BlogWall at Kent Ridge MRT Station Janaka Prasad 02/07/2008.

Slides:



Advertisements
Similar presentations
JQuery MessageBoard. Lets use jQuery and AJAX in combination with a database to update and retrieve information without refreshing the page. Here we will.
Advertisements

AS ICT Finding your way round MS-Access The Home Ribbon This ribbon is automatically displayed when MS-Access is started and when existing tables.
MS-Access XP Lesson 1. Introduction to MS-Access Database Management System Software (DBMS) Store data in databases Database is a collection of table.
IntelaTrac: The Right Tool for the Job
Computer Science & Engineering 2111 Text Functions 1CSE 2111 Lecture-Text Functions.
An Introduction to XML Based on the W3C XML Recommendations.
July 2010 D2.1 Upgrading strategy Javier Soto Catalog Release 3. Communities.
User Training. Step 1 Press Ctrl-I or choose File > Login, this will open the Login window. Figure 1-1 shows the Login window. Figure 1-1 Login Window.
Analyzing Systems Using Data Dictionaries Systems Analysis and Design, 7e Kendall & Kendall 8 © 2008 Pearson Prentice Hall.
Recruiting Marketing CRM Integration
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Guide to Oracle10G1 Introduction To Forms Builder Chapter 5.
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
BA271 Week 7 Lecture Building the database Dave Sullivan.
Week 2 IBS 685. Static Page Architecture The user requests the page by typing a URL in a browser The Browser requests the page from the Web Server The.
DASAN NETWORKS GPON Training
ASP.NET Programming with C# and SQL Server First Edition Chapter 8 Manipulating SQL Server Databases with ASP.NET.
CCNA 2 v3.1 Module 2.
Direct Congress Dan Skorupski Dan Vingo. Inner workings Reminder: MVC design pattern Procedural view: From request to response o Request passed to a view.
Creating Web Page Forms
Chapter 9 Overview  Reasons to monitor SQL Server  Performance Monitoring and Tuning  Tools for Monitoring SQL Server  Common Monitoring and Tuning.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
Form Handling, Validation and Functions. Form Handling Forms are a graphical user interfaces (GUIs) that enables the interaction between users and servers.
1 of : Single Point Cash Receipting / DA0382-w1 Last updated: Single Point Cash Receipting.
© Yanbu University College YANBU UNIVERSITY COLLEGE Management Science Department © Yanbu University College Module 6:WEB SERVER AND SERVER SIDE SCRPTING,
Forms and Form Controls Chapter What is a Form?
Microsoft Access 2000 Creating Tables and Relationships.
Open Source Server Side Scripting ECA 236 Open Source Server Side Scripting Cookies & Sessions.
Tutorial 14 Working with Forms and Regular Expressions.
Air Quality System Precision and Accuracy Data Transaction Generator (AQSP&A) Training Session.
England User Group Development Presentation 2006/7 Development review broadcasting: not done, word mail merge to used. Auto-upload of data:
BlogWall at Kent Ridge MRT Station Janaka Prasad 09/06/2008.
Mastering Char to ASCII AND DOING MORE RELATED STRING MANIPULATION Why VB.Net ?  The Language resembles Pseudocode - good for teaching and learning fundamentals.
LLRP GUI Client User Guide
Accessing MySQL with PHP IDIA 618 Fall 2014 Bridget M. Blodgett.
15/10/20151 PHP & MySQL 'Slide materials are based on W3Schools PHP tutorial, 'PHP website 'MySQL website.
Installing and Using MySQL and phpMyAdmin. Last Time... Installing Apache server Installing PHP Running basic PHP scripts on the server Not necessary.
Web Scripting [PHP] CIS166AE Wednesdays 6:00pm – 9:50pm Rob Loy.
Using Client-Side Scripts to Enhance Web Applications 1.
BlogWall at Kent Ridge MRT Station Janaka Prasad 11/07/2008.
ASP.NET The Clock Project. The ASP.NET Clock Project The ASP.NET Clock Project is the topic of Chapter 23. By completing the clock project, you will learn.
Overview Managing a DHCP Database Monitoring DHCP
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
© 2006 Cisco Systems, Inc. All rights reserved.1 Connection 7.0 Serviceability Reports Todd Blaisdell.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
SMS Software Distribution. Overview  Explaining How SMS Distributes Software  Managing Distribution Points  Configuring Software Distribution and the.
Analyzing Systems Using Data Dictionaries Systems Analysis and Design, 8e Kendall & Kendall 8.
DataFlow Diagram – Level 0
 Shopping Basket  Stages to maintain shopping basket in framework  Viewing Shopping Basket.
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
CSC 2720 Building Web Applications Basic Frameworks for Building Dynamic Web Sites / Web Applications.
An Introduction to Programming with C++ Sixth Edition Chapter 13 Strings.
20 Copyright © 2008, Oracle. All rights reserved. Cache Management.
T U T O R I A L  2009 Pearson Education, Inc. All rights reserved Address Book Application Introducing Database Programming.
Description and exemplification use of a Data Dictionary. A data dictionary is a catalogue of all data items in a system. The data dictionary stores details.
Oracle Business Intelligence Foundation – Testing and Deploying OBI Repository.
5 Copyright © 2008, Oracle. All rights reserved. Testing and Validating a Repository.
Configuring MQ Connections and Handlers for MQ adapter 6.5 July 2008.
MySQL Tutorial. Databases A database is a container that groups together a series of tables within a single structure Each database can contain 1 or more.
VOCAB REVIEW. A field that can be computed from other fields Calculated field Click for the answer Next Question.
ASP.NET Programming with C# and SQL Server First Edition
Excel Tutorial 8 Developing an Excel Application
Chapter 7: Identifying Advanced Attacks
SQL and SQL*Plus Interaction
Data Validation and Protecting Workbook
Free Microsoft Accurate Study Material & Valid Questions
Tutorial 12 – Security Panel Application Introducing the Select Case Multiple-Selection Statement Outline Test-Driving the Security Panel Application.
Using SQL*Plus.
Presentation transcript:

BlogWall at Kent Ridge MRT Station Janaka Prasad 02/07/2008

Project Plan

SMS reading and writing to database/ Testing Task 10 – completed SMS read by the SMSReader written to 2 tables “sms”, “sms_log” “sms_log” will log of all the SMS received by the system Status in “sms” indicate who to process it next Status = 0  SMS Processor application Status = 1  Display application Valid in “sms” indicate validity of the SMS Valid = 0  Invalid SMS Valid = 1  Valid SMS

SMS reading and writing to database/ Testing Base on the traffic of the system “sms_log” table may grow very rapidly necessary to clear contents of this table from time to time Developed a tool to do this task

SMS reading and writing to database/ Testing

Processing SMS from the database/ Testing Task 12 – completed Reading configuration file Polling Banned words Invalid characters POSTagger Finding poetry

Reading configuration file How the application is going to work is set using the configuration file Located at Data\settings.cfg Data read from the config file are No. of keywords selected from the SMS Default 3 No. of synonyms selected for each keyword Default 1 Connect to Internet to generate synonyms? 1  YES 0  NO Remove banned words? 1  YES 0  NO Maximum length of the SMS Default 100 Polling enabled? 1  YES 0  NO

Polling Polling data is held in “poll” and “poll_answers” tables

Polling

Banned words If the SMS contains banned words we can not display them “swearwords” table hold all the banned words When the system initialize all the words in that table get loaded to a list to compare against the words in the SMS

Invalid characters If the SMS contains characters that the POSTagger can not process it will generate an error All the chars that can be processed by the system get loaded to a list when the system initialize The SMS is checked to see whether it contains any chars other than what is in the list

Finding the poetry The application goes to a infinite loop and check the “sms” table with entries with status==0 Check for length of the SMS If > Max length  error Check SMS is poll answer Update poll answers table Check for invalid chars Set valid=0 Process message with POSTagger If return text length == 0 then error

Finding the poetry Check No. of words in the SMS Less than 3 unique words  valid=0 Check for length of each word in the SMS If > 40  malicious attack?  valid=0 Check for banned words Error Calculate emotional weight of the SMS Identify the tag ids in the output string generated by POSTagger Retrieve the tf-idf weight of each word from the database Select maximum weighted words Store results in “sms_text_word”

Finding the poetry

Post each of the selected word to free dictionary website ( Analyze HTML response from the website to find the synonyms for each of the word Retrieve the tf-idf weight of each synonym from the database Select maximum weighted synonyms Store the result in “sms_synonym” table

Finding the poetry Find poetry lines from the database where the selected synonym is used in the same context as in the SMS Select the final poetry line which maximize the tf weight and minimizes emotional weight difference to the users SMS

Data entry 234 poems added to the database

Important points … Testing still processing Shinsuke will come up with the first visuals by this week OpenGL, FreeType