JOMO KENYATTA UNIVERSITY OF AGRICULTURE AND TECHNOLOGY
Systems Project
Alle documenten voor dit vak (2)
Verkoper
Volgen
jboy
Voorbeeld van de inhoud
CHAMA SYSTEM USING BLOCKCHAIN FOR VERIFICATION
WORD COUNT: (12491)
Product and Development files:
, ABSTRACT
A Chama system that uses blockchain for verification has been created to enable members’
records are well secured and maintained. This will allow transactions to be reviewed by the
majority member parties before being recorded in the ledger system, or the chama bookkeeping
platform. Essentially, it will be very difficult or even impossible to tamper with the files once
the transactions have been recorded. This therefore, brings about the key issue of blockchain
principles of data transparency and integrity, by securing all member transactions and records.
Its implementation will allow chama members to carry out their activities with maximum
assurance of funds and information security.
ii
, PREFACE
.
The main idea for this project originally stemmed from my passion for developing a verification system
that would be implemented by the investment groups within this locality. As we move forward with the
advancement in technology, there is need to improve on the way things operate for better future. It is my
passion to learn more and develop tools that can be used to achieve best results to break down
monopolies and dishonesty for future generations.
iii
, CONTENTS
Abstract ................................................................................................................................................... ii
Preface .................................................................................................................................................... iii
Acknowledgements ................................................................................ Error! Bookmark not defined.
Contents .................................................................................................................................................. iv
Table of figures...................................................................................................................................... vii
Table of tables ...................................................................................................................................... viii
1 Introduction ..................................................................................................................................... 1
2 Literature Review ............................................................................................................................ 4
2.1 Introduction ............................................................................................................................. 4
2.2 Computer security system ....................................................................................................... 4
2.3 Distributed ledger system ........................................................................................................ 6
2.4 Blockchain technology ............................................................................................................ 8
2.5 Chama system........................................................................................................................ 11
2.6 Key issues to use in the design and implementation ............................................................. 12
2.7 Conclusion ............................................................................................................................. 12
3 Methodology.................................................................................................................................. 13
3.1 Introduction ........................................................................................................................... 13
3.2 History of methodology ......................................................................................................... 13
3.3 Traditional methods ............................................................................................................... 13
3.3.1 The spiral method .......................................................................................................... 13
3.3.2 Rational Unified Process ............................................................................................... 14
3.4 Modern methodologies; ......................................................................................................... 16
3.4.1 Philosophy of agile methodology .................................................................................. 16
3.4.2 Advanced software development ................................................................................... 16
3.4.3 Extreme programming ................................................................................................... 16
3.4.4 Crystal methodology ..................................................................................................... 17
3.5 Most preferred methodology; ................................................................................................ 18
3.5.1 The waterfall method ..................................................................................................... 18
3.5.2 Reasons for selecting the waterfall method; .................................................................. 19
3.6 Conclusion ............................................................................................................................. 19
4 Requirements Analysis .................................................................................................................. 20
4.1 Introduction ........................................................................................................................... 20
4.2 Roles ...................................................................................................................................... 20
4.2.1 Administrator ................................................................................................................. 20
4.2.2 Chama members ............................................................................................................ 20
iv
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper jboy. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €6,90. Je zit daarna nergens aan vast.