Pragmatic Approach for Online Document Verification Using Block-Chain Technology

نویسندگان

چکیده

As we all know, India has a plethora of universities, and many people graduate from them. Because it is possible for someone to falsify degree, secure based verification mechanism required. It will be achieved in an existing system through the exchange e-mails or postal mail; however, this time-consuming process that insecure owing human involvement. And, order solve these drawbacks, implemented block chain technology into our system. When there security risk, comes mind. data breaches, education also not far away. For attackers, student with little financial information become valuable commodity. At same time, becoming serious worry at educational institutions, which are being breached generate phony identities records. result, greater digitization information, need protect privacy.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

analysis of ruin probability for insurance companies using markov chain

در این پایان نامه نشان داده ایم که چگونه می توان مدل ریسک بیمه ای اسپیرر اندرسون را به کمک زنجیره های مارکوف تعریف کرد. سپس به کمک روش های آنالیز ماتریسی احتمال برشکستگی ، میزان مازاد در هنگام برشکستگی و میزان کسری بودجه در زمان وقوع برشکستگی را محاسبه کرده ایم. هدف ما در این پایان نامه بسیار محاسباتی و کاربردی تر از روش های است که در گذشته برای محاسبه این احتمال ارائه شده است. در ابتدا ما نشا...

15 صفحه اول

Online Signature Verification: Present State of Technology

The way a person signs his or her name is known to be characteristic of that individual. Signatures are influenced by the physical and emotional conditions of a subject. A signature verification system must be able to detect forgeries, and, at the same time, reduce rejection of genuine signatures. Significant research has been conducted in feature extraction and selection for the application of...

متن کامل

the use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

15 صفحه اول

Online Document Clustering Using GPUs

An algorithm for performing online clustering on the GPU is proposed which makes heavy use of the atomic operations available on the GPU. The algorithm can cluster multiple documents in parallel in way that can saturate all the parallel threads on the GPU. The algorithm takes advantage of atomic operations available on the GPU in order to cluster multiple documents at the same time. The algorit...

متن کامل

Using RFID Technology for Supporting Document Management

Integrating RFID and document management systems can provide a better awareness regarding the state of the enterprise context and, then, bring new benefits. The activity flow characterizing a business process depends on the moving of a definite sequence of paper documents from a given organization’s office to another one. If the document circulation is monitored and managed by using RFID techno...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ITM web of conferences

سال: 2022

ISSN: ['2271-2097', '2431-7578']

DOI: https://doi.org/10.1051/itmconf/20224403001