A
PRELIMENERY REPORT
ON
Fake Product Identification System
SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE
IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARDS OF
THE DEGREE
BACHELOR OF ENGINEERING
(Computer Engineering)
BY
Student Name Avishkar Hongekar Roll No: BECOA64
Student Name Anand Jaju Roll No: BECOA68
Student Name Prajwal Bhargade Roll No: BECOA16
Student Name Neel Acharya Roll No: BECOA3
Under The Guidance of
Prof. Guide Name
DEPARTMENT OF COMPUTER ENGINEERING
PCET’s PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR NO. 26,
PRADHIKARAN, NIGDI, PUNE 411044
2022-2023
SAVITRIBAI PHULE PUNE UNIVERSITY
PCCOE, Department of Computer Engineering 2022
CHAPTER3
SOFTWARE REQUIREMENTS
SPECIFICATION
3.1 INTRODUCTION
The global growth of a technology or product is always fraught with risk in the rapidly
evolving world of technology. Forgery and duplication, which can harm a company’s
reputation and financial performance, and client well-being. The main goal of the
project is to confirm that the customer’s purchased item is as described in the fake
or genuine We have the conventional supply chain in comparison to blockchain.
Typical supply chains offer centralised network where the firm providing the service
or the products holds the data they control the market and the data, making them
vulnerable because they can manipulate it anyway they like.
Blockchain technology aids in addressing the issue of product counterfeiting.
Technology based on blockchain is more secure. A chain will be constructed for that
product’s transactions once it is stored on the network, making it possible to keep
all transaction records for both the product and its present owner. In the blockchain,
all transaction histories will be kept as blocks. In the suggested system, each product
is given a generated QR code that the end user can scan. the product’s full details by
scanning the QR code. We can tell whether a product is genuine or phoney by
scanning the QR code.
3.2 PROJECT SCOPE
The Scope of this system In this project we are using Machine learning and artificial
intelligence technology by using NLP algorithm. It is certainly significantly faster than
looking for an answer in books, but still, it’s far from perfect.
3.3 USER CLASSES AND CHARACTERISTICS
Fast Accurate prediction: Logos can be identified quickly due to the machine’s ability
to learn from experience with the CNN algorithm. Reduce human errors of
identifying whether the product is original or fake is the right of every purchaser. A
Human may err while selecting the product just by looking at the logo, but Deep
Learning (DL) models will provide accurate results. Go through these signs that can
help you identify an original from a counterfeit, and make sure you are not taken for
a ride.
3.4 ASSUMPTIONS AND DEPENDENCIES
Assumption: To generate a hash, the SHA256 algorithm is used.
Dependencies: jspservlet, minig, P2P verification, validate & majority, recovery.
3.5 MATHEMATICAL MODELING
Let S be the Whole system S= I,P,O I-input P-procedure O-output.
Input (I) I= Fake Product Data Where, Data contain Real or Fake products. Procedure
(P), P=I, Using System we can perform operations and Identify the Fake Product
using QR Code and Block chain.
PCCOE, Department of Computer Engineering 2022 3
Output (O) O =System Identify the Fake or real Product.
3.6 FUNCTIONAL REQUIREMENTS
3.6.1 System feature
1. Database: The Personal details of sender and receiver also account details of
sender and receiver stored in database.
2. User: User do the registration on the system for QR code scan.
3. System: In system, Blockchain technology is used to identification of real
products and detects fake products.
3.7 EXTERNAL INTERFACE REQUIREMENT
3.7.1 User Interface:
• Website
• Website Hosting Service
3.7.2 QR Code Scanning application
3.7.3 Hardware Interfaces:
• RAM : 8 GB
• Hard Disk : 40 GB
PCCOE, Department of Computer Engineering 2022
4
• Processor : Intel i5 Processor
3.7.4 Software Interfaces
• Programming Language : Java
• Operating System : Windows 10
3.8 NON - FUNCTIONAL REQUIREMENT
3.8.1 Performance Requirements
The performance of the functions and every module must be well. The overall
performance of the software will enable the users to work efficiently. Performance
of encryption of data should be fast. Performance of the providing virtual
environment should be fast Safety Requirement.
The application is designed in modules where errors can be detected and
solved easily. This makes it easier to install and update new functionality if required.
3.8.2 Safety Requirement
The application is designed in modules where errors can be detected and fixed easily.
This makes it easier to install and update new functionality if required.
PCCOE, Department of Computer Engineering 2022 5
3.8.3 Software Quality Attributes
• Our software has many quality attribute that are given below: -
• Adaptability: This software is adaptable by all users.
• Availability: This software is freely available to all users. The availability of the
software is easy for everyone.
• Maintainability: After the deployment of the project if any error occurs then
it can be easily maintained by the software developer.
• Reliability: The performance of the software is better which will increase the
reliability of the Software.
• User Friendliness: Since, the software is a GUI application; the output
generated is much user friendly in its behaviour.
• Integrity: Integrity refers to the extent to which access to software or data by
unauthorized persons can be controlled.
• Test ability: The software will be tested considering all the aspects.
PCCOE, Department of Computer Engineering 2022
6
3.8.4 Security Requirements:
Users are authenticated using many security phases so reliable security is
provided.
3.9 SYSTEM REQUIREMENTS
3.9.1 software requirements
• RAM : 8 GB
As we are using Machine Learning Algorithm and Various High Level Libraries
Laptop
• RAM minimum required is 8 GB.
• Hard Disk : 40 GB
3.9.2 Hardware requirements
• Processor : Intel i5 Processor
• Programming Language : Java
PCCOE, Department of Computer Engineering 2022 7
• Operating System : Windows 10
3.10 ANALYSIS MODEL (SDLC MODEL)
Figure 3.1: Waterfall Model
PCCOE, Department of Computer Engineering 2022
8
CHAPTER 4
SYSTEMDESIGN
4.1 SYSTEM ARCHITECTURE
Figure 4.1: system Architecture
4.1.1 Data Flow Diagram
In Data Flow Diagram, we Show that flow of data in our system in DFD0 we show
that base DFD in which rectangle present input as well as output and circle show
our system, In DFD1 we show actual input and actual output of system input of our
system is text or image & we present operation of user as well as admin.
PCCOE, Department of Computer Engineering 2022 9
4.1.1.1 Data Flow Diagram Level 0
Figure 4.2: Data Flow diagram
PCCOE, Department of Computer Engineering 2022
10
PCCOE, Department of Computer Engineering 2022 11
4.2 UML DIAGRAMS
Unified Modelling Language is a standard language for writing software blueprints.
The UML may be used to visualize, specify, construct and document the artifacts of
a software intensive system. UML is process independent, although optimally it
should be used in process that is use case driven, architecture-enteric, iterative, and
incremental. The Number of UML Diagram is available.
• Use case Diagram.
• Component Diagram.
• Activity Diagram.
• Sequence Diagram.
PCCOE, Department of Computer Engineering 2022
12
Figure 4.5: Use case Diagram
PCCOE, Department of Computer Engineering 2022 13
Figure 4.6: Activity Diagram
PCCOE, Department of Computer Engineering 2022
14
Figure 4.7: Sequence Diagram
PCCOE, Department of Computer Engineering 2022 15
Figure 4.8: Class Diagram
PCCOE, Department of Computer Engineering 2022
16