Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Ritu Pawar, Rutuja Pohare, Shreyash Gondane, Sanjay Jengthe, Shubham Paunikar , Saharsh Wasnik
DOI Link: https://doi.org/10.22214/ijraset.2023.49144
Certificate: View Certificate
[1] Dr. R. Vasudevan, S.K. Nigam, R. Velkennedy, A. Ramalinga Chandra Sekar, B. SundarakannanìUtilization of Waste Polymers coated Aggregate for Flexible Pavement And easy Disposal of Waste Polymersî Proceedings of the International Conference on Sustainable Solid waste Management, Chennai, India. pp. 105-111, 5-7September (2007) [2] D S V Prasad, M.Anjan Kumar, G V R Prasada Raju, V. KondayyaìA Study on Flexible Pavement Performance with Reinforced Fly ash Sub baseî International Journal of Earth Sciences and Engineering 4ISSN 0974-5904, Volume 04, No 06 SPL, October, pp. 403- 408(2011) [3] Henning, N. E. (1974). ìEvaluation of lignite fly ash as mineral filler in asphaltic concrete.î Report No. Item (2)-73, Twin City Testing and Engineering Laboratory, St. Paul, Minn. [4] JianhongDia, Zhanliang Liu, ìInfluence of Fly Ash Substitution for Mineral Powder on High Temperature Stability of Bituminous Mixtureî International Conference on Future Energy, Environment,andMaterials2012. [5] J. Mater. ìCoal Ash Utilization In Asphalt Concrete Mixturesî Civ.Eng.11, 295(1999) [6] Meor O. Hamzah , and Teoh C. Yi ì effects of Temperature on Resilient Modulus of Dense Asphalt Mixtures Incorporating Steel Slag Subjected to Short Term Oven Ageingî World Academy of Science, engineering and Technology 46, 008 [7] P Sreejith ìUse of plastic waste in Bitumen Roadsî Powered by WordPress.com (2010) Pada Sabtu, Utilisation Of Waste Plastic In Bituminous Mixes For Road construction,(2010). [8] K.Karthik, ìCarbon fiber modified bitumen in bituminous macadamî, International Journal of Advance Engineering and Research Development Volume 2, Issue 12, December -2015. [9] Anderson, D.A., and Goetz, W.H. (1973), \"Mechanical Behaviour and Reinforcement of Mineral Filler-Asphalt Mixtures\", Proceedings of Association of Asphalt Paving Technologists, Volume 42, No. 1, pp. 37-66, USA. [10] Bindu, C.S. and Beena, K.S. (2014) “Influence of additives on the drain down characteristics of stone matrix asphalt mixtures” volume:03 issue:07, available @http://www.ijret.org [11] Arpita, S., Mahabir, P. and Ujjal, C.R. (2010) “Characteristics of Stone Matrix Asphalt Mixes ”DOI: 02.ACEE. [12] Amit, G., Zamre, G.S., Renge, V.C., Bharsakalea, G.R. and Saurabh, T. (2012) “Utilization of Waste Plastic in Asphalting of Roads” Sci. Revs. Chem. Commun:vol 2(2), pag 147-157. [13] Rajmane P.B., Gupta, A.K., Desai, D.B. (2013) \"Effective Utilization of Waste Plastic in Construction of Flexible Pavement for Improving their [14] Performance\", IOSR Journal of Mechanical and Civil Engineering ,PP: 27-30http://www.iosrjournals.org/iosr-jmce/papers/sicete(civil)-volume2/17.pdf.
I. INTRODUCTION
Block-chain is a decentralized public ledger built on peer-to- peer networks that has gained significant traction in distributed application systems in recent years. In this technology, a trustworthy consensus method is established to synchronize data changes, and the blockchain structure is applied to create a tamper-resistant digital platform for data storage and sharing. At the same time, the decentralization, traceability and immutability of on-chain information storage makes block-chain a trusted machine with high reliability and security. Based on these characteristics, researchers began to analyze the application of block-chain in various fields, such as the Internet of Things, supply chain management, voting system and bidding system. Block-chain in application can improve the availability of data and reduce costs, while maintaining the openness and transparency of the application. Transparency is considered to be a prerequisite for ensuring the accountability of public officials and in regards, there is broad agreement that the effectiveness of transparency can be further strengthened by involving block-chain technology. Such technology could be effective in raising success, risks in complex contracts, strengthening procurement and contracting practices, holding officials accountable and in general, strengthening supply chain.
A blockchain based solution is well-suited for use cases such as tendering, in which multiple parties with low levels of trust transact with one another. The technology is applicable in areas where the same transaction is stored across disparate systems or databases. In recent years, electronic bidding has become an efficient and convenient service, which aims to provide an open and safe bidding environment for suppliers to protect the public interest.
Tendering and bidding is a kind of commodity trading behavior which enables an organized selection of excellent transactions by the tendering organization. It clearly differs from conventional offline bidding in terms of effectiveness, information gathering, and other factors, and performs better in terms of identity authentication of the bidding object, confidentiality of the bidding content, fairness of the bidding process, and other factors. Emerging block-chain technology combined with smart contracts could revolutionize traditional E-bidding systems in a decentralized and autonomous manner. It provides the way for a safe, irrevocable, and auditable E- bidding procedure while upholding high accuracy and thoroughness. Interested parties can download the tender contract that contains the code for bid evaluation criteria. Interested parties just have to run the evaluation code that will read the bids from the block and evaluate them. The evaluation results will demonstrate whether the bidding process was fair (auditing tender allocation to the stated best bidder).
II. LITERATURE REVIEW
A tendering organization will create a tender as a smart contract and place it on the block-chain. The smart contract will include the certified public key of the tendering organization along with bid evaluation code. A prospective bidder can download the tender from the block-chain. The respective bidder reviews the tender and consider the tendering specification and make a bid proposal, then the bidder generates a bid in response to the tender (smart contract). The actual bid is encrypted by the bidder’s generated symmetric key (bid key: Hash). The symmetric key is then encrypted by the public key of tendering organization: (Hash). Half of the (Hash) is included as part of the submission and the second half would be communicated to the tendering organization at the tender submission deadline. The bidder will push the bid as a smart contract to the block-chain. The bid is signed by the bidder’s certified signature key. This key is certified by the tendering organization when the bidder register as an authorized bidding company, a process out of the actual tender opening and allocation process. When the deadline for bid submission expires, the smart contract on the block- chain stops accepting new bids. The tendering organization can download the submitted bids, and they can decrypt the bids if they have full (Hash). At the tender closing date, tendering organization will run the evaluation code and select the best bid. The result of the evaluation is pushed to the block-chain. At this stage, the tendering organization can make (Hash) of all bidders public on the block-chain. The illustration of the working concept of the block-chain model for procurement is illustrated in figure 1 below. The tender organization will push the results of the bid evaluations along with bidder’s keys to the block-chain. This information is crucial for independent auditing of the tendering process. Interested parties can access the tender details from the block-chain (where this data will reside in perpetuity) along with the bid evaluation code. Interested parties can download the tender contract that contains the code for bid evaluation criteria. Interested parties just have to run the evaluation code that will read the bids from the block and evaluation them. The results of the evaluation will show whether the bidding process was fair (auditing tender allocation to the stated best bidder).
???????III. METHODOLOGY
A tender will be created by a tendering organization as a smart contract and uploaded to the blockchain. The smart contract will include the certified public key of the tendering organization along with bid evaluation code. A potential bidder can download the tender from the blockchain. The respective bidder analyzes the tender, considers the tendering specifications, and submits a bid proposal, after which the bidder creates a bid in response to the tender (smart contract). The actual bid is encrypted by the bidder’s generated symmetric key (bid key: Hash). The symmetric key is then encrypted by the public key of the tendering organization: (Hash). The first half of the (Hash) is part of the submission, and the second half will be provided to the tendering organization by the deadline for tender submission. The bidder will submit the bid to the block-chain as a smart contract. By using their certified signature key, the bidder signs the offer.
This key is confirmed by the tendering organization when the bidder registers as an authorized bidding corporation, a process separate from the actual tender opening and allocation process. The smart contract on the blockchain stops taking new bids when the deadline for bid submission passes.
The tendering organization can download the submitted bids, and they can decrypt the bids if they have full (Hash). At the tender closing date, the tendering organization will run the evaluation code and select the best bid. The evaluation result is published to the blockchain. At this stage, the tendering organization can make (Hash) of all bidders public on the block-chain. The illustration of the working concept of the block-chain model for procurement is illustrated in figure 1 above. The tender organization will upload the findings of the bid evaluations, as well as the bidders' keys, to the blockchain. This information is critical for independent audits of the tendering process. Interested parties can obtain the tender details as well as the bid assessment code from the block-chain (where this data will be kept in perpetuity). The code for the bid evaluation criteria can be downloaded by interested parties from the bidding contract. Interested parties just have to run the evaluation code that will read the bids from the block and evaluate them. The evaluation's findings will demonstrate if the bidding procedure was fair by examining the distribution of the tender to the highest bidder.
V. FUTURE SCOPE
The Government should move towards creating a legal framework for Ethereum and other digital currencies. Although many governments as shown in the literature are now considering launching their own Bitcoin-like cryptocurrency, the process should include sensitizing citizens and financial organizations. This will in addition encourage adoption of the block-chain based smart contracts model for tendering process among organizations.
???????VI. ACKNOWLEDGMENTS
We would like to express our gratitude to our primary supervisors, Prof. Ritu Pawar and prof. Sonali Guhe who guided us throughout this project. I would also like to thank our friends and family who supported us and offered deep insight into the study. We wish to acknowledge the help provided by the technical and support staff in the it dept. Of G. H. Raisoni College of Engineering, Nagpur. We would also like to show our deep appreciation to our mentor Prof. Ritu Pawar who helped us finalize our project.
Traditional technologies and design patterns cannot be employed in applications such as tender portals, where transparency and security are paramount, because they jeopardise these objectives. As previously stated, there are numerous security needs for a tendering framework that can not be met simply by creating and bidding on contracts through a centralised tender platform. Only fair, open, decentralised technologies, such as Blockchain and Smart Contracts, can meet the security and openness criteria of this type of application. In this paper, we\'ll have look at how such a system may be created, including the many procedures required and how they\'re implemented. The security and openness requirements of this type of application can only be met by using Block chain and Smart Contracts are examples of fair, open, and decentralised technologies. In this paper, we\'ll look at how such a system may be created, including the many procedures required and how they\'re implemented. Only fair, open, decentralised technologies, such as Block chain and Smart Contracts, can meet the security and openness criteria of this type of application. In this paper, we\'ll have look at how such a system may be created, including the many procedures required and how they\'re implemented.
[1] \"The Information Act: A Preliminary Analysis,\" The University of Chicago Law Review, vol. 34, no. 4, pp. 761-816, 1967. K. C. Davis, \"The Information Act: A Preliminary Analysis,\" The University of Chicago Law Review, vol. 34, no. 4, pp. 761–816, 1967. [2] The University of Chicago Law Review, vol. 34, no. 4, pp. 761–816, 1967, \"The Information Act: A Preliminary Analysis.\" \"The Information Act: A Preliminary Analysis,\" The University of Chicago Law Review, vol. 34, no. 4, pp.761–816, 1967. K. C. Davis, \"The Information Act: A Preliminary Analysis,\" The University of Chicago Law Review, vol. 34, no. 4, pp. 761–816, 1967.3. Pal, Om, and Surendra Singh. [3] \"Blockchain Technology and Its Applications in E- Governance Services.\" [4] Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin Betts, Martin 89-102 in Journal of Information Technology in Construction, vol. 11 (2006).5. Zheng, Zibin, et al. \"An overview of blockchain technology: Architecture, consensus, and future trends.\" 2017 IEEE international congress on big data (BigData congress). IEEE, 2017. [5] \"Blockchain technology: fundamentals and applications,\" by Marc Pilkington. Digital transitions research handbook 2016.9-102, Edward Elgar Publishing [6] \"A survey on consensus methods and mining strategy management in blockchain networks,\" by Wenbo Wang and colleagues. 22328-22370 in IEEE Access 7 (2019).8. Cachin, Christian, and Marko Vukoli?. \"Blockchain consensus protocols in the wild.\" arXiv preprint arXiv:1707.01873 (2017). [7] Pierluigi Cuccuru \"An early look at smart contracts beyond bitcoin.\" International Journal of Science and Technology \"Making smart contracts smarter,\" by L. Luu, D.-H. Chu, H. Olickel, P. Saxena, and A. Hobor, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Pages. 254–269. ACM, 2016. [8] \"Formal verification of smart contracts: Short paper,\" in Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security. ACM, 2016, pp. 91–96. K. Bhargavan, A. DelignatLavaud, C. Fournet, A. Gollamudi, G. Gonthier, N. Kobeissi, N. Kulatova, A. Rastogi, T. Sibut-Pinote, N. Swamy. [9] \"Ethereum: A Secure Decentralized Generalized Transaction Ledger,\" by Gavin Wood. Yellow paper for the Ethereum project 151.2014 (2014): 1-32.
Copyright © 2023 Ritu Pawar, Rutuja Pohare, Shreyash Gondane, Sanjay Jengthe, Shubham Paunikar , Saharsh Wasnik . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET49144
Publish Date : 2023-02-17
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here