Professional Documents
Culture Documents
By
BACHELOR OF SCIENCE
IN
COMPUTER SCIENCE
2023
Table of Contents
1.2 Purpose........................................................................................................................................ 1
iii
Revision History
Government College University Faisalabad page
1 Introduction
In today's digital age online platforms serve as a significant medium for communication and information
exchange. However, the increased use of these platforms has also led to the rise of malicious activities,
including the spread of misinformation, hate speech, and other forms of harmful content. To address
these challenges, we introduce the " Monitoring Suspicious Discussion System," a project designed to
identify and monitor suspicious discussions on online platforms.
Goals: The goal of the Monitoring Suspicious Discussion System project is to create a tool that can
identify and track potentially harmful or suspicious conversations. This system aims to analyze discussions
and detect unusual patterns, helping to ensure online safety and prevent malicious activities. The key
objectives include developing algorithms to recognize suspicious language, implementing real-time
monitoring capabilities, and providing alerts when potentially harmful discussions are detected.
1.2 Purpose:
There two key purposes for the app are as follow:
Early Detection of Threats:
Identifying Suspicious Content: The system should be designed to analyze discussions and
conversations for patterns or content that could indicate potential threats, such as terrorism,
cybercrime, or other illicit activities.
Real-time Monitoring: Providing real-time monitoring capabilities to detect suspicious
discussions.
Government College University Faisalabad page 2
• The one of the key objective of a "Monitoring Suspicious Discussion System" project is to develop
a system that can identify and track discussions or conversations that may involve suspicious or harmful
activities.
1. Intended Audience
Cybersecurity Professionals
Data Scientists and Analysts
Researchers in NLP
2. Reading Suggestions:
Cybersecurity Journals and Publications
NLP Research Papers
Online Safety Guidelines
2 Overall Description
2.1 Product Perspective
It aims to enhance online safety by flagging suspicious discussions in real-time.
3 System Features
The product provides the various features to user which are describe as below.
Priority: High, as it helps in early detection and prevention of potential threats or harmful content.
3.5 Admin: The admin side of the Web App can perform the following functionalities like.
3.5.1 Approve profile: In which the admin approves the profiles of user which agrees over rules.
3.5.3 Activities Control: Admin and its teams can check all the user activities.
3.6 Module 1:
Users can register and delete their profiles.
Reset or recover a forgotten password.
3.6.1 Module 2:
Create, view and manage discussions.
Participate in discussions by posting comments.
3.6.2 Module 3:
Review and make discussion on reported content.
Ensure the web application is responsive across devices.
Description
WBS (work breakdown structure) is a project management technique that takes a step by step procedure to
complete large projects with several moving pieces. By breaking down the project into smaller components,
a WBS can integrate, requirement, design, logical division of App into modules text, development
deliverables into a single tool.
7.1 Analysis Model:
Use Case:
Description
A use case diagram is a written description of how admin, user 1, user 2 will perform tasks in over App.
Government College University Faisalabad page 7
Description
A class diagram is a diagram that represents the structure of a system by showing its classes, attributes and
methods, and the relationships between them. In a class diagram classes include admin, user 1, user 2. Admin
class would have attributes like, name, email, password etc. user 1 would have attributes like id, name,
email, use 2 would have attributes like id, user name etc.
Government College University Faisalabad page 8
Description
A sequence diagram is a diagram that shows the interactions between components in a system. In a
sequence diagram we described the objects would includes admin, user 1, user 2.
Government College University Faisalabad page 9
Description
An activity diagram for the admin app would show the flow of activities that are involved in
managing the app. It would represent the various actions that can perform such as login, add
user, delete user etc.
Government College University Faisalabad page 10
7.6 ERD
Description
An ERD or entity relationship diagram, is a diagram that represents the entities in a system and the
relationships between them. In an ERD diagram would show the relationships between these entities such
as an admin, user 1 and user 2. It is a visual representation of data that can be used to understand and design
database components.
Name: _ _.
Designation: _ .Comments: _
Name: _ _. _
_
_ _
__
_
_
Signature: _ _
Designation: _ . Signature: _
Comments: _
_
Government College University Faisalabad page 13
Rejected
Remarks:
Government College University Faisalabad page 17
Project Coordinator