Sonam Mahajan

Learn More
Biochemical studies to elucidate the structural basis for xyloglucan specificity among GH12 xyloglucanases are lacking. Accordingly, the substrate specificity of a GH12 xyloglucanase from Aspergillus niger (AnXEG12A) was investigated using pea xyloglucan and 12 xylogluco-oligosaccharides, and data were compared to a structural model of the enzyme. The(More)
The softwood degrading white-rot fungus, Phanerochaete carnosa, was investigated for its ability to degrade two coniferous woods: balsam fir and lodgepole pine. P. carnosa grew similarly on these wood species, and like the hardwood-degrading white-rot fungus Ceriporiopsis subvermispora, P. carnosa demonstrated selective degradation of lignin, as observed by(More)
Proteins secreted by the white-rot, softwood-degrading fungus Phanerochaete carnosa during growth on cellulose and spruce were analyzed using tandem mass spectrometry and de novo sequencing. Homology-driven proteomics was applied to compare P. carnosa peptide sequences to proteins in Phanerochaete chrysosporium using MS BLAST and non-gapped alignment. In(More)
Biodiesel is composed of fatty acid methyl esters, currently made from vegetable oils using basic catalysts. The oils must be reacted two or three times with methanol, in the presence of sodium methoxide to make products which meet the ASTM and European biodiesel standards. It is also believed that sodium hydroxide can never be used as the catalyst because(More)
Computer security relies on cryptography as a means to protect the data that we people have become increasingly reliant on. The main research in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. CUDA and OpenCL are the two(More)
This paper describes how to detect passive attack and after that provide prevention from passive attacks. For detection of passive attacks we use the concept of key loggers and the concept of registry files. For prevention from passive attacks here we use the concept of virtual keyboards and concept of NAC during online transmission of data. The major(More)
AIM To evaluate the bonding of composite to glass ionomer cement (GIC) using two different bonding systems. MATERIALS AND METHODS The occlusal surface of 30 teeth was flattened and they were divided into three groups. In Group A, composite (Filtek" Z350 XT, 3M ESPE, USA) was bonded to GIC (Fuji II, GC Corporation, Japan) after initial setting of the GIC(More)
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. The main research in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. This paper(More)