LIST OF FIGURES
NAME OF THE FIGURE PAGE NO.
Entity Relationship Diagram
Data flow diagram level 0
Data flow diagram level 1
Use case diagram
Sequence diagram
Activity diagram
Class diagram
System architecture
Workflow of customer
Workflow of farmer
Workflow of administrator
Screenshot of SHA code generated for various
transactions
A1.2 Screenshot of AWS console for cloud storage
A1L3 Screenshot of various slides in application
A131 Home page of the application
A.1.3.2 Products added by farmers
A133 Verification by admin
LIST OF ABBREVATION
S.NO ABBREVATION EXPANSION
1. DB Data Base
2. SMC Secure Multiparty Computation
Bs AWS Amazon Web Service
4. DBC Data Base ConfidentialityTABLE OF CONTENTS.
CHAPTER
NO.
TITLE
PAGE
NO.
ABSTRACT
LIST OF FIGURES
LIST OF ABBREVIATIONS
INTRODUCTION
1.1 Problem Definition
LITERATURE SURVEY
2.1 Literature Survey
2.2 Comparison table based on literature survey
SYSTEM ANALYSIS
3.1 Existing System
3.2 Proposed System
3.3 Feasibility Study
3.4 Hardware Environment
3.5 Software Environment
SYSTEM DESIGN
4.1 Er Diagram
4.2 Data Flow Diagram
4.3 Uml Diagram
4.3.1 Use Case Diagram
4.3.2 Sequence Diagram
4.3.3 Activity Diagram
4.3.4 Class DiagramSYSTEM ARCHITECTURE
5.1 Architecture Overflow
5.2 Module Design Specification
5.2.1 Module Description
5.2.2 Module Diagram
5.3 Algorithm
SYSTEM IMPLEMENTATION
6.1 Client-Side Coding
6.2 Sever-Side Coding
SYSTEM TESTING
7.1 Unit Testing
7.2 Integration Testing
CONCLUSION
8.1 Results And Discussions
8.2 Conclusion And Future Enhancement
APPENDICES
A.1 Sample Screens
A.2 Publications
A33 Plagiarism Report
REFERENCESCHAPTER 1
INTRODUCTIONCHAPTER 1
INTRODUCTION
1.1 PROBLEM STATEMENT:
The supply chain and production processes have changed because of the recent
spectacular growth of the sharing economy. Many platforms, like Airbnb, Uber, and
eBay, have been established because of technological advancements and the rising use
of mobile devices and apps. These platforms provide a range of free or paid sharing
economy services, as well as bartering and exchanges of products and services. The
sharing of homes, vehicles, clothes, books, toys, and digital goods are just a few
examples of the various facets of our everyday lives that have been impacted by the
sharing economy. In the US, roughly 44.8 million adults used to share economy services
in 2016, and statista.com predicts that number would rise to 86.5 million by 2021. 1
C2C-PT, or consumer-to-consumer product trade, is a sharing model. So We can
implements this technique to buy fresh agricultural products from farmers and they can
fix the prize of the product and customers can get fresh products which is cost efficient
without/with the involvement of the 3rd member and the sales and history of orders can
also be tracked by them as well as the transaction is also more secure with the help of
blockchain and AWS cloudCHAPTER 2
LITERATURE SURVEYCHAPTER 2
LITERATURE SURVEY
2.1 LITERATURE SURVEY:
Angel Infanta Ramesh explained about an E-store for Farmers Buying Seeds which
describes about A fully-fledged Electronic Commerce website for the farmers based on
a Direct-to-Consumer marketing strategy. It eliminates the need for retailers and have
direct interaction with the customers without services being warped by the
intermediaries. So that the time and efforts spent can be reduced but also entrusts the
crop/seed quality. From this future scope can be done by taking security concerns into
account and leveraging the cloud to permanently store data.
Suraya Abu Bakar describes about Fruit Ordering System through Fruity Healthy
Mobile Application. The objective of this project is to help farmers increase their sales
market by developing a fruit ordering application that allows customers to purchase
fruits. This app can be compatible with Android, iOS, Harmony OS, and Windows
phones.
Nalinipriya G explained about Agro Bidding - A Smart Dynamic System for
Enhancement of Farmer's Lifestyle which contains the objective of the online auction
system is that the user can have better choice for their investment. Also, it is time saving
and through this system user can invest in their own selected firm. The application
allows consumers to bid for the farm produce, thus eradicating middleman and
benefiting both farmers and consumers. This aims to provide a software environment
for farmers to gain maximum profit and can be enhanced by adding an secure socket
layer would prevent data’s from third parties. More graphics can be added to attract
users.Shuhui Pan describes on Agricultural super docking Traceability System of Fresh
Agricultural Products which is about edge computing and block chain technology to
design the agricultural super docking traceability system for fresh agricultural products.
The benefits that can be gained by Making use of advance technology to determine the
quality and freshness of the products.
Yuting Li relates about Dynamic block chain adoption for freshness keeping in the fresh
agricultural product supply chain which briefs about agricultural products on E-
commerce increased the difficulty of maintaining the greenness and freshness in
delivery. The traditional is effective in keeping freshness but failed to track record. So
we tend to deliver it fresh and by using dynamic optimization, advertising effort and by
using block chain adoption freshness is maintained . So that freshness of the fruits is
maintained even at the time of delivery.
Anil kumar Anal has tied Adoption of block chain Technology for Enhanced
traceability of livestock based products that relates studies on blockchain technology
applications to the agri-food supply chain system and food industry, and discusses
potential adaptation of blockchain technology for livestock-based products.this paper
encompasses stakeholders along the supply chain of livestock-based products to
understand the stakeholder’s information. This helps in tracking of the product and its
information regarding who the stakeholders and what they are selling.
Juan Vanerio put a paper on Online Expert-Based Prediction for agriculture Secondary
Markets which details about The growing importance of wireless communications
drives an increasing interest in dynamic access to agro products. This requires efficient
management policies that allow sharing between licensed primary users (PU) and
unlicensed secondary users (SU). On such scenario, PUs shall preserve their usage right
product to customer. This let us know whether the farmers are trusted their identity is
verified but this doesn't have any admin to track the product or details regarding
transactions.Jan bauer explored on Design and implementation of an agricultural monitoring system
for smart farming this relates about the recent emerging Internet of Things (IoT) along
with their low-cost sensors and actors enable novel applications and new opportunities
for a more precise, site-specific, and sustainable agriculture in the context of Smart
Farming, we present a holistic agricultural monitoring system, its design, the system
primarily focuses on the leaf area real-world challenges and experiences gained many
development. But this system is bit tedious and it requires lot of knowledge about the
sensors how it works and very it's easy to handle.
Chao Xie has tried Research on Decision Support System of E-commerce Agricultural
Products Based on Blockchain which relates that there are certain difficult that is
present in information of E-commerce agricultural products. To overcome this
blockchain technology with additional platform is constructed.so that decision can be
done better and farmer can earn good income. The benefits can be gained by using
blockchain good decisions can be provided, sales of agricultural products can be
promoted and farmers can gain good income.
Zhou Qinyan has proposed a paper on Selection of e-commerce logistics model for
fresh agricultural products based on analytic hierarchy process and fuzzy
comprehensive evaluation methods which tells of about People usually thinks of
purchasing fresh agricultural products from market . Therefore, by providing some
logistic selection process people can easily purchase fresh agricultural products in E-
commerce using some best selection methods. By providing logistic mode selection
process, fresh agricultural products can be sold.2.2 COMPARISON TABLE BASED ON LITERATURE SURVEY
YEAR | AUTHOR TITLE METHODOLOGY | MERITS FUTURE
AND SCOPE
DEMERITS
2022 | Angel Infanta. | An E-store for | A fully-fledged | Merits : Future work
Ramesh, Ayush | Farmers Electronic Reduces the | can be done
Raghuwanshi, | Buying Seeds | Commerce time and _| by taking
Eshan Goel, website for the efforts spent | security
Dakshayani G farmers based on | but also concerns into
a Direct-to- entrusts the | account and
Consumer crop/seed _| leveraging
marketing quality. the cloud to
strategy. It Demerit permanently
eliminates the Insufficient | store data.
need for retailers | security and
and have direct | privacy for
interaction with | customers
the customers
without services
being warped by
the
intermediaries.
2021 Suraya Abu Fruit Ordering | The objective of | Merits : Customers’
Bakar, Liew Pei | System this project is to | Itis database can
Ling through Fruity | help farmers compatible | be recorded
Healthy increase their with so that sellers
Mobile sales market by | Android, can choose
Application developing a iOS, who to target
fruit ordering Harmony _ | and how to
application that | OS, and enhance sales
allows customers | Windows in the future.
to purchase phones
fruits.
2019 | NalinipriyaG, | Agro Bidding - | The objective of | Merit: ‘Adding an
Sangeetha R, A Smart the online Itisa secure socket
Saniya K, Sri | Dynamic auction system is | popular layer would
Dhanusiya System for that the usercan | method for | prevent
Navarath S. Enhancement | have better buying and | data’s from
of Farmer's choice for their | selling third parties.
Lifestyle investment. Also | products, —_| More
it is time savin; graphics canand through this
It aims to
be added to
system user can | provide a | attract users.
invest in their software
own selected environment
firm. The for farmers
application to gain
allows maximum
consumers to bid | profit.
for the farm
produce, thus
eradicating
middleman and
benefiting both
farmers and
consumers.
2021 Shuhui Agricultural This paper Merits: Blockchain
Pan, Min super docking | introduces edge | Make use of | technology
Zuo, Wenjing | Traceability | computing and _| advance can be used
Yan, Qingchuan | System of block chain technology | to implement
Zhang, Wei Fresh technology to to determine | the safe
Wei Agricultural | design the the quality | storage
Products agricultural super | and tamper-
docking freshness of | resistant of
traceability the data.
system for fresh | products.
agricultural
products
2022 | Yuting Li, Dynamic block | agricultural Merits: To maintain
Chungiao Tan | chain adoption | products on E- s the freshness
for freshness commerce the fruits is | new block
keeping in the | increased the maintained | technology is
fresh difficulty of even atthe | Used so that
agricultural maintaining the | time of freshness is
product supply | greenness and | delivery. _| maintained.
chain. freshness in But the
delivery. The freshers is
traditional is not
effective in guaranteed
keeping by
freshness but consumer
failed to track
record. So wetend to deliver it
fresh and by
using dynamic
optimization,
advertising effort
and by using
block chain
adoption
freshness is
maintained
2022
‘Anil kumar
Anal, Tauji
w.Tsusaka ,
Khwanchol
Kamapan
‘Adoption of
block chain
Technology for
Enhanced
traceability of
livestock-based
products.
This paper
reviews studies
on blockchain
technology
applications to
the agri-food
supply chain
system and food
industry and
discus
potential
adaptation of
blockchain
technology for
livestock-based
products. this
paper
encompasses
stakeholders
along the supply
chain of
livestock-based
products to
understand the
stakeholder’s
information.
This helps
in tracking
of the
product and
its
information
regarding
who the
stakeholders
and what
they are
selling.
Along with
tracking it
can also
enable the
receiver to
know it's
supplier.
2019
Juan Vanerio,
Federico
Larroca
Online Expert-
Based
Prediction for
agriculture
The growing
importance of
wirel
communications
drives an
This let us
know
whether the
farmers are
trusted.their
Tracking and
security in
transaction
can be
implementedsecondary increasing identity is
markets. interest in verified but
dynamic access _| this doesn't
to agro have any
productes. This | admin to
requires efficient | track the
management product or
policies that details
allow sharing _| regarding
between licensed | transactions
primary users
(PU) and
unlicensed
secondary users
(SU). On such
scenario, PUs
shall preserve
their usage right
product to
customer.
2020 ‘| Jan bauer Design and Nowadays, the | This system | Implementing
Nils implementation | emerging is bit an web
Aschenbruck of an Internet of tedious and | application to
agricultural Things (IoT) it requires | detect the
monitoring along with their | lot of crops and in
system for low-cost sensors | knowledge _| selling these
smart farming | and actors enable | about the to the
novel
applications and
new
opportunities for
a more precise,
site-specific, and
sustainable
agriculture in the
context of Smart
Farming, we
present a holistic
agricultural
monitoring
system, its
design, The
sensors how
it works. it's
easy to
handle
customer
directly from
farm.system primarily
focuses on the
leaf area real-
world challenges
and experiences
gained many
development
2020
Chao Xie
Xiaoyong Xiao
Research on
Decision
Support
System of E-
commerce
Agricultural
Products Based
on Blockchain
‘There are certain
difficult that is
present in
information of E-
commerce
agricultural
products. To
overcome this
blockchain
technology with
additional
platform is
constructed.so
that decision can
be done better
and farmer can
earn good
income.
By using
blockchain
good
decisions
can be
provided,
sales of
agricultural
products
can be
promoted,
and farmers
can gain
good
income.
Complexity
and time lag
can be
prevented.CHAPTER 3
SYSTEM ANALYSISCHAPTER 3
SYSTEM ANALYSIS
3.1 EXISTING SYSTEM
The evolution of technology has given a major impact in E-retailing of agricultural
products through E-commerce sites, There are wide range of applications which deal:
with the buying and selling of agricultural products online, but in all these applications
privacy and security of the customer has not been the major concern, the blooming
technology such as blockchain and cloud computing was not properly implemented for
transactions and data storage, so it may cause some serious issues and it may lead to
collapse the trading service or to leakage users data.
Technique:
Market Cleaning Mechanism.
Disadvantage:
Itis a strategy to analyze the aggregated data.
3.2 PROPOSED SYSTEM
The smallholder farmer is one of the supply chain's forgotten actors, especially when it
comes to business, technological, and economic solutions. Sustainable supply chains
should not ignore these members, particularly those in developing countries. These
unseen actors stand to gain the most from increased accessibility, visibility,
empowerment, and sustainability, all of which can be achieved through thoughtful
technology and research. To achieve sustainability, blockchain and other technologies
can address inefficiencies, complexities, and conditions in the supply chain. Twopractical examples provide some preliminary insights into the use of technology,
particularly blockchain, to address the sustainable supply chain that demonstrate the
complexities, benefits, opportunities, and risks. Apart from these technologies amazon
web service provide a vital cloud services for information storage.
Technique:
Hash Function
Advantage:
It synchronizes the data or transaction when generate.
3.3 FEASIBILITY STUDY
Feasibility studies aim to uncover the strengths and weaknesses of the
existing business or proposed venture, opportunities and threats as presented objectively
and rationally by the environment, the resources required to carry through, and
ultimately the prospects for success. In its simplest term, the two criteria to judge
feasibility are cost required and value to be attained. As such, a well-designed feasibility
study should provide a historical background of the business or project, description of
the product or service, accounting statements, details of the operations and management,
marketing research and policies, financial data, legal requirements, and tax obligations.
Generally, feasibility studies precede technical development and _ project
implementation.
They are 3 types of Feasibility.
+ Economical feasibility
* Technical feasibility
+ Operational feasibilityECONOMICAL FEASIBILITY
The assessment is based on an outline design of system requirements in terms of Input,
Processes, Output, Fields, Programs, and Procedures. This can be quantified in terms
of volumes of data, trends, frequency of updating, etc. to estimate whether the new
system will perform adequately or not.
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the
available technical resources.
OPERATIONAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must
not feel threatened by the system, instead must accept it as a necessity.
3.4 HARDWARE REQUIREMENTS
The hardware requirements may serve as the basis for a contract for the implementation
of the system and should therefore be a complete and consistent specification of the
whole system. They are used by software engineers as the starting point for the system
design. It shows what the system does and not how it should be implemented.
PROCESSOR z DUAL CORE 2 DUOS
«RAM t 2 GB DD RAM
« HARD DISK ; 250 GB3.5 SOFTWARE REQUIREMENTS
The software requirements document is the specification of the system. It should include
both a definition and a specification of requirements. It is a set of what the system should
do rather than how it should do it. The software requirements provide a basis for creating
the software requirements specification. It is useful in estimating cost, planning team
activities, performing tasks and tracking the teams and tracking the team’s progress
throughout the development activity.
FRONT END i J2EE (JSP)
BACK END i JAVA (SERVLET), MYSQL 5.5, AWS.
OPERATING SYSTEM. ‘ WINDOWS 7
IDE & ECLIPSECHAPTER 4
SYSTEM DESIGNCHAPTER 4
SYSTEM DESIGN
4.1ENTITY-RELATIONSHIP DIAGRAM
‘An architecture diagram is a graphical representation of a set of
concepts that are part of an architecture, including their principles, elements, and
components. It is also defined asa visual representation that maps out the physical
implementation for components of a software system. It shows the general
structure of the software system and the associations, limitations, and boundaries
between each element.
‘CUSTOMER
Fig. 4.1.1 Entity Relationship Diagram.In customer entity User can view all the crops after farmer add their products into the
application and if user need the crop’s he/she add to his cart and make the payment.
In farmer entity, Farmers can add the project and check the product details is ok or not.
The farmer fixes the delivery method is deliverable or not deliverable. Every payment
will be view by the farmer like payment history and complete account details.
Admin entity is used to activate every user registration. Admins have every access if
user register their details, it will be passed to the admin and admin accept the
registration. Admins have the access to approve the farmer added product. Maintain all
the user list product list and all the details about the user.
4.2 DATAFLOW DIAGRAM
A data flow diagram (DFD) is a graphical or visual representation using a
standardized set of symbols and notations to describe a business's operations
through data movement. They are often elements of a formal methodology such
as Structured Systems Analysis and Design Method (SSADM). Superficially,
DFDs can resemble flow charts or Unified Modeling Language (UML), but they
are not meant to represent details of software logic. DFDs make iteasy to depict
the business requirements of applications by representing the sequence of process
steps and flow of information using a graphical representation or visual
representation rather than a textual description. When used through an entire
development process, they first document the results of business analysis. Then,
they refine the representation to show how information moves through, and is
changed by, application flows. Both automated and manual processes are
represented.> ‘Add their.
= —\ products.
customer Dynamic |e FARMER |
we
veety
1
ADMIN
Fig. 4.2.1 Data flow diagram level 0.
LEVEL 1:
customer |_“**“**S Dynamic FARMER
wes
* APRUCATION ff
: Manage | venty
2 en
z ADMIN
vo | |
| PAYMENT DETAILS ¢
Database
(een +|aws cron consoue
Prevent detail from
third party attack.
ee ms,
foaa
( ockctam — |
\
\ tecrwovocy _/
Fig. 4.2.2 Data flow diagram level 14.3 UML DIAGRAMS,
UML is a standard language for specifying, visualizing, constructing, and
documentingthe artifacts of software systems. UML was created by the Object
Management Group (OMG)and UML 1.0 specification draft was proposed to the
OMG in January 1997.0MG is continuously making efforts to create a truly
industry standard stands for Unified Modeling Language is different from the
other common programming languages such asC++, Java, COBOL, ete. UML is
a pictorial language used to make software blueprints’ can be described as a
general-purpose visual modeling language to visualize, specify, construct,and
document software system. Although UML is generally used to model software
systems, itis not limited within this boundary. It is also used to model non-
sofiware systems as well. Forexample, the process flow in a manufacturing unit,
etc. UML is not a programming language but tools can be used to generate code
in various languages using UML diagrams. UML has adirect relation with
object-oriented analysis and design. After some standardization, UML has
become an OMG standard.
4.3.1 USE CASE DIAGRAM
Unified Modeling Language (UML) is a standardized general-purpose
modeling language in the field of software engineering. The standard is managed
and was created by the Object Management Group. UML includes a set of graphic
notation techniques to create visual models of software intensive systems. This
language is used to specify, visualize, modify, construct and document the artifacts
of an object-oriented software intensive system underdevelopment. A Use case
Diagram is used to present a graphical overview of the functionality provided by
a system in terms of actors, their goals, and any dependencies between those use
cases.Fig 4.3.1 Use Case Diagram
Use case diagram consists of two parts:
Use case: A use case describes a sequence of actions that provided something of
measurable value to an actor and is drawn as a horizontal ellipse.
Actot
An actor is a person, organization or external system that plays a role in
one or more interaction with the system.4.3.2 SEQUENCE DIAGRAM
‘A Sequence diagram is a kind of interaction diagram that shows how
processes operate with one another and in what order. It is a construct of Message
Sequence diagrams are sometimes called event diagrams, event sceneries and
timing diagram.
regster
+ “Approve:
— crop
rt fe Crop? + “Approve Crop
‘make payment
, wew pavmen
Fig 4.3.2 Sequence Diagram4.3.3 ACTIVITY DIAGRAM
Activity diagram is a graphical representation of workflows of stepwise activities
and actions with support for choice, iteration, and concurrency. An activity
diagram shows the overall flow of control.
‘The most important shape types:
. Rounded rectangles represent activities.
* Diamonds represent decisions.
. Bars represent the start or end of concurrent activities.
. A black circle represents the start of the workflow.
. An encircled circle represents the end of the workflow.
Fig 4.3.3 Activity Diagram4.3.4 CLASS DIAGRAM
The class diagram depicts a static view of an application. It represents the
types of objects residing in the system and the relationships between them. A
class consists of its objects, and it may inherit from other classes. A class diagram
is used to visualize, describe, document various aspects of the system, and also
construct executable software code.
Farmer a
+ id int
}+ username 'Sting
location String
}+add product string
Pl aging
+ approve local police
view payment String sone
+ register’) ++ view public complaint
+ Login() + move to local station
+add prduet)
view)
Customer Jee
+ idsint
+ username’String
+ View product String /<—_——————_,
+ payment string
Add to cart
+ register’ + cartidint
+ loging)
}+ productd:int
+ Views) }+ Productname:String
+ add to cart) + Totatint
+ Buy0) }+ quantity:int
+ total
Fig 4.3.4 Class DiagramCHAPTER 5
SYSTEM ARCHITECTURECHAPTER 5
SYSTEM ARCHITECTURE
5.1 ARCHITECTURE OVERVIEW:
‘MAINTAIN ACCOUNT
BALANCE AND HISTORY
VIEW PAYMENT
ADD PRODUCT
‘VIEW PRODUCT
ADD TO CART
PAYING HISTORY
Fig. 5.1 System architecture.The most crucial duty for AWS is maintaining the integrity, honesty, and
accessibility of user data. The automatic monitoring system in AWS makes it more
secure so that unauthorized access and third-party assaults may be stopped. The
objective of AWS is to keep their own originality by offering trust and security for
the individuals who use it. Several monitoring tools are available. Alarms, for
instance, can be configured to alert the user of any outside threat. In this scenario,
the participants are consumers, farmers, and administrators. Customers are the
application's end users, and they may use it to get fresh produce that is available in
their neighborhood, which eliminates the need for customers to go far in order to
find fresh produce. Farmers, on the other hand, can upload their products and profit
from the customers. Finally, the administrator's role is to verify the farmers and their
products.
5.2 MODULE DESIGN SPECIFICATION:
MODULES:
> Customer
> Farmer
> Admin
5.2.1 MODULE DESCRIPTION:
USER:
In this user module in our project user view all the crops after farmer added
products and if user need the crop’s he/she add to his cart and make the
payment.
FARMER:
In this farmer module in our project farmer add the project and checkthe product details is ok or not. The farmer fixes the delivery method is deliverable
or not deliverable. Every payment will be view by the farmer like payment history
and complete account details.
ADMIN:
In this admin module in our project activate every user registration. Admins
have every access if user register their details it will be passed to the admin and
admin accept the registration, Admins have the access to approve the farmer
added product. Maintain all the user list product list and all the details about the
Deivery
No delivery
user.
5.2.2 MODULE DIAGRAM:
USER:
Customer >} Register >} Login
‘Addto cart,
the crop
Select the
View cp
My Orders
Make
View
payment
>} Payment type
|
1, Debt caré
2. cect card
Fig.5.2.2.1 Workflow of customer.
[view Payment
histoFARMER:
evry Not
arate
Famer Reoser |» Logn 2} Ads pod Sebetone
Hane div
ie cau Paynet
base vy [| See
Fig. 5.2.2.2 Workflow of farmer.
User list
Payment
complete list
Product list
DataBase
Fig. 5.2.2.3 Workflow of administrator.5.3 ALGORITHM:
The hash technique, which is crucial for online payments and
transactions, is used to execute the blockchain concept. A hash code is generated
when data is processed using a hashing algorithm and is determined in blocks known
as hash blocks. These codes can be generated in increments of | bit, 128 bit, or 256
bits; however, in our work, 256-bit codes are generated for each transaction to
increase the payment's security against third-party attack. Understanding the concept
of Hashing is critical for understanding how blockchain works. Hashing is the act of
taking any length input and producing a fixed length output item. Consider the use
of blockchain in online transactions. Transactions of varying lengths are processed
using a specific hashing algorithm, and all produce a fixed length output. The
duration of the incoming transaction has no bearing on this output. The hashing
algorithm used to secure the transaction in our perspective article is SHA-256.
Regardless of the size of the input transaction, this hashing algorithm always
produces an output of 256 bits or 32 bytes. That is, if we use SHA-256 to hash two
different inputs, saya 1 gigabyte movie and a 5-kilobyte image, The generated hash
will be 256 bits long in dual instance. The only distinction is the hash pattern will be
located between the two. The equations of SHA-256 code for various transactions is
as follows. Ti =h+ ch(e,fg) + (25, €) + wiser
T2 = (ea) + maj(a,b,c)
Were ,
Ti, Tz = variable ch = conditional function
h, a=content buffer of h and a € = rotation function
Maj = majority functionCHAPTER 6
IMPLEMENTATIONCHAPTER 6
IMPLEMENTATION
6.1 CLIENT-SIDE CODING:
‘This chapter describes the implementation of searched based application. It
deals with the source code for main viewpoint for Anonymous Database
Management.
Index,jsp
[=ISO-8859-1"
<% @ page languag:
="java" contentType="text/html; charse
pageEncoding="IS0-8859-1"%6>
Insert title here