Singh T.R.,JUIT |
Gupta A.,Computational Biology Group |
Suravajhala P.,Bioclues.org and 86 87
International Journal of Bioinformatics Research and Applications | Year: 2013
While it is known that the human genes are regulated by microRNAs (miRNAs), recent links with cancer and other diseases have widely caught interest. With several bioinformatics platforms and approaches on rise that has led to discovery of human miRNAs, validation and need for understanding miRNAs from their progenitor messenger RNAs (mRNAs) have arisen. Furthermore, the miRNAs are known to have synergism involving regulation of their condition-specific target genes (mRNAs). In this review, we provide a bioinformatics approach of the miRNAs and their challenges with respect to annotation. With introduction of sequence-specific miRNA signatures recently found, we discussed myriad of dimensions where miRNAs are being associated with several putative functional and evolutionary events, and then we asked a question how far and relevant is the association of miRNAs with mRNAs? Copyright © 2013 Inderscience Enterprises Ltd.
Dahiya D.,JUIT |
Dahiya S.,NIC Inc
Proceedings - 9th RoEduNet IEEE International Conference, RoEduNet 2010 | Year: 2010
Identifying one stop solution in terms of a software development methodology for enterprise wide application development whose various sub-components or sub-stages can be best used to describe a software development scenario is still an evolving domain. This, coupled with the reality that computer science and its allied areas like information systems and information technology domains are moving forward rapidly with regards to available technologies, making it extremely difficult task for practitioners to maintain pace with the available information technologies and their application in various domains. It is to address these scenarios and probabilities that this research paper examines various software process models and their impact on the overall software development life cycle.
Jain T.K.,JUIT |
Saini D.S.,JUIT |
ITNG 2014 - Proceedings of the 11th International Conference on Information Technology: New Generations | Year: 2014
Generally a wireless sensor network is realized using many-to-one concept of having many sensors transferring the data to a common single sink. The proposed work demonstrates the importance of multiple sink in a wireless sensor network. The proposed routing protocol routes the data efficiently from multiple sources (sensing nodes) to multiple sinks. A comparison between single sink and multiple sink is also made to appreciate the proposed work. © 2014 IEEE.
Sood M.,JUIT |
Research Journal of Pharmaceutical, Biological and Chemical Sciences | Year: 2014
Clinical data is complex, context-dependent, and multi-dimensional, and such data generates an amalgamation of computing research challenges. To extract and interpret the useful information from raw data is a challenging job. This study aims at developing an automated predictive model to diagnose the state of an epileptic patient using EEG signals. The segmented EEG signals are utilized to extract various statistical features which are used for prediction. Strategically, we have designed a fully automated neural network model, capable of classifying the seizure activity into ictal, interictal and normal state with an accuracy as high as 99.3%, maximum sensitivity of 100% and specificity as high as 98.3% for all the classes. For the different set of parameters and optimum number of neurons in hidden layer, ANN model revealed a superior model for validating the classification.
Patel R.,JUIT |
International Conference on Computing, Communication and Automation, ICCCA 2015 | Year: 2015
A single cloud provider alone is not able to satisfy the increasing demand for its services as the number of online users and services deployed by organizations grow exponentially. To achieve the promises of cloud computing, the necessity of aggregating different cloud provider into a single framework emerges. This concept overcomes the limitations of interoperability, portability, vendor lock in problem, scalability and elasticity of contemporary cloud computing. Collaborating with different cloud providers is not an easy task because each cloud provider has different kinds of architecture, virtualization technology, service level agreement, enterprise solution and interface for accessing services. This scenario is identified by many synonyms in the literature such as cloud federation, Inter-cloud, Multi-Cloud etc. This paper discusses various driving forces and advantages that attract researchers towards it. Further, this paper concentrates on exploring related work done in addressing different issues and finding gaps that will create opportunities for further research and development. This work will tend to emerge as a step towards the next-generation enterprise solution. © 2015 IEEE.
Goel A.R.,Shobhit University |
Ranjan A.,JUIT |
Proceedings of the International Conference on Innovative Applications of Computational Intelligence on Power, Energy and Controls with Their Impact on Humanity, CIPECH 2014 | Year: 2014
In networking data rate varies from application to application and usually ratio of peak data rate is much higher than average data rate i.e. bursty data transfer. Hence, service provider/Network cannot use normal multiplexing as it requires huge bandwidth with very small utilization factor, so there is a requirement of statistical multiplexer, which is based on incoming data rate statistics and efficiently utilizes the available total bandwidth. There are many applications which use this technique like asynchronous transfer mode, UDP/TCP protocol, and digital TV transmission, digital broadcasting. Generally hardware implementation is faster than software implementation, so authors have proposed VLSI hardware architecture of statistical multiplexer and implemented on FPGA using Xilinx ISE. Various modules are simulated, synthesized and implemented on FPGA. Digital operating clock frequency is also estimated for individual sub-module and integrated main module. © 2014 IEEE.
Singh A.K.,JUIT |
Dave M.,National Institute of Technology Kurukshetra |
Mohan A.,Indian Institute of Technology BHU Varanasi
2013 IEEE 2nd International Conference on Image Information Processing, IEEE ICIIP 2013 | Year: 2013
The rapidly growing field of digital contents (image, audio, and video) has incited the need of copyright protection and content authentication, which can be used to verify against any unlawful attempt to either reproduce or juggle them in order to change their identity. Digital watermarking is a method providing a best result to the trouble of copyright protection and content authentication of digital contents. However, the digital contents can be easily obtained or facsimiled, misrepresented, distributed and stored. In this paper, we present the image watermarking method depends on the two most popular transform methods such as discrete wavelet transforms (DWT) and singular value decomposition (SVD). Based on observations, this algorithm combines the advantages and removes the disadvantages of these two transforms techniques. Also, we compare the results obtained from different wavelet filters against the number of signal processing attacks. This scheme is provides robust watermark without degradation of image quality. © 2013 IEEE.
Mohana R.,JUIT |
Proceedings - International Computer Software and Applications Conference | Year: 2011
Webservices are the key technologies for the web applications developed using Service Oriented Architecture (SOA). Many outsourced webservices can be combined to provide value added services to the users. There are many challenges involved in its implementations. One of the essential challenges is service discovery which involves finding a set of suitable webservice candidates faster. When a large number of functionally-equivalent services have been discovered, it is difficult for users to choose which one is to be invoked. Researchers have proposed various techniques for service discovery like ranking the webservices based on their Quality of Service (QoS). The various parameters of quality are reliability, security, performance, etc. This paper presents an algorithm for building a rule based model for ranking the webservices based on quality of service (QoS) using fuzzy clustering and particle swarm optimization (PSO). In general, the numbers of rules are directly proportional to the number of quality attributes considered for ranking but PSO reduces the number of rules by removing the rules that are having less weightage and will not affect the system. This paper also proposes a new webservice reference that behaves as an expert system. It contains a rule base and a reference engine. The rule base consists of all the rules and a reference engine that triggers all these rules and gives the rank of the service as an output © 2011 IEEE.
Goyal R.,JUIT |
Ahuja A.K.,Indian Institute of Technology Roorkee
Advances and Trends in Structural Engineering, Mechanics and Computation - Proceedings of the 4th International Conference on Structural Engineering, Mechanics and Computation, SEMC 2010 | Year: 2010
It is a general practice to provide a flat or sloping slab called canopy at the entrance door of the building at the ground level wherever space permits. Indian Standard Code of Practice on Wind Loads gives values of wind pressure coefficients on gable roof buildings with unsupported canopy for wind direction normal to ridge only. Similarly, the Australian code recommends certain values of net pressure coefficients on canopies/awnings and carports. The information available in such codes is very scarce. The present paper describes the results of the wind tunnel study carried out on the models of gable roof buildings with attached canopies. Pressure points are made on roof as well as wall surfaces to measure external wind pressures. In case of canopies, pressure points are placed on upper as well as lower surfaces. Wind pressure coefficients are calculated from the measured values of mean pressures on wall and roof surfaces in all the models and compared in order to observe the influence of canopy on wind pressure distribution. © 2010 Taylor & Francis Group, London.
Parihar N.S.,JUIT |
Shukla R.P.,Indian Institute of Technology Roorkee
International Journal of Earth Sciences and Engineering | Year: 2015
Soil reinforcement is a good alternative for improving the performance of a weak soil. Application of geosynthetic as a soil reinforcement has gained wide popularity in the last two decades. Various studies on reinforced sand and unconfined compressive strength of clay are available in literature but only few studies have been conducted in c-φ soil. In present study, a series of experiments have been conducted in the laboratory to determine the effect of reinforcement on unconfined compressive strength of a c-φ soil. A series of unconfined compressive tests are performed on soil with inclusion of reinforcement and without reinforcement. Woven and nonwoven geotextiles are used as reinforcing media and incorporated in soil sample in layers. Soil samples of 38 mm diameter and 76 mm height are used in study. The numbers of layers varied from zero to three. In case of soil without geotextiles, failure plane is observed between lower bottom and center of sample. In case of two layer woven and non- woven geotextile, the failure plane was observed above the level of geotextile. Peak strength of reinforced soil increases with a considerable amount due to inclusion of woven reinforcement compared to nonwoven reinforcement. More are the number of layers of woven geotextile, more is the strength of the soil observed. Though, the effect of number of layers is negligible in case of non-woven geotextile. © 2015 CAFET-INNOVA TECHNICAL SOCIETY. All rights reserved.