Learn More
Proteolytic enzymes have evolved several mechanisms to cleave peptide bonds. These distinct types have been systematically categorized in the MEROPS database. While a BLAST search on these proteases identifies homologous proteins, sequence alignment methods often fail to identify relationships arising from convergent evolution, exon shuffling, and modular(More)
UVI31+ is an evolutionarily conserved BolA family protein. In this study we examine the presence, localization and possible functions of this protein in the context of a unicellular alga, Chlamydomonas reinhardtii. UVI31+ in C. reinhardtii exhibits DNA endonuclease activity and is induced upon UV stress. Further, UVI31+ that normally localizes to the cell(More)
Any persistent untagged, untapped and unclassified data can be termed as dark data. It has two common traits: first, it is not possible to determine its worth, and second, in most of the scenarios it is inadequately protected. Previous work and existing solutions are restricted to cater single node system. Moreover, they perform specialized processing of(More)
Cellular metabolite analyses by (13)C-NMR showed that C. reinhardtii cells assimilate acetate at a faster rate in heterotrophy than in mixotrophy. While heterotrophic cells produced bicarbonate and CO2aq, mixotrophy cells produced bicarbonate alone as predominant metabolite. Experiments with singly (13)C-labelled acetate ((13)CH(3)-COOH or CH(3)-(13)COOH)(More)
Human-generated text passwords are vulnerable to statistical guessing attacks. The counter strategies either require building the entire system from scratch or need major rework and therefore cannot be adopted easily. In this paper, we demonstrate how a slight modification to login interface can influence users to create relatively secure text passwords. We(More)
  • Swetha Tatavarthy, Devendra Lad, +6 authors Sachin Lodha
  • 2015
Many of us share the sensitive information on various websites, due in part to the increased reliance on the internet for day-today tasks. This sensitive information might be misused or exploited. There is a need to enable internet users to specify and rank the sensitive information belonging to her. We propose Protect your Privacy (PyP), which collaborates(More)
We have investigated transcript level changes of CO2-concentrating mechanism (CCM) genes during light–dark (12 h:12 h) cycles in synchronized Chlamydomonas reinhardtii at air-level CO2. CCM gene transcript levels vary at various times of light–dark cycles, even at same air-level CO2. Transcripts of inorganic carbon transporter genes (HLA3, LCI1, CCP1, CCP2(More)
Ransomware is one of the rising malwares in the crimeware family. It encrypts the user files and demands extortion money. From the perspective of an enterprise it is very crucial to detect and stop a ransomware attack. A well studied technique is to monitor file system behavior for suspicious activity. In this work we will show the gap in the existing state(More)
Almost complete sequence specific (1)H, (13)C and (15)N resonance assignments of S114A mutant of UVI31+ from Chlamydomonas reinhardtii are reported. The cDNA of S114A mutant of UVI31+ was cloned from a eukaryotic green algae (C. reinhardtii) and overexpressed in E.coli from where the protein was purified to homogeneity. The point mutation S114A in UVI31+(More)
Phone based card payments utilize inband DTMF signaling to convey data. Since the DTMF signals are audible to a human ear, a call operator is in position to carry out a privacy attack. We investigate real-time techniques that can obfuscate the 'digit' values without deteriorating the voice quality. Furthermore, we consider a setting where the privacy(More)