Introduction Company Profile HiddenBrains Infotech - is an ISO 9001:2008 and Microsoft Certified Partner Company in Ahmedabad, India with proven competencies in custom software development, Android, iPhone App Development, ASP.Net, Open Source, PHP, Web Application Development and offshore IT outsourcing services. Expertise in the design and development of robust and scalable web and mobile applications development. HiddenBrains is a company providing professional-level customized solution, Web applications development, full-featured online shopping stores, Software development, Mobile app development services. We design, manage, build and maintain high quality solutions for a wide range of businesses and individuals. We have built our business by working with clients to ensure the solutions we develop are profitable for them. With 120+ full time experienced computer professionals working for us,Our forte is to take your requirement, apply our understanding of web methodologies and propose innovative & technical features and site enhancements that help you to achieve your goals - while taking into account commercial considerations & timeframe with high level of communication and support. By choosing HiddenBrains, you get more than our programming and design work. You also get our years of experience and expertise.
Company
HiddenBrains is an innovative technology industry focused, business driven professional services firm. From web design and development to custom applications, our talented people work intelligently to solve and manage clients needs. We serve to deliver cost effective interactive technology and design solutions without compromising on quality. With clients globally, Hidden Brains produces innovative, high-performance Web sites for companies in multiple industries including hospitality, retail, wholesale, communications and so on. Using the latest programming and design technologies, Hidden Brains creates the optimal, effective online as well as desktop experience for every client. We can work within your existing corporate ID or create one for you to establish a sense of branding for your need.
Our Commitment
We take pride in our on time delivery and ability to meet quick turn around requests while exceeding customer quality demands. Customer Satisfaction continues to be of utmost importance to HiddenBrains, as do Consistent quality, Constant innovation, Technology enhancement, Process improvement and Customer orientation. We have developed our core competence and
aligning objectives at all levels so as to realize synergy in operations. It is our collaborative approach, creative input, and emphasis on economical solutions that has allowed us to develop an impressive and diverse client list. HiddenBrains believes in constant restructuring, adds new services and enhances infrastructure and increases the number of full time employees. If your company is in need of Offshore PHP, ASP.Net, Coldfusion, C#, C++ Software development services, HiddenBrains is the best choice. We are sure that our relations will be mutually beneficial, and we will be able to satisfy your needs.
Current system
Lots of social networking applications are available today. Those applications do not facilitates users to search mates on the basis of the current location. Proposed system Introduction In the world of social Networking, lots of applications are available each with new variety of features. Each User demands different requirements. iDate is a social networking plus dating application with the requirement to enable users to search dating partners on the basis of the location they are geographically present. Idate
Project profile
: : : : : : :
iDate Idate is designed for people interested in Dating. Mac Os X Objective C Sql Server 2005
Idate, a social networking application is specially designed, for people interested in Dating, to create and maintain a bond of relation between people near around. People can make relationships while on the move with the people who are near to them. User can create his/her profile, manage his profile, find matching profile for dating. User can also maintain a channel of communication with other users through messages, winks and emails to other users.
To instantly connect compatible singles at the most present time and location. To create a profile, define the person you want to meet and instantly connect with singles near you - right now. Browse singles profiles in near you and compatible with you Check out who is online RIGHT NOW and meet singles in their area who are online right now Contact singles: send and receive winks, flirts and messages Use the iPhone app while on the go Meet users from almost every country Advance search to find your perfect match The fastest and most fun way to date new compatible singles near you Advantages Improved application speed, load time and performance Added functionality for Image gallery Various graphic enhancements Better search Simplified sign up Email features Drawback of existing system and alternatives
Not a single application from the Existing applications facilitates users to search for a dating partner while on the move. Idate is designed that it will filter the listed users on the basis of the distance of that user from other users. Wherever you are you can use your iphone to connect and meet other users using iDate application.
feasibility studies which will measure the technical, operational, schedule and economic feasibility of the app which depends on its practical and competitive advantage Technical feasibility Technical feasibility of any application is the availability of technology for the proposed system. Company owns good number of Mac Desktops with high configuration, hence application is technically feasible for the company. Economical feasibility
There is no overhead cost for software or hardware. Hence iDate is economically feasible.
Operational feasibility iDate is known for its highly user friendly interface. For applications like iDate, it is highly expected that the application should be very easy to use for every levels of users. Hence, we can conclude that iDate is operationally feasible. Time Duration
We were having 4 months to develop the entire application and we scheduled our work to cope us with the defined time limit. Resources
When developing any application we need proper environmental resources as well as man power. For developing iDate, we have available computer system with Proper configuration. For solving any query and problems faced during development of such application, we have provision of Internet Connection and support of company employees.
This application was developed with Incremental model. The incremental model delivers software in small but usable pieces, called increments. In general, each increment builds on those that have already been delivered.
Since the deadlines were too close , using this model, we were able to satisfy the client requirements with a new module. The Incremental Model is type of Evolutionary Model approach. Evolutionary models are iterative. They are characterized in a manner that enables software engineers to develop increasingly more complete versions of the software. The incremental model combines elements of the linear sequential model with the iterative philosophy of prototyping In the first increment, often called a core product, basic requirements are addressed, but many supplementary features (some known, others unknown) remain undelivered. The core product is used by the user (or undergoes detailed review). As a result of use and/or evaluation, a plan is developed for the next increment. The plan addresses the modification of the core product to better meet the needs of the customer and the delivery of additional features and functionality. This process is repeated above the delivery of each increment, until the complete product is produced. Early increments are stripped down versions of the final product, but they do provide capability that serves the user and also provide a platform for evaluation by the user.
Incremental development is particularly useful when staffing is unavailable for a complete implementation by the business deadline that has been established for the project.
We were delivering a small module at regular interval and regular feedback was gained from the client so that changes can be reflected quickly.
Scheduling
Risk Analysis Risks Will the system be able to meet all its objectives? Will the application be able to meet its requirements? What if implementation fails? Larger no. of users estimated. Category Project risk Probability 80% Impact 1 RMMM Proper definition of project risk Proper requirement gathering process Using other services.
40%
80%
Efficient 50% 2 database management Accurate Inability to meet estimation of Schedule risk 80% 1 the deadline. time A Technological Keeping backup Technical risk 90% 1 failure ready Provide Does staff have the People risk 70% 2 necessary right skills? training Impact values-1-Catastropic, 2-Critical, 3-Marginal, 4-Neglible
Detailed SRS:
Modules: Registration Description: Input Events Output Constraints User Login Description: Input Events Output Constraints Find Match Description: Input Events Output Constraints Profile Management Description: Input Events Output Constraints Messages Description: Input Events Output Constraints
Constraints
Login
Manage Localization
Manage Advertisement
Admin
Manage Promotion
Manage Events
Manage Tracking
Logout
Search User
Delete
Edit
Admin
Search User
Suspend/Unsuspend User
R
Delete
Edit
View Album
Delete Photo
View List
Search
Add new
Delete
Edit
Admin
iphone Module
Registration
Login
Find Match
Manage Settings
Manage Profile
Iphone User
Manage Account
Manage Messages
View Advertisements
Upgrade Application
FIND MATCH
Updates Location
Filter
My Profile
Manage Album
Iphone User
Send Message
Flirt
Add to hotlist
Iphone User
Report Abuse
FILTER
Select Compatibility
User Location
User Status
Profile
Reset All
Settings
Account Details
Log out
Iphone User
Erase Account
Email Alerts
Once a week
Iphone User
Account Details
Manage Details
View Album
Login Module
Loading Screen
Forgot Password
New User
Enter Application
Find Match
All
Near By
Hotlist
Settings
Update Location
Filter
Send Message
Instant Wink
Flirt
Add To Hotlist
Report Abuse
Sequence Diagram:
User
Application
Receives
Sends
User
DataBase
Database design 1. iDate_TermsCondition Purpose: Primary Key: Foreign Key: Field Name Terms_Id Description 2. iDate_Users Purpose: Primary Key: Foreign Key: Field Name User_Id User_Email User_Password IsSuspend Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Constraint PK Description User Code Store User Email Address Store User Password user is suspend or not Store User Access Level code Store delete flag if flag is true means deleted User created date Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) text Constraint Description PK Null Terms Code Terms Description
varchar(30) Not Null varchar(20) Not Null bit Not Null Not Null Not Null Not Null
3. iDate_UserSettings Purpose: Primary Key: Foreign Key: Field Name Setting_Id User_Id GPS Online_Status Messages Winks Flirts Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Number(5) bit bit bit bit Constraint Description PK FK Not Null Not Null Not Null Not Null Store setting code Store user code Store user GPS status User online status User set Message alerts bit[True means on] User set Winks alerts bit[True means on] User set Flirts alerts bit[True means on]
4. iDate_BlockedUser Purpose: Primary Key: Foreign Key: Field Name Block_Id User_Id Block_Date Stores Terms and conditions for using this application. Terms_Id NA Field Type Constraint Description User Block code User Code User block code
5. iDate_UserProfile Purpose: Primary Key: Foreign Key: Field Name Profile_Id User_Id User_FirstName User_LastName User_NickName User_Gender User_Dob Stores Terms and conditions for using this application. Terms_Id NA Field Type Constraint Description Number(5) PK User Profile code Number(5) FK User code varchar(30) Not Null User Firstname varchar(20) Null User Lastname varchar(20) Null User NickName User Gender male means bit Null true and female means false datetime Null Store user Date of birth
User_Address User_City User_State User_Country User_Picture User_Seeking User_Description User_Child User_EyeColor User_Height User_BodyType User_HairColor User_Personality User_Education User_Entertainment User_DinnerChoice User_Sport User_DressCode User_Drink User_Smoke User_Pets User_PerferredLocation User_MorningFix User_MeetingLocation User_Personal_Description User_Star_Sign User_Number(5)nerest User_ProfileStatus User_Basis User_AgeGro
Varchar(200) Number(5) Number(5) Number(5) varchar(70) Varchar(50) Varchar(200) varchar(40) Varchar(10) varchar(5) varchar(20) varchar(10) varchar(20) varchar(20) varchar(20) varchar(20) varchar(10) varchar(20) varchar(15) varchar(20) varchar(20) varchar(20) varchar(20) varchar(20) Varchar(100) varchar(10) varchar(50) bit varchar(30) varchar(10)
Null FK FK FK Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null Null
Store user address Store user city code Store user state code Store user country code Store user picture url address Store user seeking user commnets Store user Child Information User eye color User height User body type User Hair color Store user personality information Store user education information Entertainment information Store user dinner choice information Number(5)erested Sport information User dresscode information Drink realeted information store Smoking releted information store User have pets than store information User preferred location for datting User store morning time for meeting User meeting location Store personal detail User store star sigbn User store Number(5)nerested area User profile status User store Basis User age group
6. iDate_LoginHistory Purpose: Primary Key: Foreign Key: Field Name Login_Id User_Id UserLng UserLat Login_Date Logout_Date Status Device_Id Device_Token CurrentLocation Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Number(5) float float datetime datetime bit Varchar(50) Varchar(50) Constraint PK FK Null Null Not Null Null Null Null Null Description Store Login id Store user id Store user current location logitute Store user current location latitute User login date User Logout date User status Store user device id Store user device token Store user current location
Varchar(200) Null
7. iDate_AdminUsers Purpose: Primary Key: Foreign Key: Field Name Admin_User_Id User_FirstName User_LastName UserName Password User_Email User_CreatedDate Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Varchar(50) Varchar(30) Varchar(30) Varchar(20) Varchar(50) datetime Constraint PK Null Null Null Null Null Not Null Description Store admin user id Admin user firstname Admin user lastname Store admin username Store admin password Store admin user email Admin user created date
8. iDate_UserHotList Purpose: Primary Key: Foreign Key: Field Name UserHotList_Id User_Id 9. iDate_Inbox Purpose: Primary Key: Foreign Key: Field Name Message_Id Sender_User_Id Receiver_User_Id Message_Type Message_Description Message_Date Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Number(5) Number(5) Number(5) Varchar(500) datetime Constraint PK Not Null Not Null Not Null Null Not Null Description Store message id Store sender user id Store receiver user id Store message type Message description Store message date Stores Terms and conditions for using this application. Terms_Id NA Field Type Constraint Description Store iphone user hotlist id Store iphone user id
Number(5) PK Number(5) FK
10. iDate_PhotoGallery Field Name Gallery_Id User_Id Image_Name Field Type Number(5) Number(5) Constraint PK FK Description Store gallery id Store User id Image Name
11. iDate_AccessLevel Purpose: Primary Key: Foreign Key: Field Name Stores Terms and conditions for using this application. Terms_Id NA Field Type Constraint Description PK Store User Access level id Store Access name
User_AccessLevel_Id Number(5) Access_Name 12. iDate_Event Purpose: Primary Key: Foreign Key: Field Name Event_Id Event_Title Event_ThumbImage Event_BigPicture Event_Description Event_Link
Varchar(30) Null
Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Varchar(30) Varchar(50) Varchar(50) Constraint Description PK Not Null Null Null Null Store event id Store event name Store event thumbimage name Store event big picture Event short description Event description Event Link
Event_ShortDescription Varchar(50)
13. iDate_AdvertisementTargetBy Purpose: Primary Key: Foreign Key: Field Name Advertisement_Id WorldWide Country_Id State_Id City_Id Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) bit Number(5) Number(5) Number(5) Constraint Description PK Null FK FK FK Store Advertisement id Advertisement published worldwide or not Store country id Store state id Store city id
14. iDate_Advertisement Purpose: Primary Key: Foreign Key: Field Name Advertisement_Id Adv_Name Adv_Source Adv_Click_Link Adv_CreatedDate Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Varchar(50) Varchar(100) Varchar(200) datetime Constraint PK Null Null Null Null Description Store advertiment id Store advertisement name Store advertisement source advertisement link url advertisement created date
15. iDate_HotList_Message Purpose: Primary Key: Foreign Key: Field Name HotList_Id User_Id Message_Id 16. iDate_Country Purpose: Primary Key: Foreign Key: Field Name Country_Id Country_Name Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Constraint Description PK Store country id Store country name Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Number(5) Number(5) Constraint Description FK FK FK Store user hot list id Store user id Store message id
Varchar(50) Null
17. iDate_State Purpose: Primary Key: Foreign Key: Field Name State_Id Country_Id State_Name 18. iDate_City Purpose: Primary Key: Foreign Key: Field Name City_Id State_Id City_Name Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Number(5) Constraint Description PK Not Null Store city id Store state id Store city name Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Number(5) Varchar(30) Constraint PK FK Null Description Store state id Store country id Store state name
Varchar(30) Null
19. iDate_AdvertisementClick Purpose: Primary Key: Foreign Key: Field Name Click_Id Advertisement_Id Click_Count Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Number(5) Number(15) Constraint Description PK FK Not Null Store click id Store advertisement id Advertisement click count
20. iDate_AdvertisementImpression Purpose: Primary Key: Foreign Key: Impression_Id Advertisement_Id Impression_Count Stores Terms and conditions for using this application. Terms_Id NA Number(5) Number(5) Number(15) PK FK Not Null Store impression id Store advertisement id Store impression count of perticular advertisement
21. iDate_Promotion Purpose: Primary Key: Foreign Key: Field Name Promotion_id Promotion_Title Promotion_BigPicture Promotion_Link Promotion_Description Stores Terms and conditions for using this application. Terms_Id NA Field Type Number(5) Varchar(50) Varchar(50) Constraint Description PK Null Null Null Store promotion id Store promotion title Store promotion thumbimage Store promotion big picture Store promotion Link Store promotion description
Promotion_ThumbImage Varchar(50)
Interface design
2. Splace screen
Testing Software Testing is a testing which test the data and examining the output of the software and also check the operational behavior of the software that it perform as per the requirements.
Statistical Testing:
Statistical Testing is used to test the programs performance and reliability and to
check how it works under operational conditions. Tests are designed to reflect the actual user inputs and their frequency. The stages involved in the static analysis for this system are follows.
DEFECTING TESTING:
Testing is the process of exercising a program with the specific intent of finding errors prior to delivery to the end user. A good test case is of finding an as-yetundiscovered error. A successful test is one that uncovers an as-yet-undiscovered error. Testing is useful for validation and verification, which ensure that software conforms to its specification and meets the needs of the software customer. In the Idate Social networking System, we tested one of two ways: White-Box Testing Black-Box Testing
White Box Testing: White Box Testing, sometimes called glass-box testing, is tests that are run an application with the knowledge of the internal working of the code base.
In Idate Social networking System i consider to type of testing in white-box testing are as follows: Component test: Users Details Module:User specific class Test case description: All functions of user class. Result Step Input test The User can login 1 of his account. Expected In DB store the administrator login id and password automatically. The User can change In DB store/change the Client 2 his/her password. User Can Add, 3 Update, Delete user Information. User Can Compose, 4 Send, Delete,view The user message Information user View 5 advertisement, events, promos Fields like Event_name, Promos_name, advertisemen_name As per expected Pass login id and password automatically. All the necessary data are store in DB i.e. User_id, User_name, etc. Fields like Message user_id store in DB. As per expected Pass As per expected Pass As per expected Pass Actual As per expected Pass Pass/Fail
Component test:Master Detail Module:Admin Panel Test case description:All functions of administrator class.
Step
Input test
Pass/ Fail
Administrator can manage fields like location, category, reference about user &it reflects to the DB.
Pass
Administrator can send the 2 SMS-Email. Admin can create user, assign 3 right &set profile
All the detail of the SMS-Email are store in DB. All the detail of user in DB.
Black-Box Testing is testing without knowledge of the internal workings of the item being tested. For example, when black box testing is applied to software engineering, the tester would only know the "legal" inputs and what the expected outputs should be, but not how the program actually arrives at those outputs.
In Idate Social Networking i consider to type of testing in black-box testing are as follows:
Step
Input test
Pass / Fail
Login is default tab The tab display proper. An alert message popup when user will enter wrong format of password.
Pass
As per expected
Pass
3 4
User can see the detail about friends User can get the sign up after the fill-up the details.
As per expected
Pass Pass
User can get the sign As per expected up after the fill-up the form. Many services are requird in this module. As per expected
Pass
Future enhancement
Reference