Professional Documents
Culture Documents
Submission Information
Result Information
Similarity 5%
1 10 20 30 40 50 60 70 80 90
Exclude Information
Quotes Excluded
References/Bibliography Excluded
Sources: Less than 14 Words Similarity Not Excluded
Excluded Source 0%
Excluded Phrases Excluded
A-Satisfactory (0-10%)
B-Upgrade (11-40%)
5 20 A C-Poor (41-60%)
D-Unacceptable (61-100%)
SIMILARITY % MATCHED SOURCES GRADE
3 www.oecd.org Publication
1
5 aglaw.us Publication
<1
11 www.atlantis-press.com Publication
<1
14 sajbm.org Publication
<1
20 repositorio.utn.edu.ec Publication
<1
EXCLUDED PHRASES
These are the types of products and services that the company offers:
The financial industry is rich with opportunities for the first widespread application of
blockchain technology, which is rapidly becoming an integral component of the technical
environment. These opportunities exist at a time when the financial environment is ripe. The
banking industry in China is incurring losses as a direct result of the liberalization of interest
rates; also, the reduction in the interest rate gap is contributing to the fall. The reduction in the
interest rate gap, on the other hand, is helping to facilitate the fall by providing further support.
9
However, it's also influenced by a wide variety of other things, such as the prosperity of the
internet and the alterations that have taken place in the financial industries. Because of this,
the financial services industry absolutely needs to go through a span of transformation and
actively seek out new chances for expansion. As a consequence of this, blockchains have the
potentiality to one day be of assistance as the substructure for significantly upgraded and
completely new payment clearing and credit information systems in financial institutions. The
underlying technology that underpins banking's payment clearing and credit information
systems may undergo a fundamental transformation as a rap of the use of blockchains. Because
blockchain applications make "multi-center, weakly intermediated" scenarios feasible,
financial institutions will have the potential to improve their overall efficiency and compete
more effectively in the global marketplace. Despite the reality that blockchains are intended to
be permissionless and self-governing, there are still challenges to be solved, such as the
regulation that surrounds decentralized system’s and the actual implementation of such
3
systems. These challenges must be surmounted. As a result, we argue for the urgent
establishment of a "regulatory sandbox" in addition to the development of industry-specific
recommendations and guidelines.
Blockchain Beyond Cryptocurrencies: FinTech and Strategy in the 21st Century
There is significant anticipation that the utilization of blockchain technology could result in
dramatic changes being made by financial service providers. This chapter provides a synopsis
of the inquisition that was conducted on the potential effects of using blockchain technology
in each of the following four areas of the financial industry: payments and remittances, credit
and lending, trade and settlement, and compliance. These are the four most essential
components of the financial business. In addition, the core components of blockchain are
broken down and described in this chapter. We are analyzing the current voids in the research
literature in order to come up with ideas for prospective new lines of inquiry that could be
pursued in the not too distant future.
currently obtainable applications are all hosted on a specific server. In the develpoment that
the server were to become corrupted or crash as a result of an excessive amount of requests,
users would be unable to access the services.
LIMITATIONS:
• An Isolated point of failure:ꢀ A single possible point of failure is created when you
rely exclusively on just one server. All apps housed on that server would be rendered
unavailable simultaneously if it were to become corrupted, crash, or encounter any
other technical problems. This results in a total outage, upsetting users and maybe
costing the service provider funds.
• Scaling challenges:ꢀ One server might not be adequate to appropriately manage an
excessive amount of requests or traffic spikes. The server may struggle to handle the
strain as the user base or traffic grows, leading to sluggish response times and decreased
performance.
• Restrictive Contradiction:ꢀ Contingency configurations for single server setups are
constrained. There might not be a failover or backup system setup for switching over
in the development of a malfunction. Contingency implementation is essential for
guaranteeing high availability and reducing downtime.
• Accessibility in strings of location:ꢀBy cause of geographical separation between the
server and the users, users from various geographic locations may suffer greater latency
subject to the server's location. The user experience and responsiveness of the program
may be negatively impacted.
• Deficiencies in security:ꢀ A single server hosting all applications widens the attack
surface. All hosted applications can be at risk at once if the server suffers from a
security lapse or malware infection. Utilizing containerization or isolating programs on
separate servers might help reduce the possible effects of security issues.
Blockchain technology is advancing to the point where it will soon significantly alter not only
monetary assistance but also a vast array of other industries and commercial enterprises.
Trillions of dollars are transported daily throughout the previous global financial system,
serving billions of individuals and groups. This age has abundant of problems caused by its
heavy reliance on paper, dependence on paper, and virtual appearance. Motive increased
expenses and delays, furthermore the ease with which fraud and crime may undermine it.
Blockchain and its anticipated advantages make it worthwhile, despite the financial sector's
aversion to trade. Unlike traditional structures, blockchain is flexible enough to set the pace
for implementation in a competitive market. Every celebration has a report that is recorded in
a ledger and is available to everyone, which is the main benefit of a blockchain. It’s a ledger
that is frequently worn by a small group of users, creating a shared database that is copied to
20
those individuals and that they can only access it when they have the appropriate access
permissions.
Advantages:
• High Availability and Tolerance to Faults:ꢀ Data is dispersed and copied across
numerous nodes in the grid that decentralized systems such as Blockchain function on.
The network can keep running even if a particular node collapses or becomes
inaccessible since other nodes still have copies of the data. Reducing the possibility of
service interruptions and downtime, this redundancy offers high availability and fault
tolerance.
• Enhanced Security:ꢀ Strong security measures are a hallmark of blockchain
technology. An everlasting and impenetrable chain of knowledge can be established by
cryptographically integrating each transaction or entry of data to the one before it. As
a consequence, it is more burden for malicious actors to alter or compromise data,
increasing the system's overall security.
• Adaptability to Attacks:ꢀBlockchains are accessible by virtue since everyone can see
the full history of transactions. Because of this transparency, users are more likely to
trust one another and transactions and data integrity can be efficiently audited.
• Data consistency and integrity:ꢀ To verify and reach consensus on the data's current
state across the network, blockchain uses consensus procedures (such as the evidence
of Work or the evidence of Stake). By ensuring that particular node has a consistent
and accepted copy of the data, this improves data integrity.
2.3 FEASIBILITY STUDY
At this point, a business strategy is produced, and the viability of the concept is evaluated. The
proposal contains a brief study of the proposed project and estimated costs associated with its
completion. System analysis is the phase of the project where the feasibility of the proposed
system is determined. This is done to make sure the organization can continue operating
regularly notwithstanding the implementation of the new system. To do a feasibility
examination, one has to know the system's requirements inside and out.
¨ ECONOMICAL FEASIBILITY
¨ TECHNICAL FEASIBILITY
¨ SOCIAL FEASIBILITY
• ECONOMICAL FEASIBILITY
The company is conducting this study to ascertain whether or not it has the means
to counteract the system's possible negative economic repercussions. The corporation can only
invest so much money into the system's development before it becomes ineffective. An
explanation or clarification of the associated costs must be provided. The system's practicality
and affordability are greatly enhanced by the solidity that the vast superiority of the underlying
technologies are freely available to the public. frequent of the technologies that authorize for
this to happen are already publicly available, making this an achievable goal. The only add-
ons available for separate purchase were those that expanded personalization options.
• TECHNICAL FEASIBILITY
Finding out if the system is technically feasible, which is described as being facile
to meet the technical criteria, is the intent of this research. It is crucial to take measures to
guarantee that the prospects of our current infrastructure will not be surpassed by the newly
built technologies. As a returns, existing technological resources will be significantly stressed
beyond their capacity. This aspect alone ensures that customer expectations will be
extraordinarily high. Since the anticipated system's implementation would necessitate few if
any changes, the prerequisite for this structure should be easy to understand and follow.
• SOCIAL FEASIBILITY
This section of the inquiry will focus on determining whether or not the system has met the
expectations of its users. A key component of this method is teaching the user how to optimize
their experience with the tools at their disposal. In order for the system to work well, the user
must never feel threatened by it. They should instead come to terms with the system as
something they must divide-out with, although grudgingly. The methods used to train and
familiarize users with a system are the initial determinants of how rigorously that systems
going to be received by its intended audience. We can tell if the system is catching on beside
the public by counting the prime of happy users. He has to fortify his self-assurance before he
can offer the constructive feedback that is always welcome from the person who will be
utilizing the system in the end. Because he is the program's final intended user, that's the case.
• Documents including the product's viewpoint view and characteristics, along with the
operating-system and operating surroundings, graphics requirements, design limits,
and user manuals are all included in the functional criteria or the overall description.
In addition to that, the comprehensive product description is given in these
publications.
• The appropriation of needs and implementation limits provides a comprehensive
picture of the strengths and weaknesses of the project, in addition to providing
information on how to address these issues. You will be smart to achieve this goal if
you conduct an inventory of your resources and figure out how to strengthen your areas
of weakness. This overview also includes a discussion on potential future remedies to
these problems.
Framework Django
The bare minimum hardware that must be present on a user's computer in straight for them to
run Enthought Python, Canopy, or Visual Studio Code varies greatly depending on the sort of
product that is being refined using any of these programmes. This is because each of these
programmes is designed to build a different kind of product. apps that must quickly carry out
a large number of calculations or operations will benefit from a processor with a higher clock
speed, whereas apps that must store a large number of objects or arrays in memory will perk
from having more RAM available.
For this project, we are going to generate two main divides of consumers: The service
providers and customers/users.
• Service Providers: After logging in and registering for the application, service
providers can add fresh offerings and review customer orders.
• Users: Users may set up credentials and log in to the application. Following that,
buyers will be smart to see all the statistic’s held by the service provider, add funds to
their wallet, and look up product details to buy.
The usage of smart contracts, which may be established through the application of
SOLIDITY programming, is used to store data on a blockchain. By using Truffle,
SOLIDITY programs may be deployed on the Ethereum Blockchain. When a deployed
contract is contacted to save and get data from the Blockchain, it will respond with an
ADDRESS. This ADDRESS can be utilized by a Python program to establish a connection
with the deployed contract.
CHAPTER 4 SYSTEM DESIGN
Two of the major useful modelling tools are the data flow diagram (abbreviated as DFD) and
the data flow chart (abbreviated as DFCC). It serves as a crucial resource in the action of
modelling the system's various components. incorporated in the aforementioned group are the
system's process, the data used by the process, an external entity interacting with the executing
system, and the orientation glide that take place within the executing system.
A DFD diagram reveals the enlightenment flow inside a system and how that information is
altered by the profuse action taking place within the system. It is a viewable depiction of how
information glide from one place to another and how it changes along the way. In the universe
of computing, flowcharts are used often.
Regulated by the setting, a DFD graph may also be called a bubble chart. Directed graphical
diagrams (DFDs) are adequate of producing an accurate depiction of the framework at any
level of abstraction because their granularity can be increased by moving up through its levels,
which are arranged in a chain of commands that takes into narrate the information flow and
functionality that are revealed at each level. The user may split them into whatever number of
levels they choose.
User:
User
Yes NO Unauthorized user
Check
View Products
End process
Service Provider
Yes NO
Unauthorized
Check Service Provider
End process
The goal of developing the Unified Modelling Language, or UML for short, is to build a
language that could be utilized to describe object-oriented computer software’s in a consistent
and portable way. The present variant of the Unified Modelling Language (UML) is dependent
on two pillars: the notation and the Meta-model. Common modelling language known as
Unified Modelling Language. In the not-too-distant future, the Unified Modelling Language
(UML) may become linked to a specific method or technique. The Unified Modelling
Language (UML) is a standard language used for modelling not just software systems, but also
business systems and other types of systems. In adding up to its application in explaining the
aforementioned, it may further be put to work in the preparation and development of objects
inside software systems.
For the proposal of representing complex systems, the Unified Modelling Language (UML)
has shown to be a reliable collection of professional best practices. All of these best practices
culminated in the Unified Modelling Language (UML).
The Unified Modelling Language (UML) is a tool vital to the evolution of object-oriented
programmes and, more generally, to the outline of any type of software. The Unified Modelling
Language (UML) is a graphical notation-based approach to describe the architecture of
software development projects.
OBJECTIVES The following is a list of the major influential ideas that contributed to the
evolution of the UML:
• To build meaningful models and easily share them with others, users need initial access
to a fully functional, graphically expressive modelling language.
• Make specialized and extensible tools available so that underlying concepts may be
further refined in the future.
• Retain complete control over the software development language and workflow you
employ.
• please give a crystal and further comprehensive explanation of the modelling language
and how to employ it.
• Take the initiative to help define the future in the OO tools market.
More abstract parts of software development, such the genesis of teams, frameworks, patterns,
and components, might benefit from your guidance.
When Blockchain wants to add a new block to the blockchain, it first compares the hash of that
block to the hash codes of all of the blocks that came before it. If a new block is added to the
Blockchain before the verification method is completely completed, the block in question
won't be stored. In the event that none of the previously recorded blocks were subjected to any
kind of assault or modification, Blockchain will continue to produce the same hash code, which
will serve as proof that the verification was successful. A one-of-a-kind hash code is generated
for each block of transactions on the blockchain. This hash code acts as a digital fingerprint
for the data that is contained inside those blocks. If the validation cannot be completed
successfully, Blockchain will guard against adding any new records. This demonstrates that
Blockchain cannot be altered and that it is resistant to any attacks or changes that may be made
to its data behind the scenes. In the event that the value has been modified in any way, the
validation will be regarded as having failed.
Because of the many advantages offered by Blockchain technology, businesses of all sizes are
making the transition away from programmes that run on centralised servers and towards
distributed Blockchain applications.
In order to fulfil the requirements of this project, we are going to develop two unique groups
of end users, who are going to be service providers and clients or consumers.
Companies That Provide Services: After registering for an account and logging into the
application, service providers are allowed to make changes to their product catalogue and view
the items that customers have purchased.
To be free to make a purchase, the user must first sign up for an account and log into the app.
After doing it, they will be free to browse information regarding all of the service providers
who are available, add money to their wallet, and look through product specifics. This is
something that can be done once the user has successfully logged in.
Data may be saved on a blockchain through the utilisation of smart contracts, and these
contracts may be built with the assistance of SOLIDITY programming. Any and every
information that is stored in a blockchain is referred to as blockchain data. On the Ethereum
Blockchain, Truffle enables the deployment of code that complies with the SOLIDITY
standard. Python applications are free to utilize the contract's address, which is returned by the
deployed contract, in adequate to access the contract and either write to or read from the
Blockchain. The SOLIDITY code is currently being displayed in the panel that may be seen
further down below.
Previously, in the SOLIDITY code, we developed four functions to hold crucial data: users,
wallets, shopping carts, and products. The contract will be deployed if the 'runBlockchain.bat'
file that is located in the 'hello-eth/node_modules/.bin' folder is double-clicked.
Simply clicking on this link will cause the window that is located at the bottom of the page to
slide open.
On the previous screen, Blockchain generated several private keys and default accounts. After
entering the 'truffle migrate' command on the same screen and pressing enter, the contract will
be deployed to Blockchain Ethereum. What you see here is an illustration of the final product.
Both the actual location of the contract as well as the screen display that states "Financial
Contract" in white font are available to us. You will need to type this address into a Python
code, just like it is demonstrated in the screenshot below, in order to gain access to the contract.
Learn how to invoke a Blockchain SMART CONTRACT using Python by going back over
the notes that are indicated in red farther up in this article. These jotted down notes can be
pictured at the very top of the screen. We make use of an IPFS server to ensure that any icons
that you may upload using the add product module are kept in a secure location. Due to the
impossibility of storing digital images on a blockchain, this is absolutely necessary.
6.1 SNAPSHOTS: -
Enter all of your login details into the form shown above. The next step is to determine whether
you will be a consumer or a service provider. Finally, I'm entering service provider information
inputs to the screen you are able to see above and clicking the Save button.
I'm adding USER inputs to the screen above and now press button to get below output
User details are added to the panel above and now click on ‘Login Here’ link to login as service
provider
The service provider is currently logged in and has the output shown above. The “Add New Products” link over the screen
permits the service provider to add a combo of products like those in the below screen.
Before selecting the 'Add Products' option to add the information to the Blockchain, the service
provider will use the aforementioned UI to enter all of the real items and upload an image.
Following that, the consequences that are conferred below will be sent to the service provider.
In the above screen you just saw, the product information was stored to the blockchain, and we
were able to locate the address by looking for it in the image storage hash code.
The volume of product details that may be submitted is the same as the volume of orders that may be viewed by clicking the
"View Orders" button. Orders placed by customers are shown on the screen above. Log out and then log back in as USER.
You can see a screen that allows users to add funds to their wallets by clicking a link that is titled "Add Money to Wallet,"
which is actually being handled as a phoney transaction. This screen can be found up above.
In above screen current balance is showing as 0 and now enter some amount and press button to add money to wallet and get
below output In above screen balance is 50000 and now click on ‘View Providers’ link to view provider details.
4
The "View Product" button will send the user to a fresh screen where they can browse through every item that is currently
offered from the chosen source. . On the screen that you see above, the user can select the product that they want, and then
they can push the button to get insight the details.
If the customer is ready to purchase the product, he can do so by clicking the "Click Here" button, which will send him to the
screen that appears after this one. The consumer has now been given all of the information on the product that has been
accessible up to this point. You can view all of the product information up top, then proceed to add items to your shopping
basket, pay for them, check the balance on your card or wallet, and finally acquire the output that is displayed down below.
On the screen that you just saw, the order was validated and updated in the blockchain.
Likewise, users are able to search for and purchase any product.
CHAPTER 7 SOFTWARE TESTING
7.1 TESTING STRATEGIES
7.1.1 UNIT TESTING
A sort of software testing known as "unit testing" involves the developer performing separate
inspections of the program's modules in an effort to locate and fix flaws. It is responsible for
determining whether or not the modules that run autonomously are fully operational. Testing
at the unit level must be carried out by the developer themselves. The primary purpose is to
disassemble the system into its component elements in straight to locate and solve the issues
from the root. This will allow for a more thorough analysis of the situation.
In addition to evaluating the input and output of the system being tested, the "Black Box
Testing" testing approach also assesses the user interface of the software or hardware being
evaluated.
The testing that examines each of those functions' behaviours in isolation from the other
functions is referred to as "white box testing."
Valid User_id
1 and Userid and passcode Successful Login pass
Valid passcode
Invalid User_id
2 and Userid and passcode Unsuccessful Login pass
Invalid passcode
Blank User_id
3 and Userid and passcode Prompt’s a message pass
Blank passcode of enter the correct
details
LOGIN UNIT TESTING
All in-fields
1 are Valid Details Added a New item pass
filled into the list
Supporters of blockchain technology anticipate that this type of application will quickly
become standard practice in the financial sector within the next ten years. As more examples
of use cases, the investment banking and securities industries are provided. These are two
businesses that the Corda/R3 platform is already supporting in an extraordinarily successful
manner. Furthermore, there are traditionalistic voices who are warning against the tech hype
and pointing out that the only broad use case for blockchains at the present is in the
cryptocurrency industry with Bitcoin and other digital currencies. This opinion is diametrically
opposed to mine in every possible way. It is not feasible to accurately predict the future in any
way, whether the immediate, the intermediate, or the far future. For the time being, the
applications of blockchain technology described above provide a fertile ground for innovation
within the financial sector. Companies who operate in the fields of financial technology and
insurance technology will find this to be particularly true of their industries. In addition, we
used a non-fungible token (NFT) smart contract instead of a traditional smart contract to
compute the hash address for the blockchain wallets. This allowed us to avoid any potential
security vulnerabilities. The data were then sent to an IPFS server that was hosted on the
internet as the next stage.
CHAPTER 9 FUTURE ENHANCEMENT
Financial institutions must be able to recognize opportunities, evaluate their viability and
potential effects, and test hypotheses. However, concerns about emulation will necessitate a
thorough discussion with knowledgeable regulatory authorities and the incorporation of their
line of thought. We will also investigate a prime of additional options for providing off-chain
settlement for institutions of finance that are not presently part of the system. Solitary of the
options that might be taken into consideration is getting authorized access to the business's
database. This will enable subsequent transactions (between listed and non-listed
organization’s) and ensure that every detail of the transaction is accurately recorded in both
institutions' ledgers.
CHAPTER 10 APPENDIX-A REFERENCES
[1] To begin: 1. Different Cryptocurrencies and Coins Explored. Please visit
https://www.itexchangeweb.com/blog/altcoins-cryptocurrencies-beyond-bitcoin/ for
more information. (data retrieved as of July 30th, 2019).
[2] Applications of Blockchain Technology and Future Prospects in the Financial Services
Sector. Guo, Y., and Liang, C. Financ. Innovat. 2016, 2, 24. Guo, Y., & Liang, C.
[3] Peter Rosati and Timothy Cuk were the other two. The blockchain system is discussed in
Beyond Cryptocurrencies: Financial Technology and Strategy for the 21st Century. It was
published in 2016 by Springer Nature Switzerland AG in Cham, Switzerland under the
title "Disrupting Finance," with contributions by T. Lynn, J.G. Mooney, P. Rosati, and M.
Cummins (pages 149-170).
[4] Tobias Maurer, Andrew Levite, and Gregory Perkovich 4. Towards the establishment of
a worldwide norm making it illegal to tamper with the veracity of financial data.
Germany's Kiel Institute for the World Economy released its 38th Economics Discussion
Paper in 2017. The most recent access date and time for this URL is June 23, 2017; it can
be viewed online at https://www.econstor.eu/bitstream/10419/162579/1/890955921.pdf.
[5] In the fifth place, we have Wikipedia. Information as of the 30th of July, 2019 can be
found at https://en.wikipedia.org/wiki/WannaCry_ransomware_attack.
[6] Number six is "Blockchain Technology for Financial Services Facilitation in RES
11
Investments," written by Francesco Bosco, Vincenzo Croce, and Giuseppe Raveduto. The
use of Blockchain Technology to Ease insight to Financing for Renewable Energy System
Investments. Palermo, Italy, September 10-13, 2018: The Fourth Annual IEEE
International _Forum on Research_and_Technology for Society and Industry (RTSI);
pages 1-5.
APPENDIX-B
USER MANUAL:
STEP 1: First double click on ‘Start_IPFS.bat’ file to start IPFS server like below screen
16
The Python server was started on the previous screen; after you clearly ensure that all
servers are given permission to keep running regularly. The next step is to open a browser
and type http://127.0.0.1:8000/index.html into the address box before hitting the return or
enter key. What happens below should come as no surprise.
STEP 3: click on ‘Register Here’ to get registered to the Application. STEP 4: sign up to the application by choosing the type
of user i.e either user or service provider.
STEP 5: If the service provider is currently logged in and has the output shown below. STEP 6: The “Add New Products” link
in the above screen allows the service provider to add a variety of products like those in the below screen.
Step 7: If the user is logging in then they see the screen below. STEP 8: The user can view the products, buy the products add
funds to their wallets by clicking a link that is titled "Add Money to Wallet," which is actually being handled as a phone
transaction.