• Login
    View Item 
    •   Mak UD Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology Collection
    • View Item
    •   Mak UD Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology Collection
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Counterfeit electronics detection system

    Thumbnail
    View/Open
    undergraduate dissertation (1.486Mb)
    Date
    2022-04
    Author
    Namagwa, Gloriah
    Ntuyo, Elvis Dan
    Nabitakire, Robinah
    Kabasinguzi, Pamella
    Metadata
    Show full item record
    Abstract
    Counterfeit electronics encompass all products made to closely imitate the appearance of the product of another as to mislead consumers. In this study, Counterfeit products refer to items/goods that imitate original products (protected by trademarks, patents, and copyrights) with the intent of deceiving buyers, but also include substandard, poor quality, expired, and counterfeit goods that do not meet required customer satisfaction levels and affect the safety of consumers. The consumption of counterfeit products thus refers to the act of obtaining counterfeit products through the exchange for payment and eventual use of such products. Faking products, such as branded goods, is one of the most serious and difficult issues to address in national and international markets. The main objective of this study was to develop an electronic counterfeit system through the use of iterative development methods to enable customers, government bodies, and retailers to identify and trace the originality of electronics specifically smartphones. This report is a detailed compilation of all activities we engaged in while developing the counterfeit electronics Detection system. It involves chapter 1 which is about the background to the problem, problem statement, objectives, and the scope, chapter 2 which is about the literature review, chapter 3 which is made up of the methodology, chapter 4 which consists of system study, analysis and design, chapter 5 which is about system implementation, testing and validation and chapter 6 which consists of the conclusion. During the data collection and analysis phase, it was found that more than 75% of the sample population were not aware of the existence of any electronics counterfeit detection systems and were not sure of the originality of the smartphones they were using. Of the sample retailers and middlemen, 90%, were badly in need of such a system and strongly welcomed the idea. The gender distribution of the study was uneven as almost 80% of the females never had any idea about counterfeit smartphones, or any detection system while 50% of the males had an idea about counterfeit electronics though also had limited knowledge of any detection system. The system was developed using agile methods that involved iterative methods of development and a prototype were developed and testing was done.
    URI
    http://hdl.handle.net/20.500.12281/12156
    Collections
    • School of Computing and Informatics Technology Collection

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak UDCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV