1. Intelligent Computing Method for the Diagnosis of Sleep Disorder

Dr. Babita Pandey , School of Computer Application Research Scholar, Lovely Professional University

Vijay Kumar Garg , Guru Kashi University


Intelligent computing system (ICS) and knowledge-based system (KBS) have been widely used in the detection and interpretation of EEG (electroencephalography) based sleep disorder such as: Snoring, Sleep Apnea, Insomnia, Parasomnia, which are detected by physiological, psychological as well as ECG based factors. Heuristic-based detection methods of EEG based parameters for a particular disease have also been reported in the literature but little effort has been made by researchers to combine rule-based reasoning (RBR) and casebased reasoning of KBS. Integration of rule-based reasoning and case-based reasoning improves the computational and reasoning efficiency of the problem-solving strategy. We have developed an integrated model of CBR and RBR for generating cases to diagnose the sleep disorders. We have hierarchically structured the sleep disorders in terms of their physio- psycho (muscular, cognitive and psychological) parameters and ECG based parameters. The basic objective of this work is to develop an integrated model of RBR and CBR in which RBR is used to hierarchically correlate the sign and symptom of the disease and CBR is used for diagnosing the sleep disorders.

2. A statistical machine translation model for English to Urdu machine translation

Shahnawaz, R.B. Mishra, Department of Computer Engineering, IIT (BHU), Varanasi, India


In this paper we have presented a statistical machine translation model for English to Urdu machine translation. Our proposed model uses factored translation model. Factored translation model handles morphological rich language like Urdu by integrating linguistic features with the words. These features include POS tag, lemma and morphology etc. Superficial form of the words in the target language (Urdu) is factorized with the factors to create a factored corpus. English to Urdu machine translation model presented in this paper uses GIZA++, SRILM and Moses for translation model, language model and decoding.

3. An Approach to Predict about Thyroid Cancer Using Data Mining Technique

Sudhanshu Kumar, Assistant Professor, IFTM University, Moradabad

Sanjeev Bhardwaj, Assistant Professor, IFTM University, Moradabad

Sachin Jain, Assistant Professor, Sunderdeep Engineering, College, Ghaziabad


Data mining now-a-days plays an important role in prediction of diseases in health care industry. The Healthcare industry utilizes data mining techniques and finds out the information which is hidden in the data set. Thyroid cancer is one of the few cancers that are becoming more common in the past several years, with a growth rate of 3% per 100,000 people each year. Many diagnoses have been done for predicting diseases. Without knowing the knowledge of profound medicine and clinical experience the treatment goes wrong. The time taken to recover from diseases depends on patients’ strictness. For finding out the disease, number of test needs to be taken by patient. In most cases not all test become more effective. And at last it leads to the death of the patient. Many experiments have been conducted by comparing the performance of predictive data mining techniques for reducing the number of test taken by the patient indirectly. This research is to present a prediction of Thyroid Cancer disease using list out the various classification algorithms that has been used with number of attributes in Health informatics.

4. Pedagogical Issues In E-learning Based Instructional Package

Prashish Khare , Department of Education, University of Allahabad, Allahabad

Dhananjai Yadav, Department of Education, University of Allahabad, Allahabad


E-learning is globally used term and every area is attached with it. There are so many approaches related with e-learning but its pedagogical aspects/approaches are still much neglected. Here various pedagogical aspects and their main characteristics and their potential e-learning applications have been traced out. Desiring pedagogical attributes for e-learning environment, Instructional development technology, suitability of questions, evaluation process and various aspects discussed here.

5. Development of Test Bed by using virtualization Technology for Real Time Network Attacks

Mr.Asheesh Kumar Gupta, Scientist ‘B, NIELIT Ministry of Comm. & Information Technology, Govt. of India


Information Security is fast emerging as critical area where single failure means everything is lost and hence it is important to have a Test Bed where Network Security design could be tested in Non Destructive methodology. Non Destructive methodology means that networks could be designed and collapsed by network attacks and after that they could be quickly restored to the initial state so that the design could be further improved by making modifications and it could again be tested by launching attacks. In this paper the Design, Architecture and Development of such a Test Bed is discussed. This Test Bed would simulate actual security attacks and remedial measures to test the effectiveness of protection and help in handling the Security Incidents effectively. This Test Bed could serve as an environment for malware Analysis also, where malware could be run in an isolated environment provided by the Test Bed and its actual effect on the environment could be studied so that effective countermeasures could be designed against the malware

6. Wireless Data Capture and Transaction Processing with RFID

Mr.Ajay Kumar Yadav
Mr. Brijesh Kumar Bhardwaj
Mr.Rohit Kumar Vishwakarma


In the era of globalization the competitiveness of any company depends on the advance technology. In this paper we have taken a new technology for reading codes present on different products. The purpose of RFID is very much similar to BCR or magnetic strip readers which are used to read bar codes on the back of any item or magnetic strips on the back of credit cards or ATM cards respectively. These all are used to identify objects details, its price and originality of the products. This paper explores the concept and functionality of RFID in business organization and further an attempt is made to know, how this RFID technology is different in some way from other code reading techniques .RFID refers to small electronic devices that consists of small chip and an antenna [1] .RFID works smartly which senses it’s not necessary to keep products in contact with RFID, and it can also provide details of more than one products in a slot.


Chandrabhan Singh, Computer Science & Engg. Department , AIET, Lucknow, India

Sanjay Sachan, Computer Science & Engg. Department, AIET, Lucknow, India


As the use of web increasing the need to get realistic information quickly increases. The current web seems to be only information locater not as retriever. Thus lots of human efforts are required to extract useful information out of those located information. So it focuses on the need for semantic web i,e extension of current web. Semantic web requires various steps to full clients requirements those are invention, selection, composition, monitoring etc. The paper is based on study of various composition approaches and exploration of agent based approach. We here mainly focus on automated service composition approaches like AI planning based, Work-Flow based, Ontology based and finally Agent based. Keywords- SWS, Composition, AI Planning, Workflow, Ontology driven, Agent.

8. Role of Social media in business-to-business branding: A Review

Raja Verma Dr. Vinayak Chand Tiwari, CMJ University N.N.TechCampus, Nawabganj,Gonda


The B2B brand is becoming more accessible, and the audience can now engage on their time and on their terms with the brand. Core values of the brand can be further enhanced by connecting, engaging and building relationships with various stakeholders. Social media in a B2B environment needs to be explored to reveal the opportunities for these B2B companies and their brands. Research on the subject is important to understand how companies should proceed with social media, and where social media fits within the business strategy – or even how companies needs to change in order to cope with social media. The aim of this paper is to provide brief reviews to how business?to?business companies can leverage opportunities in the social media sphere to build their B2B brand, by looking at how the frontrunners and thought leaders of social media utilize the new technology.

© 2015, School of Management Sciences | All rights reserved.