58 research outputs found

    Elucidating Signal Transduction Modulatory Drug Target Network of Colon Cancer: A Network Biology Approach

    Get PDF
    Latest evaluation and validation of cancer drugs and their targets has demonstrated the lack and inadequate development of new and better drugs, based on available protocols. Even though the specificity of drug targets is a great challenge in the pharmaco-proteomics field of cancer biology, for eradicating such hurdles and paving the way for the drugs of future, a novel step has been envisaged here to study the relation between drug target network and the corresponding drug network using the advanced concepts of proteomics and network biology. The literature mining was done for the collection of receptors and the ligands. About 1000 natural compounds were collected and out of those 300 molecules showed anti-cancer activity against colon cancer. Ligand Vs multiple receptor docking was done using the software Quantum 3.3.0; the results were further used for the designing of a well connected Protein Ligand Interaction (PLI) network of colon cancer. The obtained network is then extrapolated to sort out the receptors expressed in the specific cancer type. The network is then statistically analyzed and represented by the graphical interpretation, in order to ascertain the hub nodes and their locally parsed neighbours. Based on the best docking scores, the graphs obtained from the docking analysis are statistically validated with the help of VisANT. In the network three hub nodes Neutrophil cytosol factor 2, UV excision repair protein RAD23 homolog A, & Receptor-type tyrosine-protein phosphatase eta were identified, which showed the highest interaction with the ligands. Butyrate and Farnesol showed highest interaction as ligands. Multiple Sequence Alignment was done of the binding site sequence of the drug targets to find out the evolutionary closeness of the binding sites. The phylogenetic tree was also constructed to further validate the observation. Further in-vitro and in-vivo studies needs to be done to analyse the receptor specificity and anti tumor activity of these compounds in Colon cancer

    What you can't see can help you -- extended-range imaging for 3D-mask presentation attack detection

    Get PDF
    We show how imagery in NIR and LWIR bandwidths can be used to detect 2D as well as mask based presentation attacks on face-recognition systems

    Shape representation and coding of visual objets in multimedia applications — An overview

    Get PDF
    Emerging multimedia applications have created the need for new functionalities in digital communications. Whereas existing compression standards only deal with the audio-visual scene at a frame level, it is now necessary to handle individual objects separately, thus allowing scalable transmission as well as interactive scene recomposition by the receiver. The future MPEG-4 standard aims at providing compression tools addressing these functionalities. Unlike existing frame-based standards, the corresponding coding schemes need to encode shape information explicitly. This paper reviews existing solutions to the problem of shape representation and coding. Region and contour coding techniques are presented and their performance is discussed, considering coding efficiency and rate-distortion control capability, as well as flexibility to application requirements such as progressive transmission, low-delay coding, and error robustnes

    Deeply Vulnerable -- a study of the robustness of face recognition to presentation attacks

    Get PDF
    The vulnerability of deep-learning-based face-recognition (FR) methods, to presentation attacks (PA), is studied in this study. Recently, proposed FR methods based on deep neural networks (DNN) have been shown to outperform most other methods by a significant margin. In a trustworthy face-verification system, however, maximising recognition-performance alone is not sufficient – the system should also be capable of resisting various kinds of attacks, including PA. Previous experience has shown that the PA vulnerability of FR systems tends to increase with face-verification accuracy. Using several publicly available PA datasets, the authors show that DNN-based FR systems compensate for variability between bona fide and PA samples, and tend to score them similarly, which makes such FR systems extremely vulnerable to PAs. Experiments show the vulnerability of the studied DNN-based FR systems to be consistently higher than 90%, and often higher than 98%

    Eria merguensis Lindl. (Orchidaceae) – a new addition to the Indian flora

    Get PDF
    Eria merguensis Lindl., an uncommon orchid, is reported here for the first time from India. Following the guidelines of IUCN, conservation status of the species is also discussed in the Indian context

    A rare species of Calanthe R.Br. recorded for the first time from India

    Get PDF
    Calanthe hancockii Rolfe is reported here for the first time from India. Its IUCN-status at Indian perspective is also assessed as Critically Endangered [CR B1]
    • …
    corecore