0% found this document useful (0 votes)
24 views12 pages

Blockchain 3&4

Uploaded by

razak4yusuf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views12 pages

Blockchain 3&4

Uploaded by

razak4yusuf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CHAPTER THREE

RESEARCH METHODOLOGY AND ANALYSIS OF THE SYSTEM

3.1 RESEARCH METHODOLOGY

This project was implemented using a combination of Hypertext Markup Language (HTML),

Laravel which is PHP framework, MySQL, and phpMyAdmin. HTML was used to design the

user interface, providing a structural framework for web pages and ensuring compatibility with

all browsers. Laravel was employed as the server-side scripting language due to its ease of

integration with HTML, efficient database interaction, wide adoption and community support,

and robust security features. MySQL was chosen as the relational database management system

(RDBMS) for its reliability, speed, and ease of use, allowing for efficient handling of large

datasets and providing robust data integrity and security. phpMyAdmin was utilized as the

database management system (DBMS) interface for MySQL, offering a user-friendly web

interface for managing databases and simplifying tasks such as creating, modifying, and querying

databases. The implementation steps included the design phase, where the interface was created

using HTML; the development phase, which involved server-side scripting with PHP; database

setup with MySQL and management using phpMyAdmin; comprehensive testing and debugging

to ensure all components worked seamlessly together; and finally, deployment of the application

to a web server. This combination of technologies provides a robust framework for developing

web applications, contributing to an efficient, secure, and user-friendly project implementation.

21
3.2 ANALYSIS OF THE EXISTING SYSTEM

The existing system, typically characterized by centralized databases and manual processes,

faces significant challenges in the modern digital landscape. Centralization creates single points

of failure, making the system vulnerable to hacking, data breaches, and unauthorized access. The

inefficiency of these systems is evident in slow transaction speeds, high operational costs, and

the need for intermediaries to validate and process transactions, leading to delays and increased

risk of errors. Data integrity and transparency are often compromised, as information can be

easily altered or manipulated without proper oversight. These limitations highlight the need for a

more secure, efficient, and trustworthy solution, which blockchain technology promises to

address by decentralizing control, enhancing security, and improving overall system efficiency.

3.3 PROBLEM OF THE EXISTING SYSTEM

1. Centralization Risks: Centralized systems have single points of failure, making them

vulnerable to hacking, data breaches, and system outages. If the central authority is

compromised, the entire system can be disrupted.

2. Lack of Transparency: Information in centralized systems can be manipulated or

altered without proper oversight, leading to a lack of transparency. Users often have

to trust that the central authority is maintaining accurate and unaltered records.

3. Security Vulnerabilities: Centralized databases are prime targets for cyberattacks.

Once breached, a vast amount of sensitive data can be accessed or stolen, leading to

severe consequences such as identity theft, financial loss, and damage to reputations.

4. Inefficiency: Traditional systems often involve multiple intermediaries to process and

verify transactions, resulting in slow transaction speeds and higher operational costs.

The involvement of third parties also increases the risk of errors and delays.

22
5. Data Integrity Issues: Maintaining data integrity is challenging in centralized

systems because they rely on trust in a single entity to ensure that the data is accurate

and consistent. There is a risk that data could be intentionally or unintentionally

altered.

6. Scalability Challenges: As the number of users and transactions grows, centralized

systems often struggle to scale efficiently, leading to performance bottlenecks and

reduced system responsiveness.

7. Limited Access and Control: Users have limited control over their data, as it is

managed by a central authority. This lack of control can lead to privacy concerns and

restrict users' ability to manage their own information.

3.4 PROPOSING A NEW SYSTEM

The proposed system is a robust Laravel-based platform designed to manage and facilitate digital

currency transactions securely and efficiently. It features a comprehensive landing page that

educates users about the fundamentals of blockchain technology, explaining its benefits such as

decentralization, transparency, and enhanced security. The system includes a powerful admin

module where administrators can add and manage various digital currencies and coins, ensuring

the platform supports a wide range of assets. Sellers are equipped with a user-friendly module

that allows them to list their digital assets for sale, providing details like pricing and availability,

while ensuring that listings are accurate and up-to-date. Additionally, the buyer details module

offers sellers transparent access to potential buyer information, enabling them to make informed

decisions and reducing the risk of fraudulent transactions. This integrated system leverages

blockchain's principles to create a secure, transparent, and trustworthy environment, fostering

23
seamless interactions between sellers and buyers while maintaining the integrity of digital

transactions.

3.5 ADVANTAGES OF THE PROPOSED SYSTEM

1. Enhanced Security: The system leverages blockchain principles to ensure that

transactions and data are securely encrypted and protected against unauthorized access

or tampering.

2. Transparency: All transactions and user interactions are transparent, allowing

participants to verify the authenticity and integrity of transactions, which reduces the risk

of fraud.

3. Decentralization: By utilizing blockchain technology, the system reduces the reliance

on a central authority, thereby eliminating single points of failure and increasing system

resilience.

4. Efficient Transaction Processing: The system is designed to handle transactions swiftly

and efficiently, minimizing delays and ensuring a seamless user experience.

5. User-Friendly Interface: The platform is easy to navigate, with dedicated modules for

administrators, sellers, and buyers, making it accessible to users with varying levels of

technical expertise.

6. Comprehensive Asset Management: The admin module allows for the addition and

management of multiple digital currencies and coins, providing a versatile platform that

supports a wide range of digital assets.

7. Trust and Reliability: By offering detailed buyer information and secure transaction

processes, the system builds trust between sellers and buyers, fostering a reliable

marketplace environment.

24
CHAPTER FOUR

DESIGN AND IMPLEMENTATION OF THE SYSTEM

4.1 DESIGN OF THE SYSTEM

4.1.1 OUTPUT DESIGN

The output design is the results obtained from the computer during the input stage. The output

design of this project is define as thus-

Figure 4.1 LandingPage

25
4.1.2 INPUT DESIGN

Figure 4.2 Signup Page

26
Figure 4.3 Login Page

27
Figure 4.4 Dashboard Page

Figure 4.5 Currency Page

Figure 4.6 Buyers Page

28
Figure 4.7 Sell Coin

Figure 4.7 Change Password

Change password: This is where you change the user password

29
4.2 IMPLEMENTATION OF THE SYSTEM

This aspect of the project shows the details how the package can be fully implemented. It can be referred

to as the users’ manual.

4.2.1 CHOICE OF PROGRAMMING LANGUAGE

In determining a suitable programming language for the design of a secured SMS Application using

cryptographic method, the factors to be considered are:-

a. The difficulty of the problem

b. The technical skills required of the computer program

c. The type of processing required

d. The availability of sub-programming facilities

e. The efficiency of the language translator

f. Ease of maintaining and updating the program

g. Hardware and software requirement

For the project work, the programming language to be used for the design of the system is PHP and

MYSQL for database management system with embedded Structured Query Language (SQL) for

database manipulation.

4.2.2 HARDWARE SUPPORT

The hardware requirements for this program are:

1. PC

2. Memory: this system requires a Higher RAM not less than 1GB RAM is recommended.

3. Storage: the storage capacity should be at a minimum of 256GB.

30
4.2.3 SOFTWARE SUPPORT

The software requirements for the operation of this program are as follows:

1. Windows Operating System

2. XAMPP or WampServer (for Apache server on localhost)

3. Web Browser e.g Google Chrome

4. Text editor (visual studio code)

4.3 DOCUMENTATION OF THE SYSTEM

Here, details of all forms used in the program are well described. There are two main categories of forms

used in this program, examples are INPUT AND OUTPUT FORM.

The input forms are used to supply data, records and all needed information into the system.

The output forms are used to display or give processed results from the input value entered into the

system. Relevant input and output and information are respectively kept in a database for easy

accessibility and enhance security measures to the stored data and information.

4.3.1 OPERATING THE SYSTEM

This refers to the step-by-step method of using the proposed system. Below are the steps to
follows:

a) In your visual studio code, click on terminal

b) Run the command: php artisan serve

c) Copy the url and paste it in your web browser

d) You are prompted to supply the username and password this verifies that you are a registered

user.

31
e) If the username and password supplied are correct as that of any account, you will be

redirected to the timetable system page where you can schedule timetable for students

examination and perform other functions.

4.3.2 MAINTENANCE OF THE SYSTEM

i. Data cable should be plugged properly ii. Repair or replacement of all damaged accessories,

system cards, peripheral e.t.c. iii. Examining the new system from time to time to ensure it is

performing as specified Operators and users to the system must constantly check the output of the

system to make sure that it is working accordingly

32

You might also like