Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER-1
INTRODUCTION
1.1 Introduction
Digital forms of money seek to be another type of cash and guarantee to keep up trust in the
soundness of their incentive using innovation. Blockchain, the innovation behind the Bitcoin
cryptographic money framework, offers a solid exchange of advanced information over the
system without the obstruction of any outsider element.
Bitcoin is the most prevalent model that is naturally attached to blockchain innovation. It is
likewise the most disputable one since it empowers a multibillion-dollar worldwide market of
unknown exchanges with no legislative control.
T.R.O.J.4.N will be another type of Cryptocurrency that will be made utilizing blockchain
innovation. A straightforward UI to deal with the cash will likewise be created.
1.2 Purpose
Cryptocurrency works on the theory of solving encryption algorithms to create unique hashes
that are finite in number. Combined with a network of computers verifying transactions, users
are able to exchange hashes as if exchanging physical currency.
T.R.0.J.4.N - Our Own Cryptocurrency will be created with the traditional methods using new
age concepts like blockchain and with the base language as python. The basic purpose of this
project is to gain in depth knowledge of Blockchain, Python.
The user interface can be easily operated by naive users. The building of UI will technologies
like HTML, CSS and JS. Since the blockchain will be on built on python, Flask will be used
to integrate designing with blockchain.
1.3 Scope
Reducing the burden of paperwork & counterfeit fake identities.
Transparency and automation within the patient-to-hospital or patient-to-doctor
transactions.
Streamline installments handling with high productivity, quick and secure exchanges.
Forging the control of votes amid decisions.
Purchase or pitch things without paying any commission to outsiders.
The ability of IoT applications to contribute transactional data to blockchains.
Expanded security with a move from brought together information security to a
decentralized system.
Battle hacking with the changelessness of record.
Blockchain
On the off chance that it is substantial, it gets added to a square. At the point when new
square is distributed to the system, all members (hubs) will run calculation to approve
the square.
Majority of the nodes have to agree that the new block is valid and if so, it will be added
to the blockchain.
When a square of information is recorded on the blockchain record, information turns
out to be progressively secure as the blockchain develops.
There are two main types of blockchains: public and private. Bitcoin has a public ledger
i.e. a public blockchain, where anyone is allowed to contribute.
There is no need for a third authority to grant permissions. Private blockchain is a
network where all the participants are known and trusted and the consensus process is
managed by a pre-selected set of participants.
In our examination we consider both open and private blockchains along the
accompanying properties: –
Platforms - we are considering implementations of the blockchain technology
that introduce different approaches to privacy and smart contracts.
Actors - we need to know who the performing artists are and what jobs they
play in the given blockchain innovation.
Services - what administrations are given by the blockchain stage? Who
cooperates with the administrations (business level)?
Processes - what are the underlying processes to services? How do network,
transaction and mining/consensus processes work?
Data models - what are the elements that hold data? What are the connections
between them?
Summary:
Summary:
Summary:
Summary:
CHAPTER-2
SOFTWARE PROJECT MANAGEMENT
CHAPTER-3
SYSTEM REQUIREMENT STUDY
2. End User
End user is the person who uses the resultant software for their desired purpose. They
don’t know anything about the coding or how the program is made. Their scope is only
to use the software.
RAM 4GB
Disk 60GB
GPU 2GB
3.3 CONSTRAINTS
1. Time Constraints:
There exist strict deadlines for each phase of the process, so the
constraint of meeting the deadlines is of utmost concern.
2. Tool Constraints:
Using Graphics and AI Engines leads to limitations within the
corresponding domain according to the implementation of functionalities.
While engines reduce the burden of low-level programming, they
introduce constraints to the capabilities of the project.
3. Personnel Constraints:
The project is subject to balanced distribution of the limited workforce.
CHAPTER-4
SYSTEM ANALYSIS
2. Security
Type of data being shared, and with whom
How is identity achieved
Confidentiality of transaction queries
Who verifies (endorses) transactions
3. Resiliency
Resource failure
Malicious activity
Non-determinism
1. Operational Feasibility
The System is to be produced for any client who needs to utilize it. We need our
framework easy to use and simple to utilize.
The administrator likewise might be non-specialized, so the UI will be structured
so that it gets settled for non-specialized individual to work effectively.
2. Technical Feasibility
It is an incomplete estimation of a particular specialized arrangement and the
accessibility of specialized hotels and ability.
The expert must see if the present specialized assets, which are accessible in the
framework is fit for dealing with the activity.
On the off chance that not, at that point the examiner with the assistance of
designer ought to affirm whether the innovation is accessible and proficient or not.
Better Considering:
Here we have to consider those tools, which are required for developing the
project.
As far as basic knowledge concerned, we have studied basic of python,
blockchain, ML, DS, and DL.
3. Schedule Feasibility
Schedule feasibility compares to whether the adequate time is accessible to
finish the task.
Factor considered:
Schedule of the project
Time by which project has to be completed
Reporting period
4. Economic feasibility
Economic feasibility is a measure of cost effectiveness of a project or solution.
For declaring that the system is economically feasible, the benefits from the
project should exceed or at least to the equal to the cost of development.
4.5 Canvases
4.5.1 AEIOU CANVAS
4.7.2 Block
The block consists of three items the hash of the previous block, the index and the list
of transactions.
Model complex activities and business workflows in a high level activity diagram
Identify candidate use cases and pre- and post-conditions for use cases through the
examination of business workflows
How the events within a single use case relate to one another, and in particular, where
activities may overlap and require coordination among use cases
How a collection of use cases coordinate to create a workflow for an organization
Model workflows between/within use cases
4.8.2 Consensus
New transactions are broadcasted to all nodes.
Each node binds new transactions into a block.
Each node works on finding a difficult proof-of-work number for its block.
When a node finds a proof-of-work, it broadcasts the block to all nodes.
Nodes accept the block only if all transactions in it are valid and not already spent.
Nodes express their acknowledgment of the square by taking a shot at making the following
square in the chain, utilizing the hash of the acknowledged square as the past hash.
Nodes always consider the longest chain to be the correct one and will keep working on
extending it.
possibilities.
1. Block Creation
2. Adding valid Blocks in Blockchain
3. Validity check of blockchain
4. User interaction
5. Managing Funds, blockchain and transactions
Module Wise Description
1. Block Creation
A typical block in our project includes the address of previous block,
index of the block and the transactions.
Every block is created only after it satisfies certain security conditions
So this going to be an add-on in this project.
2. Adding valid Blocks in Blockchain
After the block is created it is added to the blockchain.
Also we wanted to store the result separately in a file on the system of
user’s choice of format, currently we can store it in a text file or a binary
file.
Our goal is to keep the valid blockchain separately on the disk in a .txt
file or in a binary format.
3. Validity check of blockchain
The blockchain cannot be created with a special algorithm created by us
known as ‘Consensus’.
Consensus means that the blockchain of a new node will be valid only
after the majority(i.e. 51%) of nodes agree on the fact that the chain is
valid.
4. User interaction
The UI is very simple, anyone even a person with a non-technical
background can easily use this software, which makes it easy to use.
CHAPTER-5
SYSTEM DESIGN
Systems design is the way toward characterizing the engineering, parts, modules, interfaces,
and information for a framework to fulfil indicated necessities. The System Design Description
report provides summary or detailed information about a system design represented by
a model. Systems design is, along these lines, the way toward characterizing and creating
frameworks to fulfil indicated necessities of the client.
5.1 System Procedural design
5.2 Screenshots
CHAPTER-6
CONCLUSION
Blockchain, the technology behind the Bitcoin cryptocurrency system, offers reliable transfer
of digital data over the network without the interference of any third party entity. We
developed T.R.O.J.4.N - Our own cryptocurrency based on the emerging concepts of
blockchain. The working model has been crafted using python. The UI has been built using
Flask. The UI helps us to manage the cryptocurrency providing an oversight over the number
of nodes present in the network, number of blocks in the chain, records of successful
transactions.
CHAPTER-7
APPENDIX
Fig.7.1.1 PPR-1
7.1.2 PPR-2
Fig.7.1.2 PPR-2
7.1.3 PPR-3
Fig.7.1.3 PPR-3
7.1.4 PPR-4
Fig.7.1.4 PPR-4
8. BIBLIOGRAPHY
[1] https://patents.google.com/patent/US20170132626A1/en?oq=US20170132626A1
[2] https://patents.google.com/patent/US20180285879A1/en?oq=US20180285879A1
[3] https://patents.google.com/patent/CA2981511C/en?oq=CA2981511C
[4] https://patents.google.com/patent/US20170103468A1/en?oq=US20170103468A1
[5] https://www.python.org/doc/
[6] http://flask.pocoo.org/
[7] https://pycryptodome.readthedocs.io
[8] https://cointelegraph.com/explained/proof-of-work-explained