scispace - formally typeset
Search or ask a question

Showing papers by "Mandeep Kaur published in 2015"


Journal ArticleDOI
TL;DR: Functional characterization of the wheat transporter, TaABCC13 a homolog of maize LPA1 confirms its role in glutathione-mediated detoxification pathway and is able to utilize adenine biosynthetic intermediates as a substrate.
Abstract: The ABCC multidrug resistance associated proteins (ABCC-MRP), a subclass of ABC transporters are involved in multiple physiological processes that include cellular homeostasis, metal detoxification, and transport of glutathione-conjugates. Although they are well-studied in humans, yeast, and Arabidopsis, limited efforts have been made to address their possible role in crop like wheat. In the present work, 18 wheat ABCC-MRP proteins were identified that showed the uniform distribution with sub-families from rice and Arabidopsis. Organ-specific quantitative expression analysis of wheat ABCC genes indicated significantly higher accumulation in roots (TaABCC2, TaABCC3, and TaABCC11 and TaABCC12), stem (TaABCC1), leaves (TaABCC16 and TaABCC17), flag leaf (TaABCC14 and TaABCC15), and seeds (TaABCC6, TaABCC8, TaABCC12, TaABCC13, and TaABCC17) implicating their role in the respective tissues. Differential transcript expression patterns were observed for TaABCC genes during grain maturation speculating their role during seed development. Hormone treatment experiments indicated that some of the ABCC genes could be transcriptionally regulated during seed development. In the presence of Cd or hydrogen peroxide, distinct molecular expression of wheat ABCC genes was observed in the wheat seedlings, suggesting their possible role during heavy metal generated oxidative stress. Functional characterization of the wheat transporter, TaABCC13 a homolog of maize LPA1 confirms its role in glutathione-mediated detoxification pathway and is able to utilize adenine biosynthetic intermediates as a substrate. This is the first comprehensive inventory of wheat ABCC-MRP gene subfamily.

45 citations


Proceedings ArticleDOI
01 Sep 2015
TL;DR: The main target of SA is to find opinions from tweets, extract sentiments from them and then define their polarity, i.e, positive, negative or neutral.
Abstract: Sentiment Analysis(SA) is a combination of emotions, opinions and subjectivity of text. Today, social networking sites like Twitter are tremendously used in expressing the opinions about a particular entity in the form of tweets which are limited to 140 characters. Reviews and opinions play a very important role in understanding peoples satisfaction regarding a particular entity. Such opinions have high potential for knowledge discovery. The main target of SA is to find opinions from tweets, extract sentiments from them and then define their polarity, i.e, positive, negative or neutral. Most of the work in this domain has been done for English Language. In this paper, we discuss and propose sentiment analysis using Hindi language. We will discuss an unsupervised lexicon method for classification.

33 citations


Journal ArticleDOI
TL;DR: In this paper, a novel method was developed for the oxidation of thiols to the corresponding disulfides using 20mol% haloacid (HBr or HI) in combination with dimethyl sulfoxide.

21 citations


Journal ArticleDOI
TL;DR: The review has shown that the still much research is needed to improve the image fusion technique further and the IBLPCA based technique has shown quite improved results over the available techniques.
Abstract: The key objective of vision fusion would be to merging information from multiple images of exactly the same view in order to deliver only the useful information. The PCA based ways of vision fusion are more suitable and time-saving in realtime systems using PCA based standards of still images. This paper has centered on the many image fusion techniques. The review has shown that the still much research is needed to improve the image fusion technique further. The IBLPCA based technique has shown quite improved results over the available techniques. This paper ultimately ends up with the suitable future directions.

10 citations


Journal Article
TL;DR: The intensity of scale damage was found to be toxicant concentration and exposure period dependent and also prolonged exposure to the pesticide damage the fish scales severely.
Abstract: Fish scale morphology can serve as a reliable pollution bioindicator. The effect of pesticide on scales of freshwater fish Ctenopharyngodon idellus was studied using scanning electron microscopy at various exposure periods (15, 30 and 60 days) at different sublethal concentrations (1.44 µg/l and 2.41 µg/l) of organophosphate, chlorpyrifos. The fish exposed to the toxicant showed significant alterations such as damaged radii, focus, circuli and severely damaged lepidonts. The intensity of scale damage was found to be toxicant concentration and exposure period dependent and also prolonged exposure to the pesticide damage the fish scales severely.

7 citations


Journal ArticleDOI
TL;DR: Some bound handling mechanisms need to be applied to Particle Swarm Optimization with Aging Leader and Challengers (ALC-PSO) to improve its performance and results are presented.
Abstract: Boundary violation is a common process in optimization problems This problem can be seen in Particle Swarm Optimization(PSO) and its variants too An aging based variant of PSO called, PSO with Aging Leader and Challengers(ALC-PSO) overcomes the stagnation problem that existed in PSO To avoid the problem of random particles, some bound handling mechanisms need to be applied to Particle Swarm Optimization with Aging Leader and Challengers (ALC-PSO) to improve its performance During the search process, some particles may leave the search boundaries within which the optimal solution is to be found It becomes essential to handle such boundary constraint violations and some boundary handling strategies are required to be implemented This paper presents some of these bound handling methods applied to ALC-PSO algorithm and comparisons are made with PSO These methods include velocity initialization, velocity clamping and bound handling methods The results are simulated on MATLAB R2011b for Ackley benchmark problem

4 citations



Proceedings ArticleDOI
01 Dec 2015
TL;DR: A new reduction technique based on constant modulus algorithm shows great improvement in the PAPR value which has been discussed in this paper.
Abstract: OFDM (Orthogonal Frequency Division Multiplexing) has been raised a new modulation technique for next generation 4G networks e.g. LTE. But OFDM has a major drawback that is high value of PAPR at the transmitter end. Since OFDM is only used in the downlink of 4G networks therefore to reduce the problems of high PAPR (Peak to Average Power Ratio) in OFDM, some techniques e.g. SLM, PTS, Clipping, Coding, & Pre-coding etc. are suggested but none of them reduces the PAPR to an acceptable value. But a new reduction technique based on constant modulus algorithm shows great improvement in the PAPR value which has been discussed in this paper.

3 citations


Journal ArticleDOI
TL;DR: The main function of arbitrator is to grant the permission to incoming requests so as to enter the CS, by forwarding incoming requests to node, that is having the the primary token, which will reduce the response time, synchronization delay and message complexity.
Abstract: Mutual exclusion among the nodes waiting for critical resources is considered as one of the major area of research in MANET. Mutual Exclusion allows mobile nodes to share resources among them. Formation of quorum is required for delivery of data with common intermediate node in between them. While communication, data transmission between quorums, is carried out using an arbitrator that is common to both regions. The main function of arbitrator is to grant the permission to incoming requests so as to enter the CS, by forwarding incoming requests to node, that is having the the primary token, which in turn will reduce the response time, synchronization delay and message complexity.

1 citations


Journal ArticleDOI
TL;DR: Hysteroscopy added a new dimension in the management of patients with menstrual irregularities, infertility and postmenopausal bleeding, increasing the accuracy of diagnosis and serving as an adjunct in the treatment of intrauterine problems.
Abstract: AIMS AND OBJECTIVES: The present study was carried out with the following aims and OBJECTIVES: To diagnose intrauterine causes of various gynaecological problems, to correlate between hysteroscopic and clinical findings, to treat the pathology hysteroscopically, if possible and to put the patient on treatment depending upon the diagnosis made by hysteroscope. MATERIAL AND METHODS: The present study was carried out on 100 patients between the age group 18-60 years admitted in the Gynaecology ward of Rajindra Hospital, Patiala. The present study was carried out to diagnose the intrauterine causes of various gynaecological problems like menstrual irregularities, infertility and post-menopausal bleeding. OBSERVATIONS: In the present study, majority of the patients (52%) were in the menstrual irregularities group. Normal cavity was found in 53.8% of the patients with menstrual irregularities and 52.7% of cases of infertility. Majority of the patients of post-menopausal bleeding had abnormal cavity (66.7%). Significantly more abnormal findings were diagnosed in the postmenopausal bleeding group (66.7%) as compared with pre- menopausal menstrual irregularities group (46.2%). On correlating clinical and hysteroscopic findings, the present study shows a higher accuracy of positive predictive value of hysteroscopy (93%). 49 out of 100 patients (49%) had positive findings making this investigation a necessary tool in the armamentarium of a modern gynaecologist. CONCLUSION: Hysteroscopy came out to be a better procedure than conventional clinical methods. It added a new dimension in the management of patients with menstrual irregularities, infertility and postmenopausal bleeding, increasing the accuracy of diagnosis and serving as an adjunct in the treatment of intrauterine problems.

1 citations


Journal Article
TL;DR: The impact of applying various velocity initialization strategies on the ALC-PSO Algorithm, which uses the concept of aging to find the optimal solution to a difficult problem, is presented.
Abstract: Particle Swarm Optimization with Aging Leader and Challengers (ALC-PSO) is an optimization technique which uses the concept of aging. Aging is a vital process that comes to all. This mechanism is applied to the Particle Swarm Optimization Algorithm, to find the optimal solution to a difficult problem. The ALC-PSO algorithm uses the concept of a leader, leading the swarm and another particle challenging the position of the leader, based on its efficiency, performance, lifespan and leading power. When Aging mechanism is applied to PSO, the premature convergence is overcome and the efficiency of the algorithm is increased. Whenever during the search process, any particle tends to leave the boundaries of the search space, much effort is wasted in searching for the best solution if the particle which could find best solution, has gone out of the search space. In such a situation, it becomes essential to re-initialize the particle’s velocity, to make it come back into the search space, so that the optimal solution be found efficiently and in lesser time. There are mainly three velocity update strategies which can be used in the algorithm for its better performance. These include: Velocity initialization to zero, velocity initialization within a specified domain, velocity initialization to a random value near zero. This paper presents the impact of applying various velocity initialization strategies on the ALC-PSO Algorithm.

Journal ArticleDOI
TL;DR: Ripley’s kfunction is used to refine the original clusters obtained by kmean and weighted k-mean clustering algorithms.
Abstract: As the data on the web is growing rapidly, more and more people rely on the search engines to explore the web .Due to heterogeneous and unstructured nature of the web data, Web mining uses various data mining techniques to extract hidden useful knowledge from Web hyperlinks, page content and web usage logs. Web Usage Mining is one of the applications of data mining techniques that are used to discover interesting usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. Web usage mining consists of three phases: preprocessing, pattern discovery, and pattern analysis. In this paper Ripley‟s kfunction is used to refine the original clusters obtained by kmean and weighted k-mean clustering algorithms.

Journal ArticleDOI
TL;DR: Experimental analysis of the performance of ALCPSO and Standard PSO Algorithm on different benchmark functions and made an effort to list out the performance differences between PSO and ALC-PSO.
Abstract: Particle swarm optimization is the populace based heuristic optimization technique motivated by swarm intelligence and aims to find the best solution in the swarm. Aging leader and challengers with Particle swarm optimization (ALC-PSO) is a PSO variant in which concept of leader and challenger is implanted ALCPSO has been successful in preventing premature convergence problem of PSO. In this paper, we performed experimental analysis of the performance of ALCPSO and Standard PSO Algorithm on different benchmark functions and made an effort to list out the performance differences between PSO and ALC-PSO.

Proceedings ArticleDOI
21 Dec 2015
TL;DR: Evaluating the performance of image forensic tools that can detect cut-paste forgery by detecting inconsistency in noise and proposing an architecture of a fusion based tamper detection system based on multiple cues, which are carefully chosen to address the most common tampering traces.
Abstract: Image forensic techniques have a sensitive role in determining authenticity of digital images. Multiple tampering operations and varied image content has led to high false positive rate of these methods when applied to real world forgeries. A detection method based on fusion of multiple cues is desired to improve reliability and accuracy in image forensics. Hence, there is an insistent need of testing the passive blind methods on standard database so that plausibility of cues for incorporating in fusion based framework can be assessed. The current paper evaluates the performance of image forensic tools that can detect cut-paste forgery by detecting inconsistency in noise. Fusion with an additional cue for detecting copy-move forgery based on intensity gradient (edge directions) has shown improvement in detection accuracy. The paper subsequently proposes an architecture of a fusion based tamper detection system based on multiple cues, which are carefully chosen to address the most common tampering traces.

Journal ArticleDOI
TL;DR: A scheme for the location privacy is introduced especially effective when eavesdropper will try to locate the location of source or sink by using DREAM protocol and deviate location information and false identity of sensor nodes is provided to the eavesdroppers which can confuse the attacker and protects the source as well as sink.
Abstract: In wireless sensor networks messages are sent from source to sink, but it sometime becomes a risky communication way because of presence of eavesdropper. During transfer of packet or message from source to sink an eavesdropper may attack on the network and creates problem for the sender or receiver, as the eavesdropper may trace the path and detect the location of source or sink very easily. Because of this security is always remained a concern topic in wireless sensor networks. Different techniques introduced time to time for the protection of source and sink in wireless sensor networks. I n this paper we have also introduced a scheme for the location privacy. This technique especially effective when eavesdropper will try to locate the location of source or sink by using DREAM protocol. In this scheme deviate location information and false identity of sensor nodes is provided to the eavesdropper which can confuse the attacker and protects our source as well as sink. The nodes in these networks having identical capabilities and energy in a network is called homogeneous network (8). These types of networks can be again classified into flat and hierarchy topology. In the flat topology that the sensors close to the static sink consumes more energy than the sensors at the margin of the network. The drawbacks of flat topology can be overcome by using hierarchical topology i.e., clusters. In this, the group of nodes that forms the lower layer and the cluster heads at the higher layer (4). Cluster head, which collects data from the lower layers and then forwards it to the sink. Cluster head can acts as an aggregation point. Since the cluster head is collecting data from lower nodes, it consumes more energy than other nodes. So, the sensor nodes can be rotated dynamically to avoid the energy consumption. The Heterogeneous networks having small number of resource rich nodes and large number of resource limited basic nodes. The resource rich nodes are having powerful transceivers and batteries. The resource rich nodes can acts as cluster heads. The resource limited basic nodes having limited communication capabilities. Mobile Data Gathering is a technique that consists of one or more Mobile Collectors (MC's) (4). Mobile collector is a device equipped with powerful transceiver and high battery power. It gathers the data in short-range communications. MC roams over the sensing field to collects the data while moving or pause at some points on its moving path from the sensors. To attain the maximum energy saving, a mobile collector must travel the transmission range of each sensor node in the field. It helps the mobile collector to collect the data packets in a single hop. The path of the mobile collector in the sensing field may be random or planned. The mobility of the collector reduces the energy consumption in the