scispace - formally typeset
Search or ask a question
Institution

Heritage Institute of Technology

About: Heritage Institute of Technology is a based out in . It is known for research contribution in the topics: Steganography & Support vector machine. The organization has 581 authors who have published 1045 publications receiving 8345 citations.


Papers
More filters
Proceedings ArticleDOI
07 Jun 2019
TL;DR: This paper predicted PPI between dengue and its human host combining amino acid composition and the conjoint triad of human protein sequences as a feature vector using three well-known supervised machine learning methods, viz., Support Vector Machine, Naive Bayes and K-nearest neighbor for prediction.
Abstract: Dengue Virus (DENV) is one of the most significant mosquito-borne viral infections of humans. Accoding to WHO, every year more than 50 million people are affected by DENV, resulting in 20,000 deaths. Protein-protein interactions play an important role in the cellular process of dengue virus infection in the human body. Although recently some studies have predicted protein-protein interactions (PPI) between human and DENV, many still remain to be identified. In this paper, we have predicted PPI between dengue and its human host combining amino acid composition and the conjoint triad of human protein sequences as a feature vector. We have concentrated on three well-known supervised machine learning methods, viz., Support Vector Machine (SVM), Naive Bayes (NB) and K-nearest neighbor (KNN) for prediction. SVM-based method achieved better accuracy, specificity and F1 score over other algorithms. Subsequently, unknown target human proteins of DENV infection are predicted using SVM to generate 411 new dengue-human PPI. Furthermore, the Gene Ontology (GO) and KEGG pathway of these predicted human proteins are analyzed. Both known and predicted human proteins share similar GO annotations. The pathways of the predicted human proteins are also found to be supported by recent literature. Identification of such interactions may accelerate a way for predicting new drugs to prevent dengue-related diseases.

10 citations

Book ChapterDOI
01 Jan 2019
TL;DR: Post-disaster need assessment deals with the accurate assessment of the need (i.e. demand and utility) for emergency resource at the shelters.
Abstract: Post-disaster need assessment deals with the accurate assessment of the need (i.e. demand and utility) for emergency resource at the shelters. While demand signifies the amount of resource required, utility represents the exigency of that requirement. Due to lack of, or imprecise need assessments immediately after a disaster, relief requirements are generally set up based on coarse estimates by logisticians regarding what people would normally need. The effectiveness of this estimation depends on the competencies and experience of the logistician in control, often leading to impromptu allocation of typically scarce emergency resources. Thus, forecasting the exact demand and enumerating the correct utility of emergency resources are inevitable.

10 citations

Journal ArticleDOI
TL;DR: In this paper, the generalization of both Boltzmann entropy and distribution in the light of most probable interpretation of statistical equilibrium is studied and some new interesting results of significant physical importance are obtained.
Abstract: The paper deals with the generalization of both Boltzmann entropy and distribution in the light of most-probable interpretation of statistical equilibrium The statistical analysis of the generalized entropy and distribution leads to some new interesting results of significant physical importance

9 citations

Journal ArticleDOI
TL;DR: The specificities of the enzyme was observed to be highly specific towards oat spelt xylan and was inhibited by mercuric chloride (HgCl2), N-bromosuccinimide, and trans-1,2-diaminocyclohexane-N′, N′,N −tetraacetic acid strongly.
Abstract: A low molecular weight endo-xylanase (EC 3.2.1.8) was purified from an edible mushroom Termitomyces clypeatus grown in submerged medium with oat spelt xylan. Xylanase was purified to apparent homogeneity by ammonium sulfate fractionation and gel filtration chromatography. Its molecular weight was determined by gel filtration chromatography and sodium dodecyl sulfate-polyacrylamide gel electrophoresis to be 12 kDa. The enzyme was found to be most active at 50°C and pH 5.0, being most stable at pH 6.5. The Km for oat spelt xylan was determined to be 10.4 mg/ml. The specificities of the enzyme was observed to be highly specific towards oat spelt xylan and was inhibited by mercuric chloride (HgCl2), N-bromosuccinimide, and trans-1,2-diaminocyclohexane-N′,N′,N′,N′-tetraacetic acid strongly. The inhibitory action of N-bromosuccinimide on enzyme confirmed the presence of one tryptophan residue in its substrate-binding site. Amino acid analysis for xylanase showed the presence of high amount of hydrophobic serine, glycine, threonine, and alanine residues. The N-terminal sequencing study for the previously purified and characterized 56 kDa xylanolytic amyloglucosidase reveal the presence of 33.30% identity with glucoamylase chain A from Aspergillus awamori. The N-terminal sequence analysis of the present 12 kDa enzyme showed highest similarity (72.22% identity) towards xylanase from Neurospora crassa.

9 citations

Proceedings ArticleDOI
26 Apr 2007
TL;DR: This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
Abstract: In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the sender's end to the receiver's end, in due course, from two transmitted images, at the receiver's end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.

9 citations


Authors

Showing all 581 results

NameH-indexPapersCitations
Debnath Bhattacharyya395786867
Samiran Mitra381985108
Dipankar Chakravorty353695288
S. Saha Ray342173888
Tai-hoon Kim335264974
Anindya Sen291093472
Ujjal Debnath293353828
Anirban Mukhopadhyay291693200
Avijit Ghosh281212639
Mrinal K. Ghosh26642243
Biswanath Bhunia23751466
Jayati Datta23551520
Nabarun Bhattacharyya231361960
Pinaki Bhattacharya191141193
Dwaipayan Sen18711086
Network Information
Related Institutions (5)
National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

87% related

Jadavpur University
27.6K papers, 422K citations

86% related

Indian Institute of Technology Guwahati
17.1K papers, 257.3K citations

86% related

Indian Institutes of Technology
40.1K papers, 652.9K citations

85% related

Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

85% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20227
2021110
202087
201992
201883
2017103