Manuscripts

Recent Papers

Research Paper

Online quiz application

An Online Quiz Application is the most widely used application nowadays. It is one of the most helpful ways to conduct examinations or to prepare for them in any organization. The programs which help in conducting the exam in an effective way and saves time are Online Quiz Programs. It also helps to get through the tutorials of particular topics. You can put forth any query of yours and you will get the appropriate answer to your question. Therefore, it can be said that an Online Quiz Application helps you to save time in giving exams and provides security. This research paper will describe a Quiz Application that helps the students in a college or in a university to give exams in an effective way.

Published by: Navneet Singh Malik, Navdeep Tomar, Omvesh Chaudhary

Author: Navneet Singh Malik

Paper ID: V4I5-1142

Paper Status: published

Published: May 7, 2019

Full Details
Research Paper

Guar gum based matrix tablets for modified release

Extended release model allows at least a twofold decrease in the drug dose frequency compared to the conventional (immediate release) dosage form. The current study investigates the guar gum modified release tablet containing gylcine and guar gum with different ratios and investigate the modified release tablets containingpolyvinyl-pyrolidone (PVP) by wet granulation method . The tablets were tested according to the British Pharmacopeia (BP) with the appropriate tests. The relation of the swelling factor to the concentration of guar gum and glycine depended on the ratios used such that decrease in glycine or increase in guar gum increased the swelling factor. The formulations having low amounts of glycine and high amounts of guar gum mainly depend on the high swelling index of guar gum. High glycine and low guar gum ratios enhance the matrix erosion in direct proportion manner. This proved that the higher swelling and the lower erosion could be obtained by reducing the glycine and increasing the guar gum to form stronger gel for the design extended release formulations. Moreover, the hydrophilic property of the PVP enhances dramatically the swelling index of the matrix with unclear increase in the erosion. The PVP increases the swelling of the matrix of formulation 2 from 297.6% to 342.7% and the erosion from 39.1% to 40.6%. The (5 % glycine and 55 % guar gum) formulation was the best formulation out of the glycine and guar gum blends for the sustained release purposes as it described the slowest release out of the guar gum and glycine formulations which enabled the table to be administered every 16 hours. Additionally, on adding polyvinyl-pyrolidone (PVP), it enabled the release of the theophylline dose over 20hours, which could lead to one-day administration of the theophylline tablet. According to the aforementioned results, the formulation including the glycine, guar gum and PVP blends was found to be the best model for the extended release tablets.

Published by: Samuel Girgis, Samuel Hakim

Author: Samuel Girgis

Paper ID: V4I5-1140

Paper Status: published

Published: May 7, 2019

Full Details
Research Paper

Data leakage detection and Security Strategies

In many organizations, business scenarios and company outsource its data to the other company or organization or agents, all these agents are known as trusted third party agents. The knowledge owner provides the confidential knowledge to the sure third party agents and their risk that any of that sure agent will leak the potential data. It is obligatory to notice the guilty agent, who leaks the data to unauthorized agents. For identification of leaked data in the existing system uses watermarking technique and data allocation strategies with adding fake objects. However, it has a deficiency is that watermarking data can be modified or change. In projected system uses AES algorithmic rule for coding of requested knowledge. As a result, an unauthorized party is unable to view or access confidential data. One more technique used for up probabilities of police work guilty agent is raincoat (Media Access Control) address.

Published by: Vaibhav Patel, Vaibhav Gangwar

Author: Vaibhav Patel

Paper ID: V4I5-1136

Paper Status: published

Published: May 6, 2019

Full Details
Research Paper

Campus Connect: A training scheduling system

This project was designed and developed as a training-scheduling system that helps to create schedules between several users. The system has four components: scheduling module, assignments, and certification, management of data and study material. The project makes use of a greedy algorithm that helps to create schedules and detect conflicts. The algorithm has the following course of action, select available time, find available room, look for an appropriate trainer based on the constraints set by the user.

Published by: Aditya Pandey, Ojas Modi, Abhishek Singh Chauhan, Siddharth Mohan

Author: Aditya Pandey

Paper ID: V4I5-1137

Paper Status: published

Published: May 3, 2019

Full Details
Research Paper

Studying Learning Management Systems of higher education in Myanmar

Learning Management Systems (LMS) allow communication and interaction between teachers and students in virtual spaces. Using Learning Management Systems (LMS) in higher education has facilitated the communication between students and teachers, and raised new challenges as well. The fast-growing technologies have changed the ways of teaching and learning in educational institutions. The aim of this paper is to introduce the role of LMS in the learning and teaching processes from students and teachers perspectives. Teachers can organize their classes and post different documents, assignments, tests, etc. The student can answer the test that is created by the teacher. After taking the test (tutorial), the system provides the result of the tutorial that the student took and the pdf file to download for that tutorial and teachers’ lecture slides and documents. LMS can increase the motivation of learners, promote learning, encourage interaction, provide feedback and support can be provided during the learning process.

Published by: Moe Moe Hlaing

Author: Moe Moe Hlaing

Paper ID: V4I4-1169

Paper Status: published

Published: May 3, 2019

Full Details
Dissertations

Share point and file share search engines: Can personal data be found for EU GDPR compliance?

This article aims to investigate the ability of Share Point and File Share Search Engines to ensure compliance with GDPR regulations. The value of this research is to contribute to academic theory and business literature on the capability of search engines to find personal data in internal and external data repositories and systems for GDPR compliance. Long term project outcomes are expected to lead to empirical results which added value to existing theory and be a foundation (or framework) for future research. Quantitative methods are used through a questionnaire and experiments to obtain data from a convenience sample from an IT and non-IT population of executives, administrators, and professionals who have exposure to Share Point and File Share data repositories. Evidence from the experiments demonstrated that under three conditions, the hypothesis can be rejected. This research, considering its limitations, has proven that personal data, metadata, and files cannot be found in all cases in Windows File Share and Share point repositories. In conclusion, improvements in search engines or enhancements of operational manipulations with data and metadata in files must be performed based on the conditions stated in the research conclusions to ensure accurate compliance with GDPR.

Published by: Rade Nikolic

Author: Rade Nikolic

Paper ID: V4I4-1148

Paper Status: published

Published: May 1, 2019

Full Details
Research Paper

Image steganography using C#

This aim of this paper is to give an overview of Image Steganography in which the hidden information can be embedded in the image, so the security of the information is not violated. We have made the application using Visual studio and coding part is done using C#. LSB algorithm is used to make sure the secure communication is taking place. The main purpose of this is to maintain secure communication between two parties so that no information is lost.

Published by: Shivam Kaul, Sanchit Gupta, Syed Abbas Haider

Author: Shivam Kaul

Paper ID: V4I4-1173

Paper Status: published

Published: April 30, 2019

Full Details
Research Paper

Reality Editor

The aim of this project is to develop a Reality editor that is a web-based tool for controlling the physical world electronic peripherals. It has a super easy interface to connect all kinds of things together. For Example, a juicer to a toaster. If we want to dive deeper and tell the physical things around we how exactly they should behave, use the Logic-Crafting interface. Logic Crafting is a visual programming system that is easy to learn. The reality editor uses AR (Augmented Reality) User Interface and Node.js as a hardware interface.

Published by: Vikash Kumar Mishra, Shreya Agarwal, Sourav Pratap Singh, Shivam Sharma

Author: Vikash Kumar Mishra

Paper ID: V4I4-1171

Paper Status: published

Published: April 30, 2019

Full Details
Research Paper

Helper Bot

We are developing an intelligent Helper bot which is a computer program that simulates Human conversation, or chat, through AI. It will allow users to solve their queries about college. The aim of this project is to develop an assistance system that solves the queries about our college asked by the user. A knowledge base is maintained consisting of queries. It generates a response based on given input to emulate human conversations in text or voice mode.

Published by: Anurag, Deeksha Pal, Amrita Pratap

Author: Anurag

Paper ID: V4I4-1168

Paper Status: published

Published: April 29, 2019

Full Details
Review Paper

Secure sharing of Personal Health Record

The application is mainly used to solve problems for people in today's world. The health record is the major concern for the people in today's world. Hospitals have to keep a lot of records and data of the patient with them. So sometimes this becomes very difficult to store this huge amount of data. So as to make this easy for the hospitals and for patient’s point of concern. All the data will be stored on the cloud and from their patient can access his data. Also, hospitals and doctors can also access the data. Basically, there are several modules are used in this project i.e. patient, admin, path labs, doctor. For the privacy purpose, we have used AES encryption to encode the data of the patient. Data will be sent in an encrypted manner so that the privacy must be maintained. Initially, the patient needs to register themselves and login credentials will be provided to them once they are registered. All the previous data will be recorded and all the reports will be uploaded on the portal. It is accessed by the patient at any time and anywhere. The objective is to provide a global application which is accepted by all the hospitals, doctors and patient where doctors can update the medical records on a regular basis so that patient needs not to carry the previous records while switching the hospitals and this will also increase the efficiency of treatment.

Published by: Amit Ranjan, Abhishek Trivedi, Abhijeet Shukla, Akhil

Author: Amit Ranjan

Paper ID: V4I4-1167

Paper Status: published

Published: April 29, 2019

Full Details