Swapnil Soner - Academia.edu (original) (raw)
Papers by Swapnil Soner
Wireless Personal Communications
2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2021
Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject t... more Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject toxic effector proteins into neighboring cells. Effector discovery is generally done manually, and computational approaches used for effector discovery depend on genetic linkage to T6SS genes and/or sequence similarity to known effectors. We bioinformatically investigated T6SS in more than 11,832 genomes of Gram negative bacteria. We found that T6SS encoding bacteria are host-associated and pathogenic, enriched in specific human and plant tissues, while depleted in marine, soil, and engineered environments. Analysis of T6SS cores with C-terminal domains ("evolved" cores) showed "evolved" HCP are rare, overwhelmingly encoded in orphan operons, and are largely restricted to Escherichia. Using the wealth of data generated from our bioinformatic analysis, we developed two algorithms for large-scale discovery of T6SS effector proteins (T6Es). We experimentally validated ten...
Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells.... more Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells. Characterization of these systems and the toxins they secrete is important for understanding microbial interactions and virulence in different ecosystems. The extracellular Contractile Injection System (eCIS) is a toxin delivery particle that evolved from a bacteriophage tail. Four known eCIS systems have been shown to mediate interactions between bacteria and their invertebrate hosts, but the broad ecological function of these systems remains unknown. Here, we identify eCIS loci in 1,249 prokaryotic genomes and reveal a striking enrichment of these loci in environmental microbes and absence from mammalian pathogens. We uncovered 13 toxin genes that associate with eCIS from diverse microbes and show that they can inhibit growth of bacteria, yeast or both. We also found immunity genes that protect bacteria from self-intoxication, supporting an antibacterial role for eCIS. Furthermore, we...
Microbiology, 2019
Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria... more Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria signalling and also occurs naturally in several cereals. Several bacteria have been reported to be able to utilize azelaic acid as a unique source of carbon and energy, including Pseudomonas nitroreducens . In this study, we utilize P. nitroreducens as a model organism to study bacterial degradation of and response to azelaic acid. We report genetic evidence of azelaic acid degradation and the identification of a transcriptional regulator that responds to azelaic acid in P. nitroreducens DSM 9128. Three mutants possessing transposons in genes of an acyl-CoA ligase, an acyl-CoA dehydrogenase and an isocitrate lyase display a deficient ability in growing in azelaic acid. Studies on transcriptional regulation of these genes resulted in the identification of an IclR family repressor that we designated as AzeR, which specifically responds to azelaic acid. A bioinformatics survey reveals that...
2010 2nd International Conference on Software Technology and Engineering, 2010
... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...
Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technol... more Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technology/ field - Machine Learning. A properly dimensioned ML repository has the potential to increase the interest of students in learning the latest technologies. It is an ML integrated website where students can learn different machine learning algorithms, visualize them and can even get hands-on experience on some of the models. The main objective of the study is to develop a web-based digital repository for Machine learning algorithms combined with application models of machine learning for better learning. It has various models integrated in it like handwritten digit recognition system, Sentiment Analyser and many more. One of the models is of Facial Detection. We have used the Caffe Model of the DNN Module for facial detection. Unlike other facial detection models, it not only detects the person‟s front face but also detects the side face accurately. It gives very fast fps compared to ...
The methodology of Aspect oriented software development is the new technique to improve the modul... more The methodology of Aspect oriented software development is the new technique to improve the modularity in the area of software development. It eliminates the limitation of traditional classical approaches. It gives more emphasis on the crosscutting concern with the help of Separation. Over the last few years, several techniques of crosscutting have been introduced. In this article several existing approaches aspect oriented development have been
The most significant issue in the government registry department is the duplicate registry of lan... more The most significant issue in the government registry department is the duplicate registry of land in the current scenario. These kinds of problems are increasing day by day by day, which necessitates the advancement of the existing registry process system. It is a manual process that a typical stamp-based or newly not secure online process (only a few places). Use of a manual process, there are many issues in the duplicate registry of a particular land. The final registry, where the landlord has a stamp paper copy and sale deed or a specific number of the property. One receipt copy at the land registry department for their record. Blockchain has emerged as a new technology to resolve or handle the above-said issue of the current system, a distributed ledger that is a timestamp and immutable. Being immutable, forgeries related to the particular land during the registry are not allowed. This concept provides trust and consensus among all entities in the network or system. In this pap...
International Journal of Computer Applications, 2015
The costs of erroneous software can be as of the investment in software development. Yet, the pot... more The costs of erroneous software can be as of the investment in software development. Yet, the potential to improve software quality and reduce project cost is enormous. Bug tracking and fixing can be an effective means to achieve quality i.e. error free at less cost. A System guides the maintenance activities of software developer's team who earlier, face the problem in fixing bugs. Non-availability of bug in a system in market makes fixing process difficult. Presently Bug fixing is timeconsuming and exacerbates the already high cost of software maintenance which affects scheduled performance. This paper discusses a system that evaluates bugs and assigns priority on the basis of severity to fix them efficiently. .
2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015
2010 2nd International Conference on Education Technology and Computer, 2010
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components
2011 3rd International Conference on Electronics Computer Technology, 2011
2011 3rd International Conference on Electronics Computer Technology, 2011
Communications in Computer and Information Science, 2011
... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...
2010 2nd International Conference on Software Technology and Engineering, 2010
Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of
International Conference on Education Technology and Computer, 2010
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components
Wireless Personal Communications
2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2021
Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject t... more Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject toxic effector proteins into neighboring cells. Effector discovery is generally done manually, and computational approaches used for effector discovery depend on genetic linkage to T6SS genes and/or sequence similarity to known effectors. We bioinformatically investigated T6SS in more than 11,832 genomes of Gram negative bacteria. We found that T6SS encoding bacteria are host-associated and pathogenic, enriched in specific human and plant tissues, while depleted in marine, soil, and engineered environments. Analysis of T6SS cores with C-terminal domains ("evolved" cores) showed "evolved" HCP are rare, overwhelmingly encoded in orphan operons, and are largely restricted to Escherichia. Using the wealth of data generated from our bioinformatic analysis, we developed two algorithms for large-scale discovery of T6SS effector proteins (T6Es). We experimentally validated ten...
Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells.... more Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells. Characterization of these systems and the toxins they secrete is important for understanding microbial interactions and virulence in different ecosystems. The extracellular Contractile Injection System (eCIS) is a toxin delivery particle that evolved from a bacteriophage tail. Four known eCIS systems have been shown to mediate interactions between bacteria and their invertebrate hosts, but the broad ecological function of these systems remains unknown. Here, we identify eCIS loci in 1,249 prokaryotic genomes and reveal a striking enrichment of these loci in environmental microbes and absence from mammalian pathogens. We uncovered 13 toxin genes that associate with eCIS from diverse microbes and show that they can inhibit growth of bacteria, yeast or both. We also found immunity genes that protect bacteria from self-intoxication, supporting an antibacterial role for eCIS. Furthermore, we...
Microbiology, 2019
Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria... more Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria signalling and also occurs naturally in several cereals. Several bacteria have been reported to be able to utilize azelaic acid as a unique source of carbon and energy, including Pseudomonas nitroreducens . In this study, we utilize P. nitroreducens as a model organism to study bacterial degradation of and response to azelaic acid. We report genetic evidence of azelaic acid degradation and the identification of a transcriptional regulator that responds to azelaic acid in P. nitroreducens DSM 9128. Three mutants possessing transposons in genes of an acyl-CoA ligase, an acyl-CoA dehydrogenase and an isocitrate lyase display a deficient ability in growing in azelaic acid. Studies on transcriptional regulation of these genes resulted in the identification of an IclR family repressor that we designated as AzeR, which specifically responds to azelaic acid. A bioinformatics survey reveals that...
2010 2nd International Conference on Software Technology and Engineering, 2010
... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...
Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technol... more Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technology/ field - Machine Learning. A properly dimensioned ML repository has the potential to increase the interest of students in learning the latest technologies. It is an ML integrated website where students can learn different machine learning algorithms, visualize them and can even get hands-on experience on some of the models. The main objective of the study is to develop a web-based digital repository for Machine learning algorithms combined with application models of machine learning for better learning. It has various models integrated in it like handwritten digit recognition system, Sentiment Analyser and many more. One of the models is of Facial Detection. We have used the Caffe Model of the DNN Module for facial detection. Unlike other facial detection models, it not only detects the person‟s front face but also detects the side face accurately. It gives very fast fps compared to ...
The methodology of Aspect oriented software development is the new technique to improve the modul... more The methodology of Aspect oriented software development is the new technique to improve the modularity in the area of software development. It eliminates the limitation of traditional classical approaches. It gives more emphasis on the crosscutting concern with the help of Separation. Over the last few years, several techniques of crosscutting have been introduced. In this article several existing approaches aspect oriented development have been
The most significant issue in the government registry department is the duplicate registry of lan... more The most significant issue in the government registry department is the duplicate registry of land in the current scenario. These kinds of problems are increasing day by day by day, which necessitates the advancement of the existing registry process system. It is a manual process that a typical stamp-based or newly not secure online process (only a few places). Use of a manual process, there are many issues in the duplicate registry of a particular land. The final registry, where the landlord has a stamp paper copy and sale deed or a specific number of the property. One receipt copy at the land registry department for their record. Blockchain has emerged as a new technology to resolve or handle the above-said issue of the current system, a distributed ledger that is a timestamp and immutable. Being immutable, forgeries related to the particular land during the registry are not allowed. This concept provides trust and consensus among all entities in the network or system. In this pap...
International Journal of Computer Applications, 2015
The costs of erroneous software can be as of the investment in software development. Yet, the pot... more The costs of erroneous software can be as of the investment in software development. Yet, the potential to improve software quality and reduce project cost is enormous. Bug tracking and fixing can be an effective means to achieve quality i.e. error free at less cost. A System guides the maintenance activities of software developer's team who earlier, face the problem in fixing bugs. Non-availability of bug in a system in market makes fixing process difficult. Presently Bug fixing is timeconsuming and exacerbates the already high cost of software maintenance which affects scheduled performance. This paper discusses a system that evaluates bugs and assigns priority on the basis of severity to fix them efficiently. .
2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015
2010 2nd International Conference on Education Technology and Computer, 2010
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components
2011 3rd International Conference on Electronics Computer Technology, 2011
2011 3rd International Conference on Electronics Computer Technology, 2011
Communications in Computer and Information Science, 2011
... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...
2010 2nd International Conference on Software Technology and Engineering, 2010
Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of
International Conference on Education Technology and Computer, 2010
Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components