You are on page 1of 98

The Report is Generated by DrillBit Plagiarism Detection Software

Submission Information

Author Name shashank c


Title block chain
Paper/Submission ID 811800
Submission Date 2023-07-13 14:21:54
Total Pages 87
Document type Project Work

Result Information

Similarity 29 %
1 10 20 30 40 50 60 70 80 90

Sources Type Report Content

Quotes
1.51%
Student Internet
10.17% Ref/Bib
Paper
1.85%
11.9%
Words <
14,
Journal/
8.45%
Publicatio
n 6.93%

Exclude Information

Quotes Excluded
References/Bibliography Excluded
Sources: Less than 14 Words Similarity Not Excluded
Excluded Source 0%
Excluded Phrases Excluded

A Unique QR Code use to View/Download/Share Pdf File


DrillBit Similarity Report

A-Satisfactory (0-10%)
B-Upgrade (11-40%)

29 145 B C-Poor (41-60%)


D-Unacceptable (61-100%)
SIMILARITY % MATCHED SOURCES GRADE

LOCATION MATCHED DOMAIN % SOURCE TYPE

1 REPOSITORY - Submitted to The Oxford College of Engineering Student Paper


4
Bangalore on 2023-07-01 11-24

2 FAKE DETECTOR EFFECTIVE FAKE NEWS DETECTION WITH Student Paper


2
DEEP DIFFUSIVE NEURAL NETWORK BY 19N01F0017 YR-2021
SUBMITTED TO JNTU

3 REPOSITORY - Submitted to The Oxford College of Engineering Student Paper


2
Bangalore on 2023-07-01 11-24

4 MACHINE LEARNING FOR ONLINE MOBILE PRICE PREDICTION Student Paper


1
BY 19C91D5807 Yr-2021 SUBMITTED TO JNTU

5 jespublication.com Publication
1

6 qdoc.tips Internet Data


<1

7 austlii.edu.au Internet Data


<1

8 Submitted to Visvesvaraya Technological University, Belagavi Student Paper


<1

9 NEAREST KEYWORD SET SEARCH IN MULTIDIMENSIONAL Student Paper


<1
SATASETS -Submited to JNTUH,TELANGANA By 15RQ1D5812

10 ANN TECHNIQUE WITH FEATURE SELECTION FOR NETWORK Student Paper


<1
INTRUSION DETECTION BY 19JJ1D5809 Yr-2021 SUBMITTED TO
JNTU
11 Submitted to Visvesvaraya Technological University, Belagavi Student Paper
<1

12 PDF File Data nvlpubs.nist.gov Internet Data


<1

13 ir-library.ku.ac.ke Publication
<1

14 Submitted to Visvesvaraya Technological University, Belagavi Student Paper


<1

15 arduino-research-papers.blogspot.com Internet Data


<1

16 mdpi.com Internet Data


<1

17 Student Thesis Published in HAL Archives Publication


<1

18 baixardoc.com Internet Data


<1

19 index-of.es Publication
<1

20 Legislative Opposition to Chain Stores and Its Minimization - Publication


<1
scholarship.law.duke.edu

21 utc.unpad.ac.id Internet Data


<1

22 docplayer.net Internet Data


<1

23 Measuring financial knowledge a macroeconomic perspective by Oliver- Publication


<1
Mrquez-2020

24 qdoc.tips Internet Data


<1

25 ruudseye.com Internet Data


<1

26 Student Thesis Published in HAL Archives Publication


<1

28 www.uou.ac.in Publication
<1

29 moam.info Internet Data


<1

30 moam.info Internet Data


<1
31 qdoc.tips Internet Data
<1

32 Creative Entrepreneurs Well-Being, Opportunity Recognition and Abso Publication


<1
by Chen-2019

33 study.com Internet Data


<1

34 www.freepatentsonline.com Internet Data


<1

35 www.freepatentsonline.com Internet Data


<1

36 apocalypsevibes.com Internet Data


<1

37 Automated segmentation detection and fitting of piping elements - Publication


<1
www.docs.lib.purdue.edu

38 docplayer.net Internet Data


<1

39 qdoc.tips Internet Data


<1

40 ve.org.ua Internet Data


<1

41 blog.ipleaders.in Internet Data


<1

42 bmcmusculoskeletdisord.biomedcentral.com Publication
<1

43 www.ijcsejournal.org Publication
<1

44 www.readbag.com Internet Data


<1

45 moam.info Internet Data


<1

46 seas.umich.edu Publication
<1

47 www.aicpa.org Publication
<1

48 moam.info Internet Data


<1

49 moam.info Internet Data


<1
50 www.lifescienceglobal.com Publication
<1

51 Engineering design and intellectual property where do they meet by Publication


<1
Edwi-2013

52 moam.info Internet Data


<1

53 open.library.ubc.ca Internet Data


<1

54 Proceedings of the Association by Irving-1862 Publication


<1

55 www.arxiv.org Publication
<1

56 www.atlantis-press.com Publication
<1

57 www.freepatentsonline.com Internet Data


<1

58 www.intechopen.com Internet Data


<1

59 dochero.tips Internet Data


<1

60 dspace.nwu.ac.za Publication
<1

61 When Lawyers and Law Firms Invest in TheirCorporate Clients' Stock Publication
<1
Washington Un - www.network.bepress.com

62 yourmoneywise.in Internet Data


<1

63 abnews-wire.blogspot.com Internet Data


<1

64 academic.oup.com Publication
<1

65 asianewsday.com Internet Data


<1

66 documentop.com Internet Data


<1

67 Latin American Cities and Globalisation Change and Permanency in the Publication
<1
by Cordob-2010
68 moam.info Internet Data
<1

69 summit-emea.adobe.com Internet Data


<1

70 www.glunis.com Internet Data


<1

71 www.readbag.com Internet Data


<1

72 bcmj.org Internet Data


<1

73 byjus.com Internet Data


<1

74 doc.comsol.com Publication
<1

75 documents.mx Internet Data


<1

76 dodcio.defense.gov Publication
<1

77 link.springer.com Internet Data


<1

78 mdpi.com Internet Data


<1

79 redcol.minciencias.gov.co Publication
<1

80 religiondocbox.com Internet Data


<1

81 scholar.sun.ac.za Publication
<1

82 A Journal of Integrative Science for Resilience & Sustainability - Publication


<1
www.ecologyandsociety.org

83 docplayer.net Internet Data


<1

84 Hbners tarsomarginal grafts in eyelid reconstruction 94 cases by Vimont- Publication


<1
2018

85 IEEE 2011 7th International Conference on Wireless Communications, , Publication


<1
by Wang, Honghui Tuo,- 2011
86 is.ifmo.ru Internet Data
<1

87 proery.com Internet Data


<1

88 repository.library.du.ac.bd 8080 Internet Data


<1

89 www.computerworld.com Internet Data


<1

90 www.scribd.com Internet Data


<1

91 1library.co Internet Data


<1

92 data.unicef.org Publication
<1

93 dochero.tips Internet Data


<1

94 How to think about security by Whittaker-2006 Publication


<1

95 index-of.es Publication
<1

96 Layer Resolved Magnetization Correlations in Multilayers by Publication


<1
Kentzinger-2005

97 moam.info Internet Data


<1

98 www.diva-portal.org Publication
<1

99 acc.com Internet Data


<1

100 Communications in Computer and Information Science E-Democracy Publication


<1
Ci, by Katsikas, Sokratis - 2015

101 Prior-based Hierarchical Segmentation Highlighting Structures of Interest Publication


<1
by Fehri-2019

102 repository.up.ac.za Publication


<1

103 The development of OCPL, object conceptual prototyping language by Publication


<1
A-2000
104 www.ecb.europa.eu Publication
<1

105 aushealthit.blogspot.com Internet Data


<1

106 documentop.com Internet Data


<1

107 eprints.lmu.edu.ng Internet Data


<1

108 it.emory.edu Internet Data


<1

109 Making a difference The role of Statutory Committees in the Northern Publication
<1
Ireland As by Rober-2002

110 MRI features predict microvascular invasion in intrahepatic Publication


<1
cholangiocarcinoma by Ma-2020

111 myupmc.upmc.com Internet Data


<1

112 pubs.asahq.org Internet Data


<1

113 qdoc.tips Internet Data


<1

114 study.com Internet Data


<1

115 Thesis submitted to dspace.mit.edu Publication


<1

116 www.freepatentsonline.com Internet Data


<1

117 www.neurotransmitter.net Internet Data


<1

118 IEEE 2017 International Conference on Learning and Teaching in Publication


<1
Comp, by Riese, Emma- 2017

119 1library.co Internet Data


<1

120 adventistdigitallibrary.org Internet Data


<1

121 aede.osu.edu Internet Data


<1
122 americaachievesednetworks.org Internet Data
<1

123 apcz.umk.pl Publication


<1

124 arxiv.org Internet Data


<1

125 arxiv.org Publication


<1

126 aushealthit.blogspot.com Internet Data


<1

127 coek.info Internet Data


<1

128 ecommons.aku.edu Internet Data


<1

129 mdpi.com Internet Data


<1

130 moam.info Internet Data


<1

131 moam.info Internet Data


<1

132 pt.slideshare.net Internet Data


<1

133 publications.iowa.gov Publication


<1

134 pure.mpg.de Publication


<1

135 scholar.ufs.ac.za Internet Data


<1

136 sencanada.ca Publication


<1

137 sh.rice.edu Internet Data


<1

138 symposion.acadiasi.ro Publication


<1

139 The Magic Square of Three in Old Chinese Philosophy and Religion by Publication
<1
Cammann-1961

140 The manufacturing sector Still an anchor for pattern bargaining within Publication
<1
and acro by Mller-2018
141 Why do poor countries suffer costly conflict Unpacking per capita inc by Publication
<1
Jakobsen-2013

142 Workgroups eAssessment Planning, Implementing and Analysing Publication


<1
Frameworks by Rosalin-2021

143 www.files.ethz.ch Publication


<1

144 www.guitricks.com Internet Data


<1

145 www.mdpi.com Publication


<1

146 www.oapen.org Publication


<1

EXCLUDED PHRASES

1 bangalore institute of technology


ABSTRACT

78
The technology known as blockchain was initially used to construct the public transaction record
6
for cryptocurrencies when the system was first put into use. The blockchain technology, on the

other hand, has recently being investigated for a wide variety of applications that go beyond the

realm of cryptocurrencies. This is due to the fact that the technology possesses distinctive

characteristics, such as decentralisation, security, transparency, and resistance to tampering, all of

which contribute to the growing popularity of the technology. This is due to the fact that the

blockchain technology possesses a number of qualities that are entirely unique. These traits are

highly helpful for a number of challenges that are widespread in today's financial industry. As a

consequence of this, the blockchain technology has the ability to bring about a revolution in the

financial sector by causing several financial organisations to adjust their operational procedures.
56
As a result of this, the blockchain technology has the capability to bring about a profound change

in the banking and finance industries. In this article, we will present a high-level overview of five

uses of blockchain technology in the financial industry that are anticipated to undergo substantial

transformations in the not-too-distant future. Example applications include:. In addition, we will

localise the data in order to make it suitable for storage in blockchain wallets. In contrast to

traditional smart contracts, NFT smart contracts will be used to construct the hash address, and the

information that is produced as a result will be communicated to an IPFS server that is housed in

the cloud.
1.INTRODUCTION

The development of game-changing cryptocurrencies such as Bitcoin and Ethereum prompted

worldwide interest in a technology known as blockchain. At the present, the only blockchain

applications that are currently capable of being deployed on a large scale are cryptocurrencies such
36
as bitcoin and ethereum. The attention of those working in the financial services industry has been

drawn to Bitcoin and Ethereum, which have also paved the way for the launch of alternative
77
cryptocurrencies such as LightCoin, PrimeCoin, NameCoin, and Zcash [1]. They have also been

instrumental in the development of a revolutionary approach of funding novel concepts and

startups through a procedure known as Initial Coin Offering (ICO). This method utilises
32
cryptocurrency. This method is utilised to provide financial support for creative endeavours and

ideas. Over the past few years, there has been a growth in interest in using blockchains for purposes

other than transactions involving cryptocurrencies, particularly those that seek to take advantage

of the decentralised, secure, transparent, and tamper-proof properties of distributed ledger

technologies (DLT). In particular, there has been a rise in interest in utilising blockchains for

purposes that attempt to take advantage of the benefits of using distributed ledger technologies

(DLT). The recording of voting results is one example of a use case that fits under this category.
107 6
There have been efforts made to develop blockchains for the purpose of maintaining vote data.

These efforts are currently ongoing. These capabilities can be leveraged in a broad variety of

contexts by applications that are created on top of permissioned blockchain infrastructures. These

frameworks do away with the requirement for arduous and sluggish Proof-of-Work (PoW)

methods while also enabling fine-grained authentication and authorisation. The latter is an

essential component as it is necessary to have in order to permit the processing of transactions at


a rate that is faster than what is supplied by conventional public blockchains like Bitcoin and

Ethereum. This is due to the fact that apps are required in order to conduct transactions in a timely

manner. As a direct result of this development, technologies such as R3/Corda and Hyperledger
13 133
Fabric have come into existence to govern permissioned blockchains. Due to the fact that these
119
systems are capable of processing hundreds of transactions per second (TPS), they are well suited

for use with blockchains that limit who can access the ledger. Research and development work is

being done on permissioned blockchains for usage in a wide variety of applications that do not

include bitcoin. For instance, healthcare, the generation of energy, and the management of supply
115
chains are all examples. Many other applications of this kind are currently being investigated by
128
various financial institutions as part of the wave of technological advancements that have been

brought about by FinTech. By adopting technologies that are based on blockchains, financial
7
institutions can sidestep a number of issues that have persisted for a significant amount of time

and are simple to identify. A significant challenge facing the banking industry is the widespread

ignorance concerning credit scoring. Because there is a shortage of data, it may be difficult for

individuals as well as small and medium-sized businesses (SMEs) to obtain loans from financial
53
institutions [2]. Because there is a lack of complete and accurate data, financial institutions are

having a difficult time developing trustworthy profiles of their customers. As a direct consequence

of this, they are unable to expand their product offers and make them more personalised for each
87
unique customer [3]. In a similar vein, the insurance policies that are sold by financial institutions

come with a convoluted claims structure that necessitates the participation of a multitude of parties
7
in order to resolve and pay out a claim. This is similar to the situation described above. The

comparison to the earlier point is one that is applicable here.

2.LITERATURE SURVEY
2.1 Blockchain application and outlook in the banking industry

https://jfin-swufe.springeropen.com/articles/10.1186/s40854-016-0034-9

Abstract: The financial industry is rich with opportunities for the first widespread application of

blockchain technology, which is rapidly becoming an integral component of the technical

environment. These opportunities exist at a time when the financial environment is ripe. The

banking industry in China is incurring losses as a direct result of the liberalisation of interest rates;

also, the reduction in the interest rate gap is contributing to the fall. The reduction in the interest

rate gap, on the other hand, is helping to facilitate the fall by providing further support. However,

it is also influenced by a wide variety of other things, such as the growth of the internet and the

changes that have occurred in the financial industry. Because of this, the financial services industry

absolutely needs to go through a period of transformation and actively seek out new chances for
143
expansion. As a consequence of this, blockchains have the potential to one day serve as the basis

for significantly upgraded and completely new payment clearing and credit information systems

in financial institutions. The underlying technology that underpins banking's payment clearing and
7
credit information systems may undergo a fundamental transformation as a result of the use of

blockchains. Because blockchain applications make "multi-center, weakly intermediated"

scenarios feasible, financial institutions will have the ability to improve their overall efficiency

and compete more effectively in the global marketplace. Despite the fact that blockchains are

intended to be permissionless and self-governing, there are still challenges to be solved, such as

the regulation that surrounds decentralised systems and the actual implementation of such systems.

These challenges must be surmounted. As a result, we argue for the urgent establishment of a

"regulatory sandbox" in addition to the development of industry-specific recommendations and

guidelines.
2.2 Blockchain Beyond Cryptocurrencies: FinTech and Strategy in the 21st Century

https://www.researchgate.net/publication/329484290_Blockchain_Beyond_Cryptocurrencies_Fi

nTech_and_Strategy_in_the_21st_Century

Abstract: There is significant anticipation that the implementation of blockchain technology could

result in dramatic changes being made by financial service providers. This chapter provides a

synopsis of the research that was conducted on the potential effects of using blockchain technology

in each of the following four areas of the financial industry: payments and remittances, credit and

lending, trade and settlement, and compliance. These are the four most essential components of

the financial business. In addition, the core components of blockchain are broken down and

described in this chapter. We are analysing the current voids in the research literature in order to

come up with ideas for prospective new lines of inquiry that could be pursued in the not too distant

future.

2.3 Toward a global norm against manipulating the integrity of financial data

https://www.semanticscholar.org/paper/Toward-a-global-norm-against-manipulating-the-of-

Maurer-Levite/24bba327193a96511d8748220afd9632daf77cc5

65
Abstract: The worldwide economic and financial crisis that started in 2007 brought to
45
light both the critical role that trust plays in the operation of the global system and the precarious
nature of trust in certain contexts. The cyber crisis that occurred at the Bangladesh central bank in

2016 brought to light a new risk to the stability of the financial system as well as the unprecedented

severity of the risk that adversarial cyber actors provide to financial institutions. These two threats
7
were brought to light as a result of the incident that occurred at Bangladesh's central bank. As

opposed to the various other types of financial coercion, the employment of cyber operations to

compromise data integrity poses a systemic threat that is particularly severe and problematic. Theft
51
is just one of the potential outcomes that can emerge from these risks. If the data that are stored by

financial institutions were tampered with, either intentionally or unintentionally, the stability of

both the financial system and the international system may be put in jeopardy. This is because the

global financial system is not only highly complex and interdependent, but also defies
61
categorization according to location or political affiliation. The fact that it is not restricted by

geographical or national lines is another factor that contributes to the ease with which it can occur.
23
To reiterate, this risk does not depend on the overall health of the economy in the same way that

the worldwide financial crisis of 2007-2008 did, and it will only increase as more and more

governments make the goal of cashless economies an official goal of their policies. In addition,
36
the state of the economy's fundamentals will not be affected in any way by this risk. The

communiqué issued by the G20 finance ministers and central bank governors in March 2017, in

which they urged for increased resilience across the global financial system, is deserving of

commendation. The next step that the G20 may take is to accept a promise from their states not to

use offensive cybertools to access financial system data and to work together when attacks do

occur. This might be the next step that the G20 takes. This is the next step that makes sense to do

in the process. The process would continue on from there to arrive at this point.
2.4 Blockchain Technology for Financial Services Facilitation in RES Investments

140 65
Abstract: In the wake of the global financial crisis that started in 2007, the credibility of the
92
world's monetary and banking system has been called into question. The cyber crisis that occurred

in 2016 at the Bangladesh central bank brought to light a previously unknown threat to the stability
126
of the financial system, as well as the unprecedented extent of the threat that hostile cyber actors
7
pose to financial institutions. Both of these threats were brought to light as a result of the incident

involving the Bangladesh central bank. Traditional forms of financial coercion pose a distinct set

of risks to the system, but the risks posed by cyber operations that threaten data integrity are even
51 84
more serious. Theft is one of the potential outcomes that can arise as a result of these risks. The

integrity of the data that is maintained by financial institutions can be tampered with on purpose
6
or unintentionally, either of which can have repercussions that are detrimental to the stability of
23
the international economy. This is due to the complexity of the financial system, its connection

with other financial systems, and the fact that it functions across national lines. It is also plausible
13
due to the fact that it is not constrained by physical or governmental bounds. This risk, in contrast

to the worldwide financial crisis that occurred in 2007-2008, is not linked to the health of any one

sector of the economy, and it will only increase as an increasing number of governments prioritise

the transition to cashless economies. In addition, the severity of this risk is not contingent on the

prevailing economic conditions. It is worthy of commendation that the finance ministers and

governors of the central banks of the G20 countries called for stronger global financial institutions

in a communiqué that was issued in March of 2017. The next step that the G20 may take is to

adopt a commitment by their countries to refrain from using offensive cybertools to imperil the
41
integrity of data in the financial system and to collaborate with one another in the case of an attack.

This might be the next step that the G20 takes. This would be the next step that would be taken.

This would be the following step in the process after this one.

3.SYSTEM ANALYSIS

3.1 EXISTING SYSTEM:

30
All of the applications that are currently available are hosted on a single server. In the event that

the server were to become corrupted or crash as a result of an excessive amount of requests, users

would be unable to access the services.System Proposal 3.2:

The implementation of decentralised Blockchain technology as a solution to this issue is something

that we are capable of doing. Customers would still be able to receive service from the remaining

nodes even if a single node failed since the data would be stored on several nodes, which are

similar to servers in that they are used to store information.

3.3 SYSTEM REQUIREMENTS:

SOFTWARE REQUIREMENTS

• Documents such as the product's viewpoint view and characteristics, as well as the

operating system and operating surroundings, graphics requirements, design limits, and

user manuals are all included in the functional criteria or the overall description. In addition

to that, the comprehensive product description is given in these publications.


• The appropriation of needs and implementation limits provides a comprehensive picture of

the strengths and weaknesses of the project, in addition to providing information on how

to address these issues. You will be able to achieve this goal if you conduct an inventory

of your resources and figure out how to strengthen your areas of weakness. This overview

also includes a discussion on potential future remedies to these problems.

• Python idel 3.7 version (or)

• Anaconda 3.7 ( or)

• Jupiter (or)

• Google colab

HARDWARE REQUIREMENTS

• The bare minimum hardware that must be present on a user's computer in order for them to run

Enthought Python, Canopy, or Visual Studio Code varies greatly depending on the sort of product

that is being developed using any of these programmes. This is because each of these programmes

is designed to build a different kind of product. apps that must quickly carry out a large number of

calculations or operations will benefit from a processor with a higher clock speed, whereas apps
121
that must store a large number of objects or arrays in memory will benefit from having more RAM

available.

• Operating system : windows, linux

• Processor : minimum intel i3


• Ram : minimum 4 gb

• Hard disk : minimum 250gb

3.4 FUNCTIONAL REQUIREMENTS

1.Data Collection

2.Data Preprocessing

3.Training And Testing

4.Modiling

5.Predicting

3.5 NON FUNCTIONAL REQUIREMENTS

"A NON-FUNCTIONAL REQUIREMENT, which is also known as an NFR, is what specifies

the level of quality of a software system," The phrase "non-functional requirement" is what

we mean when we talk about "NFR." They test the programme to ensure that it satisfies non-
100
functional requirements that are crucial to the success of the product. These requirements

include things like the software's responsiveness, usability, security, portability, and so on.

Examples of nonfunctional requirements include inquiries like "How long does it take for the
60
website to load?" The failure of a system to fulfil the requirements of its users is frequently

the result of its creators neglecting criteria that are not related to functionality. When you use

non-functional requirements, you have the opportunity to impose restrictions on the


85
architecture of the system across all of the different agile backlogs. Even if there are more

than 10,000 people using the website at the same time, for instance, it should still load quickly

under three seconds. In addition to the product's requirements from a functional standpoint, it

is essential to characterise the product's requirements from a non-functional standpoint.

a "Requirement for effective management," "Recoverability condition," and "Security must


be maintained" criterion for usability, "Requirement for effective management,"

"Recoverability condition," and "Security must be maintained."

demand for data integrity capacity requirement for availability requirement for scalability

requirement for interoperability

 reliability maintenance regulation and  environmental requirements

3.6 SYSTEM STUDY

FEASIBILITY STUDY

2
At this stage, a business plan is developed in addition to a determination being made regarding

the practicability of the idea. The proposal consists of a high-level summary of the project as well

as cost estimates for completing the task. During the portion of the project that is devoted to system

analysis, the proposed system will be examined to see whether or not it is feasible. This is done to

ensure that the planned system will not place an undue burden on the company and that it will still
146
be able to function normally. In order to do a feasibility analysis, one must have a solid
2
understanding of the fundamental requirements of the system.

Three key considerations involved in the feasibility analysis are


 ECONOMICAL FEASIBILITY

 TECHNICAL FEASIBILITY

 SOCIAL FEASIBILITY

ECONOMICAL FEASIBILITY

141
This research is being done with the intention of determining whether or not the corporation has
43
the resources to deal with the potential effects that the system may have on the economy. The

company is only able to put a certain amount of money into the research and development of the

system before it starts to be useless. It is required to provide a reason or clarification regarding the
67
connected expenditures. The fact that the great majority of the underlying technologies are open
15
source contributes significantly to the system's practicability as well as its accessibility to a wide
104
range of price points. This is attainable because to the fact that many of the technologies that make
2
this possible are freely accessible. The only parts that needed to be purchased individually were

the ones that allowed for customization.

TECHNICAL FEASIBILITY

The objective of this study is to ascertain whether or not the system is technically viable,

which is defined here as having the capacity to satisfy the technical requirements. It is essential to
take precautions to ensure that the capabilities of our existing infrastructure will not be exceeded
136 15
by any new systems that are developed. Because of this, there will be a significant amount of

additional strain placed on the technical resources that are already available. As a direct

consequence of this fact, there will be exceptionally high standards set for the consumer. Because

the implementation of the planned system will call for either minor adjustments or no changes at

all, the prerequisites for this system need to be straightforward and simple to grasp.

SOCIAL FEASIBILITY

12
In this part of the investigation, we are going to investigate the degree to which the system has

lived up to the anticipations of its customers. This approach also includes instructing the user on

how to make the most effective use of the technology that is available to them. The user must never

feel intimidated or afraid of the system in order for it to function well. Instead, they should accept

the system as an unavoidable, albeit bothersome, aspect of their existence. The methods that are

utilised to instruct users on and acclimatise them to a particular system are the primary factors that
2
determine the level of acceptance the system receives from its users. We will be able to determine

whether or not the system is gaining popular acceptance by looking at the percentage of satisfied

users. In order for him to provide the constructive criticism that is always welcome from the

individual who will be using the system in the end, it is necessary that he builds his confidence

first. This is the case since he is the last user that the software was designed for.
4.SYSTEM DESIGN

5
4.1 SYSTEM ARCHITECTURE:

DATA FLOW DIAGRAM:

1.A graphical depiction of data that is also known as a bubble chart is called a DFD (Data Flow
9
Diagram). It is a straightforward graphical formalism that may be utilised to provide a description
5 91
of a system in terms of the information that is input into the system, the operations that are carried

out on that information, and the information that is output from the system. It is possible to describe

a system by thinking about the data that enters the system, the operations that are performed on
5
that data, and the data that exits the system using this technique.
The data flow diagram (abbreviated as DFD) and the data flow chart (abbreviated as DFCC) are

two of the most important modelling tools. In the process of modelling the many parts of the

system, it is utilised as an essential tool. The aforementioned set of components is comprised of

the system's process, the data that is used by the process, an external entity that interacts with the
12
system, and the information flows that occur within the system.

38
The flow of information across the system as well as the manner in which it is modified as a result

of the numerous operations that occur inside the system may be seen in a 3.DFD diagram. It is a

graphical representation of the movement of data from one location to another, as well as the
2
transformations that occur to the data as it travels. Flowcharts are applied quite commonly in the

field of computer programming.

4.DFD is sometimes referred to as a bubble chart depending on the context in which it is used.

Directed graphical diagrams, also known as DFDs, are able to produce an accurate depiction of

the system regardless of the level of abstraction being used. A DFD's granularity can be raised by
101
moving up through its levels, which are arranged in a hierarchy that takes into account the

information flow and functionality that are revealed at each level. The user is at liberty to divide
38
these layers in any manner that they deem appropriate.

User:

User

Unauthorized user
Check
Yes NO

View Products

View Service Providers

Add Money to Wallet

End process

Service Providers:

Service Provider

Yes NO Unauthorized
Check Service Provider

Add New Products

Add New Products

End process
4.2 UML DIAGRAMS

The "UML" in the abbreviation is an abbreviation that stands for the Unified Modelling Language.
5
Standardised and used extensively in the field of object-oriented software engineering, the Unified
103 35
Modelling Language, or UML for short, is a modelling language that can be used to a variety of

different scenarios. The phrase "unified modelling" is shortened to "unified modelling language,"

or UML for short. The Object Management Group (OMG), which is also the entity that was

responsible for developing the standard in the first place, is the organisation that is in charge of

maintaining the standard.


15
The Unified Modelling Language, also known as UML for short, is a programming language that
2
was developed with the intention of becoming a language that can be used to describe object-
12
oriented computer programmes in a manner that is universally applicable. Both the notation and

the Meta-model are considered to be the fundamental components of the current iteration of the

Unified Modelling Language (UML). A standard modelling language that goes by the name UML.

It is conceivable that in the not-too-distant future, the Unified Modelling Language (UML) will be

associated with a particular approach or procedure.In addition to the modelling of software

systems, the Unified Modelling Language (UML) can also be utilised as a standard language for
9
the modelling of business systems as well as the modelling of other kinds of systems. In addition,

it can be put to use in the planning and creation of software system objects, in addition to the task

of describing the aforementioned things.

The Unified Modelling Language, also known as UML, is a tried-and-true collection of

engineering best practises designed for the depiction of intricate systems. The Unified Modelling

Language (UML) is the product of all of these best practises.

The Unified Modelling Language, sometimes known as UML, is an instrument that is important

for the process of creating object-oriented software and, more generally, for the design of software.
2
The Unified Modelling Language (UML) is a method for describing the design of software projects

that places a significant emphasis on graphical notations.

OBJECTIVES The following is a list of the primary inspirations that led to the creation of the

UML:
The first step is to give users access to a fully operational, graphically expressive modelling
88
language that will enable them to construct models of significance and share those models with

others.

Second, make tools for specialisation and extendibility accessible in order to facilitate future

development of the notions that lie beneath the surface.

2
3. Maintain your autonomy with regard to the programming language and method of production

that you use.

4. Please provide a more in-depth and comprehensible analysis of the modelling language as well

as instructions on how to utilise it.

5. Take a leadership position in the effort to shape the future of the OO tools industry.

132
It would be helpful if you could provide some direction for more abstract aspects of software

development, such as the establishment of teams, frameworks, patterns, and components.

80
Seven, check to see that you are making use of the most efficient strategies.
9
USE CASE DIAGRAM A use case diagram is a type of behavioural diagram. The results of a use-
2
case analysis are what are used to inform the design of a use case diagram. This kind of diagram

is a part of the toolkit that is provided by the Unified Modelling Language (UML). Its goal is to
5
offer a graphical depiction of the capabilities of a system in terms of the actors involved, the results

those actors desire (which are represented by use cases), and the connections between those use
2
cases. This should be the primary focus of the project. The fundamental objective of a use case

diagram is to provide clarity regarding the roles that different stakeholders are expected to play in

the operation of different system functions. Because we now have access to this information, it is

easy to depict the many roles that different people perform within the system.The results of a use-

case study can then be included into the development of a use case diagram, which is a kind of

behavioural diagram. This kind of diagram is a part of the toolkit that is provided by the Unified
5
Modelling Language (UML). Its goal is to offer a graphical depiction of the capabilities of a system

in terms of the actors involved, the results those actors desire (which are represented by use cases),
2
and the connections between those use cases. This should be the primary focus of the project. The

fundamental objective of a use case diagram is to provide clarity regarding the roles that different

stakeholders are expected to play in the operation of different system functions. Because we now

have access to this information, it is easy to depict the many roles that different people perform

within the system.


Class diagram:

17
The use case diagram can be improved with the assistance of the class diagram, which also

contributes to the construction of a system design that is more accurate. The defined actors from

the use case diagram are organised into a collection of classes in the class diagram. These classes

are connected to one another via the relationships that are depicted in the diagram. The nature of

the link or association between the classes is characterised by the "is-a" or "has-a" relationship that

exists between the classes, respectively. The class diagram illustrates how different kinds of

objects might grant access to associated features in a system. These capabilities are designated by

the labels. The many pieces of functionality that are made available are referred to collectively as
the "methods" of the class. In addition, each class may be equipped with a collection of "attributes"

that serve to differentiate it from the other classes when applied in a variety of contexts.

Object diagram:

A distinction can be made between the class diagram and the object diagram if one so

chooses. When referring to a particular instance of a class, the word "object" is the term that is

used. As a consequence of this, it is possible to assert that an object is a representation of the

current state of a class at the point in time when it is being utilised by the audience for whom it

was designed. The object diagram provides documentation of the various classes that are utilised
by the system, including their current states and any linkages that exist between them.

State diagram:

A state diagram is a graphical representation of the transitions that objects in a system go through

as they get older. State diagrams are commonly used in computer science. A state diagram is a

graphical representation of the numerous states that may be present. Because of the events that

occur within the system, the statuses of the system's objects might change at some point. It is

possible to demonstrate, with the help of a state diagram, how the occurrence of particular events

has an effect on the state of an item, causing the object to transition from one state to another. A

state diagram can also be used to illustrate the progression from the beginning state of an object to

the state it will occupy after it is completely finished.


Activity diagram:
The workflow of the complete system is depicted in its entirety by the activity diagram, beginning

with the very first step and ending with the very last. In the same way as there are activities, actions,

transitions, beginning and final states, and guard conditions in an activity diagram, there are also

these elements present in a state diagram.


Sequence diagram:
28
A sequence diagram is a graphical representation of the ways in which the components of the

system interact with one another and communicate with one another. One of the most helpful

qualities of a sequence diagram is its capability of displaying the steps of a process in the order in

which they occur. As a consequence of this, we are able to reach the conclusion that the

representation that is divided up into steps accurately captures the specific order in which the
33
components interact with one another. The "messages" that are passed along from one object in

the sequence diagram to the next make it possible for the various components to communicate

with one another and share information.


Collaboration diagram:

Diagrams of collaboration are used to classify the myriad of interdependencies that exist

between the many sections of a system. Because each interaction is detailed in its own numbered

listing, it is much simpler to follow the chain of causality from one encounter to the next. It is
97
helpful to figure out how everything in the system might interact with one another by using the

collaboration diagram.

Component diagram:

Component diagrams are visual illustrations that show the logical relationships among the

numerous subsystems that comprise a bigger whole. These linkages are used to understand how

the complete system works. At a high level, this schematic illustrates not just the separate

components of the system but also the linkages between those components. The manner in which
37
each of the components interacts with the others can also be deduced from the diagram. A

component diagram is used to identify and depict components that have been determined to be
operationally necessary for the system after it has been developed or constructed.

Deployment diagram:

The deployment diagram contains documentation including information regarding the proper

configuration of the application's runtime components. When a system has been constructed and

is getting close to being ready for implementation, this diagram becomes extremely important.

4.3 IMPLEMENTATION:
112
In light of the fact that all currently available monetary applications are dependent on a single

centralised server, we have made the decision to incorporate Blockchain technology into a
20
monetary application as part of this project. Users wouldn't be able to access the services if the

server were to become compromised or break down owing to an overwhelming number of

requests. Because of this, we have made the decision to implement Blockchain technology into a
financial service. The implementation of decentralised Blockchain technology as a solution to this

issue is something that we are capable of doing. Customers would still be able to receive service

from the remaining nodes even if a single node failed since the data would be stored on several

nodes, which are similar to servers in that they are used to store information.

When Blockchain wants to add a new block to the blockchain, it first compares the hash of that

block to the hash codes of all of the blocks that came before it. If a new block is added to the

Blockchain before the verification method is completely completed, the block in question won't

be stored. In the event that none of the previously recorded blocks were subjected to any kind of

assault or modification, Blockchain will continue to produce the same hash code, which will serve

as proof that the verification was successful. A one-of-a-kind hash code is generated for each block

of transactions on the blockchain. This hash code acts as a digital fingerprint for the data that is

contained inside those blocks. If the validation cannot be completed successfully, Blockchain will

refrain from adding any new records. This demonstrates that Blockchain cannot be altered and that

it is resistant to any attacks or changes that may be made to its data behind the scenes. In the event

that the value has been modified in any way, the validation will be regarded as having failed.

Because of the many advantages offered by Blockchain technology, businesses of all sizes are

making the transition away from programmes that run on centralised servers and towards

distributed Blockchain applications.

In order to fulfil the requirements of this project, we are going to develop two unique groups of

end users, who are going to be service providers and clients or consumers.
1) Companies That Provide Services: After registering for an account and logging into the
42
application, service providers are able to make changes to their product catalogue and view the

items that customers have purchased.

To be able to make a purchase, the user must first sign up for an account and log into the app. After

doing so, they will be able to browse information regarding all of the service providers who are

available, add money to their wallet, and look through product specifics. This is something that

can be done once the user has successfully logged in.

Data may be saved on a blockchain through the utilisation of smart contracts, and these contracts

may be built with the assistance of SOLIDITY programming. Any and every information that is

stored in a blockchain is referred to as blockchain data. On the Ethereum Blockchain, Truffle

enables the deployment of code that complies with the SOLIDITY standard. Python applications
39
are able to make use of the contract's address, which is returned by the deployed contract, in order

to access the contract and either write to or read from the Blockchain. The SOLIDITY code is

currently being displayed in the panel that may be seen further down below.
Previously, in the SOLIDITY code, we developed four functions to hold crucial data: users,

wallets, shopping carts, and products. The contract will be deployed if the 'runBlockchain.bat' file

that is located in the 'hello-eth/node_modules/.bin' folder is double-clicked. Simply clicking on

this link will cause the window that is located at the bottom of the page to slide open.
On the previous screen, Blockchain generated several private keys and default accounts. After

entering the 'truffle migrate' command on the same screen and pressing enter, the contract will be

deployed to Blockchain Ethereum. What you see here is an illustration of the final product.
Both the actual location of the contract as well as the screen display that states "Financial Contract"

in white font are available to us. You will need to type this address into a Python code, just like it

is demonstrated in the screenshot below, in order to gain access to the contract.

Learn how to invoke a Blockchain SMART CONTRACT using Python by going back over the

notes that are indicated in red farther up in this article. These jotted down notes can be seen at the

very top of the screen. We make use of an IPFS server to ensure that any images that you may

upload using the add product module are kept in a secure location. Due to the impossibility of

storing digital images on a blockchain, this is absolutely necessary.

SAMPLE CODE:

import json
from requests import Session

from requests.exceptions import ConnectionError, Timeout, TooManyRedirects

from datetime import datetime

countries = ['USD', 'INR']

for country in countries:

url = 'https://pro-api.coinmarketcap.com/v1/global-

metrics/quotes/latest?convert='+country

headers = {

'Accepts': 'application/json',

'X-CMC_PRO_API_KEY': 'API_KEY',

session = Session()

session.headers.update(headers)

try:

response = session.get(url)

results = response.json()

print("For "+country+":\n")

print(response)

print(json.dumps(results, sort_keys=True, indent=4))


active_currency = results["data"]["active_cryptocurrencies"]

active_markets = results["data"]["active_market_pairs"]

bitcoin_percentage = results["data"]["btc_dominance"]

last_updates = results["data"]["last_updated"]

global_cap = int(results["data"]["quote"][country]["total_market_cap"])

global_volume = int(results["data"]["quote"][country]["total_volume_24h"])

active_currency_str = '{:,}'.format(active_currency)

active_markets_str = '{:,}'.format(active_markets)

global_cap_str = '{:,}'.format(global_cap)

global_volume_str = '{:,}'.format(global_volume)

x = datetime.timestamp(datetime.strptime(last_updates, "%Y-%m-

%dT%H:%M:%S.%fZ"))

last_updates_date = datetime.fromtimestamp(x).strftime('%B %d,%Y at

%I:%M%p')

print("Active Currency :", active_currency)

print("Active Market :", active_markets)

print("Bitcoin Percentage :", str(bitcoin_percentage) + "%")

print("Last Updated :", last_updates)

print("Global Capital :", global_cap)

print("Global volume :", global_volume)


print("======================================")

print("There are currently " + active_currency_str + " active cryptocurrencies

and " + active_markets_str + ".")

print("The global cap of all crypto is " + global_cap_str + " and the 24th global

volume is :" + global_volume_str)

print("Bitcoin\'s total percentage of the global cap is " +

str(bitcoin_percentage) + "%\n")

print("The Information was last updated on :", last_updates_date)

print("======================================")

except (ConnectionError, Timeout, TooManyRedirects) as e:

print(e)

import json

from requests import Session

url = 'https://pro-api.coinmarketcap.com/v1/cryptocurrency/listings/latest'

headers = {

'Accepts': 'application/json',

'X-CMC_PRO_API_KEY': 'API_KEY',

}
session = Session()

session.headers.update(headers)

response = session.get(url)

results = response.json()

print(json.dumps(results, sort_keys=True, indent=4))

data = results["data"]

for currency in data:

rank = currency["id"]

name = currency["name"]

symbol = currency["symbol"]

print(str(rank)+" : "+name+" ("+symbol+")")

import

json

from requests import Session

def getResult(link):

headers = {
'Accepts': 'application/json',

'X-CMC_PRO_API_KEY': 'API_KEY',

session = Session()

session.headers.update(headers)

response = session.get(link)

results = response.json()

return results

url = "https://pro-api.coinmarketcap.com/v1/cryptocurrency/listings/latest"

result = getResult(url)

print(json.dumps(result, sort_keys=True, indent=4))

data = result['data']

ticker_url_pairs = {}

for currency in data:

symbol = currency['symbol']
url = currency['id']

ticker_url_pairs[symbol] = url

print(ticker_url_pairs)

choice = input("Enter the ticker symbol of a cryptocurrency:")

choice = choice.upper()

ticker_url = 'https://pro-api.coinmarketcap.com/v1/cryptocurrency/quotes/latest?id='

+ str(ticker_url_pairs[choice])

result_ticker = getResult(ticker_url)

print(json.dumps(result_ticker, sort_keys=True, indent=4))

currency = result_ticker['data'][str(ticker_url_pairs[choice])]

rank = currency["cmc_rank"]

name = currency["name"]

symbol = currency["symbol"]

circulating_supply = int(currency["circulating_supply"])

total_supply = int(currency["total_supply"])

quotes = currency["quote"]["USD"]

market_cap = quotes["market_cap"]

hour_change = quotes["percent_change_1h"]
day_change = quotes["percent_change_24h"]

week_change = quotes["percent_change_7d"]

price = quotes["price"]

volume = quotes["volume_24h"]

volume_string = "{:,}".format(volume)

market_cap_string = "{:,}".format(market_cap)

circulating_supply_string = "{:,}".format(circulating_supply)

total_supply_string = "{:,}".format(total_supply)

print(str(rank) + " : " + name + "( " + symbol + " ) ")

print('Market Cap : $' + market_cap_string)

print('Price : $' + str(price))

print('24h Volume : $' + volume_string)

print('Hour Change : ' + str(hour_change) + '%')

print('Day Change : ' + str(day_change) + '%')

print('Week Change : ' + str(week_change) + '%')

print("Total Supply : " + total_supply_string)

print("Circulating Supply : " + total_supply_string)

print("Percentage of coins in circulation : " + str(round(circulating_supply /

total_supply)*100) + "%")
print()

5.SOFTWARE ENVIRONMENT

What is Python :-
117
A few tidbits of knowledge on the Python programming language are provided here.

25
Python is now the most popular high-level general-purpose programming language, surpassing

Java as the leader in this category. The Python programming language was formerly known

by its current name, the Python language.

50
Python is a versatile option for programmers since it can be used in either an object-oriented

or a procedural environment. This makes Python an attractive choice for programmers. A


script created in Python typically has a duration that is significantly less on average than one

written in another language, such as Java.

The limitations that the language places on indentation help to ensure that the work produced

by programmers is always legible, as does the relatively low amount of typing that is

necessary.

4
Python is a programming language that is used by a large number of well-known companies,

like Google, Amazon, Facebook, Instagram, Dropbox, and Uber, to name just a few of them

among a long list of others.

One of Python's greatest advantages is its extensive standard library, which may be put to work

in a variety of contexts, including the ones listed here:

• The field of machine learning

• Graphical User Interface Applications (such as Kivy, Tkinter, and PyQt, etc.)

• Web frameworks like as Django, which are used by websites such as YouTube, Instagram,

and Dropbox

• Computer vision techniques such as OpenCV and Pillow

• Scraping the website using software such as Scrapy, BeautifulSoup, or Selenium

• Test guises and frameworks

• Multimedia
Python's many benefits are as follows:

Let's look at the advantages that Python has over other languages.

1. Collections That Cover Everything

Python comes with an extensive library that already includes the source code for a variety of

pre-built programmes and features. This reduces the need to create all of the code by hand,

which would typically be required. Some examples of this include regular expressions,

automated documentation and testing, threading, databases, CGI, email, image processing, and

so on.

2 - Modular and capable of expansion

As was said earlier, the Python programming language can be modified to be compatible with
83
a broad variety of other computer languages. If you like, you can write some of your code in

other languages, such as C++ or C. You have that option. This can take place at any point

during the course of the development process. This is very necessary in order to accomplish

what needs to be done.

3.Embedding

Python is a computer language that may be extended in a variety of ways and can also be
57
included inside of other programmes. Python is a general-purpose programming language that

can easily be integrated with the source code of other programming languages. It is possible
4
to do so since Python is a programming language that is both open source and freely available.

Because of this, we won't have to rewrite the code for the other language in order to add

scripting capabilities to it.


50
4. Enhanced Capabilities That Will Ultimately Result in Increased Productivity

64
The users of this language are more productive than those who use other languages such as
95
Java and C++ since it is simpler to learn and has a more comprehensive library than those

other languages. It is recommended that you cut back on the amount of writing you do and

work on improving your capacity to juggle multiple tasks at once.

5. Prospects for Internet of Things

22 16
There is grounds for optimism regarding the future of the Internet of Things due to the fact
22
that Python is serving as the basis for the development of a great many new platforms, such as

Raspberry Pi. Using this method, it is possible to relate the language to the community on a

worldwide scale.

6. Direct and simple, making it easy to understand

It's possible that Java programmers will need to make a class before they can just show "Hello

World." The Java documentation might provide further information on this topic. On the other
4
hand, all you require is a print statement if you're working in Python. Additionally, it is

relatively simple to learn, comprehend, and apply in one's own software development projects.

Because of this, it is challenging for Python programmers to switch to languages such as Java,

which encourage a more verbose style of writing.

7, Very Simple to Read

16
Reading Python is very similar to reading English due to the fact that it is not a very verbose
64 21
language. Reading Python is not significantly different from reading English. This is due to

the fact that English served as the primary inspiration for the creation of the computer language
known as Python. This indicates that the language can be learned, comprehended, and utilised
120
as a tool for programming with a low investment of time and effort on the part of the learner.
4
Additionally, there is a requirement for indentation; but, if you so choose, you may use curly

brackets to signify blocks. Both of these prerequisites have to be met simultaneously. As a

direct result of these modifications, the source code can now be viewed with far less effort.

8, Object-Oriented

When working with this language, you are able to choose either the procedural or the object-

oriented approach to the programming you do. While functions make it simpler to recycle

code, objects and classes provide us greater leeway to adapt to unanticipated circumstances.

Classes make it feasible to combine data and functionality into a single entity, which was

previously impossible.

9. free from any restrictions whatsoever The availability of the program's blueprints

144
Python, as was just described, is a programming language that is both open-source and free to
74
use. Python, on the other hand, does not only have a no-cost download option, but it is also an
18 142
open-source programming language, which means that everyone can gain access to the
68
language's core and modify it. This is because Python is open-source software, which means
4
that anyone can download it and alter it for their own needs. The reason for this is owing to

the popularity of Python. It comes pre-packaged with a comprehensive collection of libraries

that you may utilise to develop the projects you want to create.

10.Platform independent
79
If you write the code for your project in a language such as C++, it is highly likely that you

will need to make some modifications in order to get it to work on a different platform. This
4
is owing to the fact that there is not a single method that can be applied across all platforms to

support all programming languages. Python, on the other hand, is not even somewhat

comparable to that. at this configuration, the code only needs to be written once, and after that,

the user can choose to execute it at whichever location best suits their needs. This method is

referred to as "Write Once, Run Anywhere," which is also an acronym that properly

encapsulates the approach. Nevertheless, during the design phase of the system, a great deal

of caution is required to guarantee that no characteristics are dependent on the system.

11. Contextualised

In conclusion, we will offer the opinion that the contentious term is one that can be construed
16
in a variety of different ways. It is much easier to debug a programme written in an interpreted

language than one written in a compiled language due to the fact that each instruction in an

interpreted language is run individually.

Do you still have inquiries or concerns regarding the numerous advantages provided by

Python? Include your ideas in the space reserved for user comments.

Python's Benefits in Comparison to Those of Other Languages

1. Fewer lines of code to read and comprehend.


Because of Python's efficiency, practically any task can be completed with a smaller number
4
of lines of code when compared to other languages. This is especially the case when compared

to other languages utilised by the programming community. Because the Python standard

library has such strong backend support, you won't need to hunt for any additional third-party
62
libraries in order to get your work done with Python. As a consequence of this, numerous

seasoned specialists recommend that Python be studied by individuals who are new to the

business.

Tolerable in Terms of Cost

55
Because Python is available as open source software and has a low barrier to entry, companies
66
of any size can take advantage of the language and the tools that go along with it. The Python

community is more willing to provide a helping hand to you as a result of Python's great

popularity and widespread acceptance.

25
The results of Github's annual survey showed that Python was the most popular programming

language in 2019, claiming the top spot from Java for the very first time.

Third, there is no prerequisite for using Python because it is so easy to pick up.

Any platform, including macOS, Linux, and Windows, is capable of executing Python code.
18
If you are skilled enough in Python, you will be able to earn a career in a broad number of

industries, such as the development of online applications, data analysis, machine learning,

automation, web scraping, game development, and visualisation. If you are a programmer and

want to work in a variety of fields, it is necessary for you to be fluent in more than one
59
programming language; however, if you know Python, you can accomplish everything. It is a

versatile programming language that is capable of accomplishing virtually anything.

Python's Drawbacks and Limitations

Up to this point, we have explored the several advantages that utilising Python for your project

may provide you. If you do choose to go that route, though, it is imperative that you
99
comprehend the repercussions of your decision in its entirety. Let's have a look at some of the

issues that can arise when using Python rather than one of the other languages available.

1. Those Velocities That May Reach the Capability of the Vehicle

55
The fact that Python's code is interpreted line by line has been convincingly established for
18
our purposes. Because Python is an interpreted language, the time it takes to run a programme

in Python is almost always significantly longer than expected. This, however, is not a cause

for concern unless hastening the process is a main goal that must be accomplished. In that
98
context, it has the potential to create certain problems. In other words, unless the necessity for
4 72
high speed is an absolute must, the benefits of Python are sufficient to distract us from the fact
21
that it is not particularly fast. This is the case unless the need for high speed is an absolute

must. Unless the demand for rapid speed is of the utmost significance, this is true.

2. The performance on mobile computing devices and browsers is inadequate.

Python is a good server language; nonetheless, it is often utilised on the server side as opposed

to the client side because of its usefulness on the server. Because learning Python requires less

effort than learning other languages. In addition to this, it is rarely used to develop applications
that can be executed on mobile devices like as smartphones and other handheld gadgets. A

helpful illustration of this type of application is the carbonnelle, which is shown here.

4 72
Brython is a programming language that has been available for some time, but due to worries

regarding its security, it has not received widespread adoption.

123
3. Restrictions in place as a result of the Design

48
There is a good chance that you are already aware that Python uses dynamic typing. The

procedure of building the code will continue without your needing to worry about the kind of

variable that is being defined because it will be handled automatically. This objective can be

accomplished through the usage of duck-typing. I hope you won't mind my asking, but could

you please expound on that? The conclusion that can be drawn from this is that there is a good

chance that anything that resembles a duck is, in fact, a duck. Even if this makes the day-to-
96
day work of the developers easier, it could result in unforeseen complications once the

programme is placed into production.

4. Database Access Layers That Have Not Yet Finished Their Development and Are Still in

the Process of Being Constructed

The database access layers that are provided by Python are not quite as well-established as

those that are provided by other technologies, such as JDBC (Java DataBase Connectivity)

and ODBC (Open DataBase Connectivity), which are utilised on a more regular basis. As a

direct consequence of this, the majority of the world's most successful businesses today only

utilise it to a very small percentage of its entire potential.

5. Simple
86
We're not joking, honest. Although the Python programming language is well-known for

having an approachable user interface, this trait of Python's occasionally presents challenges.

An illustration of what I'm talking about is shown here. I don't use Java since the user interface

in Python is more appealing to me. The syntax is so easy to understand that the normal

verbosity that is found in Java code seems superfluous to me, despite the popularity of the

programming language.

This article's purpose was to discuss both the positive and negative aspects of working with

the Python programming language.

The Beginnings of Python: -

What are some of the ways that the letters of the alphabet and the Python language have

similarities? It should be quite clear that when we discuss ABC in the context of Python, we

are referring to the ABC programming language. You are correct; the first letters of both of

those words are "ABC." This should not come as a surprise. The CWI (Centrum Wiskunde &

Informatica), which has its headquarters in Amsterdam, the Netherlands, is credited with the

development of the initial version of the ABC programming language and environment. ABC
1
is both a programming language and an environment that allows for its use, and it can be put
81
to use for a wide variety of projects. The greatest feat that ABC has achieved is that it was able
118
to have an effect on the creation of the programming language Python, which was developed
54
in the 1980s, closer to the end of the decade. At the Computer Working Institute (CWI) around

that time period, Guido van Rossum worked on a distributed operating system that was called

Amoeba. This creature, which was known by the code name "Amoeba," was well known.
During an interview with Bill Venners1, Guido van Rossum discussed his role as a
52
"implementer" during the development of the programming language ABC at Centrum voor
46
Wiskunde en Informatica (CWI) in the early 1980s. This role allowed him to contribute to the

development of the language. I have some reservations regarding the degree to which one is

able to appreciate the significance of ABC's role in the evolution of Python. I try to give credit

where credit is due, and that includes acknowledging ABC's contribution. Since I owe a lot to
26
what I learned on that project and the people who were a part of it, I try to give credit where

credit is due, and that includes acknowledging ABC's contribution. Later on in the same

interview, Guido van Rossum elaborated on his earlier remarks, adding, "I remembered all of

my experience, as well as some of my frustration with ABC." After that, I started typing pretty

much right away. To achieve this goal, I developed a rudimentary virtual machine, parser, and

runtime from the ground up. I re-created, in my own special way, the various features of the

ABC that had caught my curiosity in the first place. In order to group statements, rather than

making use of curly brackets or beginning and ending blocks, I chose for the use of indentation

and built a tiny collection of different forms of solid data. Examples of these data types include
11
a hash table, which is also referred to as a dictionary, as well as a list, strings, and numbers.

"

The Following Are the Steps in Developing Python:

In February of 1991, Guido Van Rossum posted the first version of the Python source code on

the newsgroup alt.sources. This version was 0.9.0. Core data types including list, dict, str, and

others with similar characteristics were provided in this release along with exception handling,

functions, and other features. It also had a modular architectural framework and an object-
oriented architecture.In January of 1994, the public was given access to the first version of

Python. Functional programming tools like lambda, map, filter, and reduce are the most

notable additions to this release. These are some of the newest tools available. Guido Van
70
Rossum never felt drawn to perform these tasks.Six and a half years and a half years after its

first release, Python 2.0 was made accessible to the public in October of 2000. It had a

comprehensive garbage collector, support for Unicode, and list comprehensions. Furthermore,

it worked fine with Unicode.After eight more years of success in version 2.x, Python's next

major release, Python 3.0 (also known as "Python 3000" and "Py3K"), was made available to

the public. Some people even refer to Python 3.0 as "Python 3000." There is zero backwards

compatibility between Python 2 and Python 3. This is an unwavering guideline. Python 3's

primary focus was on decreasing redundant programming approaches and modules, which
90
directly led to the satisfaction or near-satisfaction of the 13th law of the Zen of Python. This

was because this was a primary design goal for Python 3. Here, we learn that "There should

be one -- and preferably only one -- obvious way to do it."Python 7.3 introduces the following

improvements:

Printing currently falls under the category of functions that can be performed.

In instead of using lists, we will be utilising iterators and views for this particular project.

138
Because it is impossible to sort a list whose members are not all similar to one another, lists

cannot contain items that are heterogeneous. The criteria that were used to build the hierarchy

of comparisons have been reduced.

There is just one data type for integers left, and its name is int. The term "int" refers to both

long and small integers.


125
Due to the fact that floats are not integers, the product of an operation in which two integers

are multiplied together is a floating-point number. Bringing back the "old" behaviour in one's

code can be accomplished by using the "//" notation.

Text against data is a contrast to the battle between Unicode and 8-bit.

Purpose:-

124
In spite of the low quality of the photographs we were utilising, we were able to demonstrate
110
that our method can correctly segment intra-retinal layers in images of poor quality, including
40
those with speckle noise, low contrast, and variable intensities. We did this by utilising the

ANIS function.

Python

Python is a high-level, interpreted programming language that is used to create a wide variety

of applications. It was developed by Guido van Rossum, who made it available to the general
11
public for the first time in 1991. As part of its design philosophy, Python prioritises the

readability of its code by including features such as extensive usage of whitespace.

49 1
It is suitable for a wide range of programming styles, such as object-oriented, imperative,

functional, and procedural, and it provides access to a comprehensive standard library.

Additionally, it can be used with a wide variety of languages. Python's dynamic type system

and built-in memory management are two of the language's most distinctive features.

The Python Interpreter is responsible for processing Python when it is started, and it will
75
continue to do so while Python is running. This means that you may immediately begin
executing your programme without having to worry about constructing it first. This operates

in a manner that is analogous to that of PERL and PHP.

19 31
The reason for this is because "Python is Interactive," which can be translated as "Python is

Interactive." As the name suggests, "Python is Interactive" means that you may type
1
commands straight into the interpreter when you are at the Python prompt to write your

programmes.

Python programmers are aware of how important it is to keep the rate of development at a

consistent high level. Having access to powerful structures that prevent the repetitive

duplication of code is an important part of this, as is having code that is both brief and easy to

understand. This metric is also linked to maintainability; while it may be largely meaningless,

it does provide some insight into the amount of code you need to read, analyse, and/or interpret

in order to make changes.

Modules That Were Utilised in the Project:

Tensorflow

TensorFlow is a library of code that can be used by anyone at no cost. Due to its flexibility, it

can be used for dataflow and differentiable programming in a wide range of contexts. This

library of code is put to use in both the research and production departments of Google. The
46
Google Brain team was responsible for developing TensorFlow.

Numpy
14
Numpy is a library that may be utilised to do generalised array processing. One of its features

is a high-performance multidimensional array object, which can be utilised in conjunction with

the library's support for arrays of arbitrary dimensions.

130
In order to use Python for scientific computing, you will need to install this add-on first. It
1
possesses a wide variety of qualities, some of the most basic of which are as follows:

• A dependable N-dimensional array object • Complicated processes (in the field of

broadcasting) Instruments for Combining C/C++ and Fortran Programmes The capacity to

produce random numbers, carry out the Fourier transform, and carry out linear algebra are all

made simpler with the assistance of these characteristics.

Numpy is a free and open-source programming language that can be utilised for a variety of

purposes outside the realm of academic research. For example, it can serve as an efficient

multi-dimensional container for the storage of a wide variety of data types. Additionally,

Numpy's ability to accommodate any data type makes it simple to interact with a wide range

of database types.

Pandas

The majority of the work that was done to prepare and manipulate the data was done in Python.

Its impact on the overall data analysis was so small that it could be considered negligible. As

it turned out, pandas were the solution to this problem. Pandas enables us to handle and analyse

data from a wide variety of sources. Python is an open-source programming language that is

free to use and has a strong community backing.

Matplotlib
Matplotlib is a toolkit for two-dimensional charting in Python. It is cross-platform, flexible,

and able to produce publication-quality figures in a variety of print and interactive formats.
31 14
Matplotlib can be used in a wide range of settings, from standalone Python scripts to IPython

shells, Jupyter Notebooks, web application servers, and four different graphical user interface

toolkits.

49 1
Power users have total control over line styles, font attributes, axis settings, and other such
82
aspects of the software through either an object-oriented interface or a collection of methods

that are already well known to MATLAB users. Using the pyplot package in conjunction with

IPython is an excellent way to get a MATLAB-like interface.

Learn about Scikit here.

1
Scikit-learn is a collection of supervised and unsupervised learning algorithms that can be
14
accessed by Python developers using a consistent application programming interface (API). It
1
is licenced under a simplified BSD licence that allows for both academic and commercial use.

The scikit-learn library contains many learning algorithms. It is offered under a variety of

Linux distributions.

Python

Python is a high-level, interpreted programming language that is used to create a wide variety

of applications. It was developed by Guido van Rossum, who made it available to the general
40 11
public for the first time in 1991. As part of its design philosophy, Python prioritises the

readability of its code by including features such as extensive usage of whitespace.


49 1
It is suitable for a wide range of programming styles, such as object-oriented, imperative,

functional, and procedural, and it provides access to a comprehensive standard library.

Additionally, it can be used with a wide variety of languages. Python's dynamic type system

and built-in memory management are two of the language's most distinctive features.

The Python Interpreter is responsible for processing Python when it is started, and it will
75
continue to do so while Python is running. This means that you may immediately begin

executing your programme without having to worry about constructing it first. This operates

in a manner that is analogous to that of PERL and PHP.

19 31
The reason for this is because "Python is Interactive," which can be translated as "Python is

Interactive." As the name suggests, "Python is Interactive" means that you may type
1
commands straight into the interpreter when you are at the Python prompt to write your

programmes.

Python programmers are aware of how important it is to keep the rate of development at a

consistent high level. Having access to powerful structures that prevent the repetitive

duplication of code is an important part of this, as is having code that is both brief and easy to

understand. This metric is also linked to maintainability; while it may be largely meaningless,

it does provide some insight into the amount of code you need to read, analyse, and/or interpret

in order to make changes.

How to Install Python in a Sequenced Manner on Windows and Mac:

Python is a very adaptable programming language; however, it is not commonly found pre-

installed on computers or other devices. Despite the fact that it was only made available to the
40 19
public for the first time in 1991, Python has become one of the most popular high-level
programming languages out there. The artistic idea behind it prioritises the readability of the

code by liberally sprinkling in large amounts of whitespace. This is implemented significantly

all over the aesthetic of the language.

1
Python's object-oriented philosophy and language characteristics enable developers to produce
102 1
code that is not only readable but also makes sense in the context of the tasks they are doing.
145
Microsoft Windows does not include this particular software when it is initially installed.

1
Python Installation Instructions for Windows and Mac

Python is an open-source programming language that has undergone numerous revisions and
134
improvements since its inception. More specifically, how does one go about installing Python?
52 114
Since you are just beginning your journey with Python, this lesson will answer your question
54 1
and dispel any uncertainty that may have arisen as a result of your inexperience.

111
Please be aware that earlier versions of Windows, including Windows XP, are not compatible

with Python 3.7.4 at this time.

73
Read through the System Requirements to get started. This is the most important step that
131 1
needs to be taken before you can begin installing Python. The Python documentation page has
69
all of the information that you need to know about which version of Python you need to
44
download in order to run the programme on your computer. My computer runs Windows 7
64-bit. The procedures described here can be used with any version of Python. My computer

runs Windows 7 32-bit.

The correct version should be downloaded into the system.

Step 1: Using Google Chrome or another online browser, you may download and install

Python from its official website. Anyone is capable of completing this procedure. OR Follow

the link in the following text to reach the site: https://www.python.org/. Step 1: Using Google

Chrome or another online browser, you can download and install Python from its official

website. Anyone is capable of completing this procedure.

1
Now, check for the latest and the correct version for your operating system.
3
Step 2: Click on the Download Tab.

10
Step 3: You have the option of clicking the yellow Download Python for Windows 3.7.3 button,
3
or you can use the drop-down menu to locate the button that corresponds to the version of Python

that you are presently employing on your computer. Python for Windows, version 3.7.4, the most
105
recent stable release, is currently being made available for download at this address.
106
Step 4: At this point, you should have reached the point where you may select the Files option.

24 3
In the fifth step, you will see that a new version of Python is displayed beside the operating

system.

• Python for Pc 32-bit can be downloaded in a number of different file formats, including an
71
executable installer, an embeddable zip file, and a web-based installer. You are free to take into

consideration any one of these alternatives.

•The Python Windows 64-bit edition can be downloaded in the form of an embedded Windows

x86-64 zip file, an executable Windows x86-64 installer, or a web-based Windows x86-64
93 135
installer. These three options are all accessible for users to choose from. There are basically three
24
options here to pick from. You have the option of picking one of the three choices that have been

offered.

10
When it is finished, the web-based installer for Windows x86-64 will be stored in this location.

You have, in a sense, already completed the first duty that was given to you, which was to decide

which version of Python to install. Now that we have finished the tasks that are necessary before

installing Python, we are able to go on to the next stage of the procedure, which is referred to as

the Installation phase.

129
Note: If you want to learn about the adjustments or improvements that have been made to the
122 3
version, you can learn about them by clicking on the Release Note Option.

89
The first step in installing Python is to: To begin the process of installing Python, navigate to

Download and then open the file that was just downloaded of Python.

3
Step 2: Before you click on Install Now, Make sure to put a tick on Add Python 3.7 to PATH.
Step 3: Click on Install NOW After the installation is successful. Click on Close.
139
In the fifth step, you will find that the answer is 3.7.4

10 108
Note: If you already have an older version of Python installed on your computer, you can continue
3
to use that version of the programming language. In order to install the most recent version, you
116
will first need to remove the previous version that was previously present on your computer.
10
Examine the functionality of the Python IDLE.

Step 1: Select the Start button.

Step 2: Simply type "python idle" into the Windows Run command to get started.

3
6. SYSTEM TESTING

6.1 TESTING STRATEGIES

6.1.1 UNIT TESTING


A sort of software testing known as "unit testing" involves the developer performing separate
47
inspections of the program's modules in an effort to locate and fix flaws. It is responsible for

determining whether or not the modules that run autonomously are fully operational. Testing at

the unit level must be carried out by the developer themselves. The primary purpose is to

disassemble the system into its component elements in order to locate and solve the root cause of

the issue. This will allow for a more thorough analysis of the situation.

Unit Testing Techniques:

3
In addition to evaluating the input and output of the system being tested, the "Black Box Testing"

testing approach also assesses the user interface of the software or hardware being evaluated.

47
The testing that examines each of those functions' behaviours in isolation from the other functions

is referred to as "white box testing."

6.1.2 DATA FLOW TESTING

A collection of testing strategies that concentrate on tracking data-related events as they take place

along various channels inside a program's control flow is referred to as "data flow testing," and the

phrase "data flow testing" is used to characterise this testing methodology. These pathways are

utilised in the process of investigating the data structure of the programme. In dataflow testing, the

emphasis is placed on locating the points at which variables are given values and the locations at

which those values are used.

6.1.3 INTEGRATION TESTING


The integration tests come after the unit tests have been completed and are the following phase.

After putting all of the individual components, also known as modules, back together, you will go

on to the next stage of the process, which is called integration testing. The purpose of integration
109
testing is to determine whether or not the newly linked components have caused any problems
3
with the functionality, performance, or dependability of the system.

6.1.4 BIG BANG INTEGRATION TESTING

When carrying out integration testing, one strategy known as the "Big Bang Integration Testing
127
Strategy" entails testing the system in its whole once all of its individual components have been
24
brought together at the same time. There is a term for this kind of exploration, and it is called the
113
"Big Bang." It is difficult to pinpoint the particular location of any potential defects that may have
76
been identified as a result of these tests because of the extensive nature of the testing that was

done. This is due to the fact that no effort is spent towards examining the interfaces that exist

between the numerous components that make up the whole.

6.1.5 USER INTERFACE TESTING

Testing the Graphical User Interface (GUI) of a product or piece of software is done with the

intention of locating defects that are present in the product or programme. This kind of testing is

typically referred to as "user interface testing," which is also a name that can be utilised.
6.2 TEST CASES:

S.NO INPUT If available If not available

1 Service Providers service provider can signup and login to There is no process

application and then can new products

and can view orders from users

2 Users user can signup and login to application There is no process

and then can view all service provider’s

details, add money to wallet and can

browse product details to purchase.


7.SCREENSHOTS

First double click on ‘Start_IPFS.bat’ file to start IPFS server like below screen
In above screen IPFS server started and now double click on ‘run.bat’ file to start python DJANGO

WEB server like below screen


94
The Python server was started on the previous screen; now you must ensure that all servers are

given permission to keep running regularly. The next step is to open a browser and type

http://127.0.0.1:8000/index.html into the address box before hitting the return or enter key. What

happens below should come as no surprise.

In above screen click on ‘Register Here’ link to add new user like below screen
Enter all of your login details into the form shown above. The next step is to determine whether
8
you will be a consumer or a service provider. Finally, I'm entering service provider information on

the screen you see above and clicking the Save button.
In above screen service provider details saved in Blockchain and similarly you can add both users

In above screen I am adding USER and now press button to get below output

In above screen user details added and now click on ‘Login Here’ link to login as service provider
In above screen service provider is login and after login will get below output

In above screen service provider can click on ‘Add New Products’ link to add various products

like below screen


Before selecting the 'Add Products' option to add the information to the Blockchain, the service

provider will use the aforementioned UI to enter all of the product details and upload an image.
29
Following that, the results that are presented below will be sent to the service provider.
The product details were saved to the blockchain on the screen that you just saw, and we found

the address hidden in the hash code of the image storage. The same holds true for the quantity of
8
product information that may be entered, as well as the number of orders that can be viewed by

clicking the "View Orders" button.

In above screen we can see orders booked by customers and now logout and login as USER
In above screen user is login and after login will get below screen You can see a screen that allows users to add funds to their
wallets by clicking a link that is titled "Add Money to Wallet," which is actually being handled as a phoney transaction. This
screen can
be found up above.. In above screen current balance is showing as 0 and now enter some amount and press button to add
money to wallet and get below output
On the screen that you see above, the word "Added" appears in red text. To check your balance, click the link that says "Add
Money." In above screen balance is 50000 and now click on ‘View Providers’ link to view provider details
34 137
When the user clicks the "View Product" button, they will be taken to a new screen where they
63
can browse through all of the products that are currently available from the selected source.

On the screen that you see above, the user can select the product that they want, and then they can

push the button to view the details.


34
The consumer has been presented with all of the information regarding the product up to this point;

if he is ready to make a purchase, he can do so by clicking the "Click Here" button, which will

take him to the screen that comes after this one.

You can view all of the product information up top, then proceed to add items to your shopping

basket, pay for them, check the balance on your card or wallet, and finally acquire the output that
is displayed down below.

On the screen that you just saw, the order was validated and updated in the blockchain. Likewise,

users are able to search for and purchase any product.


8.CONCLUSION

Supporters of blockchain technology anticipate that this type of application will quickly become

standard practise in the financial sector within the next ten years. As more examples of use cases,

the investment banking and securities industries are provided. These are two businesses that the
58
Corda/R3 platform is already supporting in an extraordinarily successful manner. On the other

hand, there are conservative voices who are warning against the tech hype and pointing out that

the only broad use case for blockchains at the present is in the cryptocurrency industry with Bitcoin

and other digital currencies. This opinion is diametrically opposed to mine in every possible way.

It is not feasible to accurately predict the future in any way, whether the immediate, the

intermediate, or the far future. For the time being, the applications of blockchain technology
described above provide a fertile ground for innovation within the financial sector. Companies

who operate in the fields of financial technology and insurance technology will find this to be

particularly true of their industries. In addition, we used a non-fungible token (NFT) smart contract

instead of a traditional smart contract to compute the hash address for the blockchain wallets. This

allowed us to avoid any potential security vulnerabilities. The data were then sent to an IPFS server

that was hosted on the internet as the next stage..

9. REFERENCES
1) To begin: 1. Different Cryptocurrencies and Coins Explored. Please visit

https://www.itexchangeweb.com/blog/altcoins-cryptocurrencies-beyond-bitcoin/ for more

information. (data retrieved as of July 30th, 2019).

2) Applications of Blockchain Technology and Future Prospects in the Financial Services Sector.

Guo, Y., and Liang, C. Financ. Innovat. 2016, 2, 24. Guo, Y., & Liang, C.

3) Peter Rosati and Timothy Cuk were the other two. The blockchain system is discussed in

Beyond Cryptocurrencies: Financial Technology and Strategy for the 21st Century. It was

published in 2016 by Springer Nature Switzerland AG in Cham, Switzerland under the title

"Disrupting Finance," with contributions by T. Lynn, J.G. Mooney, P. Rosati, and M.

Cummins (pages 149-170).

4) Tobias Maurer, Andrew Levite, and Gregory Perkovich 4. Towards the establishment of a

worldwide norm making it illegal to tamper with the veracity of financial data. Germany's

Kiel Institute for the World Economy released its 38th Economics Discussion Paper in 2017.

The most recent access date and time for this URL is June 23, 2017; it can be viewed online

at https://www.econstor.eu/bitstream/10419/162579/1/890955921.pdf.

5) In the fifth place, we have Wikipedia. Information as of the 30th of July, 2019 can be found

at https://en.wikipedia.org/wiki/WannaCry_ransomware_attack.

6) Number six is "Blockchain Technology for Financial Services Facilitation in RES

Investments," written by Francesco Bosco, Vincenzo Croce, and Giuseppe Raveduto. The use

of Blockchain Technology to Ease Access to Financing for Renewable Energy System


Investments. Palermo, Italy, September 10-13, 2018: The Fourth Annual IEEE International

Forum on Research and Technology for Society and Industry (RTSI); pages 1-5.

You might also like