Kudikyala U.K.,Keshav Memorial Institute of Technology
Proceedings of the 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education, MITE 2015 | Year: 2015
Computer Science and Engineering (CSE) and Information Technology (IT) students are not adequately exposed to implementing a software development methodology or a project management framework to develop software as per the current curriculum. The students' final year Project Work was selected to apply an industry-oriented Agile software development methodology. Specifically, we employed the most popular Agile project management and development framework called Scrum. Wiki pages were used to convey our expectations to students regarding project work. They were used as a collaborative tool by the team members during project implementation. In this paper, we present our experiences and lessons learned from applying the Scrum framework and using a collaborative Web 2.0 tool called Wikispaces in managing students' major projects. © 2015 IEEE.
Mohanty R.,Keshav Memorial Institute of Technology |
Ravi V.,Banking Technology |
Patra M.R.,Berhampur University
Applied Soft Computing Journal | Year: 2013
In this paper, we propose novel recurrent architectures for Genetic Programming (GP) and Group Method of Data Handling (GMDH) to predict software reliability. The effectiveness of the models is compared with that of well-known machine learning techniques viz. Multiple Linear Regression (MLR), Multivariate Adaptive Regression Splines (MARS), Backpropagation Neural Network (BPNN), Counter Propagation Neural Network (CPNN), Dynamic Evolving Neuro-Fuzzy Inference System (DENFIS), TreeNet, GMDH and GP on three datasets taken from literature. Further, we extended our research by developing GP and GMDH based ensemble models to predict software reliability. In the ensemble models, we considered GP and GMDH as constituent models and chose GP, GMDH, BPNN and Average as arbitrators. The results obtained from our experiments indicate that the new recurrent architecture for GP and the ensemble based on GP outperformed all other techniques. © 2012 Elsevier B.V.
Chandan K.,Keshav Memorial Institute of Technology |
van Iersel M.P.,Maastricht University |
Aladjem M.I.,U.S. National Institutes of Health |
Kohn K.W.,U.S. National Institutes of Health |
And 2 more authors.
Bioinformatics | Year: 2012
Purpose: The PathVisio-Validator plugin aims to simplify the task of producing biological pathway diagrams that follow graphical standardized notations, such as Molecular Interaction Maps or the Systems Biology Graphical Notation. This plugin assists in the creation of pathway diagrams by ensuring correct usage of a notation, and thereby reducing ambiguity when diagrams are shared among biologists. Rulesets, needed in the validation process, can be generated for any graphical notation that a developer desires, using either Schematron or Groovy. The plugin also provides support for filtering validation results, validating on a subset of rules, and distinguishing errors and warnings. © Published by Oxford University Press 2011.
Kutmon M.,Maastricht University |
Riutta A.,Gladstone |
Nunes N.,Maastricht University |
Hanspers K.,Gladstone |
And 11 more authors.
Nucleic Acids Research | Year: 2016
WikiPathways (http://www.wikipathways.org) is an open, collaborative platform for capturing and disseminating models of biological pathways for data visualization and analysis. Since our last NAR update, 4 years ago, WikiPathways has experienced massive growth in content, which continues to be contributed by hundreds of individuals each year. New aspects of the diversity and depth of the collected pathways are described from the perspective of researchers interested in using pathway information in their studies. We provide updates on extensions and services to support pathway analysis and visualization via popular standalone tools, i.e. PathVisio and Cytoscape, web applications and common programming environments. We introduce the Quick Edit feature for pathway authors and curators, in addition to new means of publishing pathways and maintaining custom pathway collections to serve specific research topics and communities. In addition to the latest milestones in our pathway collection and curation effort, we also highlight the latest means to access the content as publishable figures, as standard data files, and as linked data, including bulk and programmatic access. © The Author(s) 2015.
PubMed | Gladstone, Keshav Memorial Institute of Technology and Maastricht University
Type: Journal Article | Journal: Nucleic acids research | Year: 2016
WikiPathways (http://www.wikipathways.org) is an open, collaborative platform for capturing and disseminating models of biological pathways for data visualization and analysis. Since our last NAR update, 4 years ago, WikiPathways has experienced massive growth in content, which continues to be contributed by hundreds of individuals each year. New aspects of the diversity and depth of the collected pathways are described from the perspective of researchers interested in using pathway information in their studies. We provide updates on extensions and services to support pathway analysis and visualization via popular standalone tools, i.e. PathVisio and Cytoscape, web applications and common programming environments. We introduce the Quick Edit feature for pathway authors and curators, in addition to new means of publishing pathways and maintaining custom pathway collections to serve specific research topics and communities. In addition to the latest milestones in our pathway collection and curation effort, we also highlight the latest means to access the content as publishable figures, as standard data files, and as linked data, including bulk and programmatic access.
Sastry V.U.K.,Sreenidhi Institute of Science and Technology |
Shankar N.R.,Keshav Memorial Institute of Technology |
Bhavani S.D.,Jawaharlal Nehru Technological University
Cybernetics and Information Technologies | Year: 2013
In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.
Vasantha S.V.,Keshav Memorial Institute of Technology |
Damodaram A.,Sri Venkateswara University
2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015 | Year: 2015
As the technology gets advanced so as the security issues come into the picture. Here we will discuss about one such advancement in the modern world for communication purpose which is ruled by wireless networking. Precisely MANET (Mobile Adhoc Network) plays a huge role in transmission of data without any wired structure. Its distinct nature of maintaining the nodes and links to transmit the data at faster rate has proven its importance in communication media. The major issue with mobile adhoc network is security, there are two major such type of security issues which affects the MANET while transmitting data are Black hole and Gray hole attacks. This paper proposes Bulwark-AODV which prevents single or cooperative Black hole attacks by identifying malicious route replies at source and intermediate nodes and finds a shortest valid path. It also works in case of single adjacent node to the source and when there are multiple Black holes in the network. It detects Gray holes by snooping the ACKs of data packets. Forgery of ACK if any is identified by the source through checking the return time of ACK. Simulation results indicates better performance even though special cases are considered. © 2015 IEEE.
Andra N.K.R.,CMR Institute of Technology |
Andra N.K.R.,Osmania University |
Sriperumbudur U.L.,Keshav Memorial Institute of Technology |
Dasari K.S.,Osmania University
International Journal of Optics | Year: 2016
Primary energy based corollaries of point spread function with asymmetric apodization using complex pupil function have been studied in the case of three-zone aperture. Merit function like semicircled energy factor, excluded semicircled energy, and displaced semicircled energy were analyzed with respect to Airy case in terms of phase and amplitude apodization. Analytical results have been presented for the optimum parameters of phase and amplitude asymmetric apodization. © 2016 Naresh Kumar Reddy Andra et al.
Mohanty R.,Keshav Memorial Institute of Technology |
Rani K.J.,Keshav Memorial Institute of Technology
Proceedings - 2015 International Conference on Computational Intelligence and Communication Networks, CICN 2015 | Year: 2015
In the modern society, mobile communication became the leading medium of communication. Now the public policies and standardization of mobile communication allows customers to switch from one service provider to another service provider easily. One of the most critical challenges in data and voice telecommunication service industry is retaining customers. The cost of retaining an existing customer is lesser than the cost of getting a new customer. So service providers now shifted their focus from customer acquisition to customer retention. As a result, churn prediction has emerged as the most essential Business Intelligence (BI) application that aims to identify the customers who are about to transfer their service to a competitor i.e. To churn. In this paper, we proposed Counter Propagation Neural Networks (CPNN), Classification and Regression Trees (CART), J48 and fuzzy ARTMAP to predict customer churn and non-churn in telecommunication sector. The dataset analyzed is taken from Indian Telecommunication Service Industry. © 2015 IEEE.
Seshagiri Rao N.V.S.S.,Birla Institute of Technology and Science |
Satya Narayana Murthy V.,Birla Institute of Technology and Science |
Ramakrishna Sharma Y.J.V.S.,Keshav Memorial Institute of Technology
Bulletin of Materials Science | Year: 2016
We studied the magnetization reversal mechanism of single-layered Co50Fe50 nanomagnets by measuring the magnetization reversal and using the micromagnetic simulations. The magnetization reversal strongly depends on the thickness of the nanomagnets. In the remanent state, the magnetic force microscopy studies and the simulation data showed the formation of single and vortex states depending on the thickness of nanomagnets. © Indian Academy of Sciences.