Akanksha Jain

Learn More
Belady's algorithm is optimal but infeasible because it requires knowledge of the future. This paper explains how a cache replacement algorithm can nonetheless learn from Belady's algorithm by applying it to past cache accesses to inform future cache replacement decisions. We show that the implementation is surprisingly efficient, as we introduce a new(More)
This paper introduces the Irregular Stream Buffer (ISB), a prefetcher that targets irregular sequences of temporally correlated memory references. The key idea is to use an extra level of indirection to translate arbitrary pairs of correlated physical addresses into consecutive addresses in a new <i>structural address space</i>, which is visible only to the(More)
Deregulated expression of ETS transcription factors has emerged as an important event in prostate cancer pathogenesis. Here we show that the expression of epithelial-specific ETS (ESE)-3 factor is frequently reduced at the RNA and protein level in prostate cancer clinical samples compared to normal prostate. In PC3 and DU145 cells, ESE-3 was silenced by(More)
A decade since the availability of Mycobacterium tuberculosis (Mtb) genome sequence, no promising drug has seen the light of the day. This not only indicates the challenges in discovering new drugs but also suggests a gap in our current understanding of Mtb biology. We attempt to bridge this gap by carrying out extensive re-annotation and constructing a(More)
The assembly of microtubule-based cytoskeleton propels the cilia and flagella growth. Previous studies have indicated that the kinesin-2 family motors transport tubulin into the cilia through intraflagellar transport. Here, we report a direct interaction between the C-terminal tail fragments of heterotrimeric kinesin-2 and α-tubulin1 isoforms in vitro. Blot(More)
The proposed system highlights a novel approach for creating a secure steganographic method and visual cryptography for data hiding in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security towards the encrypted image. The proposed method(More)
The proposed system highlights a novel approach for creating a secure steganographic method using genetic algorithm and visual cryptography for robust encryption in computer forensics. Although there has been an extensive research work in the past, but majority of the research work has no much optimal consideration for robust security towards the encrypted(More)
A Wireless Mobile Ad-hoc Network consists of a number of mobile nodes that temporally form a dynamic infrastructure less network. To enable communication between nodes that do not have direct radio contact, each node must function as a wireless router and potential forward data traffic of behalf of the other. Detecting malicious nodes (Attacker) in an open(More)
Akanksha Jain*, Shilpi Agarwal, Manupriya Nain, Deeksha Singh Department of Pathology, Lady Hardinge Medical College, Delhi, India Verruciform xanthoma (VX) is an uncommon benign condition, which frequently affects the oral mucosa in adults. Only few cases of VX of anogenital region and skin have been reported. Clinically, it presents as a white or(More)