IJSRET » November 5, 2025

Daily Archives: November 5, 2025

Uncategorized

Product Verification System

Authors: Anshika saxena, Ahmad Hussain Ansari, Lalit Chowhan, Ashutosh Vishwakarma, Gyanendra Maurya

Abstract: Counterfeit products continue to pose significant challenges for manufacturers, distribu- tors, and consumers worldwide. They contribute to revenue losses, erode customer trust, create safety hazards, and cause long- term brand damage. According to global trade reports, coun- terfeit goods account for billions of dollars in annual losses across industries, with pharmaceu- ticals, electronics, and consumer goods among the most affected sectors. Traditional methods of product authentication, including holograms, barcodes, and RFID tags, either lack robust security or remain too costly for large-scale deployment. To overcome these limitations, this study proposes a Product Verification System that inte- grates QR codes with a MongoDB-based backend for efficient product traceability. The system architecture employs ReactJS for a user-friendly and modular frontend, Node.js with Express for secure API management, and MongoDB as a centralized, scalable database. At the point of manufacture, each product is assigned a unique QR code linked to its database record. Con- sumers can verify authenticity instantly by scanning the code with a smartphone, while manu- facturers and sellers gain real-time visibility into the supply chain.s Unlike conventional approaches, the proposed framework not only ensures authenticity but also supports analytics and reporting features, enabling stakeholders to monitor product dis- tribution, detect anomalies, and analyze consumer interaction patterns. This capability makes the solution adaptable for diverse sectors, including pharmaceuticals, electronics, and cosmet- ics, where transparency and safety are critical. The proposed system is cost-effective, scalable, and reliable, offering a practical balance between security and affordability. By leveraging accessible technologies such as QR codes and a flexible NoSQL database, it provides an imple- mentation pathway that is both technically feasible and industry-ready, making it suitable for mass adoption across global markets.In addition, the system introduces role-based access control (RBAC), ensuring that only authorized users such as administrators, manufacturers, and sellers can access or modify sen- sitive product information. The Admin Dashboard provides centralized control for managing users, viewing verification statistics, generating audit logs, and detecting counterfeit attempts through anomaly tracking. The Seller Module enables sellers to register genuine products and upload production details, while the Consumer The platform is further enhanced with real-time data synchronization, secure authentica- tion (JWT-based login system), and RESTful APIs, which maintain seamless communication between the client and server. Data integrity is preserved through encrypted QR code gen- eration and verification processes, while reporting and analytics tools assist manufacturers in monitoring sales regions, scanning frequency, and product lifecycle performance. Future scalability options include integration with blockchain networks to achieve im- mutable product records, AI-based anomaly detection for identifying suspicious activities, and cloud deployment for handling high- volume data operations. By combining robust backend design with modern frontend usability, this system delivers a holistic solution that bridges the gap between product authenticity, supply chain visibility, and consumer trust.

DOI: https://doi.org/10.5281/zenodo.17529956

 

Published by:
Uncategorized

Forensic Browser Monitoring System

Authors: Mr. Karthiban R, Dhayalan K, Akshita K, Jerisha Flavio J, Kalaiselvi S

Abstract: As digital learning environments continue to evolve, maintaining secure and focused internet usage has become a critical requirement for institutions and organizations. Existing browser monitoring tools often lack real-time visibility and are unable to detect VPN-based evasion techniques, which users exploit to bypass access restrictions. To address these limitations, this work proposes an intelligent browser activity monitoring and VPN detection system featuring a centralized administrative dashboard. Built on a Flask-based backend, the system securely gathers and visualizes browsing data through interactive charts and tables. A machine learning model continuously refines detection by learning administrative preferences—distinguishing between authorized and unauthorized sites—and improving decision accuracy over time. The adaptive framework enhances detection precision by integrating AI-driven behaviour learning with network anomaly analysis. By evaluating parameters such as IP consistency, latency fluctuations, and metadata patterns, the system effectively identifies tunnelling or masked connections even in encrypted networks. Its modular and cross-platform architecture ensures seamless data flow between clients and the central dashboard while preserving privacy and performance. Designed for scalability and reliability, the solution provides administrators with actionable insights and real-time control, making it an effective tool for maintaining policy compliance and secure browser activity in educational and institutional environments.

DOI: http://doi.org/10.5281/zenodo.17529567

Published by:
Uncategorized

Comparative Study Of Wired Vs. Wireless Communication Protocols For Industrial IoT Networks

Authors: Haritha Bhuvaneswari Illa

Abstract: Industrial Internet of Things (IIoT) networks form the backbone of smart manufacturing and digital transformation under Industry 4.0. Efficient and reliable communication between sensors, controllers, and cloud systems is essential to ensure high productivity, safety, and automation efficiency. This paper presents a comparative study of wired and wireless communication protocols used in IIoT environments. It evaluates popular wired protocols such as Ethernet/IP, PROFINET, Modbus, and EtherCAT alongside wireless alternatives like Wi-Fi, ZigBee, LoRaWAN, Bluetooth Low Energy (BLE), and 5G. Each protocol is analyzed in terms of latency, bandwidth, reliability, scalability, security, and energy efficiency. The research employs both analytical comparison from literature and simulation-based performance evaluation using MATLAB and NS-3 environments. Results reveal that wired protocols offer superior deterministic performance and reliability suitable for real-time control applications, whereas wireless technologies provide flexibility and scalability for monitoring and mobility-driven scenarios. The study highlights that hybrid architectures integrating wired backbones with wireless edge nodes can balance performance and deployment costs. This comparative analysis aims to guide industries in selecting suitable communication frameworks aligned with their operational requirements.

DOI: http://doi.org/10.5281/zenodo.17528800

Published by:
× How can I help you?