has new enhancements that further improve its support for Maven and Java EE
with PrimeFaces.
Most important highlights are:

The top 5 features of Eclipse IDE 8 are as follows:

1. Tools for Java 8 Technologies. Anyone interested in getting started with lambdas, method
references, streams, and profiles in Java 8 can do so immediately by downloading Eclipse IDE
8. Java hints and code analyzers help you upgrade anonymous inner classes to lambdas, right
across all your code bases, all in one go. Java hints in the Java editor let you quickly and
intuitively switch from lambdas to method references, and back again.

Moreover, Java SE Embedded support entails that you’re able to deploy, run, debug or profile
Java SE applications on an embedded device, such as Raspberry PI, directly from Eclipse IDE.
No new project type is needed for this, you can simply use the standard Java SE project type for
this purpose.
1. Tools for Java EE Developers. The code generators for which Eclipse IDE is well
known have been beefed up significantly. Where before you could create bits and pieces
of code for various popular Java EE component libraries, you can now generate complete
PrimeFaces applications, from scratch, including CRUD functionality and database
connections.

Additionally, the key specifications of the Java EE 7 Platform now have new and enhanced tools,
such as for working with JPA and CDI, as well as Facelets.

Let’s not forget to mention in this regard that Tomcat 8.0 and TomEE are now supported, too,
with a new plugin for WildFly in the Eclipse Plugin Manager.

3. Tools for Maven. A key strength of Eclipse IDE, and a reason why many developers have
started using it over the past years, is its out of the box support for Maven. No need to install a
Maven plugin, since it’s a standard part of the IDE. No need to deal with IDE-specific files, since
the POM provides the project structure.And now, in Eclipse IDE 8.0, there are enhancements to
the graph layouting, enabling you to visualize your POM in various ways, while also being able
to graphically exclude dependencies from the POM file, without touching the XML.
4. Tools for JavaScript. Thanks to powerful new JavaScript libraries and frameworks over the
years, JavaScript as a whole has become a lot more attractive for many developers. For some
releases already, Eclipse IDE has been available as a pure frontend environment, that is, minus
all the Java tools for which it is best known. This lightweight IDE, including Git versioning
tools, provides a great environment for frontend devs. In particular, for users of AngularJS,
Knockout, and Backbone, the IDE comes with deep editor tools, such as code completion and
cross-artifact navigation.In Eclipse IDE 8.0, there’s a very specific focus on AngularJS, since
this is such a dominant JavaScript solution at the moment. From these controllers, you can
navigate, via hyperlinks embedded in the JavaScript editor, to the related HTML views. And, as
shown in this screenshot, you can use code completion inside the HTML editor to access
controllers, and even the properties within the controllers, to help you accurately code the related
artifacts in your AngularJS applications.

Also, remember that there’s no need to download the AngularJS Seed template, since it’s built
into the Eclipse New Project wizard.

5. Tools for HTML5. JavaScript is a central component of the HTML5 Platform, a collective
term for a range of tools and technologies used in frontend development. Popular supporting
technologies are Grunt, a build tool, and Karma, a test runner framework. Both of these are now
supported out of the box in Eclipse IDE 8.0
JDBC (JAVA DATABASE CONNECTIVITY)

In an effort to set an independent database standard API for Java, Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic MYSQL database
access mechanism that provides a consistent interface to a variety of RDBMSs. This consistent
interface is achieved through the use of “plug-in” database connectivity modules, or drivers. If a
database vendor wishes to have JDBC support, he or she must provide the driver for each
platform that the database and Java run on.

To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of platforms.
Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market much faster than
developing a completely new connectivity solution.

JDBC was announced in March of 1996. It was released for a 90 day public review that
ended June 8, 1996. Because of user input, the final JDBC v1.0 specification was released soon
after.

The remainder of this section will cover enough information about JDBC for you to know
what it is about and how to use it effectively. This is by no means a complete overview of JDBC.
That would fill an entire book.

JDBC Goals

Few software packages are designed without goals in mind. JDBC is one that, because of
its many goals, drove the development of the API. These goals, in conjunction with early
reviewer feedback, have finalized the JDBC class library into a solid framework for building
database applications in Java.

The goals that were set for JDBC are important. They will give you some insight as to why
certain classes and functionalities behave the way they do. The eight design goals for JDBC are
as follows:
1. MYSQL Level API:
The designers felt that their main goal was to define a MYSQL interface for Java.
Although not the lowest database interface level possible, it is at a low enough level for higher-
level tools and APIs to be created. Conversely, it is at a high enough level for application
programmers to use it confidently. Attaining this goal allows for future tool vendors to
“generate” JDBC code and to hide many of JDBC’s complexities from the end user.

2. MYSQL Conformance:

MYSQL syntax varies as you move from database vendor to database vendor. In an effort
to support a wide variety of vendors, JDBC will allow any query statement to be passed through
it to the underlying database driver. This allows the connectivity module to handle non-standard
functionality in a manner that is suitable for its users.

3. JDBC must be implemental on top of common database interfaces

The JDBC MYSQL API must “sit” on top of other common MYSQL level APIs. This
goal allows JDBC to use existing ODBC level drivers by the use of a software interface. This
interface would translate JDBC calls to ODBC and vice versa.

4. Provide a Java interface that is consistent with the rest of the Java system

Because of Java’s acceptance in the user community thus far, the designers feel that
they should not stray from the current design of the core Java system.

MYSQL Server 5.0

Microsoft MYSQL Server is a relational database management system developed by


Microsoft. As a database server, it is a software product with the primary function of storing and
retrieving data as requested by other software applications-which may run either on the same
computer or on another computer across a network (including the Internet).
MYSQL is Structured Query Language, which is a computer language for storing,
manipulating and retrieving data stored in relational database. MYSQL is the standard language
for Relation Database System. All relational database management systems like MyMYSQL,
MS Access, Oracle, Sybase, Informix, postgres and MYSQL Server use MYSQL as standard
database language. Also, they are using different dialects, such as:

 MS MYSQL Server using T-MYSQL,


 Oracle using PL/MYSQL,
 MS Access version of MYSQL is called JET MYSQL (native format) etc.

History

The history of Microsoft MYSQL Server begins with the first Microsoft MYSQL Server
product - MYSQL Server 1.0, a 16-bit server for the OS/2 operating system in 1989 - and
extends to the current day. As of December 5.1 the following versions are supported by
Microsoft:

 MYSQL Server 5.0


 MYSQL Server 5.0 R2
 MYSQL Server 5.0 Web
 MYSQL Server 5.0 R3
 MYSQL Server 5.1

The current version is Microsoft MYSQL Server 5.1, released June 1, 5.1. The RTM
version is 13.0.1601.5. MYSQL Server 5.1 is supported on x64 processors only.

MYSQL Process

When you are executing an MYSQL command for any RDBMS, the system determines
the best way to carry out your request and MYSQL engine figures out how to interpret the task.
There are various components included in the process. These components are Query Dispatcher,
Optimization Engines, Classic Query Engine and MYSQL Query Engine, etc. Classic query
engine handles all non-MYSQL queries but MYSQL query engine won't handle logical files.
Data storage

Data storage is a database, which is a collection of tables with typed columns. MYSQL
Server supports different data types, including primary types such as Integer, Float, Decimal,
Char (including character strings), Varchar (variable length character strings), binary (for
unstructured blobs of data), Text (for textual data) among others. The rounding of floats to
integers uses either Symmetric Arithmetic Rounding or Symmetric Round Down (fix) depending
on arguments: SELECT Round(2.5, 0) gives 3.

Microsoft MYSQL Server also allows user-defined composite types (UDTs) to be


defined and used. It also makes server statistics available as virtual tables and views (called
Dynamic Management Views or DMVs). In addition to tables, a database can also contain other
objects including views, stored procedures, indexes and constraints, along with a transaction log.
A MYSQL Server database can contain a maximum of 231 objects, and can span multiple OS-
level files with a maximum file size of 260 bytes (1 exabyte). The data in the database are stored
in primary data files with an extension .mdf. Secondary data files, identified with a .ndf
extension, are used to allow the data of a single database to be spread across more than one file,
and optionally across more than one file system. Log files are identified with the .ldf extension
Storage space allocated to a database is divided into sequentially numbered pages, each 8
KB in size. A page is the basic unit of I/O for MYSQL Server operations. A page is marked with
a 96-byte header which stores metadata about the page including the page number, page type,
free space on the page and the ID of the object that owns it. Page type defines the data contained
in the page: data stored in the database, index, allocation map which holds information about
how pages are allocated to tables and indexes, change map which holds information about the
changes made to other pages since last backup or logging, or contain large data types such as
image or text.

Buffer management

MYSQL Server buffers pages in RAM to minimize disk I/O. Any 8 KB page can be
buffered in-memory, and the set of all pages currently buffered is called the buffer cache. The
amount of memory available to MYSQL Server decides how many pages will be cached in
memory. The buffer cache is managed by the Buffer Manager. Either reading from or writing to
any page copies it to the buffer cache. Subsequent reads or writes are redirected to the in-
memory copy, rather than the on-disc version. The page is updated on the disc by the Buffer
Manager only if the in-memory cache has not been referenced for some time. While writing
pages back to disc, asynchronous I/O is used whereby the I/O operation is done in a background
thread so that other operations do not have to wait for the I/O operation to complete. Each page
is written along with its checksum when it is written.

Concurrency and locking

MYSQL Server allows multiple clients to use the same database concurrently. As such, it
needs to control concurrent access to shared data, to ensure data integrity-when multiple clients
update the same data, or clients attempt to read data that is in the process of being changed by
another client. MYSQL Server provides two modes of concurrency control: pessimistic
concurrency and optimistic concurrency. When pessimistic concurrency control is being used,
MYSQL Server controls concurrent access by using locks. Locks can be either shared or
exclusive. Exclusive lock grants the user exclusive access to the data-no other user can access the
data as long as the lock is held. Shared locks are used when some data is being read-multiple
users can read from data locked with a shared lock, but not acquire an exclusive lock. The latter
would have to wait for all shared locks to be released.

MYSQLCMD

MYSQLCMD is a command line application that comes with Microsoft MYSQL Server,
and exposes the management features of MYSQL Server. It allows MYSQL queries to be written
and executed from the command prompt. It can also act as a scripting language to create and run
a set of MYSQL statements as a script. Such scripts are stored as a .MYSQL file, and are used
either for management of databases or to create the database schema during the deployment of a
database.

MYSQLCMD was introduced with MYSQL Server 5.0 and this continues with MYSQL
Server 2012 and 2014. Its predecessor for earlier versions was OMYSQL and IMYSQL, which is
functionally equivalent as it pertains to TMYSQL execution, and many of the command line
parameters are identical, although MYSQLCMD adds extra versatility.

FEATURES OF MY MYSQL SERVER

The OLAP Services feature available in MYSQL Server version 7.0 is now called MY
MYSQL Server Analysis Services. The term OLAP Services has been replaced with the term
Analysis Services. Analysis Services also includes a new data mining component. The
Repository component available in MYSQL Server version 7.0 is now called Microsoft MY
MYSQL Server Meta Data Services. References to the component now use the term Meta Data
Services. The term repository is used only in reference to the repository engine within Meta Data
Services.

MYSQL-SERVER database consist of five type of objects,

They are,

1. TABLE

2. QUERY

3. FORM
4. REPORT

5. MACRO

1) TABLE:

A database is a collection of data about a specific topic.

We can View a table in two ways,

a) Design View

b) Datasheet View

A)Design View

To build or modify the structure of a table, we work in the table design view. We can specify
what kind of dates will be holed.

B) Datasheet View

To add, edit or analyses the data itself, we work in table’s datasheet view mode.

2) QUERY:

A query is a question that has to be asked to get the required data. Access gathers data
that answers the question from one or more table. The data that make up the answer is either
dynast (if you edit it) or a snapshot (it cannot be edited).Each time we run a query, we get latest
information in the dynast. Access either displays the dynast or snapshot for us to view or perform
an action on it, such as deleting or updating.

3) FORMS:

A form is used to view and edit information in the database record. A form displays only the
information we want to see in the way we want to see it. Forms use the familiar controls such as
textboxes and checkboxes. This makes viewing and entering data easy. We can work with forms
in several views. Primarily there are two views,They are,

a) Design View
b) Form View

To build or modify the structure of a form, we work in form’s design view. We can add control
to the form that are bound to fields in a table or query, includes textboxes, option buttons, graphs
and pictures.

4) REPORT:

A report is used to view and print the information from the database. The report can
ground records into many levels and compute totals and average by checking values from many
records at once. Also the report is attractive and distinctive because we have control over the size
and appearance of it.

5) MACRO:

A macro is a set of actions. Each action in a macro does something, such as opening a form or
printing a report .We write macros to automate the common tasks that work easily and save the
time.

FEATURES OF MYSQL PROCEDURES

MYSQL procedures are characterized by many features. MYSQL procedures:

 Can contain MYSQL Procedural Language statements and features which support the

implementation of control-flow logic around traditional static and dynamic MYSQL

statements.

 Are supported in the entire DB2 family brand of database products in which many if not

all of the features supported in DB2 Version 9 are supported.

 Are easy to implement, because they use a simple high-level, strongly typed language.

 MYSQL procedures are more reliable than equivalent external procedures.

 Adhere to the MYSQL99 ANSI/ISO/IEC MYSQL standard.

 Support input, output, and input-output parameter passing modes.


 Support a simple, but powerful condition and error-handling model.

 Allow you to return multiple result sets to the caller or to a client application.

 Allow you to easily access the MYSQL STATE and MYSQLCODE values as special

variables.

 Reside in the database and are automatically backed up and restored.

 Can be invoked wherever the CALL statement is supported.

 Support nested procedure calls to other MYSQL procedures or procedures implemented

in other languages.

 Support recursion.
CHAPTER – V

SYSTEM DESIGN

Existing Architecture
Proposed Architecture
Use Case Diagram

UML stands for Unified Modelling Language. UML is a standardized general-purpose


modelling language in the field of object-oriented software engineering. The standard is
managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object
oriented computer software. In its current form UML is comprised of two major components: a
Meta-model and a notation. In the future, some form of method or process may also be added to;
or associated with, UML.
The Unified Modelling Language is a standard language for specifying, Visualization,
Constructing and documenting the artefacts of software system, as well as for business modelling
and other non-software systems.
The UML represents a collection of best engineering practices that have proven
successful in the modelling of large and complex systems.
The UML is a very important part of developing objects oriented software and the software
development process. The UML uses mostly graphical notations to express the design of
software projects.

UML stands for Unified Modelling Language. UML is a standardized general-purpose


modelling language in the field of object-oriented software engineering. The standard is
managed, and was created by, the Object Management Group.
View all Users and authorizeAdd Tweet Category
like Positive,Negative,Stressed

View all friend request and Response and Positive and View
negative ,Stress Emotion Tweet reviews

Search Friends and Req, Friend.

Select Tweet Category and Add Tweet


Filter and list all filters below
Admin User

View all your created Tweets and find +ve and –ve
emotion

pos,neg,Stress emotions on your Tweets

View all your friends tweets

View total tweets and stressed


tweets

List of search history

results

View +ve,or –ve or stressed Tweets


emotion in chart
Data Flow Diagram

The DFD is also called as bubble chart. It is a simple graphical formalism that can be used to
represent a system in terms of the input data to the system, various processing carried out on
these data, and the output data is generated by the system

View all End Users and Authorize, all


friend request and Response, List all
Tweets micro-blog with its user
detailsView Positive (+)Emotion Tweets
review, negative (-)Emotion Tweet
Add Tweet Category like reviews,StressEmotion Tweets.
Positive,Negative,Stressed .
,Add Tweet Filter. 1. View total tweets and find
number of pos,neg and stressed
tweets
Admin System

Register with the


Response
system Search Friends and Req, Friend

List all Tweets micro-blog with its user details


Select Tweet Category and Add Tweet Filter and
list all filters below List of search history.
Request

End User

. View Their Own


Details

View your profile,Search Friends and Req, Friend., Your


Friends,Create Tweet by Tweet name, Tweet description, Tweet
Image,Tweet date,View all your created Tweets and find,pos,neg,Stress
emotions on your Tweets.

1. View all your friends tweets and retweet by feeding your


sentiments or comment
Class Diagram

The class diagram is the main building block of object oriented modeling. It is used both
for general conceptual modeling of the systematic of the application, and for detailed modeling
translating the models into programming code.In class diagram took the Data Mining user, Data
Mining provider and consumer. In Data Mining user we took the user login and user constraints
for uploading and downloading data. Data Mining Admin must get permission from another Data
Mining admin to access the Data Mining.
Sequence diagram
A sequence diagram in Unified Modeling Language (UML) is a kind of interaction
diagram that shows how processes operate with one another and in what order. It is a construct of
a Message Sequence Chart. Sequence diagrams are sometimes called event diagrams, event
scenarios, and timing diagrams

Web Server

View all Users and authorize User Details

Add Tweet Category like Search Friends and Req, Friend.


Positive,Negative,Stressed .and Add Tweet
Filter View all Your Friends

View all friend request and ResponseList Create Tweet by Tweet name, Tweet description,
Tweet Image,Tweet date
all Tweets micro-blog with its user
details
View Revisited product pages
View all your created Tweets and find
View Positive , negative (-)Emotion Tweet pos,neg,Stress emotions on your Tweets

reviews ,View StressEmotion Tweets


View all your friends tweets and retweet by
feeding your sentiments or comment
View total tweets and find number ofpos,

neg and stressed tweets List of search

historyFind No. Of +ve,or –ve or stressed

Tweets emotion in chart


CHAPTER – VI

SYSTEM IMPLEMENTATION

Module Description:

 Data collection
 Tweet Classification
 Attribute Categorization
 Hybrid model integrating CNN with FGM

Data Collection:

 To lead perceptions and assess a successive model, initially gather a set of datasets
utilizing diverse naming techniques.
 Social media is publicly sourced information that offers a completely new reference of
data researchers and marketers never had in the past.
 With every post, conversation and site or app visit, a user leaves behind pieces of
information about themselves.
 Social networks constitute a huge amount of consumer "big data." The average global
Internet user spends two and a half hours daily on social media, and their activity reveals
a great deal about what makes them tick.

Tweet Classification:

 Every day millions of twitter user tweetstheir views on various topics using short
messages of 140 characters length.
 Tweet classification is a process of classifying the tweets based on the topics using the
keywords of the tweets as feature.
 Twitter users tweet their views in the form of short text messages. Twitter topic
classification is classifying the tweets in to a set of predefined classes.
 A new tweet classification Method that makes use of tweet features like URL's in the
tweet, tweeted tweets and influential users tweet is proposed.

Attribute Categorization:

 A form of multilevel categorization. It is not strictly hierarchical. It allows the use of


category duplicates to indicate value combinations.
 It can be used to illustrate various complaint reasons and returned products by using
categories in a category schema. The complaint and the various products in the
categorization schema can appear as duplicates, but the different complaint reasons
would each be separate categories.
 It implies that objects are grouped into categories, usually for some specific purpose.
Ideally, a category illuminates a relationship between the subjects and objects of
knowledge Classical categorization.
 To address the issue of stress recognition, we initially characterize two arrangements of
ascribes to quantify the distinctions of the stressed and non-stressed on user via web
based networking media stages.

Hybrid model integrating CNN with FGM:

 A unified hybrid model integrating CNN with FGM to leverage both tweet content
attributes and social interactions to enhance stress detection.
 To build several stressed-twitter-posting datasets by different ground-truth labeling
methods from several popular social media platforms and thoroughly evaluate our
proposed method on multiple aspects.
 To carry out in-depth studies on a real-world large scale dataset and gain insights on
correlations between social interactions and stress, as well as social structures of stressed
users.
CHAPTER – VII

SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies and/or a finished product. It is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.

TYPES OF TESTING
UNIT TESTING
Unit testing involves the design of test cases that validate that the internal program logic
is functioning properly, and that program input produces valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as
two distinct phases.

Test Strategy and approach:

Field testing will be performed manually and functional tests will be written in detail.

Test objectives:

 All field entries must work properly.


 Pages must be activated from the identified link.
 The entry screen, messages and responses must not be delayed.
 Features to be tested

INTEGRATION TESTING

Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.

Software integration testing is the incremental integration testing of two or more


integrated software components on a single platform to produce failures caused by interface
defects.

The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.

FUNCTIONAL TESTING

Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation and user manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures : interfacing systems or procedures must be invoked.


Organization and preparation of functional tests is focused on requirements, key
functions, or special test cases. In addition, systematic coverage pertaining to identify

Business process flows; data fields, predefined processes, and successive processes must
be considered for testing. Before functional testing is complete, additional tests are identified and
the effective value of current tests is determined.

SYSTEM TESTING
System testing ensures that the entire integrated software system meets requirements. It
tests a configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphsizing pre-driven process links and integration points.

WHITE BOX TESTING


White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.

BLACK BOX TESTING


Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot “see” into it. The test provides inputs and
responds to outputs without considering how the software works.

ACCEPTANCE TESTING
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.

OTHER TESTING METHODOLOGIES

User Acceptance Testing


User Acceptance of a system is the key factor for the success of any system. The system
under consideration is tested for user acceptance by constantly keeping in touch with the
prospective system users at the time of developing and making changes wherever required. The
system developed provides a friendly user interface that can easily be understood even by a
person who is new to the system.

Output Testing

After performing the validation testing, the next step is output testing of the proposed
system, since no system could be useful if it does not produce the required output in the specified
format. Asking the users about the format required by them tests the outputs generated or
displayed by the system under consideration. Hence the output format is considered in 2 ways –
one is on screen and another in printed format.

Validation Checking

Validation checks are performed on the following fields.

Text Field:

The text field can contain only the number of characters lesser than or equal to its size.
The text fields are alphanumeric in some tables and alphabetic in other tables. Incorrect entry
always flashes and error message.

Numeric Field:
The numeric field can contain only numbers from 0 to 9. An entry of any character
flashes an error messages. The individual modules are checked for accuracy and what it has to
perform. Each module is subjected to test run along with sample data. The individually tested
modules are integrated into a single system. Testing involves executing the real data
information is used in the program the existence of any program defect is inferred from the
output. The testing should be planned so that all the requirements are individually tested.

A successful test is one that gives out the defects for the inappropriate data and produces
and output revealing the errors in the system.
LOGIN:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Admin server Login...</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<link href="style.css" rel="stylesheet" type="text/css" />
<script type="text/javascript" src="js/cufon-yui.js"></script>
<script type="text/javascript" src="js/arial.js"></script>
<script type="text/javascript" src="js/cuf_run.js"></script>
<style type="text/css">
<!--
.style1 {font-size: 16px}
.style3 {
font-size: 24px;
color: #FF0000;
font-family: "Times New Roman", Times, serif;
}
.style4 {
font-size: 18px;
font-family: "Times New Roman", Times, serif;
font-weight: bold;
}
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
<h1><a href="index.html" class="style1"></a></h1>
</div>
<div class="menu">
<ul>
<li><a href="index.html"><span>Home</span></a></li>
<li><a href="U_Login.jsp"><span>OSN User</span></a></li>
<li><a href="A_Login.jsp" class="active"><span>Admin Server</span></a></li>

</ul>
</div>
<div class="clr"></div>
</div>
<div class="headert_text_resize"><img src="images/text_area_img.jpg" alt="" width="395"
height="396" />
<div class="textarea">
<h2>Detecting Stress Based on Social Interactions in Social Networks</h2>
<p> ----- Stress detection, factor graph model, micro-blog, social media, healthcare, social
interaction.</p>
</div>
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
<div class="body">
<div class="body_resize">
<div class="left">
<h2 align="justify">&nbsp;</h2>

<h2>Welcome to Server Login </h2>

<form id="form1" name="form1" method="post" action="authentication.jsp?type=<


%="server"%>">
<table width="660" align="left">
<tr>
<td width="162" height="35">User Name (required)</td>
<td width="486"><input id="name" name="userid" class="text" /></td>
</tr>
<tr>
<td height="38">Password (required)</td>
<td><input type="password" id="password" name="pass" class="text" /></td>
</tr>

<tr><td></td>
<td>
<input name="imageField" type="submit" class="style3" id="imageField" value="Login" />
<input name="Reset" type="reset" class="style3" value="Reset" /></td>
</tr>

</p>
<p>&nbsp;</p>
</table>
</form>
</div>
<div class="right">
<h2>Sidebar Menu</h2>
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="A_Login.jsp">Admin Server </a></li>
<li><a href="U_Login.jsp">OSN User </a></li>
<li></li>
</ul>
</div>
<div class="clr"></div>
</div>
</div>
<div class="FBG">
<div class="FBG_resize">
<div class="blok">
<h2><span>Image</span> Gallery</h2>
<img src="images/gallery_1.gif" alt="" width="68" height="68" /><img
src="images/gallery_2.gif" alt="" width="68" height="68" /><img src="images/gallery_3.gif"
alt="" width="68" height="68" /><img src="images/gallery_4.gif" alt="" width="68"
height="68" /><img src="images/gallery_5.gif" alt="" width="68" height="68" /><img
src="images/gallery_6.gif" alt="" width="68" height="68" />
<div class="clr"></div>
<h2>&nbsp;</h2>
</div>
<div class="clr"></div>
</div>
</div>
</div>
<div align=center></div></body>
</html>
RESULT:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>All tweets Results ...</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<link href="style.css" rel="stylesheet" type="text/css" />
<script type="text/javascript" src="js/cufon-yui.js"></script>
<script type="text/javascript" src="js/arial.js"></script>
<script type="text/javascript" src="js/cuf_run.js"></script>
<style type="text/css">
<!--
.style1 {font-size: 16px}
.style2 {color: #FF00FF}
.style3 {color: #00FFFF}
-->
</style>
</head>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
<h1><a href="index.html" class="style1"></a></h1>
</div>
<div class="menu">
<ul>
<li><a href="index.html"><span>Home</span></a></li>
<li><a href="U_Login.jsp"><span>OSN User</span></a></li>
<li><a href="A_Login.jsp" class="active"><span>Admin Server</span></a></li>
</ul>
</div>
<div class="clr"></div>
</div>
<div class="headert_text_resize"><img src="images/text_area_img.jpg" alt="" width="395"
height="396" />
<div class="textarea">
<h2>Detecting Stress Based on Social Interactions in Social Networks</h2>
<p> ----- Stress detection, factor graph model, micro-blog, social media, healthcare, social
interaction.</p>
</div>
<div class="clr"></div>
</div>
<div class="clr"></div>
</div>
<div class="body">
<div class="body_resize">
<div class="left">
<h2 class="style2"><em>Results Details... </em></h2>
<p>&nbsp;</p>
<p class="style3">1. <a href="A_ViewPosResults.jsp">View Positive Emotion Analyis</a>
<p class="style3">2. <a href="A_ViewNegResults.jsp">View Negative Emotion
Analysis</a></p>
<p class="style3">3. <a href="A_ViewStressResults.jsp">View Stressed Emotion
Analysis</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p align="right" class="style2">&nbsp;</p>
<p align="right" class="style2"><a href="A_Main.jsp">Back</a></p>
<div class="cleaner_h40"></div>
</div>
</div>
<div class="right">
<h2>Server Menu</h2>
<ul>
<div class="gadget">
<p><a href="A_Main.jsp">Home</a></p>
<p><a href="A_Login.jsp">LogOut </a></p>
<p>&nbsp;</p>
<p class="star">&nbsp;</p>
</div>
</ul>
</div>
<div class="clr"></div>
</div>
</div>
<div class="FBG">
<div class="FBG_resize">
<div class="blok">
<h2><span>Image</span> Gallery</h2>
<img src="images/gallery_1.gif" alt="" width="68" height="68" /><img
src="images/gallery_2.gif" alt="" width="68" height="68" /><img src="images/gallery_3.gif"
alt="" width="68" height="68" /><img src="images/gallery_4.gif" alt="" width="68"
height="68" /><img src="images/gallery_5.gif" alt="" width="68" height="68" /><img
src="images/gallery_6.gif" alt="" width="68" height="68" />
<div class="clr"></div>
<h2>&nbsp;</h2>
</div>
<div class="clr"></div>
</div>
</div>
</div>
<div align=center></div></body>
</html>
ADMIN:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>All tweets...</title>
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<link href="style.css" rel="stylesheet" type="text/css" />
<script type="text/javascript" src="js/cufon-yui.js"></script>
<script type="text/javascript" src="js/arial.js"></script>
<script type="text/javascript" src="js/cuf_run.js"></script>
<style type="text/css">
<!--
.style1 {font-size: 16px}
.style6 {
color: #CC0066;
font-style: italic;
font-weight: bold;
}
-->
</style>
</head>
<%@ include file="connect.jsp" %>
<body>
<div class="main">
<div class="header">
<div class="header_resize">
<div class="logo">
<h1><a href="index.html" class="style1"></a></h1>
</div>
<div class="menu">
<ul>
<li><a href="index.html" class="active"><span>Home</span></a></li>
<li><a href="U_Login.jsp"><span>OSN User</span></a></li>
<li><a href="A_Login.jsp"><span>Admin Server</span></a></li>
</ul>
CHAPTER – VIII

CONCLUSION
It presented a framework for detecting users’ psychological stress states from users’ weekly
social media data, leveraging tweets’ content as well as users’ social interactions. Employing
real-world social media data as the basis, we studied the correlation between user’ psychological
stress states and their social interaction behaviors. To fully leverage both content and social
interaction information of users’ tweets, we proposed a hybrid model which combines the factor
graph model (FGM) with a convolution neural network (CNN).In this work, we also discovered
several intriguing phenomena of stress. We found that the number of social structures of sparse
connection (i.e., with no delta connections) of stressed users is around 14 percent higher than that
of non-stressed users, indicating that the social structure of stressed users’ friends tend to be less
connected and less complicated than that of non-stressed users. These phenomena could be
useful references for future related studies.
APPENDICES

SAMPLESCREEN SHOT

You might also like