scispace - formally typeset
Search or ask a question
Institution

Kadi Sarva Vishwavidyalaya

EducationGandhinagar, Gujarat, India
About: Kadi Sarva Vishwavidyalaya is a education organization based out in Gandhinagar, Gujarat, India. It is known for research contribution in the topics: Matrix (chemical analysis) & Mass spectrometry. The organization has 131 authors who have published 158 publications receiving 1343 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This data indicates that HLA class II is a heterodimer consisting of an alpha (DRA) and a beta (DRB) chain and that a sequence of amino acids, termed the shared epitope, are involved in the disease process.
Abstract: Background Genetic predisposition to rheumatoid arthritis related to the presence of specific polymorphic HLA sequences has been frequently reported [1,2]. HLA class II is a heterodimer consisting of an alpha (DRA) and a beta (DRB) chain. Within the DR molecule the beta chain contains all the polymorphisms specifying the peptide binding specificities. Association studies have provided evidence that a sequence of amino acids, termed the shared epitope, are involved in the disease process [3].

1 citations

Book ChapterDOI
01 Jan 2021
TL;DR: This paper intends to make an exhaustive study on various alternatives to solve the data integrity issues in Cloud computing using blockchain technology.
Abstract: Being distributed in nature, Cloud is an in-use technology over the last decade where the data is stored on the Cloud service provider’s site where the data owner does not have direct access to the storage where her data is stored This leads to severe security issues Out of various such issues, data correctness or integrity is one of the major aspects of Cloud data storage security Researchers have been exploring the options of using blockchain technology to address the data storage correctness concern in Cloud computing Blockchain technology has provided a new dimension to address the traditional security issues in computing technologies, where every transaction is treated as an atomic operation, and once performed, it becomes immutable The transactions are stored in a block, and such blocks are linked together to form a chain through a cryptographic hash code Such chains are distributed in nature in the sense that there is no single central administrative authority to manage them, and any node in the network can verify the correctness of data or transaction In this paper, we intend to make an exhaustive study on various alternatives to solve the data integrity issues in Cloud computing using blockchain technology Being distributed, immutable, transparent, cost effective and efficient to use, blockchain is definitely a solution to many issues including Cloud data storage security problems

1 citations

Journal ArticleDOI
TL;DR: In this article, a total of 339 craters observed by the Lunar Reconnaissance Orbiter Camera (LROC) were studied, and the authors focused on measurements of diameter, depth, latitude and longitude for both known and unknown craters.
Abstract: The surface of the Moon is highly cratered due to impacts of meteorites, asteroids, comets and other celestial objects. The origin, size, structure, age and composition vary among craters. We study a total of 339 craters observed by the Lunar Reconnaissance Orbiter Camera (LROC). Out of these 339 craters, 214 craters are known (named craters included in the IAU Gazetteer of Planetary Nomenclature) and 125 craters are unknown (craters that are not named and objects that are absent in the IAU Gazetteer). We employ images taken by LROC at the North and South Poles and near side of the Moon. We report for the first time the study of unknown craters, while we also review the study of known craters conducted earlier by previous researchers. Our study is focused on measurements of diameter, depth, latitude and longitude of each crater for both known and unknown craters. The diameter measurements are based on considering the Moon to be a spherical body. The LROC website also provides a plot which enables us to measure the depth and diameter. We found that out of 214 known craters, 161 craters follow a linear relationship between depth ( d ) and diameter ( D ), but 53 craters do not follow this linear relationship. We study physical dimensions of these 53 craters and found that either the depth does not change significantly with diameter or the depths are extremely high relative to diameter (conical). Similarly, out of 125 unknown craters, 78 craters follow the linear relationship between depth ( d ) and diameter ( D ) but 47 craters do not follow the linear relationship. We propose that the craters following the scaling law of depth and diameter, also popularly known as the linear relationship between d and D , are formed by the impact of meteorites having heavy metals with larger dimension, while those with larger diameter but less depth are formed by meteorites/celestial objects having low density material but larger diameter. The craters with very high depth and with very small diameter are perhaps formed by the impact of meteorites that have very high density but small diameter with a conical shape. Based on analysis of the data selected for the current investigation, we further found that out of 339 craters, 100 (29.5%) craters exist near the equator, 131 (38.6%) are in the northern hemisphere and 108 (31.80%) are in the southern hemisphere. This suggests the Moon is heavily cratered at higher latitudes and near the equatorial zone.

1 citations

Journal ArticleDOI
TL;DR: In this article , grid-tied PV and energy storage unit base charging station design by considering different modes of operation is presented, and different operating modes of power flow among sources and EV load are designed, and the same is formulated and validated in MATLAB/Simulink.
Abstract: The electrical vehicles selling increase in last few years due to availability of charging facility. The charging station located on highways defines public EV charging station plays an important role to fast charge of electrical vehicles. In this paper, grid-tied PV and energy storage unit base charging station design by considering different modes of operation. The MPPT base boost converter is used to extract maximum power from the PV. The charging–discharging of energy storage battery design by the buck-boost converter. Five EVs battery parameters are considered to calculate real-time EV load. For the uninterrupted charging of EVs, whenever PV and energy storage power are not available or the available power does not meet load demand throughout the day, the deficient power is taken from the grid. The optimal energy flow between PV, ESU, grid, and EVs is obtained by a PI-based current control strategy. The different operating modes of power flow among sources and EV load are designed, and the same is formulated and validated in MATLAB/Simulink.

1 citations

Book ChapterDOI
01 Jan 2021
TL;DR: This paper intends to make an exhaustive survey of various researches being carried out to secure IoT networks using blockchain technology to provide a summarized view for various prospective research directions in IoT which can be addressed by blockchain technology.
Abstract: Internet of things (IoT) is seen as combinations of various communication technologies and embedded equipment such as sensors, micro-controllers, radio-frequency identification, wireless devices, etc, which work as a single unit to achieve a specific task in a smart way, ie, with less human intervention, and decisions are made automatically IoT is used in many sectors such as smart home automation, smart grids, smart cities, vehicular networks, etc Due to easy accessibility and reachability to such devices or networks, there are severe security and privacy issues in IoT User authentication, access control mechanism, confidentiality and data correctness are a few of the major concerns among them Though it looks like conventional security concerns, but due to (i) the dynamic nature of IoT, (ii) the resource-scarce nature of the devices and (iii) different standards and communication stacks involved, traditional network security countermeasures may not be applied directly to IoT In recent years, usage of blockchain technology to address various security issues, specifically data correctness, has opened up a facet for IoT to explore the option of using blockchain in IoT Researchers have started investigating the same Primitively, blockchain is a non-editable, decentralized and cryptographically secured ledger that is tolerant against byzantine failure This nature of blockchain makes it an attractive alternative to address security issues such as data integrity, entity authentication, etc Also, in an IoT environment, where devices are spread across a vast geographical area, it requires a decentralized validation mechanism that a blockchain provides In this paper, we intend to make an exhaustive survey of various researches being carried out to secure IoT networks using blockchain technology We also aim to provide a summarized view for various prospective research directions in IoT which can be addressed by blockchain technology

Authors

Showing all 133 results

Network Information
Related Institutions (5)
Shenyang Pharmaceutical University
10.3K papers, 177.1K citations

81% related

Birla Institute of Technology and Science
13.9K papers, 170K citations

78% related

Panjab University, Chandigarh
18.7K papers, 461K citations

78% related

Maharaja Sayajirao University of Baroda
6.1K papers, 101.5K citations

78% related

China Pharmaceutical University
16.2K papers, 275.9K citations

78% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20231
20224
202144
202017
20198
20187