0% found this document useful (0 votes)
19 views4 pages

Research BSM

The document discusses the development of a Personal Blog Management System using the Django framework, focusing on system requirements, functional design, and implementation. It highlights trends in blogging, such as the diversification of content and the use of push mechanisms for user engagement. The system aims to facilitate social networking while ensuring user privacy and security through a stable database and management features.

Uploaded by

Neeschal Poudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

Research BSM

The document discusses the development of a Personal Blog Management System using the Django framework, focusing on system requirements, functional design, and implementation. It highlights trends in blogging, such as the diversification of content and the use of push mechanisms for user engagement. The system aims to facilitate social networking while ensuring user privacy and security through a stable database and management features.

Uploaded by

Neeschal Poudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Advances in Economics, Business and Management Research, volume 648

Proceedings of the 2022 7th International Conference on Financial Innovation and Economic Development (ICFIED 2022)

Research and Practice of Personal Blog Management


System Based on Django
Jing Gao1,*, Yu Sun2
1
Jilin Institute of Chemical Technology
2
Jilin Institute of Chemical Technology
*
Email: 836076585@qq.com

ABSTRACT
With the maturing of network technique,people are relying more and more on network in life. Making friends,life
record, material facts and story sharing can be carried out between people.The Personal blog management system
Uses the Python Django framework and selects B/S mode to build.This paper mainly discusses the whole
development process of blog system, such as system requirement analysis, functional design, software
implementation, software testing and so on. As thus, the daily social networking and event function can be
satisfied between users and readers.

Keywords: Personal Blog Management System, Python, Django, Network.

1. INTRODUCTION development of "we media" and the popularity of some


small videos, many blog websites have launched the
With the rapid development of Internet, people's functions of video or live streaming.
demand for blog is more and more diversified, which
promotes the development of personal blog.A blog is a Trend 3,blogs are moving towards push
personal "reader's digest" for the network age, it usually mechanisms.Blog is a carrier for users to publish articles
is made up of individual pages for users to write and to express their opinions and experiences. With the
publish articles.For these articles, the blog can classify growth of users, the amount of information data is also
and manage them according to their tags, time and other quite massive. There must be some junk information in
information, then provide them for readers to read[1].At the massive data, which is not suitable for pushing and
present, blog mainly presents the following three trends even does not comply with relevant laws and
in development: regulations[2].Therefore, the blog changes the traditional
way of publishing, and uses the push mechanism to
Trend 1,blog has become the representative carrier push some hot topics or topics of generally
of users, which is gradually endowed with a number of concern,which is convenient for people to communicate
connotations and become the user's credit symbol.Use and exchange. For junk information, it is shielded.
of blogs enables network users to locate themselves and
communicate with each other.At the same time, it According to data statistics, the number of blog
provides privacy to ensure that users' real-world websites in China is about several million, while the
information is not disclosed.Furthermore, by publishing number of blogs has increased to more than one million.
and sharing blogs, users can form a symbol representing In addition, the number is growing at a rapid rate of 40
their personal reputation. In turn, this symbol can be percent a year.Therefore, the development of related
used as the evaluation standard of users' blogs, thereby industries and economies driven by blogs has attracted
promoting the gradual commercialization of blogs. great interest from related experts and entrepreneurs.In
foreign countries, blog has been a popular way of social
Trend 2,blogs are becoming more diverse.The communication for a long time. In China,blog mainly
original blog content is mainly the editing and exists in a mode of technical communication, which is
publishing of articles.But with the continuous the shortcomings of domestic blogging
improvement of technology and the growth of people's technology.Therefore, the development of personal blog
demand, the illustrated article gradually became the system can be arranged according to their own
main content of most blogs.In addition, with the

Copyright © 2022 The Authors. Published by Atlantis Press International B.V.


This is an open access article distributed under the CC BY-NC 4.0 license -http://creativecommons.org/licenses/by-nc/4.0/. 1449
Advances in Economics, Business and Management Research, volume 648

preferences. The system has higher freedom for Because some sensitive user information is protected
interaction with readers and search for like-minded and there are certain requirements for reader
friends. The implementation of online social new information, the database is stable and secure.The
pattern must be a trend of future development[3]. personal blog system can completely meet the basic
needs of different ages.If there are other higher
2. SYSTEM REQUIREMENT ANALYSIS requirements in the process of using the program, it can
also perform later maintenance and secondary
According to the functional requirements of blog development.This system also has the function of log
system, the system is divided into reader mode and user recording. If the maloperation is happened in use or is
administrator mode.Reader mode mainly includes operated by others, users can check what the other side
reading of articles, message interaction and so on. The operates through the logging and which changes were
main functions of the user administrator mode include made to the personal blog system.
writing, modifying,deleting articles and viewing readers'
messages.A series of modification operations were 2.2.Analysis of Business Process
carried out on the rotation pictures displayed on the
article page, the classification labels of the blog article First, users need to make a simple registration to use
and the Settings of personal information.The overall the blog. If the user wants to edit, modify, delete and
system needs a stable operating environment and secure classified articles, the user needs to enter the manager
database. interface, then can do the above.
Second, readers can read the user's articles and
2.1.Analysis of Functional Requirements essays through browsing interface,but also can discuss
In social networking mode, young people are keen the content of the article, leave messages and interact
on life sharing, cultural transmission and pursuit of new with bloggers. Without the manager's account and
things. Under the premise of security and stability, the password, readers cannot enter the management
system design should satisfy the following requirements. interface. They can only read and leave messages
without too many operation permissions. The purpose is
(1)There is a secure and stable database to store to protect user information security and maintain the
system data.Users will save some of relatively important stability of the system.
article notes or some other content during use of
personal blog system, including user personal 3. SYSTEM FUNCTION DESIGN
information and other private content.Therefore, it is
very important to establish a safe and stable 3.1.Functional Structure Design
management mode, which is the basis of improving user
experience and research of overall system. Through analyzing the function demands of the
(2)Readers can interact with users while browsing system, system user can be divided into reader mode
the article, which is the characteristic function of the and user manager mode. The functions of reader mode
system.Readers can choose their favorite user managers mainly include article reading, message interaction, etc.
to leave a message in order to achieve a communication The functions of user manager mode include writing,
purpose. modifying and deleting articles and checking the
readers' messages.they can modify a series of pictures
(3)From the point of user manager, users have displayed on the article page, the classification label of
absolute control over the system. The tags can be set the blog post and personal information setting.The
according to keywords such as life, science and overall system needs a stable operating environment and
technology, cute pets,etc. The content of the tags can a safe database.
also be modified and "add, delete, change, check" can
be carried out according to the intention. Users can also 3.2.Functional Module Design
add, modify or remove the content of the article just
written,view readers' messages and other functions.In The system includes mainly front-placed part and
order to facilitate social communication, this personal backstage part. The backstage part serves bloggers and
blog system is also associated with Scott map. It the front-placed part is based on readers.The specific
increases the social authenticity, transparency and analysis is as follows.
security.Although the main audience of this system is
young people, but considering many older readers in 3.2.1.Background Management functions
society also like online social networking even if
computer skills is weak. System of entry: the account and password need to
be verified when entering the background.
Therefore, another advantage of personal blog
management system is simple operation interface.

1450
Advances in Economics, Business and Management Research, volume 648

Log management: bloggers have the right to publish, 4.2.Background Implementation


modify and delete log contents.
Label management: users can add or modify the label 4.2.1.The Users Login
type.
Background management interface to enter the need
Cover management: users can upload, view and to authenticate the identity of the user, makes sure to
delete pictures on the article covers. enter the background management interface is the user
himself, avoid others into the backend interface, modify
Message management: users can view and manage
personal blog system information and cause
messages from readers in the manager interface and
unnecessary loss, so set up a user name and password,
interact with those they are interested in. The method of
after verification by can be set into the background
communication can be selected through the reserved
management interface.
contact information of readers.
4.2.2.Displaying User Information
3.2.2.Function of The Front Desk
Personal blog system will show the user's personal
When the blogger publishes blog article or informal
information to the reader, including name, major, email,
essay, the system will classify it automatically. Therefore,
address and so on.The system can carry on a positioning
when reading relevant blog posts, readers can search for
show to the address through the Amap platform. This
their favorite articles through the classification
operation should be similar to "people nearby" function,
function.At the same time,for different views and
it allows readers to realize approximate location of blog
opinions of blog posts,readers can interact and leave a
writers.So,these social activities of personal blog
message in the comment threads below.
management systems are much more
transparent.However, for security reasons, the system
4. SYSTEM IMPLEMENTATION binds the address with the location of the school.Thus
the system can not only protect users but also reveal
4.1.Foreground Implementation certain location information to the outside, thereby
forming a social model similar to the alumni
4.1.1.Reader's Login circle[5].Through the personal blog system, it can
provide much convenience for those who set up some
The development of this system is to show thoughts
literature corporations in the school.
better, learning exchanges, sharing experience and other
social activities. In order to achieve the purpose of rapid
promotion, readers need not enter the account number
4.2.3.Writing Blog Posts
and password when browsing user's blog. If you enter After successfully logging in to the background
the correct address in the address field, you can read management page, the user manager can freely choose
blogs. to write blog posts or essays. Users can also select
different columns, then enter the interface and edit the
4.1.2. Reading of Blog Posts corresponding content. After the above operations and
the editing of the content of the blog, users can click on
Although readers log into the personal blog system
the publish button to send it to your personal blog. At
as a visitor,it doesn't affect communication with users at
the same time, the system also provides classification
all. Readers can click on the title of any post or essay for
function and picture preview function.In the published
detailed reading, or search the title of their favorite
page, the blog can be classified according to the content,
article in the retrieval interfaces for fast search.
the user has the right to add new category labels and can
also change the label name[6].
4.1.3.Reader Comments
After reading a blog post, readers can leave a 4.2.4.View Message
message on this page and interact with user managers.
After the reader leaves a message, the user can see
In order to manage messages for convenience, you can
the message or comment through the message viewing
also leave a message on the "Contact me"
module and reply or ignore them.Under the premise of
interface[4].Users can set a limit rules on the comment
ensuring security,by the comparison of personal
threads for register their personal information before
information,the efficiency and quality of social
leaving a message. This is in order to ensure system
communication are improved between users and
security and prevent malicious comments.
readers. It really happened the social networking of
personal blog.

1451
Advances in Economics, Business and Management Research, volume 648

5. TESTS OF SYSTEM OPERATION [6] Hao Chen,Jianzhong Chen, Jiaqi Tan,Jingqi


Zhang, Intelligent Ventilation and Emergency
Through the above test of reader mode and user Evacuation of Underwater Tunnel under fire
manager mode, people have some understanding of the Conditions,Procedia Engineering,2016,pp.379–
effect of program execution. During the test, no error 388.DOI:10.1016/j.proeng.2016.11.566
prompts such as lag and refresh failure appeared in the
personal blog system.All of this proves that the system [7] Fangni Chen,Weiwei Qiu,Teaching Reform of Co
has a certain stability. mmunication Principles Course Based on Python,E
RMM2019,pp.14–17.DOI:10.26914/c.cnkihy.2019.
As a user manager, after entering the correct account 023461
and password,so you can access the personal blog
management system. Only the user manager can modify
the system information. If the account and password are
accidentally leaked, the user manager can change the
account and password in time through the background
management interface to stop loss[7]. If the personal blog
system may be under attack from others' malicious
modification, a log is automatically generated in log
management after the modification takes effect.It will
record all the changes and modification time. Under
normal circumstances, only the user manager has the
full operation authority of the personal blog system. All
others have read-only function of the blog system and
no other permissions.
In conclusion, test results are basically reached the
expected effect,the system works well.

6. CONCLUSION
The design of this system uses Django MVT
framework, the development platform chooses PyCharm
editor for Python, the database uses MySQL. Through
the feasibility analysis, demand analysis, business
analysis and function analysis, finally, the system set the
program users as the client and reader end.both of them
have their own rights and functions, and achieve the real
meaning of "my blog I make the decision". In the
current convenient network and epidemic environment,
people can better exchange learning and share life.

REFERENCES
[1] Jiajian Ji,Linlan Liu,Personal blog system based on
Java EE,.Information & Communications,2017,
(08)pp. 114–116.
[2] Alex Martel li, Python in a Nutshell (2nd Edition),
Sebastopol:O'Reilly,2006, pp. 70–125.
[3] Edited by Qing Wu, Python programming, Posts
and Telecommunications Press, 2020, pp. 105–160.
[4] Mark Lutz,Learning Python (Third Edition),
Sebastopol:O’Reilly, 2017, pp. 17–30.
[5] Edited by Chunjie Wang, Learn Python
programming easily,China Railway Press, 2020,
pp. 204–215.

1452

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy