Papers by Saurabh Upadhyay

Phytotherapy Research, 2020
The COVID‐19 disease caused by the SARS‐CoV‐2 has emerged as a worldwide pandemic and caused huge... more The COVID‐19 disease caused by the SARS‐CoV‐2 has emerged as a worldwide pandemic and caused huge damage to the lives and economy of more than hundred countries. As on May 10, 2020, more than 4,153,300 people stand infected from the virus due to an unprecedented rate of transmission and 282,700 have lost their lives because of the disease. In this context, medicinal plants may provide a way to treat the disease by targeting specific essential proteins of the virus. We screened about 51 medicinal plants and found that Tea (Camellia sinensis) and Haritaki (Terminalia chebula) has potential against SARS‐COV‐2 3CLpro, with an IC50 for Green Tea as 8.9 ± 0.5 μg/ml and Haritaki 8.8 ± 0.5 μg/ml. The in‐silico studies suggested that Tea component Thearubigins binds to the cysteine 145 of protease active site and could be a pharmacoactive molecule. We predict that the inhibition in protease activity may be able to halt the SARS‐CoV‐2 replication cycle and therefore, we propose Green Tea, Bla...

International Journal of Biological Macromolecules, 2020
The COVID-19 pandemic caused by SARS-CoV-2 has emerged as a global catastrophe. The virus require... more The COVID-19 pandemic caused by SARS-CoV-2 has emerged as a global catastrophe. The virus requires main protease for processing the viral polyproteins PP1A and PP1AB translated from the viral RNA. In search of a quick, safe and successful therapeutic agent; we screened various clinically approved drugs for the in-vitro inhibitory effect on 3CL Pro which may be able to halt virus replication. The methods used includes protease activity assay, fluorescence quenching, surface plasmon resonance (SPR), Thermofluor® Assay, Size exclusion chromatography and in-silico docking studies. We found that Teicoplanin as most effective drug with IC 50~1 .5 μM. Additionally, through fluorescence quenching Stern-Volmer quenching constant (K SV) for Teicoplanin was estimated as 2.5 × 10 5 L•mol −1 , which suggests a relatively high affinity between Teicoplanin and 3CL Pro protease. The SPR shows good interaction between Teicoplanin and 3CL Pro with K D~1 .6 μM. Our results provide critical insights into the mechanism of action of Teicoplanin as a potential therapeutic against COVID-19. We found that Teicoplanin is about 10-20 fold more potent in inhibiting protease activity than other drugs in use, such as lopinavir, hydroxychloroquine, chloroquine, azithromycin, atazanavir etc. Therefore, Teicoplanin emerged as the best inhibitor among all drug molecules we screened against 3CL Pro of SARS-CoV-2.
Journal of Alloys and Compounds, 2018
, Optimization of dot layer periodicity through analysis of strain and electronic profile in vert... more , Optimization of dot layer periodicity through analysis of strain and electronic profile in vertically stacked InAs/GaAs Quantum dot heterostructure,
IEEE Robotics and Automation Letters, 2018
This paper considers the existence and synthesis of four parameters logistic paths inside a passa... more This paper considers the existence and synthesis of four parameters logistic paths inside a passage comprised of annular sectors. As the main result, we derive an analytic condition obtaining minimum number of path segments that ensure (1) existence of the path, (2) continuous-curvature variation, and (3) path confinement within the passage. Case studies highlight the viability and design aspect of the proposed method.
IEEE Robotics and Automation Letters, 2016
Continuous-curvature path planning with obstacle avoidance is considered. Two path shapes , namel... more Continuous-curvature path planning with obstacle avoidance is considered. Two path shapes , namely, S and half-S shapes derived from Four Parameter Logistic curves are proposed as solution paths. Closed-form analytic conditions are derived for avoiding rectangular and circular obstacles. Using the zero end curvature property of the proposed paths, a complete path planner is presented joining the individual paths. An analytic bound on the maximum curvature of the paths is derived. A comparison is carried out with existing smooth path planning methodologies based on number of design parameters, complexity in obstacle avoidance and nature of computations involved. The work highlights the use of logistic curves as a novel, analytically feasible, and applicable path planning methodology.
Smooth Trajectory Planning for MAVs with Airspace Restrictions
AIAA Guidance, Navigation, and Control Conference, 2016
A Brief Survey on Video Authentication
International Journal of Scientific Research, 2012
Though the immense development in digital information technology has brought us in the era of pow... more Though the immense development in digital information technology has brought us in the era of powerful information, we are having some severe challenging issues related with information. One of them is the cred- ibility of information. Today, editing or modifying the content of a digital video can be done efficiently and seamlessly. In this paper we present a brief survey on video authentication. We have also discussed the video authentication regarding robustness. Further we have classified the existing video authentication techniques and explained with their short coming. Moreover the difficult scenarios for video authentication have also given by us.

Algorithms and Applications
With the innovations and development in sophisticated video editing technology, it is becoming in... more With the innovations and development in sophisticated video editing technology, it is becoming increasingly significant to assure the trustworthiness of video information. Today digital videos are also increasingly transmitted over non-secure channels, such as the Internet. Therefore, in surveillance, medical, and various other fields, video content must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks; we propose a novel authentication technique that uses an intelligent approach for video authentication. This book chapter presents an intelligent video authentication algorithm using support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 4000 tampered and non-tampered video frames and gives excellent results with 95% classification accuracy. The authors discuss a vast diversity of tampering attacks, which can be possible for video sequences. Their algorithm gives very good results for almost all kinds of tampering attacks.

Research Developments in Biometrics and Video Processing Techniques
With the growing innovations and emerging developments in sophisticated video editing technology,... more With the growing innovations and emerging developments in sophisticated video editing technology, it is becoming highly desirable to assure the credibility and integrity of video information. Today digital videos are also increasingly transmitted over non-secure channels such as the Internet. Therefore, in surveillance, medical, and various other fields, video contents must be protected against attempts to manipulate them. Video authentication has gained much attention in recent years. However, many existing authentication techniques have their own advantages and obvious drawbacks. The authors propose a novel authentication technique that uses an intelligent approach for video authentication. This chapter presents an intelligent video authentication algorithm for raw videos using a support vector machine, which is a non-linear classifier, and its applications. It covers both kinds of tampering attacks, spatial and temporal. It uses a database of more than 2000 tampered and non-tampe...
A switched-boost topology for renewable power application
2010 Conference Proceedings IPEC, 2010
Abstract This paper proposes a novel switched-boost converter suitable for microgrid application.... more Abstract This paper proposes a novel switched-boost converter suitable for microgrid application. The proposed converter can provide a DC output, which is greater than the input voltage. Apart from a DC, it can be, simultaneously, used to supply an AC load. In order to ...
Learning based video authentication using statistical local information
2011 International Conference on Image Information Processing, 2011
Abstract With the innovations and development in sophisticated video editing technology, it is be... more Abstract With the innovations and development in sophisticated video editing technology, it is becoming increasingly significant to assure the trustworthiness of video information. Today digital videos are also increasingly transmitted over non secure channels such as ...

International Journal of Computer Science & Engineering Survey, 2011
With the innovations and development in sophisticated video editing technology and a wide spread ... more With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly classified into four categories: digital signature based techniques, watermark based techniques, intelligent techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.
A Wide Bandwidth Electronic Load
IEEE Transactions on Industrial Electronics, 2012
Abstract Electronic load (E-Load) is commonly used to test power supplies. In order to test compu... more Abstract Electronic load (E-Load) is commonly used to test power supplies. In order to test computer power supplies, the ELoad must possess an ideal controlled current source property which draws a desired load current even in the case of a very low terminal ...
Derivation and characterization of switched-boost inverter
Power Electronics and …, 2011
Z-source inverter (ZSI) employs an LC impedance network between the main inverter bridge and the ... more Z-source inverter (ZSI) employs an LC impedance network between the main inverter bridge and the power source. This impedance network consists of two inductors and two capacitors, which causes significant increase in the size of the power converter. ...
Video authentication using relative correlation information and SVM
Studies in Computational Intelligence, 2008
Summary. Video authentication is often presented as evidence in many criminal cases. Therefore, t... more Summary. Video authentication is often presented as evidence in many criminal cases. Therefore, the authenticity of the video data is of paramount interest. This paper presents an intelligent video authentication algorithm using support vector machine. The proposed ...
Uploads
Papers by Saurabh Upadhyay