scispace - formally typeset
Search or ask a question

Showing papers by "Mandeep Kaur published in 2014"


01 Jan 2014
TL;DR: This review summarizes the possible diverse mechanisms of nephrotoxicity induced by heavy metals emphasizing on the involvement of signalling pathways by metal-induced generation of reactive oxygen species and oxidative stress generation in cancer progression.
Abstract: Due to higher pervasiveness of heavy metals in the environment, exposure to heavy metals is the common phenomenon for nephrotoxicity. This review summarizes the possible diverse mechanisms of nephrotoxicity induced by heavy metals. Various mechanisms depending upon the type of heavy metal and its exposure are oxidative stress, lipid peroxidation, apoptosis, inhibition of antioxidant enzymes etc. The roles of molecular factors such as metalbinding proteins, inclusion bodies, and cell-specific receptor like proteins that appear to influence renal tubule cell expression, have attracted increased interest as determinants that modulate cell populations as special risk for toxicity and renal cancer. We also review the mechanisms of carcinogenesis caused by heavy metals emphasizing on the involvement of signalling pathways by metal-induced generation of reactive oxygen species and oxidative stress generation in cancer progression.

4 citations


Journal ArticleDOI
TL;DR: A comparative study of full adders with various logic style of designing finds that less power is consumed in the Transmission based full adder than the Convention fullAdder and Pass Transistor full adding.
Abstract: The paper discusses a comparative study of full adders with various logic style of designing. Logic style affects the switching capacitance, transition activity, short circuit current and delay. Various logic styles have been compared taking full adder as a reference circuit and power dissipation and delay as reference parameters. Simulation results of all the full adders at technologies of 180nm, 90nm, 45nm of CMOS process have been provided. It is observed that less power is consumed in the Transmission based full adder than the Convention full adder and Pass Transistor full adder.

4 citations


Journal ArticleDOI
TL;DR: This paper proposes the optimization of the stability period the sensor network and the optimizing tool used here is genetic algorithm (GA) for the proficiency in stability period.
Abstract: Wireless sensor network is an emerging and new technology in the field of data processing and wireless communication. The wireless network is composed of tiny nodes called as sensor nodes which are battery powered and are capable of transferring information to the destination i.e. Sink. Being battery powered these nodes are limited in energy and loose the energy during the process of routing. Once the sensor node has lost all its energy, it is dead. With the death of first sensor node the network becomes unstable. The stable election protocol (SEP) aims to increase the stability period of the network i.e. the period before the death of the first node. In this paper we propose the optimization of the stability period the sensor network and optimizing tool used here is genetic algorithm (GA). For the proficiency in stability period, the GA is applied on SEP. The simulation of the proposed algorithm is done on MATLAB and the results are compared with heterogeneous LEACH and SEP.

2 citations


01 Jan 2014
TL;DR: A PSO approach embedded in a simulation model is proposed to minimize the maximum completion time (make span) and the results are compared with those obtained by using the ''longest processing time'' Rule.
Abstract: This paper addresses parallel machine scheduling problems with practical Swarm Optimization (PSO). A PSO approach embedded in a simulation model is proposed to minimize the maximum completion time (make span). The results are compared with those obtained by using the ''longest processing time'' Rule, which is known as the most appropriate dispatching rule for such problems. This application illustrates the need for efficient and effective heuristics to solve such PSO Scheduling Machine Problem. The proposed PSO approach yields good results quickly and several times in one run. Moreover, because it is a search algorithm, it can explore alternative schedules providing the same results. We Cloudsim for simulation of this approach and we get significance improvement in resource utilization.

2 citations


Journal ArticleDOI
TL;DR: The Improved Novel Routing Algorithm (INOVEL) for Congestion Control in Wireless Sensor Network is introduced and the results show that such an algorithm improves the performance, efficiency of the network by decreasing end to end delay and increasing both the throughput and packet delivery fraction among the nodes.
Abstract: This paper is based upon the concept of improving the novel congestion control scheme in Wireless Sensor Network. In WSN Congestion is an important issue. Congestion occurs at the transport layer of the OSI model. The Novel Congestion Control Scheme proposed a rate-based Fairness-Aware Congestion Control Protocol (FACC), which controls congestion and achieves approximately fair bandwidth allocation for different flows. Congestion occurs at the intermediate nodes in WSN. This means the time during when intermediate nodes send Flow Control Acknowledgement to Source Node to describe the congestion status so as to control its flow rate will result in large amount of packet loss. This motivates the need of new technique to control the packet dropping at the intermediate nodes. So to avoid the packet dropping the proposed work introduced the Improved Novel Routing Algorithm (INOVEL) for Congestion Control in Wireless Sensor Network which works in three phases. These three phases plays an important role in utilizing the available free spaces of the neighbored nodes and free routing paths to accommodate the load of Congestion Affected Node’s. This Routing Algorithm is implemented in NS-2 where the results show that such an algorithm improves the performance, efficiency of the network by decreasing end to end delay and increasing both the throughput and packet delivery fraction among the nodes.

1 citations


01 Jan 2014
TL;DR: This review summarizes recent cellular and molecular advances in the understanding of the mechanisms leading to end-stage FLD and results in prospects for their better prevention and treatment.
Abstract: Fatty liver disease is gaining increasing recognition as a major health issue worldwide.If left untreated, liver may become so seriously scarred that it can no longer heal itself, progresses to cirrhosis which is life threatening. Fatty liver disease (FLD), whether it is alcoholic FLD (AFLD) or nonalcoholic FLD (NAFLD), encompasses a morphological spectrum consisting of hepatic steatosis (fatty liver) and steatohepatitis. FLD may be considered a single disease with multiple etiologies. This review summarizes recent cellular and molecular advances in the understanding of the mechanisms leading to end-stage FLD. Key risk factors including overweight, insulin resistance, a sedentary life-style and an altered dietary pattern have been identified in recent years. Pathogenesis of Fatty liver disease involves the role of nuclear receptors, proinflammatory cytokines, apoptosis, mitochondrial dysfunction, oxidative stress, sphingolipids, C-Jun-N-terminal kinase (JNK) pathway, phosphatidylinositol 3-kinase (PI3K/AKT) pathway, AMP Activated Protein Kinase (AMPK) pathway, DiacylglycerolAcyltransferase (DGAT), Visceral Adipocyte Tissue (VAT), Peroxisome Proliferators-Activated Receptors (PPAR' s ), ceramides, Tumor suppressor gene, Sterol regulatory element binding proteins (SREBPs) and NF-E2-related factor-2 (Nrf2-ARE) pathway. Prevention and therapy opposing the development of steatosis can be achieved by a multifactorial approach: control of alcohol consumption, avoidance of obesity and of excess dietary long-chain fatty acids, or their replacement with medium-chain fatty acids. Progress in the understanding of the pathogenesis of Fatty liver disease and its progression to inflammation and fibrosis will results in prospects for their better prevention and treatment.

1 citations


01 Jan 2014
TL;DR: A review of tampering detection methods based on blur inconsistencies is provided, which shows that blur operation has become a common tool to hide visual blueprints such as discontinuity in intensities among different regions.
Abstract: In this Digital era,due to the availability of easy-to-use photo-manipulation software tools, image security has become a prominent question as people are using them for their malicious purposes in various fields for example in journalism, social networking, politics, criminalism etc. Whenever tampering is done, it affects or changes the basic characteristics of images such as blurriness, sharpness ,noise, luminance intensity etc.There are various methods which detects divergence in different characteristics. Now days, blur operation has become a common tool to hide visual blueprints such as discontinuity in intensities among different regions. This tool is being used to commit copy& move and splicing forgeries. But this operation changes blur consistencies pattern of original image. If these blur inconsistencies get detected, we can conclude that image has been tampered. Therefore, in this paper, we provide a review of tampering detection methods based on blur inconsistencies.

18 Nov 2014
TL;DR: The genetic algorithm is used as an optimizing tool for the improvement of lifetime & stability period of the network and the proposed protocol, when compared with SEP and LEACH shows better outcomes.
Abstract: Recent advancements in technology have enabled the development of low-cost, low-power sensor devices used in wireless communication. A WSN consist of large number of wireless devices, the sensor nodes, able to take environmental measurements and route these measurements to the base station. These senor nodes are very small in size and are powered by battery. In a WSN, the sensor nodes are deployed randomly in the area of interest. Being battery powered, these sensor nodes lose their energy every time they collect or transmit any information and become inactive. The WSN becomes unstable as the first sensor node dies. Thus the routing protocol should be energy efficient should help in increasing the stability period and so the network lifetime of the WSN. In this paper, the genetic algorithm is used as an optimizing tool for the improvement of lifetime & stability period of the network. For the purpose of optimization the GA is applied on SEP. The proposed protocol, when compared with SEP and LEACH shows better outcomes.

Journal ArticleDOI
TL;DR: An overview of various approaches available in literature for tamper detection, along with their strengths and weaknesses are presented and a critical review of available fusion is presented to expedite the development of novel image forensic techniques.
Abstract: Trustworthiness of digital images has a significant role in many areas, but the ease with which they can be manipulated and distributed has brought forth the security aspects. The easy accessibility of sophisticated photo editing tools has made the process of verifying the authenticity and integrity of digital images extremely difficult. There is an urgent need to develop novel image forgery detection techniques and also improve the high false positive rates of the existing methods. The current paper presents an overview of various approaches available in literaturefor tamper detection, along with their strengths and weaknesses. As lot of research has been carried out in the field of active andpassive tamper detection, the focus of this paper is to highlight the role of fusion in the field of image tamper detection. As the research in this direction has been very limited, all methods that detect tampering on the basis of multiple cues (foot prints or tampering traces) are grouped together and are termed as fusion based approaches. Image tamper detection techniques can be made more reliable and robust by using fusion of multiple tamper detection tools. A critical review of available fusion is presented to expedite the development of novel image forensic techniques.