SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
International Journal of Advanced JOURNAL OF ADVANCED RESEARCH ISSN 0976 –
INTERNATIONAL Research in Engineering and Technology (IJARET), IN
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

ENGINEERING AND TECHNOLOGY (IJARET)

ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 7, November - December 2013, pp. 71-84
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com

IJARET
©IAEME

STRENGTH OF DATA MATRIX AND DESIGN OF SCUIRS
Mr. Lokesh S. Khedekar1,
1,2

Dr. A.S.Alvi2

PRMIT&R, Information Technology, Amravati, India

ABSTRACT
With the vast introduction of the wireless world, the exchanged information now is more
prone to security attacks than ever. Barcodes are the information careers in the form of an image.
Their various applications have been discussed in brief and also the structure, symbology and
properties of barcodes. This paper aims to provide an approach which can uniquely identify the
product and prevent unauthorized computer access using Data matrix. Data matrix is explained in
detail to get the rigged understanding on quick response technology. The design of SCUIRS security
model to share the data over the network is explained. Smart credentials eliminate the inherent
weaknesses and costs of password authentication, and bypass the risk posed by legacy physical cardaccess systems. Smart credentials let you provide secure access to computer networks (logical
access) and buildings (physical access).
Keywords: Barcode, Data matrix, QR Code, UUID, Network.
I.

INTRODUCTION

There are a variety of methods you can use to print barcodes. We recommend the lowest cost
alternative to get started – a barcode font. Barcode fonts give you an inexpensive and flexible way to
print labels quickly with high resolution and a low initial investment.[1][2] The location barcode is
important because the goal of the inventory system is to know not only what you have, but to be able
to tell accurately where it all is.
When discounts apply to bar-coded merchandise, store employees may forget to code in the
discount price. This, in turn, can lead to confusion and delays at the checkout counter,
inconveniencing the customer, the checkout clerk, and other customers waiting in line. If a barcode
can't be scanned, for any reason, the clerk must then read the corresponding numeric code and enter
it manually. Because clerks have become used to scanning barcodes quickly and automatically,
without any additional effort on their part, their lack of practice in manual code entries may
potentially cause them to be slow and/or inaccurate in entering the information, further delaying the
71
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

checkout process. Considering barcodes as an effective media to share information, at present, the
black and white two dimensional barcode technologies has developed more mature. American
National Standards Institute (ANSI) developed the international standards of two-dimensional bar
code, QR codes [3][4]. However, with the urge of increase in information, expanding the field of bar
code applications is thought to be good idea. Barcodes are used to store the high capacity
information in less space and thus, stands as a good ideate.
This paper is related with the implementation of a product that will combine the power of
graphical representation and the power of random numbers and characters for a unique ID.
Combination of both Unique ID and Unique image will help a user to identify the product from other
products and store its information accordingly.
SCUIRS will not only give you a complete solution to product identification but can facilitate
you with one more option. SCUIRS will also act like a Security system. The basic idea behind the
designing of SCUIRS is to use the feature of Unique numbers combined with unique images and
form a unique combination that will help in recognizing the product or a user or any item in
inventory.
II.

STRUCTURE OF DATA MATRIX

Datamatrix (or Data Matrix) is a high density 2 dimensional barcode that can encode up to
3116 characters from the entire 256 byte ASCII character set. Compared with DF417 barcode
symbology the data matrix barcode belongs to newer family of 2 dimensional barcodes that makes
better use of both dimensions and thus can achieve higher data capacity than the PDF417 symbology
(~3kB vs. ~2kB). The symbol is built on a square grid which has a finder pattern around the edges of
the symbol to allow a scanner to identify the barcode. The finder pattern makes it possible to read the
barcode regardless of the physical orientation of the code. In the same way as with other 2
dimensional barcodes the data matrix code includes error correction capability in order to be resilient
towards physical damages of a code. Originally data matrix used an older convolution error
correction schema (ECC) but that has later been changed to use a Reed-Solomon type of error
correction which is much more efficient. The older ECC version is known as ECC 000 to ECC 140
and should be considered obsolete and should not be used in new applications. The newer error
correction schema (with Reed-Solomon codes) is known as ECC 200 schema and is the current and
recommended schema. By default the library will use the newer schema but support also exists for
legacy applications to use the older ECC schema. Figure Data matrix structure shows the principle of
a Data matrix barcode.[5]
The figure shows an annotated Data matrix where the finder and synchronization patterns
have been highlighted.

Figure 1. Structure of Data Matrix
72
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

III. SYSTEM ANALYSIS AND DESIGN
3.1 Problem Definition
When user will store information about a product or person a unique ID will be generated.
This Unique ID will be Tier 1 identification for the User or Object. Entering this Unique ID as an
Input to our Selective algorithm will generate a unique Image for that particular ID. This Unique
image will act as Tier 2 identification for User or Object. This image will be hash mapped to the
User Unique ID and both will be used to identify an object. When identifiers are used solely within a
database, their generation should be left to the database itself.
3.2 SCUIRS working
• To generate a unique image from a unique ID and to map the image to a specific item
in an inventory.
• When user will store information about a product or person a unique ID will be
generated.
• This Unique ID will be Tier 1 identification for the User or Object.
• Entering this Unique ID as an Input to our Selective algorithm will generate a unique
Image for that particular ID.
• This Unique image will act as Tier 2 identification for User or Object.
• This image will be hash mapped to the User Unique ID and both will be used to
identify an object.
3.3 Proposed System Design
3.3.1.1 UUID
Generating Unique ID
When identifiers are used solely within a database, their generation should be left to the
database itself. Unique identifiers which are "published" in some way may need special treatment,
since the identifier may need to be difficult to guess or forge.
A typical example is the value of a cookie used as a session identifier - simply using a series
of consecutive integers is generally unacceptable, since one user could easily impersonate another by
altering the value of the cookie to some nearby integer.
3.3.1.2 Secure Random and Message Digest
The following method uses SecureRandom and MessageDigest : upon startup, initialize
SecureRandom(this may be a lengthy operation) when a new identifier is needed, generate a random
number using SecureRandom
Create a MessageDigestof the random number
Encode the byte[] returned by the MessageDigest into some acceptable textual formcheck if the
result is already being used ; if it is not already taken, it is suitable as a unique identifier
The MessageDigest class is suitable for generating a "one-way hash" of arbitrary data. (Note that
hash values never uniquely identify their source data, since different source data can produce the
same hash value. The value of hashCode, for example, does not uniquely identify its associated
object.) A MessageDigest takes any input, and produces a String which is of fixed length
Does not allow the original input to be easily recovered (in fact, this is very hard)

73
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

Does not uniquely identify the input; however, similar input will produce dissimilar message
digests
Message Digest is often used as a checksum, for verifying that data has not been altered since its
creation.

Figure 2. Data flow diagram for SCUIRS
GUI: Graphical User Interface will be used to gather information regarding the inventory from the
user.GUI will consist of components to take inventory information and details from the user,
components to save, edit, retrieve (searching) and delete the information. GUI will also contain a
separate module for Unique ID (generated by the database and encrypted by selective algorithm)
passing to generate an unique data matrix image.
Selective algorithm for Unique ID encryption: This algorithm will be a modified version of 56 bit
key DES algorithm. The selective algorithm will be used to encrypt the unique ID before been
passed on for conversion into data matrix image.
Selective algorithm for unique image The algorithm will encode the pre encrypted Unique ID and a
data matrix will be generated that will be used for printing or publishing as required by the user.
Storage of Unique ID: Database will store inventory information and details and a Unique ID will be
generated and associated with every record.
This Unique ID will act as Tier 1 identification for the record.
Web server process and retrieval: A portal will be established which will contain the GUI and the
entire process of storage of Data and retrieval along with data matrix image generation and
publishing process.
74
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

3.4 Block Diagram

Figure 3. BlockDiagram for SCUIRS
Web Portal: Web portal will contain a module that will take an input from the client which will be
a data matrix image.
Data inventory: Tables, relations related to items will be stored in data inventory. Data inventory is
nothing but a set of tables that will contain records about items and its detailed information.
Database: Information entered by the administrator will be stored in the database. This information
will be stored in the form of a tuple. Each tuple will have a unique ID associated with it.
Unique ID: This will be a 16 bit ID generated by the database (MySQL) and it will be used to
identify the tuple in case of searching.
Unique ID passed to (selective) algorithm: The algorithm will encrypt the Unique ID generated by
database (MySQL). This encrypted key or string
will be further passed on to another selective algorithm to create a unique image (i.e. Data Matrix
image).
75
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

Unique image ready to publish: Unique image created by the selective algorithm can be either
published or printed by the administrator.
Capturing unique image: The image i.e. published or printed by the administrator can be captured by
the user and sent back to the web portal through an HTTP response.
Clipping: Since the captured image will vary in size, it needs to be clipped and exact Data Matrix
needs to be extracted out of the captured image. Clipping will help to extract the exact image and
pass it on to the web portal.
Uploading of Image: An FTP request to the server will carry the clipped image that will be used to
map with the database to find the related record or information.
Sending information back to client: If mapping returns a record, then it will be sent back to the client
(i.e. browser of phone or computer system) and this will complete the process.
IV. SYSTEM IMPLEMENTATION
Implementation Steps
Work plan define the specific steps as follows:1. Add data to inventory.
2. Extract the unique identity field that will be auto generated.
3. Encode the ID into a Data Matrix.
4. Apply selective Data encoding algorithm.
5. Generate and distribute the Data Matrix.
6. Under Decoding process, apply Reed Solomon Code algorithm
7. Extract the Unique ID from Data Matrix.
8. Provide to the database as queried ID.
9. Appropriate record will be displayed respectively.
Details of the Implementation Technique:
As we declare above that first we have to a data inventory i.e. data table under a database, we try to
create the same,

Table 1: Database Table
76
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

Table 2: Meta structure of the table
The database consists of various fields used to store related information in inventory.
The ID field which is auto incremental is used as the defacto field to be stored in the data matrix.
4.3 Algorithm
Step 1. Take input string that should be the Unique ID.
Step2. Apply error correcting technique; so that the data can be recovered even if part of the printed
symbol has been destroyed .
Step 4. Finally the encoded data and the error correcting words are placed in the symbol according to
an algorithm specified in the standard
Step 5. When decoding this barcode do the reverse operation and encode string from barcode into
Unicode string using
System.Convert.FromBase64String() and System.Text.Encoding.Unicode.GetString() methods
accordingly
4.4 System Execution Details
GUI for the system
The functions of the buttons, text field and panel are described as below.

Screenshot no 1: The GUI for the system

77
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

1) Encode the Unicode string into Base64 string using
System.Text.Encoding.Unicode.GetBytes()
2) Method System.Convert.ToBase64String() will convert the bytes to Base 64 string.
3) Encode this base64 string into barcode (2D Data Matrix Code)

Screen Shot 2: Generated Resultant Data Matrix

Screenshot no 3: The inserted data into the table
Data Table Fields after operation:

Screenshot no 4: Data Table Fields after operation

Psuedocode
To encode data into a Data matrix symbol the following (principal) steps are taken.
1. The input string (which can be any ASCII values between 0-255) is encoded using the selected
encoding or encodings (it is possible to switch encoding mid-way through the string). The primary
purpose of the encoding is to compress the data into a much shorter form.
2. If needed the data is padded to fill up to the capacity of the selected symbol size.
3. Once the string has been encoded (and possible padded) a number of error correcting code words
are added so that the data can be recovered even if part of the printed symbol have been destroyed
(perhaps a corner has been teared off)
4. Finally the encoded data and the error correcting words are placed in the symbol according to an
algorithm specified in the standard. This is done by placing each bit of every data byte in a specific
position in the data matrix symbol.
78
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

4.5 Result Analysis
Width and Height of a Module (X)
The range of the X-dimensions will be defined by the application specification, having due
regard to the availability of equipment for the production and reading of symbols and complying
with the general requirements of the application.
The X-dimension shall be constant throughout a given symbol. The X-dimension should
apply to both the width and height of the modules.
Module size
Defines the smallest cell in data matrix code. Module size has to be made out of at least 2×2
printed dots for bigger realibility. Also terms dot size or cell size can be used.
Finder Pattern
Bottom and left side of Data Matrix code refers to finder pattern. The L pattern is used locate
and orient the symbol. Finder pattern is also used to correct distortion.
Timing Pattern
Dashed line positioned on upper-right side gives the reader information about Data Matrix
code size. The sizes vary from 10×10 up to 144×144 depending amount and type of data.
Quiet zone
A quiet zone is the area around Data matrix code that does not contain any information. Quiet
zone is separating DMC from its surroundings and should be at least one module wide. Data area is
bordered by finder pattern and timing pattern. With selected position of dark and white cells, the
desired information is encoded together with data correction code.
Reed Solomon Code

Screenshot no. 5: Encoding Process Using Reed Solomon Code
79
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

The Reed-Solomon codes are used as error correction system. They have a capacity of
detection and correction of errors defined in advance, depending on the size of the data matrix.
A body C is a set of elements provided with two closed and called binary operations addition
and multiplication. Being closed means that the result of each operation on two elements of the
assembly will always be an element of the assembly.
There are many bodies, finite and infinite. It turns out that for any integer prime p and any
integer n (>=1), there exists a unique finite np elements, noted GF(np). These bodies are called
Galois fields.
We can represent the elements of GF(np) using the basic elements of a : 0, 1, a, a2, a3, ..., a(n-1).
Let's take an example:
a3 + a + 1
Elements can also be represented in different forms: binary, decimal, or even in the form of a
polynomial.
binary: 1011 (0 indicates no a2)
decimal: 11 (8+2+1)
polynomial: a3 x3 + a x + 1
For each Galois field, there is at least one primitive polynomial, denoted by p (x), which
allows to build the body. Data Matrix storing data of 8 bits (in code words), and therefore work in
the Galois field GF(28). They use the primitive polynomial x8+x5+x3+x2+1, which corresponds to
the value 301.
The addition and subtraction of two elements is the XOR (exclusive OR) between these two
elements. Multiplication and division are calculated by multiplying the corresponding polynomials.
This operation is relatively expensive in computation time, an algorithm is used. Since all
components are a power of primitive polynomial p, must be sought for each element c, i power as:
i = logp (c)
c = antilogp (i)
From there, we can calculate for two elements c and d:
c * d = antilogp (logp(c) + logp(d))
c / d = antilogp (logp(c) - logp(d))
We can get the e antilogs table with this algorithm:

For Data Matrix symbols containing a total of less than 255 codewords (all symbols
rectangular and square sizes less than 48x48), the codewords correction are calculated directly from
the data codewords. For other symbols, the codewords correction are calculated in accordance with a
procedure of interleaving: dividing the codewords into several data blocks of same size and
correction codewords are computed block by block.

80
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

Each codeword c is part of the group:
o c modulo n

Figure 4: Encoding Process using Reed Solomon Code

Time Efficiency of Reed Solomon Quadratic Equation
Column (x,y)

(128, 256)

(512, 1024)

(16384, 32768)

Quadratic

4.61/9.18

1.16/2.32

0.034/0.069

81
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

Figure 5. Bar Graph of Outlier Measure of Error Correction Using Reed Solomon Code

Performance Boost:
Limit the number of codes to detect By default, conventional process assumes that there are
n datamatrix codes hidden in the image and thus scans the image thoroughly not to miss one of them.
While conventional algorithm usually detects the actual datamatrix codes first and quite fast, there
might always be “suspicious” areas in an image that loosely resemble a datamatrix code. Checking
these potential matches is what slows conventional algorithm down.
Performance gain: groundbreaking. Detection time droppend from endless 3.8 msecs to 2.0 msecs
Restrict the detection time
Conventional process has a control parameter for this problem too: by simply
setting timeout to a certain number of milliseconds, we restrict the total detection time per image:
Performance gain: invisible… effectively prevents the “endless loop”-like scenarios from above. The
Datamatrix code specification states a “quiet” zone (actually a white pixel border) around each
datamatrix code. Datamatrix codes generated with pydmtx perfectly adhere to this spec, so I was
quite surprised about the low code detection rate in my scans. After some research I found the guilty:
as I placed my datamatrix code on the very bottom of the scanning glass. my scanner driver ruined
this quiet zone by cropping away the seemingly needless pixels on the bottom of the page. As a
consequence, the detection rate dropped drastically.
Result Statement:
These simple tweaks further reduced the total processing time from 1.9 secs to 0.41 secs,
that’s a performance gain of over 75%.

82
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

V. TESTING
For testing we first create many data matrix files with different data and then we run our
project for all these data matrix files repeatedly & we get the proper result.

Column (x,y)

(512, 1024)

Quadratic

•

(128, 256)
4.61/9.18

1.16/2.32

(16384, 32768)
0.034/0.069

2nd screenshot show graphical depiction of reduced time.

Screenshot no 6: Showing Graphical Representation of Reduced Time
•

Screenshot show that our algorithm reduced the time drastically and enhanced error detection
and correction with respect to time and space.

CONCLUSION
A new method is proposed here which is a hybrid model for data encoding and error
correcting in data matrix and provides decoding algorithm. It runs at 640×480 resolution for real time
scenarios. This proposed system provides an accuracy of 97.6%. Our experiments show that the
proposed system produces accurate results with improved speed.
Using this data matrix image through scanner or mobile phone camera we can decompile the
product information. The product information can be accessed anywhere if the database stored and
accessed through a web server. This ensures portability and security since the unique number will
only be known to the organization. Organization will be using a unique image to access their product
information or person or object
83
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME

REFERENCES
[1] International Organization for Standardization: Information Technology International
Symbology Speciation – Data Matrix [S]. ISO/IEC16022 (P), 2000.
[2] Pavlidis T, Swartz J. Fundamentals of barcode information theory[J]. IEEE Computer, 990,
23(4): 74- 86.
[3] Thota Sriram, K.V.Rao, S Biswas, Basheer Ahmed, “Application of barcode technology in
automated storage and retrieval systems”, BHEL.
[4] Bing Nan, Ming-Chui-Dong Y Mang, “From Codabar to ISBT 128: Implementing Barcode
Technology in Blood Banking Automation System”, Proceedings of the 2005 IEEE Engineer
in Medicine and Biology 27th Annual conference, Shanghai, China, 2005.
[5] Kimmy Ghanaiya1 and Gagandeep Kaur2, A new approach Data hiding in 2D data matrix and
tilt correction algorithm, International Journal of Computational Engineering Research / ISSN:
2250–3005.
[6] Praveen.T, Muthaiah.RM and Krishnamoorthy.N, “Transmitting Bulk Amount of Data in the
Form of QR Code with Cbfsc and Chunking Techniques- Fighting Against Cryptanalytic
Attacks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4,
Issue 4, 2013, pp. 341 - 349, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[7] Lokesh S. Khedekar and Dr.A.S.Alvi, “Creation of Automatic Identification and Data Capture
Infrastructure Via Datamatrix”, International Journal of Advanced Research in Engineering &
Technology (IJARET), Volume 4, Issue 1, 2013, pp. 1 - 8, ISSN Print: 0976-6480,
ISSN Online: 0976-6499.
[8] Santosh Abaji Kharat and Dr.B.M.Pange, “QR (Quick Response) Codes and Academic
Libraries: Reaching to Mobile Users a Best Practices”, International Journal of Library and
Information Science (IJLIS), Volume 2, Issue 1, 2011, pp. 1 - 18, ISSN Print: 2277 – 3533,
ISSN Online: 2277 – 3584.
[9] Lokesh S. Khedekar and Dr.A.S.Alvi, “Advanced Smart Credential Cum Unique
Identification and Recognition System (ASCUIRS)”, International Journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 97 - 104, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375.

84

Contenu connexe

Tendances

IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr CodeIRJET Journal
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password schemeIAEME Publication
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by sureshsuresh5c2
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
 
Life Sciences Solution Set
Life Sciences Solution SetLife Sciences Solution Set
Life Sciences Solution Setcmurtagh
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
 

Tendances (12)

Implementation of Data Mining Concepts in R Programming
Implementation of Data Mining Concepts in R ProgrammingImplementation of Data Mining Concepts in R Programming
Implementation of Data Mining Concepts in R Programming
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
IRJET - Color Qr Code
IRJET -  	  Color Qr CodeIRJET -  	  Color Qr Code
IRJET - Color Qr Code
 
2 round hybrid password scheme
2 round hybrid password scheme2 round hybrid password scheme
2 round hybrid password scheme
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
3d password by suresh
3d password by suresh3d password by suresh
3d password by suresh
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
Life Sciences Solution Set
Life Sciences Solution SetLife Sciences Solution Set
Life Sciences Solution Set
 
IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 

En vedette

Pilatus eABS Jan2016
Pilatus eABS Jan2016Pilatus eABS Jan2016
Pilatus eABS Jan2016Mitch Mcvey
 
PE class proteins of M. tuberculosis
PE class proteins of M. tuberculosisPE class proteins of M. tuberculosis
PE class proteins of M. tuberculosisSameer Tiwari
 
Las38floresdebach 140104204343-phpapp02 (2)
Las38floresdebach 140104204343-phpapp02 (2)Las38floresdebach 140104204343-phpapp02 (2)
Las38floresdebach 140104204343-phpapp02 (2)Carolina Accrolgliano
 
Eclipse eABS Jan2016
Eclipse eABS Jan2016Eclipse eABS Jan2016
Eclipse eABS Jan2016Mitch Mcvey
 
Canastas Navidenas
Canastas Navidenas Canastas Navidenas
Canastas Navidenas Jose Michel
 
Grandes pechos-amplias-caderas
Grandes pechos-amplias-caderasGrandes pechos-amplias-caderas
Grandes pechos-amplias-caderasVictor Pacheco
 
Proyecto educativo tema
Proyecto educativo temaProyecto educativo tema
Proyecto educativo temamariamupe_
 
Proyecto educatio
Proyecto educatioProyecto educatio
Proyecto educatiomariamupe_
 
The Strategist Original Duality
The Strategist Original DualityThe Strategist Original Duality
The Strategist Original DualityChris Cagliuso
 
Deborah Jeff: Regretting Divorce and Separation
Deborah Jeff: Regretting Divorce and SeparationDeborah Jeff: Regretting Divorce and Separation
Deborah Jeff: Regretting Divorce and SeparationDanielle Greene
 
Batik tenun jackerton - http://www.jackerton.com
Batik tenun jackerton - http://www.jackerton.comBatik tenun jackerton - http://www.jackerton.com
Batik tenun jackerton - http://www.jackerton.comJackerton Batik Tenun
 
Submit Fall 2015 COS Conference Proposal Poster
Submit Fall 2015 COS Conference Proposal PosterSubmit Fall 2015 COS Conference Proposal Poster
Submit Fall 2015 COS Conference Proposal PosterKendra Hanslik
 

En vedette (19)

Pilatus eABS Jan2016
Pilatus eABS Jan2016Pilatus eABS Jan2016
Pilatus eABS Jan2016
 
PE class proteins of M. tuberculosis
PE class proteins of M. tuberculosisPE class proteins of M. tuberculosis
PE class proteins of M. tuberculosis
 
Las38floresdebach 140104204343-phpapp02 (2)
Las38floresdebach 140104204343-phpapp02 (2)Las38floresdebach 140104204343-phpapp02 (2)
Las38floresdebach 140104204343-phpapp02 (2)
 
Expo aprende
Expo aprendeExpo aprende
Expo aprende
 
Eclipse eABS Jan2016
Eclipse eABS Jan2016Eclipse eABS Jan2016
Eclipse eABS Jan2016
 
Canastas Navidenas
Canastas Navidenas Canastas Navidenas
Canastas Navidenas
 
Grandes pechos-amplias-caderas
Grandes pechos-amplias-caderasGrandes pechos-amplias-caderas
Grandes pechos-amplias-caderas
 
Proyecto educativo tema
Proyecto educativo temaProyecto educativo tema
Proyecto educativo tema
 
Proyecto educatio
Proyecto educatioProyecto educatio
Proyecto educatio
 
eu language label 2006
eu language label 2006eu language label 2006
eu language label 2006
 
The Strategist Original Duality
The Strategist Original DualityThe Strategist Original Duality
The Strategist Original Duality
 
Deborah Jeff: Regretting Divorce and Separation
Deborah Jeff: Regretting Divorce and SeparationDeborah Jeff: Regretting Divorce and Separation
Deborah Jeff: Regretting Divorce and Separation
 
Cinema research
Cinema researchCinema research
Cinema research
 
Batik tenun jackerton - http://www.jackerton.com
Batik tenun jackerton - http://www.jackerton.comBatik tenun jackerton - http://www.jackerton.com
Batik tenun jackerton - http://www.jackerton.com
 
Submit Fall 2015 COS Conference Proposal Poster
Submit Fall 2015 COS Conference Proposal PosterSubmit Fall 2015 COS Conference Proposal Poster
Submit Fall 2015 COS Conference Proposal Poster
 
PENCARI-RECOMMENDATION
PENCARI-RECOMMENDATIONPENCARI-RECOMMENDATION
PENCARI-RECOMMENDATION
 
Ear Tubes
Ear TubesEar Tubes
Ear Tubes
 
Mobile upload
Mobile uploadMobile upload
Mobile upload
 
Massa muscula materialgratis
Massa muscula materialgratisMassa muscula materialgratis
Massa muscula materialgratis
 

Similaire à 20320130406009

Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemIAEME Publication
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemIAEME Publication
 
Creation of automatic identification and data
Creation of automatic identification and dataCreation of automatic identification and data
Creation of automatic identification and dataIAEME Publication
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithmijtsrd
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET Journal
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalIRJET Journal
 

Similaire à 20320130406009 (20)

Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
Advanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition systemAdvanced smart credential cum unique identification and recognition system
Advanced smart credential cum unique identification and recognition system
 
Creation of automatic identification and data
Creation of automatic identification and dataCreation of automatic identification and data
Creation of automatic identification and data
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key PresentationIRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
 
50120130406038
5012013040603850120130406038
50120130406038
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
Online Credit Card Fraud Detection and Anomaly User Blocking
Online Credit Card Fraud Detection and Anomaly User Blocking Online Credit Card Fraud Detection and Anomaly User Blocking
Online Credit Card Fraud Detection and Anomaly User Blocking
 
QR Code Document Authentication and Retrieval
QR Code Document Authentication and RetrievalQR Code Document Authentication and Retrieval
QR Code Document Authentication and Retrieval
 

Plus de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

20320130406009

  • 1. International Journal of Advanced JOURNAL OF ADVANCED RESEARCH ISSN 0976 – INTERNATIONAL Research in Engineering and Technology (IJARET), IN 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 7, November - December 2013, pp. 71-84 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET ©IAEME STRENGTH OF DATA MATRIX AND DESIGN OF SCUIRS Mr. Lokesh S. Khedekar1, 1,2 Dr. A.S.Alvi2 PRMIT&R, Information Technology, Amravati, India ABSTRACT With the vast introduction of the wireless world, the exchanged information now is more prone to security attacks than ever. Barcodes are the information careers in the form of an image. Their various applications have been discussed in brief and also the structure, symbology and properties of barcodes. This paper aims to provide an approach which can uniquely identify the product and prevent unauthorized computer access using Data matrix. Data matrix is explained in detail to get the rigged understanding on quick response technology. The design of SCUIRS security model to share the data over the network is explained. Smart credentials eliminate the inherent weaknesses and costs of password authentication, and bypass the risk posed by legacy physical cardaccess systems. Smart credentials let you provide secure access to computer networks (logical access) and buildings (physical access). Keywords: Barcode, Data matrix, QR Code, UUID, Network. I. INTRODUCTION There are a variety of methods you can use to print barcodes. We recommend the lowest cost alternative to get started – a barcode font. Barcode fonts give you an inexpensive and flexible way to print labels quickly with high resolution and a low initial investment.[1][2] The location barcode is important because the goal of the inventory system is to know not only what you have, but to be able to tell accurately where it all is. When discounts apply to bar-coded merchandise, store employees may forget to code in the discount price. This, in turn, can lead to confusion and delays at the checkout counter, inconveniencing the customer, the checkout clerk, and other customers waiting in line. If a barcode can't be scanned, for any reason, the clerk must then read the corresponding numeric code and enter it manually. Because clerks have become used to scanning barcodes quickly and automatically, without any additional effort on their part, their lack of practice in manual code entries may potentially cause them to be slow and/or inaccurate in entering the information, further delaying the 71
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME checkout process. Considering barcodes as an effective media to share information, at present, the black and white two dimensional barcode technologies has developed more mature. American National Standards Institute (ANSI) developed the international standards of two-dimensional bar code, QR codes [3][4]. However, with the urge of increase in information, expanding the field of bar code applications is thought to be good idea. Barcodes are used to store the high capacity information in less space and thus, stands as a good ideate. This paper is related with the implementation of a product that will combine the power of graphical representation and the power of random numbers and characters for a unique ID. Combination of both Unique ID and Unique image will help a user to identify the product from other products and store its information accordingly. SCUIRS will not only give you a complete solution to product identification but can facilitate you with one more option. SCUIRS will also act like a Security system. The basic idea behind the designing of SCUIRS is to use the feature of Unique numbers combined with unique images and form a unique combination that will help in recognizing the product or a user or any item in inventory. II. STRUCTURE OF DATA MATRIX Datamatrix (or Data Matrix) is a high density 2 dimensional barcode that can encode up to 3116 characters from the entire 256 byte ASCII character set. Compared with DF417 barcode symbology the data matrix barcode belongs to newer family of 2 dimensional barcodes that makes better use of both dimensions and thus can achieve higher data capacity than the PDF417 symbology (~3kB vs. ~2kB). The symbol is built on a square grid which has a finder pattern around the edges of the symbol to allow a scanner to identify the barcode. The finder pattern makes it possible to read the barcode regardless of the physical orientation of the code. In the same way as with other 2 dimensional barcodes the data matrix code includes error correction capability in order to be resilient towards physical damages of a code. Originally data matrix used an older convolution error correction schema (ECC) but that has later been changed to use a Reed-Solomon type of error correction which is much more efficient. The older ECC version is known as ECC 000 to ECC 140 and should be considered obsolete and should not be used in new applications. The newer error correction schema (with Reed-Solomon codes) is known as ECC 200 schema and is the current and recommended schema. By default the library will use the newer schema but support also exists for legacy applications to use the older ECC schema. Figure Data matrix structure shows the principle of a Data matrix barcode.[5] The figure shows an annotated Data matrix where the finder and synchronization patterns have been highlighted. Figure 1. Structure of Data Matrix 72
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME III. SYSTEM ANALYSIS AND DESIGN 3.1 Problem Definition When user will store information about a product or person a unique ID will be generated. This Unique ID will be Tier 1 identification for the User or Object. Entering this Unique ID as an Input to our Selective algorithm will generate a unique Image for that particular ID. This Unique image will act as Tier 2 identification for User or Object. This image will be hash mapped to the User Unique ID and both will be used to identify an object. When identifiers are used solely within a database, their generation should be left to the database itself. 3.2 SCUIRS working • To generate a unique image from a unique ID and to map the image to a specific item in an inventory. • When user will store information about a product or person a unique ID will be generated. • This Unique ID will be Tier 1 identification for the User or Object. • Entering this Unique ID as an Input to our Selective algorithm will generate a unique Image for that particular ID. • This Unique image will act as Tier 2 identification for User or Object. • This image will be hash mapped to the User Unique ID and both will be used to identify an object. 3.3 Proposed System Design 3.3.1.1 UUID Generating Unique ID When identifiers are used solely within a database, their generation should be left to the database itself. Unique identifiers which are "published" in some way may need special treatment, since the identifier may need to be difficult to guess or forge. A typical example is the value of a cookie used as a session identifier - simply using a series of consecutive integers is generally unacceptable, since one user could easily impersonate another by altering the value of the cookie to some nearby integer. 3.3.1.2 Secure Random and Message Digest The following method uses SecureRandom and MessageDigest : upon startup, initialize SecureRandom(this may be a lengthy operation) when a new identifier is needed, generate a random number using SecureRandom Create a MessageDigestof the random number Encode the byte[] returned by the MessageDigest into some acceptable textual formcheck if the result is already being used ; if it is not already taken, it is suitable as a unique identifier The MessageDigest class is suitable for generating a "one-way hash" of arbitrary data. (Note that hash values never uniquely identify their source data, since different source data can produce the same hash value. The value of hashCode, for example, does not uniquely identify its associated object.) A MessageDigest takes any input, and produces a String which is of fixed length Does not allow the original input to be easily recovered (in fact, this is very hard) 73
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME Does not uniquely identify the input; however, similar input will produce dissimilar message digests Message Digest is often used as a checksum, for verifying that data has not been altered since its creation. Figure 2. Data flow diagram for SCUIRS GUI: Graphical User Interface will be used to gather information regarding the inventory from the user.GUI will consist of components to take inventory information and details from the user, components to save, edit, retrieve (searching) and delete the information. GUI will also contain a separate module for Unique ID (generated by the database and encrypted by selective algorithm) passing to generate an unique data matrix image. Selective algorithm for Unique ID encryption: This algorithm will be a modified version of 56 bit key DES algorithm. The selective algorithm will be used to encrypt the unique ID before been passed on for conversion into data matrix image. Selective algorithm for unique image The algorithm will encode the pre encrypted Unique ID and a data matrix will be generated that will be used for printing or publishing as required by the user. Storage of Unique ID: Database will store inventory information and details and a Unique ID will be generated and associated with every record. This Unique ID will act as Tier 1 identification for the record. Web server process and retrieval: A portal will be established which will contain the GUI and the entire process of storage of Data and retrieval along with data matrix image generation and publishing process. 74
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME 3.4 Block Diagram Figure 3. BlockDiagram for SCUIRS Web Portal: Web portal will contain a module that will take an input from the client which will be a data matrix image. Data inventory: Tables, relations related to items will be stored in data inventory. Data inventory is nothing but a set of tables that will contain records about items and its detailed information. Database: Information entered by the administrator will be stored in the database. This information will be stored in the form of a tuple. Each tuple will have a unique ID associated with it. Unique ID: This will be a 16 bit ID generated by the database (MySQL) and it will be used to identify the tuple in case of searching. Unique ID passed to (selective) algorithm: The algorithm will encrypt the Unique ID generated by database (MySQL). This encrypted key or string will be further passed on to another selective algorithm to create a unique image (i.e. Data Matrix image). 75
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME Unique image ready to publish: Unique image created by the selective algorithm can be either published or printed by the administrator. Capturing unique image: The image i.e. published or printed by the administrator can be captured by the user and sent back to the web portal through an HTTP response. Clipping: Since the captured image will vary in size, it needs to be clipped and exact Data Matrix needs to be extracted out of the captured image. Clipping will help to extract the exact image and pass it on to the web portal. Uploading of Image: An FTP request to the server will carry the clipped image that will be used to map with the database to find the related record or information. Sending information back to client: If mapping returns a record, then it will be sent back to the client (i.e. browser of phone or computer system) and this will complete the process. IV. SYSTEM IMPLEMENTATION Implementation Steps Work plan define the specific steps as follows:1. Add data to inventory. 2. Extract the unique identity field that will be auto generated. 3. Encode the ID into a Data Matrix. 4. Apply selective Data encoding algorithm. 5. Generate and distribute the Data Matrix. 6. Under Decoding process, apply Reed Solomon Code algorithm 7. Extract the Unique ID from Data Matrix. 8. Provide to the database as queried ID. 9. Appropriate record will be displayed respectively. Details of the Implementation Technique: As we declare above that first we have to a data inventory i.e. data table under a database, we try to create the same, Table 1: Database Table 76
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME Table 2: Meta structure of the table The database consists of various fields used to store related information in inventory. The ID field which is auto incremental is used as the defacto field to be stored in the data matrix. 4.3 Algorithm Step 1. Take input string that should be the Unique ID. Step2. Apply error correcting technique; so that the data can be recovered even if part of the printed symbol has been destroyed . Step 4. Finally the encoded data and the error correcting words are placed in the symbol according to an algorithm specified in the standard Step 5. When decoding this barcode do the reverse operation and encode string from barcode into Unicode string using System.Convert.FromBase64String() and System.Text.Encoding.Unicode.GetString() methods accordingly 4.4 System Execution Details GUI for the system The functions of the buttons, text field and panel are described as below. Screenshot no 1: The GUI for the system 77
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME 1) Encode the Unicode string into Base64 string using System.Text.Encoding.Unicode.GetBytes() 2) Method System.Convert.ToBase64String() will convert the bytes to Base 64 string. 3) Encode this base64 string into barcode (2D Data Matrix Code) Screen Shot 2: Generated Resultant Data Matrix Screenshot no 3: The inserted data into the table Data Table Fields after operation: Screenshot no 4: Data Table Fields after operation Psuedocode To encode data into a Data matrix symbol the following (principal) steps are taken. 1. The input string (which can be any ASCII values between 0-255) is encoded using the selected encoding or encodings (it is possible to switch encoding mid-way through the string). The primary purpose of the encoding is to compress the data into a much shorter form. 2. If needed the data is padded to fill up to the capacity of the selected symbol size. 3. Once the string has been encoded (and possible padded) a number of error correcting code words are added so that the data can be recovered even if part of the printed symbol have been destroyed (perhaps a corner has been teared off) 4. Finally the encoded data and the error correcting words are placed in the symbol according to an algorithm specified in the standard. This is done by placing each bit of every data byte in a specific position in the data matrix symbol. 78
  • 9. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME 4.5 Result Analysis Width and Height of a Module (X) The range of the X-dimensions will be defined by the application specification, having due regard to the availability of equipment for the production and reading of symbols and complying with the general requirements of the application. The X-dimension shall be constant throughout a given symbol. The X-dimension should apply to both the width and height of the modules. Module size Defines the smallest cell in data matrix code. Module size has to be made out of at least 2×2 printed dots for bigger realibility. Also terms dot size or cell size can be used. Finder Pattern Bottom and left side of Data Matrix code refers to finder pattern. The L pattern is used locate and orient the symbol. Finder pattern is also used to correct distortion. Timing Pattern Dashed line positioned on upper-right side gives the reader information about Data Matrix code size. The sizes vary from 10×10 up to 144×144 depending amount and type of data. Quiet zone A quiet zone is the area around Data matrix code that does not contain any information. Quiet zone is separating DMC from its surroundings and should be at least one module wide. Data area is bordered by finder pattern and timing pattern. With selected position of dark and white cells, the desired information is encoded together with data correction code. Reed Solomon Code Screenshot no. 5: Encoding Process Using Reed Solomon Code 79
  • 10. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME The Reed-Solomon codes are used as error correction system. They have a capacity of detection and correction of errors defined in advance, depending on the size of the data matrix. A body C is a set of elements provided with two closed and called binary operations addition and multiplication. Being closed means that the result of each operation on two elements of the assembly will always be an element of the assembly. There are many bodies, finite and infinite. It turns out that for any integer prime p and any integer n (>=1), there exists a unique finite np elements, noted GF(np). These bodies are called Galois fields. We can represent the elements of GF(np) using the basic elements of a : 0, 1, a, a2, a3, ..., a(n-1). Let's take an example: a3 + a + 1 Elements can also be represented in different forms: binary, decimal, or even in the form of a polynomial. binary: 1011 (0 indicates no a2) decimal: 11 (8+2+1) polynomial: a3 x3 + a x + 1 For each Galois field, there is at least one primitive polynomial, denoted by p (x), which allows to build the body. Data Matrix storing data of 8 bits (in code words), and therefore work in the Galois field GF(28). They use the primitive polynomial x8+x5+x3+x2+1, which corresponds to the value 301. The addition and subtraction of two elements is the XOR (exclusive OR) between these two elements. Multiplication and division are calculated by multiplying the corresponding polynomials. This operation is relatively expensive in computation time, an algorithm is used. Since all components are a power of primitive polynomial p, must be sought for each element c, i power as: i = logp (c) c = antilogp (i) From there, we can calculate for two elements c and d: c * d = antilogp (logp(c) + logp(d)) c / d = antilogp (logp(c) - logp(d)) We can get the e antilogs table with this algorithm: For Data Matrix symbols containing a total of less than 255 codewords (all symbols rectangular and square sizes less than 48x48), the codewords correction are calculated directly from the data codewords. For other symbols, the codewords correction are calculated in accordance with a procedure of interleaving: dividing the codewords into several data blocks of same size and correction codewords are computed block by block. 80
  • 11. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME Each codeword c is part of the group: o c modulo n Figure 4: Encoding Process using Reed Solomon Code Time Efficiency of Reed Solomon Quadratic Equation Column (x,y) (128, 256) (512, 1024) (16384, 32768) Quadratic 4.61/9.18 1.16/2.32 0.034/0.069 81
  • 12. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME Figure 5. Bar Graph of Outlier Measure of Error Correction Using Reed Solomon Code Performance Boost: Limit the number of codes to detect By default, conventional process assumes that there are n datamatrix codes hidden in the image and thus scans the image thoroughly not to miss one of them. While conventional algorithm usually detects the actual datamatrix codes first and quite fast, there might always be “suspicious” areas in an image that loosely resemble a datamatrix code. Checking these potential matches is what slows conventional algorithm down. Performance gain: groundbreaking. Detection time droppend from endless 3.8 msecs to 2.0 msecs Restrict the detection time Conventional process has a control parameter for this problem too: by simply setting timeout to a certain number of milliseconds, we restrict the total detection time per image: Performance gain: invisible… effectively prevents the “endless loop”-like scenarios from above. The Datamatrix code specification states a “quiet” zone (actually a white pixel border) around each datamatrix code. Datamatrix codes generated with pydmtx perfectly adhere to this spec, so I was quite surprised about the low code detection rate in my scans. After some research I found the guilty: as I placed my datamatrix code on the very bottom of the scanning glass. my scanner driver ruined this quiet zone by cropping away the seemingly needless pixels on the bottom of the page. As a consequence, the detection rate dropped drastically. Result Statement: These simple tweaks further reduced the total processing time from 1.9 secs to 0.41 secs, that’s a performance gain of over 75%. 82
  • 13. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME V. TESTING For testing we first create many data matrix files with different data and then we run our project for all these data matrix files repeatedly & we get the proper result. Column (x,y) (512, 1024) Quadratic • (128, 256) 4.61/9.18 1.16/2.32 (16384, 32768) 0.034/0.069 2nd screenshot show graphical depiction of reduced time. Screenshot no 6: Showing Graphical Representation of Reduced Time • Screenshot show that our algorithm reduced the time drastically and enhanced error detection and correction with respect to time and space. CONCLUSION A new method is proposed here which is a hybrid model for data encoding and error correcting in data matrix and provides decoding algorithm. It runs at 640×480 resolution for real time scenarios. This proposed system provides an accuracy of 97.6%. Our experiments show that the proposed system produces accurate results with improved speed. Using this data matrix image through scanner or mobile phone camera we can decompile the product information. The product information can be accessed anywhere if the database stored and accessed through a web server. This ensures portability and security since the unique number will only be known to the organization. Organization will be using a unique image to access their product information or person or object 83
  • 14. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 7, November – December (2013), © IAEME REFERENCES [1] International Organization for Standardization: Information Technology International Symbology Speciation – Data Matrix [S]. ISO/IEC16022 (P), 2000. [2] Pavlidis T, Swartz J. Fundamentals of barcode information theory[J]. IEEE Computer, 990, 23(4): 74- 86. [3] Thota Sriram, K.V.Rao, S Biswas, Basheer Ahmed, “Application of barcode technology in automated storage and retrieval systems”, BHEL. [4] Bing Nan, Ming-Chui-Dong Y Mang, “From Codabar to ISBT 128: Implementing Barcode Technology in Blood Banking Automation System”, Proceedings of the 2005 IEEE Engineer in Medicine and Biology 27th Annual conference, Shanghai, China, 2005. [5] Kimmy Ghanaiya1 and Gagandeep Kaur2, A new approach Data hiding in 2D data matrix and tilt correction algorithm, International Journal of Computational Engineering Research / ISSN: 2250–3005. [6] Praveen.T, Muthaiah.RM and Krishnamoorthy.N, “Transmitting Bulk Amount of Data in the Form of QR Code with Cbfsc and Chunking Techniques- Fighting Against Cryptanalytic Attacks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp. 341 - 349, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [7] Lokesh S. Khedekar and Dr.A.S.Alvi, “Creation of Automatic Identification and Data Capture Infrastructure Via Datamatrix”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 1, 2013, pp. 1 - 8, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [8] Santosh Abaji Kharat and Dr.B.M.Pange, “QR (Quick Response) Codes and Academic Libraries: Reaching to Mobile Users a Best Practices”, International Journal of Library and Information Science (IJLIS), Volume 2, Issue 1, 2011, pp. 1 - 18, ISSN Print: 2277 – 3533, ISSN Online: 2277 – 3584. [9] Lokesh S. Khedekar and Dr.A.S.Alvi, “Advanced Smart Credential Cum Unique Identification and Recognition System (ASCUIRS)”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 97 - 104, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 84