You are on page 1of 29

A PRELIMINARY REPORT ON

DISK SPACE RENTAL SYSTEM

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY,


PUNE IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE

OF

BACHELOR OF ENGINEERING
(COMPUTER ENGINEERING)

SUBMITTED BY

DHANSHREE J. GAVANKAR B191144214


VAISHNAVI V. KHAIRNAR B191144223
PRAJWAL P. PAHILWAN B191144227
JAYESH A. UGHADE B191144256

DEPARTMENT OF COMPUTER ENGINEERING

SAVITRIBAI PHULE PUNE UNIVERSITY


2023 -2024
CERTIFICATE

This is to certify that the project report entitles

“DISK SPACE RENTAL SYSTEM”

Submitted by

DHANSHREE J. GAVANKAR Exam No: B191144214


VAISHNAVI V. KHAIRNAR Exam No: B191144223
PRAJWAL P. PAHILWAN Exam No: B191144227
JAYESH A. UGHADE Exam No: B191144256

is a bonafide student of this institute and the work has been carried out by him/her under the
supervision of Prof. S. N. Botekar and it is approved for the partial fulfillment of the requirement
of Savitribai Phule Pune University, for the award of the degree of Bachelor of Engineering
(Computer Engineering).

Prof. S. N. Botekar Prof. G. P. Mohole Dr. M. V. Bhatkar


Project Guide Head of Department Principle

Place: Nashik

Date:
Savitribai Phule Pune University

CERTIFICATE

This is to certify that.

1. Dhanshree J. Gavankar (72221291H)


2. Vaishnavi V. Khairnar (72159856M)
3. Prajwal P. Pahilwan (72221300L)
4. Jayesh A. Ughade (72221327B)

Students of B.E. Computer


were examined in the Project Report entitled.

“DISK SPACE RENTAL


SYSTEM”
on . . ./. . . /2023

At
DEPARTMENT OF COMPUTER ENGINEERING, JAWAHAR
EDUCATION SOCIETY INSTITUTE OF TECHNOLOGY,
MANAGEMENT & RESEARCH NASHIK
YEAR 2023-24

..................... ...................
Internal Examiner External Examiner

JES’s ITMRN Department of Computer Engineering 2023-24


ACKNOWLEDGEMENT

Inspiration and motivation for presentations have always been essential to any
endeavor's success.

We would like to thank the Principal of Jawahar Education Society’s Institute of


Technology, Management and Research, Nashik, Dr. M. V. Bhatkar, sincerely.

We sincerely thank Prof. G. P. Mohole (HOD) of the Computer department at


Jawahar Education Society’s Institute of Technology, Management and Research,
Nashik, for giving us the motivation to reach our goals and for giving us the chance to
get the project ready. We owe our friends a huge debt of gratitude for their kind
supervision, supportive advice, and inspiring inspiration that helped us finish our project.

We would like to express our gratitude and sense of obligation to our guide, Prof.
S. N. Botekar, for her kind supervision and invaluable assistance during the course, which
helped to form the current work and its presentation.

Finally, but just as importantly, our parents serve as a major source of inspiration
for us. Therefore, we thank them with all due respect.

DHANSHREE J. GAVANKAR
VAISHNAVI V. KHAIRNAR
PRAJWAL P. PAHILWAN
JAYESH A. UGHADE

JES’s ITMRN Department of Computer Engineering 2023-24


ABSTRACT

The majority of file storage services save users' files without adequately
encrypting or safeguarding them. Most of the time, those who do have complete read
access to the internal files. This has given rise to grave privacy concerns, particularly in
light of the iCloud leak in 2014 and the major Dropbox attack in 2012 that compromised
over 68 million accounts. Conventional data storage options, such as physical data centers
and centralized cloud storage services, have a number of serious problems, such as
security flaws, privacy concerns, high costs, a lack of transparency, and single points of
failure.

On a computer, most disc space is free. But, if a business pays to rent out hard
disk space, it can then rent that space to other businesses. The program needs to be quite
complex, accounting for the net speed and replicating data on several renters, in order to
prevent data loss.

Blockchain technology has several benefits across various industries, one of


which is increased security in hostile settings. Hash Pointers are used in blockchain, a
linked list, instead of standard pointers. This makes it possible for every blockchain node
to find the subsequent node and confirm whether the data there has changed. Since the
material is split up among several renters and parts, only the service provider is aware of
what the data contains in this case.

Data owners, who require disk space to store or backup private data, and disk
space owners, who supply disks for that reason, operate on a free-market principle.
Unlike traditional storage, File Storage Marketplace is completely decentralized. The
system's primary goal is to offer a safe, decentralized marketplace for the public to rent
disk space.

For effective resource allocation and control of disk space, the Disk Space Rental
control System is an essential tool. Applications across a variety of industries, including
as data centers, cloud service providers, and educational institutions, show how adaptable
it is. Enhanced security, optimized resource usage, and streamlined procedures all add to
the system's overall efficacy.

JES’s ITMRN Department of Computer Engineering 2023-24


TABLE OF CONTENTS

LIST OF ABBREVATIONS i
LIST OF FIGURES ii
LIST OF TABLES iii

CHAPTER TITLE OF CHAPTER PAGE


NO.
01 Introduction 1

1.1 Motivation 2

1.2 Problem Definition 3


02 Literature Survey 4

03 Software Requirements Specification 6

3.1 Introduction 6

3.1.1 Project Scope 6

3.1.2 User Classes and Characteristics 6

3.1.3 Assumptions and Dependencies 7

3.2 Functional Requirements 8

3.2.1 Registration / Login 8

3.2.2 Renting Disk Space 8

3.2.3 Posting for Available Space 8

3.3 External Interface Requirements (If Any) 9

3.3.1 User Interfaces 9

3.3.2 Hardware Interfaces 9

3.3.3 Software Interfaces 9

3.4 Nonfunctional Requirements 10

3.4.1 Performance Requirements 10

3.4.2 Security Requirements 10

3.5 System Requirements 10

3.5.1 Hardware Requirements 10

3.5.2 Software Requirements 10

3.6 Analysis Models: SDLC Model to be applied 11

JES’s ITMRN Department of Computer Engineering 2023-24


04 System Design 12

4.1 System Architecture 12

4.4 UML Diagrams 14

4.4.1 Use Case Diagram 14

4.4.2 Class Diagram 14

4.4.3 Activity Diagram 15

4.4.5 Sequence Diagram 16

4.4.7 State Chart Diagram 16

05 Other Specification 17

5.1 Advantages 17

5.2 Limitations 17

5.3 Applications 17

06 Conclusions & Future Work 18

References 19

JES’s ITMRN Department of Computer Engineering 2023-24


LIST OF ABBREVIATIONS

ABBREVIATION ILLUSTRATION
OTP One Time Password
AWS Amazon Web Services
GUI Graphical User Interface
SQL Structured Query Language

JES’s ITMRN Department of Computer Engineering 2023-24 i


LIST OF FIGURES

FIGURE ILLUSTRATION PAGE NO.


1.1 Transaction flow in Blockchain network 1
3.1 Waterfall model 11
4.1 System architecture 12
4.2 Structure of Blockchain 13
4.3 Use case diagram 14
4.4 Class diagram 14
4.5 Activity diagram 15
4.6 Sequence diagram 16
4.7 State chart diagram 16

JES’s ITMRN Department of Computer Engineering 2023-24 ii


LIST OF TABLES

TABLE ILLUSTRATION PAGE NO.


2.1 Literature survey 4

JES’s ITMRN Department of Computer Engineering 2023-24 iii


1. INTRODUCTION

Every day, electronic gadgets like computers, cellphones, and cameras generate
massive amounts of data that demand an increasing amount of storage capacity. Systems
for cloud storage were developed to meet this need. There are various third party storage
options these days such as Google Drive, Dropbox, AWS cloud services, etc. Disk renting
system is similar but it uses blockchain technology.

Blockchain technology has several benefits across various industries, one of


which is increased security in hostile settings. Hash Pointers are used in blockchain, a
linked list, instead of standard pointers. This makes it possible for every blockchain node
to find the subsequent node and confirm whether the data there has changed. Since the
material is split up among several renters and parts, only the service provider is aware of
what the data contains in this case.

Fig. 1.1 Transaction flow in Blockchain Network

The administrator of the Disk Renting System can access the system by entering
their username and password. The administrator reviews the user's requests to rent disk
space. Admin has the power to approve or disapprove the request. Additionally, the user
will be allotted disk space if the admin approves the request. The administrator can view
Transactions, Payments, and Disk utilization to look for any signs of system
manipulation.

JES’s ITMRN, Department of Computer Engineering 2023-24 1


It is necessary for the user to create an account and use their username and
password to log in. In addition to total space rented, total space underused, and total hard
disk utilization are all visible to the user. After seeing a list of every hard drive that is
available, the user must ask the administrator for permission to rent the space. The user
has the ability to search for hard drive plans, buy one, and verify whether any request
manipulations have occurred.

Constant technical assistance is just as crucial as the quality of the services


provided. A reliable supplier must keep an eye on its servers seven days a week, twenty-
four hours a day, to make sure that any issues are fixed right away. It is crucial to offer
information protection against loss and hacking to the owner of the hosted web project.
The supplier can also help with administration, which will make it easier to maintain the
website going forward.

1.1 MOTIVATION

Innovative solutions are needed in the current data management landscape, which
is why I am very motivated to start this project. The exponential growth of digital data
and the growing demand for effective storage solutions make it more important than ever
to optimize and secure disk space resources. This project's main driving force is the
realization of how important it is to solving the problems related to data storage and
retrieval. Managing disk space resources efficiently is essential to maintaining smooth
operations and protecting important data assets in a time when information is the key to
success.

In addition, it aligns with my professional philosophy to be able to contribute to


the development of a reliable, user-friendly, and secure disk space rental management
system. My interest for utilizing technology to improve data security and operational
efficiency is a perfect fit for this project. Beyond its immediate organizational
advantages, the Disk Space Rental Management System is expected to have a significant
influence. It stands for a dedication to maintaining the cutting edge of technology,
establishing standards for upcoming initiatives, and encouraging an innovative culture
within our company.

JES’s ITMRN, Department of Computer Engineering 2023-24 2


1.2 PROBLEM DEFINITION

The majority of file storage services save users' files without adequately
encrypting or safeguarding them. Most of the time, those who do have complete read
access to the internal files. This has given rise to grave privacy concerns, particularly in
light of the iCloud leak in 2014 and the major Dropbox attack in 2012 that compromised
over 68 million accounts. Conventional data storage options, such as physical data centers
and centralized cloud storage services, have a number of serious problems, such as
security flaws, privacy concerns, high costs, a lack of transparency, and single points of
failure.

On a computer, most disc space is free. But, if a business pays to rent out hard
disk space, it can then rent that space to other businesses. The program needs to be quite
complex, accounting for the net speed and replicating data on several renters, in order to
prevent data loss.

Data owners, who require disk space to store or backup private data, and disk
space owners, who supply disks for that reason, operate on a free-market principle.
Unlike traditional storage, File Storage Marketplace is completely decentralized. The
system's primary goal is to offer a safe, decentralized marketplace for the public to rent
disk space.

For effective resource allocation and control of disk space, the Disk Space Rental
control System is an essential tool. Applications across a variety of industries, including
as data centers, cloud service providers, and educational institutions, show how adaptable
it is. Enhanced security, optimized resource usage, and streamlined procedures all add to
the system's overall efficacy.

JES’s ITMRN, Department of Computer Engineering 2023-24 3


2. LITERATURE SURVEY

Table no. 2.1 Literature survey

Title Description Author(s) Publication Year

Proposed Model This claim states that Nabeel Khan, MPDI Open 2022
for Secured Data by encrypting data Hanan Aljoaey, Access
Storage in and distributing it Mujahid Journals
Decentralized among multiple Tabassum, Ali
Cloud by nodes, a higher level Farzamnia,
Blockchain of security can be Tripti Sharma,
Ethereum achieved. The Yew Hoe Tung
concept of a
decentralised cloud
was first introduced
in the form of
blockchain
technology.
Decentralized We recommend a G. Richa IJRASET 2022
Cloud Storage decentralised storage Shalom,
Using solution based on the Ganesh Rohit
Blockchain blockchain. Because Nirogi
blockchain is a
distributed peer to
peer system, any
internet-connected
processing node can
connect and build
peer to peer networks,
maximizing resource
efficiency.

Blockchain The objective of the Omar Ali, IEEE 2021


Technology review study is to Ashraf Jaradat,
Utilization help professionals, Atik Kulakli ,
Benefits, practitioners and Ahmed
Challenges and stakeholders who Abuhalimeh
Functionalities want to carry out and
manage blockchain
transformation

JES’s ITMRN, Department of Computer Engineering 2023-24 4


projects in their
industries.

A Secure In this article, author Yogita Sharma, IRJMETS 2021


Encrypted draw inspiration from Ayush
Digital Storage Blockchain, Sia Agarwalla,
System Based cryptocurrency, and Dhananjay
On Blockchain many file distribution Joshi,
protocols in order to Divyanshu
introduce blockchain Prasad
as another approach
to file storage that
offers security,
privacy, and
dependability.

Blockchain The blockchain Pratima ACM 2020


Technology for innovation offers Sharma, Rajni Computing
Cloud Storage: important inputs Jindal, Malaya Surveys
A Systematic while searching for Dutta Borah
Literature the best way to store
Review and process cloud
data.

JES’s ITMRN, Department of Computer Engineering 2023-24 5


3. SOFTWARE REQUIREMENTS SPECIFICATION

3.1 INTRODUCTION

3.1.1 Project Scope

This project aims to create a secure way to share your unused disk space. This
project uses blockchain network to securely perform transactions between end user and
disk space provider. This project won’t let your disk space go unused and will let you
earn some money as well.

3.1.2 User Classes and Characteristics

The system has two main users, renters and providers. The renter should be able
to rent disk space from the client application. And the Provider will put their disk space
on the platform to be rented.

Both Renter and Provider need a digital wallet to perform the transaction of
renting a disk. The transaction needs conformation of provider to complete the process.
Unless the provider doesn’t confirm the transaction the renter can’t proceed. End user
interacts with the disk through the GUI which is connected to a third party blockchain
network. The renter first needs to pay the rent to gain access of the disk space. The
provider will verify the payment and then provide access to the renter.

The renter will be able to perform following functions:

 Requesting disk space


 Initiate transaction
 Payment
 Accessing disk space
 Requesting extra space
 Cancelling the transaction
 Add/ update/ view/ delete the data

The provider will be able to perform following functions:

 Post available disk space


 Accept / reject requests

JES’s ITMRN, Department of Computer Engineering 2023-24 6


 Check for any manipulation
 Confirm transaction
 Verify availability of disk space
 Verify payment
 Allow access of disk to renter

3.1.3 Assumptions and Dependencies

Following are the main assumptions:

 The system will require a stable internet connection since the user needs to access
their through a web based application.
 The provider needs to keep their hardware system in working state always as the
renter may need to access the disk space anytime of the day.
 The provider should always keep track of the available space on the disk.
 If the providers system is down the renter can still access the data which was
stored before the time of system failure.
 Both renter and provider can communicate through client application or emails.

JES’s ITMRN, Department of Computer Engineering 2023-24 7


3.2 FUNCTIONAL REQUIREMENTS

3.2.1 Registration / Login


 Registration in the system needs the email id, contact information, personal id,
and payment options of the user.
 Logging in the system will require a valid username and password.
 When logging elsewhere the user will have to go through two step verification
using OTP.
 User can’t login if they haven’t registered before.
 If user don’t remember their password they can change the password.

3.2.2 Renting Disk Space


 The renter must select a plan and send request for the disk space to the provider.
 The provider needs to accept the request of the renter and verify the rent payment.
 When the payment is done the provider can allow the renter the access of the disk.
 If the provider rejects the request the renter can’t proceed and needs to request
again or find another plan or provider.
 To rent a disk the user must have a digital wallet.

3.2.3 Posting For Available Space


 The provider must have enough disk space on their disk to share.
 Post includes size of disk, rent, owner’s information, and other specification.
 Post must also contain payment options.
 When the provider receives request from renter they should verify the availability
of disk space.
 Post must not contain false information about availability of disk space.

JES’s ITMRN, Department of Computer Engineering 2023-24 8


3.3 EXTERNAL INTERFACE REQUIREMENTS

1. User Interfaces
 Login page
 Registration page
 Home screen for client application
 Shopping section
 Rented space section
 Pending / accepted request section
 Page to check the acquired and unused disk.

2. Hardware Interfaces
 Unused hard disk
 Server set-up
 PC / Laptop

3. Software Interfaces
 Digital wallets
 Web browsers
 Third party blockchain platform

JES’s ITMRN, Department of Computer Engineering 2023-24 9


3.4 NON FUNCTIONAL REQUIREMENTS

3.4.1 Performance Requirements


 The system should have stable internet connection.
 The server on which the disk is mounted should be live 24/7.
 If the user requests extra space the provider must be able to provide it.
 The provider must check the acquired space and unused space on disks and
extend disks on time if requested by someone.
 If the providers system is down the user will be able to access the data stored in
the disk before the time of failure.
 If the server is down the user will be notified about it.

3.4.2 Security Requirements


 Two step verification must be performed for login.
 Verification of payments and transactions is needed before providing the access
of disk space.
 The user can access disk space remotely as they can login anywhere.
 The user will receive OTP every time they try to login somewhere else.

3.5 SYSTEM REQUIREMENTS

3.5.1 Hardware Requirements


 Laptop or PC
 Windows 7 or higher
 I3 processor system or higher
 4 GB RAM or higher
 100 GB ROM or higher
3.5.2 Software Requirements
 Visual Studio 2019
 SQL Server Management Studio latest

JES’s ITMRN, Department of Computer Engineering 2023-24 10


3.6 ANALYSIS MODEL: SDLC MODEL TO BE APPLIED

A traditional model used in the system development life cycle to design systems
using a sequential and linear approach is the waterfall model. Because the model develops
regularly in a downward direction from one phase to the next, it is called a waterfall. The
waterfall technique does not specify how to manage requirement changes by going back
to a prior phase. The waterfall methodology is the original approach to software
development.

Fig. 3.1 Waterfall model

JES’s ITMRN, Department of Computer Engineering 2023-24 11


4. SYSTEM DESIGN

4.1 SYSTEM ARCHITECTURE

Fig. 4.1 System architecture

The primary components of the system are the third-party blockchain network,
the disk provider, and the disk renter. The supplier who offers their disk for rent is the
primary element. The blockchain network acts as a conduit for information between
users. Digital wallets are required for network connectivity for both renters and providers.

The storage provider issues a data integrity certificate to the user. After
confirming that the verification was successful, the user pays the storage provider using
lightning network technology. Since the blockchain stores all proofs and payment details,
the system's security and legitimacy are ensured.

The administrator can access the Disk Renting System by entering their login and
password. Renting disk space requests from users are reviewed by the administrator. The
request may be approved or denied by the admin. Additionally, disk space will be granted
to the user if the admin approves the request. By examining Transactions, Payments, and
Disk utilization, the administrator can look for signs of system manipulation.

JES’s ITMRN, Department of Computer Engineering 2023-24 12


Fig. 4.2 Structure of Blockchain

The user needs to create an account, then use their username and password to log
in. Views of the user's total hard drive utilization, total space rented, and total space
unused are available. Once the user has viewed a list of all hard disks that are accessible,
they must ask the administrator for permission to rent the space. In addition to looking
for hard disk plans, the user can buy one and verify whether any request manipulations
have occurred.

To summarize the system, the renter interacts with it via a client application built
with HTML, CSS, and ReactJS. This platform also features the provider's rental plans.
PHP connects the client application and a third-party blockchain network. When using
the client application, both the renter and the provider require a stable internet connection.

JES’s ITMRN, Department of Computer Engineering 2023-24 13


4.2 UML DIAGRAMS
4.2.1 Use Case Diagram

Fig. 4.3 Use case diagram

4.2.2 Class Diagram

Fig. 4.4 Class diagram

JES’s ITMRN, Department of Computer Engineering 2023-24 14


4.2.3 Activity Diagram

Fig. 4.5 Activity diagram

JES’s ITMRN, Department of Computer Engineering 2023-24 15


4.2.4 Sequence Diagram

Fig. 4.6 Sequence diagram

4.2.5 State Chart Diagram

Fig. 4.7 State chart diagram

JES’s ITMRN, Department of Computer Engineering 2023-24 16


5. OTHER SPECIFICATIONS

5.1 ADVANTAGES
 Blockchain is always secure because of its encryption characteristic.
 By lowering the chance of a single point of failure, blockchain data architectures
strengthen network security and make database breaches more difficult.
 Since every user on the blockchain has a unique key, blockchain prevents
unwanted access.
 It stops data manipulation.

5.2 LIMITATIONS
 In comparison to traditional centralized databases, blockchain require more
storage capacity and are less efficient.
 Blockchain technology can be difficult to understand and implement, requiring
specialist skills.
 Scalability issues may arise in blockchain networks, particularly public ones,
when transaction volume rises. Higher costs and longer processing periods for
transactions may follow from this.
 If the system fails the user will have to wait for it to recover for uncertain amount
of time.
5.3 APPLICATIONS

The primary goal of the Disk Space Renting System is to provide a safe,
decentralized, and open platform for disc space rentals.

JES’s ITMRN, Department of Computer Engineering 2023-24 17


6. CONCLUSION AND FUTURE WORK

Future Work

 Enhanced Security Features: To strengthen data security, put modern encryption


techniques and authentication processes into practice.
 Machine learning integration: Examine how machine learning techniques can be
used to anticipate and optimize disk space needs based on usage trends.
 Blockchain integration: Examine how incorporating blockchain might improve
data integrity and provide decentralized governance.
 Scalability improvements: Improve system scalability to meet the expanding
needs of data-intensive applications and large-scale companies.
 User interface refinement: Make constant improvements to the user interface to
make it more intuitive and user-friendly.
 Cross platform compatibility: Increase compatibility to provide accessibility
across many operating systems and support a larger variety of platforms.
 Comprehensive reporting and analysis: Provide thorough reporting capabilities
and analytics options to give users insightful information about disk space trends
and consumption.

Conclusion

One essential tool for effectively allocating and managing disk space resources
is the Disk Space Rental Management System. Its broad applicability is demonstrated
by its use in a variety of industries, such as data centers, cloud service providers, and
educational institutions. The system's overall effectiveness is boosted by improved
resource use, simpler operations, and improved security.

JES’s ITMRN, Department of Computer Engineering 2023-24 18


REFERENCES

[1] Lu Meng, Bin Sun,“Research on Decentralized Storage Based on a Blockchain”,


Multidisciplinary Digital Publishing Institute, 2022.
[2] Nabeel Khan, Hanan Aljoaey, Mujahid Tabassum, Ali Farzamnia, Tripti Sharma,
Yew Hoe Tung, “Proposed Model for Secured Data Storage in Decentralized Cloud
by Blockchain Ethereum”, Multidisciplinary Digital Publishing Institute, 2022.
[3] Qazi Mazhar Ul Haq, Alfian Ma'arif, Wahyu Rahmaniar, “Blockchain technology”,
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2022.
[4] G. Richa Shalom, Ganesh Rohit Nirogi, “Decentralized Cloud Storage Using
Blockchain”, International Journal for Research in Applied Science & Engineering
Technology, 2022.
[5] Yogita Sharma, Ayush Agarwalla, Dhananjay Joshi, Divyanshu Prasad, “A Secure
Encrypted Digital Storage System Based on Blockchain”, International Research
Journal of Modernization in Engineering Technology and Science, 2021.
[6] Pratima Sharma, Pajni Jindal, Malaya Dutta Borah, “Blockchain Technology for
Cloud Storage: A Systematic Literature Review”, ACM Computing Surveys, 2020.
[7] Omar Ali, Ashraf Jaradat, Atik Kulakli, Ahmed Abuhalimeh, “A Comparative
Study: Blockchain Technology Utilization Benefits, Challenges and
Functionalities”, Institute of Electrical and Electronics Engineers, 2020.
[8] Yan Zhu, Chunli Lv, Zichuan Zeng, Jingfu Wang, Bei Pei, “Blockchain-based
Decentralized Storage Scheme” , IOP Publishing, 2019.
[9] Subarna Shakya, Sagar Bhusal, Anish Shrestha, Bipin Khatiwada, “Decentralized
Secure Cloud Storage using Blockchain”, Tribhuvan University Institute if
Engineering Pulchowk Campus, 2018.
[10] Saqib Ali, Guojun Wang, Bebo White, Roger Leslie Cottrell, “A Blockchain-based
Decentralized Data Storage and Access Framework for PingER”, Institute of
Electrical and Electronics Engineers, 2018.

JES’s ITMRN, Department of Computer Engineering 2023-24 19

You might also like