SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1615
UTILITY BILL PAYMENT BASED ON NETWORK SECURITY
Mrs.M. BHUVANESWARI M.E1, A. ASHWINI2, R. BHUVANA3, R. NANDHINEE4, P. PRATHUSHA5
1 AP, Department of Information Technology, Meenakshi College of Engineering, Chennai, Tamilnadu, India.
2-5Student, Department of Information Technology, Meenakshi College of Engineering, Chennai, Tamilnadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The main aim of online bill payment is to
develop an innovative window-based online bill payment
application system wherethecustomercan pay theirbills.
It totally minimizes time and is easy to use. Online
payments can be made for various purposes with the
development of digital technology. Application that
provides the user with the ability to perform all the
payment of bills and taxes sitting at his or her desk by
using the utility bill payment system. Our application
makes it easy for departments and offices like the bank,
EB, telephone, property tax, and water tax to offer online
bill payment to their customers, allowing them to pay
their bills with our bill paymentsystem.Customerscango
to our website, login with their respective login IDs, and
have immediate access to their accounts. It is convenient
and user-friendly.Itfocuseson measuringtheefficiency of
the application while processing it on a mobile phone.
Key Words: efficient and secure payment, multiple bill
payment, interactive, quality in service, automatic billing,
immediate access.
1. INTRODUCTION
The purpose of the project is to present the requirements of
the computerization of the billing system. Whenever the
customer needs to pay their bill for electricity, water,
property, and telephone, they need to login to the respective
website and pay their bill through the bank. Once we send
the bill amount for the electricity, water, property, and
telephone bills to the bank, the bank will adjust the bill
amount with their respective account balance for the
particular person. It will totally minimize the work load of a
person. It does almost every work that is related to the
automatic billing connection system, including new
connections, customer record modifications, viewing
customer records, and all works related to the rate of bills.
An application has been proposed to improve work
efficiency, save time, and provide greater flexibility and
friendliness. The right application has an impact on user
satisfaction. A good-quality application can attract users to
use the website again because they feel satisfied.
1.1 PROPOSED SYSTEM
Practically, a computer never makes a mistakeofits
own accord. The Billing System is very helpful for the
computerization of the "Electricity Board , WaterBoard,and
Property Bills." Many people rely exclusively on computers
to do their jobs. The Electricity Board, Water Tax, and,
Property Tax, and Telephone BillsSystem,inparticular,have
been computerized, which is very helpful for bill payments.
The calculation of everyday, weekly, and monthly
transactions is added to the table, and then thecalculationof
transactions is done in ascending order by the computer
without any disturbances.
The proposed system aims to provide efficient and timely
information for decision-making, integrate with other
functions, and reduce redundant work. A computer at a very
high speed does the calculations, and the accuracy is
perfectly maintained and the processing speed is very high.
So, the computerization satisfies all the transactions within
the quick movements caused by the commands from the
users. Now, a lot of time is saved, and it is used for additional
work.
Fig -1: Block diagram of the system
So, quick report preparation is formed by the
implementation of computers in the "Electricity Board,
Water Board, Property Tax, and Telephone Bill Systems".
Service quality is one of the determinants of satisfaction, so
users will always use e-billing. The quality factor of the
service determines its relevance to improving application
performance. Usefulness provides usability of the
application, which is felt by its customers; ease of use will
give users freedom in their belief efforts.Information quality
provides quality and up-to-date information. System quality
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1616
can provide or add features according to usability,
availability, reliability, adaptability, and response time.
2. TECHNOLOGY AND TOOLS
THE.NET FRAMEWORK
The.Net Framework is the plumbing of.Net. The Framework
provides the services necessary to develop and deploy
applications for the loosely coupled, disconnected Internet
environment. The two main components that make up the
framework are:
• Common Language Runtime (CLR)
• Base Class Libraries (BCL)
The CLR is the foundation of the framework. The goalsofthe
CLR are
• Secure and robust execution environment
• Simplified development process
• Multilingual support
• Simplified management and deployment
Visual Basic.NET (VB.NET) is a Microsoft object-oriented
programming language whichwasevolvedfromVisual Basic
6 used to meet an increasing needforeasywebdevelopment
and services.
Base Class Libraries (BCL)
The BCL is divided into namespaces, which define a naming
scheme for classes such as web classes,data classes,window
forms, XML classes, enterprise services, and system classes.
ACTIVEX DATA OBJECTS
Microsoft’s ActiveX Data Objects (ADO) are a set of
Component Object Model (COM) objects for accessing data
sources. It providesa layerbetweenprogramminglanguages
and OLEDB (a means of accessingdata sources,whetherthey
be databases or otherwise,in a uniformmanner).ADOallows
a developer to write programs that access data without
knowing how the database is implemented. You must be
aware of your database for connection only. Some basic
steps are required in order to be able to access and
manipulate data using ADO:
1. Create a connection object to connect to the database.
2. Create a record set object in order to receive data.
3. Open the connection.
4. Populate the record set by opening it and passing the SQL
statement.
5. Do all the desired searching and processing on thefetched
data.
6. Commit the changes you made to the data byusingUpdate
methods.
7. Close the recorder.
8. Close the connection.
Table -1
Columnname Data type Constraint Description
Accno Varchar(50) Not Null
Account
number
Service type Int Not Null Service type
Date Date Not Null Date
Ebamt Varchar(50)
Electricity
amount
Propertyamt Varchar(50)
Property
amount
Wateramt Varchar(50)
Waterboard
amount
Telephoneamt Varchar(50)
Telephone
amount
status Int Not Null
Current
status
Microsoft SQL Server 2008
Microsoft SQL Server 2008 offers a variety of administrative
tools to ease the burdens of database development,
maintenance, and administration. In this article, we'll cover
six of the more frequently used tools such as Enterprise
Manager, Query Analyzer, SQL Profiler, Service Manager,
Data Transformation Services, and Books Online.
Buffer Management
SQL Server buffers pages in RAM to minimize disc I/O.Any 8
KB page can be buffered in memory, and the set of all pages
currently buffered known as the buffer cache. Available
memory in SQL Server decides how many pages will be
cached in memory. SQL Server includes a cost-based query
optimizer that tries to optimize based on the cost of the
resources it will take to execute the query. Finally, it decides
whether execute the query concurrently or not. While a
concurrent execution is more costly in terms of total
processor time, the fact that the execution is actually split
among different processors might mean it will execute
faster. Once a query plan is generated, it is temporarily
cached.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1617
Data Storage
The main unit of data storage is a database, which is a
collection of tables with typed columns. A SQL Server
database can contain other objects, including views, stored
procedures, indexes, and constraints, in addition to tables
and a transaction log. A SQL Server database can contain a
maximum of 231 objects. Storage space allocated to a
database is dividedintosequentiallynumberedpages, each8
KB in size. A table is split into multiple partitions in order to
spread a database over a cluster. Rows in each partition are
stored in either a B-tree or heap structure.
Chart -1: Multi transactions
3. DETAILED CONSTRUCTION
The model of multi payment is designedtohighlightfeatures
of related work that integrates these to get the best protocol
for mobile payments that can support new lifestyles.
The new model has four parts, as follows:
Customer (C): ( client, purchaser, buyer ) who obtain goods
and services from a supplier for a monetary or other
valuable consideration.
Merchant (M): is a business person who trades in
commodities produced by others, in order to earn a profit.
Intermediary (IN): is a virtual mechanism connected to all
parties for distribution of the message.
Payment Service Provider (PSP): A trusted third party that
supplies money for businesses such as
banks or nonbanks.
Table-2
Consider a scenario of public utility payment. The party C is
a member of the party Mi for contacting the business. C and
Mi are members of the same PSP, which have separate
account numbers such as Acc-c and Acc-Mi. The Mi presents
a hard copy bill to the customer for payment. The customer
can make payments to multiple merchants via mobile
applications that can select many bills payments per
transaction.
The multiple payments protocol consist of six steps shown
below:
Step1: CIN:M1={Tx,{Acc-c}SK(c-psp)j, h({Acc-c}SK(c-psp)j, SK(IN-
C)j)}SK(IN-C)j
Customer send Tx and account number to PSP pass IN.
Message (M1) was encrypted by session shared key
between C and IN that provided confidentiality properties.
People who do not have the session key cannot access the
transaction.
Payment Distribution Process:
Step2:INMi:M2 = {Tx,h(Tx,SK(IN-Mi)j)} SK(IN-Mi)j
IN received the message from C then decrypted by using
the session shared key and checked the destination to
transfer
and distribute to all merchants via protected data usingthe
encryption technique.
Authorization request from MiIN to PSP:
Step3: MiIN:
M3={StatusMi , Tx , {ACC-Mi , PriceMi}SK(Mi-PSP)j
Mi checks the message to ascertain if the condition
matches or does not match,thenupdatesmessage(approve
or
unapproved ) of status. Then call back to IN for transfer to
PSP.
Authorization Request/Response Between IN PSP
Step4: IN PSP: M4=
{StatusMi , Tx ,{Acc-c}SK(C-PSP)j , {AAcc-Mi , PriceMi}SK(Mi-PSP)j ,
h({ACC-C}SK(Mi-PSP)j , {Acc-Mi , PriceMi}sk(Mi-PSP)j , SK(IN-PSP)j)}SK(IN-
PSP)j
PSP checked the status and updated authorization request
such as balance account of customer and merchant then
responds to C and Mi pass In
step5 PSPIN:M5 = {Statusc-Mi , Tx, h(StatusMi , Tx , SK(IN-
PSP)j)}SK(IN-PSP)j+1
TID Transaction Identifier of the payments
IDx Unique Identifier of entity X
POMi Multiple Payment Order
PO Payment Order
BillnoMi bill number for each merchant
PriceMi Price of goods and service
Tp Startingtimestampoftransactionprocessing
Acc-Mi Account number of merchant i
Acc-c Account number of customer
Status Set of Confirm Payment each merchant i
Statusc-Mi Approved/unapproved
{M}k Encryption message M by key K
SK{X-Y}j A session key that shares a secret key
between entity X and entity Y, in order to
protect from replay attack session key used
once.
h(m,K) Message Authentication Code(MAC) or
HMAC of a message m and key K
TX Payment Transaction={TID,Tp,PO}
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1618
PSP send message to IN for transfer to C and Mi
Step6 INMi:M6 = {Statusc-Mi , Tx , h(StatusMi , Tx , SK(IN-
Mi))}(IN-Mi)j+1 and
{Statusc-Mi , Tx , h(Statusc-Mi , Tx , SK(IN-Mi))}(IN-C)j+1
IN divided the information and distributed to C and Mi.
The aforementioned six steps of the proposed protocol
ensures the security properties : CAIN. All messages thatare
transferred on network by using a cryptographic technique
that consists of symmetric key cryptography, hashing
function, and Message Authentication Code (MAC)
4.RESULTS
Figure 2 shows the login form, which has admin, user, and
registration forms. In the registration form, the admin and
user can register their details.Bothusersandadministrators
are provided with a username and password to login to the
page.
Fig -2: Login form
Figure 3 is the bill number registration form, which allows
the user to register their bill numbers provided to the
specific department. We can provide the details of the
electricity bill, water bill, telephone bill, and water tax.
Fig -3: Bill number registration form
Figure 4 shows the adjustment of bills done in transaction
form. Here, the user receives the multi-bills at the end of the
month from the bank and requests to pay the bills. This
transaction form allows you to combine thebillsintoa single
payment. Finally, the user will get the confirmation of paid
bill details through Email.
Fig -4: Adjustment of bills
5.CONCLUSIONS
We have tried to develop a system that can be a great help
for the customer to pay their bills for electricity, water,
property, and telephone throughthebank.The applicationis
very well tested, and errors are properly debugged.Wehave
left all the options open. If there is any requirement by the
user for the enhancement of the system in future, then it is
possible to implement them. There is necessary of future
enhancement in system, as the limitations will be overcome
by better future technologies.
6.FUTURE ENHANCEMENT
For any system, it is necessary visualize the future scope. In
the future, more software companies will hire this program
because nowadays, the need for speed in day-to-day life has
become essential. As competition increases, companies
develop more efficient versions for individual success. For
example, in my project, records of the customer and their
transactions are maintained, which will be helpful in the
future as references prior to dealings as well as evidence.
Also, limitations canbeovercome bybettertechnologies,and
systems can be made more efficient.
REFERENCES
[1] Yanjiao Chen, Xuxian Li, Jian Zhang, Hongliang Bi(2022)
“Multi-Party Payment Channel Network BasedonSmart
Contract”. 2(1), 1-7.
[2] Barokati, N., Wajdi, N., & Barid, M. (2017). Application
Design Library With the gamification concept. Jurnal
Lentera: Kajian Keagamaan, Keilmuan dan Teknologi,
3(1), 93-102.
[3] Kuzlu, M., Rahman, M. M., Pipattanasomporn, M., &
Rahman, S. (2017). Internet-based communication
platform for residential DR programmes. IET Networks,
6(2), 25-31.
[4] [15] Didyasarin, H., Vongurai, R., & Inthawadee, S.
(2017). The factors impact attitude toward using and
customer satisfaction with elderly health care mobile
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1619
application services: a case study of people in Bangkok
metropolitan, Thailand. AU-GSB e-JOURNAL,10(1),167.
[5] Nunkoo, R., Teeroovengadum,V.,Thomas,P.,&Leonard,
L. (2017). Integrating service quality as a second-order
factor in a customer satisfaction and loyalty model.
International Journal of Contemporary Hospitality
Management, 29(12), 2978-3005.
[6] Pensri Pukkasenung, Suphat Sukkasem (2016) An
Efficient of SecureMobilePhoneApplicationforMultiple
Bill Payments978-1-5090-2461-2
[7] Pratama, R. D. (2014). Persepsi User Terhadap Desain
Website Ecommerce (Studi Pada Pengguna WebsiteJkm
Store). Jurnal Administrasi Bisnis, 9(1).
[8] W., Stalling, “Cryptography and Network Security,”
Principles and Practice 6th Edition. 2013, Prentice Hall
International, Inc.
[9] Daniel O. R. et al., “Adaptive Query Algorithm for
Location Oriented Applications”RoedunetInternational
Conference (RoEduNet), 2013 th, Romania
[10] W., Qiongqiong, and M., Xin "Research on a secure
mobile payment based on multi-agents," Wireless
Communications, Networking and InformationSecurity
(WCNIS), 2010 IEEE International Conference on. IEEE,
2010
[11] M. Carbonell, J. M. Sierra, and J. Lopez, “Secure
multiparty paymentwith an intermediary entity,”
computers & security, vol. 28, no. 5, pp.289–300, 2009.
[12] M., Carbonell, J., Torres, D., Suarez,J.,M.Sierra,“Securee-
Payment Protocol with New Involved Entities,”
Collaborative Technologies and System, 2008 IEEE ,
2008. CTS 2008, International Symposium on , vol., no.,
pp. 103,111, 19-23 May 2008
[13] T. S. Fun, L. Y. Beng, R. Roslan, and H. S. Habeeb, “Privacy
in newmobile payment protocol”, World Academy of
Science, Engineering and Technology. Vol:2, pp. 198-
202, 2008.
[14] Moustakis, V., Litos, C., Dalivigas,A.,&Tsironis,L.(2004).
Website Quality Assessment Criteria. IQ, 5, 59-73. S.
Kungpisdan, B. Srinivasan, P. D. Le, “A secure Account-
based Mobile Payment protocol”.

More Related Content

Similar to UTILITY BILL PAYMENT BASED ON NETWORK SECURITY

ProjectReport.docx project report pdf file
ProjectReport.docx project report pdf fileProjectReport.docx project report pdf file
ProjectReport.docx project report pdf file
komkar98230
 
ProjectReport.docx project documentation
ProjectReport.docx project documentationProjectReport.docx project documentation
ProjectReport.docx project documentation
komkar98230
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
Mike Taylor
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking System
IRJET Journal
 
Dispute Resolution Web Application
Dispute Resolution Web ApplicationDispute Resolution Web Application
Dispute Resolution Web Application
Mike Taylor
 
E commerce technologies
E commerce technologiesE commerce technologies
E commerce technologies
Anne ndolo
 
Business Record Management System and Financial Reporting
Business Record Management System and Financial ReportingBusiness Record Management System and Financial Reporting
Business Record Management System and Financial Reporting
Mike Taylor
 
A Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital ServicesA Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital Services
Joe Andelija
 
Single cloud
Single cloudSingle cloud
Single cloud
Mazikk
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET Journal
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
Agaram Technologies
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
dannyijwest
 
Delivering IT as A Utility- A Systematic Review
Delivering IT as A Utility- A Systematic ReviewDelivering IT as A Utility- A Systematic Review
Delivering IT as A Utility- A Systematic Review
ijfcstjournal
 
Analytics and etl based bi solutions
Analytics and etl based bi solutionsAnalytics and etl based bi solutions
Analytics and etl based bi solutions
Azilen Technologies Pvt. Ltd.
 
Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023
stevefary
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...
eSAT Journals
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
eSAT Publishing House
 
A Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application ArchitectureA Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application Architecture
stevefary
 
ASSIGNMENT
ASSIGNMENT ASSIGNMENT
Synergy EA -Technical Architecture Diagrams.pdf
Synergy EA -Technical  Architecture Diagrams.pdfSynergy EA -Technical  Architecture Diagrams.pdf
Synergy EA -Technical Architecture Diagrams.pdf
Biju M R
 

Similar to UTILITY BILL PAYMENT BASED ON NETWORK SECURITY (20)

ProjectReport.docx project report pdf file
ProjectReport.docx project report pdf fileProjectReport.docx project report pdf file
ProjectReport.docx project report pdf file
 
ProjectReport.docx project documentation
ProjectReport.docx project documentationProjectReport.docx project documentation
ProjectReport.docx project documentation
 
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
 
IRJET- In-House File Tracking System
IRJET-  	  In-House File Tracking SystemIRJET-  	  In-House File Tracking System
IRJET- In-House File Tracking System
 
Dispute Resolution Web Application
Dispute Resolution Web ApplicationDispute Resolution Web Application
Dispute Resolution Web Application
 
E commerce technologies
E commerce technologiesE commerce technologies
E commerce technologies
 
Business Record Management System and Financial Reporting
Business Record Management System and Financial ReportingBusiness Record Management System and Financial Reporting
Business Record Management System and Financial Reporting
 
A Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital ServicesA Test-Bed For The Correlation Center Of Digital Services
A Test-Bed For The Correlation Center Of Digital Services
 
Single cloud
Single cloudSingle cloud
Single cloud
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability AnalysisFinite State Machine Based Evaluation Model For Web Service Reliability Analysis
Finite State Machine Based Evaluation Model For Web Service Reliability Analysis
 
Delivering IT as A Utility- A Systematic Review
Delivering IT as A Utility- A Systematic ReviewDelivering IT as A Utility- A Systematic Review
Delivering IT as A Utility- A Systematic Review
 
Analytics and etl based bi solutions
Analytics and etl based bi solutionsAnalytics and etl based bi solutions
Analytics and etl based bi solutions
 
Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023Web Application Architecture: A Comprehensive Guide for Success in 2023
Web Application Architecture: A Comprehensive Guide for Success in 2023
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
 
A Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application ArchitectureA Comprehensive Guide to Web Application Architecture
A Comprehensive Guide to Web Application Architecture
 
ASSIGNMENT
ASSIGNMENT ASSIGNMENT
ASSIGNMENT
 
Synergy EA -Technical Architecture Diagrams.pdf
Synergy EA -Technical  Architecture Diagrams.pdfSynergy EA -Technical  Architecture Diagrams.pdf
Synergy EA -Technical Architecture Diagrams.pdf
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 

Recently uploaded (20)

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 

UTILITY BILL PAYMENT BASED ON NETWORK SECURITY

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1615 UTILITY BILL PAYMENT BASED ON NETWORK SECURITY Mrs.M. BHUVANESWARI M.E1, A. ASHWINI2, R. BHUVANA3, R. NANDHINEE4, P. PRATHUSHA5 1 AP, Department of Information Technology, Meenakshi College of Engineering, Chennai, Tamilnadu, India. 2-5Student, Department of Information Technology, Meenakshi College of Engineering, Chennai, Tamilnadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The main aim of online bill payment is to develop an innovative window-based online bill payment application system wherethecustomercan pay theirbills. It totally minimizes time and is easy to use. Online payments can be made for various purposes with the development of digital technology. Application that provides the user with the ability to perform all the payment of bills and taxes sitting at his or her desk by using the utility bill payment system. Our application makes it easy for departments and offices like the bank, EB, telephone, property tax, and water tax to offer online bill payment to their customers, allowing them to pay their bills with our bill paymentsystem.Customerscango to our website, login with their respective login IDs, and have immediate access to their accounts. It is convenient and user-friendly.Itfocuseson measuringtheefficiency of the application while processing it on a mobile phone. Key Words: efficient and secure payment, multiple bill payment, interactive, quality in service, automatic billing, immediate access. 1. INTRODUCTION The purpose of the project is to present the requirements of the computerization of the billing system. Whenever the customer needs to pay their bill for electricity, water, property, and telephone, they need to login to the respective website and pay their bill through the bank. Once we send the bill amount for the electricity, water, property, and telephone bills to the bank, the bank will adjust the bill amount with their respective account balance for the particular person. It will totally minimize the work load of a person. It does almost every work that is related to the automatic billing connection system, including new connections, customer record modifications, viewing customer records, and all works related to the rate of bills. An application has been proposed to improve work efficiency, save time, and provide greater flexibility and friendliness. The right application has an impact on user satisfaction. A good-quality application can attract users to use the website again because they feel satisfied. 1.1 PROPOSED SYSTEM Practically, a computer never makes a mistakeofits own accord. The Billing System is very helpful for the computerization of the "Electricity Board , WaterBoard,and Property Bills." Many people rely exclusively on computers to do their jobs. The Electricity Board, Water Tax, and, Property Tax, and Telephone BillsSystem,inparticular,have been computerized, which is very helpful for bill payments. The calculation of everyday, weekly, and monthly transactions is added to the table, and then thecalculationof transactions is done in ascending order by the computer without any disturbances. The proposed system aims to provide efficient and timely information for decision-making, integrate with other functions, and reduce redundant work. A computer at a very high speed does the calculations, and the accuracy is perfectly maintained and the processing speed is very high. So, the computerization satisfies all the transactions within the quick movements caused by the commands from the users. Now, a lot of time is saved, and it is used for additional work. Fig -1: Block diagram of the system So, quick report preparation is formed by the implementation of computers in the "Electricity Board, Water Board, Property Tax, and Telephone Bill Systems". Service quality is one of the determinants of satisfaction, so users will always use e-billing. The quality factor of the service determines its relevance to improving application performance. Usefulness provides usability of the application, which is felt by its customers; ease of use will give users freedom in their belief efforts.Information quality provides quality and up-to-date information. System quality
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1616 can provide or add features according to usability, availability, reliability, adaptability, and response time. 2. TECHNOLOGY AND TOOLS THE.NET FRAMEWORK The.Net Framework is the plumbing of.Net. The Framework provides the services necessary to develop and deploy applications for the loosely coupled, disconnected Internet environment. The two main components that make up the framework are: • Common Language Runtime (CLR) • Base Class Libraries (BCL) The CLR is the foundation of the framework. The goalsofthe CLR are • Secure and robust execution environment • Simplified development process • Multilingual support • Simplified management and deployment Visual Basic.NET (VB.NET) is a Microsoft object-oriented programming language whichwasevolvedfromVisual Basic 6 used to meet an increasing needforeasywebdevelopment and services. Base Class Libraries (BCL) The BCL is divided into namespaces, which define a naming scheme for classes such as web classes,data classes,window forms, XML classes, enterprise services, and system classes. ACTIVEX DATA OBJECTS Microsoft’s ActiveX Data Objects (ADO) are a set of Component Object Model (COM) objects for accessing data sources. It providesa layerbetweenprogramminglanguages and OLEDB (a means of accessingdata sources,whetherthey be databases or otherwise,in a uniformmanner).ADOallows a developer to write programs that access data without knowing how the database is implemented. You must be aware of your database for connection only. Some basic steps are required in order to be able to access and manipulate data using ADO: 1. Create a connection object to connect to the database. 2. Create a record set object in order to receive data. 3. Open the connection. 4. Populate the record set by opening it and passing the SQL statement. 5. Do all the desired searching and processing on thefetched data. 6. Commit the changes you made to the data byusingUpdate methods. 7. Close the recorder. 8. Close the connection. Table -1 Columnname Data type Constraint Description Accno Varchar(50) Not Null Account number Service type Int Not Null Service type Date Date Not Null Date Ebamt Varchar(50) Electricity amount Propertyamt Varchar(50) Property amount Wateramt Varchar(50) Waterboard amount Telephoneamt Varchar(50) Telephone amount status Int Not Null Current status Microsoft SQL Server 2008 Microsoft SQL Server 2008 offers a variety of administrative tools to ease the burdens of database development, maintenance, and administration. In this article, we'll cover six of the more frequently used tools such as Enterprise Manager, Query Analyzer, SQL Profiler, Service Manager, Data Transformation Services, and Books Online. Buffer Management SQL Server buffers pages in RAM to minimize disc I/O.Any 8 KB page can be buffered in memory, and the set of all pages currently buffered known as the buffer cache. Available memory in SQL Server decides how many pages will be cached in memory. SQL Server includes a cost-based query optimizer that tries to optimize based on the cost of the resources it will take to execute the query. Finally, it decides whether execute the query concurrently or not. While a concurrent execution is more costly in terms of total processor time, the fact that the execution is actually split among different processors might mean it will execute faster. Once a query plan is generated, it is temporarily cached.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1617 Data Storage The main unit of data storage is a database, which is a collection of tables with typed columns. A SQL Server database can contain other objects, including views, stored procedures, indexes, and constraints, in addition to tables and a transaction log. A SQL Server database can contain a maximum of 231 objects. Storage space allocated to a database is dividedintosequentiallynumberedpages, each8 KB in size. A table is split into multiple partitions in order to spread a database over a cluster. Rows in each partition are stored in either a B-tree or heap structure. Chart -1: Multi transactions 3. DETAILED CONSTRUCTION The model of multi payment is designedtohighlightfeatures of related work that integrates these to get the best protocol for mobile payments that can support new lifestyles. The new model has four parts, as follows: Customer (C): ( client, purchaser, buyer ) who obtain goods and services from a supplier for a monetary or other valuable consideration. Merchant (M): is a business person who trades in commodities produced by others, in order to earn a profit. Intermediary (IN): is a virtual mechanism connected to all parties for distribution of the message. Payment Service Provider (PSP): A trusted third party that supplies money for businesses such as banks or nonbanks. Table-2 Consider a scenario of public utility payment. The party C is a member of the party Mi for contacting the business. C and Mi are members of the same PSP, which have separate account numbers such as Acc-c and Acc-Mi. The Mi presents a hard copy bill to the customer for payment. The customer can make payments to multiple merchants via mobile applications that can select many bills payments per transaction. The multiple payments protocol consist of six steps shown below: Step1: CIN:M1={Tx,{Acc-c}SK(c-psp)j, h({Acc-c}SK(c-psp)j, SK(IN- C)j)}SK(IN-C)j Customer send Tx and account number to PSP pass IN. Message (M1) was encrypted by session shared key between C and IN that provided confidentiality properties. People who do not have the session key cannot access the transaction. Payment Distribution Process: Step2:INMi:M2 = {Tx,h(Tx,SK(IN-Mi)j)} SK(IN-Mi)j IN received the message from C then decrypted by using the session shared key and checked the destination to transfer and distribute to all merchants via protected data usingthe encryption technique. Authorization request from MiIN to PSP: Step3: MiIN: M3={StatusMi , Tx , {ACC-Mi , PriceMi}SK(Mi-PSP)j Mi checks the message to ascertain if the condition matches or does not match,thenupdatesmessage(approve or unapproved ) of status. Then call back to IN for transfer to PSP. Authorization Request/Response Between IN PSP Step4: IN PSP: M4= {StatusMi , Tx ,{Acc-c}SK(C-PSP)j , {AAcc-Mi , PriceMi}SK(Mi-PSP)j , h({ACC-C}SK(Mi-PSP)j , {Acc-Mi , PriceMi}sk(Mi-PSP)j , SK(IN-PSP)j)}SK(IN- PSP)j PSP checked the status and updated authorization request such as balance account of customer and merchant then responds to C and Mi pass In step5 PSPIN:M5 = {Statusc-Mi , Tx, h(StatusMi , Tx , SK(IN- PSP)j)}SK(IN-PSP)j+1 TID Transaction Identifier of the payments IDx Unique Identifier of entity X POMi Multiple Payment Order PO Payment Order BillnoMi bill number for each merchant PriceMi Price of goods and service Tp Startingtimestampoftransactionprocessing Acc-Mi Account number of merchant i Acc-c Account number of customer Status Set of Confirm Payment each merchant i Statusc-Mi Approved/unapproved {M}k Encryption message M by key K SK{X-Y}j A session key that shares a secret key between entity X and entity Y, in order to protect from replay attack session key used once. h(m,K) Message Authentication Code(MAC) or HMAC of a message m and key K TX Payment Transaction={TID,Tp,PO}
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1618 PSP send message to IN for transfer to C and Mi Step6 INMi:M6 = {Statusc-Mi , Tx , h(StatusMi , Tx , SK(IN- Mi))}(IN-Mi)j+1 and {Statusc-Mi , Tx , h(Statusc-Mi , Tx , SK(IN-Mi))}(IN-C)j+1 IN divided the information and distributed to C and Mi. The aforementioned six steps of the proposed protocol ensures the security properties : CAIN. All messages thatare transferred on network by using a cryptographic technique that consists of symmetric key cryptography, hashing function, and Message Authentication Code (MAC) 4.RESULTS Figure 2 shows the login form, which has admin, user, and registration forms. In the registration form, the admin and user can register their details.Bothusersandadministrators are provided with a username and password to login to the page. Fig -2: Login form Figure 3 is the bill number registration form, which allows the user to register their bill numbers provided to the specific department. We can provide the details of the electricity bill, water bill, telephone bill, and water tax. Fig -3: Bill number registration form Figure 4 shows the adjustment of bills done in transaction form. Here, the user receives the multi-bills at the end of the month from the bank and requests to pay the bills. This transaction form allows you to combine thebillsintoa single payment. Finally, the user will get the confirmation of paid bill details through Email. Fig -4: Adjustment of bills 5.CONCLUSIONS We have tried to develop a system that can be a great help for the customer to pay their bills for electricity, water, property, and telephone throughthebank.The applicationis very well tested, and errors are properly debugged.Wehave left all the options open. If there is any requirement by the user for the enhancement of the system in future, then it is possible to implement them. There is necessary of future enhancement in system, as the limitations will be overcome by better future technologies. 6.FUTURE ENHANCEMENT For any system, it is necessary visualize the future scope. In the future, more software companies will hire this program because nowadays, the need for speed in day-to-day life has become essential. As competition increases, companies develop more efficient versions for individual success. For example, in my project, records of the customer and their transactions are maintained, which will be helpful in the future as references prior to dealings as well as evidence. Also, limitations canbeovercome bybettertechnologies,and systems can be made more efficient. REFERENCES [1] Yanjiao Chen, Xuxian Li, Jian Zhang, Hongliang Bi(2022) “Multi-Party Payment Channel Network BasedonSmart Contract”. 2(1), 1-7. [2] Barokati, N., Wajdi, N., & Barid, M. (2017). Application Design Library With the gamification concept. Jurnal Lentera: Kajian Keagamaan, Keilmuan dan Teknologi, 3(1), 93-102. [3] Kuzlu, M., Rahman, M. M., Pipattanasomporn, M., & Rahman, S. (2017). Internet-based communication platform for residential DR programmes. IET Networks, 6(2), 25-31. [4] [15] Didyasarin, H., Vongurai, R., & Inthawadee, S. (2017). The factors impact attitude toward using and customer satisfaction with elderly health care mobile
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 04 | Apr 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1619 application services: a case study of people in Bangkok metropolitan, Thailand. AU-GSB e-JOURNAL,10(1),167. [5] Nunkoo, R., Teeroovengadum,V.,Thomas,P.,&Leonard, L. (2017). Integrating service quality as a second-order factor in a customer satisfaction and loyalty model. International Journal of Contemporary Hospitality Management, 29(12), 2978-3005. [6] Pensri Pukkasenung, Suphat Sukkasem (2016) An Efficient of SecureMobilePhoneApplicationforMultiple Bill Payments978-1-5090-2461-2 [7] Pratama, R. D. (2014). Persepsi User Terhadap Desain Website Ecommerce (Studi Pada Pengguna WebsiteJkm Store). Jurnal Administrasi Bisnis, 9(1). [8] W., Stalling, “Cryptography and Network Security,” Principles and Practice 6th Edition. 2013, Prentice Hall International, Inc. [9] Daniel O. R. et al., “Adaptive Query Algorithm for Location Oriented Applications”RoedunetInternational Conference (RoEduNet), 2013 th, Romania [10] W., Qiongqiong, and M., Xin "Research on a secure mobile payment based on multi-agents," Wireless Communications, Networking and InformationSecurity (WCNIS), 2010 IEEE International Conference on. IEEE, 2010 [11] M. Carbonell, J. M. Sierra, and J. Lopez, “Secure multiparty paymentwith an intermediary entity,” computers & security, vol. 28, no. 5, pp.289–300, 2009. [12] M., Carbonell, J., Torres, D., Suarez,J.,M.Sierra,“Securee- Payment Protocol with New Involved Entities,” Collaborative Technologies and System, 2008 IEEE , 2008. CTS 2008, International Symposium on , vol., no., pp. 103,111, 19-23 May 2008 [13] T. S. Fun, L. Y. Beng, R. Roslan, and H. S. Habeeb, “Privacy in newmobile payment protocol”, World Academy of Science, Engineering and Technology. Vol:2, pp. 198- 202, 2008. [14] Moustakis, V., Litos, C., Dalivigas,A.,&Tsironis,L.(2004). Website Quality Assessment Criteria. IQ, 5, 59-73. S. Kungpisdan, B. Srinivasan, P. D. Le, “A secure Account- based Mobile Payment protocol”.