QR codes are widely used in our daily life from social media websites to cash less shopping wallets, ERP (Enterprise Resource Planning) Software implementation to Display advertising and digital marketing etc. In this paper, we have focused up on one major issue with the QR codes. We have focused up on data various techniques used to increase data storage capacity of QR code. There after we have compared three different kinds of codes-bar code, quick response code and color quick response code, based on its storage capacity, error resistance,360 degree reading and other factors. Then in fourth part we have reviewed the literature and mentioned various techniques used by researcher to increase the data storage capacity of QR codes.
Unauthorized data transmission from an organization to third parties, accidental or intentional, may leak sensitive data. Data distributors employ various strategies to detect and identify culprits without modifying the original data, including using "realistic but fake" data records and algorithms that minimize the sum objective. This enhances the likelihood of catching the guilty party without altering individual members' data.
Online romance scams are widespread in the West, but there's limited data-driven research on them. Scammers create fake profiles and interact with victims. Traditional spam filters are ineffective. We analyze scam profiles, their strategies, and victim traits. We've developed a system (97% accuracy) for early scam detection, aiming to protect victims and dating platforms. This advances existing research by incorporating idealized romantic beliefs into our machine-learning model. It offers automated solutions for dating site providers and users.
Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. the hashed password is converted into a negative password. Moreover, there are lots of corresponding ENPs for a given plain password, which makes precomputation attacks (e.g., lookup table attack and rainbow table attack) infeasible. The algorithm complexity analyses and comparisons show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is worth mentioning that the ENP does not introduce extra elements (e.g., salt); besides this, the ENP could still resist precomputation attacks. Most importantly, the ENP is the first password protection scheme that combines the cryptographic hash function, the negative password, and the symmetric-key algorithm, without the need for additional information except the plain password.
The Rail Time app offers Indian Railways services and information, facilitating journey planning from any station by any train, preempting service disruptions. It covers station details, train schedules, PNR status, fare, accommodation, and reservations via a user account. Beneficial for tourist bureaus aiding foreign tourists and NRIs.
The surge in social networking's popularity has led to a rise in social network mental disorders (SNMDs). These include Cyber-Relationship Addiction, Information Overload, and Net Compulsion. Early detection is crucial. We propose a machine learning approach, SNMDD, leveraging social network data to identify SNMD cases. Our innovative STM model enhances accuracy and scalability. Evaluation involving 3,126 users confirms SNMDD's promise in identifying potential SNMDs.
E-commerce websites are online portals that facilitate online transactions of goods and services through means of the transfer of information and funds over the Internet. In the early days, e-Commerce was done partially through emails and phone calls. Now, with a single website, anything and everything that a transaction needs, can be executed online.. Resale App is an e commerce business website in which Customers can post Products and can also buy products from another users. Website offers customers a convenient, fast and secure way to search, browse, compare offers, and shop online quickly and easily, at anytime from anywhere. Sell anything from used cars to mobiles, furniture, laptops, clothing and more..
Age and gender estimation from a single face image is crucial in social interactions, access control, human-computer interaction, law enforcement, marketing, and surveillance. OpenCV, short for Open Source Computer Vision, is an open-source library supporting real-time image and video processing with deep learning frameworks like TensorFlow, Caffe, and PyTorch. Convolutional Neural Networks (CNNs), widely used for image recognition and NLP, consist of input and output layers and multiple hidden convolutional layers, functioning as regularized multilayer perceptrons.
Age and gender estimation from a single face image is crucial in social interactions, access control, human-computer interaction, law enforcement, marketing, and surveillance. OpenCV, short for Open Source Computer Vision, is an open-source library supporting real-time image and video processing with deep learning frameworks like TensorFlow, Caffe, and PyTorch. Convolutional Neural Networks (CNNs), widely used for image recognition and NLP, consist of input and output layers and multiple hidden convolutional layers, functioning as regularized multilayer perceptrons.