Randomly generate question paper
Keywords:
Blowfish Algorithm, MySQLAbstract
Now a days the major problems faced in many colleges and universities when they send exam paper to college then before the exam time it gets leaked in many colleges and still that is very difficult to find from where actually the paper has been leak. And when the question paper is leaked in one college then same question paper will be spread throughout all colleges. The system aims to give information about design and implementation of the automatic question paper generation system for educational organizations. At first the system will input questions and by filtering that as unique using natural language processing and store entire possible question in its database which is the required dataset to generate the question paper as per syllabus of particular subject .The dataset contains the possible question with respect to marks to each question this dataset is may be formed by manually entering the question to the system to generate the dataset or question bank to generate the required question paper as per required pattern. The system will not repeat any question in the generated question paper. It mainly deals with the gathering, sorting and administration of a large amount of questions and deliver it to the organization with full of security. When the system delivers the paper to college, the paper will be encrypted with the help of blowfish algorithm and for decrypting it there is need of key that will send by the system after request.
References
- Khaled M. Alhawiti http://waset.org/publications/10000118/role-of-natural-language-processing-in-information-retrieval-challenges-and-opportunities A. Criminisi, P. Perez, and K. Toyama, Region filling and object removal by exemplar-based image inpainting., IEEE Transactions on Image Processing, vol. 13, no.9, pp. 12001212, 2004.
- KapilThadani and KathleenMcKeown Department of Computer Science, Columbia University, New York, NY USA .
- Ashwak ALabaichi, 2Faudziah Ahmad Information Technology Department Universiti Utara Malaysia Kedah, Malaysia 1Lecurer in Computer Science Department, Faculty of Sciences, Kerbala University, Ramlan Mahmod Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang, Malaysia ramlan@fsktm.upm.edu.my Karbala, Iraq
- Ms.Theres Bemila1, Karan Kundar2, Lokesh Jain3, Shashikant Sharma4, Nayan Makasare5 Assistant Professor, Dept. of Information Technology, Shah & Anchor Kutchhi Engg., College, Mumbai, (MH) India1 B.E.Student, Dept. of Information Technology, Shah & Anchor Kutchhi Engg., College, Mumbai, (MH) India
- Khelf Mohamed University of Science and Technology of Oran (USTO) ORAN, ALGERIA, LMSE laboratory Ouslim Mohamed, Hamoudi.M, Masmoudi.MUniversity of Science and Technology of Oran (USTO) ORAN, ALGERIALMSE laboratory
- Krystian Horecki1 and Jacek Mazurkiewicz2()1 Nokia Networks, Technology Center Wroclaw, Poland ul. Strzegomska 36, 53-611 Wroclaw, Poland Krystian.Horecki@nokia.com 2 Department of Computer Engineering, Wroclaw University of Technology ul. Wybrzeze Wyspianskiego 27, 50-370 Wroclaw, Poland
- Erwin Marsi, Emiel Krahmer Communication & Cognition Tilburg University The Netherlands e.c.marsi@uvt.nl e.j.krahmer@uvt.nlNormalized alignment of dependency trees for detecting textual entailment
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.