Table of Content
Table of Content
ABSTRACT
LIST OF FIGURES
1. CHAPTER 1 : INTRODUCTION
1.1 GENERAL 1
1.2 OBJECTIVE 2
3
1.3 EXISTING SYSTEM
1.3.1EXISTINGSYSTEM DISADVANTAGES 3
3. CHAPTER 3 : REQUIREMENTS
3.1 GENERAL 18
3.2 HARDWARE REQUIREMENTS
18
3.3 SOFTWARE REQUIREMENTS
18
1
4. CHAPTER 4 : SYSTEM DESIGN
4.1 GENERAL
19
4.1.1 USE CASE DIAGRAM 19
5.1 GENERAL 30
5.2 FRAMEWORKS 31
CHAPTER 6 : IMPLEMENTATION
6. 6.1 GENERAL 33
6.2 IMPLEMENTATION 33
2
7. CHAPTER 7 : SNAPSHOTS
7.1 GENERAL 88
8.1 GENERAL 99
9. CHAPTER 9 :
10 CHAPTER 10 :
3
LIST OF FIGURES
FIGURE NO NAME OF THE FIGURE PAGE NO.
4
CHAPTER 1
INTRODUCTION
1.1 GENERAL
There is an aggressive pace of change in the automotive sector. Electric cars, autopilot, smart
car and many other things which are bringing both challenges and opportunities into the
industry. Indeed, blockchain technology can help solve these issues as well as form the basis
for novel business designs.A blockchain is one of the many distributed ledger technologies that
may be used to make recordkeeping secure and untamperable. This may transform how auto
industries share as well manage their data.
This paper will discuss the following potential applications of blockchain technology in the
automotive industry: Vehicle manufacturing: The blockchain technology can follow how parts
or components travel during manufacture, also guaranteeing the reliability of cars. Supply chain
management: Transparency and efficiency the automotive supply chain can be enhanced
through blockchain.
• Insurance: Insurers also need to embrace blockchain in order to streamline the claim
management process as well as combat fraud.
The auto supply chain entails a multinational web of manufactures and suppliers. It becomes
hard to follow the products movement as well as ensuring all partners are informed through
5
same document simultaneously. These issues may be resolved through blockchain technology
that can provide a reliable mechanism for recording the history of events in the supply
[Link] movement of goods and materials through the manufacturing process from raw
material inputs to finished items could be traced by a blockchain based record management
system in the automotive supply chain. These documents may include contracts, invoices, or
even quality control reports. Secondly, the system could be utilized to serve as a document
storing and sharing facility.
1.2 OBJECTIVE
The objective of this project is to develop a blockchain-based system that enhances the security,
transparency, and efficiency of the automotive industry by securely managing vehicle
manufacturing, supply chain, servicing, and insurance processes. The primary goal is to create
a decentralized, immutable ledger that records all relevant data, ensuring that vehicle details,
spare parts, and service histories are tamper-proof and easily accessible to authorized
stakeholders. The system will leverage blockchain technology to store and encrypt car
manufacturing details, using SHA-256 for securing vehicle data whenever new cars are added.
This will help in providing a transparent and trustworthy history of each vehicle, allowing both
manufacturers and consumers to verify the authenticity of parts, service records, and insurance
claims. Additionally, the project aims to streamline operations by reducing paperwork,
eliminating intermediaries, and automating processes, ultimately lowering operational costs
and minimizing the risk of fraud. The system will also improve the traceability of vehicle
components across the supply chain, enhance the customer experience by providing access to
accurate information, and ensure compliance with regulatory standards. Overall, the project
seeks to revolutionize the way car manufacturers, service providers, and customers interact
with data in the automotive industry.
6
1.3 EXISTING SYSTEM
The existing system in the automotive industry involves various traditional methods for
managing records related to vehicle manufacturing, supply chain management, servicing, and
insurance. These processes are often paper-based or rely on centralized databases, making them
vulnerable to security breaches, inefficiencies, and lack of transparency. Vehicle manufacturing
records are typically stored in isolated systems, leading to potential mismanagement of data
and errors in production. Similarly, supply chain management faces challenges such as
counterfeit parts, fraud, and difficulty in tracking parts' origins. Vehicle servicing records are
often fragmented across different garages, making it hard for consumers and service providers
to access consistent histories of a vehicle’s condition and repairs. In insurance, the lack of
streamlined communication between stakeholders can lead to fraudulent claims or delays in
processing. The traditional systems also have limited mechanisms for ensuring data integrity
and often require intermediaries, resulting in higher operational costs and slower transactions.
Thus, the current automotive industry ecosystem faces significant challenges in terms of
security, transparency, and efficiency.
1. Lack of Transparency: The existing systems in the automotive industry often rely on
centralized databases or paper-based records, which lack transparency and real-time
access. Consumers, manufacturers, and service providers may not have full visibility
into the vehicle's history, such as its parts' origin, repair records, or manufacturing
details. This lack of transparency can lead to trust issues, especially in cases of vehicle
resale or insurance claims, where stakeholders have limited access to accurate and upto-
date information.
2. Data Integrity Issues: In the current system, the integrity of records is often
compromised due to human error, system failures, or deliberate tampering. For
example, vehicle service records may be modified, and counterfeit parts can be inserted
into the supply chain without detection. This weakens the overall reliability of the data
and can result in defective or unsafe vehicles reaching consumers. The absence of a
tamper-proof system increases the risk of fraud and mismanagement.
3. Security Vulnerabilities: Traditional systems storing sensitive automotive data are
vulnerable to cyberattacks and unauthorized access. Centralized databases, which store
vast amounts of personal, vehicle, and financial data, become attractive targets for
7
hackers. Once breached, this data can be exploited for malicious purposes, such as
identity theft or fraud. Additionally, the lack of proper encryption or secure data
transmission protocols further heightens the risk of data leakage.
4. Inefficiencies and Delays: Existing processes in vehicle manufacturing, supply chain
management, servicing, and insurance involve multiple intermediaries, causing
inefficiencies and delays. Each step of the process requires verification from various
stakeholders, leading to longer wait times and higher administrative costs. For instance,
insurance claims are often delayed due to the need for verification from various parties,
and automotive parts may take longer to track through a multi-tiered supply chain.
These delays reduce the overall efficiency of the industry.
5. High Operational Costs: Traditional systems often require the involvement of
intermediaries, such as banks, insurance agents, and supply chain managers, to validate
transactions and ensure the flow of information. Each intermediary adds an additional
layer of cost and complexity to the process. This increases operational costs for
automotive manufacturers, service providers, and consumers. For example, manual
verification processes, paperwork, and redundant intermediaries in the supply chain all
contribute to unnecessary expenses.
6. Limited Accessibility and Fragmentation: Data related to vehicles is often stored in
isolated, proprietary systems that lack interoperability. Vehicle servicing records, for
instance, may be stored by individual repair shops, making it difficult for consumers or
other service providers to access comprehensive vehicle histories. Similarly, data
related to parts and components may be scattered across multiple suppliers, making it
hard to track their provenance. This fragmentation complicates data access and can lead
to miscommunication and inefficiency.
7. Risk of Fraud and Counterfeit Products: The automotive industry faces significant
challenges related to counterfeit parts and fraudulent insurance claims. Without an
immutable record of part origins or vehicle repairs, it becomes easy for counterfeit parts
to enter the supply chain undetected, compromising vehicle safety.
8. Limited Scalability: As the automotive industry grows and globalizes, the current
systems struggle to scale effectively. Managing data across multiple regions and
jurisdictions becomes increasingly complex due to inconsistent standards and lack of
integration.
8
SCOPE OF THE PROJECT
The scope of this project extends to the implementation of a blockchain-based platform that
will enhance the overall management and security of various automotive processes, including
vehicle manufacturing, parts supply chain, servicing, and insurance. By leveraging blockchain's
decentralized nature, the system will ensure secure and transparent storage of crucial data such
as vehicle specifications, parts details, service histories, and insurance claims. The use of SHA-
256 encryption will ensure that all car details are securely hashed and stored, protecting against
data tampering and unauthorized access. The project will aim to simplify and automate the
management of spare parts inventory and manufacturing records, making the supply chain more
efficient and traceable. Additionally, it will enable real-time access to verified vehicle histories,
empowering consumers and service providers with reliable information to reduce fraud and
counterfeiting. The project will address regulatory requirements by offering an auditable,
immutable record of transactions, ensuring compliance with industry standards. Through the
development of this blockchain-based system, the project seeks to optimize automotive
industry operations, reduce costs, enhance data accuracy, and improve the overall customer
experience, while creating a more interconnected, secure, and transparent ecosystem for all
stakeholders involved. Furthermore, the system will be designed with scalability in mind,
ensuring that it can accommodate the growing demands of the automotive sector as it evolves.
The purpose of this project is to revolutionize the automotive industry by integrating blockchain
technology to improve the security, transparency, and efficiency of key processes such as
vehicle manufacturing, parts supply chain management, servicing, and insurance. The project
aims to create a secure, decentralized system where all vehicle-related data, including
manufacturing details, spare parts information, service histories, and insurance claims, are
recorded on an immutable blockchain ledger. By doing so, it seeks to eliminate the risks of data
tampering, fraud, and counterfeiting, ensuring that all stakeholders, including manufacturers,
consumers, and service providers, can trust the authenticity and integrity of vehicle-related
information. Additionally, the project aims to streamline operations by reducing paperwork,
automating manual processes, and cutting down on the reliance on intermediaries, thus
lowering operational costs. The purpose is also to enhance customer satisfaction by providing
them with verified, transparent, and easily accessible data about their vehicles, improving the
overall ownership and service experience. Furthermore, the project aims to address
9
industrywide challenges such as inefficient supply chain management, delayed insurance
claims, and lack of traceability in vehicle parts, ultimately contributing to a more sustainable,
costeffective, and secure automotive ecosystem.
TITLE: Performance Breakdown and Redistribution Amidst OSPF, EIGRP & IS-IS
Dynamic Routing Protocols in IPv6 Network
YEAR: 2023
AUTHOR: Ganesh Babu C, Banupriya N, Nagarajan N DESCRIPTION:
This paper analyzes the performance of three major dynamic routing protocols—OSPF, EIGRP,
and IS-IS—within the context of IPv6 networks. The authors evaluate the performance
breakdown of these protocols under varying network conditions, focusing on aspects such as
routing table size, convergence time, and fault tolerance. The study provides an in-depth
comparison of each protocol's ability to handle different network topologies, ensuring a
comprehensive understanding of their strengths and weaknesses in real-world IPv6 deployment
scenarios.
In addition to the performance analysis, the paper discusses the redistribution of routing
information between the protocols, which is crucial for maintaining the stability and reliability
of an IPv6 network. The authors present experimental results comparing the three protocols
under dynamic conditions and highlight the specific scenarios in which each protocol excels.
By offering insights into the practical applications of these routing protocols in IPv6 networks,
this research serves as a valuable resource for network engineers looking to optimize routing
strategies and ensure network performance.
This paper delves into the advancements in neural machine translation (NMT) using attention
mechanisms, which significantly enhance the accuracy and fluency of machine-generated
10
translations. The authors explore the role of the attention mechanism in overcoming limitations
of traditional sequence-to-sequence models, where long sentences or complex structures often
posed challenges for accurate translation. By introducing attention mechanisms, the model can
focus on different parts of the input sequence, making it more contextually aware and
improving the translation quality, especially in languages with intricate grammatical structures.
The paper also highlights the key innovations and improvements made in NMT, particularly in
terms of computational efficiency and handling diverse linguistic features. The authors discuss
various architectures, such as Transformer models, that have been designed to take full
advantage of attention mechanisms. With experimental results demonstrating improvements in
translation tasks, the paper underscores the potential of attention-based NMT systems to
revolutionize machine translation across multiple languages and contexts. These findings are
important for researchers and developers aiming to enhance the performance of automated
translation systems in real-world applications.
This paper presents an innovative system for managing street lights based on a low-power wide-
area network (LPWAN) using LoRa technology. The system is designed to optimize energy
consumption while ensuring efficient and secure operation of street lights. LoRa, known for its
long-range communication capabilities with minimal power usage, makes it an ideal solution
for smart city infrastructure. The authors describe how the system can automatically adjust
lighting levels based on environmental conditions, ensuring energy savings while maintaining
optimal street lighting for public safety.
Moreover, the system also incorporates advanced security features to protect the integrity of
the data exchanged between street lights and central management systems. The research
emphasizes the dual benefits of this solution: reducing energy costs and enhancing the security
of the street lighting network. The authors propose a secure communication protocol to ensure
that unauthorized access is prevented and that the system remains resilient against potential
11
cyber threats. This approach has the potential to improve the sustainability of urban
infrastructure, offering a scalable solution for smart city projects around the world.
This paper introduces a Modified Deep Learning Neural Network (MDLNN) model aimed at
predicting the risk of melancholy or depression among IT professionals. The study draws
attention to the growing mental health concerns in the IT sector, where long working hours and
high stress are prevalent. The authors develop a novel deep learning-based approach to predict
the likelihood of melancholy using a variety of psychological and work-related factors,
including stress levels, work-life balance, and job satisfaction.
The paper emphasizes the need for early intervention and offers a potential solution for mental
health management in the workplace. By using deep learning, the system can accurately
identify at-risk individuals and provide targeted support. The authors discuss the methodology
behind the MDLNN model, its accuracy in prediction, and how it could be deployed within
organizations to monitor employee well-being proactively. This research highlights the
importance of addressing mental health in high-stress industries and offers a technological
approach to improving overall workplace health.
This article explores the potential of blockchain technology to transform supply chain
management by increasing transparency, traceability, and sustainability. The authors examine
how blockchain can help mitigate common challenges in supply chains, such as fraud,
counterfeiting, and inefficiencies. By creating immutable records of transactions, blockchain
can ensure that products are sourced ethically, tracked accurately, and delivered transparently.
12
The paper also highlights the environmental benefits of blockchain, such as reducing
paperwork and minimizing carbon footprints.
Despite its advantages, the paper identifies several barriers to the widespread adoption of
blockchain in supply chains. These include high implementation costs, resistance to change,
and the complexity of integrating blockchain with existing systems. The authors also discuss
regulatory concerns and the need for standardization across the industry. Through theoretical
analysis, the paper provides a framework for understanding the barriers and outlines potential
strategies to overcome them, offering insights for researchers and practitioners aiming to
integrate blockchain into sustainable supply chain practices.
TITLE: Single Channel Speech Enhancement Using a New Binary Mask in Power
Spectral Domain
YEAR: 2018
AUTHOR: R. Nuthakki, A. S. Murthy, and D. Naik DESCRIPTION:
This paper introduces a novel speech enhancement method that applies a binary mask in the
power spectral domain to improve the quality of single-channel speech signals. The method is
designed to work in noisy environments where traditional speech enhancement techniques
struggle. The binary mask, derived from power spectral information, helps isolate the speech
signal from noise, resulting in a clearer and more intelligible output. The authors demonstrate
the effectiveness of their approach through various experiments, comparing it with existing
speech enhancement techniques.
The paper provides a detailed explanation of the algorithm used to create the binary mask and
discusses its advantages over other methods, such as improved signal-to-noise ratio and better
preservation of speech clarity. The authors also explore potential applications in fields like
telecommunications, hearing aids, and voice recognition systems. By offering a robust solution
to speech enhancement in challenging environments, this research contributes significantly to
the field of signal processing and improves the usability of speech-based technologies in
realworld scenarios.
13
AUTHOR: P. Dutta, T. M. Choi, S. Somani, and R. Butala DESCRIPTION:
This paper discusses the application of blockchain technology in supply chain operations,
outlining its potential to address issues such as transparency, traceability, and fraud. The authors
analyze how blockchain can streamline processes by providing an immutable ledger for
transactions, which can be especially valuable in industries with complex supply chains. The
paper identifies several areas where blockchain can be applied, including inventory
management, logistics, and certification of product authenticity, ultimately improving the
efficiency and reliability of global supply chains.
The authors also delve into the challenges faced when implementing blockchain in supply
chains, including scalability issues, integration with existing technologies, and regulatory
hurdles. Despite these challenges, the paper outlines various research opportunities to explore
how blockchain can be better integrated into supply chain systems. It encourages further
investigation into the technical, economic, and social implications of blockchain adoption and
provides a roadmap for researchers seeking to contribute to the development of
blockchainbased supply chain solutions.
TITLE: An Intelligent Approach for Dynamic Network Traffic Restriction Using MAC
Address Verification
YEAR: 2020
AUTHOR: M. Anathi, K. Vijayakumar DESCRIPTION:
This paper proposes an intelligent system for dynamically restricting network traffic based on
MAC address verification. The method ensures that only authorized devices are allowed to
access the network, providing an additional layer of security against unauthorized access and
cyber threats. The system monitors network traffic in real-time, identifying and restricting
devices whose MAC addresses are not recognized or have been flagged for suspicious activity.
This approach helps protect sensitive data and prevents malicious devices from gaining access
to critical network resources.
The paper further discusses the efficiency of the proposed system in reducing network
congestion and enhancing security. The authors highlight the benefits of using MAC
addressbased traffic filtering as a cost-effective and low-complexity solution for enhancing
network security. By preventing unauthorized devices from connecting to the network, the
14
approach not only strengthens security but also improves overall network performance. The
research offers a practical solution for organizations seeking to bolster their network security
and prevent unauthorized access in dynamic network environments.
TITLE: Blockchain for Mobility Services: Personalized Mobility through Secure Data
YEAR: 2018
AUTHOR: IBM Corporation DESCRIPTION:
The paper highlights the advantages of using blockchain to ensure transparency and security in
mobility services, addressing concerns over data privacy and fraud. It also explores the
potential for personalized services, where users can tailor their transportation options based on
their individual preferences and requirements. By discussing various use cases and benefits of
blockchain in the mobility sector, the paper showcases how this technology can revolutionize
the way people access and experience transportation services in the future.
TITLE: Human Gene and Disease Associations for Clinical-Genomics and Precision
Medicine Research
YEAR: 2020
AUTHOR: Ahmed Z, Zeeshan S, Mendhe D, Dong X DESCRIPTION:
This paper investigates the relationship between human genes and diseases, focusing on the
role of genomics in precision medicine. The authors explore how genetic data can be used to
predict disease susceptibility and guide personalized treatment strategies. The research
emphasizes the importance of large-scale genomic databases in identifying gene-disease
associations and enabling more accurate and targeted interventions. This data-driven approach
15
is crucial for advancing precision medicine and improving healthcare outcomes by tailoring
treatments to individual genetic profiles.
The paper further discusses the integration of clinical-genomic data in healthcare systems,
providing insights into how clinicians can utilize genetic information to make better-informed
decisions. By focusing on gene-disease associations, the research highlights the potential for
genomics to revolutionize disease prevention, diagnosis, and treatment. This paper offers a
valuable perspective on the intersection of genomics and medicine, emphasizing the need for
continued research and innovation to leverage genetic information for personalized healthcare.
16
3. Transparency: With blockchain, every transaction or data entry is recorded in a
transparent and immutable ledger. This allows stakeholders, such as car manufacturers,
service providers, and customers, to access a trustworthy history of a vehicle, including
manufacturing details and part origins, fostering confidence and reducing disputes.
4. Streamlined Supply Chain Management: By integrating blockchain into the supply
chain, manufacturers can track parts from production to delivery, ensuring that every
component is verified and documented. This reduces delays, minimizes the risk of
counterfeit parts entering the market, and improves overall supply chain efficiency.
5. Cost Efficiency: Blockchain reduces the need for intermediaries and eliminates the
costs associated with maintaining multiple centralized databases. By using a single,
decentralized ledger, car manufacturers and other stakeholders can reduce
administrative overhead and lower operational costs.
6. Enhanced Customer Trust: Consumers can verify the authenticity and condition of a
vehicle before purchasing, thanks to the transparent, immutable records on the
blockchain. The ability to view verified specifications, features, and service histories
increases consumer confidence in the product, leading to higher satisfaction and loyalty.
7. Faster Transactions: Blockchain allows for faster, automated transactions without the
need for intermediaries. Whether it's updating vehicle details or processing a service
request, blockchain's decentralized network speeds up operations, reducing delays that
would normally occur with traditional systems.
8. Scalability: The blockchain-based system can easily scale as the automotive industry
grows, managing larger datasets efficiently without compromising security or
performance. As more vehicles are added to the system, the network will be able to
handle an increasing volume of transactions and data without significant changes to the
underlying infrastructure.
9. Improved Record Keeping: Blockchain ensures that vehicle records are accurately
stored and accessible in a decentralized manner, preventing the risk of data loss due to
server failures or human errors. This ensures that important records, such as
manufacturing details, repair logs, and insurance information, are always available
when needed.
10. Compliance with Regulations: Blockchain’s transparency and traceability features
help car manufacturers and service providers comply with industry regulations and
standards. The immutable nature of blockchain ensures that records are always
accurate, making it easier to provide proof of compliance during audits or inspections.
17
CHAPTER 2
2.1 GENERAL
METHODOLOGIES
Methodologies in block chain management systems are essential for guiding the development
and implementation processes to ensure efficiency and effectiveness. Traditional
methodologies like Waterfall follow a sequential, linear approach, where each phase of the
project—such as requirements gathering, design, implementation, and testing—is completed
before moving on to the next. This approach can be rigid, making it challenging to
accommodate changes once the project is underway. In contrast, modern methodologies like
Agile offer a more flexible and iterative approach. Agile divides the project into smaller,
manageable iterations or sprints, allowing for continuous user feedback and adjustments
throughout development. This iterative process facilitates early delivery of functional
components, promotes collaboration, and enhances adaptability to evolving needs. Agile’s
focus on incremental progress and responsiveness makes it particularly effective in managing
the dynamic requirements of hostel management systems, ensuring that the final product is
well-aligned with user expectations and operational demands.
AGILE METHODOLOGY
Agile methodology is a flexible and iterative approach to project management and software
development that emphasizes collaboration, customer feedback, and continuous improvement.
Unlike traditional methodologies, Agile breaks projects into smaller, manageable units called
iterations or sprints, each delivering a functional piece of the overall system. This allows teams
to develop and refine the product incrementally, incorporating feedback from stakeholders at
each stage. Agile fosters a collaborative environment where team members work closely with
users.
Steps Involved:
• Sprint Planning: Break the project down into smaller tasks, with clear goals for each
iteration (e.g., implementing smart contracts, creating a user login system).
18
• Design & Development: Develop the system in iterations, each focused on a specific
set of features (e.g., a sprint focused on student registration, another focused on
certificate verification).
• User Feedback: After each sprint, gather feedback from users (e.g., academic
institutions, students) to ensure that the system aligns with their needs.
Advantages:
2.2. MODULES
• Admin Module
• Car Manufacturing Module
• Customer Module
The Admin Module is the central management system for overseeing the car manufacturing
and customer-related activities within the blockchain-based automobile platform. This module
is responsible for adding car details to the database, securing car information, reviewing
customer feedback, and ensuring that all car-related data remains tamper-proof and protected
using blockchain technology. Blockchain ensures the authenticity, security, and integrity of car
details, providing transparent records that can be accessed only by authorized users.
Car Registration and Management: The Admin is responsible for adding new car models into
the system, including detailed specifications, features, and pricing. Car details, once entered,
are secured using blockchain, where each car record is assigned a unique hash to ensure that it
cannot be altered or tampered with. The Admin can view and edit car information, ensuring
accuracy and integrity.
Security and Blockchain Integration: All car details are stored in a decentralized manner using
blockchain technology. The blockchain ensures that no unauthorized access can occur, and
19
every change made to the car database is logged and immutable, providing a transparent audit
trail. The use of SHA-256 encryption ensures that the car details are further protected from any
unauthorized access.
Feedback Management: The Admin is responsible for reviewing customer feedback. After
customers have made purchases or interacted with the car platform, they can submit feedback,
which is collected and displayed to the Admin. This helps improve customer satisfaction and
allows the Admin to monitor car performance and customer satisfaction. Feedback is securely
stored and encrypted using blockchain to prevent tampering.
Key Features:
The Car Manufacturing Module is dedicated to managing the processes involved in assembling
and producing cars, focusing on managing spare parts and ensuring accurate tracking of
materials required for car production. This module supports efficient production workflows by
using blockchain technology to secure and track all manufacturing data, providing transparency
and traceability throughout the entire manufacturing process.
Spare Parts Management: The Car Manufacturing Module stores and manages details of all
spare parts required for the production of cars. Each part’s details, including part numbers,
quantities, and suppliers, are securely stored on the blockchain. This ensures that any changes
or updates made to spare parts are logged and tracked for transparency and accountability.
Spare Parts Storage and Analysis: The module allows for the analysis of spare parts usage,
helping manufacturers forecast the number of parts required for each car model. The system
generates graphs and charts to visualize the data, assisting manufacturers in making informed
20
decisions about inventory management and procurement. By analyzing part requirements in
real-time, manufacturers can ensure that they maintain optimal stock levels, reducing waste
and downtime during production.
Car Assembly and Part Tracking: The system tracks every step of the car assembly process,
from receiving parts to final assembly. Each step is recorded in the blockchain, ensuring that
the car production process is transparent and that any discrepancies can be identified and
addressed quickly. The module provides real-time updates and helps manufacturers optimize
their workflows.
Key Features:
• Detailed storage of spare parts information including part numbers, suppliers, and
inventory levels.
• Blockchain-secured spare parts records to ensure data integrity.
• Real-time analysis of part usage, including graphical reports.
• End-to-end tracking of car manufacturing, from spare parts to final product assembly.
• Blockchain-enabled traceability of manufacturing processes.
The Customer Module is designed to offer users a seamless experience in exploring car details,
reviewing features, and providing feedback. This module allows customers to view
comprehensive information about various cars, including their specifications, features, and
pricing, and enables them to submit their feedback or reviews based on their experiences with
the vehicles.
Key Features:
21
CHAPTER 3
REQUIREMENTS ENGINEERING
3.1 GENERAL
These are the requirements for doing the project. Without using these tools and software’s we
can’t do the project. So we have two requirements to do the project. They are
1. Hardware Requirements.
2. Software Requirements.
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS
The hardware requirements may serve as the basis for a contract for the implementation
of the system and should therefore be a complete and consistent specification of the whole
system. They are used by software engineers as the starting point for the system design. It shows
what the system does and not how it should be implemented.
PROCESSOR : DUAL CORE 2 DUOS
The software requirements document is the specification of the system. It should include both
a definition and a specification of requirements. It is a set of what the system should do rather
than how it should do it. The software requirements provide a basis for creating the software
requirements specification.
DATABASE : MY SQL
CHAPTER 4
22
DESIGN ENGINEERING
4.1 GENERAL
Design Engineering deals with the various UML [Unified Modeling language] diagrams
for the implementation of project. Design is a meaningful engineering representation of a thing
that is to be built. Software design is a process through which the requirements are translated
into representation of the software. Design is the place where quality is rendered in software
engineering. Design is the means to accurately translate customer requirements into finished
product.
SYSTEM DESIGN:
Use case diagram captures the system's functionality and interactions within the Record
Management Using Blockchain in Automotive Industry. It illustrates how different actors, such
as the Admin, Car Manufacturing team, and Customers, interact with key system processes like
car registration, managing spare parts, viewing car details, and providing feedback. The
diagram highlights the role of blockchain technology in ensuring the security and integrity of
car data, including specifications and customer reviews. It visually represents how these actors
engage with the system to maintain transparent, tamper-proof records and streamline carrelated
operations.
23
4.1.2 CLASS DIAGRAM:
The Class Diagram for the Blockchain-based Car Manufacturing and Management System
includes key classes such as Admin, responsible for managing car details, securing car data,
and reviewing customer feedback; Car, which stores and handles the specifications, features,
24
and security details of vehicles; SparePart, managing the details and inventory of parts used in
car manufacturing; Customer, handling customer details, car reviews, and feedback; and
BlockHash, ensuring the integrity of car data through blockchain verification. These classes
work collaboratively to ensure secure, transparent, and efficient management of car-related
data, from production to customer interactions, maintaining a tamper-proof environment for all
transactions and feedback.
The best way to illustrate what an object diagram look like is to show the object diagram
derived from the corresponding class diagram.
25
4.1.4 STATE DIAGRAM:
A state diagram, also known as a state machine diagram or state chart diagram, is an illustration
of the states an object can attain as well as the transitions between those states in the Unified
Modeling Language. Then, all of the possible existing states are placed in relation to the
beginning and the end.
26
4.1.5 ACTIVITY DIAGRAM:
Activity Diagrams describe how activities are coordinated to provide a service which
can be at different levels of abstraction. Typically, an event needs to be achieved by some
operations, particularly where the operation is intended to achieve a number of different things
that require coordination.
27
4.1.6 SEQUENCE DIAGRAM:
A sequence diagram is a type of interaction diagram because it describes how and in
what order a group of objects works together. These diagrams are used by software developers
and business professionals to understand requirements for a new system or to document an
existing process.
28
4.1.7 COLLABORATION DIAGRAM
A collaboration diagram, also known as a communication diagram, is an illustration of
the relationships and interactions among software objects in the Unified Modeling Language
(UML). These diagrams can be used to portray the dynamic behavior of a particular use case
and define the role of each object.
29
4.1.8 COMPONENT DIAGRAM:
The Component diagrams are special type of UML diagrams used for different
purposes. These diagrams show the physical components of a system. To clarify it, we can say
that component diagrams describe the organization of the components in a system.
30
4.1.9 DATA FLOW DIAGRAM:
Data flow diagrams are used to graphically represent the flow of data in a business
information system. DFD describes the processes that are involved in a system to transfer data
from the input to the file storage and reports generation. Data flow diagrams can be divided
into logical and physical. The logical data flow diagram describes flow of data through a system
to perform certain functionality of a business. The physical data flow diagram describes the
implementation of the logical data flow.
31
4.1.10 E-R DIAGRAM:
E-R Diagram stands for Entity Relationship Diagram, also known as ERD is a diagram that
displays the relationship of entity sets stored in a database. In other words, ER diagrams help
to explain the logical structure of databases. ER diagrams are created based on three basic
concepts: entities, attributes and [Link] Diagrams contain different symbols that use
rectangles to represent entities, ovals to define attributes and diamond shapes to represent
relationships.
32
4.1.11 ARCHITECTURE DIAGRAM
CHAPTER 5
33
DEVELOPMENT TOOLS
5.1 GENERAL
[Link] is a popular JavaScript library developed by Facebook for building user interfaces,
particularly single-page applications. It utilizes a component-based architecture that promotes
code reusability and maintainability. React's virtual DOM enables efficient rendering and
updates, while its declarative syntax simplifies UI development. The library supports JSX for
writing HTML-like code within JavaScript, and includes features like state management,
lifecycle methods, and hooks for functional components. React's extensive ecosystem includes
tools like Create React App for project scaffolding, React Router for navigation, and various
state management libraries like Redux and Context [Link] Boot is a Java-based framework
that simplifies the development of production-ready applications. It provides autoconfiguration
capabilities that reduce boilerplate code and configuration complexity. Spring Boot includes
embedded servers, making deployment straightforward, and offers comprehensive support for
building RESTful APIs, microservices, and web applications. The framework integrates
seamlessly with Spring Security for authentication and authorization, Spring Data JPA for
database operations, and includes built-in support for testing, monitoring, and cloud
[Link] is a widely-used open-source relational database management system that
provides robust data storage and retrieval capabilities. It supports ACID compliance for data
integrity, offers comprehensive indexing for query optimization, and includes features like
stored procedures, triggers, and views. MySQL provides excellent performance for web
applications, supports multiple storage engines, and includes tools for backup, replication, and
clustering. The database system is compatible with various programming languages and
frameworks, making it a versatile choice for web development projects.
34
create modular, reusable, and maintainable code. The language promotes code organization
through classes and objects, making it easier to model real-world entities and relationships in
software [Link] Independence is achieved through Java's "Write Once, Run
Anywhere" philosophy. Java code is compiled into bytecode that runs on the Java Virtual
Machine (JVM), allowing applications to execute on any platform that has a JVM installed.
This feature eliminates the need to rewrite code for different operating systems, making
Java applications highly portable and cost-effective for cross-
platform [Link] Memory Management through garbage collection is a key
feature that relieves developers from manual memory allocation and deallocation
responsibilities. The JVM automatically manages memory by identifying and removing unused
objects, preventing memory leaks and reducing programming errors related to memory
[Link] Type System ensures type safety at compile time, catching potential errors
before runtime. Java's static typing requires explicit declaration of variable types, which helps
prevent type-related bugs and improves code reliability. The language also supports type
checking and casting mechanisms for safe data [Link] Standard Library provides
extensive built-in classes and methods for common programming tasks, including collections,
networking, file I/O, and GUI development. This comprehensive library reduces development
time and ensures consistent implementation of common functionalities across different
[Link] Features include built-in security mechanisms such as bytecode
verification, sandboxing, and security managers that protect against malicious code execution.
Java's security model helps create secure applications suitable for enterprise environments and
web-based systems.
35
convention-over-configuration principles. Spring Boot includes embedded servers like Tomcat,
making deployment straightforward, and provides starter dependencies that automatically
configure common libraries and [Link] MVC provides a modelview-controller
architecture for building web applications, offering features like request mapping, form
handling, and view resolution. It integrates seamlessly with other Spring modules and supports
RESTful API development with annotations and configuration [Link] Security offers
comprehensive security features including authentication, authorization, and protection against
common security vulnerabilities. It supports various authentication mechanisms, role-based
access control, and integration with external security [Link] Data JPA simplifies
database operations by providing repository abstractions and reducing boilerplate code for data
access layers. It supports various database technologies and includes features like query
methods, pagination, and transaction [Link] Cloud extends Spring Boot for
building distributed systems and microservices, providing tools for service discovery,
configuration management, and distributed tracing. The framework's modular design and
extensive ecosystem make it suitable for building scalable, maintainable, and secure enterprise
applications.
Spring Boot is an extension of the Spring Framework designed to simplify the development of
stand-alone, production-grade Spring-based applications. By offering a set of pre-configured
defaults and reducing the need for boilerplate code, Spring Boot makes it easier to create and
deploy Java applications with minimal setup. One of its standout features is auto-configuration,
which automatically configures Spring's infrastructure based on the libraries available in the
classpath. This means developers can focus on writing business logic rather than dealing with
extensive configuration. Additionally, Spring Boot applications can run on embedded servers
like Tomcat, Jetty, or Undertow, eliminating the need for a separate application server.
Spring Boot also provides a range of "starters," which are curated sets of dependencies for
common functionalities, such as web development, data access, and security. These starters
simplify dependency management and reduce the time required to set up a new project. Another
key feature is Spring Boot Actuator, which offers production-ready features like monitoring,
metrics, and health checks, helping developers maintain the application's reliability and
36
performance. Spring Boot is particularly well-suited for developing RESTful APIs and
microservices, making it a popular choice for building scalable, enterprise-level applications.
Its approach not only accelerates development but also ensures that applications adhere to best
practices and standards.
React is a powerful JavaScript library developed by Facebook for building user interfaces,
particularly for single-page applications (SPAs). Its component-based architecture allows
developers to build encapsulated components that manage their own state and can be composed
to create complex UIs. This modular approach promotes reusability and maintainability, as
components can be easily updated or replaced without affecting the entire application. React
uses a virtual DOM to optimize rendering performance by updating only the components that
have changed, rather than re-rendering the entire UI.
React's use of JSX (JavaScript XML) enables developers to write HTML-like code within
JavaScript, making the development process more intuitive and aligning the code structure with
the way the UI is intended to be rendered. This, combined with React Hooks, which allow
developers to use state and other React features in functional components, simplifies the
development of interactive UIs. React's declarative nature makes it easier to understand and
manage the UI based on the application's state. It integrates seamlessly with various back-end
services and APIs, allowing developers to build dynamic and responsive applications that
deliver a smooth user experience.
useState } from "react"; import { Navbar, Nav, Container } from "react-bootstrap"; import {
37
useNavigate } from "react-router-dom"; import { FaHome, FaUserShield, FaCar, FaUser,
"./Footer";
const menuItems = [
];
useState("Home");
};
handleScroll);
}, []);
return (
<div>
<Container>
<span style={{color:"#0A3981"}}>AutoRecordBlockChain</span>
</[Link]>
<[Link] id="basic-navbar-nav">
<Nav className="ms-auto">
{[Link]((item) => (
<[Link]
key={[Link]}
39
href={[Link]} onClick={()
=> { if
([Link]('/')) {
navigate([Link]);
} else {
setActiveLink([Link]);
}}
>
<span className="nav-item-content">
{[Link]}
<span className="nav-item-text">{[Link]}</span>
</span>
</[Link]>
))}
</Nav>
</[Link]>
</Container>
</Navbar>
<div className="hero-container">
<HeroPage />
</div>
40
<div id="services">
<OurServices />
</div>
<div id="clients">
<Clients />
</div>
<div id="contact">
<Footer />
</div>
</div>
);
};
} from 'react-router-dom';
41
address: '',
});
setFormData((prevData) => ({
...prevData,
[name]: value,
}));
};
navigate('/customer-login');
}, 1000);
setFormData({
phoneNumber: '',
address: '',
});
42
} catch (error) { [Link]('Signup failed.
};
return (
<div>
<div style={[Link]}>
<div style={[Link]}>
<div style={[Link]}>
<input type="text"
id="fullName"
name="fullName"
value={[Link]}
onChange={handleChange}
required
style={[Link]}
/>
</div>
<div style={[Link]}>
43
<input
type="email" id="email"
name="email"
value={[Link]}
onChange={handleChange}
required
style={[Link]}
/>
</div>
<div style={[Link]}>
<input
type="password"
id="password"
name="password"
value={[Link]}
onChange={handleChange}
required
style={[Link]}
/>
</div>
<div style={[Link]}>
44
<input type="tel"
id="phoneNumber"
name="phoneNumber"
value={[Link]}
onChange={handleChange}
required
style={[Link]}
/>
</div>
<div style={[Link]}>
<input type="text"
id="address"
name="address"
value={[Link]}
onChange={handleChange}
required
style={[Link]}
/>
</div>
</form>
</div>
<ToastContainer />
45
</div>
<div style={{display:"flex",justifyContent:'center'}}>
<button
>
Back to Home
</button>
</div>
</div>
);
};
'Arial, sans-serif',
},
width: '100%',
maxWidth: '500px',
46
}, title: { textAlign:
'center',
marginBottom: '20px',
color: '#2c3e50',
fontSize: '2rem',
fontWeight: 'bold',
}, form: { display:
'flex', flexDirection:
'column',
},
formGroup: {
marginBottom: '20px',
}, label: {
marginBottom: '8px',
fontWeight: 'bold',
color: '#333',
display: 'block', },
input: { padding:
solid #ccc',
borderRadius: '6px',
fontSize: '16px',
width: '100%',
transition: 'border-color
0.3s', boxShadow:
47
'inset 0 1px 3px rgba(0,
0, 0, 0.1)',
}, button: { padding:
borderRadius: '6px',
backgroundColor: '#4285f4',
},
};
'react-toastify/dist/[Link]';
48
[Link]();
[Link]('Login successfull!');
=> { navigate('/carManuFactDB');
}, 1000);
setEmail('');
setPassword('');
} else {
};
navigate('/');
};
return (
<div>
<div style={[Link]}>
49
<div style={[Link]}>
<div style={[Link]}>
Email Address
</label>
<input
type="email"
id="email"
value={email}
onChange={(e) =>
setEmail([Link])
required
style={[Link]}
/>
</div>
<div style={[Link]}>
Password
</label> <input
type="password" id="password"
setPassword([Link])}
50
required
style={[Link]}
/>
</div>
Login
</button>
</form>
</div>
</div>
<ToastContainer />
<div style={{display:"flex",justifyContent:'center'}}>
>
Back to Home
</button>
</div>
</div>
);
51
backgroundColor: '#fff', borderRadius:
alignItems: 'center',
},
formSection: {
flex: 1, padding:
flexDirection: 'column',
justifyContent: 'center',
}, title: { textAlign:
'center',
marginBottom: '20px',
color: '#2c3e50',
fontSize: '2rem',
fontWeight: 'bold',
}, form: { display:
'flex', flexDirection:
'column',
},
formGroup: {
marginBottom: '20px',
},
52
label: { display: 'block', marginBottom:
}, button: { padding:
borderRadius: '6px',
backgroundColor: '#4285f4',
fontSize: '16px',
},
buttonHover: {
backgroundColor: '#3367d6',
},
imageSection: {
justifyContent: 'center',
alignItems: 'center',
backgroundColor: '#f4f4f4',
padding: '20px',
},
53
image: {
maxWidth: '80%',
borderRadius: '12px',
},
};
'react-toastify/dist/[Link]';
useNavigate();
[Link]();
[Link]('Login successfull!');
[Link]('carManufactEmail', email);
54
}, 1000);
setEmail('');
setPassword(''); } else {
[Link]('Invalid Credentails!
};
navigate('/');
};
return (
<div>
<div style={[Link]}>
<div style={[Link]}>
<div style={[Link]}>
Email Address
55
</label>
<input
type="email"
id="email"
value={email}
onChange={(e) =>
setEmail([Link])
required
style={[Link]}
/>
</div>
<div style={[Link]}>
Password
</label> <input
type="password" id="password"
setPassword([Link])}
required
style={[Link]}
/>
</div>
Login
56
</button>
</form>
</div>
</div>
<ToastContainer />
<div style={{display:"flex",justifyContent:'center'}}>
>
Back to Home
</button>
</div>
</div>
);
'center',
},
formSection: {
57
flex: 1, padding:
flexDirection: 'column',
justifyContent: 'center',
}, title: { textAlign:
'center',
marginBottom: '20px',
color: '#2c3e50',
fontSize: '2rem',
fontWeight: 'bold',
}, form: { display:
'flex', flexDirection:
'column',
},
formGroup: {
marginBottom: '20px',
},
label: {
display:
'block',
marginB
ottom:
'8px',
fontWeig
ht: 'bold',
58
color:
'#333',
},
input: {
padding:
'12px',
border:
'1px
solid
#ccc',
borderR
adius:
'6px',
fontSize:
'16px',
width:
'100%',
transitio
n:
'border-
color
0.3s',
boxShad
ow:
'inset 0
59
1px 3px
rgba(0,
0, 0,
0.1)',
}, button: { padding:
borderRadius: '6px',
backgroundColor: '#4285f4',
rgba(0, 0, 0, 0.2)', },
buttonHover: {
backgroundColor: '#3367d6',
},
imageSection: {
justifyContent: 'center',
alignItems: 'center',
backgroundColor: '#f4f4f4',
padding: '20px',
},
60
image: {
maxWidth: '80%',
borderRadius: '12px',
},
};
export default AdminLoginPage; import React from 'react'; import { FaEnvelope, FaPhone,
<footer className="footer">
<div className="footer-container">
<div className="footer-section">
<h3>About AutoRecordBlockChain</h3>
<p>
</p>
</div>
<div className="footer-section">
<h3>Contact Us</h3>
<ul className="contact-list">
<li>
</li>
61
<li>
</li>
<li>
</li>
</ul>
</div>
<div className="footer-section">
<h3>Follow Us</h3>
<div className="social-icons">
<FaFacebook />
</a>
<FaTwitter />
</a>
<FaInstagram />
</a>
<FaLinkedin />
</a>
</div>
62
</div>
</div>
<div className="footer-bottom">
</div>
</footer>
);};
cost: '',
videoLink: '',
});
setCarDetails((prevDetails) => ({
63
...prevDetails,
[name]: value,
}));
};
setCarDetails((prevDetails) => ({
...prevDetails,
image: file,
}));
};
[Link]();
[Link]('name', [Link]);
[Link]('brand', [Link]);
[Link]('color', [Link]);
[Link]('description', [Link]);
[Link]('vehicleType', [Link]);
64
[Link]('cost', [Link]);
[Link]('videoLink', [Link]);
if ([Link]) {
[Link]('image', [Link]);
body: formData,
});
setTimeout(() => {
navigate('/adminDB');
}, 1000); } else {
the car.');
};
return (
65
<Row>
<div className="car-form-wrapper">
<Card className="car-form-card">
<[Link]>
<Form onSubmit={handleSubmit}>
<[Link] controlId="carName">
<[Link]>Car Name</[Link]>
<[Link]
type="text" placeholder="Enter
value={[Link]}
onChange={handleInputChange}
required
/>
</[Link]>
<[Link] controlId="carBrand">
<[Link]>Brand</[Link]>
<[Link]
type="text" placeholder="Enter
66
value={[Link]}
onChange={handleInputChange}
required
/>
</[Link]>
<[Link] controlId="carColor">
<[Link]>Color</[Link]>
<[Link]
type="text" placeholder="Enter
value={[Link]}
onChange={handleInputChange}
required
/>
</[Link]>
<[Link] controlId="carDescription">
<[Link]>Description</[Link]>
<[Link]
as="textarea" rows={3}
placeholder="Enter a
description"
67
name="description"
value={[Link]}
onChange={handleInputChange}
required
/>
</[Link]>
<[Link] controlId="carImage">
<[Link]
type="file" name="image"
onChange={handleFileChange}
required
/>
</[Link]>
<[Link] controlId="vehicleType">
<[Link]>Vehicle Type</[Link]>
<[Link]
as="select" name="vehicleType"
value={[Link]}
onChange={handleInputChange}
>
<option value="gas">Gasoline</option>
68
<option value="ev">Electric Vehicle (EV)</option>
<option value="hybrid">Hybrid</option>
</[Link]>
</[Link]>
<[Link] controlId="carCost">
<[Link]>Cost</[Link]>
<[Link]
type="number"
name="cost"
value={[Link]}
onChange={handleInputChange}
required
/>
</[Link]>
<[Link] controlId="reviewsVideoLink">
name="videoLink" value={[Link]}
onChange={handleInputChange}
/>
</[Link]>
69
<Button variant="primary" type="submit" className="mt-3">
Add Car
</Button>
</Form>
</[Link]>
</Card>
</div>
</Col>
</Row>
</Container>
);
};
import React, { useState } from 'react'; import { Container, Navbar, Nav, Form, Button, Row,
Col, Card } from 'react-bootstrap'; import { Bar } from 'react-chartjs-2'; import { Chart as
[Link](
CategoryScale,
BarElement,
Title,
70
LinearScale,
Tooltip,
Legend
);
setFuelRequired] = useState(0);
const spareParts = [
];
71
const calculateCostAndFuel = (count) => {
});
setTotalCost(totalCost);
setFuelRequired(totalFuel);
};
setCarCount(count);
calculateCostAndFuel(count);
};
datasets: [
72
borderColor: 'rgba(75, 192, 192, 1)',
borderWidth: 1,
},
],
};
return (
<div>
<nav>
<NavBar />
</nav>
<Row>
<Col md={6}>
<Card>
<[Link]>
<Form>
<[Link] controlId="carCount">
<[Link]
type="number"
value={carCount}
onChange={handleInputChange}
73
min="1"
/>
</[Link]>
<br></br>
Calculate
</Button>
</Form>
<div className="mt-4">
<h5>Fuel Required for {carCount} Cars (for 500 km): {fuelRequired} Liters</h5>
</div>
</[Link]>
</Card>
</Col>
<Col md={6}>
<Card>
<[Link]>
<ul>
{[Link](part => (
<li key={[Link]}>
74
{[Link]}: {[Link]} units required (Cost: ₹{([Link]
* usdToInr).toFixed(2)} per unit)
</li>
))}
</ul>
</[Link]>
</Card>
</Col>
</Row>
<Col md={12}>
<Card>
<div className="mt-4">
<ul>
<li>Total Fuel for {carCount} Cars (for 500 km): {fuelRequired} Liters</li>
</ul>
</div>
75
</[Link]>
</Card>
</Col>
</Row>
</Container>
</div>
);
};
car } = state;
76
const match =
[Link](/(?:youtu\.be\/|youtube\.com\/(?:[^\/\n\s]+\/\S+\/|(?:v|e(?:mbed)?)\/|\S*?[?&]v=))([^
"&?\/\s]{11})/); return match ?
match[1] : null;
};
`[Link] : '';
const labels = {
0.5: 'Useless',
1: 'Useless+',
1.5: 'Poor',
2: 'Poor+',
2.5: 'Ok',
3: 'Ok+',
3.5: 'Good',
4: 'Good+',
4.5: 'Excellent',
5: 'Excellent+',
};
const reviews = [
{ name: 'John Doe', rating: 4, comment: 'Great car, smooth ride and excellent performance!'
},
77
{ name: 'Jane Smith', rating: 5, comment: 'Love the design and fuel efficiency. Highly
recommend!' },
{ name: 'Bob Johnson', rating: 4, comment: 'Comfortable ride but the interior could be better.'
},
{ name: 'Alice Brown', rating: 3, comment: 'Decent car, but the price is a bit high.' },
{ name: 'Chris Green', rating: 5, comment: 'Amazing car, excellent value for money!' },
{ name: 'David White', rating: 4.5, comment: 'Very stylish, and the handling is fantastic.' },
{ name: 'Emma Wilson', rating: 4, comment: 'Great overall, but could use better audio
quality.' },
{ name: 'Mike Davis', rating: 3.5, comment: 'Good performance, but interior needs
improvement.' },
{ name: 'Sophia Taylor', rating: 5, comment: 'Top-notch car, very satisfied with my purchase!'
},
{ name: 'Liam Clark', rating: 4, comment: 'Solid car, I’m happy with it, would buy again.' }
];
= [Link](id);
if (section) { [Link]({
};
78
[Link]('customerEmail'); const
before submitting.");
return;
setIsSubmitting(true);
[Link]('[Link] { customerEmail:
rating,
});
review!");
} finally {
setIsSubmitting(false);
79
};
return (
<div className="car-details-container">
<nav className="navbar">
</ul>
</nav>
<div className="car-section">
<div className="car-image-container">
<img
src={`data:image/png;base64,${[Link]}`}
alt="Car" className="car-
image"
/>
</div>
<div className="car-details">
<p><strong>Brand:</strong> {[Link]}</p>
80
<p><strong>Color:</strong> {[Link]}</p>
<p><strong>Description:</strong> {[Link]}</p>
<p><strong>Price:</strong> ₹{[Link]}</p>
<p><strong>Year:</strong> 2024</p>
</div>
</div>
<div className="features">
<ul>
<li>Long-range capability</li>
</ul>
)}
<ul>
81
<li>Better fuel efficiency</li>
</ul>
)}
<ul>
</ul>
)}
</div>
</div>
82
<div id="car-specifications" className="car-section car-specifications">
<div className="specifications">
<table className="car-specifications">
<tbody>
<>
<tr>
<td><strong>Engine Type</strong></td>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
<td><strong>Seating Capacity</strong></td>
<td>5</td>
</tr>
<tr>
83
<td><strong>Dampers</strong></td>
</tr>
<tr>
<td><strong>Transmission</strong></td>
<td>10-Speed Automatic</td>
</tr>
<tr>
</tr>
<tr>
<td><strong>Body Style</strong></td>
<td>Fastback</td>
</tr>
</>
)}
<>
<tr>
<td><strong>Engine Type</strong></td>
</tr>
<tr>
84
<td><strong>Electric Motor Power</strong></td>
<td>80 kW</td>
</tr>
<tr>
<td><strong>Combined Horsepower</strong></td>
<td>200 HP</td>
</tr>
<tr>
<td><strong>Seating Capacity</strong></td>
<td>5</td>
</tr>
<tr>
<td><strong>Fuel Economy</strong></td>
</tr>
<tr>
<td><strong>Battery Capacity</strong></td>
<td>1.3 kWh</td>
</tr>
<tr>
<td><strong>Transmission</strong></td>
<td>E-CVT</td>
</tr>
<tr>
85
<td><strong>Drive Type</strong></td>
<td>Front-Wheel Drive</td>
</tr>
</>
)}
<>
<tr>
<td><strong>Battery Capacity</strong></td>
<td>100 kWh</td>
</tr>
<tr>
</tr>
<tr>
<td>300 miles</td>
</tr>
<tr>
<td><strong>Seating Capacity</strong></td>
<td>4</td>
</tr>
<tr>
86
<td><strong>Charging Time</strong></td>
</tr>
<tr>
<td><strong>Drive Type</strong></td>
<td>All-Wheel Drive</td>
</tr>
<tr>
<td><strong>Torque</strong></td>
<td>500 lb.-ft.</td>
</tr>
<tr>
<td><strong>Top Speed</strong></td>
<td>150 mph</td>
</tr>
</>
)}
</tbody>
</table>
</div>
</div>
<div className="reviews">
87
<h3 style={{ color: "#2E5077", textAlign: "center" }}>Customer Reviews</h3>
<div className="reviews-grid">
<div className="reviews-left">
<p><strong>{[Link]}</strong> -
<Rating name="read-only"
/>
</p>
<p>{[Link]}</p>
</div>
))}
</div>
<div className="reviews-right">
<p><strong>{[Link]}</strong> -
<Rating name="read-only"
/>
</p>
88
<p>{[Link]}</p>
</div>
))}
</div>
</div>
</div>
</div>
<Box sx={{
display: 'flex',
flexDirection: 'column',
alignItems: 'center',
gap: 2,
}}
>
<Rating
name="car-rating"
value={rating}
onChange={(event, newValue)
=> setRating(newValue)}
89
precision={0.5}
emptyIcon={<StarIcon style={{
opacity: 0.55 }}
fontSize="inherit" />}
/>
review..." value={reviewText}
style={{
fontSize: '16px',
borderRadius: '5px',
resize: 'vertical',
marginBottom: '15px',
boxSizing: 'border-box',
}}
></textarea>
<button
onClick={handleReviewSubmit}
disabled={isSubmitting} style={{
backgroundColor: '#2E5077',
90
color: '#fff',
fontSize: '16px',
border: 'none',
borderRadius: '5px',
cursor: 'pointer',
width: '100%',
maxWidth: '300px',
}}
>
</button>
</Box>
</div>
{embedVideoLink && (
91
allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture"
allowFullScreen
></iframe>
)}
</div>
</div>
);
CHAPTER 7
7.1 GENERAL
The following screenshots showcase the key interfaces and functionality of the application,
demonstrating the user experience across different modules and user roles within the system.
92
7.2 VARIOUS SNAPSHOTS
93
94
95
96
97
98
99
100
101
CHAPTER 8
102
SOFTWARE TESTING
8.1 GENERAL
In this paper, we develop achievability protocols and outer bounds for the secure
network coding setting, where the edges are subject to packet erasures, and public feedback of
the channel state is available to both Eve and the legitimate network nodes. Secure network
coding assumes that the underlying network channels are error-free; thus, if our channels
introduce errors, we need to first apply a channel code to correct them, and then build security
on top of the resulting error-free network. We show that by leveraging erasures and feedback,
we can achieve secrecy rates that are in some cases multiple times higher than the alternative
of separate channel-error-correction followed by secure network coding; moreover, we develop
outer bounds and prove optimality of our proposed schemes in some special cases.
The process verifies that the application meets the requirements specified in the system
requirements document and is bug free. The following are the considerations used to develop
the framework from developing the testing methodologies.
103
8.3.1 Unit testing
Unit testing involves the design of test cases that validate that the internal program logic
is functioning properly, and that program input produce valid outputs. All decision branches
and internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
System testing ensures that the entire integrated software system meets requirements. It tests
a configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
104
The Performance test ensures that the output be produced within the time limits, and the time
taken by the system for compiling, giving response to the users and request being send to the
system for to retrieve the results.
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level
– interact without error.
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.
The Acknowledgements will be received by the Sender Node after the Packets are
received by the Destination Node
The Route add operation is done only when there is a Route request in need
The Status of Nodes information is done automatically in the Cache Updation process
Any project can be divided into units that can be further performed for detailed
processing. Then a testing strategy for each of this unit is carried out. Unit testing helps to
identity the possible bugs in the individual component, so the component that has bugs can be
identified and can be rectified from errors.
CHAPTER 9
105
APPLICATION
9.1 GENERAL
The application of blockchain technology in the automotive industry, particularly for record
management, brings significant advancements in security, transparency, and efficiency. In the
context of the automotive industry, blockchain offers a decentralized, immutable, and secure
way to manage car manufacturing data, car details, customer feedback, and spare parts
inventory. By leveraging blockchain's ability to prevent unauthorized changes and ensure data
integrity, it is possible to optimize processes across the entire supply chain, from manufacturing
to customer interactions. This ensures that all stakeholders, including manufacturers,
administrators, and customers, can access reliable and transparent data, which is vital for
decision-making and operational success.
The Admin Module plays a crucial role in managing the data within the blockchain-based car
manufacturing system. Admins are responsible for registering new car models, securing
detailed information on the vehicles, and ensuring that any updates or changes to car
specifications are recorded on the blockchain. This guarantees that the car details remain
tamper-proof, offering transparency for all stakeholders. Additionally, the admin has the
responsibility of reviewing customer feedback and ensuring that it is securely stored and
protected. The integration of blockchain allows the admin to maintain an up-to-date,
trustworthy database that can be easily audited.
The Car Manufacturing Module is another vital aspect of the system, handling spare parts
storage, management, and analysis of the materials required for the assembly of cars. Using
blockchain, manufacturers can securely store and manage data on spare parts inventory,
including part specifications, quantities, and suppliers. This system enables real-time tracking
of spare parts and their usage during the car assembly process. The blockchain technology
enhances the visibility of parts usage, helps optimize inventory management, and allows for
data-driven decisions regarding procurement. Moreover, the analysis provided by the system
helps manufacturers predict part requirements for future car production, reducing waste and
ensuring a smoother manufacturing process.
In terms of its broader application, blockchain in the automotive industry addresses several
critical issues related to data security, supply chain transparency, and customer trust. By
106
securing sensitive information, such as car specifications, inventory data, and customer
feedback, blockchain ensures that the data is protected from unauthorized access or
manipulation. It also allows for transparent interactions across the entire automotive value
chain, from manufacturers to customers. The application of blockchain technology in this
context not only streamlines operations but also fosters an environment of trust and
accountability, which is essential for the future of the automotive industry. Through this system,
the industry can benefit from improved efficiency, cost savings, and enhanced customer
satisfaction.
In the future, the blockchain-based car manufacturing and management system can be enhanced
by integrating advanced technologies such as artificial intelligence (AI) and Internet of Things
(IoT) for more efficient data processing and real-time monitoring. AI can be used to analyze
car performance data and customer feedback to predict maintenance needs and identify trends,
helping manufacturers improve their vehicles. Additionally, IoT sensors embedded in cars and
throughout the manufacturing process could provide real-time data on vehicle health, spare
parts usage, and production status. Integrating these technologies with blockchain will offer a
comprehensive, automated system for predictive maintenance and proactive inventory
management.
Furthermore, the system can be expanded to support more advanced functionalities such as
seamless integration with insurance companies, vehicle history tracking, and decentralized car
ownership transfer. By linking blockchain with insurance platforms, car owners could automate
claims processing and provide verified records of car incidents or maintenance. Moreover,
using blockchain for vehicle history would allow potential buyers to access a fully transparent
and secure record of a car's maintenance and ownership history. This would not only increase
trust in pre-owned vehicles but also enhance the overall customer experience by ensuring
transparency and accountability in every step of the car’s lifecycle.
107
CHAPTER 10
10.1 CONCLUSION
10.2 REFERENCES
[1] Ganesh Babu C., Banupriya N., Nagarajan N., "Performance Breakdown and
Redistribution Amidst OSPF, EIGRP & IS-IS Dynamic Routing Protocols in IPv6
Network," IEEE Xplore, January 2023.
[2] D. Rose, K. Vijayakumar, D. Kirubakaran, R. Pugalenthi, G.
Balayaswantasaichowdary, "Neural Machine Translation Using Attention," 2023
International Conference on Artificial Intelligence and Knowledge Discovery in
Concurrent Engineering (ICECONF), Chennai, India, 2023, pp. 1-7, doi:
10.1109/ICECONF57129.2023.10083569.
[3] P. K. et al., "An Secure and Low Energy Consumption based Intelligent Street Light
Managing System using LoRa Network," ICECA, Coimbatore, India, 2022, pp.
638645, doi: 10.1109/ICECA55336.2022.10009408.
108
[4] PS. Rosaline et al., "Predicting Melancholy Risk Among IT Professionals Using
Modified Deep Learning Neural Network (MDLNN)," CSNT, Apr. 2022, Published, doi:
10.1109/csnt54456.2022.9787571.
[5]Kouhizadeh, M., Saberi, S., and Sarkis, J., "Blockchain Technology and the Sustainable
Supply Chain: Theoretically Exploring Adoption Barriers," International Journal of Production
Economics, 231: 107831, 2021.
[6]R. Nuthakki, A. S. Murthy, and D. Naik, "Single Channel Speech Enhancement Using
a New Binary Mask in Power Spectral Domain," 2018 Second International Conference on
Electronics, Communication and Aerospace Technology (ICECA), 2018, pp. 13611366, doi:
10.1109/ICECA.2018.8474842.
[7] Dutta, P., Choi, T. M., Somani, S., and Butala, R., "Blockchain Technology in Supply
Chain Operations: Applications, Challenges, and Research Opportunities," Transportation
Research Part E: Logistics and Transportation Review, 142: 102067, 2020.
[8] M. Anathi, K. Vijayakumar, "An Intelligent Approach for Dynamic Network Traffic
Restriction Using MAC Address Verification," Computer Communications, Volume 154, 2020.
[9] IBM Corporation, "Blockchain for Mobility Services: Personalized Mobility Through
Secure Data," 2018.
[10] Ahmed Z., Zeeshan S., Mendhe D., Dong X., "Human Gene and Disease
Associations for Clinical-Genomics and Precision Medicine Research," Clin Transl Med, 2020,
10: 297-318, doi: 10.1002/ctm2.28.
109