Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Singh, Rampal
- Configurational Aspects of DNA, Histone and Reconstituted Nucleohistone before and after Gamma Irradiation
Abstract Views :260 |
PDF Views:1
Authors
Affiliations
1 Radiation Biology Division, Institute of Nuclear Medicine and Allied Sciences, Lucknow Road, Delhi 110007, IN
1 Radiation Biology Division, Institute of Nuclear Medicine and Allied Sciences, Lucknow Road, Delhi 110007, IN
Source
Journal of Surface Science and Technology, Vol 5, No 2 (1989), Pagination: 181-186Abstract
The absorption value for reconstituted DNH is less than that of DNA in the X-peak in the unirradiated state. For Y-peak, intensity of absorption is lower for DNA and those for H3-histone and reconstituted DNH am same. With increasing pH, hyperchromicity of H3-histone slowly increases indicating unfolding of peptide bonds with increasing pH. Consideration of Y/X ratio reveals that the degree of denaturation by gamma irradiation has been more for DNA as compared to reconstituted DNH for the same irradiation dose. Thus protection of DNA against radiation has been noted due to presence of H3-histone. Denaturation with radiation has been found to be more for DNH reconstituted after irradiation as compared to that of DNH reconstituted before irradiation.Keywords
DNA, Histone, Reconstituted DNH, Gamma Irradiation.- Interaction of 5-Hydroxy-L-Tryptophan with Deoxyribonucleic Acid and Nucleohistone
Abstract Views :170 |
PDF Views:1
Authors
Affiliations
1 Radiation Biology Department, Institute of Nuclear Medicine & Allied Sciences, Lucknow Road, Delhi-110054, IN
1 Radiation Biology Department, Institute of Nuclear Medicine & Allied Sciences, Lucknow Road, Delhi-110054, IN
Source
Journal of Surface Science and Technology, Vol 9, No 1-4 (1993), Pagination: 67-79Abstract
The binding of 5-hydroxy-L-tryptophan (HT), a radioprotector, with deoxyribonucleic acid (DNA) and deoxyribonucleohistone (DNH) in 2.5 × 10-4 MEDTA and 0.9% sodium chloride solutions takes place in the concentration ratio of (a) DNA : HT 25μg/ml : 20-25 μg/ml and (b) DNH : HT 25 μg/ml : 20-25 μg/ml. Analytical evidences show that the modes of binding are by (i) electrostatic interaction (ii) ion condensation (iii) staking and (iv) intercalation. The two solvents EDTA and 0.9% sodium chloride affect the degree of dissociation of DNA and DNH to different extent, and hence attachment mode of HT with these bioplaymers is decided by stereospecific accessibility. The functional groups responsible for binding are phenolic OH,(indole), (side chain of HT), phosphate groups and phosphodiester bond for DNA, and CONH group, lysine and arginine and chromophores like: -C=C-C=N and -C=C-C=O for DNH. The method of calculations of the binding has been given.Keywords
Binding Ratio Protector 5-Hydroxy-L-Tryptophan.- A Novel Blind Digital Watermarking Based on SVD and Extreme Learning Machine
Abstract Views :159 |
PDF Views:0
Authors
Affiliations
1 Computer Science Department, University of Delhi, Delhi, IN
2 Computer Science Department, DDUC, University of Delhi, Delhi, IN
3 Computer Science Department, BNC, University of Delhi, Delhi, IN
1 Computer Science Department, University of Delhi, Delhi, IN
2 Computer Science Department, DDUC, University of Delhi, Delhi, IN
3 Computer Science Department, BNC, University of Delhi, Delhi, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 160-167Abstract
Modification of media and illegal production is a big problem now a days because of free availability of digital media. Protection and securing the digital data is a challenge. An Integer Wavelet Transformation (IWT) domain based robust watermarking scheme with Singular Value Decomposition (SVD) and Extreme Learning Machine (ELM) have been proposed and tested on different images. In this proposed scheme, a watermark or logo is embedded in the IWT domain as ownership information with SVD and ELM is trained to learn the relationship between the original coefficient and the watermarked one. This trained ELM is used in the extraction process to extract the embedded logo from the image. Experimental results show that the proposed watermarking scheme is robust against various image attacks like Blurring, Noise, Cropping, Rotation, Sharpening etc. Performance analysis of proposed watermarking scheme is measured with Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER).Keywords
IWT, SVD, ELM, PSNR, BER.References
- S.P. Mohanty, "Digital Watermarking: A tutorial review," 1999.
- Piyu Tsai, Chia-Chen Lin Chin-Chen Chang, "SVD-based digital image watermarking scheme," Pattern Recognition Letters, 2005.
- R.Liu and T.Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Trans. Multimedia, 2002.
- D. V. S. Chandra, "Digital image watermarking using singular value decomposition," Proc. of the The 45th Midwest Symposium on Circuits and Systems (MWSCAS)., 2002.
- P Bao and X Ma, "Image adaptive watermarking using wavelet domain singular value decomposition," IEEE Trans. Circuits and Systems for Video Technology, 15, pp. 96-102, 2005.
- G.B.Huang, Q.Y.Zhu and C.K.Siew , "Extreme learning machine: theory and applications," Neuro computing, 70, pp. 489-501, 2006.
- A.W.Bojanczyk, et al. , "Wavelet transforms that map integers to integers.," Appl. Comput. Harmon. Anal., 5(3), pp. 332-369., 1998.
- M. Ramani, Dr. E. V Prasad, and Dr. S. Varadarajan, "Steganography Using BPCS the Integer Wavelet Transformed bnage," UCSNS International Journal of Computer Science and Network Security, 7(7), July 2007.
- S. Lee, C.D. Yoo and T. Kalker , "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security,2(3), pp. 321-330, Sep 2007.
- A.W. Bojanczyk, 0, "An accurate product SVD algorithm.," Signal Process., 25(2), pp. 189-201, 1991.
- L.L.Scharf, "The SVD and reduced rank signal processing.," Signal Process., 25(2), pp. 113-133, 1991.
- G-B. Huang, D-H. Wang and Y. Lan , "Extreme Learning Machine : A Survey," International Journal of Machine Learning and Cybernitics, 2, pp. 107-122, 2011.
- C.R.Rao and S.K.Mitra, "Generalized Inverse of Matrices and its Applications," Wiley, New York, 1971.
- G-B Huang, L. Chen L, C-K.Siew , "Extreme learning machine: a new learning scheme of Feedforward networks," , 2, Budapast, Hungary, 2004, pp. 985-990.
- P.L. Bartlett, "The sample complexity of patten classification with neural networks:The size of weights is more important than the size of the network," IEEE Trans. of Information Theory, 44, pp. 525-536, 2006.
- Huang G-B, Chen L, Siew C-K , "Universal approximation using incremental constructive feedforward networks with random hidden nodes.," IEEE Trans Neural Netw, 17(4), pp. 879-892, 2006.
- Jinkou Ding, Qiaoyan Wen, Xin Liao, Cuixiang Liu Ben Wang, "An Image Watermarking Algorithm Based On DWT DCT and SVD," Proceedings of IC-NIDC., 2009.