Computer Science & Engineering An International Journal
Latest Publications


TOTAL DOCUMENTS

87
(FIVE YEARS 3)

H-INDEX

5
(FIVE YEARS 0)

Published By Academy And Industry Research Collaboration Center

2231-329x, 2231-3583

2021 ◽  
Vol 11 (1) ◽  
pp. 1-11
Author(s):  
Cheman Shaik

Counterfeit production is a threat for every genuine business causing damage to their brand image and stealing their revenues. The aim of this paper is topresenta novel method to prevent counterfeit products using cryptography, QR code and webservice. The method requires that every original product manufacturer obtain a cryptographic key pair, securely store their private key and publish their public key on their website as a QR code. The product manufacturer needs to print a unique item code on their product packs and provide inside the pack a QR code encoding the ciphertext generated by encrypting the item code with their private key. For product verification by buyers, the manufacture is required to provide a QR code scanning app for download on their website, Google Play Store or iPhone App Store. The scanning app should have additional cryptographic functionality to decrypt ciphertext of the item code encoded in the QR code. The manufacturer also needs to launch a simple webservice on his hosting server to accept requests from the mobile app and verify the item code and buyer’s name in its database. Technicalimplementation and the verification process are described in detail through figures and flowchart. The method can be implemented even by small manufacturers with nominal cost by obtaining a key pair and creating a scanning app and webservices. We have also tested the method with an actual software code written for cryptographic operations using the Java cryptography Extension and QR code operations using Google Zxing libraries.


2020 ◽  
Vol 10 (5) ◽  
pp. 1-5
Author(s):  
Md. Sumon Rony ◽  
Sagor Chandra Bakchy ◽  
Hadisur Rahman

As crime rates keep spiraling each day, new challenges are faced by law enforcement agencies. They have to keep their on the lookout for any signs criminal activity. The law enforcement agencies should therefore be able to predict such increase or decrees or trends in crime. Such as theft, Killing. Crime that may occur in a particular area in a particular month, year, any timespan. Data mining is defined as a process of discovering hidden valuable knowledge by analyzing large amounts of data, which is stored in databases or data warehouse, using various data mining techniques such as machine learning, artificial intelligence, statistical. Many algorithms for data mining approach to help detect the crimes patterns. Data Collection, Data Preprocessing Phase, Data Filtering, Linier Regression. Wekasoft are used for collection of data analyzing. Visualization finally get results. The advantage of using this tool is that clustering will be performed automatically.


2018 ◽  
Vol 8 (2/3) ◽  
pp. 01-20
Author(s):  
ALaa Dhaifallah Alrehaili ◽  
Muazzam Ahmed Siddiqui ◽  
Seyed M Buhari

2018 ◽  
Vol 8 (1) ◽  
pp. 01-08 ◽  
Author(s):  
Vinitha S ◽  
Sweetlin S ◽  
Vinusha H ◽  
Sajini S

2016 ◽  
Vol 6 (4) ◽  
pp. 21-29
Author(s):  
Jinlin Liu ◽  
Qiang Chen ◽  
Chen Zhang
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document