Shib Sankar Bhowmick, Indrajit Saha, U. Maulik, D. Bhattacharjee
{"title":"Identification of miRNA signature using Next-Generation Sequencing data of prostate cancer","authors":"Shib Sankar Bhowmick, Indrajit Saha, U. Maulik, D. Bhattacharjee","doi":"10.1109/RAIT.2016.7507956","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507956","url":null,"abstract":"MicroRNAs (miRNAs) are a class of ~22-nucleotide endogenous noncoding RNAs which have critical functions across various biological processes. It is quite well-known that the miRNAs are playing a crucial role for regulating the expression of target gene via repressing translation or promoting messenger RNAs degradation. Therefore, identification of discriminative and differentially expressed miRNA as a signature is an important task for cancer therapy. In this regard, Next-Generation Sequencing (NGS) data of miRNAs, available at The Cancer Research Atlas (TCGA) repository, is analyzed here for prostate cancer. This cancer type is a serious threat to the health of men as found in the literature. Hence, finding miRNA signature using NGS based miRNA expression data for prostate cancer is an important research direction. Generally by motivating this fact, a new miRNA signature identification method for prostate cancer is proposed. The proposed method uses a global optimization technique, called Simulated Annealing (SA), Principal Component Analysis (PCA) and Support Vector Machine (SVM) classifier. Here SA encodes L number of features, in this case miRNAs. Similar number of top L key principal components of the original dataset is extracted using PCA. Thereafter, such components are multiplied with the reduced subset of data so that the classification task can be done on diverse dataset using SVM. Here the classification accuracy of SVM is considered as an underlying objective to optimize using SA. The proposed method can be seen as feature section technique in order to find potential miRNA signature. Finally, the experimental results provide a set of miRNAs with optimal classification accuracy. However, due to the stochastic nature of this algorithm a list of miRNAs is prepared. From the top 15 miRNAs of that list, four miRNAs, hsa-mir-152, hsa-mir-23a, hsa-mir-302f and hsa-mir-101-1, are associated with prostate cancer. Moreover, the performance of the proposed method has also been compared with other widely used state-of-the-art techniques. Furthermore, the obtained results have been justified by means of statistical test along with biological significance tests for the selected miRNAs.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121142558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bibudhendu Pati, J. Sarkar, C. Panigrahi, R. Verma
{"title":"CQS: A Conflict-free Query Scheduling Approach in Wireless Sensor Networks","authors":"Bibudhendu Pati, J. Sarkar, C. Panigrahi, R. Verma","doi":"10.1109/RAIT.2016.7507867","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507867","url":null,"abstract":"Conflict-free real-time query scheduling is one of the difficult tasks in Wireless Sensor Networks (WSNs). To accommodate this claim, we propose a Conflict-free Query Scheduling Approach (CQS) in WSNs. CQS works with three new schedulers, a Non-preemptive Conflict-free Query Scheduler(NCQS), Pre-emptive Conflict-free Query Scheduler (PCQS), and Advanced Conflict-free Query Scheduler (ACQS). Our simulation results indicate that NCQS results in high real-time performance but response time is high for high priority queries due to priority inversion. Whereas, PCQS supports preemption which can reduce the priority inversion. ACQS combines the advantages of both NCQS and PCQS and enhances the adequacy admitting affair that is the end-to-end deadlines of queries. The simulation results also indicate better performance of our approach as compared to the existing approaches. The simulation results are validated through NS-2.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116586804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quad tree based algorithm for building of network model from road layers of vector maps","authors":"Shibumon Alampatta, A. RajeshM., N. Panigrahi","doi":"10.1109/RAIT.2016.7507967","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507967","url":null,"abstract":"Modeling of a graph corresponding to transport network from vector layers of a digital map is essential to carry out any sort of network analysis operations. In vector maps, feature objects in road layers are generally modeled as simple features which do not capture the connectivity information. This paper proposes a method for building a network/graph model from such road layers of a vector map. In this work a quad tree based algorithm for building of network is proposed, which offers a linear time complexity whereas the trivial method is quadratic in order of complexity.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131126173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New approach of authentication method based on profiles","authors":"R. Naidu, K. Meghana, P. S. Avadhani, I. Rao","doi":"10.1109/RAIT.2016.7507929","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507929","url":null,"abstract":"The exponential raise in traffic across network has obliged the need to distinguish unauthorized access. The process of identifying an individual usually based on a user name and password, which is the process of giving individuals access to system objects based on their identity. Authentication can involve highly complex and secure methods. This paper proposes an innovative algorithm based on neural networks and fuzzy logic that can be used for easy identification of unauthorized users in a network. The algorithm has been tested and validated and the results have been discussed. The result analysis shows that the algorithm is successful in intrusion detection.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127692174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved secure remote login protocol with three-factor authentication","authors":"Minu Tiwari, Soumyashree S. Panda, G. P. Biswas","doi":"10.1109/RAIT.2016.7507932","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507932","url":null,"abstract":"Design of a protocol for secure remote login to server(s) is essential, because it not only protects secret information of the users but also allows secure access to the authorized users. In this paper, an improved three-factor authenticated remote login scheme over earlier two recent ones is presented, where password, smartcard and user-biometric, which are user-known, possessed and inherited respectively, are incorporated. The proposed scheme comprises of three entities namely user-group, registration-center and server-group, and all communications among them are carried out with well security protection and thus, the requirement of secure channels as used in other schemes is avoided. In addition, the scheme is designed using existing cryptographic techniques including public-key encryption that made the scheme secure, however no PKI and/or public-key certificate is considered. An in-depth security analysis of the proposed scheme as well as a comparison with two existing methods are done, which confirm high security protection and improved performance, respectively.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127740637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified ACO to maintain diversity in regression test optimization","authors":"Sushant Kumar, P. Ranjan, R. Rajesh","doi":"10.1109/RAIT.2016.7507970","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507970","url":null,"abstract":"Regression testing is unavoidable maintenance activity that is performed several times in software development life cycle. Optimization of regression test case is required to minimize the test case (which will in-turn reduce the time and cost of testing) and to find the fault in early testing activity. The two widely used regression test case optimization techniques, namely, selection and prioritization are recently found to be integrated with different metaheuristic algorithms for fruitful regression test cases. Among the various meta-heuristic algorithms, Ant colony optimization (ACO) algorithm is most popularly used. ACO will try to find the smallest path out all the test cases and it is not sufficient because it will not cover all the test cases which are needed. In this paper we have proposed a modified ant colony optimization to solve test cases in huge search space. The modified algorithm selects the best test cases that find the maximum fault in minimum time.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-linear fractal analysis of ECG signal collected from Maternal and normal sinus women","authors":"M. Chakraborty, T. Das, D. Ghosh","doi":"10.1109/RAIT.2016.7507887","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507887","url":null,"abstract":"Studies suggest that electrocardiogram (ECG) recordings are chaotic in nature and for years they are being studied using various non-linear methods. These approaches can be applied to study the nonlinear properties of ECG signals from pregnant women, termed as Maternal ECG (MECG). For a better perspective of how the nonlinear properties of MECG signal is different from normal ECG we include normal sinus ECG signal collected from a group of women. In this study we apply four different non-linear methods, namely Rescaled Range analysis (R/S), Higuchi's Fractal Dimension analysis (HFD), Detrended Fluctuation Analysis (DFA) and Multifractal Detrended Fluctuation Analysis (MFDFA) method to characterize non-linearity of the maternal ECG signal. Comparing the results of these methods we find that all the methods successfully distinguishes different properties of the ECG signals, but MF-DFA method being a multi-scale method, separates MECG signal from normal group most accurately.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133239071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient fault tolerant barrier coverage using limited mobility wireless sensors","authors":"D. Dash","doi":"10.1109/RAIT.2016.7507866","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507866","url":null,"abstract":"Sensors are used for tracking objects, surveilling a region/territory, monitoring health and environmental parameters. Coverage problem in sensor network ensures monitoring a given region fully or partially. There are various definitions to measure the quality of coverage depending on its applications. Barrier coverage is a type of coverage, which ensures all paths that cross the boundary of a region intersect at least one sensor sensing region. The goal of the sensors is to detect intruders as they cross the boundary or as they penetrate a protected area. The sensors are dependent on their battery life. Repairing the barrier on sensor failure with minimum energy consumption is the major objective of this paper. A barrier coverage maintenance scheme is proposed to increase the robustness of the network. Barrier is maintained by finding existing alternate barrier or by recreating alternate barrier by moving existing sensors. Simulation results are discussed to evaluate the performance of our algorithm.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A dynamic microtask scheduling approach for SLO based human-augmented computing","authors":"K. Sinha, P. Majumder, G. Manjunath","doi":"10.1109/RAIT.2016.7507900","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507900","url":null,"abstract":"Current machine algorithms for qualitative analysis of unstructured data (in the form of social media posts, audio and video, among others) do not perform well and show low accuracies due to the need for human-like intelligence. However, machines are easily scalable, fast and the quality of their output is predictable. On the other hand, though humans are much better than machine algorithms at image and video analysis, natural language text and speech processing, they are unfortunately unpredictable, slower and can be erroneous or even malicious as computing agents. Therefore, a task execution engine which can enable human-augmented cloud computing by intelligently orchestrating machine and human computing resources would be able to provide richer and superior analytics on unstructured data than either of the two types of computing agents in isolation. We believe that a key aspect of enabling such analytics would be to provide guaranteed service level objectives, in terms of accuracy, time and budget In this paper, we present a microtask scheduler with integrated service level objectives (SLO) management. With this goal, we have introduced two new decision parameters: H-M ratio and microtask completion rate. An early prototype has been built and validated through simulation with actual performance data collected from anonymous crowd workers on Amazon Mechanical Turk. Machine computation was done using Hewlett Packard's Autonomy IDOL while ground truth was established through the use of known, expert workers. To the best of our knowledge, ours is the first work that attempts to simultaneously attempt to address the three SLO parameters of accuracy, budget and deadline for data-parallel microtasks.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115929129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An introduction towards automated parameterization reduction of soft set","authors":"T. Bakshi, A. Sinharay, T. Som","doi":"10.1109/RAIT.2016.7507895","DOIUrl":"https://doi.org/10.1109/RAIT.2016.7507895","url":null,"abstract":"In this paper, we introduce seven correlated algorithms for reduction of decision making parameters. This reduction framework is heuristic function based. The reduction of soft set decision parameters, those are collectively sufficient and individually necessary for keeping any special characteristic of a given information system. There has been very few works done on the algorithmic reduction techniques of decision parameter of soft set To the best of our knowledge, the computing complexities of available methods are of exponential order. We claim that our method is the first such kind of algorithms having polynomial time of computation. Illustrative example demonstrates the process elaborately.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}