Swapnil Soner - Academia.edu (original) (raw)

Papers by Swapnil Soner

Research paper thumbnail of Integrating Blockchain Technology with IoT and ML to Avoid Road Accidents Caused by Drunk Driving

Wireless Personal Communications

Research paper thumbnail of Making Toll Charges Collection Efficient and Trustless: A Blockchain-Based Approach

2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2021

Research paper thumbnail of Stand Up for Yourself

Research paper thumbnail of Large-scale discovery of candidate type VI secretion effectors with antibacterial activity

Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject t... more Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject toxic effector proteins into neighboring cells. Effector discovery is generally done manually, and computational approaches used for effector discovery depend on genetic linkage to T6SS genes and/or sequence similarity to known effectors. We bioinformatically investigated T6SS in more than 11,832 genomes of Gram negative bacteria. We found that T6SS encoding bacteria are host-associated and pathogenic, enriched in specific human and plant tissues, while depleted in marine, soil, and engineered environments. Analysis of T6SS cores with C-terminal domains ("evolved" cores) showed "evolved" HCP are rare, overwhelmingly encoded in orphan operons, and are largely restricted to Escherichia. Using the wealth of data generated from our bioinformatic analysis, we developed two algorithms for large-scale discovery of T6SS effector proteins (T6Es). We experimentally validated ten...

Research paper thumbnail of The extracellular contractile injection system is enriched in environmental microbes and associates with numerous toxins

Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells.... more Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells. Characterization of these systems and the toxins they secrete is important for understanding microbial interactions and virulence in different ecosystems. The extracellular Contractile Injection System (eCIS) is a toxin delivery particle that evolved from a bacteriophage tail. Four known eCIS systems have been shown to mediate interactions between bacteria and their invertebrate hosts, but the broad ecological function of these systems remains unknown. Here, we identify eCIS loci in 1,249 prokaryotic genomes and reveal a striking enrichment of these loci in environmental microbes and absence from mammalian pathogens. We uncovered 13 toxin genes that associate with eCIS from diverse microbes and show that they can inhibit growth of bacteria, yeast or both. We also found immunity genes that protect bacteria from self-intoxication, supporting an antibacterial role for eCIS. Furthermore, we...

Research paper thumbnail of AzeR, a transcriptional regulator that responds to azelaic acid in Pseudomonas nitroreducens

Microbiology, 2019

Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria... more Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria signalling and also occurs naturally in several cereals. Several bacteria have been reported to be able to utilize azelaic acid as a unique source of carbon and energy, including Pseudomonas nitroreducens . In this study, we utilize P. nitroreducens as a model organism to study bacterial degradation of and response to azelaic acid. We report genetic evidence of azelaic acid degradation and the identification of a transcriptional regulator that responds to azelaic acid in P. nitroreducens DSM 9128. Three mutants possessing transposons in genes of an acyl-CoA ligase, an acyl-CoA dehydrogenase and an isocitrate lyase display a deficient ability in growing in azelaic acid. Studies on transcriptional regulation of these genes resulted in the identification of an IclR family repressor that we designated as AzeR, which specifically responds to azelaic acid. A bioinformatics survey reveals that...

Research paper thumbnail of Revidering av Strategisk plan och balanserat styrkort - Aneby kommun

Research paper thumbnail of “Reverse engineering”: Extracting information from C++ code

2010 2nd International Conference on Software Technology and Engineering, 2010

... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...

Research paper thumbnail of Coders Hub ML Edu. Platform Systems

Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technol... more Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technology/ field - Machine Learning. A properly dimensioned ML repository has the potential to increase the interest of students in learning the latest technologies. It is an ML integrated website where students can learn different machine learning algorithms, visualize them and can even get hands-on experience on some of the models. The main objective of the study is to develop a web-based digital repository for Machine learning algorithms combined with application models of machine learning for better learning. It has various models integrated in it like handwritten digit recognition system, Sentiment Analyser and many more. One of the models is of Facial Detection. We have used the Caffe Model of the DNN Module for facial detection. Unlike other facial detection models, it not only detects the person‟s front face but also detects the side face accurately. It gives very fast fps compared to ...

Research paper thumbnail of A Brief Survey on Aspect-Oriented Modeling Methodologies

The methodology of Aspect oriented software development is the new technique to improve the modul... more The methodology of Aspect oriented software development is the new technique to improve the modularity in the area of software development. It eliminates the limitation of traditional classical approaches. It gives more emphasis on the crosscutting concern with the help of Separation. Over the last few years, several techniques of crosscutting have been introduced. In this article several existing approaches aspect oriented development have been

Research paper thumbnail of Exploring Blockchain and Smart Contract Technology for Reliable and Secure Land Registration and Record Management

The most significant issue in the government registry department is the duplicate registry of lan... more The most significant issue in the government registry department is the duplicate registry of land in the current scenario. These kinds of problems are increasing day by day by day, which necessitates the advancement of the existing registry process system. It is a manual process that a typical stamp-based or newly not secure online process (only a few places). Use of a manual process, there are many issues in the duplicate registry of a particular land. The final registry, where the landlord has a stamp paper copy and sale deed or a specific number of the property. One receipt copy at the land registry department for their record. Blockchain has emerged as a new technology to resolve or handle the above-said issue of the current system, a distributed ledger that is a timestamp and immutable. Being immutable, forgeries related to the particular land during the registry are not allowed. This concept provides trust and consensus among all entities in the network or system. In this pap...

Research paper thumbnail of A Survey on Software Bug Evaluation

International Journal of Computer Applications, 2015

The costs of erroneous software can be as of the investment in software development. Yet, the pot... more The costs of erroneous software can be as of the investment in software development. Yet, the potential to improve software quality and reduce project cost is enormous. Bug tracking and fixing can be an effective means to achieve quality i.e. error free at less cost. A System guides the maintenance activities of software developer's team who earlier, face the problem in fixing bugs. Non-availability of bug in a system in market makes fixing process difficult. Presently Bug fixing is timeconsuming and exacerbates the already high cost of software maintenance which affects scheduled performance. This paper discusses a system that evaluates bugs and assigns priority on the basis of severity to fix them efficiently. .

Research paper thumbnail of Green cloud computing: A review on Green IT areas for cloud computing environment

2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015

Research paper thumbnail of A novel approach to calculate the severity and priority of bugs in software projects

2010 2nd International Conference on Education Technology and Computer, 2010

Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components

Research paper thumbnail of An approach for extracting business rules from legacy C++ code

2011 3rd International Conference on Electronics Computer Technology, 2011

Research paper thumbnail of Reverse engineering: Journey from code to design

2011 3rd International Conference on Electronics Computer Technology, 2011

Research paper thumbnail of RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication

Communications in Computer and Information Science, 2011

... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...

Research paper thumbnail of Metrics calculation for deployment process

2010 2nd International Conference on Software Technology and Engineering, 2010

Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of

Research paper thumbnail of A novel approach to calculate the severity and priority of bugs in software projects

International Conference on Education Technology and Computer, 2010

Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components

Research paper thumbnail of Integrating Blockchain Technology with IoT and ML to Avoid Road Accidents Caused by Drunk Driving

Wireless Personal Communications

Research paper thumbnail of Making Toll Charges Collection Efficient and Trustless: A Blockchain-Based Approach

2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 2021

Research paper thumbnail of Stand Up for Yourself

Research paper thumbnail of Large-scale discovery of candidate type VI secretion effectors with antibacterial activity

Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject t... more Type VI secretion systems (T6SS) are common bacterial contractile injection systems that inject toxic effector proteins into neighboring cells. Effector discovery is generally done manually, and computational approaches used for effector discovery depend on genetic linkage to T6SS genes and/or sequence similarity to known effectors. We bioinformatically investigated T6SS in more than 11,832 genomes of Gram negative bacteria. We found that T6SS encoding bacteria are host-associated and pathogenic, enriched in specific human and plant tissues, while depleted in marine, soil, and engineered environments. Analysis of T6SS cores with C-terminal domains ("evolved" cores) showed "evolved" HCP are rare, overwhelmingly encoded in orphan operons, and are largely restricted to Escherichia. Using the wealth of data generated from our bioinformatic analysis, we developed two algorithms for large-scale discovery of T6SS effector proteins (T6Es). We experimentally validated ten...

Research paper thumbnail of The extracellular contractile injection system is enriched in environmental microbes and associates with numerous toxins

Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells.... more Bacteria employ toxin delivery systems to exclude bacterial competitors and to infect host cells. Characterization of these systems and the toxins they secrete is important for understanding microbial interactions and virulence in different ecosystems. The extracellular Contractile Injection System (eCIS) is a toxin delivery particle that evolved from a bacteriophage tail. Four known eCIS systems have been shown to mediate interactions between bacteria and their invertebrate hosts, but the broad ecological function of these systems remains unknown. Here, we identify eCIS loci in 1,249 prokaryotic genomes and reveal a striking enrichment of these loci in environmental microbes and absence from mammalian pathogens. We uncovered 13 toxin genes that associate with eCIS from diverse microbes and show that they can inhibit growth of bacteria, yeast or both. We also found immunity genes that protect bacteria from self-intoxication, supporting an antibacterial role for eCIS. Furthermore, we...

Research paper thumbnail of AzeR, a transcriptional regulator that responds to azelaic acid in Pseudomonas nitroreducens

Microbiology, 2019

Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria... more Azelaic acid is a dicarboxylic acid that has recently been shown to play a role in plant-bacteria signalling and also occurs naturally in several cereals. Several bacteria have been reported to be able to utilize azelaic acid as a unique source of carbon and energy, including Pseudomonas nitroreducens . In this study, we utilize P. nitroreducens as a model organism to study bacterial degradation of and response to azelaic acid. We report genetic evidence of azelaic acid degradation and the identification of a transcriptional regulator that responds to azelaic acid in P. nitroreducens DSM 9128. Three mutants possessing transposons in genes of an acyl-CoA ligase, an acyl-CoA dehydrogenase and an isocitrate lyase display a deficient ability in growing in azelaic acid. Studies on transcriptional regulation of these genes resulted in the identification of an IclR family repressor that we designated as AzeR, which specifically responds to azelaic acid. A bioinformatics survey reveals that...

Research paper thumbnail of Revidering av Strategisk plan och balanserat styrkort - Aneby kommun

Research paper thumbnail of “Reverse engineering”: Extracting information from C++ code

2010 2nd International Conference on Software Technology and Engineering, 2010

... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who hel... more ... of the department Prof. Anshu Tripathi, my project guide Prof. Abhishek Singh Rathore who helped us lot in calculating the facts and figures related to our paper. I would also like to thank Prof. JK Khatwani, Mr. Samay Mahajan ...

Research paper thumbnail of Coders Hub ML Edu. Platform Systems

Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technol... more Coders Hub ML Edu. Platform is a digital repository system for learning the most trending technology/ field - Machine Learning. A properly dimensioned ML repository has the potential to increase the interest of students in learning the latest technologies. It is an ML integrated website where students can learn different machine learning algorithms, visualize them and can even get hands-on experience on some of the models. The main objective of the study is to develop a web-based digital repository for Machine learning algorithms combined with application models of machine learning for better learning. It has various models integrated in it like handwritten digit recognition system, Sentiment Analyser and many more. One of the models is of Facial Detection. We have used the Caffe Model of the DNN Module for facial detection. Unlike other facial detection models, it not only detects the person‟s front face but also detects the side face accurately. It gives very fast fps compared to ...

Research paper thumbnail of A Brief Survey on Aspect-Oriented Modeling Methodologies

The methodology of Aspect oriented software development is the new technique to improve the modul... more The methodology of Aspect oriented software development is the new technique to improve the modularity in the area of software development. It eliminates the limitation of traditional classical approaches. It gives more emphasis on the crosscutting concern with the help of Separation. Over the last few years, several techniques of crosscutting have been introduced. In this article several existing approaches aspect oriented development have been

Research paper thumbnail of Exploring Blockchain and Smart Contract Technology for Reliable and Secure Land Registration and Record Management

The most significant issue in the government registry department is the duplicate registry of lan... more The most significant issue in the government registry department is the duplicate registry of land in the current scenario. These kinds of problems are increasing day by day by day, which necessitates the advancement of the existing registry process system. It is a manual process that a typical stamp-based or newly not secure online process (only a few places). Use of a manual process, there are many issues in the duplicate registry of a particular land. The final registry, where the landlord has a stamp paper copy and sale deed or a specific number of the property. One receipt copy at the land registry department for their record. Blockchain has emerged as a new technology to resolve or handle the above-said issue of the current system, a distributed ledger that is a timestamp and immutable. Being immutable, forgeries related to the particular land during the registry are not allowed. This concept provides trust and consensus among all entities in the network or system. In this pap...

Research paper thumbnail of A Survey on Software Bug Evaluation

International Journal of Computer Applications, 2015

The costs of erroneous software can be as of the investment in software development. Yet, the pot... more The costs of erroneous software can be as of the investment in software development. Yet, the potential to improve software quality and reduce project cost is enormous. Bug tracking and fixing can be an effective means to achieve quality i.e. error free at less cost. A System guides the maintenance activities of software developer's team who earlier, face the problem in fixing bugs. Non-availability of bug in a system in market makes fixing process difficult. Presently Bug fixing is timeconsuming and exacerbates the already high cost of software maintenance which affects scheduled performance. This paper discusses a system that evaluates bugs and assigns priority on the basis of severity to fix them efficiently. .

Research paper thumbnail of Green cloud computing: A review on Green IT areas for cloud computing environment

2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015

Research paper thumbnail of A novel approach to calculate the severity and priority of bugs in software projects

2010 2nd International Conference on Education Technology and Computer, 2010

Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components

Research paper thumbnail of An approach for extracting business rules from legacy C++ code

2011 3rd International Conference on Electronics Computer Technology, 2011

Research paper thumbnail of Reverse engineering: Journey from code to design

2011 3rd International Conference on Electronics Computer Technology, 2011

Research paper thumbnail of RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication

Communications in Computer and Information Science, 2011

... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ ... more ... Key Generation: Pick two large prime numbers p and q, p ≠ q; Calculate n = p × q Calculate Φ (n) = (p − 1) (q − 1) Pick e, so that gcd (e, Φ (n)) = 1, 1 < e < Φ (n) Calculate, so that d. e mod Φ (n) = 1, d is the multiplicative inverse of e in mod Φ (n) Get public key as PUK = {e, n ...

Research paper thumbnail of Metrics calculation for deployment process

2010 2nd International Conference on Software Technology and Engineering, 2010

Collecting software engineering data is difficult process since it involves calculation on variou... more Collecting software engineering data is difficult process since it involves calculation on various parameters such as development, testing, integration, quality assurance and deployment activity. This excerpt discusses the metric calculations for the deployment process. People that are the part of a project need to collect, maintain and update relevant data from different development processes. Due to such a complexity of

Research paper thumbnail of A novel approach to calculate the severity and priority of bugs in software projects

International Conference on Education Technology and Computer, 2010

Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount o... more Discovering and fixing software bugs is a difficult maintenance task, and a considerable amount of effort is devoted by software developers on this issue. In the world of software one cannot get rid of the bugs, fixes, patches etc. each of them have a severity and priority associated to it. There is not yet any formal relation between these components