581 research outputs found

    Studies on the occurrence of enteric bacteria in the estuarine waters along the Mangalore coast

    Get PDF
    Occurrence of enteric bacteria in water, sediment and shellfishes of Mulki, Pavanje, Gurpur and Netravathi estuaries of the Mangalore coast is reported. 70 water samples, 71 sediment samples and 37 shellfish samples were analysed in 18 months. Total bacterial load in sediment and shellfishes was found to be more than that in water samples. The total bacterial load was not very high. However, enterococci, particularly coliforms in sediments, water and shellfishes were found to be quite high, indicative of faecal pollution. The incidence of Salmonella spp. was recorded in all the estuaries except the Mulki estuary

    Link Quality Based Power Efficient Routing Protocol (LQ-PERP)

    Get PDF
    Recent years have witnessed a growing interest in deploying infrastructure-less, self configurable, distributed networks such as Mobile AdHoc Networks (MANET) and Wireless Sensor Networks (WSN) for applications like emergency management and physical variables monitoring respectively. However, nodes in these networks are susceptible to high failure rate due to battery depletion, environmental changes and malicious destruction. Since each node operates with limited sources of power, energy efficiency is an important metric to be considered for designing communication schemes for MANET and WSN. Energy consumed by nodes in MANET or WSN can be reduced by optimizing the internode transmission power which is uniform even with dynamic routing protocols like AODV. However, the transmission power required for internode communication depends on the wireless link quality which inturn depends on various factors like received signal power, propagation path loss, fading, multi-user interference and topological changes. In this paper, link quality based power efficient routing protocol (LQ-PERP) is proposed which saves the battery power of nodes by optimizing the power during data transmission. The performance of the proposed algorithm is evaluated using QualNet network simulator by considering metrics like total energy consumed in nodes, throughput, packet delivery ratio, end-to-end delay and jitter

    Effect of Bandwidth Scalability on System Performance in the Downlink LTE Systems

    Get PDF
    Long Term Evolution (LTE) system employs Orthogonal Frequency Division Multiple Access (OFDMA) in downlink in order to support network deployment using various system bandwidth configurations i.e., 1.4MHz, 3MHZ, 5MHz, 10MHz, 15MHz and 20MHz. The bandwidth scalability enables operator to access multiple channels to achieve higher peak data rates. Also, the bandwidth scalability allows operators to deploy LTE network with the existing spectrum or newly licensed band. Therefore the study on performance of LTE system with different bandwidth configuration becomes vital. Hence in this paper, an attempt has been made to study and compare the performance of LTE system with different spectrum configuration i.e., 1.4MHz, 3MHz, 5MHz, 10MHz, 15MHz and 20MHz for Constant Bit Rate (CBR) traffic scenario in the downlink. The performance metrics considered for simulation studies are aggregate bytes received, average throughput, average delay and average jitter

    Genotypic variation in sorghum [Sorghum bicolor (L.) Moench] exotic germplasm collections for drought and disease tolerance

    Get PDF
    Citation: Kapanigowda, M., . . . & Little, C. (2013). Genotypic variation in sorghum [Sorghum bicolor (L.) Moench] exotic germplasm collections for drought and disease tolerance. SpringerPlus, 2, 650. https://doi.org/10.1186/2193-1801-2-650Sorghum [Sorghum bicolor (L.) Moench] grain yield is severely affected by abiotic and biotic stresses during post-flowering stages, which has been aggravated by climate change. New parental lines having genes for various biotic and abiotic stress tolerances have the potential to mitigate this negative effect. Field studies were conducted under irrigated and dryland conditions with 128 exotic germplasm and 12 adapted lines to evaluate and identify potential sources for post-flowering drought tolerance and stalk and charcoal rot tolerances. The various physiological and disease related traits were recorded under irrigated and dryland conditions. Under dryland conditions, chlorophyll content (SPAD), grain yield and HI were decreased by 9, 44 and 16%, respectively, compared to irrigated conditions. Genotype RTx7000 and PI475432 had higher leaf temperature and grain yield, however, genotype PI570895 had lower leaf temperature and higher grain yield under dryland conditions. Increased grain yield and optimum leaf temperature was observed in PI510898, IS1212 and PI533946 compared to BTx642 (B35). However, IS14290, IS12945 and IS1219 had decreased grain yield and optimum leaf temperature under dryland conditions. Under irrigated conditions, stalk and charcoal rot disease severity was higher than under dryland conditions. Genotypes IS30562 and 1790E R had tolerance to both stalk rot and charcoal rot respectively and IS12706 was the most susceptible to both diseases. PI510898 showed combined tolerance to drought and Fusarium stalk rot under dryland conditions. The genotypes identified in this study are potential sources of drought and disease tolerance and will be used to develop better adaptable parental lines followed by high yielding hybrids

    Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis

    Get PDF
    The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal

    Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis

    Get PDF
    The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal
    corecore