Volume 2 Issue 1

Paper 1: Big Data and Precision Medicine

  • Abstract-:This paper focuses on clinical data taken from diversified sources that can be utilized to predict medical conditions. Precision medicine being top priority in medication is main essence to describe treatment based on individual physiology, genetic makeup and other factors. Healthcare information is available from clinics, government hospitals and electronic medical records along with advanced digital resources such as glucometers, insulin injectors, blood pressure monitors, and smart watches. Social media is an excellent source where people share their medical treatment status on Facebook, Twitter, WhatsApp and LinkedIn. Effective statistical models can be created social media to prescribe medicines. Vital architectural components include storage programs (Amazon S3, Google cloud store), data incorporation mechanisms (Kafka, Storm Topology, Sqoop), APIs (Fitbit Web, Apple HealthKit, OneTouch, Facebook, Twitter), processing engine (Spark, Hadoop) and training datasets (Spark ML, Mahout scalable machine learning, data mining techniques, appropriate algorithms). Advantages of precision medicine includes powerful decision making resources (big data), better selection of disease targets, treatment opportunities, reduced medical expenses and timely delivery of healthcare. To optimize the capability of precision medicine, uninterrupted research funding, scientific initiatives, patient involvement in medicinal initiatives. Successful execution of precision medicine with holistic individually tailored approach necessitates the coordinated efforts of all healthcare stakeholders for its recognition, up-gradation of diagnosis and management.

  • Get PDF Download

Paper 2:Quantum Limits, Computational Complexity and Philosophy – A Review

  • Abstract-:Quantum computing physics uses quantum qubits (or bits), for computer’s memory or processor. They can perform certain calculations much faster than a normal computer. The quantum computers have some limitations due to which the problems belonging to NP- Complete are not solved efficiently. This paper covers effective quantum algorithm for solving NP-Complete problems through some features of complexity theory, that we can simplify some of the philosophical interest problems.

  • Get PDF Download

Paper 3: Analysis and Evaluation of Requirement Engineering Process at NorthBay Solutions

  • Abstract-:Requirement engineering has become an essential part as it deals with the process of definition, documentation and maintenance of requirements for software product. Requirement Engineering standards like IEEE/ISO/IEC has defined a standardized approach for Requirement Engineering process in developing software solutions. In Pakistan a great range of software houses does not follows any standardized approach to build software solutions. This research is aiming to help those graduating students and others who are not clear about the actual implementation of Requirement Engineering process in the industry. Interviews with Project Leads have been carried out to inquire about the Requirement Engineering standards and process implementation at ‘NorthBay Solutions’ Lahore. Results deduced from this will help students and researchers to get familiar with implemented solutions of requirement engineering process.

  • Get PDF Download

Paper 4: Cloud Information Security Challenges and Accountable Solutions

  • Abstract-:Cloud computing model is an advanced framework which utilizes consolidated idea of “utility computing” and “software-as-a-service”, providing convenient and on-demand services to requested end users. Security in cloud figuring is a basic angle confronting a few issues that must be mulled over. Safety from any sort of external threats must be taken into care by the cloud service provider and consumer so that any data theft issue is not faced by the customer afterwards. A probability emerges that a noxious customer can invade the cloud by having honest customers, therefore defiling the entire cloud and affecting various customers who are sharing the tainted cloud in the meantime. This exploration covers the parameters that impact the security of the cloud and it in this way it also examines cloud security issues looked by cloud expert centres and purchasers of cloud, for instance, data integrity and other security issues.

  • Get PDF Download

Paper 5: Reputation Based Trust Management System for Improving Public Health Care System in Pakistan

  • Abstract-:Health is the most important facility for the people by the government if it is provided properly. There is a lack of trust among people about healthcare system particularly in public hospitals of Pakistan. People do not trust doctors and hospitals due to poor management and low standards check-up by the doctors. This is due to the lack of feedback system which leads to the mismanagement of healthcare institutions. In this research, we have developed a reputation-based feedback management system that will overcome all the problems related to the trust of the patients regarding their medical care. This will enhance the system and will let doctors, staff, and management to work honestly to make their repute well.

  • Get PDF Download

Paper 6: Multi-core Commercial Off-the-shelf (Cots) Under The Implementation Of Fault Tolerance

  • Abstract-:The fault-tolerant design is applicable to high performance IT systems, increased by an amount of false contacts from smaller structures. As a substitute for the hardware solutions that are based on software error tolerance mechanisms, proper solution can increase the reliability for the commercial-of-the-shelf (COTS) multicore processors within a cheaper range with efficiency for further use. This paper aims to create a hybrid approach to hardware-related software, the current Core Intel x86 family and Xeon multi-core platforms. To support memory transactional hardware (TSX Intel) in creating implicit hits and fast rollback redundant process execution and signature comparison for error detection and error recovery can be done through transactional packing. Existing applications have improved redundant instrumentation performance with tolerance to post-binary compound errors. Further physical improvement increases the applicability of the CPU SPEC benchmark approach proposed in 2006 with administrative costs and rated performance over 47% on average based on the existence of proposed hardware support. In this paper, all the techniques for hardware and software level that help us for the removal of faults in multi-core commercial-of-the-shelf (COTS) and that makes the system able enough to work properly.

  • Get PDF Download

Paper 7: Image Segmentation Using Marker-Controlled Watershed Transformation and Morphology

  • Abstract-:The watershed segmentation methods are essential methods, to be considered for quick results in image handling and analysis. However, the main problem arises in produced image because it causes excess segmentation and noise. This research is conducted to improve this presented algorithm based on the mathematical morphology and filters to minimize flaws mentioned in that paper. Objective of this research is to find the gaps in the existing literary works. In most cases, the marker based segmentation is best because it marks the part of segment. The working of this proposed algorithm is checked by optimization of the part that is still an area of research.

  • Get PDF Download