Professional Documents
Culture Documents
Submission Information
Result Information
Similarity 29 %
1 10 20 30 40 50 60 70 80 90
Quotes
1.51%
Student Internet
10.17% Ref/Bib
Paper
1.85%
11.9%
Words <
14,
Journal/
8.45%
Publicatio
n 6.93%
Exclude Information
Quotes Excluded
References/Bibliography Excluded
Sources: Less than 14 Words Similarity Not Excluded
Excluded Source 0%
Excluded Phrases Excluded
A-Satisfactory (0-10%)
B-Upgrade (11-40%)
5 jespublication.com Publication
1
13 ir-library.ku.ac.ke Publication
<1
19 index-of.es Publication
<1
28 www.uou.ac.in Publication
<1
42 bmcmusculoskeletdisord.biomedcentral.com Publication
<1
43 www.ijcsejournal.org Publication
<1
46 seas.umich.edu Publication
<1
47 www.aicpa.org Publication
<1
55 www.arxiv.org Publication
<1
56 www.atlantis-press.com Publication
<1
60 dspace.nwu.ac.za Publication
<1
61 When Lawyers and Law Firms Invest in TheirCorporate Clients' Stock Publication
<1
Washington Un - www.network.bepress.com
64 academic.oup.com Publication
<1
67 Latin American Cities and Globalisation Change and Permanency in the Publication
<1
by Cordob-2010
68 moam.info Internet Data
<1
74 doc.comsol.com Publication
<1
76 dodcio.defense.gov Publication
<1
79 redcol.minciencias.gov.co Publication
<1
81 scholar.sun.ac.za Publication
<1
92 data.unicef.org Publication
<1
95 index-of.es Publication
<1
98 www.diva-portal.org Publication
<1
109 Making a difference The role of Statutory Committees in the Northern Publication
<1
Ireland As by Rober-2002
139 The Magic Square of Three in Old Chinese Philosophy and Religion by Publication
<1
Cammann-1961
140 The manufacturing sector Still an anchor for pattern bargaining within Publication
<1
and acro by Mller-2018
141 Why do poor countries suffer costly conflict Unpacking per capita inc by Publication
<1
Jakobsen-2013
EXCLUDED PHRASES
78
The technology known as blockchain was initially used to construct the public transaction record
6
for cryptocurrencies when the system was first put into use. The blockchain technology, on the
other hand, has recently being investigated for a wide variety of applications that go beyond the
realm of cryptocurrencies. This is due to the fact that the technology possesses distinctive
which contribute to the growing popularity of the technology. This is due to the fact that the
blockchain technology possesses a number of qualities that are entirely unique. These traits are
highly helpful for a number of challenges that are widespread in today's financial industry. As a
consequence of this, the blockchain technology has the ability to bring about a revolution in the
financial sector by causing several financial organisations to adjust their operational procedures.
56
As a result of this, the blockchain technology has the capability to bring about a profound change
in the banking and finance industries. In this article, we will present a high-level overview of five
uses of blockchain technology in the financial industry that are anticipated to undergo substantial
localise the data in order to make it suitable for storage in blockchain wallets. In contrast to
traditional smart contracts, NFT smart contracts will be used to construct the hash address, and the
information that is produced as a result will be communicated to an IPFS server that is housed in
the cloud.
1.INTRODUCTION
worldwide interest in a technology known as blockchain. At the present, the only blockchain
applications that are currently capable of being deployed on a large scale are cryptocurrencies such
36
as bitcoin and ethereum. The attention of those working in the financial services industry has been
drawn to Bitcoin and Ethereum, which have also paved the way for the launch of alternative
77
cryptocurrencies such as LightCoin, PrimeCoin, NameCoin, and Zcash [1]. They have also been
startups through a procedure known as Initial Coin Offering (ICO). This method utilises
32
cryptocurrency. This method is utilised to provide financial support for creative endeavours and
ideas. Over the past few years, there has been a growth in interest in using blockchains for purposes
other than transactions involving cryptocurrencies, particularly those that seek to take advantage
technologies (DLT). In particular, there has been a rise in interest in utilising blockchains for
purposes that attempt to take advantage of the benefits of using distributed ledger technologies
(DLT). The recording of voting results is one example of a use case that fits under this category.
107 6
There have been efforts made to develop blockchains for the purpose of maintaining vote data.
These efforts are currently ongoing. These capabilities can be leveraged in a broad variety of
contexts by applications that are created on top of permissioned blockchain infrastructures. These
frameworks do away with the requirement for arduous and sluggish Proof-of-Work (PoW)
methods while also enabling fine-grained authentication and authorisation. The latter is an
Ethereum. This is due to the fact that apps are required in order to conduct transactions in a timely
manner. As a direct result of this development, technologies such as R3/Corda and Hyperledger
13 133
Fabric have come into existence to govern permissioned blockchains. Due to the fact that these
119
systems are capable of processing hundreds of transactions per second (TPS), they are well suited
for use with blockchains that limit who can access the ledger. Research and development work is
being done on permissioned blockchains for usage in a wide variety of applications that do not
include bitcoin. For instance, healthcare, the generation of energy, and the management of supply
115
chains are all examples. Many other applications of this kind are currently being investigated by
128
various financial institutions as part of the wave of technological advancements that have been
brought about by FinTech. By adopting technologies that are based on blockchains, financial
7
institutions can sidestep a number of issues that have persisted for a significant amount of time
and are simple to identify. A significant challenge facing the banking industry is the widespread
ignorance concerning credit scoring. Because there is a shortage of data, it may be difficult for
individuals as well as small and medium-sized businesses (SMEs) to obtain loans from financial
53
institutions [2]. Because there is a lack of complete and accurate data, financial institutions are
having a difficult time developing trustworthy profiles of their customers. As a direct consequence
of this, they are unable to expand their product offers and make them more personalised for each
87
unique customer [3]. In a similar vein, the insurance policies that are sold by financial institutions
come with a convoluted claims structure that necessitates the participation of a multitude of parties
7
in order to resolve and pay out a claim. This is similar to the situation described above. The
2.LITERATURE SURVEY
2.1 Blockchain application and outlook in the banking industry
https://jfin-swufe.springeropen.com/articles/10.1186/s40854-016-0034-9
Abstract: The financial industry is rich with opportunities for the first widespread application of
environment. These opportunities exist at a time when the financial environment is ripe. The
banking industry in China is incurring losses as a direct result of the liberalisation of interest rates;
also, the reduction in the interest rate gap is contributing to the fall. The reduction in the interest
rate gap, on the other hand, is helping to facilitate the fall by providing further support. However,
it is also influenced by a wide variety of other things, such as the growth of the internet and the
changes that have occurred in the financial industry. Because of this, the financial services industry
absolutely needs to go through a period of transformation and actively seek out new chances for
143
expansion. As a consequence of this, blockchains have the potential to one day serve as the basis
for significantly upgraded and completely new payment clearing and credit information systems
in financial institutions. The underlying technology that underpins banking's payment clearing and
7
credit information systems may undergo a fundamental transformation as a result of the use of
scenarios feasible, financial institutions will have the ability to improve their overall efficiency
and compete more effectively in the global marketplace. Despite the fact that blockchains are
intended to be permissionless and self-governing, there are still challenges to be solved, such as
the regulation that surrounds decentralised systems and the actual implementation of such systems.
These challenges must be surmounted. As a result, we argue for the urgent establishment of a
guidelines.
2.2 Blockchain Beyond Cryptocurrencies: FinTech and Strategy in the 21st Century
https://www.researchgate.net/publication/329484290_Blockchain_Beyond_Cryptocurrencies_Fi
nTech_and_Strategy_in_the_21st_Century
Abstract: There is significant anticipation that the implementation of blockchain technology could
result in dramatic changes being made by financial service providers. This chapter provides a
synopsis of the research that was conducted on the potential effects of using blockchain technology
in each of the following four areas of the financial industry: payments and remittances, credit and
lending, trade and settlement, and compliance. These are the four most essential components of
the financial business. In addition, the core components of blockchain are broken down and
described in this chapter. We are analysing the current voids in the research literature in order to
come up with ideas for prospective new lines of inquiry that could be pursued in the not too distant
future.
2.3 Toward a global norm against manipulating the integrity of financial data
https://www.semanticscholar.org/paper/Toward-a-global-norm-against-manipulating-the-of-
Maurer-Levite/24bba327193a96511d8748220afd9632daf77cc5
65
Abstract: The worldwide economic and financial crisis that started in 2007 brought to
45
light both the critical role that trust plays in the operation of the global system and the precarious
nature of trust in certain contexts. The cyber crisis that occurred at the Bangladesh central bank in
2016 brought to light a new risk to the stability of the financial system as well as the unprecedented
severity of the risk that adversarial cyber actors provide to financial institutions. These two threats
7
were brought to light as a result of the incident that occurred at Bangladesh's central bank. As
opposed to the various other types of financial coercion, the employment of cyber operations to
compromise data integrity poses a systemic threat that is particularly severe and problematic. Theft
51
is just one of the potential outcomes that can emerge from these risks. If the data that are stored by
financial institutions were tampered with, either intentionally or unintentionally, the stability of
both the financial system and the international system may be put in jeopardy. This is because the
global financial system is not only highly complex and interdependent, but also defies
61
categorization according to location or political affiliation. The fact that it is not restricted by
geographical or national lines is another factor that contributes to the ease with which it can occur.
23
To reiterate, this risk does not depend on the overall health of the economy in the same way that
the worldwide financial crisis of 2007-2008 did, and it will only increase as more and more
governments make the goal of cashless economies an official goal of their policies. In addition,
36
the state of the economy's fundamentals will not be affected in any way by this risk. The
communiqué issued by the G20 finance ministers and central bank governors in March 2017, in
which they urged for increased resilience across the global financial system, is deserving of
commendation. The next step that the G20 may take is to accept a promise from their states not to
use offensive cybertools to access financial system data and to work together when attacks do
occur. This might be the next step that the G20 takes. This is the next step that makes sense to do
in the process. The process would continue on from there to arrive at this point.
2.4 Blockchain Technology for Financial Services Facilitation in RES Investments
140 65
Abstract: In the wake of the global financial crisis that started in 2007, the credibility of the
92
world's monetary and banking system has been called into question. The cyber crisis that occurred
in 2016 at the Bangladesh central bank brought to light a previously unknown threat to the stability
126
of the financial system, as well as the unprecedented extent of the threat that hostile cyber actors
7
pose to financial institutions. Both of these threats were brought to light as a result of the incident
involving the Bangladesh central bank. Traditional forms of financial coercion pose a distinct set
of risks to the system, but the risks posed by cyber operations that threaten data integrity are even
51 84
more serious. Theft is one of the potential outcomes that can arise as a result of these risks. The
integrity of the data that is maintained by financial institutions can be tampered with on purpose
6
or unintentionally, either of which can have repercussions that are detrimental to the stability of
23
the international economy. This is due to the complexity of the financial system, its connection
with other financial systems, and the fact that it functions across national lines. It is also plausible
13
due to the fact that it is not constrained by physical or governmental bounds. This risk, in contrast
to the worldwide financial crisis that occurred in 2007-2008, is not linked to the health of any one
sector of the economy, and it will only increase as an increasing number of governments prioritise
the transition to cashless economies. In addition, the severity of this risk is not contingent on the
prevailing economic conditions. It is worthy of commendation that the finance ministers and
governors of the central banks of the G20 countries called for stronger global financial institutions
in a communiqué that was issued in March of 2017. The next step that the G20 may take is to
adopt a commitment by their countries to refrain from using offensive cybertools to imperil the
41
integrity of data in the financial system and to collaborate with one another in the case of an attack.
This might be the next step that the G20 takes. This would be the next step that would be taken.
This would be the following step in the process after this one.
3.SYSTEM ANALYSIS
30
All of the applications that are currently available are hosted on a single server. In the event that
the server were to become corrupted or crash as a result of an excessive amount of requests, users
that we are capable of doing. Customers would still be able to receive service from the remaining
nodes even if a single node failed since the data would be stored on several nodes, which are
SOFTWARE REQUIREMENTS
• Documents such as the product's viewpoint view and characteristics, as well as the
operating system and operating surroundings, graphics requirements, design limits, and
user manuals are all included in the functional criteria or the overall description. In addition
the strengths and weaknesses of the project, in addition to providing information on how
to address these issues. You will be able to achieve this goal if you conduct an inventory
of your resources and figure out how to strengthen your areas of weakness. This overview
• Jupiter (or)
• Google colab
HARDWARE REQUIREMENTS
• The bare minimum hardware that must be present on a user's computer in order for them to run
Enthought Python, Canopy, or Visual Studio Code varies greatly depending on the sort of product
that is being developed using any of these programmes. This is because each of these programmes
is designed to build a different kind of product. apps that must quickly carry out a large number of
calculations or operations will benefit from a processor with a higher clock speed, whereas apps
121
that must store a large number of objects or arrays in memory will benefit from having more RAM
available.
1.Data Collection
2.Data Preprocessing
4.Modiling
5.Predicting
the level of quality of a software system," The phrase "non-functional requirement" is what
we mean when we talk about "NFR." They test the programme to ensure that it satisfies non-
100
functional requirements that are crucial to the success of the product. These requirements
include things like the software's responsiveness, usability, security, portability, and so on.
Examples of nonfunctional requirements include inquiries like "How long does it take for the
60
website to load?" The failure of a system to fulfil the requirements of its users is frequently
the result of its creators neglecting criteria that are not related to functionality. When you use
than 10,000 people using the website at the same time, for instance, it should still load quickly
under three seconds. In addition to the product's requirements from a functional standpoint, it
demand for data integrity capacity requirement for availability requirement for scalability
FEASIBILITY STUDY
2
At this stage, a business plan is developed in addition to a determination being made regarding
the practicability of the idea. The proposal consists of a high-level summary of the project as well
as cost estimates for completing the task. During the portion of the project that is devoted to system
analysis, the proposed system will be examined to see whether or not it is feasible. This is done to
ensure that the planned system will not place an undue burden on the company and that it will still
146
be able to function normally. In order to do a feasibility analysis, one must have a solid
2
understanding of the fundamental requirements of the system.
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
ECONOMICAL FEASIBILITY
141
This research is being done with the intention of determining whether or not the corporation has
43
the resources to deal with the potential effects that the system may have on the economy. The
company is only able to put a certain amount of money into the research and development of the
system before it starts to be useless. It is required to provide a reason or clarification regarding the
67
connected expenditures. The fact that the great majority of the underlying technologies are open
15
source contributes significantly to the system's practicability as well as its accessibility to a wide
104
range of price points. This is attainable because to the fact that many of the technologies that make
2
this possible are freely accessible. The only parts that needed to be purchased individually were
TECHNICAL FEASIBILITY
The objective of this study is to ascertain whether or not the system is technically viable,
which is defined here as having the capacity to satisfy the technical requirements. It is essential to
take precautions to ensure that the capabilities of our existing infrastructure will not be exceeded
136 15
by any new systems that are developed. Because of this, there will be a significant amount of
additional strain placed on the technical resources that are already available. As a direct
consequence of this fact, there will be exceptionally high standards set for the consumer. Because
the implementation of the planned system will call for either minor adjustments or no changes at
all, the prerequisites for this system need to be straightforward and simple to grasp.
SOCIAL FEASIBILITY
12
In this part of the investigation, we are going to investigate the degree to which the system has
lived up to the anticipations of its customers. This approach also includes instructing the user on
how to make the most effective use of the technology that is available to them. The user must never
feel intimidated or afraid of the system in order for it to function well. Instead, they should accept
the system as an unavoidable, albeit bothersome, aspect of their existence. The methods that are
utilised to instruct users on and acclimatise them to a particular system are the primary factors that
2
determine the level of acceptance the system receives from its users. We will be able to determine
whether or not the system is gaining popular acceptance by looking at the percentage of satisfied
users. In order for him to provide the constructive criticism that is always welcome from the
individual who will be using the system in the end, it is necessary that he builds his confidence
first. This is the case since he is the last user that the software was designed for.
4.SYSTEM DESIGN
5
4.1 SYSTEM ARCHITECTURE:
1.A graphical depiction of data that is also known as a bubble chart is called a DFD (Data Flow
9
Diagram). It is a straightforward graphical formalism that may be utilised to provide a description
5 91
of a system in terms of the information that is input into the system, the operations that are carried
out on that information, and the information that is output from the system. It is possible to describe
a system by thinking about the data that enters the system, the operations that are performed on
5
that data, and the data that exits the system using this technique.
The data flow diagram (abbreviated as DFD) and the data flow chart (abbreviated as DFCC) are
two of the most important modelling tools. In the process of modelling the many parts of the
the system's process, the data that is used by the process, an external entity that interacts with the
12
system, and the information flows that occur within the system.
38
The flow of information across the system as well as the manner in which it is modified as a result
of the numerous operations that occur inside the system may be seen in a 3.DFD diagram. It is a
graphical representation of the movement of data from one location to another, as well as the
2
transformations that occur to the data as it travels. Flowcharts are applied quite commonly in the
4.DFD is sometimes referred to as a bubble chart depending on the context in which it is used.
Directed graphical diagrams, also known as DFDs, are able to produce an accurate depiction of
the system regardless of the level of abstraction being used. A DFD's granularity can be raised by
101
moving up through its levels, which are arranged in a hierarchy that takes into account the
information flow and functionality that are revealed at each level. The user is at liberty to divide
38
these layers in any manner that they deem appropriate.
User:
User
Unauthorized user
Check
Yes NO
View Products
End process
Service Providers:
Service Provider
Yes NO Unauthorized
Check Service Provider
End process
4.2 UML DIAGRAMS
The "UML" in the abbreviation is an abbreviation that stands for the Unified Modelling Language.
5
Standardised and used extensively in the field of object-oriented software engineering, the Unified
103 35
Modelling Language, or UML for short, is a modelling language that can be used to a variety of
different scenarios. The phrase "unified modelling" is shortened to "unified modelling language,"
or UML for short. The Object Management Group (OMG), which is also the entity that was
responsible for developing the standard in the first place, is the organisation that is in charge of
the Meta-model are considered to be the fundamental components of the current iteration of the
Unified Modelling Language (UML). A standard modelling language that goes by the name UML.
It is conceivable that in the not-too-distant future, the Unified Modelling Language (UML) will be
systems, the Unified Modelling Language (UML) can also be utilised as a standard language for
9
the modelling of business systems as well as the modelling of other kinds of systems. In addition,
it can be put to use in the planning and creation of software system objects, in addition to the task
engineering best practises designed for the depiction of intricate systems. The Unified Modelling
The Unified Modelling Language, sometimes known as UML, is an instrument that is important
for the process of creating object-oriented software and, more generally, for the design of software.
2
The Unified Modelling Language (UML) is a method for describing the design of software projects
OBJECTIVES The following is a list of the primary inspirations that led to the creation of the
UML:
The first step is to give users access to a fully operational, graphically expressive modelling
88
language that will enable them to construct models of significance and share those models with
others.
Second, make tools for specialisation and extendibility accessible in order to facilitate future
2
3. Maintain your autonomy with regard to the programming language and method of production
4. Please provide a more in-depth and comprehensible analysis of the modelling language as well
5. Take a leadership position in the effort to shape the future of the OO tools industry.
132
It would be helpful if you could provide some direction for more abstract aspects of software
80
Seven, check to see that you are making use of the most efficient strategies.
9
USE CASE DIAGRAM A use case diagram is a type of behavioural diagram. The results of a use-
2
case analysis are what are used to inform the design of a use case diagram. This kind of diagram
is a part of the toolkit that is provided by the Unified Modelling Language (UML). Its goal is to
5
offer a graphical depiction of the capabilities of a system in terms of the actors involved, the results
those actors desire (which are represented by use cases), and the connections between those use
2
cases. This should be the primary focus of the project. The fundamental objective of a use case
diagram is to provide clarity regarding the roles that different stakeholders are expected to play in
the operation of different system functions. Because we now have access to this information, it is
easy to depict the many roles that different people perform within the system.The results of a use-
case study can then be included into the development of a use case diagram, which is a kind of
behavioural diagram. This kind of diagram is a part of the toolkit that is provided by the Unified
5
Modelling Language (UML). Its goal is to offer a graphical depiction of the capabilities of a system
in terms of the actors involved, the results those actors desire (which are represented by use cases),
2
and the connections between those use cases. This should be the primary focus of the project. The
fundamental objective of a use case diagram is to provide clarity regarding the roles that different
stakeholders are expected to play in the operation of different system functions. Because we now
have access to this information, it is easy to depict the many roles that different people perform
17
The use case diagram can be improved with the assistance of the class diagram, which also
contributes to the construction of a system design that is more accurate. The defined actors from
the use case diagram are organised into a collection of classes in the class diagram. These classes
are connected to one another via the relationships that are depicted in the diagram. The nature of
the link or association between the classes is characterised by the "is-a" or "has-a" relationship that
exists between the classes, respectively. The class diagram illustrates how different kinds of
objects might grant access to associated features in a system. These capabilities are designated by
the labels. The many pieces of functionality that are made available are referred to collectively as
the "methods" of the class. In addition, each class may be equipped with a collection of "attributes"
that serve to differentiate it from the other classes when applied in a variety of contexts.
Object diagram:
A distinction can be made between the class diagram and the object diagram if one so
chooses. When referring to a particular instance of a class, the word "object" is the term that is
current state of a class at the point in time when it is being utilised by the audience for whom it
was designed. The object diagram provides documentation of the various classes that are utilised
by the system, including their current states and any linkages that exist between them.
State diagram:
A state diagram is a graphical representation of the transitions that objects in a system go through
as they get older. State diagrams are commonly used in computer science. A state diagram is a
graphical representation of the numerous states that may be present. Because of the events that
occur within the system, the statuses of the system's objects might change at some point. It is
possible to demonstrate, with the help of a state diagram, how the occurrence of particular events
has an effect on the state of an item, causing the object to transition from one state to another. A
state diagram can also be used to illustrate the progression from the beginning state of an object to
with the very first step and ending with the very last. In the same way as there are activities, actions,
transitions, beginning and final states, and guard conditions in an activity diagram, there are also
system interact with one another and communicate with one another. One of the most helpful
qualities of a sequence diagram is its capability of displaying the steps of a process in the order in
which they occur. As a consequence of this, we are able to reach the conclusion that the
representation that is divided up into steps accurately captures the specific order in which the
33
components interact with one another. The "messages" that are passed along from one object in
the sequence diagram to the next make it possible for the various components to communicate
Diagrams of collaboration are used to classify the myriad of interdependencies that exist
between the many sections of a system. Because each interaction is detailed in its own numbered
listing, it is much simpler to follow the chain of causality from one encounter to the next. It is
97
helpful to figure out how everything in the system might interact with one another by using the
collaboration diagram.
Component diagram:
Component diagrams are visual illustrations that show the logical relationships among the
numerous subsystems that comprise a bigger whole. These linkages are used to understand how
the complete system works. At a high level, this schematic illustrates not just the separate
components of the system but also the linkages between those components. The manner in which
37
each of the components interacts with the others can also be deduced from the diagram. A
component diagram is used to identify and depict components that have been determined to be
operationally necessary for the system after it has been developed or constructed.
Deployment diagram:
The deployment diagram contains documentation including information regarding the proper
configuration of the application's runtime components. When a system has been constructed and
is getting close to being ready for implementation, this diagram becomes extremely important.
4.3 IMPLEMENTATION:
112
In light of the fact that all currently available monetary applications are dependent on a single
centralised server, we have made the decision to incorporate Blockchain technology into a
20
monetary application as part of this project. Users wouldn't be able to access the services if the
requests. Because of this, we have made the decision to implement Blockchain technology into a
financial service. The implementation of decentralised Blockchain technology as a solution to this
issue is something that we are capable of doing. Customers would still be able to receive service
from the remaining nodes even if a single node failed since the data would be stored on several
nodes, which are similar to servers in that they are used to store information.
When Blockchain wants to add a new block to the blockchain, it first compares the hash of that
block to the hash codes of all of the blocks that came before it. If a new block is added to the
Blockchain before the verification method is completely completed, the block in question won't
be stored. In the event that none of the previously recorded blocks were subjected to any kind of
assault or modification, Blockchain will continue to produce the same hash code, which will serve
as proof that the verification was successful. A one-of-a-kind hash code is generated for each block
of transactions on the blockchain. This hash code acts as a digital fingerprint for the data that is
contained inside those blocks. If the validation cannot be completed successfully, Blockchain will
refrain from adding any new records. This demonstrates that Blockchain cannot be altered and that
it is resistant to any attacks or changes that may be made to its data behind the scenes. In the event
that the value has been modified in any way, the validation will be regarded as having failed.
Because of the many advantages offered by Blockchain technology, businesses of all sizes are
making the transition away from programmes that run on centralised servers and towards
In order to fulfil the requirements of this project, we are going to develop two unique groups of
end users, who are going to be service providers and clients or consumers.
1) Companies That Provide Services: After registering for an account and logging into the
42
application, service providers are able to make changes to their product catalogue and view the
To be able to make a purchase, the user must first sign up for an account and log into the app. After
doing so, they will be able to browse information regarding all of the service providers who are
available, add money to their wallet, and look through product specifics. This is something that
Data may be saved on a blockchain through the utilisation of smart contracts, and these contracts
may be built with the assistance of SOLIDITY programming. Any and every information that is
enables the deployment of code that complies with the SOLIDITY standard. Python applications
39
are able to make use of the contract's address, which is returned by the deployed contract, in order
to access the contract and either write to or read from the Blockchain. The SOLIDITY code is
currently being displayed in the panel that may be seen further down below.
Previously, in the SOLIDITY code, we developed four functions to hold crucial data: users,
wallets, shopping carts, and products. The contract will be deployed if the 'runBlockchain.bat' file
this link will cause the window that is located at the bottom of the page to slide open.
On the previous screen, Blockchain generated several private keys and default accounts. After
entering the 'truffle migrate' command on the same screen and pressing enter, the contract will be
deployed to Blockchain Ethereum. What you see here is an illustration of the final product.
Both the actual location of the contract as well as the screen display that states "Financial Contract"
in white font are available to us. You will need to type this address into a Python code, just like it
Learn how to invoke a Blockchain SMART CONTRACT using Python by going back over the
notes that are indicated in red farther up in this article. These jotted down notes can be seen at the
very top of the screen. We make use of an IPFS server to ensure that any images that you may
upload using the add product module are kept in a secure location. Due to the impossibility of
SAMPLE CODE:
import json
from requests import Session
url = 'https://pro-api.coinmarketcap.com/v1/global-
metrics/quotes/latest?convert='+country
headers = {
'Accepts': 'application/json',
'X-CMC_PRO_API_KEY': 'API_KEY',
session = Session()
session.headers.update(headers)
try:
response = session.get(url)
results = response.json()
print("For "+country+":\n")
print(response)
active_markets = results["data"]["active_market_pairs"]
bitcoin_percentage = results["data"]["btc_dominance"]
last_updates = results["data"]["last_updated"]
global_cap = int(results["data"]["quote"][country]["total_market_cap"])
global_volume = int(results["data"]["quote"][country]["total_volume_24h"])
active_currency_str = '{:,}'.format(active_currency)
active_markets_str = '{:,}'.format(active_markets)
global_cap_str = '{:,}'.format(global_cap)
global_volume_str = '{:,}'.format(global_volume)
x = datetime.timestamp(datetime.strptime(last_updates, "%Y-%m-
%dT%H:%M:%S.%fZ"))
%I:%M%p')
print("The global cap of all crypto is " + global_cap_str + " and the 24th global
str(bitcoin_percentage) + "%\n")
print("======================================")
print(e)
import json
url = 'https://pro-api.coinmarketcap.com/v1/cryptocurrency/listings/latest'
headers = {
'Accepts': 'application/json',
'X-CMC_PRO_API_KEY': 'API_KEY',
}
session = Session()
session.headers.update(headers)
response = session.get(url)
results = response.json()
data = results["data"]
rank = currency["id"]
name = currency["name"]
symbol = currency["symbol"]
import
json
def getResult(link):
headers = {
'Accepts': 'application/json',
'X-CMC_PRO_API_KEY': 'API_KEY',
session = Session()
session.headers.update(headers)
response = session.get(link)
results = response.json()
return results
url = "https://pro-api.coinmarketcap.com/v1/cryptocurrency/listings/latest"
result = getResult(url)
data = result['data']
ticker_url_pairs = {}
symbol = currency['symbol']
url = currency['id']
ticker_url_pairs[symbol] = url
print(ticker_url_pairs)
choice = choice.upper()
ticker_url = 'https://pro-api.coinmarketcap.com/v1/cryptocurrency/quotes/latest?id='
+ str(ticker_url_pairs[choice])
result_ticker = getResult(ticker_url)
currency = result_ticker['data'][str(ticker_url_pairs[choice])]
rank = currency["cmc_rank"]
name = currency["name"]
symbol = currency["symbol"]
circulating_supply = int(currency["circulating_supply"])
total_supply = int(currency["total_supply"])
quotes = currency["quote"]["USD"]
market_cap = quotes["market_cap"]
hour_change = quotes["percent_change_1h"]
day_change = quotes["percent_change_24h"]
week_change = quotes["percent_change_7d"]
price = quotes["price"]
volume = quotes["volume_24h"]
volume_string = "{:,}".format(volume)
market_cap_string = "{:,}".format(market_cap)
circulating_supply_string = "{:,}".format(circulating_supply)
total_supply_string = "{:,}".format(total_supply)
total_supply)*100) + "%")
print()
5.SOFTWARE ENVIRONMENT
What is Python :-
117
A few tidbits of knowledge on the Python programming language are provided here.
25
Python is now the most popular high-level general-purpose programming language, surpassing
Java as the leader in this category. The Python programming language was formerly known
50
Python is a versatile option for programmers since it can be used in either an object-oriented
The limitations that the language places on indentation help to ensure that the work produced
by programmers is always legible, as does the relatively low amount of typing that is
necessary.
4
Python is a programming language that is used by a large number of well-known companies,
like Google, Amazon, Facebook, Instagram, Dropbox, and Uber, to name just a few of them
One of Python's greatest advantages is its extensive standard library, which may be put to work
• Graphical User Interface Applications (such as Kivy, Tkinter, and PyQt, etc.)
• Web frameworks like as Django, which are used by websites such as YouTube, Instagram,
and Dropbox
• Multimedia
Python's many benefits are as follows:
Let's look at the advantages that Python has over other languages.
Python comes with an extensive library that already includes the source code for a variety of
pre-built programmes and features. This reduces the need to create all of the code by hand,
which would typically be required. Some examples of this include regular expressions,
automated documentation and testing, threading, databases, CGI, email, image processing, and
so on.
As was said earlier, the Python programming language can be modified to be compatible with
83
a broad variety of other computer languages. If you like, you can write some of your code in
other languages, such as C++ or C. You have that option. This can take place at any point
during the course of the development process. This is very necessary in order to accomplish
3.Embedding
Python is a computer language that may be extended in a variety of ways and can also be
57
included inside of other programmes. Python is a general-purpose programming language that
can easily be integrated with the source code of other programming languages. It is possible
4
to do so since Python is a programming language that is both open source and freely available.
Because of this, we won't have to rewrite the code for the other language in order to add
64
The users of this language are more productive than those who use other languages such as
95
Java and C++ since it is simpler to learn and has a more comprehensive library than those
other languages. It is recommended that you cut back on the amount of writing you do and
22 16
There is grounds for optimism regarding the future of the Internet of Things due to the fact
22
that Python is serving as the basis for the development of a great many new platforms, such as
Raspberry Pi. Using this method, it is possible to relate the language to the community on a
worldwide scale.
It's possible that Java programmers will need to make a class before they can just show "Hello
World." The Java documentation might provide further information on this topic. On the other
4
hand, all you require is a print statement if you're working in Python. Additionally, it is
relatively simple to learn, comprehend, and apply in one's own software development projects.
Because of this, it is challenging for Python programmers to switch to languages such as Java,
16
Reading Python is very similar to reading English due to the fact that it is not a very verbose
64 21
language. Reading Python is not significantly different from reading English. This is due to
the fact that English served as the primary inspiration for the creation of the computer language
known as Python. This indicates that the language can be learned, comprehended, and utilised
120
as a tool for programming with a low investment of time and effort on the part of the learner.
4
Additionally, there is a requirement for indentation; but, if you so choose, you may use curly
direct result of these modifications, the source code can now be viewed with far less effort.
8, Object-Oriented
When working with this language, you are able to choose either the procedural or the object-
oriented approach to the programming you do. While functions make it simpler to recycle
code, objects and classes provide us greater leeway to adapt to unanticipated circumstances.
Classes make it feasible to combine data and functionality into a single entity, which was
previously impossible.
9. free from any restrictions whatsoever The availability of the program's blueprints
144
Python, as was just described, is a programming language that is both open-source and free to
74
use. Python, on the other hand, does not only have a no-cost download option, but it is also an
18 142
open-source programming language, which means that everyone can gain access to the
68
language's core and modify it. This is because Python is open-source software, which means
4
that anyone can download it and alter it for their own needs. The reason for this is owing to
that you may utilise to develop the projects you want to create.
10.Platform independent
79
If you write the code for your project in a language such as C++, it is highly likely that you
will need to make some modifications in order to get it to work on a different platform. This
4
is owing to the fact that there is not a single method that can be applied across all platforms to
support all programming languages. Python, on the other hand, is not even somewhat
comparable to that. at this configuration, the code only needs to be written once, and after that,
the user can choose to execute it at whichever location best suits their needs. This method is
referred to as "Write Once, Run Anywhere," which is also an acronym that properly
encapsulates the approach. Nevertheless, during the design phase of the system, a great deal
11. Contextualised
In conclusion, we will offer the opinion that the contentious term is one that can be construed
16
in a variety of different ways. It is much easier to debug a programme written in an interpreted
language than one written in a compiled language due to the fact that each instruction in an
Do you still have inquiries or concerns regarding the numerous advantages provided by
Python? Include your ideas in the space reserved for user comments.
to other languages utilised by the programming community. Because the Python standard
library has such strong backend support, you won't need to hunt for any additional third-party
62
libraries in order to get your work done with Python. As a consequence of this, numerous
seasoned specialists recommend that Python be studied by individuals who are new to the
business.
55
Because Python is available as open source software and has a low barrier to entry, companies
66
of any size can take advantage of the language and the tools that go along with it. The Python
community is more willing to provide a helping hand to you as a result of Python's great
25
The results of Github's annual survey showed that Python was the most popular programming
language in 2019, claiming the top spot from Java for the very first time.
Third, there is no prerequisite for using Python because it is so easy to pick up.
Any platform, including macOS, Linux, and Windows, is capable of executing Python code.
18
If you are skilled enough in Python, you will be able to earn a career in a broad number of
industries, such as the development of online applications, data analysis, machine learning,
automation, web scraping, game development, and visualisation. If you are a programmer and
want to work in a variety of fields, it is necessary for you to be fluent in more than one
59
programming language; however, if you know Python, you can accomplish everything. It is a
Up to this point, we have explored the several advantages that utilising Python for your project
may provide you. If you do choose to go that route, though, it is imperative that you
99
comprehend the repercussions of your decision in its entirety. Let's have a look at some of the
issues that can arise when using Python rather than one of the other languages available.
55
The fact that Python's code is interpreted line by line has been convincingly established for
18
our purposes. Because Python is an interpreted language, the time it takes to run a programme
in Python is almost always significantly longer than expected. This, however, is not a cause
for concern unless hastening the process is a main goal that must be accomplished. In that
98
context, it has the potential to create certain problems. In other words, unless the necessity for
4 72
high speed is an absolute must, the benefits of Python are sufficient to distract us from the fact
21
that it is not particularly fast. This is the case unless the need for high speed is an absolute
must. Unless the demand for rapid speed is of the utmost significance, this is true.
Python is a good server language; nonetheless, it is often utilised on the server side as opposed
to the client side because of its usefulness on the server. Because learning Python requires less
effort than learning other languages. In addition to this, it is rarely used to develop applications
that can be executed on mobile devices like as smartphones and other handheld gadgets. A
helpful illustration of this type of application is the carbonnelle, which is shown here.
4 72
Brython is a programming language that has been available for some time, but due to worries
123
3. Restrictions in place as a result of the Design
48
There is a good chance that you are already aware that Python uses dynamic typing. The
procedure of building the code will continue without your needing to worry about the kind of
variable that is being defined because it will be handled automatically. This objective can be
accomplished through the usage of duck-typing. I hope you won't mind my asking, but could
you please expound on that? The conclusion that can be drawn from this is that there is a good
chance that anything that resembles a duck is, in fact, a duck. Even if this makes the day-to-
96
day work of the developers easier, it could result in unforeseen complications once the
4. Database Access Layers That Have Not Yet Finished Their Development and Are Still in
The database access layers that are provided by Python are not quite as well-established as
those that are provided by other technologies, such as JDBC (Java DataBase Connectivity)
and ODBC (Open DataBase Connectivity), which are utilised on a more regular basis. As a
direct consequence of this, the majority of the world's most successful businesses today only
5. Simple
86
We're not joking, honest. Although the Python programming language is well-known for
having an approachable user interface, this trait of Python's occasionally presents challenges.
An illustration of what I'm talking about is shown here. I don't use Java since the user interface
in Python is more appealing to me. The syntax is so easy to understand that the normal
verbosity that is found in Java code seems superfluous to me, despite the popularity of the
programming language.
This article's purpose was to discuss both the positive and negative aspects of working with
What are some of the ways that the letters of the alphabet and the Python language have
similarities? It should be quite clear that when we discuss ABC in the context of Python, we
are referring to the ABC programming language. You are correct; the first letters of both of
those words are "ABC." This should not come as a surprise. The CWI (Centrum Wiskunde &
Informatica), which has its headquarters in Amsterdam, the Netherlands, is credited with the
development of the initial version of the ABC programming language and environment. ABC
1
is both a programming language and an environment that allows for its use, and it can be put
81
to use for a wide variety of projects. The greatest feat that ABC has achieved is that it was able
118
to have an effect on the creation of the programming language Python, which was developed
54
in the 1980s, closer to the end of the decade. At the Computer Working Institute (CWI) around
that time period, Guido van Rossum worked on a distributed operating system that was called
Amoeba. This creature, which was known by the code name "Amoeba," was well known.
During an interview with Bill Venners1, Guido van Rossum discussed his role as a
52
"implementer" during the development of the programming language ABC at Centrum voor
46
Wiskunde en Informatica (CWI) in the early 1980s. This role allowed him to contribute to the
development of the language. I have some reservations regarding the degree to which one is
able to appreciate the significance of ABC's role in the evolution of Python. I try to give credit
where credit is due, and that includes acknowledging ABC's contribution. Since I owe a lot to
26
what I learned on that project and the people who were a part of it, I try to give credit where
credit is due, and that includes acknowledging ABC's contribution. Later on in the same
interview, Guido van Rossum elaborated on his earlier remarks, adding, "I remembered all of
my experience, as well as some of my frustration with ABC." After that, I started typing pretty
much right away. To achieve this goal, I developed a rudimentary virtual machine, parser, and
runtime from the ground up. I re-created, in my own special way, the various features of the
ABC that had caught my curiosity in the first place. In order to group statements, rather than
making use of curly brackets or beginning and ending blocks, I chose for the use of indentation
and built a tiny collection of different forms of solid data. Examples of these data types include
11
a hash table, which is also referred to as a dictionary, as well as a list, strings, and numbers.
"
In February of 1991, Guido Van Rossum posted the first version of the Python source code on
the newsgroup alt.sources. This version was 0.9.0. Core data types including list, dict, str, and
others with similar characteristics were provided in this release along with exception handling,
functions, and other features. It also had a modular architectural framework and an object-
oriented architecture.In January of 1994, the public was given access to the first version of
Python. Functional programming tools like lambda, map, filter, and reduce are the most
notable additions to this release. These are some of the newest tools available. Guido Van
70
Rossum never felt drawn to perform these tasks.Six and a half years and a half years after its
first release, Python 2.0 was made accessible to the public in October of 2000. It had a
comprehensive garbage collector, support for Unicode, and list comprehensions. Furthermore,
it worked fine with Unicode.After eight more years of success in version 2.x, Python's next
major release, Python 3.0 (also known as "Python 3000" and "Py3K"), was made available to
the public. Some people even refer to Python 3.0 as "Python 3000." There is zero backwards
compatibility between Python 2 and Python 3. This is an unwavering guideline. Python 3's
primary focus was on decreasing redundant programming approaches and modules, which
90
directly led to the satisfaction or near-satisfaction of the 13th law of the Zen of Python. This
was because this was a primary design goal for Python 3. Here, we learn that "There should
be one -- and preferably only one -- obvious way to do it."Python 7.3 introduces the following
improvements:
Printing currently falls under the category of functions that can be performed.
In instead of using lists, we will be utilising iterators and views for this particular project.
138
Because it is impossible to sort a list whose members are not all similar to one another, lists
cannot contain items that are heterogeneous. The criteria that were used to build the hierarchy
There is just one data type for integers left, and its name is int. The term "int" refers to both
are multiplied together is a floating-point number. Bringing back the "old" behaviour in one's
Text against data is a contrast to the battle between Unicode and 8-bit.
Purpose:-
124
In spite of the low quality of the photographs we were utilising, we were able to demonstrate
110
that our method can correctly segment intra-retinal layers in images of poor quality, including
40
those with speckle noise, low contrast, and variable intensities. We did this by utilising the
ANIS function.
Python
Python is a high-level, interpreted programming language that is used to create a wide variety
of applications. It was developed by Guido van Rossum, who made it available to the general
11
public for the first time in 1991. As part of its design philosophy, Python prioritises the
49 1
It is suitable for a wide range of programming styles, such as object-oriented, imperative,
Additionally, it can be used with a wide variety of languages. Python's dynamic type system
and built-in memory management are two of the language's most distinctive features.
The Python Interpreter is responsible for processing Python when it is started, and it will
75
continue to do so while Python is running. This means that you may immediately begin
executing your programme without having to worry about constructing it first. This operates
19 31
The reason for this is because "Python is Interactive," which can be translated as "Python is
Interactive." As the name suggests, "Python is Interactive" means that you may type
1
commands straight into the interpreter when you are at the Python prompt to write your
programmes.
Python programmers are aware of how important it is to keep the rate of development at a
consistent high level. Having access to powerful structures that prevent the repetitive
duplication of code is an important part of this, as is having code that is both brief and easy to
understand. This metric is also linked to maintainability; while it may be largely meaningless,
it does provide some insight into the amount of code you need to read, analyse, and/or interpret
Tensorflow
TensorFlow is a library of code that can be used by anyone at no cost. Due to its flexibility, it
can be used for dataflow and differentiable programming in a wide range of contexts. This
library of code is put to use in both the research and production departments of Google. The
46
Google Brain team was responsible for developing TensorFlow.
Numpy
14
Numpy is a library that may be utilised to do generalised array processing. One of its features
130
In order to use Python for scientific computing, you will need to install this add-on first. It
1
possesses a wide variety of qualities, some of the most basic of which are as follows:
broadcasting) Instruments for Combining C/C++ and Fortran Programmes The capacity to
produce random numbers, carry out the Fourier transform, and carry out linear algebra are all
Numpy is a free and open-source programming language that can be utilised for a variety of
purposes outside the realm of academic research. For example, it can serve as an efficient
multi-dimensional container for the storage of a wide variety of data types. Additionally,
Numpy's ability to accommodate any data type makes it simple to interact with a wide range
of database types.
Pandas
The majority of the work that was done to prepare and manipulate the data was done in Python.
Its impact on the overall data analysis was so small that it could be considered negligible. As
it turned out, pandas were the solution to this problem. Pandas enables us to handle and analyse
data from a wide variety of sources. Python is an open-source programming language that is
Matplotlib
Matplotlib is a toolkit for two-dimensional charting in Python. It is cross-platform, flexible,
and able to produce publication-quality figures in a variety of print and interactive formats.
31 14
Matplotlib can be used in a wide range of settings, from standalone Python scripts to IPython
shells, Jupyter Notebooks, web application servers, and four different graphical user interface
toolkits.
49 1
Power users have total control over line styles, font attributes, axis settings, and other such
82
aspects of the software through either an object-oriented interface or a collection of methods
that are already well known to MATLAB users. Using the pyplot package in conjunction with
1
Scikit-learn is a collection of supervised and unsupervised learning algorithms that can be
14
accessed by Python developers using a consistent application programming interface (API). It
1
is licenced under a simplified BSD licence that allows for both academic and commercial use.
The scikit-learn library contains many learning algorithms. It is offered under a variety of
Linux distributions.
Python
Python is a high-level, interpreted programming language that is used to create a wide variety
of applications. It was developed by Guido van Rossum, who made it available to the general
40 11
public for the first time in 1991. As part of its design philosophy, Python prioritises the
Additionally, it can be used with a wide variety of languages. Python's dynamic type system
and built-in memory management are two of the language's most distinctive features.
The Python Interpreter is responsible for processing Python when it is started, and it will
75
continue to do so while Python is running. This means that you may immediately begin
executing your programme without having to worry about constructing it first. This operates
19 31
The reason for this is because "Python is Interactive," which can be translated as "Python is
Interactive." As the name suggests, "Python is Interactive" means that you may type
1
commands straight into the interpreter when you are at the Python prompt to write your
programmes.
Python programmers are aware of how important it is to keep the rate of development at a
consistent high level. Having access to powerful structures that prevent the repetitive
duplication of code is an important part of this, as is having code that is both brief and easy to
understand. This metric is also linked to maintainability; while it may be largely meaningless,
it does provide some insight into the amount of code you need to read, analyse, and/or interpret
Python is a very adaptable programming language; however, it is not commonly found pre-
installed on computers or other devices. Despite the fact that it was only made available to the
40 19
public for the first time in 1991, Python has become one of the most popular high-level
programming languages out there. The artistic idea behind it prioritises the readability of the
1
Python's object-oriented philosophy and language characteristics enable developers to produce
102 1
code that is not only readable but also makes sense in the context of the tasks they are doing.
145
Microsoft Windows does not include this particular software when it is initially installed.
1
Python Installation Instructions for Windows and Mac
Python is an open-source programming language that has undergone numerous revisions and
134
improvements since its inception. More specifically, how does one go about installing Python?
52 114
Since you are just beginning your journey with Python, this lesson will answer your question
54 1
and dispel any uncertainty that may have arisen as a result of your inexperience.
111
Please be aware that earlier versions of Windows, including Windows XP, are not compatible
73
Read through the System Requirements to get started. This is the most important step that
131 1
needs to be taken before you can begin installing Python. The Python documentation page has
69
all of the information that you need to know about which version of Python you need to
44
download in order to run the programme on your computer. My computer runs Windows 7
64-bit. The procedures described here can be used with any version of Python. My computer
Step 1: Using Google Chrome or another online browser, you may download and install
Python from its official website. Anyone is capable of completing this procedure. OR Follow
the link in the following text to reach the site: https://www.python.org/. Step 1: Using Google
Chrome or another online browser, you can download and install Python from its official
1
Now, check for the latest and the correct version for your operating system.
3
Step 2: Click on the Download Tab.
10
Step 3: You have the option of clicking the yellow Download Python for Windows 3.7.3 button,
3
or you can use the drop-down menu to locate the button that corresponds to the version of Python
that you are presently employing on your computer. Python for Windows, version 3.7.4, the most
105
recent stable release, is currently being made available for download at this address.
106
Step 4: At this point, you should have reached the point where you may select the Files option.
24 3
In the fifth step, you will see that a new version of Python is displayed beside the operating
system.
• Python for Pc 32-bit can be downloaded in a number of different file formats, including an
71
executable installer, an embeddable zip file, and a web-based installer. You are free to take into
•The Python Windows 64-bit edition can be downloaded in the form of an embedded Windows
x86-64 zip file, an executable Windows x86-64 installer, or a web-based Windows x86-64
93 135
installer. These three options are all accessible for users to choose from. There are basically three
24
options here to pick from. You have the option of picking one of the three choices that have been
offered.
10
When it is finished, the web-based installer for Windows x86-64 will be stored in this location.
You have, in a sense, already completed the first duty that was given to you, which was to decide
which version of Python to install. Now that we have finished the tasks that are necessary before
installing Python, we are able to go on to the next stage of the procedure, which is referred to as
129
Note: If you want to learn about the adjustments or improvements that have been made to the
122 3
version, you can learn about them by clicking on the Release Note Option.
89
The first step in installing Python is to: To begin the process of installing Python, navigate to
Download and then open the file that was just downloaded of Python.
3
Step 2: Before you click on Install Now, Make sure to put a tick on Add Python 3.7 to PATH.
Step 3: Click on Install NOW After the installation is successful. Click on Close.
139
In the fifth step, you will find that the answer is 3.7.4
10 108
Note: If you already have an older version of Python installed on your computer, you can continue
3
to use that version of the programming language. In order to install the most recent version, you
116
will first need to remove the previous version that was previously present on your computer.
10
Examine the functionality of the Python IDLE.
Step 2: Simply type "python idle" into the Windows Run command to get started.
3
6. SYSTEM TESTING
determining whether or not the modules that run autonomously are fully operational. Testing at
the unit level must be carried out by the developer themselves. The primary purpose is to
disassemble the system into its component elements in order to locate and solve the root cause of
the issue. This will allow for a more thorough analysis of the situation.
3
In addition to evaluating the input and output of the system being tested, the "Black Box Testing"
testing approach also assesses the user interface of the software or hardware being evaluated.
47
The testing that examines each of those functions' behaviours in isolation from the other functions
A collection of testing strategies that concentrate on tracking data-related events as they take place
along various channels inside a program's control flow is referred to as "data flow testing," and the
phrase "data flow testing" is used to characterise this testing methodology. These pathways are
utilised in the process of investigating the data structure of the programme. In dataflow testing, the
emphasis is placed on locating the points at which variables are given values and the locations at
After putting all of the individual components, also known as modules, back together, you will go
on to the next stage of the process, which is called integration testing. The purpose of integration
109
testing is to determine whether or not the newly linked components have caused any problems
3
with the functionality, performance, or dependability of the system.
When carrying out integration testing, one strategy known as the "Big Bang Integration Testing
127
Strategy" entails testing the system in its whole once all of its individual components have been
24
brought together at the same time. There is a term for this kind of exploration, and it is called the
113
"Big Bang." It is difficult to pinpoint the particular location of any potential defects that may have
76
been identified as a result of these tests because of the extensive nature of the testing that was
done. This is due to the fact that no effort is spent towards examining the interfaces that exist
Testing the Graphical User Interface (GUI) of a product or piece of software is done with the
intention of locating defects that are present in the product or programme. This kind of testing is
typically referred to as "user interface testing," which is also a name that can be utilised.
6.2 TEST CASES:
1 Service Providers service provider can signup and login to There is no process
First double click on ‘Start_IPFS.bat’ file to start IPFS server like below screen
In above screen IPFS server started and now double click on ‘run.bat’ file to start python DJANGO
given permission to keep running regularly. The next step is to open a browser and type
http://127.0.0.1:8000/index.html into the address box before hitting the return or enter key. What
In above screen click on ‘Register Here’ link to add new user like below screen
Enter all of your login details into the form shown above. The next step is to determine whether
8
you will be a consumer or a service provider. Finally, I'm entering service provider information on
the screen you see above and clicking the Save button.
In above screen service provider details saved in Blockchain and similarly you can add both users
In above screen I am adding USER and now press button to get below output
In above screen user details added and now click on ‘Login Here’ link to login as service provider
In above screen service provider is login and after login will get below output
In above screen service provider can click on ‘Add New Products’ link to add various products
provider will use the aforementioned UI to enter all of the product details and upload an image.
29
Following that, the results that are presented below will be sent to the service provider.
The product details were saved to the blockchain on the screen that you just saw, and we found
the address hidden in the hash code of the image storage. The same holds true for the quantity of
8
product information that may be entered, as well as the number of orders that can be viewed by
In above screen we can see orders booked by customers and now logout and login as USER
In above screen user is login and after login will get below screen You can see a screen that allows users to add funds to their
wallets by clicking a link that is titled "Add Money to Wallet," which is actually being handled as a phoney transaction. This
screen can
be found up above.. In above screen current balance is showing as 0 and now enter some amount and press button to add
money to wallet and get below output
On the screen that you see above, the word "Added" appears in red text. To check your balance, click the link that says "Add
Money." In above screen balance is 50000 and now click on ‘View Providers’ link to view provider details
34 137
When the user clicks the "View Product" button, they will be taken to a new screen where they
63
can browse through all of the products that are currently available from the selected source.
On the screen that you see above, the user can select the product that they want, and then they can
if he is ready to make a purchase, he can do so by clicking the "Click Here" button, which will
You can view all of the product information up top, then proceed to add items to your shopping
basket, pay for them, check the balance on your card or wallet, and finally acquire the output that
is displayed down below.
On the screen that you just saw, the order was validated and updated in the blockchain. Likewise,
Supporters of blockchain technology anticipate that this type of application will quickly become
standard practise in the financial sector within the next ten years. As more examples of use cases,
the investment banking and securities industries are provided. These are two businesses that the
58
Corda/R3 platform is already supporting in an extraordinarily successful manner. On the other
hand, there are conservative voices who are warning against the tech hype and pointing out that
the only broad use case for blockchains at the present is in the cryptocurrency industry with Bitcoin
and other digital currencies. This opinion is diametrically opposed to mine in every possible way.
It is not feasible to accurately predict the future in any way, whether the immediate, the
intermediate, or the far future. For the time being, the applications of blockchain technology
described above provide a fertile ground for innovation within the financial sector. Companies
who operate in the fields of financial technology and insurance technology will find this to be
particularly true of their industries. In addition, we used a non-fungible token (NFT) smart contract
instead of a traditional smart contract to compute the hash address for the blockchain wallets. This
allowed us to avoid any potential security vulnerabilities. The data were then sent to an IPFS server
9. REFERENCES
1) To begin: 1. Different Cryptocurrencies and Coins Explored. Please visit
2) Applications of Blockchain Technology and Future Prospects in the Financial Services Sector.
Guo, Y., and Liang, C. Financ. Innovat. 2016, 2, 24. Guo, Y., & Liang, C.
3) Peter Rosati and Timothy Cuk were the other two. The blockchain system is discussed in
Beyond Cryptocurrencies: Financial Technology and Strategy for the 21st Century. It was
published in 2016 by Springer Nature Switzerland AG in Cham, Switzerland under the title
4) Tobias Maurer, Andrew Levite, and Gregory Perkovich 4. Towards the establishment of a
worldwide norm making it illegal to tamper with the veracity of financial data. Germany's
Kiel Institute for the World Economy released its 38th Economics Discussion Paper in 2017.
The most recent access date and time for this URL is June 23, 2017; it can be viewed online
at https://www.econstor.eu/bitstream/10419/162579/1/890955921.pdf.
5) In the fifth place, we have Wikipedia. Information as of the 30th of July, 2019 can be found
at https://en.wikipedia.org/wiki/WannaCry_ransomware_attack.
Investments," written by Francesco Bosco, Vincenzo Croce, and Giuseppe Raveduto. The use
Forum on Research and Technology for Society and Industry (RTSI); pages 1-5.