27 results on '"Juby, Mathew"'
Search Results
2. Mutations in ARSB in MPS VI patients in India
- Author
-
Juby Mathew, Sujatha M. Jagadeesh, Meenakshi Bhat, S. Udhaya Kumar, Saravanamuthu Thiyagarajan, and Sudha Srinivasan
- Subjects
Mucopolysaccharidosis VI (MPS VI) ,Maroteaux–Lamy syndrome ,Arylsulfatase B (ARSB) ,Inborn error of metabolism (IEM) ,Lysosomal storage disorder (LSD) ,Lysosomal enzyme ,Mutations ,India ,Active site ,Medicine (General) ,R5-920 ,Biology (General) ,QH301-705.5 - Abstract
Mucopolysaccharidosis VI (MPS VI) is an autosomal recessive inborn error of metabolism caused by mutations in the arylsulfatase B gene (ARSB) and consequent deficient activity of ARSB, a lysosomal enzyme. We present here the results of a study undertaken to identify the mutations in ARSB in MPS VI patients in India. Around 160 ARSB mutations, of which just 4 are from India, have been reported in the literature. Our study covered nine MPS VI patients from eight families. Both familial mutations were found in seven families, and only one mutation was found in one family. Seven mutations were found — four novel (p.G38_G40del3, p.C91R, p.L98R and p.R315P), two previously reported from India (p.D53N and p.W450C), and one reported from outside India (p.R160Q). One mutation, p.W450C, was present in two families, and the other six mutations were present in one family each. Analysis of the molecular structure of the enzyme revealed that most of these mutations either cause loss of an active site residue or destabilize the structure of the enzyme. The only previous study on mutations in ARSB in Indian MPS VI patients, by Kantaputra et al. 2014 [1], reported four novel mutations of which two (p.D53N and p.W450C) were found in our study as well. Till date, nine mutations have been reported from India, through our study and the Kantaputra study. Eight out of these nine mutations have been found only in India. This suggests that the population studied by us might have its own typical set of mutations, with other populations equally likely to have their own set of mutations.
- Published
- 2015
- Full Text
- View/download PDF
3. A Comparative Study Of Different Classification Algorithms For The Prediction Of Fake Reviews
- Author
-
Jilse Jacob and Dr. Juby Mathew
- Subjects
feature engineering ,supervised machine learning ,data mining ,Fake reviews - Abstract
— In this paper, ML strategy for detecting phoney reviews is proposed. Using a range of feature engineering methodologies, this paper extends beyond the review's feature extraction technique to identify various examiner behaviours. The paper compares and contrasts the outcomes of various programmes. We compared the effectiveness of several classifiers in both cases using an actual dataset of restaurant ratings with and without factors derived from the user's activitiesWhen it comes to the f-score, the remaining classifiers have the highest f-score of 74.79 percent. According to the results. The f-score has grown by 14.14 percent after factoring behavioural characteristics of the reviewers.
- Published
- 2022
- Full Text
- View/download PDF
4. Virtual Environment Using Metaverse
- Author
-
Jobin Joseph and Dr. Juby Mathew
- Subjects
Virtual reality, Augmented reality, 3D Modeling, Artificial intelligence, metaverse, cyber world, avatar, extended reality - Abstract
— In today's web context, where participation and collaboration are the foundation for the development of common knowledge, the usage of Metaverses as a platform for human interaction is a worldwide trend. It's a virtual or augmented reality universe that allows you to create virtual social interactions. Neal Stephenson coined the term "metaverse" in his 1992 science fiction novel "Snow Crash," which envisioned lifelike avatars meeting in realistic 3D buildings and other virtual reality scenarios. However, the term "metaverse" was coined by Facebook, now known as Meta, to define its goal of working and playing in a virtual environment. Metaverse is all about 3D models and virtually created environment. In this paper I am going to discuss about sample implementation of metaverse by building an application based on augmented reality. It is an android application which is developed with unity framework.  
- Published
- 2022
- Full Text
- View/download PDF
5. HYPOTHETICAL FEASIBILITY OF USING STRESS BIOMETRICS IN STUDENTS WITH CORTICAL VISUAL IMPAIRMENT
- Author
-
Victor M. Pedro, Elena Oggero, Juby Mathew, and Vestibular Technologies, Llc, Cheyenne, Wy, Usa
- Subjects
medicine.medical_specialty ,Biometrics ,Stress (linguistics) ,medicine ,Cortical visual impairment ,Audiology ,Psychology ,medicine.disease - Abstract
Cortical Visual Impairment (CVI) is resultant from neurological injury and damage to visual pathways or vision centers in the brain. CVI is sometimes undiagnosed in individuals with brain injuries due to the complexity of the human visual system. The International Institute for the Brain (iBrain) is a specialized school for students ages 5 to 21 who have a brain disorder or an acquired brain injury. They often present with noticeable CVI. While there are various metrics and interventions for the pediatric population, the adequacy has been lacking in terms of the vulnerability of this non-verbal population. Assessing the safety and effectiveness of rehabilitative interventions for this fragile student population can be challenging as most traditional metrics cannot be used. In this methodological review paper, available metrics were investigated and their applicability for this specific population is discussed with the end goal of identifying the best metrics that could be used to determine treatment effectiveness and providing a way for monitoring adverse effects. Combining pulse oximetry, cortisol response sensor, and galvanic skin response as biometrics theoretically offers a comprehensive assessment of autonomic activity and responses and establishes objective measures to identify treatment outcomes and adverse reactions. However, future experimental studies are needed to verify if the proposed protocol is feasible and if it is well tolerated by the iBrain students before it can be implemented to monitor adverse reaction to intervention and as a potential treatment outcome measure for children affected by CVI.
- Published
- 2021
- Full Text
- View/download PDF
6. Weather Forecasting Using the Random Forest Algorithm Analysis
- Author
-
Abyson Mathew and Dr. Juby Mathew
- Subjects
ComputingMilieux_GENERAL ,Random Forest, weather forecast, machine learning - Abstract
primary sector operations, such as farming, are dependent this weather for productivity. Because the climate is changing at such a rapid rate these days, traditional weather forecast systems are becoming less effective and more time consuming. Improved and dependable weather forecast technologies are necessary to solve these challenges. These forecasts have an impact on a country's economy and people's lives. The major goal of this project is to create a weather forecasting system that can be used in remote places. To forecast weather conditions, data analytics and the machine learning techniques like as random forest classifications is mainly used here. The study recomends a low--cost, portable of weather forecasting systems.
- Published
- 2022
- Full Text
- View/download PDF
7. Cloud Computing in Agricultural Zone
- Author
-
Sulu George and Dr Juby Mathew
- Subjects
ComputingMilieux_GENERAL ,IaaS ,Cloud computing ,Structure ,Paas & SaaS - Abstract
Cloud computing is a community-focused environ-ment that relies on sharing informations, storage, provider, programs & different vital computing sources.In modern-day generation of cloud computing era very helpful for centralized the all-agricultural related statistics financialinstitution (Soil&associated, weather, research,Crop, Farmers, Agriculture advertising and marketing, fertilizers and pesti- cide statistics) inside the cloud. Lots of cloud computing companies have emerged up and there is a large boom within the usage of this provider.. Google, Microsoft, IBM and Amazon have began imparting cloud computing services. The future development of agriculture de- pends how the new technologies consisting of cloud computing are followed with a focal point on farmer wishes. The use of this technologies should help a farmer in terms of accessibility. Latest technological development has through a drastic change in every field and agriculture is no other practices to it. Cloud computing generation impacted sincerely onagriculture area and related services they offer for customers on this paper, also talk Computing model, characteristics, deployment model, cloud agro model, cloud advantages and assignment of cloud computing in agriculture field.
- Published
- 2022
- Full Text
- View/download PDF
8. Image Steganography with Open SSL Base64 Encryption for Enhanced Password Security
- Author
-
Akhil Tom and Dr. Juby Mathew
- Subjects
OpenSSL Base64 encryption ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image Steganography ,Cipher text ,LSB Image Steganography ,Stego image - Abstract
To provide increased data security, image steganography algorithms can be used with encryption methods.This paper proposes using the Least Significant Bit algorithm in conjunction with the OpenSSL Base64 encryption approach to create a two-layer password security system.To hide data, the suggested approach exploits one of the three colours contained in each image pixel (RED, GREEN, or BLUE). This approach successfully conceals data in an image that contains the LSB of BLUE colour pixel value with no major changes in the picture colors.This approach for concealing information in photos improves on the Least Significant Bit (LSB) approach.
- Published
- 2021
- Full Text
- View/download PDF
9. Analyzing and Adding Accident Prone Area's in Kerala into Google Map
- Author
-
Adhin Babu and Dr. Juby Mathew
- Subjects
Latitude ,Longitude ,Google Maps ,Accident Prone Areas ,Black spot - Abstract
One of the popular and most used Direction and web Mapping tool which is customer friendly is Google Maps. It maps the routes and directions into map and serves as an online/offline mapping tool. Google develop and maintains the Google map technology. Some of the features which it provides are Street view, Satellite imagery, direction, roads, speed, real-time traffic, re-routes to shorter routes, driving, flying (in beta), and taking public transportation are all accessible. In this the accident prone areas are analyzed, studied. We get the accident prone are from the official website of Kerala Road Safety Authority (KRSA) The data is then visualized onto the custom map using Google My Maps. The Mapping is done based on the latitude and longitude information obtained from the data. There is Starting point and ending point on the plotted map which indicates the accident prone areas. The Location marker gives info about the number of accidents occurred in the place, number of causalities and many more information regarding the place From the plotted map when a route is set between two places we can see the blackspot areas in the map. Providing an early information will help to reduce the number of accidents to a good extend.
- Published
- 2021
- Full Text
- View/download PDF
10. Argon2: The Secure Password Hashing Function
- Author
-
Aleena Theresa George and Dr. Juby Mathew
- Subjects
Hashing ,Scrypt ,Bcrypt ,password ,Argon2 - Abstract
A password is a string of characters used to protect access to specified resources from unauthorised users. Anyone with access to the resources should be able to keep the password secret in order to prevent resources from being stolen or misused by those who do not have permission. The system that serves as a resource storage and is also in charge of granting access to those resources should be secure enough to handle access verification. The computer should have a means to validate the password in order to authenticate a person using a password. A security issue arises when a plain password is saved somewhere to be used for verification. Anyone who can identify the location where the password is kept and read it can have access to all of the system's resources. The authentication system should be able to store and validate passwords in a secure manner. With the advancement of computer hardware, the chances of cracking the security of hashing algorithms, such as Bcrypt, are increasing. Certain gear has been developed particularly to execute certain cracking algorithms at their best. To avoid the chance of cracking utilising high-end computer hardware, a more secure hashing technique is required. Argon2 is yet another hashing function that can outperform current hardware in terms of compute power. Argon2 addresses several important flaws in existing algorithms by being designed for the fastest memory filling rate and the most efficient usage of numerous processing units while still offering protection against tradeoff attacks.
- Published
- 2021
- Full Text
- View/download PDF
11. Efficient Brute Force Attack Handling: Server Virtualization
- Author
-
Lovely Anna John and Dr. Juby Mathew
- Subjects
Password Cracking ,Brute-Force ,Cracking Software Tools ,Cracking Passwords - Abstract
Security of server in all contexts is dominating in every field of computing, while working on the servers numerous threats and attacks like cracking of passwords, knowing the root of machine, giving privilege to unauthorized users are common attacks that can harm the system and take access of servers. The most prevalent commands like Hydra and Medusa, Ncrack are there which can be used for cracking the passwords of server and unauthorized users can take the access of serverby applying these commands. In this paper we will consider brute force attack and its tools with its implementation and prevention ways or techniques to avoid these types of attack.
- Published
- 2021
- Full Text
- View/download PDF
12. Asp. Net Framework in Model View Controller Implementation
- Author
-
Yedhukrishnan B K and Dr. Juby Mathew
- Subjects
mobile application development ,web development ,MVC framework ,Model view controller ,model, view, controller, web development, mobile application development, MVC framework - Abstract
— The Model-View-Controller (MVC) architectural pattern divides an application into three logical components: model, view, and controller. Each of these components is designed to handle unique aspects of application creation. MVC is a common industry-standard web development platform for developing scalable and extensible projects. This pattern has become common for developing web applications and mobile applications after being traditionally used for desktop graphical user interfaces (GUIs). Popular programming languages such as Javascript, Python, Perl, C#, Java, Swift, and Elixr have MVC frameworks that can be used to quickly build mobile or web applications.
- Published
- 2021
- Full Text
- View/download PDF
13. Website hacking using Grabber and SqlMap
- Author
-
Juby Mathew, Roni P James, Jiss Maria Joseph, and Julie ES
- Subjects
SQL Injection ,Grabber ,Sqlmap ,Website Hacking - Abstract
All web applications depend on the internet. Now a day’s web applications play an important role in everybody’s life. Thousands of transactions and confidential data are done through these applications, 80% out of which are vulnerable to malicious attacks according to the survey by the Open Web Application Security Projects. Website hacking exploits the web pages and database; thus, compromising the confidential and sensitive information in it. The highest security threat for web applications is SQL injections. Here we use two tools for finding the vulnerability in the websites and enables access to the database, viewing data in tables such as users, passwords, backups, phone numbers, credit cards, e-mail addresses, and other confidential and sensitive information. Grabber is a web application scanner which scans for the vulnerability. Sqlmap is a tool that provides penetration testing for the process of detecting and exploiting SQL injection flaws.
- Published
- 2020
- Full Text
- View/download PDF
14. Detection of attack on Windows password: PupyRAT
- Author
-
Juby Mathew, Pratheesh Francis, Rony, Reshma Sarah, and Snadra Sebastian
- Subjects
Password cracking ,Backdoor attack ,Remote Administration Tool - Abstract
Password cracking has become one of the popular means of breaking into one’s privacy. Various methods have been adopted to store passwords securely from intruders. One such method is to keep the passwords hashed. The user passwords in Windows are stored as hashed codes in a registry hive. To obtain these codes secretly and remotely from the target system, the Remote Administration Tool (RAT) like PupyRAT is used. It can connect to a target system through a backdoor attack. Once a session is created, the attacker can bypass the User Account Control (UAC) to gain the admin privilege. Only then can the attacker download the registry hive. To be able to bypass the UAC, PupyRAT injects multiple PowerShell commands into the target system. A system that detects these PowerShell windows is developed to alert and terminate possible RAT attacks.
- Published
- 2020
- Full Text
- View/download PDF
15. Improved Hadoop Cluster Performance by Dynamic Load and Resource Aware Speculative Execution and Straggler Node Detection
- Author
-
Thomas Scaria, Juby Mathew, and Terry Jacob Mathew
- Subjects
Environmental Engineering ,business.industry ,Computer science ,Node (networking) ,General Engineering ,Speculative execution ,Big data, Clustering, Hadoop, Node detection ,2249-8958 ,Dynamic load testing ,Computer Science Applications ,Resource (project management) ,Cluster (physics) ,business ,Computer network ,D8017049420/2020©BEIESP - Abstract
The big data is one of the fastest growing technologies, which can to handle huge amounts of data from various sources, such as social media, web logs, banking and business sectors etc. In order to pace with the changes in the data patterns and to accommodate the requirements of big data analytics, the platform for storage and processing such as Hadoop, also requires great advancements. Hadoop, an open source project executes the big data processing job in map and reduce phases and follows master-slave architecture. A Hadoop MapReduce job can be delayed if one of its many tasks is being assigned to an unreliable or congested machine. To solve this straggler problem, a novel algorithm design of speculative execution schemes for parallel processing clusters, from an optimization perspective, under different loading conditions is proposed. For the lightly loaded case, a task cloning scheme, namely, the combined file task cloning algorithm, which is based on maximizing the overall system utility, a straggler detection algorithm is proposed based on a workload threshold. The detection and cloning of tasks assigned with the stragglers only will not be enough to enhance the performance unless cloning of tasks is allocated in a resource aware method. So, a method is proposed which identifies and optimizes the resource allocation by considering all possible aspects of cluster performance balancing. One main issue arises due to the pre configuration of distinct map and reduce slots based on the number of files in the input folder. This can cause severe under-utilization of slot as map slots might not be fully utilized with respect to the input splits. To solve this issue, an alternative technique of Hadoop Slot Allocation is introduced in this paper by keeping the efficient management of slots model. The combine file task cloning algorithm combines the files which are less than the size of a single data block and executes them in the highly performing data node. On implementing these efficient cloning and combining techniques on a heavily loaded cluster after detecting the straggler, machine is found to reduce the elapsed time of execution to an average of 40%. The detection algorithm improves the overall performance of the heavily loaded cluster by 20% of the total elapsed time in comparison with the native Hadoop algorithm.
- Published
- 2020
16. Intubation and extubation of patients with a heat and moisture exchanger attached to the endotracheal tube in patients with COVID-19
- Author
-
Nitu Puthenveettil, Sajan Rahman, Sundeep Vijayaraghavan, and Juby Mathew
- Subjects
2019-20 coronavirus outbreak ,Hot Temperature ,Coronavirus disease 2019 (COVID-19) ,SARS-CoV-2 ,business.industry ,medicine.medical_treatment ,Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) ,COVID-19 ,General Medicine ,Airway Extubation ,Anesthesiology and Pain Medicine ,Heat and moisture exchanger ,Anesthesia ,Correspondence ,Intubation, Intratracheal ,Humans ,Medicine ,Intubation ,In patient ,business ,Endotracheal tube - Published
- 2021
- Full Text
- View/download PDF
17. GPS Place Reminder with Pattern Searching& Accident Detection
- Author
-
Juby Mathew, Manumon Mathew, Manu Joseph, and Anns Benny
- Subjects
Good suffix rule ,Boyer Moore Algorithm ,Bad character rule - Abstract
GPS place remainder and Accident Detection system is used to remind the user about a particular product and to detect accident occurrence. The GPS place remainder system is used to notify the user when a location reaches with product availability. For this the system make use of fastest searching algorithm called Boyer-Moore Algorithm. This system also got the feature of accident detection. When an accident occurs, the user's phone automatically detects the accident and notify the nearest hospital and friends. Both this feature is developed in the android application for better user interface.
- Published
- 2019
- Full Text
- View/download PDF
18. COMPLAINT REPORTING AND PATTERN SEARCHING USING KMP ALGORITHM
- Author
-
Juby Mathew, Anchana Ashok, Sumy Roslin Joseph, and Vinod, Anjana
- Subjects
KMP algorithm ,pattern matching - Abstract
The string-searching algorithms, also called string-matching algorithms, are a significant class of string algorithms. The objective of these algorithms is to discover a place where one or a few strings (likewise called patterns) are found inside a larger string or text. Nowadays there are numerous algorithms accessible for string looking with changed seeking speed. The larger the move of the pattern with respect to the string if there should be an occurrence of pattern and string characters' confound is, the higher is the algorithm running speed. This paper offers an algorithm, which has been created based on the Kunth-Morris-Pratt string looking algorithm. This algorithm depends on different fundamental standards of pattern matching. Knuth-Morris-Pratt algorithm depends on forwarding pattern and the pattern is completely contrasted and the selected text window (STW) of the text string and show the beginning index position.
- Published
- 2019
- Full Text
- View/download PDF
19. Analysis of image inpainting and object removal methodologies
- Author
-
Juby Mathew and Shiney Thomas
- Subjects
Computer science ,business.industry ,Test score ,Inpainting ,Process (computing) ,Benchmark (computing) ,Computer vision ,Artificial intelligence ,Object (computer science) ,business ,Image (mathematics) - Abstract
Image inpainting is a process that tries to fill in missing parts of a degraded image or remove objects from an image, but maintain the realistic content in the image. Various methods can be employed to perform inpainting. Here three benchmark methods of which two are conventional and other GAN based are evaluated to check the effectives of the inpainting process, for different class of images. The visual quality evaluation as well as quantification parameter namely the SSIM score was computed. Based on the test score it was seen that the GAN based method was capable of providing visually good restored images with an average SSIM score of 0.9516, which is an indicator on the quality of the image. The GAN based methods can be further enhanced to provide more realistic images by incorporating functions to extract both local and global contextual content.
- Published
- 2021
- Full Text
- View/download PDF
20. Optimize Continuous Integration and Continuous Deployment in Azure DevOps for a controlled Microsoft .NET environment using different techniques and practices
- Author
-
S R Dileepkumar and Juby Mathew
- Subjects
Computer science ,Process (engineering) ,business.industry ,media_common.quotation_subject ,Cloud computing ,Certification ,Software ,Software deployment ,Quality (business) ,DevOps ,business ,Software engineering ,Host (network) ,media_common - Abstract
Delivering a software is not a simple process, even if it is a completely new software created from the scratch, the enhancement of an existing software or fixing the bugs of an existing application. As per the new industrial standard most of the companies follow the DevOps methodologies to deliver the software products, which leverage the flexibilities of the software delivery with expected quality on time with minimal errors. One of the most important factors of the DevOps methodology is Continuous Integration and Continuous Deployment. As the entire software industry is moving towards Cloud Computing one of the most powerful, cost effective and easily maintainable environment to host the software applications. There are various Cloud computing providers available in the industry now. Most of them have its own advantage and dis-advantages. There are many researches going on various topics on these areas and the importance of these topics are getting more relevant in the industry now. There are lot of gaps on the Continuous Integration and Continuous Deployment concepts and more improvement options have to be identified and certified throughout the various researches. To understand the importance of this platform, we decided to concentrate the research on the Continuous Integration and Continuous Deployment in Azure DevOps for a controlled Microsoft .NET environment using different techniques and practices. Here our intention is to identify the various factors which helps the industry to do a better Continuous Integration and Continuous Deployment in the Azure DevOps for a controlled Microsoft .NET environment using different techniques and practices. Among the “n” number of factors identified on this subject, only couple of factors are considered as part of this research.
- Published
- 2021
- Full Text
- View/download PDF
21. Enhancing the efficiency of continuous integration environment in DevOps
- Author
-
Jetty Benjamin and Juby Mathew
- Subjects
Computer science ,Systems engineering ,DevOps ,Continuous integration - Abstract
Faster release of features to the production environment is the need of the hour of every IT organizations. This faster and continuous software delivery is made possible through DevOps. DevOps is a set of practices that bridges the gap between development team and operations team. The different aspects of DevOps came from agile methodology. Continuous integration is the paramount of DevOps life cycle. In a continuous integration development practice, the development code and the applications code are continuously integrated several times a day. Developers follow the practice of committing changes frequently into the version control system such as git. A change in the version control system triggers the continuous integration system such as Jenkins. This exploratory study presents the ways that support the developers during the build break in continuous integration environment and thereby improve the efficiency of continuous integration process. Our findings contribute that the selected list of plugins in the Jenkins support the developers during the build break, thus developers can come up with faster recovery of build failures which in turn increase the efficiency of continuous integration environment.
- Published
- 2021
- Full Text
- View/download PDF
22. Gene Expression Data Analysis using Fuzzy C-means Clustering Technique
- Author
-
Thomas Scaria, Juby Mathew, and Gifty Stephen
- Subjects
030110 physiology ,0301 basic medicine ,Fuzzy clustering ,Data element ,Matching (graph theory) ,Computer science ,Volume (computing) ,Sample (statistics) ,computer.software_genre ,Fuzzy logic ,03 medical and health sciences ,ComputingMethodologies_PATTERNRECOGNITION ,Data mining ,Cluster analysis ,computer - Abstract
The challenging issue in microarray technique is to analyze and interpret the large volume of data. This can be achieved by clustering techniques in data mining. In hard clustering like hierarchical and k-means clustering techniques, data is divided into distinct clusters, where each data element belongs to exactly one cluster so that the outcome of the clustering may not be correct in many times. The problems addressed in hard clustering could be solved in fuzzy clustering technique. Among fuzzy based clustering, fuzzy c means (FCM) is the most suitable for microarray gene expression data. The problem associated with fuzzy c-means is the number of clusters to be generated for the given dataset needs to be specified in prior. The main objective of this proposed Possibilistic fuzzy c-means method is to determine the precise number of clusters and interpret the same efficiently. The PFCM is a good clustering algorithm to perform classification tests because it possesses capabilities to give more importance to topicalities or membership values. PFCM is a hybridization of PCM and FCM that often avoids various problems of PCM, FCM and FPCM. Based on the sample dataset „lung‟ the entire research has been developed. The available research works already developed in this area are not exclusively working with cancer genes.At this juncture, using of the Modified Possibilitistic fuzzy cmeans algorithm could be found matching with cancer genes in a better fashion. “Matlab” is used for the algorithm.The accuracy of the dataset may be identified with the usage of different training sets.Possibilistic fuzzy c means algorithm has provided better results while identifying the cancer gene. For evaluating the feasibility of the Possibilistic Fuzzy C-Means (PFCM) clustering approach, the researcher has carried out the experimental analysis.
- Published
- 2016
- Full Text
- View/download PDF
23. Mutations in ARSB in MPS VI patients in India
- Author
-
S. Udhaya Kumar, Saravanamuthu Thiyagarajan, Meenakshi Bhat, Juby Mathew, Sudha Srinivasan, and Sujatha Jagadeesh
- Subjects
Mucopolysaccharidosis VI (MPS VI) ,Arylsulfatase B ,ARSB, arylsulfatase B ,Population ,India ,LSD, lysosomal storage disorder ,GAG, glycosaminoglycan ,Lysosomal storage disorder (LSD) ,Biology ,MPS, mucopolysaccharidosis ,medicine.disease_cause ,HSCT, hematopoietic stem cell transplantation ,Endocrinology ,VUS, variants of unknown significance ,Genetics ,medicine ,MPS - Mucopolysaccharidosis ,education ,Arylsulfatase B (ARSB) ,lcsh:QH301-705.5 ,Molecular Biology ,Gene ,GALNS, N-acetyl galactosamine 6-sulfatase ,lcsh:R5-920 ,education.field_of_study ,Mutation ,Maroteaux–Lamy syndrome ,Active site ,Mucopolysaccharidosis VI ,medicine.disease ,Lysosomal enzyme ,ERT, enzyme replacement therapy ,lcsh:Biology (General) ,Inborn error of metabolism (IEM) ,Inborn error of metabolism ,PCT, pharmacological chaperone therapy ,HGMD, Human Gene Mutation Database ,lcsh:Medicine (General) ,Mutations ,Research Paper - Abstract
Mucopolysaccharidosis VI (MPS VI) is an autosomal recessive inborn error of metabolism caused by mutations in the arylsulfatase B gene (ARSB) and consequent deficient activity of ARSB, a lysosomal enzyme. We present here the results of a study undertaken to identify the mutations in ARSB in MPS VI patients in India. Around 160 ARSB mutations, of which just 4 are from India, have been reported in the literature. Our study covered nine MPS VI patients from eight families. Both familial mutations were found in seven families, and only one mutation was found in one family. Seven mutations were found - four novel (p.G38_G40del3, p.C91R, p.L98R and p.R315P), two previously reported from India (p.D53N and p.W450C), and one reported from outside India (p.R160Q). One mutation, p.W450C, was present in two families, and the other six mutations were present in one family each. Analysis of the molecular structure of the enzyme revealed that most of these mutations either cause loss of an active site residue or destabilize the structure of the enzyme. The only previous study on mutations in ARSB in Indian MPS VI patients, by Kantaputra et al. 2014 [1], reported four novel mutations of which two (p.D53N and p.W450C) were found in our study as well. Till date, nine mutations have been reported from India, through our study and the Kantaputra study. Eight out of these nine mutations have been found only in India. This suggests that the population studied by us might have its own typical set of mutations, with other populations equally likely to have their own set of mutations.
- Published
- 2015
- Full Text
- View/download PDF
24. Ethnic and geographic variations in the incidence of pancreatitis and post-pancreatitis diabetes mellitus in New Zealand: a nationwide population-based study
- Author
-
Sayali A, Pendharkar, Juby, Mathew, Jinfeng, Zhao, John A, Windsor, Daniel J, Exeter, and Maxim S, Petrov
- Subjects
Adult ,Male ,Incidence ,Middle Aged ,Cohort Studies ,Young Adult ,Age Distribution ,Diabetes Mellitus, Type 1 ,Diabetes Mellitus, Type 2 ,Pancreatitis ,Residence Characteristics ,Risk Factors ,Pancreatitis, Chronic ,Humans ,Female ,Aged ,New Zealand - Abstract
To determine the incidence of acute pancreatitis (AP), chronic pancreatitis (CP), and post-pancreatitis diabetes mellitus (DP) in New Zealand, and the effect of ethnic and geographic variations.Data were collected from all district health boards in New Zealand by the Ministry of Health (Manatū Hauora). Diagnosis of AP, CP and DP was determined by the International Classification of Diseases-10 codes. Incidence rates per 100,000 population per year were calculated using incident AP, CP and DP cases as the numerator, and the adult resident population of New Zealand as the denominator. Poisson distribution was used to estimate 95% confidence intervals. The district health board domicile codes and corresponding incidence rates were used to map geographical variations for AP, CP and DP.On average, 2,072 new cases of AP, CP and DP were diagnosed in New Zealand every year. The crude incidence of AP was 58.42 [57.55, 59.30], CP - 3.97 [3.74, 4.20], and DP - 7.95 [7.62, 8.27] per 100,000 population per year. Māori had the highest incidence of AP (95.21 [91.74, 98.68] per 100,000 population per year), CP (6.27 [5.37, 7.16] per 100,000 population per year), and DP (18.23 [16.71, 19.76] per 100,000 population per year). Incidence of AP and DP was at least 1.8 and 2.6 times higher in Māori than New Zealand Europeans in every age group, and incidence of DP was at least 1.9 times higher in Pacific people than New Zealand Europeans in every age group. Auckland/Northland had the highest incidence of AP (135.25 [134.82, 135.68] per 100,000 population), and CP (9.03 [8.60, 9.46] per 100,000 population), while Lakes/Waikato had the highest incidence of DP (20.64 [20.21, 21.07] per 100,000 population) in New Zealand.New Zealanders have a very high incidence rate of AP, with Māori having the highest reported incidence of AP worldwide. There is a significant geographic variation in incidence of pancreatic diseases, with the Upper North Island having the highest incidence rates of AP, CP and DP in the country. Future high-quality studies are required to understand the mechanisms of pancreatitis and DP in order to develop preventive and therapeutic strategies that would benefit New Zealanders in general and Māori in particular.
- Published
- 2017
25. Scalable Parallel Clustering Approach for Large Data using Possibilistic Fuzzy C-Means Algorithm
- Author
-
R Vijayakumar and Juby Mathew
- Subjects
Computer science ,business.industry ,Scalability ,Canopy clustering algorithm ,Artificial intelligence ,Data mining ,Machine learning ,computer.software_genre ,Cluster analysis ,business ,computer ,Fuzzy logic - Published
- 2014
- Full Text
- View/download PDF
26. Scalable parallel clustering using modified Firefly algorithm
- Author
-
Dr.R Vijayakumar and Juby Mathew
- Subjects
Clustering high-dimensional data ,Data stream clustering ,Computer science ,CURE data clustering algorithm ,Consensus clustering ,Correlation clustering ,Constrained clustering ,Canopy clustering algorithm ,Parallel computing ,Cluster analysis - Abstract
Clustering is the process of assigning data objects into a set of disjoint groups called clusters so that objects in each cluster are more similar to each other than objects from different clusters. We try to exploit computational power from the multicore processors. We need a new design on existing algorithms and software. Firefly algorithm is one of the metaheuristic algorithms which are used for solving optimization problems. The existing clustering algorithms either handle different data types with inefficiency in handling large data or handle large data with limitations in considering numeric attributes. Hence, parallel clustering has come into picture to provide crucial contribution towards clustering large data. In this paper, we have developed a scalable parallel clustering algorithm using FA and genetic algorithm to cluster large data. Modified FA algorithm does not handle the large data effectively. So, our ultimate aim is to design and develops an algorithm in parallel way by considering data. The experimental analysis will be carried out to evaluate the feasibility of the new combined clustering approach. The experimental analysis showed that the proposed approach obtained upper head over existing method in terms of accuracy and time. Most of the programming languages doesn't provide multiprocessing facilities and hence wastage of processing resources. In order to utilize the intrinsic capabilities of a multi-core processor the software application must be able to execute tasks in parallel using all available CPUs. To achieve this we can use fork/join method in java programming. It is the most effective design method for achieve good parallel performance.
- Published
- 2014
- Full Text
- View/download PDF
27. Scalable parallel clustering using modified Firefly algorithm
- Author
-
Iosr Journals, Juby Mathew, Dr.R Vijayakumar, Iosr Journals, and Juby Mathew, Dr.R Vijayakumar
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.