Fire alarms can save lives in a fire emergency only if people hear them. If alarm sounding device... more Fire alarms can save lives in a fire emergency only if people hear them. If alarm sounding devices are to used effectively, attention must be paid to where they are located in the building. A simple expression has been developed to calculate the attenuation of the alarm signal from a smoke detector as it propagates through a residential building, with the path viewed as a series of connected rooms. Attenuation depends on floor area and type of furnishings in each room. Corrections are applied if the house does not have forced air heating or if a number of doors are closed. The expression can be used to determine the optimum location for alarms.
2022 International Conference on Computer Science and Software Engineering (CSASE)
The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) metho... more The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. The recent advances in cloud-native microservices-based development approaches have created an API economy in the modern enterprise, the APIs act as contracts and carry business value. This publication describes an approach to designing microservices and APIs based on stakeholder needs. It describes an enterprise architecture framework for microservices-based cloud-native developments.
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous integration (CI), continuous delivery, and continuous deployment (CD). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CI/CD pipelines. Organizations are moving away from monolith applications and moving towards microservices-based architectures. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers sp...
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous integration (CI), continuous delivery, and continuous deployment (CD). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CI/CD pipelines. Organizations are moving away from monolith applications and moving towards microservices-based architectures. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers sp...
Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to clu... more Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to cluster the data. Heuristics can be very resource-intensive, if not applied properly. For substantially large data sets computational efficiencies can be achieved by reducing the input space if a minimal loss of information can be achieved. Clustering algorithms, in general, face two common problems: 1) these converge to different settings with different initial conditions and; 2) the number of clusters has to be arbitrarily decided beforehand. This problem has become critical in the realm of big data. Recently, clustering algorithms have emerged which can speedup computations using parallel processing over the grid but face the aforementioned problems. Goals: Our goals are to find methods to cluster data which: 1) guarantee convergence to the same settings irrespective of the initial conditions; 2) eliminate the need to establish the number of clusters beforehand, and 3) can be applied to ...
The yeast pheromone/filamentous growth MAPK pathway mediates both mating and invasive-growth resp... more The yeast pheromone/filamentous growth MAPK pathway mediates both mating and invasive-growth responses. The interface between this MAPK module and the transcriptional machinery consists of a network of two MAPKs, Fus3 and Kss1; two regulators, Rst1 and Rst2 (a.k.a. Dig1 and Dig2); and two transcription factors, Ste12 and Tec1. Of 16 possible combinations of gene deletions in FUS3, KSS1, RST1, and RST2 in the Σ1278 background, 10 display constitutive invasive growth. Rst1 was the primary negative regulator of invasive growth, while other components either attenuated or enhanced invasive growth, depending on the genetic context. Despite activation of the invasive response by lesions at the same level in the MAPK pathway, transcriptional profiles of different invasive mutant combinations did not exhibit a unified program of gene expression. The distal MAPK regulatory network is thus capable of generating phenotypically similar invasive-growth states (an attractor) from different molecu...
Epidemiological studies have implicated androgens in the etiology/progression of epithelial ovari... more Epidemiological studies have implicated androgens in the etiology/progression of epithelial ovarian cancer. Because normal and malignant ovarian epithelial cells are growth inhibited by transforming growth factor (TGF) beta, we tested the ability of 5alpha-dihydrotestosterone (DHT) to modulate this response and the expression of TGF-beta receptor types I and II. Cells derived from the ovarian surface epithelium of women undergoing oophorectomy (n = 7) for nonovarian indications or with a germ-line BRCA1 or 2 mutation (n = 9), and from the ascitic fluid of patients with primary ovarian cancer (n = 8) were cultured with and without DHT. Cell proliferation after TGF-beta1 or vehicle treatment was determined, and transcripts for TGF-beta receptors were measured by quantitative reverse transcription-PCR. As low levels of androgen receptor were observed in the cultures, we also measured transcript levels for steroid receptor coactivators SRC-1, ARA70, and AIB1. TGF-beta1 inhibited growth ...
Our purpose was to classify OSCCs based on their gene expression profiles, to identify differenti... more Our purpose was to classify OSCCs based on their gene expression profiles, to identify differentially expressed genes in these cancers and to correlate genetic deregulation with clinical and histopathologic data and patient outcome. After conducting proof-of-principle experiments utilizing 6 HNSCC cell lines, the gene expression profiles of 20 OSCCs were determined using cDNA microarrays containing 19,200 sequences and the BTSVQ method of data analysis. We identified 2 sample clusters that correlated with the T3-T4 category of disease (p = 0.035) and nodal metastasis (p = 0.035). BTSVQ analysis identified a subset of 23 differentially expressed genes with the lowest QE scores in the cluster containing more advanced-stage tumors. Expression of 6 of these differentially expressed genes was validated by quantitative real-time RT-PCR. Statistical analysis of quantitative real-time RT-PCR data was performed and, after Bonferroni correction, CLDN1 overexpression was significantly correlated with the cluster containing more advanced-stage tumors (p = 0.007). Despite the clinical heterogeneity of OSCC, molecular subtyping by cDNA microarray analysis identified distinct patterns of gene expression associated with relevant clinical parameters. Application of this methodology represents an advance in the classification of oral cavity tumors and may ultimately aid in the development of more tailored therapies for oral carcinoma.
Context: Enterprise Architecture (EA) is a discipline which has evolved to structure the business... more Context: Enterprise Architecture (EA) is a discipline which has evolved to structure the business and its alignment with the IT systems. One of the popular enterprise architecture frameworks is Zachman framework (ZF). This framework focuses on describing the enterprise from six viewpoint perspectives of the stakeholders. These six perspectives are based on English language interrogatives 'what', 'where', 'who', 'when', 'why', and 'how' (thus the term W5H Journalists and police investigators use the W5H to describe an event. However, EA is not an event, creation and evolution of EA challenging. Moreover, the ordering of viewpoints is not defined in the existing EA frameworks, making data capturing process difficult. Our goals are to 1) assess if W5H is sufficient to describe modern EA and 2) explore the ordering and precedence among the viewpoint concerns. Method: we achieve our goals by bringing tools from the Linguistics, focusing on ...
Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to clu... more Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to cluster the data. Heuristics can be very resource-intensive, if not applied properly. For substantially large data sets computational efficiencies can be achieved by reducing the input space if a minimal loss of information can be achieved. Clustering algorithms, in general, face two common problems: 1) these converge to different settings with different initial conditions and; 2) the number of clusters has to be arbitrarily decided beforehand. This problem has become critical in the realm of big data. Recently, clustering algorithms have emerged which can speedup computations using parallel processing over the grid but face the aforementioned problems. Goals: Our goals are to find methods to cluster data which: 1) guarantee convergence to the same settings irrespective of the initial conditions; 2) eliminate the need to establish the number of clusters beforehand, and 3) can be applied to ...
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous integration (CI), continuous delivery, and continuous deployment (CD). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CI/CD pipelines. Organizations are moving away from monolith applications and moving towards microservices-based architectures. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers sp...
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous development (CD), independent deployment, and continuous integration (CI). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CD and CI pipelines. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers speed and time to market, agility and reusability may not be guaranteed unless microservices and API'...
Fire alarms can save lives in a fire emergency only if people hear them. If alarm sounding device... more Fire alarms can save lives in a fire emergency only if people hear them. If alarm sounding devices are to used effectively, attention must be paid to where they are located in the building. A simple expression has been developed to calculate the attenuation of the alarm signal from a smoke detector as it propagates through a residential building, with the path viewed as a series of connected rooms. Attenuation depends on floor area and type of furnishings in each room. Corrections are applied if the house does not have forced air heating or if a number of doors are closed. The expression can be used to determine the optimum location for alarms.
2022 International Conference on Computer Science and Software Engineering (CSASE)
The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) metho... more The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. The recent advances in cloud-native microservices-based development approaches have created an API economy in the modern enterprise, the APIs act as contracts and carry business value. This publication describes an approach to designing microservices and APIs based on stakeholder needs. It describes an enterprise architecture framework for microservices-based cloud-native developments.
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous integration (CI), continuous delivery, and continuous deployment (CD). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CI/CD pipelines. Organizations are moving away from monolith applications and moving towards microservices-based architectures. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers sp...
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous integration (CI), continuous delivery, and continuous deployment (CD). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CI/CD pipelines. Organizations are moving away from monolith applications and moving towards microservices-based architectures. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers sp...
Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to clu... more Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to cluster the data. Heuristics can be very resource-intensive, if not applied properly. For substantially large data sets computational efficiencies can be achieved by reducing the input space if a minimal loss of information can be achieved. Clustering algorithms, in general, face two common problems: 1) these converge to different settings with different initial conditions and; 2) the number of clusters has to be arbitrarily decided beforehand. This problem has become critical in the realm of big data. Recently, clustering algorithms have emerged which can speedup computations using parallel processing over the grid but face the aforementioned problems. Goals: Our goals are to find methods to cluster data which: 1) guarantee convergence to the same settings irrespective of the initial conditions; 2) eliminate the need to establish the number of clusters beforehand, and 3) can be applied to ...
The yeast pheromone/filamentous growth MAPK pathway mediates both mating and invasive-growth resp... more The yeast pheromone/filamentous growth MAPK pathway mediates both mating and invasive-growth responses. The interface between this MAPK module and the transcriptional machinery consists of a network of two MAPKs, Fus3 and Kss1; two regulators, Rst1 and Rst2 (a.k.a. Dig1 and Dig2); and two transcription factors, Ste12 and Tec1. Of 16 possible combinations of gene deletions in FUS3, KSS1, RST1, and RST2 in the Σ1278 background, 10 display constitutive invasive growth. Rst1 was the primary negative regulator of invasive growth, while other components either attenuated or enhanced invasive growth, depending on the genetic context. Despite activation of the invasive response by lesions at the same level in the MAPK pathway, transcriptional profiles of different invasive mutant combinations did not exhibit a unified program of gene expression. The distal MAPK regulatory network is thus capable of generating phenotypically similar invasive-growth states (an attractor) from different molecu...
Epidemiological studies have implicated androgens in the etiology/progression of epithelial ovari... more Epidemiological studies have implicated androgens in the etiology/progression of epithelial ovarian cancer. Because normal and malignant ovarian epithelial cells are growth inhibited by transforming growth factor (TGF) beta, we tested the ability of 5alpha-dihydrotestosterone (DHT) to modulate this response and the expression of TGF-beta receptor types I and II. Cells derived from the ovarian surface epithelium of women undergoing oophorectomy (n = 7) for nonovarian indications or with a germ-line BRCA1 or 2 mutation (n = 9), and from the ascitic fluid of patients with primary ovarian cancer (n = 8) were cultured with and without DHT. Cell proliferation after TGF-beta1 or vehicle treatment was determined, and transcripts for TGF-beta receptors were measured by quantitative reverse transcription-PCR. As low levels of androgen receptor were observed in the cultures, we also measured transcript levels for steroid receptor coactivators SRC-1, ARA70, and AIB1. TGF-beta1 inhibited growth ...
Our purpose was to classify OSCCs based on their gene expression profiles, to identify differenti... more Our purpose was to classify OSCCs based on their gene expression profiles, to identify differentially expressed genes in these cancers and to correlate genetic deregulation with clinical and histopathologic data and patient outcome. After conducting proof-of-principle experiments utilizing 6 HNSCC cell lines, the gene expression profiles of 20 OSCCs were determined using cDNA microarrays containing 19,200 sequences and the BTSVQ method of data analysis. We identified 2 sample clusters that correlated with the T3-T4 category of disease (p = 0.035) and nodal metastasis (p = 0.035). BTSVQ analysis identified a subset of 23 differentially expressed genes with the lowest QE scores in the cluster containing more advanced-stage tumors. Expression of 6 of these differentially expressed genes was validated by quantitative real-time RT-PCR. Statistical analysis of quantitative real-time RT-PCR data was performed and, after Bonferroni correction, CLDN1 overexpression was significantly correlated with the cluster containing more advanced-stage tumors (p = 0.007). Despite the clinical heterogeneity of OSCC, molecular subtyping by cDNA microarray analysis identified distinct patterns of gene expression associated with relevant clinical parameters. Application of this methodology represents an advance in the classification of oral cavity tumors and may ultimately aid in the development of more tailored therapies for oral carcinoma.
Context: Enterprise Architecture (EA) is a discipline which has evolved to structure the business... more Context: Enterprise Architecture (EA) is a discipline which has evolved to structure the business and its alignment with the IT systems. One of the popular enterprise architecture frameworks is Zachman framework (ZF). This framework focuses on describing the enterprise from six viewpoint perspectives of the stakeholders. These six perspectives are based on English language interrogatives 'what', 'where', 'who', 'when', 'why', and 'how' (thus the term W5H Journalists and police investigators use the W5H to describe an event. However, EA is not an event, creation and evolution of EA challenging. Moreover, the ordering of viewpoints is not defined in the existing EA frameworks, making data capturing process difficult. Our goals are to 1) assess if W5H is sufficient to describe modern EA and 2) explore the ordering and precedence among the viewpoint concerns. Method: we achieve our goals by bringing tools from the Linguistics, focusing on ...
Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to clu... more Clustering is a NP-hard problem. Thus, no optimal algorithm exists, heuristics are applied to cluster the data. Heuristics can be very resource-intensive, if not applied properly. For substantially large data sets computational efficiencies can be achieved by reducing the input space if a minimal loss of information can be achieved. Clustering algorithms, in general, face two common problems: 1) these converge to different settings with different initial conditions and; 2) the number of clusters has to be arbitrarily decided beforehand. This problem has become critical in the realm of big data. Recently, clustering algorithms have emerged which can speedup computations using parallel processing over the grid but face the aforementioned problems. Goals: Our goals are to find methods to cluster data which: 1) guarantee convergence to the same settings irrespective of the initial conditions; 2) eliminate the need to establish the number of clusters beforehand, and 3) can be applied to ...
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous integration (CI), continuous delivery, and continuous deployment (CD). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CI/CD pipelines. Organizations are moving away from monolith applications and moving towards microservices-based architectures. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers sp...
Widespread adoption of agile project management, independent delivery with microservices, and aut... more Widespread adoption of agile project management, independent delivery with microservices, and automated deployment with DevOps has tremendously speedup the systems development. The real game-changer is continuous development (CD), independent deployment, and continuous integration (CI). Organizations can do multiple releases a day, shortening the test, release, and deployment cycles from weeks to minutes. Maturity of container technologies like Docker and container orchestration platforms like Kubernetes has promoted microservices architecture, especially in the cloud-native developments. Various tools are available for setting up CD and CI pipelines. Organizations can quickly accumulate hundreds of such microservices accessible via application programming interfaces (APIs). The primary purpose of these modern methodologies is agility, speed, and reusability. While DevOps offers speed and time to market, agility and reusability may not be guaranteed unless microservices and API'...
Uploads
Papers by Mujahid Sultan