Manuscripts

Recent Papers

Case Study

Case Report-Post Cataract Surgery Herpes Simplex Keratitis and its Management

Herpes simplex keratitis (HSK) is a leading cause of corneal opacification and infection-related visual loss. Even though an individual may not have had the clinically apparent disease, high fever, immune-suppression, and sometimes surgery can reactivate latent herpes1. Its presentation can be distinctively divided into two types, epithelial keratitis or stromal keratitis due to a difference in pathogenesis, this inevitably postulates treatment difference. In this report, a case of postoperative herpes simplex virus (HSV) keratitis after a cataract surgery is described. The diagnosis and medical management of herpes simplex keratitis are discussed.

Published by: Dr. Nishant Vardhan

Author: Dr. Nishant Vardhan

Paper ID: V4I1-1179

Paper Status: published

Published: January 9, 2018

Full Details
Thesis

Test

Test Abstract

Published by: Manish, Rajesh, Ankit Singla, Shafina

Author: Manish

Paper ID: Z1T1-1125

Paper Status: approved

Submitted: January 9, 2018

Full Details Track Status
Research Paper

DNA Methylation Data Analytics in Cancer Research

Many studies demonstrated that the DNA methylation, which occurs in the context of a CpG, has strong correlation with diseases, including cancer. There is a strong interest in analyzing the DNA methylation data to find how to distinguish different subtypes of the tumor[1]. However, the conventional statistical methods are not suitable for analyzing the highly dimensional DNA methylation data with bounded support. DNA methylation is one of the most extensively studied epigenetic marks, and is known to be implicated in a wide range of biological processes, including chromosome instability, X-chromosome inactivation, cell differentiation, cancer progression and gene regulation[4]. Identification of cancer subtypes plays an important role in revealing useful insights into disease pathogenesis and advancing personalized therapy. In order to explicitly capture the properties of the data, a deep neural network is used, which composes of several stacked binary restricted Boltzmann machines, to learn the low-dimensional deep features of the DNA methylation data.

Published by: Apoorva Patil, Rashmi A. Rane

Author: Apoorva Patil

Paper ID: V4I1-1161

Paper Status: published

Published: January 8, 2018

Full Details
Research Paper

A Study on the Volatility and Return with Reference to Stocks of Bank Nifty

Study on stock market trends has been an area of vast interest both for who wish to make a profit by trading stock in the stock market. India is one of the emerging economies, which has witnessed significant developments in the stock markets during the liberalization policy initiated by the government. However, investing in banking shares include high risks which can be guided but not controlled. The banking sector is the backbone of country’s economy. This sector has given very good return to the investors in the past. But the recent financial crisis has proved, that the Banking stocks tend to be more volatile than other stocks. This paper is a humble attempt to measure the volatility of the Bank index stocks and compare it with that of the volatility of NIFTY. Stock markets, in general, are considered volatile and volatility plays a key role in measuring the risk-return trade-offs. Estimating volatility enables the pricing of securities and, understanding stock market volatility or individual stock price volatility enables good decisions on the part of investors.  Investors who are risk-averse would not be happy to invest in a highly fluctuating stock, whereas those with a thirst for riskiness would happily invest in a highly volatile market. The study evaluates the performance of banking stocks mainly to identify the required rate of return and risk of a particular stock based upon different risk elements prevailing in the market and other economic factors.

Published by: Rohith U J

Author: Rohith U J

Paper ID: V4I1-1150

Paper Status: published

Published: January 8, 2018

Full Details
Survey Report

A Literature Survey on Intrusion Detection and Protection System using Data Mining

In the modern world of security many researchers have proposed various new approaches; among those techniques application of data mining for Intrusion detection is one of the best suitable approaches.The system proposes a security system, name the Intrusion Detection and Protection System (IDPS) at system call level, which creates the personal profile for the user to keep track of user usage habits as the forensic features. The IDP uses a local computational grid to detect malicious behavior in a real-time manner. In this paper, a security system, named the IDPS is proposed to detect insider attacker at SC level by using data mining and forensic techniques.

Published by: Chaitali Choure , Leena H. Patil

Author: Chaitali Choure

Paper ID: V4I1-1144

Paper Status: published

Published: January 8, 2018

Full Details
Research Paper

Big Data Classification of Users Navigation and Behavior Using Web Server Logs

Users for online shopping are increasing day by day because of easy to get and time-saving property of online shopping. Having a proper understanding of users interest for certain type of product or different products for online shopping becomes important to create personalized service for a target market. An important property of successful e-commerce website is the ability to provide useful content at the right time to users. And because of all this, personalization techniques are introduced to create adaptive shopping application in which user interfaces change according to users interest. User’s behavior information is stored in web log files, and to get the information data mining techniques are used in which they use statistical characters to model users behavior and not considering the sequence of action performed by uses. It becomes helpful if we follow user’s session to understand complex user behavior. Therefore to eliminates all these issues this paper proposes a linear-temporal logic model checking approach for the analysis of structured e-commerce weblogs. If we consider a common way of mapping log records according to e-commerce structure, weblogs can be easily converted into event logs by which behavior of the user is captured. After getting users behavior by performing different predefine queries to identify different behavioral patterns that consider the different actions performed by a user during a session.

Published by: Prajakta Ghavare, Prashant Ahire

Author: Prajakta Ghavare

Paper ID: V4I1-1172

Paper Status: published

Published: January 8, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X