Akanksha Jain

Learn More
This paper introduces the Irregular Stream Buffer (ISB), a prefetcher that targets irregular sequences of temporally correlated memory references. The key idea is to use an extra level of indirection to translate arbitrary pairs of correlated physical addresses into consecutive addresses in a new <i>structural address space</i>, which is visible only to the(More)
A decade since the availability of Mycobacterium tuberculosis (Mtb) genome sequence, no promising drug has seen the light of the day. This not only indicates the challenges in discovering new drugs but also suggests a gap in our current understanding of Mtb biology. We attempt to bridge this gap by carrying out extensive re-annotation and constructing a(More)
—The proposed system highlights a novel approach for creating a secure steganographic method and visual cryptography for data hiding in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security towards the encrypted image. The proposed method(More)
Belady's algorithm is optimal but infeasible because it requires knowledge of the future. This paper explains how a cache replacement algorithm can nonetheless learn from Belady's algorithm by applying it to past cache accesses to inform future cache replacement decisions. We show that the implementation is surprisingly efficient, as we introduce a new(More)
The proposed system highlights a novel approach for creating a secure steganographic method using genetic algorithm and visual cryptography for robust encryption in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security towards the encrypted(More)
— A Wireless Mobile Ad-hoc Network consists of a number of mobile nodes that temporally form a dynamic infrastructure less network. To enable communication between nodes that do not have direct radio contact, each node must function as a wireless router and potential forward data traffic of behalf of the other. Detecting malicious nodes (Attacker) in an(More)
— Denoising of an Image is still a challenging domain in Image processing Research area. Denoising means to remove noise from an corrupted image but the challenge is to retain its edge and other details of an image. In this paper comparison of two denoising method using adaptive wiener filter and fuzzy filter in wavelet domain is done. Wavelet transforms(More)
Mucoepidermoid carcinoma (MEC) is an uncommon primary lung tumor. It usually involves large airways and presents clinically and radiologically with nonspecific features. Because of nonspecific presentation diagnosis is frequently delayed. We report the case of a 29-year-old male patient wherein a clinico-radiological consideration of tuberculosis (TB) led(More)
OBJECTIVES AND HYPOTHESIS To examine the influence of gender of the baby on exclusive breastfeeding and incidence of postnatal depression (PND). We hypothesise that in a society with a male gender bias there may be more PND and less exclusive breastfeeding of the girl child. DESIGN Prospective study. SETTING The study was conducted in an urban, tertiary(More)