ICAIM 2017 - International Conference on Advances in Information Technology and Management
"ICAIM 2017 Conference Papers "
Study of Role of Information Technology in Research by Dentists in the Dental Colleges in Mumbai[Full-Text ]
Dr. Vinita Gaikwad, Dr. Richard Pereira, Prof. Pankaj Mudholkar, Dr. Vaibhav Thakker, Dr. Prachi GaikwadMany developed countries have announced initiatives to modernize their health care systems with investments in health information technology (IT). The goal of these initiatives is to use technology to improve the health care system by reducing costs, increasing patient safety and improving quality of care. Improving health care is a common goal for these countries, but there are wide disparities in the success with which nations have pursued this goal. This research aims at finding out the role of Information Technology in performing research by dentists at various levels. Dentists are engaged in performing research but are not keen in using IT for the same because of several issues and time bound factors in the country with huge population and patients like India. These issues were addressed in the paper along with the recommendations are given to enhance the research culture amongst dentists by providing the guidelines may be introduced by several dental colleges or the government.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Smart Hospitals using Internet of Things (IoT)[Full-Text ]
Hrishikesh P. Pandharkame, Prof. Pankaj MudholkarMany times, due to inattention of hospital staff, or inattentiveness of relatives it may happen that medication is not observed properly and it may lead to cause heart attack or other life threatening situations. Thus, this research study presents a proposed system which include combination of sensor technology and Internet of Things (IoT).Using this system one can control electricity equipment’s and monitor level of the medication from a remote place and monitor entire process.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Role and Use of Information Technology in Clinical Research in the Medical Colleges in Mumbai[Full-Text ]
Dr. Seema S. Bansode Gokhe, Dr. Vinita Gaikwad, Prof. Pankaj Mudholkar, Dr. Bhaskar PatilThis research aims at finding out the level of awareness and the extent of use of Information Technology (IT) when performing Clinical Research in the Medical domains of Ayurveda, Homeopathy and Medicine. Healthcare professionals are engaged in performing clinical research but are not keen in using IT for the same because of several issues which were addressed in this paper.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Using NLP for Article Summarization[Full-Text ]
Nishit Mohanan, Johny Johnson, Pankaj MudholkarSummarization is the process of reducing a block of text by extracting the most important points in a text document, resulting in a summary of the original document. This is a part of Machine Learning and Data Mining. The crux of summarization is to find the subset of a text or article which contains the information of the entire set of data. There are two techniques for summarization, the first is extraction-based summarization which extracts certain key sentences from the text using various algorithms like text rank. The second is Abstraction-based summarization where the text is analyzed and rewritten or rephrased to achieve a text of shorter length, but this technique requires natural l anguage generation which itself is an emergent field and not widely used. Summarization can be used in various fields and has various appli cations, news sites can use them to provide a short summary of the entire article, and it can be used to save time by obtaining the necessary information without spending too much time reading the article. This paper reviews the use of NLP for article summarization.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Adoption and Implementation of Information Technology in Industrial Research in Metropolitan City[Full-Text ]
Priya Sinha, Sonam Pareek, Sonu GuptaIn this paper we have tried to find the extent of using Software while performing any kind of Industrial research. Knowing the scope of software usage in research is not an easy task. Look around any lab and you’ll see software – both standard and bespoke – being used by all disciplines and seniorities of researchers. According to a survey conducted by Zenodo, 92% of academics use research software, 69% say that their research would not be practical without it, 56% develop their own software (worryingly, 21% of those have no training in software development, 70% of male researchers develop their own software, and only 30% of female researchers do so. We have also tried to find level of research work prevalent in different industrial sectors across Mumbai. Our study also aims to find different funding agencies and their procedures involved in funding research works.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Assessing the views of various stakeholders regarding use of IT (Information Technology) in the field of Health Education.[Full-Text ]
Dr. Seema S. Bansode-Gokhe1, Dr. Swati S. Chavhan2, Dr. Pallavi Shelke3Information Technology (IT) is revolutionizing our life, our ways to interact with each other, and day to day life and work. India being highly populated, facing double burden of diseases and being predominantly rural with doctor to population ratio being inverse to the demand of rural area it is the need of the hour to plan well in advance to make use of gadgets that have reached to masses especially in the interiors of India. The public health experts have been striving through to reach out to the unreached. Therefore, this study is an effort to understand the current developments in use of IT in the field of health and its future. Objectives: To study the current use of IT in Health Education as perceived by various stakeholders involved in the field of Health Education
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of mobile banking application usage in various sectors of society[Full-Text ]
Sagar Brid,Kajal Agrahari,Mrs. Priya ChandranCashless transaction is growing fast in our society.There are various modes of cashless transactions. Mobile banking is one type of electronic banking. There are various mobile banking applications available in market. This study analyzed the views of people in various sectors of society towards those applications. We have collected almost 500 samples and parameters like age, cash limit, occupation etc considered for this study.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
STUDY OF OPPORTUNISTIC NETWORK: ITS APPLICATION, MESSAGE TRANSFERRING TECHNIQUES, SECURITY AND PRIVACY ISSUE[Full-Text ]
Pragati Ambekar,Dr. M.A. RizviMobile ad-hoc network are also infrastructureless networks but they have limited range of wireless transmission [1]. The limited radio band results in reduced limited data rates compared to the wireless network. Hence optimal usage of bandwidth is necessary by keeping low overhead. As application environments of MANETs increase their traditional communication paradigms needs adequacy. Opportunistic network is one of the most developing areas of network which provides communication even in disconnected mode. Nodes are mobile and can change their location and message or packet is forwarded through many intermediate nodes so identity of users shown to all. Specifically today’s ad hoc network are evolving towards opportunistic network where the proactive and reactive approaches for routing management are integrated or definitely substituted with techniques that exploit communication opportunities, whenever they arise, to forward messages on a hop-by-hop basis. But such kind of message transferring technique may lead to problems in the network. There can be several issues that may result in degrading the performance of opportunistic network. This paper provides a review of opportunistic network, message transferring techniques, security and privacy issues in opportunistic network.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparative Survey of different Cryptographic Algorithm[Full-Text ]
Alka Pandey,M.A. RizviNow days, Data security is very challenging issue that touches many areas including computers and communication. Recently, came across many attacks on cyber security that have played with the confidentiality of the users. These attacks just broke all the security algorithms and affected the confidentiality, authentication, integrity, availability and identification of user data. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. Cryptography is used widely for the purpose of secure communication and password management. It comprises the techniques of encryption and decryption mechanism. Encryption is the process of converting normal data or plaintext to something inexplicable or cipher-text by applying mathematical transformations or formulae. These mathematical transformations or formulae used for encryption processes are called algorithms. In this paper we have analysed ten data encryption algorithms AES, DES, RSA, DIFFIE HELLMAN, THREEFISH, CLEFIA, ARIA, SPEAK, SIMON and CHIASMU etc, comparing their different parameters. So that in future the best algorithm method can be used for encryption and decryption of data.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficacy of Homoeopathic Medicines in Paediatric Allergic Respiratory Disorders[Full-Text ]
DR. UTTARA AGALE,DR.D.G.BAGAL,Children become most vulnerable to Allergic Respiratory Disorders because they have no choice over the environment. About 40% of children’s parents do not take treatment others take treatment from modern line like antihistamines, steroids to which the child become dependent & a variety of complications arise. So there is a real need to study Allergic Respiratory Disorders & the homoeopathic medicines which helps in treating it.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
UTILITY OF BELL’S DIARRHOEA AND SYNTHESIS REPERTORY IN THE TREATMENT OF DIARRHOEA OF CHILDREN [Full-Text ]
DR.D.G.BAGAL,DR. UTTARA Diarrhoeal diseases during infancy is usually brief and self limiting but it can cause morbidity in some infants. Homoeopathic medicines help to build immunity against micro-organisms and thus reduce the frequency of the episodes of diarrhea since the treatment is based on holistic and individualistic approach. An effort has been made to understand the reportorial approach of clinical repertory- Bell’s diarrhoea and logico- utilitarian repertory- Synthesis in the treatment of such conditions
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Predictive analysis model to determine predisposition to Type II Diabetes Mellitus and its complications [Full-Text ]
Aparna Deshmukh ,Shweta Sharma ,Reshma DesaiDiabetes Mellitus and associated complications is one of the most important public health challenges for all countries. It is a major cause of blindness, kidney failure, heart attacks, stroke and lower limb amputation. Diabetes can be treated and its complications can be avoided or delayed by means of dietary changes, physical activity, regular screening and appropriate treatment. As per the recent data of WHO, incidence of diabetes has been rising rapidly. Identification of pre-diabetic state in healthy population is important in order to control progression of the metabolic disorder. Predictive analytical IT tools based on predisposing factors are of great value to determine the transition from healthy to pre-diabetic state and also from pre-diabetic to diabetic state. Pre-diabetic individuals can be more effectively subjected to preventive measures and therapeutic options to avoid or delay occurrence of Diabetes Mellitus. We present an overview of existing predictive tools and propose a composite multi-factorial IT based predictive model for risk assessment in Diabetes mellitus. The model will serve as a resourceful tool useful for Healthcare sector for strategic management of diabetes mellitus.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Research on Reliability of Umpire Decision Review System in Cricket[Full-Text ]
Priya SInha, Siddhartha Pandey, Ramratan SinghUmpire Decision Review System (UDRS) is a technique used in cricket to overcome the controversial decisions made by the on-field umpires as to declare a batsman out or not. The accuracy of UDRS comes to around 90%. However, teams like India oppose the technology as they quarrel that the technology should be totally accurate or else the on-field umpires are a better option. We focus on whether the technology can be totally reliable given the scenarios of the decision made.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Evaluation of Applications Operated by Dentists[Full-Text ]
Priya Sinha, Kavita Singh, Yogesh PawarThis research paper focuses on the published work which describes the way primary and secondary dental care interfaces relate to each other. A model is proposed that is highlighting the properties of an ideal interface for the dentists. This model will prove important for categorizing the perceived problems that were found in the interface and the possible solutions. This paper examines the nature of that interface, the drivers for patient flow between services and focuses on the properties of an ideal interface. This model can further be used as a way of summarizing some of the problems facing specialist dental services and of evaluating any proposed solutions.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mobile Location Prediction: Profound Study using Multi-class Random Forest Predictors[Full-Text ]
Mira H Gohil, Dr. S. V. PatelThe ubiquitous connectivity of Location Based System (LBS) allows that location, situation, or event-related recommendation can be sent to targeted consumers to promote “point of purchase.” Point-of-purchase promotion is important, because it can reach the potential users at the time and place where decisions are made. Apart from this many more application domain can exist whose implementation only possible using user mobile location e.g Navigation, Tracking, Geotagging, Augmented Reality, Billing, Sports, Location based Gaming, Location based Social Media, Location based News or Information, Marketing, Emergency system etc. For this type of strategy, the probabilistic information of mobile current location of user plays important role. Users next location can be materialize after protracted period of time but user proposed location at given period of time satisfies the need of the hour. Taking into consideration Anytime Prediction Model (APM) with mobility rules to extract common mobility sequence is the problem to be solve in the area of mobile location prophecy. Many researchers has discussed this problem earlier and we also incarcerating this problem as challenge, research has considered this problem as multiclass classification machine learning (MCML) problem to get the desire accuracy in APM
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Artificial Intelligence Techniques in Computer Graphics[Full-Text ]
Rupali Jadhav,Sameer Kadam,Tejal Kadam,Himesh JhaComputer is changing our lives & Artificial Intelligence techniques are helping the way for this rapid transformation. the Artificial Intelligence keeps focuses on the fundamental mechanisms that enable the construction of intelligent systems that can operate autonomously, learn from experiences, & solve complex problems as well. This paper helps students to use gain information about AI techniques & its use in various projects. It covers most of key challenges in computing such as how to represent human knowledge & machines thought processes, how to use computational models to understand, to explain, & to predict complex behavior of individual or group, & how to make computers as easy to interact with as people. The objective of this research paper is to show that the use of Artificial Intelligence in Computer Graphics can greatly improve the obtained results. In this paper we have presented Improvements in three areas of computer graphics : in the scene modeling which can greatly improve the designer’s work ; in the scene understanding, which allows the user to well understand a scene by means of virtual camera moving around the scene; & in Monte Carlo radiosity techniques where use of heuristic search which permits to automatically estimate the complexity of a region of the scene to be rendered & to refine the processing of complex regions in order to obtain more accurate images.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Augmented Reality: A new dimension in an immersive real world experience[Full-Text ]
Rupali Jadhav ,Rohit Maurya, Trishul Mody, Prakash MandhyanAlthough ‘Augmented Reality’ was theorized many decades ago, its actual potential is far from being realized and harnessed. This technology has the promise to be a game changer and revolutionize the existing primitive technologies. This paper analyses the current developments in Augmented Reality and its applications in the real world. Its uses in healthcare are scrutinized. This paper also attempts to comprehend the mass perception of the people towards the aforementioned technology via a survey based on an appropriately formulated questionnaire. To conclude, the potential future of Augmented Reality is discussed.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Instant Assessment of Student in Classroom [Full-Text ]
Aprajita Singh It has been always seen that there is a huge conversation in an institutions about how they can evaluate student performance as quick as possible as information technology has been growing, so the technology can be used to solve this problem. There should be components that need to be created for students that can be use easily and allows these to access the contents previously created by the tutor and to fulfill the assessment tasks. Working either on mobile, tab, tablet, ipad and non-mobile devices, Test-IT, allow users learn ubiquitously and to proceed with their work at any time and place. We describe the main requirements for using these tools on mobile devices and other handheld devices and also comment some of the current approaches. The design process and the framework’s various components, focusing particularly on the user interface and usability issues, are addressed. The paper also points its attention to the flexibility provided by Test-IT on allowing users to create their own specific applications, according to thseir field or subject of expertise
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study on Li-Fi Technology[Full-Text ]
Sanket Dhumal, Jerome D’mello, Suryanarayan Dora, Megha MudholkarLi-Fi or Light Fidelity means High Speed Light Communication System through light emitting diodes as a medium. Nowadays, where Internet is everyone's favourite, Li-Fi or New Life of Data Communication is another alternative to Wi-Fi in terms of wireless communication. Professor Harald Hass of University of Edinburgh invented the Li-Fi technology. Li-Fi is more capable in bandwidth and hence does not interfere with other communications with use frequency bands. Li-Fi is a thousand times faster than Wi-Fi and is more secure as the visible light cannot penetrate though walls which may be considered as a new era of Wireless Communication. Li-Fi is based on transmission of data through fast flickering of light which is not visible to naked human eye but it is focused on photo detector which transfers the binary data via the on-off state. It has gained a lot of popularity since its invention in the past two years. Li-Fi is the future to greener, safer and cheaper communication. This paper discusses about the working of Wi-Fi technology and its applications in various domains.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Software Obfuscation: A Method for Cryptography[Full-Text ]
Varun Agrawal, Dharmesh Aghada, Lalitkumar Agarwal, Megha MudholkarSoftware Obfuscation is the method for cryptography. Software obfuscation is motivated by the idea that many useful programs can become beneficiary if we can somehow stop people often called intruders from reading the entire software programs, while still letting them possess and run the code on their own computers. It is used to encrypt the source code which makes it hard to understand by the normal person. It is difficult for the programmer to read and write obfuscated code.This paper presents overview, analysis, working and applications of software Obfuscation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Survey of trends in 3D animation[Full-Text ]
Prof. Puja Agarwal, Nishant Adhikari3D animation is one of the most interactive and useful application of computer graphics, programming and mathematics. It is also widely used in fields like gaming, movie, AI, virtual reality, etc. 3D animation involves complex algorithms and data structures as per the requirement of artist, engineer, designer and machine. Some techniques are simple to understand, some are simple to implement but on the hand. Some are difficult to understand or implement. But there are few techniques that are in trend. This paper focuses on how some techniques, which are in trend are used to convert a 3D design into a 3D object on the screen. And also on challenges associated with each along with future development
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Safer E-Wallets[Full-Text ]
Aaina Khan,ApurvaKhedkar,Pinky kanojia, Professor Sonam pareekUsing the basic concepts of Embedded Systems, an idea for changing the future of Cards(Banking, Petro, Health, Tele-voice, etc.) is proposed in this paper. Requirement of a special card reader, limited lifetime, acceptance being the main disadvantages of today’s traditional cards, led to the design of e-Wallet. The main objective of e-Wallet is to make paperless money transaction easier. The main idea behind this paper is to bring in a cheaper, more versatile and much more easily usable kind of a card. Using this e-Wallet, the transaction procedure can be as simple as: the customer goes to the point of sale (POS), does the purchasing and when it comes to the payment, the customer submits his e-Wallet to vender who connects it to his terminal (PC).E-wallets are intended to replace the existingphysical wallet, with its notes, coins, plastic cards, ATM cardsand loyalty cards etc. E-wallet is a convenient, easy-to-use,secure payment system. It is flexible “Electronicpaymentsystem” with a number of payout and pay-in options via a bank account.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CYBER STAKING: CRIME AND CHALLENGE AT THE CYBERSPACE[Full-Text ]
Gomti vysya,Annuradha yadav,Professor Sonam PareekWith the emergence of new technologies and innovation there is an alarming increase in cybercrime. In India cybercrime is increasing from simple e-mail type of crime to hacking source code theft etc. Cyber stalking is one of the cybercrime where women, senior citizen and children are mostly the target. This paper examines cyber stalking as example of crime that is both amendable to and resistant of traditional form of legislation depending on which possibilities of internet are exploited. This paper discusses the modes of crimes, categories of cyber stalkers, psychology of cyber stalker and motives of cyber stalker. Paper also suggests measure to prevent the crime and deal cyber stalker
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Use of Information Technology for Research in Basic Sciences[Full-Text ]
Mr. Shirshendu Maitra , Ms. Aprajita Singh , Ms. Rupali Jadhav , Ms. Rashmi VipatThe research aims to find the extent of use of Information Technology (IT) amongst researchers for Basic Sciences in Metropolitan cities. Research is a cyclic process which varies in terms of the number, type and complexity of activities depending upon the question(s) posed, methodology used and outcomes expected. In this paper, discussion is limited to two major groups of research activities—identifying the background knowledge base for a research project in basic sciences and understanding the data that result from the undertaking using IT . To do research with an improved and better IT infrastructure, a survey was carried out in different college in and around Mumbai. This paper intends to understand Indian scenario of research in the fields of Basic Sciences, the problems faced when doing research, to find the extent of use of Information Technology for conducting ethical research and finally to come up with better and more feasible solutions using IT to solve current problems faced by researchers when performing research.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Comparative Study of ACID and BASE in Database Transaction Processing[Full-Text ]
Mr. Keith Machado , Mr. Rohan Kank ,Ms. Jeenal Sonawane ,Mr. Shirshendu MaitraTwo disparate database reliability models are the primary issue discussed within this paper: ACID (Atomicity, Consistency, Isolation, and Durability) and BASE (Basically Available, Soft state, Eventual consistency). In the old, yet still extant, world of vertical scaling, the concept of ACID, which is proven standard for SQL-centric and other relational databases, has been around for 30+ years and works remarkably well. In the new world of Data Management, with the rise of social networking, NoSQL, Big Data and other leviathans, popularity of BASE has increased only recently, over the past 10 years or so. The need for real-time availability constraints of web-based transaction processing, ever expanding horizontally scaled distributed networks, alongside non-relational data stores gave rise to the requirement of BASE. With Brewer’s CAP Theorem acting as the referee in the middle forcing tough decisions on each team, they essentially represent two competing groups, although there are now more crossovers and negotiations between the two models
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Comparative Study: MongoDB vs MySQL[Full-Text ]
Mr. Sushil Soni ,Mr. Mayuresh Ambavane ,Mr. Shamal Ambre , Mr. Shirshendu MaitraThe relational database has been the foundation of enterprise applications for decades, and since MySQL’s release in 1995 it has been a popular and inexpensive resource. Yet with the explosion in the volume and variety of data, recently non-relational database technologies like MongoDB have emerged to address the needs of new applications. MongoDB is not only used for new applications but also to augment or replace existing relational infrastructure. In this paper we will try to show case a comparative study of non-relational databases and relational databases. We mainly emphasis our presentation on one application of the NoSQL database technology, known as MongoDB, and make a comparison with another application of relational databases, known as MySQL, and thus justifying why MongoDB is more efficient than MySQL. We will also present the benefits of using a non-relational database compared to a relational database. A comparison criterion includes theoretical differences, characteristics, limitation, integrity, distribution, system requirements, and architecture, query and insertion times.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------