Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Veni, S.
- Role of RhTGF-β1 on Differentiation and Mineralization of Rat Bone Marrow Stem Cells
Abstract Views :180 |
PDF Views:0
Authors
Affiliations
1 Department of Endocrinology, Dr. ALM Post Graduate Institute of Basic Medical Sciences, University of Madras, Taramani Campus, Chennai-600113, IN
1 Department of Endocrinology, Dr. ALM Post Graduate Institute of Basic Medical Sciences, University of Madras, Taramani Campus, Chennai-600113, IN
Source
Journal of Endocrinology and Reproduction, Vol 7, No 1&2 (2003), Pagination: 72-72Abstract
Bone marrow is a complex tissue, which contains stem cells for haematopoietic and mesenchymal lineage. Among various growth factors that regulate bone remodeling, TGF-bl is the major growth fator, which is synthesized and stored in bone in large amount. But, the exact role of TGF-bl on the differentiation and mineralization of bone marrow stem cells (BMSCs) is still not clear. Hence, the present study is designed to delineate the role of rhTGF-bl on the differentiation and mineralization of rat BMSC in vitro. Bone marrow stem cells were isolated from the femur bones of healthy rats and cultured with osteogenic medium (OM).- Role of RhIGF-I on Differentiation and Mineralization of Rat Bone Marrow Stem Cells
Abstract Views :176 |
PDF Views:0
Authors
Affiliations
1 Department of Endocrinology, Dr. ALM Post Graduate Institute of Basic Medical Sciences, University of Madras, Taramani Campus, Chennai-600113, IN
1 Department of Endocrinology, Dr. ALM Post Graduate Institute of Basic Medical Sciences, University of Madras, Taramani Campus, Chennai-600113, IN
Source
Journal of Endocrinology and Reproduction, Vol 7, No 1&2 (2003), Pagination: 76-76Abstract
Bone marrow stem cells (BMSC) develop into pre-osteoblast, mature into osteoblast and attain sensitivity as osteocytes. Among the potential regulators of bone formation, insulin like growth factor-I (IGF-I) occupies an important position because of its ability to stimulate osteoblast proliferation and differentiation. Although, it is well known that osteoblasts are important target cell types, little is known about the effect of rhIGF-I on osteoprogenitors.- Influence of Signaling Protocols in MPLS-TE Performance
Abstract Views :154 |
PDF Views:4
Authors
Affiliations
1 Department of Computer Applications, Karpagam University, Coimbatore, IN
2 Department of Applications, Sona College of Technology, Salem, IN
3 Department of Computer Science, Karpagam University, Coimbatore, IN
1 Department of Computer Applications, Karpagam University, Coimbatore, IN
2 Department of Applications, Sona College of Technology, Salem, IN
3 Department of Computer Science, Karpagam University, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 2, No 3 (2010), Pagination: 76-79Abstract
Multiprotocol Label Switching (MPLS) is an Internet Engineering Task Force (IETF)-specified framework that provides for the designation, routing, forwarding and switching of traffic flows through the network. MPLS is a versatile solution to address the problems faced by present-day networks-speed, scalability, quality-of-service (QoS) management, and traffic engineering. Constraint-based Routing Label Distribution Protocol (CR-LDP) and Resource Reservation Protocol - Traffic Extension(RSVP-TE) are two label distribution protocols that provide support for Traffic Engineering. The operation of two protocols is different although the two protocols provide a similar level of service. The choice of signaling protocol is crucial for the success of MPLS performance.Keywords
CR-LDP, MPLS, QoS, RSVP-TE.- Social Ant based Sensitive Item Hiding with Optimal Side Effects for Data Publishing
Abstract Views :193 |
PDF Views:0
Authors
P. Tamil Selvan
1,
S. Veni
1
Affiliations
1 Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore - 641021, Tamil Nadu, IN
1 Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore - 641021, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 2 (2016), Pagination:Abstract
Background/Objectives: This paper proposes an Optimized Social Ant Based Sensitive Item Hiding (OSA-SIH) technique and expands the scope of quality privacy preservation for distributed data mining with optimal side effects on the original dataset. Methods/Statistical Analysis: in OSA-SIH technique, initially sensitive items for the given distributed dataset are evaluated using the social ant based relative item set distribution. Based on the evaluated dataset, optimal hiding of sensitive item is arrived with social ant based relative item set distribution even for larger item sets, ensuring time for optimal hiding. Next, sensitive item hiding is performed through multiplicative and transformational data perturbation. This data perturbation is based on socially cohesive relational rate between sensitive and non sensitive item sets, ensuring privacy preservation accuracy. The side effects on the modified dataset are checked for several users' requested item set distribution. Findings: The experimental results demonstrated that proposed technique out performed than the existing state of the art works in terms of privacy preservation accuracy, rate of side effects on the modified dataset, and time for optimal hiding. Improvement/Application: Experiments revealed that the proposed OSA-SIH techniqueKeywords
Perturbation, Privacy Preserving Data Mining, Social Ant, Sensitive Item Hiding, Transformational Data Perturbation, Multiplicative Data Perturbation- A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices – An Initial Prototype
Abstract Views :193 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore - 641021, Tamil Nadu, IN
1 Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore - 641021, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 9 (2016), Pagination:Abstract
Background/Objectives: Internet of Things (IoT) has made significant changes in the real world and penetrates all aspects of human life. The user acceptance of IoT is enormously high and its widespread usage is because of the availability of smart phones and tablets. Wide adoption of IoT in the applications of each field always collecting sensitive information and provide a larger surface for intruders. So privacy preserved authentication and access controls are big challenges in its research area. Methods/Statistical Analysis: In this paper we introduced a novel algorithm based on Zero Knowledge Protocol and Accumulated Hashing to provide secure authentication to sensor enabled mobile devices in IoT. Also for ensuring confidentiality in communication proposed a new method for key exchange using current time. Findings: The proposed method fulfills the requirements of resource and battery constrained mobile devices in IoT when compared with traditional authentication and access control mechanisms for other applications.Keywords
Authentication, Accumulated Hashing, Internet of Things, Mobile Security, Zero Knowledge Protocol- Improving Information Content in Compressed Sensing by Modifying the Random Re-Construction Matrices
Abstract Views :173 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore – 641112, Tamil Nadu, IN
2 Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore – 641112, Tamil Nadu
1 Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore – 641112, Tamil Nadu, IN
2 Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore – 641112, Tamil Nadu
Source
Indian Journal of Science and Technology, Vol 9, No 14 (2016), Pagination:Abstract
Background/Objectives: Compressed Sensing (CS) is an efficient sensing paradigm which guarantees reasonable reconstruction with less number of samples. We aim to increase the reconstruction quality of signals in CS. Methods/ Statistical Analysis: The behavior of random matrices is analyzed and an efficient method for improving the reconstruction quality is developed in CS based ECG reconstruction applications. The method is compared against Biorthogonal wavelet based approaches. Findings: Our analysis reveals that introduction of a modified column vector in the reconstruction matrix, which contains the sum of all columns of random matrix increases the reconstruction quality in CS applications. This idea was applied to different sparsifying domains and the results are very encouraging. We studied the effect of doing this on the singular values and both unitary matrices U and V. The first singular value (Σ) shot up making the condition number high, however there was not much change in the other singular values. The matrix U seems to remain random unitary matrix, where as matrix V has one value becoming unity in its rank space. Application/Improvements: Compared to wavelet based approaches the method shows reasonable improvement in Percentage Root Square Deviation (PRD).Keywords
Compressed Sensing, ECG, PRD, Singular Values, Splines- An Enhanced Approach for Performance Improvement using Hybrid Optimization Algorithm with K-means++ in a Virtualized Environment
Abstract Views :232 |
PDF Views:0
Authors
A. P. Nirmala
1,
S. Veni
2
Affiliations
1 New Horizon College of Engineering, Bangalore 560103, Karnataka, IN
2 Department of Computer Science, Karpagam University, Coimbatore − 641021, Tamil Nadu, IN
1 New Horizon College of Engineering, Bangalore 560103, Karnataka, IN
2 Department of Computer Science, Karpagam University, Coimbatore − 641021, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Virtualization plays a vital role in cloud computing. It provides better manageability, availability, optimistic provisioning, scalability and resource utilization in current cloud computing environments. However the performance issue is a major concern in virtualization. The performance of the application running inside the virtual machine gets affected by the interference of the co-virtual machines. This approach provides a novel task scheduling mechanism that allocates the suitable resources to virtual machines which are running in parallel. An interference prediction scheme is proposed to utilize characteristics that are collected when an application running on virtual machines to maintain less system overhead. Nelder-mead method is employed in prediction to create relationship model from the observed response and control variables. A hybrid algorithm: Ant Colony Optimization and Cuckoo search algorithm with K-means++ is adopted for task scheduling process. This approach shows effective improvements in terms of throughput and execution time.Keywords
Ant Colony Optimization, Cuckoo Search, K-means++ Algorithm, Performance Interference, Throughput, Virtualization.- Machine Learning Algorithm for Fintech Innovation in Blockchain Applications
Abstract Views :27 |
PDF Views:1
Authors
Affiliations
1 Department of Management Studies, Kalasalingam Academy of Research and Education, IN
2 PG and Research Department of Commerce, Pasumpon Muthuramalinga Thevar College, IN
1 Department of Management Studies, Kalasalingam Academy of Research and Education, IN
2 PG and Research Department of Commerce, Pasumpon Muthuramalinga Thevar College, IN
Source
ICTACT Journal on Soft Computing, Vol 14, No 1 (2023), Pagination: 3165-3172Abstract
The rapid growth of Fintech innovation and the widespread adoption of blockchain technologies have indeed had a transformative impact on the financial industry. In this paper, the focus is on the application of machine learning algorithms, specifically the Random Forest Regression algorithm, within the context of Fintech and blockchain. This research contributes to the advancement of machine learning techniques in the field of Fintech and blockchain. The Random Forest Regression algorithm utilizes ensemble learning, combining multiple decision trees to analyze complex financial data and make predictions on various outcomes. This algorithm has proven to be effective in addressing key challenges within the industry, such as predicting loan defaults, detecting fraud, and assessing risks. Through experimental evaluations and case studies, the paper demonstrates the effectiveness of the Random Forest Regression algorithm in enhancing Fintech innovation in blockchain applications. The algorithm improved accuracy, scalability, and interpretability enable financial institutions to make data-driven decisions and optimize their operations.Keywords
Fintech, Blockchain, Innovations, Random Forest Regression, Machine Learning, Industry.References
- N. Mirza and M. Metawa, “Safeguarding FinTech innovations with Machine Learning: Comparative Assessment of Various Approaches”, Proceedings of International Conference on Research in International Business and Finance, pp. 102009-102015, 2023.
- C. Cai, M. Marrone and M. Linnenluecke, “Trends in Fintech Research and Practice: Examining the Intersection with the Information Systems Field”, Communications of the Association for Information Systems, Vol. 50, No. 1, pp. 40-49, 2022.
- M.R. Rabbani and M. Atif, “Machine Learning-based P2P Lending Islamic Fintech Model for Small and Medium Enterprises in Bahrain”, International Journal of Business Innovation and Research, Vol. 30, No. 4, pp. 565-579, 2023.
- Y. Zihan and T. Yinwen, “The Development and Impact of FinTech in the Digital Economy”, Economics, Vol. 12, No. 1, pp. 24-31, 2023.
- J.R. Bhat and M. Nekovee, “FinTech Enablers, Use Cases, and Role of Future Internet of Things”, Journal of King Saud University-Computer and Information Sciences, Vol. 35, No. 1, pp. 87-101, 2023.
- F. Shah, R. Alroobaea and S.S. Ullah, “Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems”, Security and Communication Networks, Vol. 2022, pp. 1-10, 2022.
- A. Bhandari and F. Kamalov, “Machine Learning and Blockchain Integration for Security Applications”, River Publishers, 2022.
- S. Khan and M.R. Rabbani, “In-Depth Analysis of Blockchain, Cryptocurrency and Sharia Compliance”, International Journal of Business Innovation and Research, Vol. 29, No. 1, pp. 1-15, 2022.
- C. Dang, H. Zhang and Y. Qian, “Evaluating and Forecasting the Risks of Small to Medium-Sized Enterprises in the Supply Chain Finance Market using Blockchain Technology and Deep Learning Model”, Operations Management Research, Vol. 15, No. 3-4, pp. 662-675, 2022.
- M. Swan and Y. Shynkevich, “Blockchain Technology and its Potential Impact on the Financial Services Industry”, Proceedings of International Conference on Business Excellence, pp. 457-466, 2015.
- J. Lee, Y. Park and S. Yoon, “Fintech and Blockchain: Challenges and opportunities”, Proceedings of International Conference on Management Science and Engineering, pp. 74-79, 2018.
- M. Crosby, “Blockchain for Financial Services: A Review”, Proceedings of the IEEE International Conference on Internet of Things, pp. 907-914, 2019.
- S. Hassan, “Blockchain in Fintech: A comprehensive Review”, Journal of Financial Innovation, Vol. 5, No. 1, pp. 1-27, 2019.
- M. Swan, “Decentralized Applications: Harnessing Bitcoin Blockchain Technology”, O'Reilly Media, 2015.
- T. Aste, “Blockchain Technology in Finance: Opportunities and Challenges”, Journal of Industrial Information Integration, Vol. 18, pp. 100127-100135, 2020.
- A.E. Maas and C. Heipke, “A Label Noise Tolerant Random Forest for the Classification of Remote Sensing Data based on Outdated Maps for Training”, Computer Vision and Image Understanding, Vol. 188, pp. 102782-102789, 2019.
- D.F.T. Machado, N. Curi and M.D.D. Menezes, “Soil Type Spatial Prediction from Random Forest: Different Training Datasets, Transferability, Accuracy and Uncertainty Assessment”, Scientia Agricola, Vol. 76, pp. 243-254, 2019.
- P. Liu and B. Liu, “Flat Random Forest: A New Ensemble Learning Method Towards Better Training Efficiency and Adaptive Model Size to Deep Forest”, International Journal of Machine Learning and Cybernetics, Vol. 11, pp. 2501-2513, 2020.
- L. Gigovic, H.R. Pourghasemi, S. Drobnjak and S. Bai, “Testing A New Ensemble Model based on SVM and Random Forest in Forest Fire Susceptibility Assessment and its Mapping in Serbia’s Tara National Park”, Forests, Vol. 10, No. 5, pp. 408-413, 2019.
- H.I. Kim and B.H. Kim, “Flood Hazard Rating Prediction for Urban Areas using Random Forest and LSTM”, KSCE Journal of Civil Engineering, Vol. 24, No. 12, pp. 3884-3896, 2020.
- Y. Sun, G.G. Yen and M. Zhang, “Surrogate-Assisted Evolutionary Deep Learning using An End-to-End Random Forest-based Performance Predictor”, IEEE Transactions on Evolutionary Computation, Vol. 24, No. 2, pp. 350-364, 2019.
- X. Li and L. Wu, “Building Auto-Encoder Intrusion Detection System based on Random Forest Feature Selection”, Computers and Security, Vol. 95, pp. 101851-101857, 2020.
- B.T. Pham, K. Parial, K. Singh and I. Prakash, “Ensemble Modeling of Landslide Susceptibility using Random Subspace Learner and Different Decision Tree Classifiers”, Geocarto International, Vol. 37, No. 3, pp. 735-757, 2022.
- G. Babaei and E. Raffinetti, “Explainable Fintech Lending”, Journal of Economics and Business, Vol. 45, pp. 106126-106134, 2023.