Report of Cryptocurrency Application
Report of Cryptocurrency Application
Report of Cryptocurrency Application
Guided by
Of
BACHELOR OF ENGINEERING
In
COMPUTER ENGINEERING
2017-18
Chapter : 1 Introduction 1
1.1 Introduction 2
1.2 Project Summary 2
1.3 Scope 2
1.4 Features 2
1.5 Technology Specification 3
Chapter : 6 Conclusion 33
References 33
We wish to express our sincere gratefulness to every one of the individuals who have
added to this extend, both unequivocally and verifiably, without the co-operation of
whom, it would not have been conceivable to finish this venture.
We would like to thank our H.O.D Dr. Kinjal Adhvaryu and Asst.Prof.Kaushal Jani
(Internal Guide) for continually directing and demonstrating to us the right way to reach
towards our favored objective. Additionally I express gratitude toward them for sharing
their experience, information and valuable time with me and demonstrating their worry
in my task to improve it.
I also thank all the other faculties who directly or indirectly supported me in making my
project successful by sharing their ideas and knowledge. Finally, I might want to thank
our folks and companions who have specifically or in a roundabout way helped us in
influencing the undertaking to work effective.
TATVA SHAH
RUDRAKSH JANI
CERTIFICATE
Date:
Internal Guide:
Head of Department
CERTIFICATE
Date:
Internal Guide:
Head of Department
Ahmedabad
Abstract
We are creating an application for displaying concept & algorithms of crypto
currencies, including changes in values & cost, advantages, disadvantages and
financial future of Cryptocurrency. Further there would be a better amount
efficient cloud security and distributed storage. This would even predict the value
of the virtual currency of upcoming Months and Years. Cryptocurrency is the
future for transferring money in an efficient manner and with the use of Block
Chain technology there won’t be any kind of fake money or duplicating the
currency which has already been used somewhere else. There have been a lot of
misconceptions about these virtual crypto currency and people are afraid to use it
while the Bitcoin was not even of 1 rupee and now it’s almost at 3 lakh rupees,
People invest in the market of Crypto currency. The implementation of virtual
currency and discuss about its daily basis application to military exchange of arms
and ammunition.
These currencies do not have a fix value so there has to be a real time record and
updating the whole chart which would be compared amongst the leading crypto
currencies all over the world,
Virtual currency can be well-defined as a digital illustration of value that is issued and
controlled by its developers, and used and accepted among the members of a definite
(virtual) communal. Unlike FIAT currency, it depends on a system of conviction and not
issued by a central bank or other banking authority also these decentralized currencies
don’t even have a sever in the middle, this whole process works on PEER-PEER
connection which is quite risky and safe both at a same time.
For every individual these would make an initiative and for the miners and members of
the VC community, comparison, News and different valuation and prediction will be give
by the system.
1.3 Scope
The user interacts with the application designed by the system which would be showing
the leading crypto currency chart and real time updates of every currency. This process is
the basic process makes things look and feel good while the user is watching the charts
and predictions given by the algorithm based on old records of the market.
1.4 Features
The primary aim through this application is public awareness. People should have
information about CryptoMarket.
Rate details: Application is dynamic. So it fetches data from the CryptoMarket through
API and displays it to the user.
Currency Exchange: The Application also shows the exchange rates. For
example, exchance rate of Bitcoin with Ether.
Initiation
Planning
Execution
Controlling
Closure
The Managerial Process, 4th edition is distinguished by its balanced treatment of both the
technical and behavioral issues in project management as well as by its coverage of a
broad range of industries to which project management principles can be applied. It
focuses on how project management is integral to the organization as a whole. The 4th
edition reflects the latest changes found in the practice.
Project planning is part of project management, which relates to the use of schedules such
as Gantt charts to plan and subsequently report progress within the project environment.
Initially, the project scope is defined and the appropriate methods for completing the
project are determined. Following this step, the durations for the various tasks necessary
to complete the work are listed and grouped into a work breakdown structure.
The logical dependencies between tasks are defined using an activity network diagram
that enables identification of the critical path. Float or slack time in the schedule can be
calculated using project management software. Then the necessary resources can be
estimated and costs for each activity can be allocated to each resource, giving the total
project cost. At this stage, the project schedule may be optimized to achieve the
appropriate balance between resource usage and project duration to comply with the
project objectives.
Once established and agreed, the project schedule becomes what is known as the baseline
schedule. Progress will be measured against the baseline schedule throughout the life of
the project. Analyzing progress compared to the baseline schedule is known as earned
value management.
The inputs of the project planning phase include the project charter and the concept
proposal. The outputs of the project planning phase include the project requirements, the
project schedule, and the project management plan.
1) PROJECT ADMINISTRATION
Focuses on finding solutions within given constraints (output, time, and budget);
characterized by an early design freeze that creates a stable target for the project;
2) BUSINESS SYNERGIES
Focuses on adding value to the organization and maximizing return on investment; does
not lock down design earlier than absolutely necessary not to miss a newly emerging
opportunity; effective for managing innovation projects in the rapidly changing business
environment.
Software process model are complex and involves very large number of activities. It
defines set of activities and associated results that produce a software process.
To manage all aspects of the application, I have to divide the whole management process
in different small modules and think the designing of it. This is best done with the model
- "Boehm’s Spiral Model".
• Objective Setting:
Specific objectives for that phase of the project are defined. Constraints on the process
and the product are identified and a detailed management plan is drawn up. Project risks
are identified. Alternative strategies, depending on these risks, may be planned.
If safety risks are the main consideration, development based on formal transformations
may be the most appropriate and so on. The waterfall model may be the most appropriate
development model if the main identified risk is sub-system integration.
• Planning:
The project is reviewed and a decision made whether to continue with a further loop of
the spiral. If it is decided to continue, plans are drawn up for the next phase of the project.
Project Plan (PP) is the process of creating development goals and objectives and using
these goals and objectives to improve productivity as well as development capabilities.
The purpose of this process is generally to ensure that each project will accomplish its
development goals and objectives. Projects can be differentiated into five types of
projects: breakthrough, platform, derivative, R&D, or partnered projects. This
differentiation determines a project's development goals and objectives as well as
resources allocated to that project.
An aggregate project plan provides management with a categorized list of projects, which
balances short and long term goals. This list assists management in making difficult
decisions such as when to start projects and which projects should be cannibalized.
Starting projects in a sequential manner according to the firm's strategy as well as
resources available will allow fewer projects to continue simultaneously and improve
productivity.
A project plan, according to the Project Management Body of Knowledge, is: "...a
formal, approved document used to guide both project execution and project control. The
primary uses of the project plan are to document planning assumptions and decisions,
facilitate communication among stakeholders, and document approved scope, cost, and
schedule baselines. A project plan may be summarized or detailed.
Every task or group of tasks should be associated with project milestone. A milestone is
accomplished when one or more work products has been reviewed for quality and has
been approved. Project Milestones include completion of some defines tasks in defined
time limits.
First milestone includes study of project related coding languages and their techniques
and tools.
Second milestone includes analysis of project and designing. Then we have started
coding to develop first prototype which includes homepage and some simple pages like
login, register etc. pages.
The risk management practice, which involves risk identification, analysis, prioritization,
planning, mitigation, monitoring, and communication Software development risks that
seem to reoccur in educational and industrial Projects risk-driven process for selecting a
software development model.
Risk in itself is not bad; risk is essential to progress, and failure is often a key part of
learning. But we must learn to balance the possible negative consequences of risk against
the potential benefits of its associated opportunity. A risk is a potential future harm that
may arise from some present action such as, a schedule slip or a cost overrun. The loss is
often considered in terms of direct financial loss, but also can be a loss in terms of
credibility, future business, and loss of property or life.
It is helpful to understand the different types of risk so that a team can explore the
possibilities of each of them. Each of these types of risk is described below.
• BUSINESS RISKS
Business risks are those that threaten the viability of the software, such as building an
excellent product no one wants or building a product that no longer fits into the overall
business strategy of the company.
There are some specific factors to consider when examining project, product, and
business risks. Some examples of these factors are listed here, although this list is meant
to stimulate you thinking rather than to be an all-inclusive list.
People risks are associated with the availability, skill level, and retention of the people on
the development team. Size risks are associated with the magnitude of the product and
the product team. Larger products are generally more complex with more interactions.
Larger teams are harder to coordinate.
The risk identification process should stop short of assessing or analyzing risks so that it
does not inhibit the identification of "minor" risks. The process should promote creative
thinking and leverage team experience and knowledge.
They are both characterized by estimates of their probability of occurrence and the
magnitude of their impact. The distributions of cost are then added up in a risk analysis to
determine the uncertainty in the total cost of the project.
Risks and opportunities are identified for each task and an analysis is performed to
determine the total duration of the project and, usually, the durations until specific
milestones within the project are achieved.
A schedule risk analysis is generally more complex to perform than a cost risk analysis
because the logical connections between the tasks have to be modeled in order to
determine the critical path.
The Engineering and Construction Management defines risk planning as the detailed
formulation of a plan of action for the management of risk. Risk planning is iterative and
includes describing and scheduling the activities and processes to assess, mitigate,
monitor, and document the risk associated with a project. Large projects or projects with
a high degree of uncertainty, the result should be a formal risk management plan.
Risk plan should be documented, but the level of detail will vary with the unique
attributes of each project. Risk management plans that record all aspects of risk.
In cases of going in for standard 'off the shelf' system solutions, quite often, the business
processes of an enterprise and those imbibed in ready-made product, differ widely. While
the 'off the shelf' packages ensure standardization and incorporation of the best, a blind
adoption of the same results in unmanageable change management issues which makes
the project unsuccessful. On the other hand, too much of customization defeats the very
purpose of going for a standard product apart from project cost escalations. Requirements
analysis is critical to the success of a systems or software project. The requirements
should be documented, actionable, measurable, testable, traceable, related to identified
business needs or opportunities, and defined to a level of detail sufficient for system.
The application operators are being categorized into three main categories:
• Registered users
• Admin
• Can log in
• Enter CryptoMarket
• View different categories of Cryptocurrency
• View Rates of different websites
• Know the exchange rates
• Get the basic Information
• logout
Admin:
• Can Log in
• Maintain database
• Search API’s
• View Details
• Logout
A data model can be thought of as a diagram or flowchart that illustrates the relationships
between data. Although capturing all the possible relationships in a data model can be
very time-intensive, it's an important step and shouldn't be rushed. Well-documented
models allow stake-holders to identify errors and make changes before any programming
code has been written.
Data modelers often use multiple models to view the same data and ensure that all
processes, entities, relationships and data flows have been identified. There are several
different approaches to data modeling, including:
Similar to conceptual data modeling, but addresses the unique requirements of a specific
business.
Representation of a real world situation about which data is to be collected and stored in a
database. A data model depicts the dataflow and logical interrelationships among
different data elements.
Admin:
4.8.3 ER Diagram
Virtual Currency is the new gold which is lighter in weight but more
profitable cause this new gold basically gives high returns. This
currency is again not centralized and therefore the currency does not
gets banned or something as the currency is not controlled by the bank
or federal authorities.
REFERENCES