Abstract: Advances in data analytics has become a disruptive force across multiple fields; its impact has influenced the dynamics of traditionally technology-supported fields, turning them into technology-dependent ones. One such field, where this impact is still in a nascent stage, is healthcare. Trends in artificial intelligence have only realized their potential when backed up with datasets of the requisite scale, due to the data-hungry nature of machine learning algorithms. Our paper deals with the impact of recent advances in data analytics, and how they can be leveraged for the healthcare sector, with specific emphasis on predictive and visualization applications.
Abstract: As technological advances make strides into many fields, including that of healthcare, the onus is on us to take advantage of these. Technology has been adopted by the healthcare industry since long; however, it retains a secondary role as far as patient data management and connectivity is concerned. The aim of this paper is to devise a novel architecture and framework to make available the patient data in a concise, secure and accurate manner. Our architecture is based on a secure cloud system as backend, using smartcard as authenticators. Our proposed architecture consists of: i) A secure hybrid cloud system, based on the open-source Eucalyptus software ii) A secure smartcard called MediCard to securely authenticate users iii) An Android application that serves as a user-friendly interface to the patient data, from the perspective of the healthcare provider as well the patient. iv) A website that allows easy management of the patient data such as medical reports, prescriptions etc. by the healthcare provider. These three components allow a wide variety of applications that can be undertaken by this healthcare system, which are detailed ahead. This model seeks to help the healthcare providers such as hospitals, physicians, diagnostic labs, and chemists by electronically managing all the patient data they need access to in a secure, and efficient manner.
Abstract: Modern operating systems are complex system software, with a variety of interfaces that make developing software for them simple and more importantly, ensure they execute efficiently and fulfill high performance requirements. One of the fundamental techniques used here is Virtual Memory Management (VMM) that summarily allocates virtual memory segments to the executing processes. Due to practical and economic constraints, the system memory available in limited, and even with the use of slower secondary memory, there are frequent instances of the memory and cache pages needing replacement. Thus, algorithms for deciding the fate of the pages are needed. This paper proposes a page replacement algorithm to perform this task, as well as summarizes, evaluates and objectively represents the classical as well as modern page replacement algorithms, with a qualitative analysis of their performance under specific scenarios.
Abstract: In multitasking operating system, processes don't run simultaneously, but switch very expeditiously. Thus, all the processes share the CPU time. It is the job of the scheduler to select a process from the ready queue and place it into the memory based a particular strategy known as Scheduling Algorithm. There exist many Scheduling Algorithms such as First Come First Serve (FCFS), Shortest Job First (SJF), Round Robin (RR), Priority Scheduling, Multilevel Queue Scheduling (MLQ). This paper proposes a new strategy consolidating three of the existing scheduling algorithms to create a new strategy that reduces the time a process spends in waiting state. The proposed algorithm also reduces the number of context switches to provide a fair, efficient and methodical scheduling algorithm. The algorithm is an extended version of Round Robin Algorithm where each of the processes is given a priority level (low, medium or high) and based on the priority level, the Time Quantum for that process is decided and executed. The throughput of the algorithm is increased by executing processes with smaller burst time or smaller remaining burst time by allocating the process to the CPU as soon as it is ready but not pre-empting the running process.
Abstract: To write data on a disk block or to read data from a disk block, three factors are considered: seek time, rotationals delay and actual data transfer time. The seek time is the time taken to move the arm to the proper cylinder and the rotational delay is the time for the proper sector to rotate under the head. The seek time dominates the other two factors by a wide margin. Thus, disk scheduling algorithms are used to reduce the seek time and improve the performance of the system substantially. There exist several disk scheduling algorithms like FCFS (First Come First Serve), SSTF (Shortest seek time first), SCAN (for both directions), C-SCAN (Circular SCAN), LOOK (for both directions) and C-LOOK (Circular LOOK). All these algorithms use a single head. The proposed algorithm uses two heads instead of one thereby improving the performance of modern storage devices in terms of throughput. The throughput can be increased by reducing total head movements. The working of the proposed algorithm has 4 cases based on the nature of requested tracks. When both the heads are working together, they serve the requests of their areas and do not overlap. In some cases, only a single head is used to serve all the requests, thus improving the battery usage.
Abstract: A blockchain system is different from the hitherto used featuring robustness and disintermediation. A blockchain consists of records (blocks) recorded in a digital ledger, thoroughly decentralized where transactions are recorded in contrast to the tables in the relational database. A transaction once recorded in the system is resistant to alteration. The paper proposed several applications of blockchain system integrating it with the national identity of an individual. The national identification records of an individual must contain the fundamental details regarding the individual along with the biometrics. The available attributes of the national identification records can be used efficaciously in applications such as banking, digitizing healthcare, digital voting, etc. An example for such a national identity is the Aadhar in India which is currently utilized in centralized applications. Integrating Aadhar with blockchain yields illimitable applications in a decentralized, secure and transparent manner.