scispace - formally typeset
Search or ask a question

Showing papers by "Jaypee Institute of Information Technology published in 2017"


Journal ArticleDOI
TL;DR: A novel metaheuristic method (CSK) which is based on K-means and cuckoo search which is used to find the optimum cluster-heads from the sentimental contents of Twitter dataset is proposed.
Abstract: A hybrid cuckoo search method (CSK) has been presented for Twitter sentiment analysis.CSK modifies the random initialization of population in cuckoo search (CS) by K-means to resolve the problem of random initialization.The proposed algorithm has outperformed five popular algorithms.The statistical analysis has been done to validate the performance of the proposed algorithm. Sentiment analysis is one of the prominent fields of data mining that deals with the identification and analysis of sentimental contents generally available at social media. Twitter is one of such social medias used by many users about some topics in the form of tweets. These tweets can be analyzed to find the viewpoints and sentiments of the users by using clustering-based methods. However, due to the subjective nature of the Twitter datasets, metaheuristic-based clustering methods outperforms the traditional methods for sentiment analysis. Therefore, this paper proposes a novel metaheuristic method (CSK) which is based on K-means and cuckoo search. The proposed method has been used to find the optimum cluster-heads from the sentimental contents of Twitter dataset. The efficacy of proposed method has been tested on different Twitter datasets and compared with particle swarm optimization, differential evolution, cuckoo search, improved cuckoo search, gauss-based cuckoo search, and two n-grams methods. Experimental results and statistical analysis validate that the proposed method outperforms the existing methods. The proposed method has theoretical implications for the future research to analyze the data generated through social networks/medias. This method has also very generalized practical implications for designing a system that can provide conclusive reviews on any social issues.

253 citations


Journal ArticleDOI
TL;DR: An augmented Shuffled Frog Leaping Algorithm (ASFLA) based technique for resource provisioning and workflow scheduling in the Infrastructure as a service (IaaS) cloud environment is presented and outperforms Particle Swarm Optimization and SFLA.

107 citations


Journal ArticleDOI
18 Jun 2017-Quanta
TL;DR: This work reviews the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications, and highlights the need to understand more fully the role of quantum entanglement in everyday life.
Abstract: Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications. Quanta 2017; 6: 1–47.

96 citations


Journal ArticleDOI
01 Mar 2017
TL;DR: Grey Wolf Optimizer (GWO), which is a population based meta-heuristic inspired by the leadership hierarchy and hunting mechanism of grey wolves has been utilized for feature selection and demonstrates that the proposed method performs significantly better than other methods selecting relevant genes for high-dimensional, multi-category cancer diagnosis with an average of 12.82% improvement in F-score value.
Abstract: This is a novel effort towards effective characterization of cervix lesions from CECT images.Two different approaches have been adopted for designing multi-objective binary GWO algorithms.For the utilized cases, Non-dominated Sorting based GWO dominates the other meta-heuristics based methods compared with.Cervix lesions are up to 91.1% accurately classified as benign and malignant with only five features selected by NSGWO.Efficiency of NSGWO is further verified on high-dimensional microarray gene expression datasets available online. Cervical cancer is one of the vital and most frequent cancers, but can be cured effectively if diagnosed in the early stage. This is a novel effort towards effective characterization of cervix lesions from contrast enhanced CT-Scan images to provide a reliable and objective discrimination between benign and malignant lesions. Performance of such classification models mostly depends on features used to represent samples in a training dataset. Selection of optimal feature subset here is NP-hard; where, randomized algorithms do better. In this paper, Grey Wolf Optimizer (GWO), which is a population based meta-heuristic inspired by the leadership hierarchy and hunting mechanism of grey wolves has been utilized for feature selection. The traditional GWO is applicable for continuous single objective optimization problems. Since, feature selection is inherently multi-objective; this paper proposes two different approaches for multi-objective binary GWO algorithms. One is a scalarized approach to multi-objective GWO (MOGWO) and the other is a Non-dominated Sorting based GWO (NSGWO). These are used for wrapper based feature selection that selects optimal textural feature subset for improved classification of cervix lesions. For experiments, contrast enhanced CT-Scan (CECT) images of 62 patients have been used, where all lesions had been recommended for surgical biopsy by specialist. Gray-level co-occurrence matrix based texture features are extracted from two-level decomposition of wavelet coefficients of cervix regions extracted from CECT images. The results of proposed approaches are compared with mostly used meta-heuristics such as genetic algorithm (GA) and firefly algorithm (FA) for multi-objective optimization. With better diversification and intensification, GWO obtains Pareto solutions, which dominate the solutions obtained by GA and FA when assessed on the utilized cervix lesion cases. Cervix lesions are up to 91% accurately classified as benign and malignant with only five features selected by NSGWO. A two-tailed t-test was conducted by hypothesizing the mean F-score obtained by the proposed NSGWO method at significance level=0.05. This confirms that NSGWO performs significantly better than other methods for the real cervix lesion dataset in hand. Further experiments were conducted on high dimensional microarray gene expression datasets collected online. The results demonstrate that the proposed method performs significantly better than other methods selecting relevant genes for high-dimensional, multi-category cancer diagnosis with an average of 12.82% improvement in F-score value.

88 citations


Journal ArticleDOI
TL;DR: The simulation analysis approach results shows that hybrid approach offers better performance by improving accuracy and minimizing the RMS error in comparison with the state-of-the-art techniques in the similar context.

85 citations


Journal ArticleDOI
TL;DR: In this paper, an explicit quantum circuit is designed for the teleportation of an n-qubit quantum state, and the experimental results show that the state has been teleported with high fidelity.
Abstract: An explicit scheme (quantum circuit) is designed for the teleportation of an n-qubit quantum state. It is established that the proposed scheme requires an optimal amount of quantum resources, whereas larger amount of quantum resources have been used in a large number of recently reported teleportation schemes for the quantum states which can be viewed as special cases of the general n-qubit state considered here. A trade-off between our knowledge about the quantum state to be teleported and the amount of quantum resources required for the same is observed. A proof-of-principle experimental realization of the proposed scheme (for a 2-qubit state) is also performed using 5-qubit superconductivity-based IBM quantum computer. The experimental results show that the state has been teleported with high fidelity. Relevance of the proposed teleportation scheme has also been discussed in the context of controlled, bidirectional, and bidirectional controlled state teleportation.

78 citations


Journal ArticleDOI
TL;DR: In this article, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semiQuantum protocols for controlled DSC and dialogue can be reduced to semiquantum protocol for e-commerce and private comparison (socialist millionaire problem), respectively.
Abstract: Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

77 citations


Journal ArticleDOI
TL;DR: It is demonstrated that a crucial link exists between the ER stress pathways and autophagy in virus-infected cells, and that these processes are highly regulated during virus infection.
Abstract: Endoplasmic reticulum (ER) stress and autophagy are key cellular responses to RNA virus infection Recent studies have shown that Japanese encephalitis virus (JEV)-induced autophagy negatively influences virus replication in mouse neuronal cells and embryonic fibroblasts, and delays virus-induced cell death Here, we evaluated the role of ER stress pathways in inducing autophagy during JEV infection We observed that JEV infection of neuronal cells led to activation of all three sensors of ER stress mediated by eIF2α/PERK, IRE1/XBP1 and ATF6 The kinetics of autophagy induction as monitored by levels of SQSTM1 and LC3-II paralleled activation of ER stress Inhibition of the eIF2α/PERK pathway by siRNA-mediated depletion of proteins and by the PERK inhibitor had no effect on autophagy and JEV replication However, depletion of XBP1 and ATF6, alone or in combination, prevented autophagy induction and significantly enhanced JEV-induced cell death JEV-infected cells depleted of XBP1 or ATF6 showed reduced transcription of ER chaperones, ERAD components and autophagy genes, resulting in reduced protein levels of the crucial autophagy effectors ATG3 and BECLIN-1 Conversely, pharmacological induction of ER stress in JEV-infected cells further enhanced autophagy and reduced virus titres Our study thus demonstrates that a crucial link exists between the ER stress pathways and autophagy in virus-infected cells, and that these processes are highly regulated during virus infection

72 citations


Journal ArticleDOI
TL;DR: In this paper, the effect of Gd 3+ substitution on different properties of nanocrystalline CoFe 2 O 4 has been studied and the formation of single phase cubic mixed spinel structure has been confirmed.

70 citations


Journal ArticleDOI
TL;DR: In this paper, the authors reported the synthesis of nanoparticles of Mn 2+ doped Mg 0.5 Zn and Fe 2 O 4 using co-precipitation route for hyperthermia applications.

68 citations


Journal ArticleDOI
TL;DR: Simulation results and theoretical analysis prove that proposed algorithm outperforms the traditional DV-Hop algorithm in terms of localization error and power consumption.

Journal ArticleDOI
TL;DR: Two new protocols for quantum binary voting are proposed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles.
Abstract: Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

Journal ArticleDOI
TL;DR: In this article, superparamagnetic nanoparticles of Mn 0.5 Zn and Fe 2.5 Gd x Fe 2-x O 4 (x ǫ = 0, 0.025, 0., 0.050, 0,075, and 0.1) ferrites have been prepared by co-precipitation method, and a cation distribution has been proposed for the determination of various important theoretical parameters.

Journal ArticleDOI
TL;DR: A conceptual model for the adoption for two types of mobile apps i.e. utilitarian and hedonic is proposed and the mechanism behind the continuous usage of the app after its adoption is explained.

Journal ArticleDOI
TL;DR: Categorization of existing streaming data classification algorithms along with their ability to solve concept drift problem in classification of streaming data is presented and comparison of various tools available for simulating such problemsAlong with their limitations are presented.

Journal ArticleDOI
TL;DR: It is observed that the time-varying nature of the RF link and imperfect CSI at the relay significantly degrades the end-to-end performance of the system.
Abstract: This paper investigates a decode-and-forward-based asymmetric dual-hop mixed radio-frequency/free-space optical (RF/FSO) communication link. We consider a moving source user equipment (UE) that communicates with the relay over an RF link and the relay communicates with the serving base station (eNodeB) over an FSO link, assuming there is no direct link between the UE and eNodeB. It is assumed that the source-to-relay link experiences time-selective Rayleigh fading, that arises due to the UE mobility and the relay-destination link is affected by the optical channel impairments, including path loss, atmospheric turbulence, and pointing errors. As the FSO link has a higher data rate in comparison to the RF link, we employ multiple-input multiple-output with zero-forcing (ZF) based linear receiver in the source-to-relay link, in order to enhance the RF link data rate without increasing the transmit power and bandwidth requirements. Moreover, we assume that the relay node has imperfect channel state information (CSI) for the ZF decoding. For the considered system and channel models, novel closed-form expressions for the per-frame average outage probability, bit error rate, and ergodic capacity are derived and verified using Monte Carlo simulations. Additionally, asymptotic floors for the system outage and error probabilities are derived. It is observed that the time-varying nature of the RF link and imperfect CSI at the relay significantly degrades the end-to-end performance of the system.

Journal ArticleDOI
TL;DR: In this paper, a notion of asymmetric quantum dialogue (AQD) is introduced, where the entangled state to be used and the encoding scheme to be shared between Alice and Bob depend on the amount of classical information they want to exchange with each other.
Abstract: A notion of asymmetric quantum dialogue (AQD) is introduced. Conventional protocols of quantum dialogue are essentially symmetric as the users (Alice and Bob) can encode the same amount of classical information. In contrast, the proposed scheme for AQD provides different amount of communication powers to Alice and Bob. The proposed scheme offers an architecture, where the entangled state to be used and the encoding scheme to be shared between Alice and Bob depend on the amount of classical information they want to exchange with each other. The general structure for the AQD scheme has been obtained using a group theoretic structure of the operators introduced in Shukla et al. (Phys Lett A 377:518, 2013). The effect of different types of noises (e.g., amplitude damping and phase damping noise) on the proposed scheme is investigated, and it is shown that the proposed scheme for AQD is robust and it uses an optimized amount of quantum resources.

Journal ArticleDOI
TL;DR: In this article, Gupta et al. showed that the Bell state can be constructed and measured in a nondestructive manner with a reasonably high fidelity with a comparison of the outcomes of this study and the results obtained earlier in an NMR-based experiment.

Journal ArticleDOI
TL;DR: The theoretical concepts and models of employability are explored to ascertain gaps between the knowledge and skills imparted by academia, as well asknowledge and skills considered as important by employers while hiring.

Journal ArticleDOI
TL;DR: In this paper, a three-party scheme for secure quantum communication, namely controlled quantum dialogue (CQD), was analyzed under the influence of non-Markovian channels.
Abstract: A three-party scheme for secure quantum communication, namely controlled quantum dialogue (CQD), is analyzed under the influence of non-Markovian channels. By comparing with the corresponding Markovian cases, it is seen that the average fidelity can be maintained for relatively longer periods of time. Interestingly, a number of facets of quantum cryptography, such as quantum secure direct communication, deterministic secure quantum communication and their controlled counterparts, quantum dialogue, quantum key distribution, quantum key agreement, can be reduced from the CQD scheme. Therefore, the CQD scheme is analyzed under the influence of damping, dephasing and depolarizing non-Markovian channels, and subsequently, the effect of these non-Markovian channels on the other schemes of secure quantum communication is deduced from the results obtained for CQD. The damped non-Markovian channel causes a periodic revival in the fidelity, while fidelity is observed to be sustained under the influence of the dephasing non-Markovian channel.

Journal ArticleDOI
TL;DR: In this article, the authors considered the study of electrically conducting alumina-water nanofluid flow induced by horizontal shrinking cylinder under the effect of velocity and thermal slip at the surface.

Journal ArticleDOI
TL;DR: The paper provides the earliest evidences of behavioural anomalies reported by researchers in the stock markets and throws light on the significance of behavioural finance and its unique position in bridging the gaps between real life situations and traditional theories.


Journal ArticleDOI
TL;DR: In this article, the influence of pertinent parameters such as the Lewis number, aspect ratio, thermal Rayleigh number and the concentration Rayleigh numbers on the flow, heat transfer and Nusselt number are illustrated graphically and discussed.

Journal ArticleDOI
TL;DR: In this article, a hierarchical version of the joint remote state preparation (JRSP) protocol is proposed, where two senders can jointly and remotely prepare a quantum state at the receiver's port.
Abstract: A novel scheme for quantum communication having substantial applications in practical life is designed and analyzed. Specifically, we have proposed a hierarchical counterpart of the joint remote state preparation (JRSP) protocol, where two senders can jointly and remotely prepare a quantum state. One sender has the information regarding amplitude, while the other one has the phase information of a quantum state to be jointly prepared at the receiver's port. However, there exists a hierarchy among the receivers, as far as powers to reconstruct the quantum state are concerned. A 5-qubit cluster state has been used here to perform the task. Further, it is established that the proposed scheme for hierarchical JRSP (HJRSP) is of enormous practical importance in critical situations involving defense and other sectors, where it is essential to ensure that an important decision/order that can severely affect a society or an organization is not taken by a single person, and once the order is issued, all the receivers do not possess an equal right to implement it. Further, the effect of different noise models (e.g., amplitude damping (AD), phase damping (PD), collective noise and Pauli noise models) on the HJRSP protocol proposed here is investigated. It is found that in AD and PD noise models a higher-power agent can reconstruct the quantum state to be remotely prepared with higher fidelity than that done by the lower-power agent(s). In contrast, the opposite may happen in the presence of collective noise models. We have also proposed a scheme for probabilistic HJRSP using a non-maximally entangled 5-qubit cluster state.

Proceedings ArticleDOI
01 Jan 2017
TL;DR: It is observed empirically that the proposed ensemble learning approach “BBS method” gives better accuracy with lower root mean square error rate using the technique of ensemble learning.
Abstract: In this research work, we have proposed a novel ensemble learning approach “BBS method” which stands for Bagging, Boosting and Stacking with appropriate base classifiers for the classification of the five UCI datasets taken from the field of Bioinformatics. Experiments are conducted using Weka and Java Eclipse and it has been observed empirically that our approach gives better accuracy with lower root mean square error rate using the technique of ensemble learning. Henceforth we conclude that our proposed ensemble learning method is more suitable in handling the classification problem in the bioinformatics domain. Such approaches can be efficiently used in related real-life scenarios of classification domain.

Journal ArticleDOI
TL;DR: This study proposes a hybrid artificial bee colony approach integrated with k-nearest neighbors to identify and segregate buzz in Twitter using the proposed hybrid bio-inspired approach.
Abstract: The exponential growth in the use of social media has not only impacted the way individuals communicate and interact but has also opened new avenues for various domains including health care, marketing, e-commerce, e-governance and politics to name a few. It has been further seen that such engagements result in huge amount of user-generated content (UGC) from both individuals and organizations combined. This UGC can be analyzed in multiple ways to mine useful information. One such popular domain that uses this information is content buzz/popularity. The content shared on social media platforms becomes popular and subsequently viral when shared and propagated by a larger audience at a faster pace. Organizations are leveraging this power of social media in the domain of content buzz and virality by employing various buzz monitoring techniques to boost the reach of their content. This study thus proposes a hybrid artificial bee colony approach integrated with k-nearest neighbors to identify and segregate buzz in Twitter. A set of metrics comprising of created discussions, increase in authors, attention level, burstiness level, contribution sparseness, author interaction, author count and average length of discussions are used to model the buzz. The proposed approach considers the buzz discussions as outliers deviating from the normal discussions and identifies the same using the proposed hybrid bio-inspired approach. Findings may be useful in domains like e-commerce, digital and influencer marketing to explore the factors that might create buzz along with the difference between the impact of buzz and normal discussions on the consumers.

Journal ArticleDOI
TL;DR: In this paper, the authors compared the nonclassical properties of photon added and subtracted squeezed coherent states with specific focus on the higher-order non-classicalities, such as higher order squeezing, higher order sub-Poissonian photon statistics, and higher order antibunching.

Journal ArticleDOI
TL;DR: In this article, a secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement, in which the set of all bidders is grouped into l subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all subsets, while any other bidder is part of only a single subset.
Abstract: A feasible, secure and collusion attack-free quantum sealed-bid auction protocol is proposed using a modified scheme for multiparty circular quantum key agreement. In the proposed protocol, the set of all (n) bidders is grouped into l subsets (sub-circles) in such a way that only the initiator (who prepares the quantum state to be distributed for a particular round of communication and acts as the receiver in that round) is a member of all the subsets (sub-circles) prepared for a particular round, while any other bidder is part of only a single subset. All n bidders and auctioneer initiate one round of communication, and each of them prepares l copies of a $$\left( r-1\right) $$r-1-partite entangled state (one for each sub-circle), where $$r=\frac{n}{l}+1$$r=nl+1. The efficiency and security of the proposed protocol are critically analyzed. It is shown that the proposed protocol is free from the collusion attacks that are possible on the existing schemes of quantum sealed-bid auction. Further, it is observed that the security against collusion attack increases with the increase in l, but that reduces the complexity (number of entangled qubits in each entangled state) of the entangled states to be used and that makes the scheme scalable and implementable with the available technologies. The additional security and scalability are shown to arise due to the use of a circular structure in place of a complete-graph or tree-type structure used earlier.

Journal ArticleDOI
TL;DR: The findings concluded that S. cumini MSE SmSNPs significantly suppress the glucose-induced cardiac stress in vitro by maintaining the cellular integrity and reducing the oxidative damages therefore establishing its therapeutic potential in diabetic cardiomyopathy.
Abstract: There exists a complex and multifactorial relationship between diabetes and cardiovascular disease. Hyperglycemia is an important factor imposing damage (glucose toxicity) on cardiac cell leading to diabetic cardiomyopathy. There are substantial clinical evidences on the adverse effects of conventional therapies in the prevention/treatment of diabetic cardiovascular complications. Currently, green-synthesized nanoparticles have emerged as a safe, efficient, and inexpensive alternative for therapeutic uses. The present study discloses the silver nanoparticle biosynthesizing capability and cardioprotective potential of Syzygium cumini seeds already reported to have antidiabetic properties. Newly generated silver nanoparticles S. cumini MSE silver nanoparticles (SmSNPs) were characterized by UV-visible spectroscopy, scanning electron microscopy (SEM), zeta sizer, X-ray diffraction (XRD), and Fourier transform infrared (FTIR) spectroscopy. Using methanolic extract of S. cumini seeds, an average size of 40–100-nm nanoparticles with 43.02 nm and −19.6 mV zeta potential were synthesized. The crystalline nature of SmSNPs was identified by using XRD. 2,2-Diphenyl-1-picrylhydrazyl (DPPH) and 2,2′-azino-bis(3-ethylbenzthiazoline-6-sulfonic acid (ABTS) assays revealed the antioxidative potential to be 66.87 (±0.7) % and 86.07 (±0.92) % compared to 60.29 (±0.02) % and 85.67 (±1.27) % for S. cumini MSE. In vitro study on glucose-stressed H9C2 cardiac cells showed restoration in cell size, nuclear morphology, and lipid peroxide formation upon treatment of SmSNPs. Our findings concluded that S. cumini MSE SmSNPs significantly suppress the glucose-induced cardiac stress in vitro by maintaining the cellular integrity and reducing the oxidative damages therefore establishing its therapeutic potential in diabetic cardiomyopathy.