Submitted by
MAITREYEE Reg. no:- 95580020 M.C.A.:- 2008-2011

In partial fulfillment of the requirements for the Degree of the Master of Computer Applications



Page 1



This is to certify that the project report entitled “INTERNET RADIO” FOR ANDROID DEVICES is a bonafide record of the work done by MAITREYEE (Regno.95580020) at PATH PARTNER,BANGLORE for partial fulfillment of the requirements for the award of the Degree in MASTER OF COMPUTER APPLICATIONS by the COCHIN


APRIL 2011

______________ Head of the Department




Page 2

Internal Examiner

External examiner

‘I hereby declare that the project work entitled INTERNET RADIO done for PATH PARTNER, BANGALORE is submitted in partial fulfillment of the requirements for the award of the degree of Master of Computer Applications and it is a report of the original work done by me during the period of January – April 2011 in Cochin University of Science and Technology, Trikkara.



Page 3



in spite of their busy schedule. criticism and valuable guidance were indeed a source of inspiration for me. my Trainer cum project guide who helped me on my project and resolve all the technical as well as other problems related to the project. K. He has the extreme grip over ANDROID fundamentals which were the great tool to me to develop this project. Alexy has helped me so much. It offers the results of valuable contribution of a number of individuals in a direct or indirect manner that helps in shaping and achieving an objective. I profusely thank them for the support provided to me. I am grateful to them for lending their precious time and the patient listening they gave me every time I needed help. but for the guidance provided by Mr Vishal. Mr. This project would not have taken shape. Banglore for his efforts in giving start and his keen interest. I am grateful for their constant support and help. Completing a task is never a one-man effort. Above all I wish to express my heartfelt gratitude to my family. Director of PathPartner Technology Consulting Pvt Ltd. who has always been the singular source of inspiration in all my ventures I have undertaken.Acknowledgement I praise and thanks GOD for the blessings showered upon me and for being with me all through this endeavor without which this work would have been an unfulfilled dream. The guidance and support received from all the members who contributed and who are contributing to this project. was vital for the success of the project. I express a deep sense of gratitude to Mr Keshav karunakar. DCA] and all staff members of the Department of Computer Applications for their endless help and support.V Pramod [HOD. Maitreyee DEPARTMENT OF COMPUTER APPLICATIONS. CUSAT Page 6 . I express my profound gratitude to Dr.

We have the internet radio but it is for a particular device. This proposed system is portable. Music streaming on the Internet is usually referred to as webcasting since it is not transmitted broadly through wireless means. Maybe your favorite station is among them. DEPARTMENT OF COMPUTER APPLICATIONS. Many Internet radio services are associated with a corresponding traditional (terrestrial) radio station or radio network. This is made for android mobile. Android is a mobile operating system initially developed by Android Inc. it is distinct from on-demand file serving. Like categoty that listing the category and after selecting category the station list will be listed. There is no need to define play lists or find and type in URL's. Then we can play radio. much like traditional broadcast media. This is applicable for any android devices. Internet radio services are usually accessible from anywhere in the world. Virtual Radio is based on one single basic functionality : playing a given set of Internet radio channels. Just start up the player and it immediately starts playing audio. CUSAT Page 7 . net radio. Internet radio (also known as web radio. There are many modules.Synopsis Internet Radio is a project work done for PathPartner Technology Consulting Pvt Ltd. presenting listeners with a continuous stream of audio that cannot be paused or replayed. in this respect. Google and other members of the open handset allience collaborated on Android's development and release. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android. Enjoy music. Android was bought by google in 2005. One module is searching. Virtual Radio contains hundreds of Internet radio stations with all sorts of sounds and news. streaming radio and e-radio) is an audio service transmitted via the Internet. Internet radio is also distinct from podcasting. Internet-only radio stations are independent of such associations. talk and news from all over the world right on your mobile phone.Android is based upon a modified version of the linux kernal. which involves downloading rather than streaming. Internet radio involves streaming media.


CUSAT Page 9 . multiple product lines The Founders The founding team of PathPartner comprises of techno-entrepreneurs who have scripted successful careers in the embedded multimedia industry.PathPartner Technology Consulting Pvt Ltd was founded in the mid 2006 with a vision of becoming a leading provider of solutions and expertise driven services to enrich the multimedia experience in today's advanced media centric devices. ODMs & Media Chipset vendors in their new product introductions. The organizational goal of Path Partner is centred on maximizing value for all the stakeholders through technology and business excellence in the niche media-centric devices market. video surveillance and tele-presence markets. arising due to increasing competition. Company Philosophy Our actions are guided by the following basic beliefs: • • • • • and Geo specific requirements. digital home. been instrumental in building a successful multimedia technology organization . reduced shelf-life. PathPartner is a provider of Software Solutions. in the past. which pioneered in licensing mobile multimedia IPs and solutions to most of the leading mobile and consumer device OEMs. with focus on select verticals such as: wireless handsets. System Integration and Technology Consulting that enable the development and deployment of convergence devices for wireless handsets. cost effectively Maintenance of high ethical standards and uncompromising integrity Continuous improvement of organizational processes PROJECT OVERVIEW DEPARTMENT OF COMPUTER APPLICATIONS. increasing features & complexity. shrinking R&D budget. with several decades of collective experience in various roles from organizations of high repute. Product Engineering Services. ODMs and semiconductor companies worldwide. digital home and surveillance. This team has.Emuzed (a California based company that was acquired by Flextronics International in 2005). Path Partner's business thrives on addressing the challenges faced by OEMs. A work culture that nourishes talent and encourages everyone to enjoy & excel at work Proactive investment in relevant emerging technologies to stay poised for the market Total customer satisfaction through quality delivery on-time every time.

Music streaming on the Internet is usually referred to as webcasting since it is not transmitted broadly through wireless means. CUSAT Page 10 . the music can be actually listened to instantly without using up your hard drive storing all the mp3’s. means able to increase or decrease the volume.. And after clicking on the station name the radio is start playing. there’s something for every generation. oldies etc. net radio. and after clicking on the category stations of that category are listed. We can also play the previous played item and we can switch to next one. As opposed to the conventional method of obtaining music online— downloading files from the Internet to your desktop. which is gaining popularity along with the AM/FM kind of radios in India.Media streaming allows the user to listen to music on the Internet in real time. The project “Internet radio” is one of the latest android application. like we can display the categories like news. Advantage of internet radio 1 It can be viewed in real time. so that we increase the performance. And after fetching. we can control the volume. Just start up the player and it immediately starts playing audio. It is made for android mobile and it is portable so we can use it for any android device. We are fetching data from radio times. streaming radio and e-radio) is an audio service transmitted via the Internet. You can listen to the music of your choice. DEPARTMENT OF COMPUTER APPLICATIONS. Maybe your favorite station is among them. We can add any station to our favorite list with the option add to favorite and can play that station anytime from the favorite list that will display the contents of favorite database. It increases the performance. It is based on one single basic functionality playing a given set of Internet radio channels. We are deleting the old database and creating new one. Internet radio offers all kinds of music genres.Internet radio (also known as web radio. Setting is also there to create the database again and again. 2. A lot of audio material is available these days on the net ranging from music to education. It contains hundreds of Internet radio stations with all sorts of sounds and news. storing the data in to databases. There are many functionalities.Among its biggest advantages over conventional radio is the wide array of choices to select from. There is no need to define play lists or find and type in URL's. One search function is there so we can search any station that we want to play.

Even if you miss your favorite radio program online.Compared to a regular radio station.Terrestrial radio is limited in what it can broadcast and what it can’t. Traditional radio stations can never know exactly how large their audience is. Commercial breaks that constantly interrupt the music on conventional radio broadcasts tends to bore—and often annoy—listeners. 5. Fewer advertisements. most Internet Radio stations offer their content for free. As long as you have a your computer or your smart phone. meaning don’t listen to what you don’t want to hear. the best they can do is to take polls and then extrapolate on the data. Online radio relies on self-censorship. It’s Free!. Using these statistics. online radio isn’t. the cost of running an Internet radio is far less.Online radio allows the owner to track how many people are actually listening to his station at any particular time. CUSAT Page 11 . 10. you can listen to your favorite music anytime. Availability. you can still listen to it when you have your free time as it can be requested via the website. In 977′s case. DEPARTMENT OF COMPUTER APPLICATIONS. listeners are *paid* to listen via points earned for interacting with the site which can be redeemed for cash and prizes. 8. thus fewer ads are needed to meet costs.3. Internet radio is not affected by competing signals in the airwaves and has nearCD quality.Radio interference is a common problem during storms and bad weather. 4. 6. Censor Free. It immediately tells how many listeners are tuning in. so the better alternative is Internet radio.Simply click on any station link to start the music. Better sound quality. Traditional radio broadcasts are governed by what the FCC doesn’t want you to hear. the station can be adjusted and improved to make it more attractive to listeners.The Web is everywhere. Example: Did you miss DJ Tremble’s Mix Show? See his artist page to listen to past shows anytime! 9. Access to web-based stations is not limited by the range of the broadcaster’s transmitter as with traditional radio stations. It’s Easy!. 7.Although there are some services that require a monthly or yearly subscription. It allows you to “catch up” on your favorite radio program.

RAM: 192 MB. 2.1 Touch screen with any dimension and resolution 3. • Processor: 512 MHz processor. Display: • Network requirements Internet should be available. ROM : 256MB Disk Space: 20 MB. 3. 2. DEPARTMENT OF COMPUTER APPLICATIONS. Operating System: Android API Level: 2. CUSAT Page 12 . Software Requirements 1. 4.SYSTEM ENVIRONMENT • Hardware Requirements 1.

SSL. and Bionic libc. in 2005. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android. The unveiling of the Android distribution on 5 November 2007 was announced with the founding of the Open Handset Alliance. Android's mobile operating system is based on a modified version of the Linux kernel. The Android operating system is the world's best-selling Smartphone platform. SQLite relational database management system. though apps can also be downloaded from third-party sites. consists of roughly 12 million lines of code including 3 million lines of XML. Google and other members of the Open Handset Alliance collaborated on Android's development and release. SGL graphics engine. 2. a consortium of 80 hardware.8 million lines of C. software. middleware and key applications. including the Linux kernel.0 3D graphics API.1 million lines of Java. object-oriented application framework on top of Java core libraries running on a Dalvik virtual machine featuring JIT compilation. OpenCore media framework. a free software and open source license. CUSAT Page 13 . Android Market is the online app store run by Google. Google Inc purchased the initial developer of the software. The Android operating system. and telecom companies devoted to advancing open standards for mobile devices.75 million lines of C++ Overview of ANDROID Android is a software stack for mobile devices that includes an operating system.. DEPARTMENT OF COMPUTER APPLICATIONS. OpenGL ES 2. controlling the device via Google-developed Java libraries. Android Inc. There are currently over 150. middleware and key applications. The Android open-source software stack consists of Java applications running on a Javabased. and 1. WebKit layout engine. The Android SDK provides the tools and APIs necessary to begin developing applications on the Android platform using the Java programming language.000 apps available for Android.THEORITICAL FRAMEWORK About ANDROID-SDK: A brief history of ANDROID Android is a software stack for mobile devices that includes an operating system. Android has a large community of developers writing applications ("apps") that extend the functionality of the devices.[17][18] Google released most of the Android code under the Apache License. 2. Libraries written in C include the surface manager. Developers write primarily in the Java language.

AMR. live RSS feeds and even the icons on the opening screen will be able to be customized. H. video.Major Features of ANDROID • • • • Application framework enabling reuse and replacement of components Dalvik virtual machine optimized for mobile devices Integrated browser based on the open source WebKit engine Optimized graphics powered by a custom 2D graphics library. CUSAT Page 14 . compass. Advantages of ANDROID 1. AAC. EDGE. In addition the entertainment functionalities will be taken a notch higher by Google Android being able to offer online real time multiplayer games. opening screen. memory and performance profiling. 3G. and a plugin for the Eclipse IDE. The consumer will benefit from having a wide range of mobile applications to choose from since the monopoly will be broken by Google Android. MP3. 3. Features like weather details. PNG. JPG.264. and still image formats (MPEG4. Although this will depend on the carrier. as a result of many mobile phones carrying Google Android. DEPARTMENT OF COMPUTER APPLICATIONS. The ability for anyone to customize the Google Android platform will open up the applications playing field to small and new players who lack the financial muscle to negotiate with wireless carriers like AT&T and Orange. 3D graphics based on the OpenGL ES 1.0 specification (hardware acceleration optional) • • SQLite for structured data storage Media support for common audio. one will be able to customize a mobile phones using Google Android platform like never before. companies will come up with such innovative products like the location– aware services that will provide users with any information they might be in need of. tools for debugging. This information could include knowing the location of a nearby convenience store or filling station. and WiFi (hardware dependent) Camera. and accelerometer (hardware dependent) Rich development environment including a device emulator. right down to the screen. GPS. In addition. GIF) • • • • GSM Telephony (hardware dependent) Bluetooth. 2.

Java is the first programming language that is not tied to any particular hardware or operating system. although compilation to native machine code is also possible. Java’s motto is write once. and class libraries were developed by Sun from 1995. in compliance with the specifications of the Java Community Process. such as the GNU Compiler for Java. Sun relicensed most of its Java technologies under the GNU General Public License. from simple home appliances control systems to complex space control systems. developed The by James Gosling at Sun much of Microsystems (which is now a subsidiary of Oracle Corporation) and released in 1995 as a core Microsystems' Java language derives its syntax from Cand C++ but has a simpler object model and fewer low-level facilities. in compliance with the specifications of the Java Community Process. object-oriented language that is specifically designed to have as few implementation dependencies as possible. run anywhere". virtual machines. At runtime.About JAVA History of JAVA Java is component of a programming Sun language originally platform. Others have also developed alternative implementations of these Sun technologies. Overview of JAVA Java is an object-oriented programming language . concurrent. Java applications are typically compiled to bytecode. As of May 2007. CUSAT Page 15 . It is intended to let application developers "write once. Java applications are typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM) regardless of computer architecture. class-based. Sun Microsystems provides a GNU General Public License implementation of a Java compiler and Java virtual machine. GNU Classpath. and Dalvik. although direct hardware execution of bytecode by a Java processor is also possible. Java is a general-purpose. DEPARTMENT OF COMPUTER APPLICATIONS. Java’s latest version includes new features that enrich and extend the java platform and provides upward compatibility and improved performance. bytecode is usually either interpreted or compiled to native code for execution. run anywhere. The most striking feature of the language is that it is a platform-neural language.[9][10] The original and reference implementation Java compilers. Java is currently one of the most popular programming languages in use. and is widely used from application software to web applications. is now used in almost all applications. Java is the only one pure object oriented language available today. Some of the java features are given below.

most users still worried about the possibility of infecting their systems with a virus. When one uses a Java-compatible Web browser. The ability to download applets with the confidence that no harm will be DEPARTMENT OF COMPUTER APPLICATIONS. Thus high priority has been given to create robust and highly reliable programmers in the design of java. Java achieves this protection by confining a Java program to the Java execution environment and not allowing it to access other parts of the computer. Robust and secure 5. Robust:. such as credit card numbers. Platform independent and portable 3. simple and small 7. Familiar. Java provides object a clean and efficient object based development platform.Java uses object-oriented concept as for basic for software design. Even so. CUSAT Page 16 . and passwords. by searching the contents of your computer's local file system. and those who did scanned them for viruses prior to execution. bank account balances. Object oriented 4. one can safely download Java applets without fear of viral infection or malicious intent.Prior to Java. Java answers both of these concerns by providing a "firewall" between a networked application and the computer.1.The multi-platform environment of the web places high demand on the reliability of the program to execute on a Varity of systems. Compiled and interpreted 2. Distributed 6. most users did not download executable programs frequently. Secure:. another type of malicious program exists that must be guarded against. In addition to viruses. This type of program can gather private information. Multithreaded and interactive 8. High performance 9. Dynamic and extensible Object Oriented:.

interactive. The java byte code was carefully designed so that it would to be easy to translate directly into native machine code for very high performance by using a just-in-time complier.Java was designed to meet the real world requirement of creative. Architecture Natural:. Portable:. There are no data type incompatibilities across the hardware and software architectures. Dynamic:. The multithreading feature of java as various sophisticated synchronization primitives. These instructions are then interpreted on any machine and translated on the native machine code on the fly by the java run time system. the java compiler generates the byte code instruction which are not dependent upon particular computer architecture.Java complier is strict in its static checking during compiles time.Java is distributed environment of the Internet and it handles TCP/IP protocol. even from the network in a number. because java is interpreted. Interpreted:. New code modules can be linked in on demand from a variety of course. Java included features for intra-address-space messaging. That allowed object to DEPARTMENT OF COMPUTER APPLICATIONS. Classes are linked only as needed. Multithreaded:. The speed will continue to improve further. To enable java application to execute anywhere on the network. the java’s high level system libraries have been written to be threading safe.The Java programs are same on any platform. CUSAT Page 17 .Java enables the creation of cross-platform programs by compiling into an intermediate representation called java byte code. This code can be interpreted on any system that provides a java a virtual machine. The speed is more than adequate for most interactive application. the language and run time system are dynamic during linking and loading stages.Java was designed to support application on heterogeneous network environments composed of Varity of processors and the operating system architecture and multiple programming interface. High performance:. Distributed:. Java’s multithreading capability provider’s the means to build application with many concurrent threads of activity.done and that no security will be breached is considered by many to be the single most important aspect of Java.Java byte code is not directly executed by the system. networked programs. Moreover.

security implementations. CUSAT Page 18 . In addition.You can use API methods to incorporate security functionality into your programs. including cryptography services and security checks. Enterprise class platform and tool suite for developing software applications and systems supporting the full life-cycle of application development. and verify the authenticity of such signatures and the integrity of the signed contents. implementations. Enterprise class product DEPARTMENT OF COMPUTER APPLICATIONS. and users:JDK tools manage your keystore (database of keys and certificates). The GUI is designed in Java using swing components. and create and modify the policy files that define your installation's security policy. This feature brings an unparalleled level of abstraction to client/server programming. maintains the privacy of your files and information about you. • Systems administrators. generate digital signatures for JAR files. Swing components provide GUI environment to Java. Java revived these interface in a package called remote method invocation. You can subject applications and applets to security controls when you need to.Built-in security functionality protects you from malevolent programs (including viruses). and authenticates the identity of each code provider. Facilities and features usually found only in high-priced. developers. The API framework enables you to define and integrate your own permissions (controlling access to specific manager resources). classes are provided for management of your public/private key pairs and public key certificates from people you trust. • Developers:. Security Features in Java The security features provided by the Java Development Kit (JDK™) are intended for a variety of audiences: • Users running programs:. cryptography and service policy implementations. Swing components are a collection of lightweight visual components that provide a replacement Overview of ECLIPSE Eclipse Enterprise Workbench is a full-featured.execute procedure remotely.

permissions and navigation model. While it is true that the beginning Android application developer may use the Eclipse ADT plugins at some point. The usage of Eclipse as a Java development environment will be described in this tutorial. Eclipse is created by an open source community and is used in several different areas.g. Based on the open industry standards and the Eclipse platform.are included in Eclipse. testing and portability. content model. Thus. Whereas Eclipse MAT (Memory Analyzer Technology) provides one the ability to read the heap dump once it is converted with a converter contained in the Android SDK and the Eclipse TPTP project allows us to analyze the profiing data once it is converted using the converter from the Android SDK. as IDE for Java or for Android or as a platform to develop Eclipse RCP applications. Most people know Eclipse as an integrated development environment (IDE) for Java. The first screencast shows how to install SDK. Starting out with the right Eclipse package will smooth your transition from either j2me novice to Android application developer or from java newbie to Android application developer novice. UML and databases and the most comprehensive array of application server connectors(25 target environments) to optimize development. Total running time 03:00 minutesThe second tutorial covers new project creation in Eclipse. configure the Eclipse plugin and run sample Android applications. etc. the use of Android emulator. Thus. CUSAT Page 19 . support and delivery release cycles by providing a complete applications development environment for J2EE WEB. which Eclipse package should one download to start out with that will enable one to progress to these processes once Android application development is mastered DEPARTMENT OF COMPUTER APPLICATIONS. e. In this two-part screencast you are going to see how to install and use the Android SDK to develop a simple Android application using the Java programming language and Eclipse IDE plugin.. Eclipse redefines software pricing. The Android platform is a software stack for mobile devices. it is described what Eclipse package one should start with in their Android application development. Total running time 02:50 minutes. You can find the author's blog at Mobilebytes . he or she progresses beyond that to use heap dumps and profile dumps to optimize code. XML.


verification. CUSAT Page 21 . use and maintenance of the software. provide reference documents and guidelines to perform the SQA activities. and work products that the SQA consultant will review and audit Identifies the SQA work products DOCUMENT OVERVIEW: The rest of the document is organized as follows: Management: A description of each major element of the organization and a description of the SQA tasks and their relationships Documentation: Identification of the documents related to development. Organization Efforts for this project are supported by numerous entities. organizations and personnel. SQAP Requirements: This section defines the SQA review. its roles and responsibilities. It will be the sole responsibility of the developer to review the product’s DEPARTMENT OF COMPUTER APPLICATIONS.PURPOSE The purpose of this plan is to define the “Internet Radio” Software Quality Assurance (SQA) organization. This tool is developed as part of partial fulfilment of requirements for Masters in Computer Applications degree. and auditing procedures used to ensure that software deliverables are developed in accordance with this plan and the project’s requirements. SCOPE The scope of this document is to outline all procedures. reporting. and provide the tools. provide the standards. and the software quality tasks to be performed. processes. practices and conventions used in carrying out SQA activities. Management This section describes the management organizational structure. SQA tasks and responsibilities. techniques and tools to be used for Quality Assurance of this project. and SQA reporting. techniques. validation. and methodologies to support SQA activities. This plan: • • • Identifies the SQA responsibilities of the project developer and the SQA consultant Lists the activities.

design and testing phases. testing and assessing all aspects of quality issues. until the release of the software product. coordinating. The following are the quality assurance tasks for each phase of the software development: Requirements phase: When the SRS is being developed. efficiency.usability. The responsibilities of the client are to: • Review the work performed. The final product shall be verified with the functionality of the software as specified in the Software Requirements Specification (SRS) for the Tool. weekly reviews shall be conducted between the developer and the client to identify any defects and rectify them. The client reviews the work and provides feedback/suggestions. Implementation phase: The developer shall do code reviews when the construction phase of the Tool begins. Give a formal presentation to the client on completion of the analysis. Develop the design plan and test plan for testing the tool. Planning. TASKS • • • • • Develop requirement specification and cost estimation for the project. • SQA IMPLEMENTATION Quality assurance will be implemented through all the software life cycles of the tool’s development process. DEPARTMENT OF COMPUTER APPLICATIONS. CUSAT Page 22 . Specification and Design phase: Due to the great importance for accuracy and completeness in these documents. Client’s specifications and suggestions will be used in places where quality decisions need to out-weigh development schedule decisions. and walk-through on a regular basis. The client will however conduct inspections. Software testing phase: The developer shall test each case. reliability. and accuracy. reviews. it has to be ensured that it elucidates the proposed functionality of the product and to keep refining the SRS until the requirements are clearly stated and understood. Provide feedback and advice. Implement and test the application and deliver the application along with the necessary documentation.

CUSAT Page 23 . and Implementation). if any. and exposures and risks to the current project plan are identified and addressed. The reviews will assure that the established project processes and procedures are being followed effectively. DEPARTMENT OF COMPUTER APPLICATIONS. The Software Design Document (SDD) • • • • Depicts how the software will be structured Describes the components and sub-components of the software design. Gives a sample interaction diagram. Reviews by the client after each presentation. The review process includes: • • • A formal presentation at the end of each development phase (Requirement. showing the key interactions in the application. Gives estimates of the cost/effort for developing the product including a project plan. Design and Implementation). A managerial review by the client periodically to ensure the work generated is in compliance with project requirements. including various packages and frameworks. Software Test Plan: Describes the test cases that will be employed to test the product. which • • • • Prescribes each of the essential requirements of the software Objectively verifies achievement of each requirement by a prescribed method. DOCUMENT AUDIT Quality Assurance for this project will include at least one review of all current work products in each stage of development (Requirement. Design. Gives an object model the essential classes that would make up the product. Facilitates traceability of requirements specification to product delivery.DOCUMENTATION In addition to this document. the essential documentation will include: The Software Requirements Specification (SRS).

This review will determine whether the requirements have been met for the deliverable.SOFTWARE DEVELOPMENT PROCESS The software development process involves three stages: 1) Requirements phase. A design checklist will be used and the developer will check to see whether the design meets the checklist criteria. the client will review the deliverable documents. During each phase. The developer would incorporate modifications suggested by the committee. CUSAT Page 24 . PROJECT REVIEWS The client will perform a review at the 3 stages of the project as described in the section above. DEPARTMENT OF COMPUTER APPLICATIONS. check that the product meets the requirements. This would ensure quality of the software product. Test results will be documented and discussed in the final phase of the project. Testing documentation will be sufficient to demonstrate that testing objectives and software requirements have been met. verify the performance of the software and ensure that acceptance testing is carried out. ensure that the SQA plan has been adhered to. TESTING AND QUALITY CHECK Testing will be carried out in accordance with the Software Testing Plan (STP). 2)Design phase 3) Implementation and testing phase.

A system is a set of components that interact to accomplish some purpose. System specifies what system should do. CUSAT Page 25 . DEPARTMENT OF COMPUTER APPLICATIONS. diagnosing problems and using the facts to improve the system.SYSTEM ANALYSIS SYSTEM ANALYSIS System analysis is the process of gathering and interpreting facts.

OVERVIEW OF PROPOSED SYSTEM Internet radio (also known as web radio. Drawbacks of the Existing System: • • • • • FM is strictly line of sight. streaming radio and e-radio) is an audio service transmitted via the Internet. The Proposed system is available anywhere. This term can upset purists because it conflates a modulation scheme with a range of frequencies. a system has to be designed. Music streaming on the Internet is usually referred to as webcasting since it is not transmitted broadly through wireless means. Sound quality is not good. The project “Internet radio” is one of the latest android application.• • • • • Identifying the drawback of the existing system Identify the need for conversion Perform feasibility study Identify hardware. The term "FM band" is effectively shorthand for "frequency band in which FM is used for broadcasting". so it's broadcast range on our round planet is limited This system is not available in rural areas. net radio. • To overcome the above drawbacks. Having very less number of stations. CUSAT Page 26 . software and database requirements Create a system definition that forms the foundation for subsequent work SYSTEM STUDY OVERVIEW OF EXISTING SYSTEM FM broadcasting is a broadcast technology pioneered by Edwin Howard Armstrong that uses frequency modulation (FM) to provide high-fidelity sound over broadcast radio. We can not listen our favorite station anytime. DEPARTMENT OF COMPUTER APPLICATIONS..

The existing system is inefficient when compared with the proposed system. Software requirement analysis is divided into three: 1.• • • • It is also available in rural area. CUSAT Page 27 . establish system interface characteristics. there are only few stations. evaluate the flow and content of information. PROBLEM EVALUATION AND SYNTHESIS In the problem evaluation and synthesis the software engineer must define all externally observable data objects. DEPARTMENT OF COMPUTER APPLICATIONS. Also it is not very much user friendly because it showing only frequency not station name and description. 3. define and elaborate all software functions. and uncover additional design constraints. The proposed system having hundreds of station available. In the existing system. with station logo. We can listen our favorite station any time whenever we want. Problem identification Requirement analysis is the software engineering task that bridges the gap between system level requirement engineering and software design. Sound quality is better than the existing system. understand software behaviour that affects the system. Each of these tasks serves to describe the problem so that an overall solution may be synthesized. Problem Recognition Problem Evaluation and Synthesis Modeling PROBLEM RECOGNITION The main goal of the problem recognition is the recognition of the basic problems as perceived by the listener. 2. Here it is not possible to listen radio in rural area. The existing system can not handle any tables.

ability to meet user needs. and behavior of the system. consistency and accuracy of the specification. DEPARTMENT OF COMPUTER APPLICATIONS. Since the proposed system having number of stations so user will like this application. or both. CUSAT Page 28 .The Proposed system has been developed for the present requirements. which is advantageous over the existing system. This is done by investigating the existing system proposal according to its workability. impact on the organization. • • The model helps analyst to understand information. A feasibility study is documented with a report showing all the ramifications of the project. FEASIBILITY STUDY The feasibility of a project can be ascertained in terms of technical factors. The model becomes the main reference for review to determine completeness. The following are the roles of models in requirements analysis. and effective use of resources. we create models of it to be built to gain better understanding of the actual logical entities (functions and sub functions) to be built. which are completely internet based is and the proposed system is highly user friendly. economic factors. Here radio can be listen online. In project finance. • The model becomes the foundation for design. function. MODELING During software requirements analysis. the pre-financing work (sometimes referred to as due diligence) is to make sure there is no "dry rot" in the project and to identify project risks ensuring they can be mitigated and managed in addition to ascertaining "debt service" capability Feasibility is a measure of how beneficial the development of the information system will be to an organization.

Ongoing costs such as hardware. The software is very user friendly for both developers and end users. depreciation of hardware costs etc. 3.. rental. Social feasibility: People are inherently resistant to change and mobiles have been known to facilitate change. Computer installations have something to do with DEPARTMENT OF COMPUTER APPLICATIONS. This was based on an outline design of system requirements in turns of inputs. the procedure to determine the benefits and saving that are expected from a decision is made to doing and implement the system.Few key considerations are involved in the feasibility analysis: economic. Application Server as SQLite as the middle tier and Internet developer suite oracle as the development tool. Start-up costs. installation. The propose system has three-tier architecture consisting of SQLite as the database. Cost associated with the development of computer-based systems is as follows. 1. ore importance is given to the hardware interaction part of the system. user operating system cost. It involves financial considerations to accommodate technical enhancements. Projectrelated costs such as software purchase. training personnel. equipment purchase. An estimate should be made about the reaction of the user staff towards the development of a computerized system. Procurement costs such as consultation. furnishing the size etc. CUSAT Page 29 . procedures and staff. The assessments of technical feasibility centers on the existing system and to what extent it can support the proposed addition. data collection. documents preparation costs etc. Technical Feasibility: In examining Technical feasibility of the system. technical and social etc. It is more commonly known as cost benefit analysis. 2. personal search cost etc. software maintenance. Otherwise make alterations in the proposed system. files programs. Economic Feasibility: Economic analysis is the most frequently used method for evaluating the effectiveness of a proposed system.

equity. and commitment are key elements required to ascertain managerial feasibility. credit worthiness. The introduction of a candidate system requires special effort to educate. In labor-intensive projects. planned functions must be integrated with the local cultural practices and beliefs. sell and train the staff for conducting the business. employee involvement. every one using mobile so it is cultural feasible. The tangible and intangible aspects of a project should be translated into economic terms to facilitate a consistent basis for evaluation. Economic Feasibility: This involves the feasibility of the proposed project to generate economic benefits. Management support. Financial Feasibility: Financial feasibility should be distinguished from economic feasibility. The proposed software is designed such that only persons can access it having android mobile and a person with some computer knowledge can interact with the system freely. For example. transfers and changes in job status.turnover. and loan schedule are important aspects of financial feasibility analysis. A benefit-cost analysis and a breakeven analysis are important aspects of evaluating the economic feasibility of new industrial projects. Managerial Feasibility: Managerial feasibility involves the capability of the infrastructure of a process to achieve and sustain process improvement. Financial feasibility involves the capability of the project organization to raise the appropriate funds needed to implement the proposed project. Safety Feasibility: DEPARTMENT OF COMPUTER APPLICATIONS. Computer illiterate people require training for efficient use of the software. Cultural Feasibility: Cultural feasibility deals with the compatibility of the proposed project with the cultural setup of the project environment. CUSAT Page 30 . Project financing can be a major obstacle in large multi-party projects because of the level of capital required. Loan availability.

worthy projects may face insurmountable opposition simply because of political factors. and Mexico was temporarily suspended in 1993 because of the legal consideration of the potential environmental impacts of the projects to be undertaken under the agreement. DEPARTMENT OF COMPUTER APPLICATIONS. This is particularly true for large projects with national visibility that may have significant government inputs and political implications. environmental impact assessment is often not adequately addressed in complex projects.Safety feasibility is another important aspect that should be considered in project planning. A perfect example was the recent attempt by Disney to build a theme park in Virginia. This is an aspect worthy of real attention in the very early stages of a project. political necessity may be a source of support for a project regardless of the project's merits. Safety feasibility refers to an analysis of whether the project is capable of being implemented and operated safely with minimal adverse effects on the environment. Concern must be shown and action must be taken to address any and all environmental concerns raised or anticipated.S.. Political Feasibility: A politically feasible project may be referred to as a "politically correct project. Political feasibility analysis requires an evaluation of the compatibility of project goals with the prevailing goals of the political system." Political considerations often dictate direction for a proposed project. For example. After a lot of funds and efforts. Disney could not overcome the local opposition to the environmental impact that the Disney project would have on the historic Manassas battleground area. drawn-out approval processes and outright active opposition by those claiming environmental concerns. Unfortunately. On the other hand. Environmental Feasibility: Often a killer of projects through long. As an example. Canada. CUSAT Page 31 . the North American Free Trade Agreement (NAFTA) between the U.

national or international. competitive activities. The Alternatives Analysis. regional. DEPARTMENT OF COMPUTER APPLICATIONS. etc. Between them. This area should not be confused with the Economic Feasibility. The market needs analysis to view the potential impacts of market demand. and operationally viable. Another concern is market variability and impact on the project. and system design concepts. Feasibility Areas The Feasibility Study is the preliminary study that determines whether a proposed systems project is technically. financially. functional requirements. Price war activities by competitors. the documents provide: An analysis of the system objectives. identifies viable alternatives for the system design and development. and "divertible" market share available. usually included as part of the Feasibility Study. CUSAT Page 32 . whether local. must also be analyzed for early contingency funding and debt service negotiations during the start-up.Market Feasibility. ramp-up. and commercial start-up phases of the project .

This involves estimating project cost to an acceptable level of accuracy. inflation. breakeven point. This is the preliminary analysis done to determine what will be required to satisfy the need. the public. payback periods.• • • A determination of the feasibility of applying automated systems to effectively. Engineering & Design. environmental. and sensitivity. if needed. An evaluation of alternative approaches for reasonably achieving the objectives and goals. The need may affect the organization itself. Pertinent questions that should be asked include: Is the need significant enough to justify the proposed project? Will the need still exist by the time the project is completed? What are the alternate means of satisfying the need? What are the economic. A preliminary study is then conducted to confirm and evaluate the need. sources of capital. should be done at this time. The preliminary study often involves system models or prototypes. artist's conception and scaled-down models may be used for illustrating the general characteristics of a process. the elements of a feasibility analysis for a project should cover the following: • Need Analysis. social. The analysis should consider rates of return. Estimates of capital investment and of recurring and nonrecurring costs should also be contained in the cost estimate document. efficiently. This involves a detailed technical study of te proposed project. another organization. Financial Analysis. and economically improve program operations. Both the initial and operating costs are included in the cost estimation. The work may be performed by a consultant who is an expert in the project field. A simulation of the proposed system can be carried out to predict the outcome before the actual project starts. Scope of Feasibility Analysis In general terms. Cost Estimate. and Identification of a proposed approach. Product design. This involves an analysis of the cash flow profile of the project. Sensitivity analysis can be carried out on the estimated cost values to see how sensitive the project plan is to the estimated cost values. This indicates recognition of a need for the project. CUSAT Page 33 . This is a critical analysis since it • • • DEPARTMENT OF COMPUTER APPLICATIONS. residual values. or the government. For technology-oriented projects. Levels of around -5% to +15% are common at this level of a project plan. Written quotations are obtained from suppliers and subcontractors as needed. Technology capabilities are evaluated as needed. and political impacts of the need? • Process Work. A proposal of how the need may be satisfied is then made.

Conclusions and Recommendations. This portion of the feasibility study provides an assessment of the impact of the proposed project.determines whether or not and when funds will be available to the project. A value added tax may be assessed based on the price of a product and the cost of the raw material used in making the product. This may indicate an endorsement or disapproval of the project. Environmental. and economic impacts may be some of the factors that will determine how a project is perceived by the public. The project cash flow profile helps to support the economic and financial feasibility of the project. social. CUSAT Page 34 . The feasibility study should end with the overall outcome of the project analysis. • DEPARTMENT OF COMPUTER APPLICATIONS. The value added potential of the project should also be assessed. Recommendations on what should be done should be included in this section of the feasibility report. cultural. The tax so collected may be viewed as a contribution to government coffers. • Project Impacts. political.


they are analyzed and refined through customer-developer interaction. Poorly analyzed requirements will disappoint the user no matter how well designed and the well coded the software is. All further development like System Analysis. Requirement specification appears to be a relatively simple task but the chances of misinterpretation is very high. design and coding depend on how accurate well prepared and thoroughly understood the System Requirements Specification is. Requirement Specification begins with a clear statement of the problem and the task to be performed. After the initial specification reports are received. we have to identify the problem first. There is always a chance of wrong specification because of communication gap between user and developer. Requirement specification is the foundation in the process of software development. System Analysis follows to determine feasibility and Cost Benefit Analysis. For this. System Design. ambiguity in requirement or a wrongly specified problem. A complete understanding of requirement specification of the new system is very important for the successful development of the software product.REQUIREMENT SPECIFICATION An accurate and thorough understanding of system requirements is essential to the success of any Software Development Process. After the initial specification reports are received. but appearances are often deceiving. Problem specifications serve as the basis for identifying work objective that helps in describing the requirements in technical and precise statements. DEPARTMENT OF COMPUTER APPLICATIONS. Requirement Specifications begin with a clear and concise heading stating in a sentence the task to be performed (i. All further stages of SDLC like system analysis. Overall Description Requirement specification appears to be relatively simple task. System Analysis follows to determine and cost benefit analysis.e. work objective). Then requirements are described in a technical manner in precise statements. CUSAT Page 36 . ambiguity is probable and communication gap between customer and developer is bound to bring confusions. and Coding will depend on how accurate and well prepared the requirement. they are analyzed and refined through user developer interaction.

and documentation plans. It's a two-way insurance policy that assures that both the client and the organization understand the other's requirements from that perspective at The SRS document itself states in precise and explicit language those functions and capabilities a software system (i. a software application. possible solutions to technology or business issues. as well as states any required constraints by which the system must abide. The SRS is often referred to as the "parent" document because all subsequent project management documents.e. The SRS also functions as a blueprint for completing a project with as little cost growth as possible. It's important to note that an SRS contains functional and nonfunctional requirements only. Introduction DEPARTMENT OF COMPUTER APPLICATIONS. software architecture specifications. and so on) must provide. statements of work. such as design specifications. It consists following phases. testing and validation plans. it doesn't offer design suggestions. CUSAT Page 37 . are related to it. an ecommerce Web site.An SRS is basically an organization's understanding (in writing) of a customer or potential client's system requirements and dependencies at a particular point in time (usually) prior to any actual design or development work.. or any other information other than what the development team understands the customer's system requirements to be.

we can also list the stations of individual category and play the stations one by one. We can listen our favorite stations whenever we want to . In this module I have written the code for closing the application. In favorite table only the ID of station is stored and whenever we play the favorite station the other detail is fetched from station table and listed into the list view.description and logo of that station. One feature is controlling the volume of the player according to our choice. If we like any station then we can add that station to our favorite list. The Url is passed with the given keyword to the parsing function and search the required station details . After searching the details is stored to the search table and next time when the other search happen the search table is deleted and newly searched details are stored to search table. There are feature like previous and next so that we can play the previously played or next station in the list.Modules of the project • • • • • CATEGOTY RADIO PLAY FAVORITES SEARCH SETTINGS CATEGORY This module display all the categories . Each category having many stations. From there we can play and it will go to the RADIO PLAY module. FAVORITES This module all about our favorite station. When we click on pause the animation and station both stops rotating and playing. One feature is add to favorite. After selecting a particular category list view switched to another list view having list of stations with name . There are 22 categories in radiotimes. CUSAT Page 38 . After selecting a particular station it moves to RADIO PLAY module and starts playing. When clicking on category tab then a list view appear with the category list. When any station is playing the animation rotating with that. SEARCH We can search any station by giving any keyword in the text box. RADIO PLAY This module play the radio. to add the playing station to the favorite list. DEPARTMENT OF COMPUTER APPLICATIONS.

Hundres of stations are available in this radio.SETTINGS Here we are creating the database to increase the performance. It takes time to fetch data from radiotimes every time so we are creating a database and storing the data in to that .It is a system which incorporates this feature as it is the system whose defects can be easily removed by the programmers. when application is installed first time. From setting tab we can recreate the data base. Change the the volume of the player. Selecting the category then selecting the station then play the selected station. Once station starts playing an animation starts rotating. This system can be easily adapted to meet the changing requirements of its users or the changing environment in which it operates DEPARTMENT OF COMPUTER APPLICATIONS. We can play the previous and next played station. We can also play the radio in rural area. This radio is available everywhere.The system should be properly supported by the required H/W and S/W interface needs so that any user can access the data from any place sitting on the internet connectivity node. Setting the database means deleting previously created and creating new database. NONFUNCTIONAL REQUIREMENTS • Availability: . FUNCTIONAL REQUIREMENTS The main goal that proposed system is to play the radio of our choice. Searching the station which we want to play. CUSAT Page 39 . • Maintainability: . Add the liked station to the favorite list.

Any user can view the menu of the system and can work out the processing even from a remote place. It uses least amount of devices & memory space for execution of the package on the systems at the client’s end. The software never permits any mishandling or misfiring of data in the database tables at any point of processing.The processes/operations under each consideration are completely equipped with alert messages as and when required. • • • DEPARTMENT OF COMPUTER APPLICATIONS. The execution of one process does not effect the processing of second one.It is an efficient system because it fulfills most of the requirements being mentioned by the users. The complete processing does not effect the normal operations of the company terminals. Reliability: .its design is relatively machine independent. Safety & Security: . Two separate processes of the package are unique & non-interdependent to each other. Visibility: . CUSAT Page 40 .It is a very reliable system. There is no hiding of data and incorporates easy availability and accessibility. Efficiency: . It is being coded in languages which are well-defined & meet to the standards.Fig: Nonfunctional Requirements • • Portability: . hence more portable.

Typically this review gives feedback to the developers that helps to remove uncertainties in the requirements of the software.• Standard Compliance: . Because the working prototype has been evaluated by the customer. DEPARTMENT OF COMPUTER APPLICATIONS. it is reviewed by the customer.It follows a standard format or layout in the designing as well as operational phases. In prototyping model we first develop a working prototype of the software instead of developing the actual software. This helps the user to work on the system in an effective and efficient way at any site of the office. The prototype paradigm begins with requirement gathering. The quick design focuses on a representation of those aspects of the software that will be visible to the customer/user. and starts an iteration of refinement in order to further clarify requirements. When the prototype is created. Iteration occurs as the prototype is tuned to satisfy the needs of the customer. APPROACH TO DEVELOP THE SYSTEM System/Information Engineering Analysis Design Code Test Implementatio n The company has already aware of that what should the proposed system will do and how. After design phase is approved. After design phase we move to coding and testing then implementation phase. we follow the linear model to develop the complete system. while at the same time enabling the developer to better understand what needs to be done. Development and customer meet and define the overall objectives for the software. CUSAT Page 41 . A “quick design” occurs. The quick design leads to the construction of a prototype. They can work on its database to keep all the concurrent updating. So we follow the prototyping approach for the analysis and design phase and then linear model of software development. The developers use this prototype to reefing the requirements and prepare the final specification document. it is reasonable to expect that the resulting specification document will be correct. The working prototype is developed as per current available requirements. The prototype is evaluated by the customer/user and used to refine requirements for the software to be developed. identify whatever requirements are known. and outline areas where further definition is mandatory.

DEPARTMENT OF COMPUTER APPLICATIONS. the prototype is discarded and actual is then being get developed. After all.The prototype being developed is not the final product to be delivered and the code generated in the prototype is being get thrown away but the experience gathered from developing the prototype helps in developing the actual system. prototype has to be discarded. CUSAT Page 42 . After the finalization of software requirement specification (SRS) document. The developers should develop prototype as early as possible to speed up the software development process.

CUSAT Page 43 .PROTOYPING MODEL Working of Prototype model can be described as : Requirements Quick Design Implement Refinement of Requirements as per suggestions Customer Evaluation Design Implementation and Unit Testing Integration and System Testing Operation and Maintenance DEPARTMENT OF COMPUTER APPLICATIONS.


PROCESS DESIGN V –Model of development V Process is a whole life-cycle process. The business logic layer contains and executes the rules that run the application. or intelligent agent services (as in mapping a request to a number of different servers. The Design phase is a transition from a user – oriented document (System proposal) to a documented oriented to the programmers or database personnel. The architecture layers are the database layer. CUSAT Page 45 . A three-tier architecture is considered to be the most suitable architecture for large applications. Multi-tier architecture also makes it simpler to scale the system across multiple processors on different machines. The partitioning of the application enables rapid design and development of the system. 1. 3. The presentation layer delivers the application to the end users on the web. 2. Compiled forms are deployed I the application server. The modularity makes it easier to make changes to just one tier without affecting the others. metering services (as in acting as a transaction monitor to limit the number of simultaneous request to a given server). V Process must be applied at each stage in the software process. Separating the functions into distinct tiers makes It easier to monitor and optimize the performance of each layer. Load balancing and adding more capacity can take place independently at each layer. A three-tier architecture introduces a server (or an “agent”) between the client and the server.Emphasis is on translating the performance requirements into design specifications . collating the results and returning a single response to the client. The role of the agent is manifolds.ARCHITECTURE DESIGN System design provides the understanding and procedural details necessary for implementing the system recommended in the system study . It can provide translation services (as in adapting a legacy application on a mainframe to a client/server environment). The application server layer and the database server will communicate and the details are displayed to the listener. DEPARTMENT OF COMPUTER APPLICATIONS. The database layer manages the data required by the application. Feature of Three-tier Architecture: The proposed software has a three-tier architecture. the application server layer and the client layer.

–Defined interim results make early assessment procedures possible. CUSAT Page 46 . This standard helps to achieve the following objectives: Improvement and guarantee of the quality: – The discovery of defects in a system. –The completeness of the results to be delivered can best be guaranteed by a standardized procedure. –Uniform standards reduce friction losses between customer and contractor as well as between main contractor and subcontractor.Objective The V-Model (Lifecycle Process Model) regulates the system development process and the maintenance and modification of systems. –The standardized procedure makes the cost calculation more transparent. Uniform product contents alleviate the readability of the products and the assessment procedures. –The assessment of whether or not the system is usable in an operational situation. Any risks in connection with the costs can be recognized better. Checking the costs for the whole lifecycle: –The generation of relevant project-specific development standards and its assessment will be simplified. DEPARTMENT OF COMPUTER APPLICATIONS.

–The interim results/final results are standardized to such an extent that other parties involved or staff of other companies are able to settle in without very much effort. –In case of a standardized procedure universal approaches to the solutions become transparent and can thus be reused.–Standardized procedures allow for the reduction in the use of resources. CUSAT Page 47 . if necessary DEPARTMENT OF COMPUTER APPLICATIONS. –The training costs are reduced. –Undesirable developments are recognized at an earlier stage.

CUSAT Page 48 .ER – DIAGRAM CID Nam FID Category Favorite Fetching stations Add to favorite s Station Add to favorites SID CID Name Descri ption Log o Server server3 Server 2 1 SID Name Descriptio n Searc h Server Log o Server2 Server 1 DEPARTMENT OF COMPUTER APPLICATIONS.

CUSAT Page 49 .USER CASE DIAGRAM S elect category S elect staion Add to favorite INTERNET RADIO L istener S earch S etting C hange volume Play/ pauser adio DEPARTMENT OF COMPUTER APPLICATIONS.

And after fetching. so that we increase the . and after clicking on the category stations of that category are listed. There are many functionalities. After selecting a particular category list view switched to another list view having list of stations with name . We can also play the previous played item and we can switch to next one Modules of the project • CATEGOTY • RADIO PLAY • FAVORITES • SEARCH • SETTINGS CATEGORY This module display all the categories . Just start up the player and it immediately starts playing audio. CUSAT Page 50 . There are 22 categories in radiotimes. which is gaining popularity along with the AM/FM kind of radios in India. It contains hundreds of Internet radio stations with all sorts of sounds and news. There is no need to define play lists or find and type in URL's. storing the data in to databases. It is made for android mobile and it is portable so we can use it for any android device.. Each category having many stations. DEPARTMENT OF COMPUTER APPLICATIONS.description and logo of that station. After selecting a particular station it moves to RADIO PLAY module and starts playing.we can also list the stations of individual category and play the stations one by one. Maybe your favorite station is among them. A lot of audio material is available these days on the net ranging from music to education. We are fetching data from radio times.Modular design This project having many modules. When clicking on category tab then a list view appear with the category list. oldies etc. like we can display the categories like news. It is based on one single basic functionality playing a given set of Internet radio channels. And after clicking on the station name the radio is start playing. The project “Internet radio” is one of the latest android application.

FAVORITES This module all about our favorite station. DEPARTMENT OF COMPUTER APPLICATIONS. If we like any station then we can add that station to our favorite list. When we click on pause the animation and station both stops rotating and playing. when application is installed first time. After searching the details is stored to the search table and next time when the other search happen the search table is deleted and newly searched details are stored to search table. In favorite table only the ID of station is stored and whenever we play the favorite station the other detail is fetched from station table and listed into the list view. There are feature like previous and next so that we can play the previously played or next station in the list. From setting tab we can recreate the data base. to add the playing station to the favorite list. One feature is controlling the volume of the player according to our choice. SEARCH We can search any station by giving any keyword in the text box. The Url is passed with the given keyword to the parsing function and search the required station details . We can listen our favorite stations whenever we want to listen. One feature is add to favorite. It takes time to fetch data from radiotimes every time so we are creating a database and storing the data in to that . CUSAT Page 51 . When any station is playing the animation rotating with that. SETTINGS Here we are creating the database to increase the performance. From there we can play and it will go to the RADIO PLAY module. In this module I have written the code for closing the application.RADIO PLAY This module play the radio.


Square. which defined source or destination of data - Arrow which shows the data flow - Circle.Data Flow Diagrams represent one of the most ingenious tools used for structured analysis. It is the major starting point in the design phase that functionally decomposes the requirements specification down to the lowest level of details. The bubble represents data transformation and line represents data flow in the system. which shows a data store The DFD at the simplest level is referred to as the ‘zero level DFD’ or in the simple words a ‘Context Analysis Diagram’. CUSAT Page 53 . These are expanded level by level each explaining its process in detail. which represent a process that transformation incoming data in to outgoing flow - Open rectangle. A DFD consists of a series of bubble joined by lines. In the normal conventional a DFD has four major symbols. Each data flow is labeled for easy understanding. It has the purpose of clarifying system requirement and identifying major transformation that will become programs in system design. A Data Flow Diagram or DFD as it is shortly called is also known as a bubble chart. A functionally decomposes the requirements specification down to the lowest level of details. DEPARTMENT OF COMPUTER APPLICATIONS. Processes are numbered for easy identification and are normally labeled in block letters.

CUSAT Page 54 .CONTEXT ANALYSIS DIAGRAM Request for stations Fetching station details LISTENER Station details INTERNET RADIO Station details Querying RADIO TIMES DEPARTMENT OF COMPUTER APPLICATIONS.






However in the case of a DBMS there may be far less relationship between the data as seen by the user and as store in the computer. which implies that the data must be stored in a format that preserves it from being accessed from outside the DBMS that crated it. Relationship between various table areas is defined through the use of a mathematical function such as JOIN and UNION. ideally allowing the user to specify what must be done with little or no attention on the user’s part to the detailed algorithm or data representation used by the system. The most important aspect of building of application is the design of tables or the database schema. and thus for multi user and client server database. than between arrays as defined in a typical programming language and the representation of those arrays in the memory. rather than as the computer stores the data. The emphasis on the data integrity makes the relational model ideal for transactional processing systems. There is software that allows one or more persons to use and / modify this data is a database management system (DBMS). which is meaningful. Primary purpose behind the relational model is the preservation of data integrity. CUSAT Page 60 . data is organized in logical mathematical sets in tabular structure. The data filed becomes a column in a table and under relational model and each record becomes a row in a table. The DBMS meets as an interpreter for a high level programming language. A major role of the DBMS is to allow the user to deal with the data in abstract terms. The cost important advantages of relational model are its flexibility in describing the relationship between the various data items.Data in computer is termed a database. One way to get a field for the different aspects of the DBMS is to consider the various kinds of users of such a system and ways they interact with the system and with each other. The data stored in a table must be organized in some manner. The data base management system is one of the most complex varieties of software in existence. The relational model also requires that the date be accessed through programs that do not rely in a data in the database. In relational database approach. The overall objective in the process of table design has been to treat as an DEPARTMENT OF COMPUTER APPLICATIONS.

Normalization Normalization provides for table optimisation through the investigation of entity relationships. Database can be normalized up to any defined normal forms according as the need of application and its effectiveness. Main purpose of normalization is to avoid Data redundancy and some unforeseen scalability factors. The major aim of the process of normalization is to reduce data redundancy and prevent loosing data integrity. Data Integration 2. Poor normalization can cause problems related to storage and retrieval of data. Further normalization of database was not considered taking into account the need of application and ease of working with database. quick. A certain level of normalization of tables in database gives a particular normal form based of particulars steps followed. inexpensive and flexible for user. The entire package depends on how the data are maintained in the system each table has been designed with a perfect vision. Data Independence. During the process of normalization. DEPARTMENT OF COMPUTER APPLICATIONS. Database of Budget Estimation is normalized up to Third Normal Form. CUSAT Page 61 . There is no multivalued field in any table. All the fields of all tables are fully functional dependent on the primary key. Minor tables have been created which thought takes much space facilities the process of Querying fast and accurate. The theme behind a database is to handle information as an integrated whole thus making access to information easy. The database is in Second Normal Form as it satisfies the constraint of full functional dependency. Redundancy refers to unwanted and unnecessary repetition of data. Data Integrity 3. Normalization is done to remove Insertion. Data integrity has to convert at all levels. The organization of data in a database aims to achieve three major objectives are given bellow. dependencies can be identified which cause serious problem during deletion and updating. The database is in First Normal Form as all the fields of all tables are atomic. Several degrees of normalization have to be applied during the process of table design. Normalizing also help in simplifying the structure of table. 1.organizational resources and as an integrated whole. Updating and Modification anomalies and redundancy of data.

Field CID Name Type Int Varchar (30) Null No No Key PRI STATION TABLE :-Store the station details.The database is in Third Normal Form as all its tables satisfy the constraint that there should be no transitive dependency. Sqlite Tables: CATEGORY TABLE:. No field has transitive dependency on the key field. CUSAT Page 62 . Field SID CID Name Description Logo Server1 Server2 Server3 Type Int Int Varchar(100) Varchar(100) Blob Varchar(50) Varchar(50) Varchar(50) Null Key No No No PRI Foreign key MUL DEPARTMENT OF COMPUTER APPLICATIONS.Store the category details. Thus database also satisfies the constraints of third normal form.

Field FID Type Int Null No Key PRI SEARCH TABLE:.Store all the favorite stations. Field SID Name Description Logo Server1 Server2 Server3 Type Int Varchar(100) Varchar(100) Blob Varchar(50) Varchar(50) Varchar(50) Null No No Key PRI USER INTERFACE DESIGN DEPARTMENT OF COMPUTER APPLICATIONS. CUSAT Page 63 .Store the newly searched stations.FAVORITE TABLE:.

The design of interfaces between software and other non-human producers and consumers of information 3. task and environment requirements. DEPARTMENT OF COMPUTER APPLICATIONS. CUSAT Page 64 . The interface tells the system what action is to be taken for entering. User interface is the doorway into an interactive software application. The interface would be in such a way that it includes methods that will not be tiresome or unacceptable to frequent users who become families with the system. Design identifies interface objects and actions then create a screen layout that forms the basis for a user interface. Interface design focuses on: 1. It should allow users to accomplish processing action is to be taken for entering. Interface design creates an effective communication medium between a human and a mobile. changing or retrieving data. to system that inter-operates with it and with people who use it. It should prevent any action that will create a processing error. but that will facilitate equally effective use by novice users. The design of interface between a human and the mobile. Interface design begins with the identification of user. The design of interfaces between software components 2.The interface design describes how the software communicates within itself. or retrieving data. changing.


g. Support regression testing. The support these goals. integration testing. CUSAT Page 66 . Report the result of the test suite. Failure to produce test scripts makes regression testing more expensive and less likely to occur. DEPARTMENT OF COMPUTER APPLICATIONS. and launch testing). system testing. the objectives of a single test script include: Execute each test case in the test suite. TEST SCRIPTS A test script is a testing work product modeling a software program (often written in a procedural scripting language) that executes a test suite of test cases The goals of a test script are to automate or document the following: Automate the execution of test cases.TEST PLAN Test Plan describes the testing strategy and approach to testing. It also contains various resources required for the successful completion of this project. QA is to validate the quality of the product prior to release. unit testing. which are documented in the associated test reports. If the quality of the test scripts is not at least as good as the quality of the item under test then it will be difficult to know if the defect causing the failure of the tests. GUIDELINES Three test scripts will be used at all levels of testing (e. A test script provides the following benefits: Automates a single test suite. thereby supporting regression testing..

which is aimed at earning system running accurately and efficiently. The performance factors like turn around time. back up. integration testing. CUSAT . System testing is designed to uncover weaknesses that are not found in the earlier tests. After the candidate system passes the test. display. Effective testing early in the process translates directly into long-term cost savings from a reduced number of errors. file protection and human factors are some of the performance criteria for system testing. recovery from failure and usability. acceptance testing. Back up files are need when the system is failure or down. The usability test verifies the user-friendly nature of the system. A test plan has the following steps • • • • • • Prepare test plan Specify conditions for user acceptance testing Prepare test data for program testing Prepare test data for transaction path testing Plan user training Compile/assemble programs Page 67 DEPARTMENT OF COMPUTER APPLICATIONS.SYSTEM TESTING Testing is the stage of implementing. All this is done with the old system still in operation. Careful planning and scheduling are required to ensure that modules will be available for integration into the evolving software product when needed. The total system is tested for recovery and fallback after various major failures to ensure that no display is lost during the emergency. A system is tested for online response. System testing involves unit testing. the old system is discontinued. as its users in the operational environment will implement it. The purpose of the system testing is to identify and correct errors in the new system. This includes forced system failure and validation of the total system. Accurate and complete documentation is necessary for the user-friendly nature of the system.

Local data structures are examined to ensure that data stored temporarily maintains its integrity during all steps in algorithm execution. The interrelated modules were also tested in an exhaustive that will make the whole software work properly. • Display is same for all android devices. The objective of testing is to discover errors.. CUSAT Page 68 . DEPARTMENT OF COMPUTER APPLICATIONS. asks a logical assumption that if all the parts of the system are correct. • • • • Module interface is tested to ensure that information properly flows into and put of the program under test. To fulfill these objectives a series of tests were planned and executed. Thus it was possible to conclude that every program in the software was functionally correct. All independent paths through the control structures are executed to ensure that all statements in the module have been executed at least once. The system on a whole was tested for the following: • Speed of data fetching from radiotimes. System testing is the stage of implementation that is aimed at ensuring that the system works accurately and efficiently before live operation commences. • Sequential tests • Consistency of the application System testing. Unit Testing Here. The outputs as per the requirements were found satisfactory. The logical design and the physical design should be thoroughly and continually examined on paper o ensure that they will work when implementation should be a confirmation that all is correct and an opportunity to show the users that the system works.• Prepare job performance aids. each individual program was tested using the test data. All display is tested to ensure that it is applicable for all android devices. the system will be successfully achieved.

Error handling paths are also tested.

This test focuses verification effort on the smallest unit of software design, the module. Here, the module interfaces, local data structure, displays, and all independent paths and last but not the least, all error handling paths were verified by inputting false data. Tests of data flow across each module interface of this software were done before any other test was initiated. A unit testing focuses on the verification effort on the smallest unit of the software design. Using the unit test plan prepared in the design phase of the system, important control paths be tested to uncover the errors within these module. This testing was carried out doing the coding itself. In this testing steps, each module is going to be working satisfactorily as the expected output from the module.

Integrated Testing The individual programs are combined together to form modules. Integrated tests were performed on each of the modules and again the validity was checked. After that, all modules were brought under a single module and the integrity test was found to be successful. This system was validated in such a way that even the slightest deviation in inputting the data will invoke error messages and provide guidelines regarding the input. Before the software is being released, the developers to do testing by implementing the commercial security package for security. This ensures that the software works properly. These tests can also be performed • • Top down integration Bottom up integration

It is systematic technical for constructing the program structure while at the same time conducting test to uncover errors associated with the interface. The objective is to take unit tested module and build the program structure that has been detected by design.


Page 69

All modules are combined in this testing step, and the entire program is tested as a whole. If a set of errors are encountered correction is difficult because the isolation of causes is complicated by vastness of the entire program. Using integrated system test plan prepared in the design phase of the system developed as a guide, he integration was carried up.

System Testing When a system is developed, it is hoped that it performs properly. In practice however some errors always occur. The main purpose of testing and information system is to find the errors and correct them. A successful test is one which finds an error. The main objectives of system testing are • • • • • To ensure during operation the system will perform as per specifications. To make sure that the system meets user’s requirements during operation. To verify that the controls incorporated in the system function as intended. To see that when correct inputs are fed to the system the outputs are correct. To make sure that during operation incorrect input and output will be show error message. The scope of a system test should include computerized operation. Operations system testing is a comprehensive evaluation of the programs, manual procedures, computer operations and controls. System testing is the process of checking if the developed system is working according to the original objectives and requirements. All testing needs to be conducted in accordance to the test conditions specified earlier.

Validation Testing Validation testing is done to ensure complete assembly of the error-free software. Validation can be termed successful only if it functions in manner that is reasonably expected by the customer.


Page 70

Under validation is alpha and beta testing. Alpha testing is where the end user tests the system rather than the developer, but in a controlled environment. The software is used on a natural setting with the developer monitoring the user using the system. The developer records the errors and usage problems encountered by the user. The sales person conducts beta testing at one more sites. The developer is not present during these tests. Hence, beta test can be said as the live application of the software on an environment that cannot be controlled by the developer. The sales person takes down the problems encountered during beta testing and reports these to the developer at regular intervals. The developer makes suitable modifications to the software henceforth. The first step in system testing is to develop a plan that tests all the aspects of the system. Completeness, correctness, reliability and maintainability of the software are to be tested for the best quality assurance-an assurance that the system meets the specification and requirements for its intended user and performance. System testing is most useful practical process of executing a program with explicit intention of finding errors that makes the program fail. The following phases were developed.

Module Testing Each individual programs module is tested for any possible errors. They were also tested for specifications, i.e. to see whether they are working as per what the program should do and how it should perform under various conditions. Display Testing The display procedures were tested since the displayed is of most importance. The data was input in the different modules and it was checked whether the information is

including appearance clarity and navigation. Special care was given to user interface comments. CUSAT Page 72 . The consistency of the display and attractiveness of the display were also tested. DEPARTMENT OF COMPUTER APPLICATIONS. hardware and software. Performance: These test the performance of the web applications under load. The list of possible values. Security: These test the adequacy and correctness of security controls including access control and authorizations. applications and data. Usability: These test the overall usability of a web page or a web application. the attractiveness and user-friendliness of the software was well appreciated. The following tests were also conducted over the system developed: • • • • • Integration: These test the integration between browsers and servers. Comments and suggestions from the observations during the test run were later considered.properly displayed in the other dependent modules. Verification of code: this validate that the code used in building the web application has been used in a correct manner.



This phase occurs after the software has been delivered to the customer and put into operation. Deployment is the process of establishing all the system elements at the end user organization. Various system elements involve software, hardware, database, people, documentations and procedures. This involves 1. 2. User interaction/presentation component Database component

User interaction/presentation component: In order to make it an interactive application a user interface is necessary. This component implements all function that are typically associated with a graphical user interface. Database component: This component performs the data manipulation and management required by an application. Data manipulation and management may be as simple as the transfer of a record or as complex as the processing of sophisticated transactions. This application was developed on android/sqlite.

Implementation is the stage in the project where the theoretical design is turned into a working system and is giving confidence on the new system for the users that it will work efficiently and effectively. It involves careful planning, investigation of the current system and its constraints on implementation, design of methods to achieve the change over, an evaluation, of change over methods. Apart from planning major task of preparing the implementation are education and training of users. The more complex system being implemented, the more involved will be the system analysis and the design effort required just for implementation. An implementation co-ordination committee based on policies of individual organization has been appointed. The implementation process begins with preparing a plan for the implementation of the system. According to this plan, the activitites are to be carried out, discussions made regarding the equipment and resources and the additional equipment has to be acquired to implement the new system. Implementation is the final and important phase. This is the most critical stage in achieving a successful new system and in giving the users confidence that the new system will work effective. The system can be implemented only after thorough testing so as to provide effectiveness. This method also offers the greatest security since the old system can take over if the errors are found or inability to handle certain type of transaction while using the new system. It involves the individual programming system testing; user training and the operational running of developed proposed system that constitutes the application subsystems.

One major task of preparing for implementation is education of users, which should really have been taken place much earlier in the project when they were being involved in the investigation and design work. During the implementation phase system actually takes physical shape. In order to develop a system implemented, planning is very essential. The implementation phase of the software development is concerned with translating design specification in to source code. The user tests the developed system and changes are made according to their needs. This system has been successfully implemented. Before implementation several tests have been conducted to ensure that no errors are encountered during the operation. The implementation phase ends with an evaluation of the system after placing it into operation for a period of time. Implementation is the third phase of the system process. In order to achieve the objectives and the expected performance the system has been developed in a highly interactive and user-friendly manner. At the beginning of the development phase a preliminary implementation plan is created to schedule and manage the many different activities that must be integrated into plan. The implementation plan is updated throughout the development phase, culminating in a changeover plan for the operation phase. The major elements of implementation plan are test plan, training plan, equipment installation plan and a conversion plan. There are three types of implementation: 1. 2. 3. Implementation of a internet radio to replace a manual system. Implementation of a new mobile to replace an existing one. Implementation of a modified application to replace an existing one, using the same computer.

After considering all the phase of the system life cycle the proposed system is now implemented successfully.

System maintenance and service:

it is likely that the customer will defects in the software. Preventive maintenance: Computer software deteriorates due to change. Type of changes that can be encountered during the maintenance phase: Corrective maintenance: Even with the best quality assurance activities. Enhancement management: As software is used. the listener will recognize additional functions that will provide benefit. must be conducted to enable the software to serve the needs of its end users. DEPARTMENT OF COMPUTER APPLICATIONS. adapted and enhanced. They will perform the beta testing at the end users place and inform to the developers about any needed modifications to be application. the software developer makes modifications and then prepares for release of the software product to the entire customer base. the original environment (CPU.This phase occurs as a result of deploying the whole system at the end users organization. preventive maintenance often called software reengineering. and because of this. business rules external product characteristics) for which the software was developed is likely to change. As result of problems reported during implementation. Preventive maintenance makes changes to computer programs so that they can be more easily corrected. The customer records all the problems that are encountered during the beta testing and reports these to the developer at regular intervals. Perfect maintenance extends the software beyond its original functional requirements. CUSAT Page 76 . Corrective maintenance changes the software to correct defects. Adaptive maintenance results in modification to the software to accommodate changes to its external environment. operating system. Adaptive maintenance: Over time.


DEPARTMENT OF COMPUTER APPLICATIONS.When open the application this screen will be visible. CUSAT Page 78 .



DEPARTMENT OF COMPUTER APPLICATIONS.Creating database. This is radio playing tab. CUSAT Page 81 .




DEPARTMENT OF COMPUTER APPLICATIONS.Stations of the particular category is listed. CUSAT Page 85 .











DEPARTMENT OF COMPUTER APPLICATIONS.Adding the playing item to favorite list. CUSAT Page 96 .



CUSAT Page 99 . The playing information can be shown as notification on status bar.INTERNET RADIO application can be enhanced by including features like : • • • User can change the background of the application. DEPARTMENT OF COMPUTER is not working. • Podcasting option can be implemented. Application can fetch data from VTuner rather than radiotimes because sometime radiotimes.


The system is highly flexible and is well efficient to make easy interactions with the database. DEPARTMENT OF COMPUTER APPLICATIONS.INTERNET RADIO is a user-friendly interactive Application for android device and requires no prior knowledge of software. CUSAT Page 101 . The goal of computer security to maintain the integrity. Some errors were spotted out during the system testing and were corrected. All the suggestions forwarded during the software proposal have been successfully completed and final threshold of application has been crossed. availability and privacy of information entrusted to the system was successfully obtained. The system developed for the given conditions specified by the firm was found working efficiently.


The Complete Reference Java2 Android Essentials. Now a days it is being treated as a repository of knowledge. books only are not single and sufficient resources of knowledge. 3.pdf Professional Android Application Development-0470344717. On internet a lot of useful information is available. 2.pdf In the net-era. and we did not miss the chance to utilize such a huge resource of knowledge.BIBLIOGRAPHY B ooks:The following are the list of some of the books that where referred during the working over the project 1. DEPARTMENT OF COMPUTER APPLICATIONS. CUSAT Page 103 . DEPARTMENT OF COMPUTER http://www.Web Resources:- http://www.tutorialforandroid. CUSAT Page 104

Sign up to vote on this title
UsefulNot useful

Master Your Semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master Your Semester with a Special Offer from Scribd & The New York Times

Cancel anytime.