SlideShare a Scribd company logo
Srushti Hinge (39),
Sakshi Jaiswal (45),
Shravani Jeurkar (49),
Ria Kokate (59),
Date of presentation: 04/10/2021
Under the guidance of: Prof. Radhika Malu.
Atharva College of Engineering
Department of Information Technology
CRYPTOCOIN TRACKER
-Unzip Money
CONTEN
T:
1. INTRODUCTION
1.1 Introduction
1.2 Problem Statement
1.3 Objectives
2. LITERATURE SURVEY
3. HARDWARE AND SOFTWARE REQUIREMENT
4. PROPOSED SYSTEM
4.1 Splash Screen
4.2 Login Page
4.3 Register Page
5. Conclusion
6. Future work
ACE – IT DEPARTMENT CRYPTOCURRENCY
TRACKER
INTRODUCTION :
 Cryptocurrency is a digital or virtual or internet
currency that uses cryptography for security. Our
project is based on the concept of this online
currency.
 There are around 100 types of different
cryptocurrencies, and millions of people who have
invested in these currencies.
 Our app will provide the ongoing rates of the 100
known currencies with a single tap.
 Our Crypto Tracker app will continuously track the
current rate of these cryptocurrencies.
 So, the person can know the current rate for the
desired cryptocurrency by just clicking on the name
of the currency.
Problem Statement :
ACE – IT DEPARTMENT CRYPTOCURRENCY
TRACKER
Objectives :
 Track your crypto portfolio on the go.
 Save money year-round.
 Automated portfolio tracking.
 This automates processes that previously were
extremely labor-intensive, opaque, and costly.
 It shows loss percent and profit percent.
 Verification is a key benefit.
ACE – IT DEPARTMENT CRYPTOCURRENCY
2. Literature Survey
ACE – IT DEPARTMENT CRYPTOCURRENCY
TRACKER
3. HARDWARE AND SOFTWARE
REQUIREMENT :
o Hardware Requirement :-
 Smartphones With Android 4.4 and up
o Software Requirement :-
 Android Studio (2020.3.1 64 bits)
 Java
 XML File
 Rest API (CoinmarketCap)
 JSON
ACE – IT DEPARTMENT CRYPTOCURRENCY
TRACKER
4. PROPOSED SYSTEM :
4.1 Splash Screen :-
ACE – IT DEPARTMENT CRYPTOCURRENCY
TRACKER
 4.2 Login Page:-
ACE – IT DEPARTMENT CRYPTOCURRENCY
 4.3 Register Page:-
ACE – IT DEPARTMENT CRYPTOCURRENCY
TRACKER
5. CONCLUSION :
• Seamlessly track your crypto rate with our app.
• You can register/ login to Crypto tracker and track your currency within
seconds.
• You can also read the news regarding the current trails of the selected
currency.
• User can also view the previous trails and graphs regarding the
currency.
• This is the most feasible way to keep a track on the continuously
changing rates of almost 100 crypto currencies.
ACE – IT DEPARTMENT CRYPTOCURRENCY
TRACKER
6. FUTURE WORK :
ACE – IT DEPARTMENT CRYPTOCURRENCY
CRYPTOCURRENCY TRACKER ppt.pptx

More Related Content

What's hot

ONLINE GROCERY STORE MANAGEMENT SYSTEM PPT
ONLINE GROCERY STORE MANAGEMENT SYSTEM PPTONLINE GROCERY STORE MANAGEMENT SYSTEM PPT
ONLINE GROCERY STORE MANAGEMENT SYSTEM PPT
ChetanBhandari14
 
Project report on (atm MAnagment system)
Project report on (atm MAnagment system)Project report on (atm MAnagment system)
Project report on (atm MAnagment system)
Muhammad Umer Lari
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
Trinity Dwarka
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Hajer alriyami
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
STOCK_PPT.pptx
STOCK_PPT.pptxSTOCK_PPT.pptx
STOCK_PPT.pptx
PankajMalviya45
 
Blockchain
BlockchainBlockchain
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Atm software ppt
Atm software pptAtm software ppt
Atm software ppt
ParmarAnisha
 
Online Shopping System Test case Writing
Online Shopping System Test case WritingOnline Shopping System Test case Writing
Online Shopping System Test case Writing
chiragmakdiya
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT
Renuka Deshmukh
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Cryptography ppt
Cryptography pptCryptography ppt
Guessing Game (1).pptx
Guessing Game (1).pptxGuessing Game (1).pptx
Guessing Game (1).pptx
TYEXTCB04RajPatil
 
One Time Password - A two factor authentication system
One Time Password  - A two factor authentication systemOne Time Password  - A two factor authentication system
One Time Password - A two factor authentication system
Swetha Kogatam
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
Anjali Agrawal
 

What's hot (20)

ONLINE GROCERY STORE MANAGEMENT SYSTEM PPT
ONLINE GROCERY STORE MANAGEMENT SYSTEM PPTONLINE GROCERY STORE MANAGEMENT SYSTEM PPT
ONLINE GROCERY STORE MANAGEMENT SYSTEM PPT
 
Project report on (atm MAnagment system)
Project report on (atm MAnagment system)Project report on (atm MAnagment system)
Project report on (atm MAnagment system)
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Authentication Protocols
Authentication ProtocolsAuthentication Protocols
Authentication Protocols
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
STOCK_PPT.pptx
STOCK_PPT.pptxSTOCK_PPT.pptx
STOCK_PPT.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 
Cryptography
CryptographyCryptography
Cryptography
 
Atm software ppt
Atm software pptAtm software ppt
Atm software ppt
 
Online Shopping System Test case Writing
Online Shopping System Test case WritingOnline Shopping System Test case Writing
Online Shopping System Test case Writing
 
Cryptography
CryptographyCryptography
Cryptography
 
PROJECT REPORT
PROJECT REPORTPROJECT REPORT
PROJECT REPORT
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Guessing Game (1).pptx
Guessing Game (1).pptxGuessing Game (1).pptx
Guessing Game (1).pptx
 
One Time Password - A two factor authentication system
One Time Password  - A two factor authentication systemOne Time Password  - A two factor authentication system
One Time Password - A two factor authentication system
 
One time password(otp)
One time password(otp)One time password(otp)
One time password(otp)
 

Similar to CRYPTOCURRENCY TRACKER ppt.pptx

Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
SHASHANK WANKHADE
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET Journal
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLO
YogeshIJTSRD
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Davide Cioccia
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET Journal
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
Alan Tatourian
 
Connected Cars: What Could Possibly Go Wrong
Connected Cars: What Could Possibly Go WrongConnected Cars: What Could Possibly Go Wrong
Connected Cars: What Could Possibly Go Wrong
OnBoard Security, Inc. - a Qualcomm Company
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
 
Social Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots AttacksSocial Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots Attacks
Dr. Mohamed Torky
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
James581435
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik16
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
Shawn Wells
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
Dinis Cruz
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Splunk
 
AlgoB – Cryptocurrency price prediction system using LSTM
AlgoB – Cryptocurrency price prediction system using LSTMAlgoB – Cryptocurrency price prediction system using LSTM
AlgoB – Cryptocurrency price prediction system using LSTM
IRJET Journal
 
New Cyber Security Technology
New Cyber Security TechnologyNew Cyber Security Technology
New Cyber Security Technology
lunchNtouch
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
Security Innovation
 
Bsides
BsidesBsides
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
IRJET Journal
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
IRJET Journal
 

Similar to CRYPTOCURRENCY TRACKER ppt.pptx (20)

Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLO
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and BlockingIRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
IRJET- Browser Extension for Cryptojacking Malware Detection and Blocking
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
Connected Cars: What Could Possibly Go Wrong
Connected Cars: What Could Possibly Go WrongConnected Cars: What Could Possibly Go Wrong
Connected Cars: What Could Possibly Go Wrong
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Social Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots AttacksSocial Networks Protection against Fake Profiles and Social Bots Attacks
Social Networks Protection against Fake Profiles and Social Bots Attacks
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
2014-12-16 defense news - shutdown the hackers
2014-12-16  defense news - shutdown the hackers2014-12-16  defense news - shutdown the hackers
2014-12-16 defense news - shutdown the hackers
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
AlgoB – Cryptocurrency price prediction system using LSTM
AlgoB – Cryptocurrency price prediction system using LSTMAlgoB – Cryptocurrency price prediction system using LSTM
AlgoB – Cryptocurrency price prediction system using LSTM
 
New Cyber Security Technology
New Cyber Security TechnologyNew Cyber Security Technology
New Cyber Security Technology
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
 
Bsides
BsidesBsides
Bsides
 
A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...A Usable Android Application Implementing Distributed Cryptography for Electi...
A Usable Android Application Implementing Distributed Cryptography for Electi...
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
 

Recently uploaded

This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
mahaffeycheryld
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
shubhamsaraswat8740
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
VanTuDuong1
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
q30122000
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 

Recently uploaded (20)

This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Height and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdfHeight and depth gauge linear metrology.pdf
Height and depth gauge linear metrology.pdf
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 

CRYPTOCURRENCY TRACKER ppt.pptx

  • 1. Srushti Hinge (39), Sakshi Jaiswal (45), Shravani Jeurkar (49), Ria Kokate (59), Date of presentation: 04/10/2021 Under the guidance of: Prof. Radhika Malu. Atharva College of Engineering Department of Information Technology CRYPTOCOIN TRACKER -Unzip Money
  • 2. CONTEN T: 1. INTRODUCTION 1.1 Introduction 1.2 Problem Statement 1.3 Objectives 2. LITERATURE SURVEY 3. HARDWARE AND SOFTWARE REQUIREMENT 4. PROPOSED SYSTEM 4.1 Splash Screen 4.2 Login Page 4.3 Register Page 5. Conclusion 6. Future work ACE – IT DEPARTMENT CRYPTOCURRENCY TRACKER
  • 3. INTRODUCTION :  Cryptocurrency is a digital or virtual or internet currency that uses cryptography for security. Our project is based on the concept of this online currency.  There are around 100 types of different cryptocurrencies, and millions of people who have invested in these currencies.  Our app will provide the ongoing rates of the 100 known currencies with a single tap.  Our Crypto Tracker app will continuously track the current rate of these cryptocurrencies.  So, the person can know the current rate for the desired cryptocurrency by just clicking on the name of the currency.
  • 4. Problem Statement : ACE – IT DEPARTMENT CRYPTOCURRENCY TRACKER
  • 5. Objectives :  Track your crypto portfolio on the go.  Save money year-round.  Automated portfolio tracking.  This automates processes that previously were extremely labor-intensive, opaque, and costly.  It shows loss percent and profit percent.  Verification is a key benefit. ACE – IT DEPARTMENT CRYPTOCURRENCY
  • 6. 2. Literature Survey ACE – IT DEPARTMENT CRYPTOCURRENCY TRACKER
  • 7. 3. HARDWARE AND SOFTWARE REQUIREMENT : o Hardware Requirement :-  Smartphones With Android 4.4 and up o Software Requirement :-  Android Studio (2020.3.1 64 bits)  Java  XML File  Rest API (CoinmarketCap)  JSON ACE – IT DEPARTMENT CRYPTOCURRENCY TRACKER
  • 8. 4. PROPOSED SYSTEM : 4.1 Splash Screen :- ACE – IT DEPARTMENT CRYPTOCURRENCY TRACKER
  • 9.  4.2 Login Page:- ACE – IT DEPARTMENT CRYPTOCURRENCY
  • 10.  4.3 Register Page:- ACE – IT DEPARTMENT CRYPTOCURRENCY TRACKER
  • 11. 5. CONCLUSION : • Seamlessly track your crypto rate with our app. • You can register/ login to Crypto tracker and track your currency within seconds. • You can also read the news regarding the current trails of the selected currency. • User can also view the previous trails and graphs regarding the currency. • This is the most feasible way to keep a track on the continuously changing rates of almost 100 crypto currencies. ACE – IT DEPARTMENT CRYPTOCURRENCY TRACKER
  • 12. 6. FUTURE WORK : ACE – IT DEPARTMENT CRYPTOCURRENCY