You are on page 1of 35

Table of Contents

1. Introduction 1
1.1 Purpose 1
1.2 Scope 1
1.3 Definitions, Acronyms, and Abbreviations. 1
1.3.1 API’s 1
1.3.2 DFD 2
1.3.3 STD 2
1.3.4 MVC 2
1.3.5 OS 2
1.3.6 SQL 2
1.3.7 SVM 2
1.3.8 DB 2
1.3.9 Codeigniter 3.0 2
1.3.10 PHP 2
1.3.11 ER Diagram 2
1.4 References Error! Bookmark not defined.
1.5 Overview 3

2. The Overall Description 3

2.1 Product Perspective 4
2.2 Product Functions 4
2.3 User Characteristics 5
2.4 General Constraints 5
2.5 Assumptions and Dependencies 6

3. Specific Requirements 6
3.1 External Interface Requirements Error! Bookmark not defined.
3.1.1 System Interfaces Error! Bookmark not defined.
3.1.2 Interfaces Error! Bookmark not defined.
3.1.3 Hardware Interfaces Error! Bookmark not defined.
3.1.4 Software Interfaces Error! Bookmark not defined.
3.1.5 Communications Interfaces Error! Bookmark not defined.
3.2 Functional Requirements Error! Bookmark not defined.
3.2.1 User Login Error! Bookmark not defined.
3.2.2 View Account Error! Bookmark not defined.
3.2.3 Delete Post or Account Error! Bookmark not defined.
3.2.4 Initialize Tweet Error! Bookmark not defined.
3.3.1 Use Case #1 Error! Bookmark not defined.
3.3.2 Use Case #2 Error! Bookmark not defined.
3.4 Classes / Objects Error! Bookmark not defined.
3.4.1 User Controller Error! Bookmark not defined.
3.4.2 Tweet Controller Error! Bookmark not defined.
Tweet Storage and Analysis

3.4.3 Analysis Controller Error! Bookmark not defined.

3.4.4 Database Error! Bookmark not defined.
3.5 Non-Functional Requirements Error! Bookmark not defined.
3.3.0 Performance Error! Bookmark not defined.
3.5.2 Reliability Error! Bookmark not defined.
3.5.3 Availability Error! Bookmark not defined.
3.5.4 Security Error! Bookmark not defined.
3.5.5 Maintainability Error! Bookmark not defined.
3.5.6 Portability Error! Bookmark not defined.
3.6 Logical Database Requirements 11
3.7 Design Constraints 13
3.7.1 Parent Component: Codeigniter 13
3.7.2 Software Language 13
3.7.3 Execution Constraints 13

4. Analysis Models 14
4.1 Sequence Diagrams 14
4.1.1 Sequence diagram for “User Login” 15
4.1.2 Sequence diagram for “Tweet Search” 16
4.1.3 Sequence diagram for “Tweet Store” 17
4.1.4 Sequence diagram for “Analysis Tweet” 18
4.2 Data Flow Diagrams (DFD) 19
4.2.1 DFD Level 0 20
4.2.2 DFD Level 1 20
4.2.3 DFD Level 2 21
4.3 State-Transition Diagrams (STD) 22

5. Supporting Information 24
Appendix A – Background Research on: 24
Appendix B – Data Dictionary 24
Appendix C – Proposal 26

Tweet Storage and Analysis

1. Introduction
Social life in most of our University is diminishing because of some factor. These limitations
of social life have affected some of the students not to know how to relate in the outside world. In
Caritas University socialism is a problem. In building a social network website for the University will
make the University to solve the problem of the anti socialism. A social network is a social
structure made up of individuals (or organizations) called "nodes," which are tied (connected) by one
or more specific types of interdependency, such as friendship, kinship, common interest, financial
exchange, dislike, or relationships of beliefs, knowledge or prestige.

1.1 Purpose

The main objectives of the study are Computer science Social Network while the subsidiary
objectives are:

i. To Effectively and efficiently communication of student online

ii. To Reduce pressure on seminars by introducing online seminar
iii. To Enhance the department document management
iv. To Reduce queue in seeing of lecturers and head of departments
v. To Reduce anti Socialism
vi. To Creation of educative groups online to enhance learning
vii. To Forming reading partners online
viii. To Making new friends online
ix. To Boasting the image of the school

1.2 Scope

The scope of this study is centered on designing and automated and web-based application
for student online communication and reduction of anti socialism. The system is
strictly based on students, management and lecturers communication and online
seminars and suggestion and specially for making of friends.

1.3 Definitions, Acronyms, and Abbreviations.

1.3.1 API’s
Application Programmer Interfaces

SRS Document 1.0 Page 1 of 41 11/19/18f

Tweet Storage and Analysis

1.3.2 DFD
Data Flow Diagrams

1.3.3 STD
State-Transitions Diagrams

1.3.4 MVC
MVC is model view controller. It has three parts Model, view and controller. Model
relates to database and use to store data of users. View shows the actual output of the user.
Controller controls the working of all systems. Controller is an interaction between user and the

1.3.5 OS
Operating System

1.3.6 SQL
Structured query Language. That is used to store data

1.3.7 SVM
Support Vector Machine

1.3.8 DB

1.3.9 Codeigniter 3.0

Codeigniter 3.0 is a recentversion of Codeigniter framework written for PHP.

1.3.10 PHP
Hypertext Preprocessor (Personal Home page) created by Rasmus Lerdorf in 1995.

1.3.11 ER Diagram
Entity Relationship diagrams. It is to represent the data and also describe how these data
are related with one another.

SRS Document 1.0 Page 2 of 41 11/19/18

Tweet Storage and Analysis

1.5 Overview

The Laboratory management system is built in order to replace manual based system to computerize.
Here system is expected to be efficient, useful and affordable on implementing tasks that is order by the
Lab in charge.

Laboratory Practice in The Past

This gives an overview of events that have occurred in Laboratory practice through several ages both in
the past and present, and also indicates possible events of the future.

2. The Overall Description

This Section describes the general factors that affect the system and its requirements.All
description of the project related functions are defined here.

SRS Document 1.0 Page 3 of 41 11/19/18f

Tweet Storage and Analysis

2.1 Product Perspective

The important purpose of this system is that we make an application that collect tweets of
user and analyze them and show the results in a way as per user requirements. When
analyze any tweet it can classify into groups such as positive, negative and etc. The
system has three important components 1) User Interfaces 2) Components of System that
the user used 3) System Modules.Modules keep tweets processing, how data gathered and
store them, how the tweet analyzes and show to user. Tweets fetched thorough the
Twitter API’s which create the interaction between user and the Twitter. When system
analyze the tweet it will return some information about tweet such as name of user who
post the tweet, time of tweet, location of tweet, how many people re tweet on this tweet.
Different people have different opinion and they post tweets in different manners.The
product also calculates results on that tweets.

2.2 Product Functions

The main purpose of the application is to fetched the tweets of user from Twitter store the
tweets in the databases and analyze the tweets. We need some API’s that help us to
extract data from twitter and need a framework that analyzes those tweets. We use this
tweets to examine the human behavior and problem of user. The application will show
that the tweet is related with some emotions and some other objects. Tweets are classified
in different types such as positive feelings, negative feelings and political types. Then the
application will easily be extract data from that classify tweets that the user need.

Some particular functions of the system are:

(1) Login into Twitter.

(2) Post a tweet.
(3) Store the tweet into database.
(4) Analyze the tweet.
(5) Show the result.

SRS Document 1.0 Page 4 of 41 11/19/18f

Tweet Storage and Analysis

Twitter is a Networking site where everyone shares their opinions by posting tweets. User
may be varies from simple user to into different actors. Everyone share their thoughts in a
whole day by tweets. So the main function of this application is to analyze the all types of
tweets that get from posts and show the result.

2.3 User Characteristics

Twitter is used by every user. A user who used twitter is not necessary that the user
always a regular user. User characteristics may be changed into different categories such
as user may be a doctor, may be a student, may be a politicians, may be an film actor,
may be a star and maybe he or she is a simple user that do nothing but use twitter. All
users has own characteristics, opinions and thoughts. A user perform different task. Users
poststhe tweets, users re tweet to other tweet, users may be favorite the tweets, user may
be check the timelines of other users and users may be follow to other users. System will
be available for every user there is no restriction on user.

2.4 General Constraints

Certain limitations of API are defined following:

(1) Tweet must be in English and there must a hash tag according to need.
(2) Reply or comment is included.
(3) Picture tweets are not included.
(4) Tweet will be accessible according to the limitation of API.
(5) Tweets without hash tag not included.
(6) To collect tweets there will be a limit of number of tweets that will be stored
according to storage and API.
(7) First of all we will register a user to access our application and session will
be created.
(8) Without registration nobody will access application.
(9) User will access tweets data according to granted permission by the admin.
(10)API allows only 6 to 9 days keeping history of data.

SRS Document 1.0 Page 5 of 41 11/19/18f

Tweet Storage and Analysis

(11) Tweets that store only allow 1000 characters.

2.5 Assumptions and Dependencies

The application depends upon different user factors:

1. Internet Service is available.

2. A twitter account

3. If the user use mobile then the twitter application must be installed in the mobile.

The application depends upon different system factors:

1. API’s are available that fetched data from Twitter.

2. Database where store the fetched tweets.

3. Frameworks need where we write code that controls all the execution of system.

Some assumptions are:

Sentiment analysis of tweets is assumed that the all tweets are neutral. Because the
objective of this SRS is to check that the people posts tweets are relate to emotions that
are define in the limitations. If any user post tweet that not relate to any emotion and he
or she cannot express their feelings in tweet then we can assumed that the collecting of
tweets is may be neutral [6].

3. Specific Requirements
This will be the largest and most important section of the SRS. The customer
requirements will be embodied within Section 2, but this section will give the
requirements that are used to guide the project’s software design, implementation, and

SRS Document 1.0 Page 6 of 41 11/19/18f

Tweet Storage and Analysis

3.1 System Analysis

The act, process, or profession of studying an activity (as a procedure, a business, or a physiological
function) typically by mathematical means in order to define its goals or purposes and to discover
operations and procedures for accomplishing them most efficiently.

Another view sees system analysis as a problem-solving technique that decomposes a system into its
component pieces for the purpose of the studying how well those component parts work and interact to
accomplish their purpose. Analysis and synthesis, as scientific methods, always go hand in hand; they
complement one another. Every synthesis builds upon the results of a preceding analysis, and every
analysis requires a subsequent synthesis in order to verify and correct its results. The field of system
analysis relates closely to requirements analysis or to operations research. It is also “an explicit formal
inquiry carried out to help a decision maker identify a better course of action and make a better decision
than she might otherwise have made.

System analysis is the study of sets of interacting entities, including computer systems analysis. This field
is closely related to requirements analysis or operations research. It is also “an explicit formal inquiry
carried out to help someone identify a better course of action and make a better decision than he might
otherwise have made. System Analysis is a methodology that involves the application of systematic
approaches to collects facts about an existing system with the aim of improving it or replacing it with more
efficient system within the context of the available resources. In other words, System analysis can also be
viewed as the process of investigating a system, identifying problems and using the information to
recommend improvements to the system.

Analysis of Existing System

Before we analyses the design of the proposed system, we need to carefully highlight the problems of the
existing system so as to avoid recurrence. Every day, millions of blood specimens are analyzed as part of
routine clinical work in hospitals and medical practices throughout the world. Laboratory tests performed
are analyzed in clinical laboratories and are usually recorded in computer-based laboratory information

 Significant amount of time is allocated for writing the order as the pharmacist needs to go through the
stock balance and make rough estimate for the amount to order based on Figures.
 The state of drugs in stock is manually checked.
 Mistake of selling expired drugs to customers.
 Too much workload on employees
 Filing cabinet in the pharmacy with paper record.
Analysis of Proposed System
From the problems listed in the existing system, the implementation of the proposed system shall focus

 Pharmacists having access to the proposed system at any time.

 Ensuring effective policing by providing statistics of the drugs in stock.
 Improving the efficiency of the system by ensuring effective monitoring of services and activities.
 Generating report within a specified period of time.
 Reducing the employees’ workload.
3.2 Requirements Definition

SRS Document 1.0 Page 7 of 41 11/19/18 f

Tweet Storage and Analysis

Preliminary investigation plays an important role in developing a satisfactory requirement. Its’ as a result
of thorough investigation of how the current or the existing system works using the facts gathered at the
preliminary investigation that leads to focusing on the possibility of replacing the existing system or
improving upon the existing system. This task involves information gathering.

Method of Information Gathering

Collection of fact is the act of getting and gathering information from various sources in order to be able to
compose the project. Data used for designing of the system were gathered through several means.
Therefore the method used in the design and collections of information from various sources are as

 Collecting and analyzing existing materials on the project topic, written by different expert.
 Studying the present system in detail and the organizational style.
 Knowing and understanding the input and output processes of the existing system.
 Interviews: A qualitative form of interview was conducted in the pharmacy to know the equipment
needed, and the mode of operation of the old system.
 Primary data: This source has to do with the text book contacted for the development of this project.
3.3 System Design
Systems design could be seen as the application of systems theory to product development. There is
some overlap with the disciplines of systems analysis, systems architecture and systems engineering

System design is the process of defining the architecture, components, modules, interfaces, and data for
a system to satisfy specified requirements through system modeling. One could see it as the application
of systems theory to produce development. The design of this system will be user friendly. It shall be
designed in such a way that employees will be able to navigate easily through the information supplied on
the system.

In other words, system design consists of design activities that produce system specifications satisfying
the functional requirements that were developed in the system analysis process. System design specifies
how the system will accomplish. System design is the structural implementation of the system analysis

SRS Document 1.0 Page 8 of 41 11/19/18 f

Tweet Storage and Analysis

SRS Document 1.0 Page 9 of 41 11/19/18f

Tweet Storage and Analysis

SRS Document 1.0 Page 10 of 41 11/19/18f

Tweet Storage and Analysis

3.6 Logical Database Requirements

ER diagram is our logical database requirements. It is used to represent the attributes and
classes of our system. It can also use to show relationships.

 It is used to show entity

 This symbol represents the attributes of entities

 Line used for to show relation between entities


SRS Document 1.0 Page 11 of 41 11/19/18f

Tweet Storage and Analysis

3.6.1 Logical Relation Tables

User ID User Email User Name User Password Gender


ID Tweet ID Tweet Tweet Hash tag


ID Hash tag Description


T-id ID ID


Name No of Tables User ID ID ID

SRS Document 1.0 Page 12 of 41 11/19/18

Tweet Storage and Analysis

3.7Design Constraints

Specify design constraints that can be imposed by other standards, hardware limitations,

3.7.1 Parent Component: Codeigniter

Tweet analysis application will be in Codeigniter .

3.7.2 Software Language

Core language will be PHP but we will follow the structure of Codeigniter 3.0 in MVC.

3.7.3 Execution Constraints

First of all we will search tweets from twitter of an event, occasion etc. All the tweets
with hash tag will be available to search without hash tags no tweets will be searched.
Tweets with hash tag will be stored in database that later will be used for analysis.

SRS Document 1.0 Page 13 of 41 11/19/18f

Tweet Storage and Analysis

4. Analysis Models
4.1 Sequence Diagrams
Sequence Diagram shows how events move from object to object to object. How events
cause flow from one object to another in the time period. Sequence diagram is a short
representation of use case activities.Once a complete sequence diagram has been
developed, all of the events that cause transitions between system objects can be collated
into a set of input eventsand output events (from an object). This information is useful in
the creation of aneffective design for the system to be built. Different symbols used for
this purpose.

 Used for object or class

 Works as an actor

 Used for activation of process

 Lifeline symbol of objects

 Synchronization of message

 Reply of message

SRS Document 1.0 Page 14 of 41 11/19/18f

Tweet Storage and Analysis

4.1.1 Sequence diagram for “User Login”

SRS Document 1.0 Page 15 of 41 11/19/18f

Tweet Storage and Analysis

4.1.2 Sequence diagram for “Tweet Search”

SRS Document 1.0 Page 16 of 41 11/19/18f

Tweet Storage and Analysis

4.1.3 Sequence diagram for “Tweet Store”

SRS Document 1.0 Page 17 of 41 11/19/18f

Tweet Storage and Analysis

4.1.4 Sequence diagram for “Analysis Tweet”

SRS Document 1.0 Page 18 of 41 11/19/18f

Tweet Storage and Analysis

4.2 Data Flow Diagrams (DFD)

Diagram that is used to show the data flow between external sources and processes and
data store with in a system. It is consists three levels Level 1, Level 2 and Level 3.

Symbols are used to represent the objects into diagram.

 It is used for Data Process

 It is used for to store data and tables names that uses in database.

 This symbol represents the data flow.

 Represents the entity or source

SRS Document 1.0 Page 19 of 41 11/19/18f

Tweet Storage and Analysis

4.2.1 DFD Level 0

4.2.2 DFD Level 1

SRS Document 1.0 Page 20 of 41 11/19/18f

Tweet Storage and Analysis

4.2.3 DFD Level 2

Diagram #1

Diagram #2

SRS Document 1.0 Page 21 of 41 11/19/18f

Tweet Storage and Analysis

4.3 State-Transition Diagrams (STD)

State diagram relate with states and events. States change and it is called transition of
states. Events change and move from state to state. A message shows in each state that
describes the relation between events. It is contain a start and final states and different
paths. It is also contain condition symbols.

 Represent the states of diagram

 Initial state

 Final state

 Decision symbol

 Synchronization state

 Transition symbol

SRS Document 1.0 Page 22 of 41 11/19/18f

Tweet Storage and Analysis

State Transition Diagram

SRS Document 1.0 Page 23 of 41 11/19/18f

Tweet Storage and Analysis

5. Supporting Information

Appendix A – Background Research on:

 Comparative Study and Analysis of Social Networking Sites

 Data Mining for Tweet Sentiment Classification
 Sentiment Analysis of Twitter Posts
 Twitter Sentiment Analysis For Marketing Research

Appendix B – Data Dictionary

 APIstands for Application Programmer Interface. API contains set of rules and protocols
that is used for to build an application. It is used to specify that how the components of
software interact with one another.

 DFD stands for Data Flow Diagram. DFD is a graphical representation of flow of data
using some components and objects. It can also use for the visualization of data. A DFD
describe the information of the data where the data comes from, where will go and where
will be store.

 DB stands for Database. Database is the major components of any system or software
because it used for store data.Database contains tables where data store in the form of
rows and columns.

 ER is an Entity Relationship diagram. It is invented by Peter Chen in 1976. ER contains

Entities and relationship. Relationships are used to describe the relation among entities
exist in our system.

 Framework is a structure indicates that how program built and how the components of
program interact with one another.Framework includes actual coding of program and
interface of programming. It is also called Skelton of the system.

 Git-Hub is a web-based software system that is to store online coding of our application.
We can access of our whole application code just by use them software.

SRS Document 1.0 Page 24 of 41 11/19/18f

Tweet Storage and Analysis

 Hash tag is a word that is defines with a hash symbol (#). It is used on social sites such
as Twitter to detect a message and post on a specific topic.

 Codeigniter 3.0 is PHP framework that is used for develop the web applications by
follow the MVC (model view controller) structure. Codeigniter source code hosts by Git-

 MVC stands for Model View Controller. It is containing three parts model, view and
controller. Model is used to relate database. View is used to show the output. Controller
is used to control the working of the system and is also used to show the interaction
between the model and view.

 OS stands by Operating System. It is an important program that runs on a computer.

Every computer must have an operating system that is used for to run other program and
applications on computer.

 PHP stands by Hypertext Preprocessor. PHP is a most popular language that is mostly
used for web development applications.

 SQL is structured Query Language. SQL is used for communication with the databases
through SQL queries. It is a language that is actually used for relational database
management system. We use different type of queries to extract data from database.

 SRS stands for Software Requirement Specification. It is written document of system that
can we developed. It is include functional and non-functional requirements about the
system. It is also include some diagrams that show the interaction of user and system.

 STD is State Transition Diagram. It is consisting number of states called finite states
diagrams. It is a dynamic flow of system state by state.

 SVM stands for Support Vector Machine. It is used to analyze the data by using some

 Use Case is a list of events or actions and interactions between the user and the system. It
is contain many use cases that the user performs in some different environment.

SRS Document 1.0 Page 25 of 41 11/19/18f

Tweet Storage and Analysis

Appendix C – Proposal


Surveys are very popular for collecting data but it is very costly. So we suggest social media
analysis using different social websites. For example: Facebook, Twitter, Gmail, etc. In my
research work I will use Twitter. In which firstly collect the ‘‘tweets’’ and analyze Tweets in
different manners. When any user post the tweet on Twitter then store the tweets of user and
analyze it for checking that the tweet relate with happy mood, sad mood, politics and relate to
some other event. For this purpose we will use different tools and framework relate to this
analysis. We also use Database to store our tweets. Tweets are used for information from
different sources and also used to share experiences and opinions on different topics. By posting
tweets on Twitter millions of users share own opinions on different aspects of life every day.
People tweets according to their own thoughts what he wants to share and what he can feel?
Twitter is most popular website to share opinions and thoughts seconds by seconds. We show
how to collect the tweets and how to analyze that tweet and show the result about that tweet and
using different tools and framework we perform better than previously proposed methods. This
research explores the use of social media website Twitter to examine when user tweet or Re
tweet then we analyze where the user from, which country and what’s the location where the
user use the social media.

1. Introduction

Twitter is a social service that has rapidly become the social media service that is mostly used in
strategic communication campaigns [1]. Twitter is a network that enables the users to share
information or share their thoughts using private and public messages and networks. User tweets,
Re tweet, favorite, or follow by using their cell phones and their laptops and by other device as a
text message. Ability to communicate is real-time with short messages every time in a day.
Social media, including Twitter, are said that it can be used for collect information about any

SRS Document 1.0 Page 26 of 41 11/19/18f

Tweet Storage and Analysis

occasion and about any incident like earthquake and communication among family and friends.
Consequently, users activity logs on Twitter exist in the form of tweets. Therefore it is easily to
understand to observe that what happened with the user by analyzing his or her tweets. We also
detect that what happened with the user and what happened with the network by analyzing
tweets. With the help of Tweets we analyze what’s the problem in that country for that reason the
network problem exists. Tweets can be used to examine the human behavior.

To post tweets, we use three types of media: PCs, mobile phones, and smartphones. Social
amplification of risk describes that psychological, social, and cultural factors interact with
emergency events or attenuate risk perceptions [2]. New methods such as data mining, aggregate
the data, and analyze the data from social sites in real-time are available [3]. Twitter
( is very popular and suitable for data storage and analysis the data of the users
who use Twitter and post tweets according to their own requirements. Users update their status
by tweets and share with followers and friends on different emotions (e.g. thoughts, feelings,
activities, and opinions).

Social websites are very popular among Internet users. Millions of messages and posts of million
users are collect daily in social web-sites such as Twitter [4], Tumbler [5], and Facebook
[6].Users write about their own life, share thoughts, share own experiences on different topics
and discuss current issues about media, marketing and country issues. Users also post about their
products that they will use and share jobs experiences. A user can express their political and
religious views. We collect all those data that used for marketing and social analysis thatshow
the behavior of the user that he or she adopts in the whole day.

We use a dataset formed of collected messages from Twitter. Tweets contain a short text or long
text created by the user. Table 1 shows the examples of tweets post on Twitter by user.

SRS Document 1.0 Page 27 of 41 11/19/18f

Tweet Storage and Analysis

saaan: @Chicago Hopefully the day of games are best day for Chicago.

brookly: I love the sound my mobile when I unlock my phone and enter the password. Tick
Tuck Tock.

john: I like the way when Google change their appearance in every day it was very decent.

Table 1: Examples of Twitter posts users’ with feelings and opinions

Twitter’s users change from regular users to celebrities, company representatives, politicians [7],
and even country presidents. Therefore, the data that will collect relate to different social and
different interests groups. Twitter’s user may be represented from many countries [8]. We
collected text from posts on Twitter in three types of texts:

1. Posts of data which contain positive feelings, such as happiness, love or joy.

2. Texts which contain negative, such as sadness, anger or disappointment.

3. Posts that relate to politics and do not express any feeling.

2. Literature Review

Researchers are continue to show a strategies used by companies to develop relation with users,
workers and developers. Strategies used to examine the nature and behavior of the messages that
the users communicate with their friends and followers on social websites. While [9] dialogic
principles and [10] relationship strategies discuss open. When social media analysis is not
available then we don’t know the behavior of the user and not know what they said in

SRS Document 1.0 Page 28 of 41 11/19/18f

Tweet Storage and Analysis

With the help of social networks, opinion and data mining analysis became a very interesting
field for many users. They can easily analyze the data of the user and understand the behavior of
the user and understand what the meaning of the user conversation. A very broad overview of the
existing work was presented in [11]. In their survey, the users explain the existing techniques and
approaches for the tweet storage and analysis. They describe their opinions on that information
that they collect from different posts on Twitter. However, for this purpose we use many Twitter
API’s that help us to collect data corpus of text posts and convert it into three types of classes.
These classes help us to analyze our data in a better and efficient way. Three classes are: positive
emotions, negative emotions, and a set of texts that has no emotions (relate some other).

To collect the positive and negative classes, we followed the same method that used in [12], [13].

We separate the Twitter in two types of emotions:

• Happy emotions: “:-)”, “:)”, “=)”, “:D” etc.

• Sad emotions: “:-(”, “:(”, “=(”, “;(” etc.

Other positive sets are many, much, more and best. Negative sets are the opposite of the positive
sets. Negative sets show the loss or disappointment of user. Such words used mostly to express
negative feelings like: “missed”, “bored”, “gone”, “lost”, etc.

As [14] research on the usage of social media cover a range of social media sites including social
networking sites, photo editing and education. We define the most frequent users who use
Twitter and post frequently many tweets per day. We also collect the data of those users who
post tweets per day in a certain manner. We choose frequent Twitter usersfrom all users we
crawled. We extract tweets of frequent Twitter users and store into dataset assemble the tweets in
an efficient manner so that we know easily which tweet relate to which emotion and then analyze
the tweets according to requirement. We count the tweets by the manner of time as per hour;
minute and seconds and normalize these tweets for analysis.

SRS Document 1.0 Page 29 of 41 11/19/18f

Tweet Storage and Analysis

3. Problem Statement

Our problem statement is very simple. We want to analyze the tweets on the bases of hash tag
different types of analysis will be done later on.

3.1 Research Questions

i. We need to access twitter?

ii. We will use different tool for authentication and access twitter database?
iii. To access tweeter database we need different twitter API?
iv. We will collect tweets and store them in database?
v. Different types of analysis will be done as per limitations of framework and API?

3.2 Research Objectives

This research work has the following objectives:

(a) Storage of tweets

(b) Analyzing the storing tweets in different ways

(c) Showing that the tweet is in happy manner, sad manner or relate to politics and
relate to some other event.

4. Research Methodology

To attain our goal we will use Codeigniter Framework. Codeigniter Framework use MVC
structure. To understand the Codeigniter framework working first we will understand what MVC

The Model-View-Controller (MVC) is divided into three parts: model, view, or controller. These
steps define not only the roles of application but also define the communication of objects with
each other. MVC has define the predefined path for communication and define how control

SRS Document 1.0 Page 30 of 41 11/19/18f

Tweet Storage and Analysis

move from page to page. It describes the path or routes for users. Routes define that how the user
request processed and view the required information to the user. MVC has three steps:

Step 1: Model

The model manages the data through the database. All information and data that required by the
user or user request to controller the model provide to controller and controller process the
information and view them. The main role of model is describe the relation of data that one-to-
many, many-to-one and many-to-many.

Step 2: View

The view shows the appropriate message, output and information to user. When a user request it
will receive the controller and then send to model to get data that the user wants. Model returns
the data to controller and controller proceed into actual output and view to the user.

Step 3: Controller

Each and every thing controlled by the controller. It manipulates and controls the user requests
and also converts that requests into actual output.

We will also use Codeigniter Framework the one of the top framework used these days. There
are different versions of Codeigniter available but we will use Codeigniter 3.0 and to access the
tweeter API and for authentication we will use socialite and j7mbo these do will do
authentication and API access work for our application and these are most common and widely
used authentication tools. J7mbo is a tool that uses to access the API’s.

SRS Document 1.0 Page 31 of 41 11/19/18f

Tweet Storage and Analysis

Figure 1: MVC structure working

SRS Document 1.0 Page 32 of 41 11/19/18f

Tweet Storage and Analysis

5- References

[1] Stelzner, M.A. (2009). Social media marketing industry report. Retrieved online February
26, 2010 from
[2] Kasperson R, Renn O, Slovic P, Brown H, Emel J, et al. (1988) The socialamplification
of risk: a conceptual framework. Risk Analysis 8: 177–187..

[3] Eysenbach G (2006) Infodemiology: Tracking flu-related searches on the web for
syndromic surveillance. AMIA 2006 Symposium Proceedings. pp 244–248.

[9] Kent, M. L., & Taylor, M. (1998). Building dialogic relationships through the World
Wide Web. Public Relations Review, 24(3), 321–324.
[10] Hon, L. C., & Grunig, J. E. (1999). Guidelines for measuring relationships in public
relations. Gainesville, FL: Institute for Public Relations.

[11] Bo Pang and Lillian Lee. 2008. Opinion mining and sentiment analysis. Found. Trends
Inf. Retr., 2(1-2):1–135.

[12] Jonathon Read. 2005. Using emoticons to reduce dependencyin machine learning
techniques for sentiment classification.In ACL. The Association for Computer

[13] Alec Go, Lei Huang, and Richa Bhayani. 2009. Twittersentiment analysis. Final Projects
from CS224N forSpring 2008/2009 at The Stanford Natural LanguageProcessing Group.

[14] Kireyev, K., Palen, L. & Anderson, K. (2009) ‘Applications of Topics Models toAnalysis
of Disaster-Related Twitter Data’, , Whistler, Canada, 12 November 2009.

SRS Document 1.0 Page 33 of 41 11/19/18f