scholarly journals Development and Evaluation of Blockchain based Secure Application for Verification and Validation of Academic Certificates

2021 ◽  
Vol 5 (2) ◽  
pp. 22-36
Author(s):  
Elva Leka ◽  
Besnik Selimi

Academic degrees are subject to corruptions, system flaws, forgeries, and imitations. In this paper we propose to develop a blockchain smart contract-based application using Ethereum Platform, to store, distribute and verify academic certificates. It constitutes a trusted, decentralized certificate’s management system that can offer a unified viewpoint for students, academic institutions, as well as for other potential stakeholders such as employers. The article describes the implementation of three main parts of our proposed solution that includes: verification application, university interface and accreditor interface. This application avoids administrative barriers, makes the process of deployment, verification, and validation of certificates faster, efficient, and more secure. Additionally, it offers confidentiality of the data by using AES encryption algorithm before creating transactions and allows bulk submission of multiple academic certificates.

Attendance taking and maintaining is a tedious job in the academic institutions where the time of class is restricted. The manual attendance i.e., roll call or paper-based signature systems usually consumes more time and error prone and also possibility of recording proxy attendance is more. Attendance is one of the criteria in considering students’ eligibility for attending the external examinations and also for the promotion to the next semester / year, where these kinds of problems may cause severe effect on the academic institutions. As the strength of students in a class is increasing day by day; monitoring, awarding and maintenance of attendance has becoming a challenge for the academic institutions. As a solution, attendance can be recorded using anyone of the existing biometric techniques like fingerprinting, iris recognition, signature, face recognition etc. Face identification is the best method among all the earlier mentioned methods for implementing in the academic institutions as it does not require human intervention and it is a cost-effective technique. A novel student attendance recording and management system using a MATLAB application, LabVIEW, Camera interface and GSM is proposed in this paper. Students’ faces will be captured with the help of a camera connected to a computer and Eigen values of the captured images will be detected with the help of MATLAB executed by LabVIEW Mathscript node. LabVIEW, a graphical programming environment is adopted for acquiring face, processing and authenticating the student once the match is found. Authenticated student attendance will be updated, and a message will be sent with the help of GSM module interface to myRIO. Proposed system replaces the manual attendance system which improves the performance of existing system.


Author(s):  
Sachin Ahuja ◽  
Archana Mantri

This chapter proposes the use of agile methodology in designing the innovation management system in young academic institutes. Technology innovations from most universities and research institutes originate out of chaos. As a result, it is difficult to associate structure to its management. While there have been many social science research methodology based studies on this subject under the broad umbrella of “Innovation and Technology Management”, there is usually an absence of well defined process to help young academic institutions to manage their intellectual property better. There is a strongly desired need to associate a clearly articulated structure for translation of ideas into technology innovations that will help young academic institutes to inculcate research in students and faculties and would help identify the best commercial application of technology innovations. Agile methodologies are best suited to be adopted in the academic scenario as rapidly changing environment of academic institutes can be easily handled using agile methodology. The aim of this chapter is to produce an evolutionary advance practical innovation management process for academic institutes out of this chaos to inculcate research in students and faculties using agile methodologies.


Author(s):  
Christos Stergiou ◽  
Kostas E. Psannis

Mobile cloud computing provides an opportunity to restrict the usage of huge hardware infrastructure and to provide access to data, applications, and computational power from every place and in any time with the use of a mobile device. Furthermore, MCC offers a number of possibilities but additionally creates several challenges and issues that need to be addressed as well. Through this work, the authors try to define the most important issues and challenges in the field of MCC technology by illustrating the most significant works related to MCC during recent years. Regarding the huge benefits offered by the MCC technology, the authors try to achieve a more safe and trusted environment for MCC users in order to operate the functions and transfer, edit, and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is, according to the study, the most relevant encryption algorithm to a cloud environment. Concluding, the authors suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies.


Author(s):  
Yusep Rosmansyah ◽  
Ignatius Leo Sri Hendarto ◽  
Demby Pratama

Nowadays, online learning or e-learning has become increasingly popular and evolved. Many academic institutions use the Learning Management System (LMS) as a medium for delivering e-learning. A vital feature in such a system is the electronic examination (e-exam), where verifying student’s authentic competence is a challenge. This paper aims to present countermeasures for impersonation attacks. This research was a more focused effort and a continuation of previously owned one and many others found in works of literature. The method of protection is presented in the form of an attack-defense tree model.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


Sign in / Sign up

Export Citation Format

Share Document