- Sarika Tyagi
- I. Anwardeen
- G. Arunkumar
- R. Gopalan
- B. Saranya
- R. Nagendra
- R. Bhavani
- P. Shanmuga Johari
- A. Nallapa Reddy
- B. C. Jaiprakash
- S. Ravi
- K. Divya Bharathi
- M. Pal Pandi
- R. Jayalakshmi
- G. Sobanbabu
- R. Oviya
- S. T. Mehetre
- M. Paramasivam
- V. P. Santhanakrishnan
- K. K. Kumar
- M. Theradimani
- V. Ramamoorthy
- Ashok Kumar R
- S. VIJAYASANTHI
- R. AKILA
- M. AYYANDURAI
- R. KANNAN
- Research Journal of Humanities and Social Sciences
- Indian Forester
- Journal of Geological Society of India (Online archive from Vol 1 to Vol 78)
- Wireless Communication
- Journal of Academy of Dental Education
- International Journal of Engineering Research
- Journal of Biological Control
- International Journal of Computer Networks and Applications
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kannan, R.
- Teaching English Vocabulary, Grammar, Reading and Writing
Authors
1 Department of English, Fatima Michael College of Engg. and Tech., Madurai – 625 020, Tamilnadu, IN
2 School of Social Sciences and Languages, VIT University, Vellore-632 014 (Tamilnadu), IN
Source
Research Journal of Humanities and Social Sciences, Vol 4, No 2 (2013), Pagination: 242-244Abstract
Arabic language is one of the international languages, because it has Teaching vocabulary involves far more than looking up words in a dictionary and using the words in a sentence. Vocabulary is acquired incidentally through indirect exposure to words and intentionally through explicit teaching in specific words and word-learning strategies. Teaching grammar plays an essential role in every classroom. We might think that teaching grammar is just a matter of explaining grammar rules to students. Indeed, teaching grammar effectively is a much more complicated matter. As far as the teaching reading is concerned, everyday materials such as bus/train schedules, newspaper articles, advertisements, etc. become appropriate classroom materials. Reading such materials will develop communicative competence among the students. Change has been taking place due to technological developments, from pen and paper, to typewriter, to word processor, to networked computer, to design software capable of composing words, images, and sounds. These developments not only expanded the types of texts that writers produce, they also expanded immediate access to a wider variety of readers. Hence writing is an increasingly multifaceted activity. It needs to be practiced consistently in order to become a good writer. Hence, this paper attempts at explaining some methods involving in teaching vocabulary, grammar, reading and writing as they are essential parts of language teaching at every level.Keywords
Vocabulary, Grammar, Communicative Competence, Classroom Materials, ReadingReferences
- Chomsky, C. “Linguistics and philosophy”. In Language and philosophy. S. Hook (Ed.), New York: New York University Press, 1969.
- Larsen-Freeman, D. Grammar dimensions: Form, meaning, and use. Boston: Heinle and Heinle, 1997
- Strobilanthes bolampattianus Bedd. (Acanthaceae) - a Strict Endemic Species Rediscovered from Nilgiri Biosphere Reserve, Western Ghats
Authors
1 Forest Department, Tamil Nadu, IN
2 Department of Botany, Barathiar University, Coimbatore-641046, IN
3 Department of Botany, Karpagam University, Coimbatore-641021, IN
Source
Indian Forester, Vol 141, No 8 (2015), Pagination: 890-892Abstract
No Abstract.- Pleistocene-Holocene Deep Water Benthic Foraminifera, off Tuticorin Coast, Bay of Bengal
Authors
1 Center for Geoscience and Engineering, Anna University, Chennai - 600 025, IN
2 Department of Earth Sciences, University of Windsor, Windsor, Ontario, CA
3 Regional Geology Laboratory, Oil and Natural Gas Corporation Ltd , Chennai - 600 034, IN
4 Forward basin, ONGC, Tnpura Project, Badarghat Complex, Agarthala - 799 014, IN
Source
Journal of Geological Society of India (Online archive from Vol 1 to Vol 78), Vol 63, No 1 (2004), Pagination: 51-60Abstract
Twenty-four Pleistocene-Holocene deepwater benthic foramimferal species were identified based upon taxonomic criteria from a 26 m core sample collected during Academik Aleksandr Sidorenko cruise. The quantitative data of benthic foraminifera) taxa is treated statistically using multi vanate (both factor and cluster) techniques to understand the relationship between species assemblages and environmental parameters. The temporal distribution of samples in cluster II closely coincides with the distribution of higher loading values of factor 1 Similar associations were identified for cluster III with factor 2 and cluster IV with factor 3. However the faunal relative abundances along with %. Total Organic Content (TOC) values broadly divides the core into two environmentally significant zones viz, Zone 1 (between 1322 6m and 1321 6 m) which is characterised by high abundance of Cassiduhna cannata followed by Pullenia bulloides and Hoeglundina elegans having positive relationship with low TOC values ranging from 0 12 to 1 14 and Zone 2 (between 1321 6m and 1320 1 m), which is characterised by high percentages of TOC values ranging from 1 32 to 2 52, whereas Buhmina aculeata shows maximum abundance followed by Bohvina robusta, Cibiadoides kullenbergi and Osangulana culter, suggesting that these species prefer high nutrient environment.Keywords
Benthic Foraminifera, Pleistocene, Holocene, Tuticonn, Bay of Bengal.- Automatic Analog/Digital Modulation Recognition for SDR Implementation with FPAA
Authors
1 Dr. MGR University, Chennai, IN
2 Department of ECE, Dr. M.G.R. University, Chennai-600 095, IN
Source
Wireless Communication, Vol 2, No 8 (2010), Pagination: 203-207Abstract
Automatic modulation recognition for software defined radio (SDR) is a research focused on developing 3G and 4G wireless communications with adaptive modulation capability. The existing automatic modulation recognition technology does not satisfy the seamless demodulation requirement of the SDR. The design of automatic modulation recognition method with reduced computational complexity and fast processing speed is needed. The radio systems are increasingly incorporating dynamically configurable software into software defined radio (SDR) design. The ability to change software after manufacture makes SDR a perfect platform for designing Cognitive Radio (CR). The equipment must handle higher channel densities and must meet a high-availability standard to provide uninterrupted service. In addition, the equipment will be flexible to accommodate various air protocols. The statistical performance of the fast automatic modulation recognition associated with its implementation using the SDR is discussed in this work.Keywords
ASIC, FPAA, SDR.- An Interesting Case of Lower Lip Cleft with Syndromic Features
Authors
1 Department of Oral and Maxillofacial Surgery, Vinayaka Mission’s Sankarachariyar Dental College, NH -47 Sangari Mainroad, Ariyanoor, Salem - 636308, Tamil Nadu, IN
Source
Journal of Academy of Dental Education, Vol 2, No Sp (2016), Pagination: 7-10Abstract
Observation of a patient named Sanjay, a 23 year old male, revealed a case of anatomical curiosity, an uncommon variant of a developmental anomaly and masochistic habit, an atypical median mandibular cleft with distinctive facial appearance and intellectual disability. Facial gestalt is characterized by a round face, the heavy horizontal eyebrows with narrow palpebral fissures.Keywords
Mental Retardation, Over Growth Syndrome, The Median Mandibular Cleft, Tessier 30 Cleft.References
- Tessier P. Anatomical classification of facial. Cranio-Facial and Latero-Facial Clefts. Journal of Max illofacial Surgery.1976; 4:69–92.
- Kawamoto HK. Rare craniofacial clefts. In: Mc Carthy JG, editor. Plastic Surgery. W.B. Saunders; 1990. p. 2940.
- Erdogan B, Karaka C, Gorgu M, Bozkurt MA. Incomplete midline cleft of the lower lip. Eur J Plastic surgery. 1989; 12:279–80.
- Gorlin RJ, Cohen MM, Levin LS. Syndrome of the head and neck. 3rd ed. New York: Oxford University Press; 1990.
- Ranta R. Incomplete median cleft of the lower lip with cleft palate, the Pierre Robin Anomaly or hypodontia. Int J Oral Surg. 1984; 13:555–8.
- Singh I, Pal GP. Text book of human embryology, development of face nose and palate. 8th ed. 2007. p. 126–37.
- Thermal Analysis on Butt Welded Aluminium Alloy AA7075 Plate Using FEM
Authors
1 Department of Mechanical Engineering, PSNA College of Engineering and Technology, Dindigul, IN
Source
International Journal of Engineering Research, Vol 3, No 2 (2014), Pagination: 116-120Abstract
Thermo-mechanical finite element analysis has been performed to assess the residual stress in the butt weld joints of aluminium Alloy AA7075 plates by utilizing the commercial software package ABAQUS. This paper presents an efficient FE technique using equivalent load to precisely predict welding deformations and residual stresses in butt joints. The radial heat flux distribution is considered on the top surface of the weldment. Convective and radiative heat losses are taken into account through boundary conditions for the outward heat flux. Linear FE transient thermal analysis is performed using surface heat source model with Gaussian distribution to compute highest temperature in AA7075 plates. The objective of this project is to simulate the welding process by using the finite element method. After the model is built and verified, the main objective of this project is to study the effects of varying the welding process parameters on the thermo-mechanical responses. In addition to that, the aim of this research is also to find a relationship between welding parameters and the responses of single pass butt welding are evaluated through the finite element analysis. The study of this paper covers the effects of varying heat input, welding speed on the thermo-mechanical responses of the weldment after cooling down to room temperature.Keywords
Residual Stresses, Heat Flux, FEM, Al Alloy, Ansys.- Evaluation of gliotoxin phytotoxicity and gliotoxin producing Trichoderma virens for the suppression of damping off of tomato
Authors
1 Department of Plant Pathology, Agricultural College and Research Institute, Tamil Nadu Agricultural University, Madurai, Tamil Nadu, IN
2 Department of Plant Pathology, Agricultural College and Research Institute, Tamil Nadu Agricultural University, Madurai, Tamil Nadu, IN
3 Nuclear Agriculture and Biotechnology Division, Bhabha Atomic Research Centre, Mumbai, IN
4 Department of Plant Pathology, Agricultural College and Research Institute, Tamil Nadu Agricultural University, Killikulam, Tamil Nadu, IN
5 Pesticide Toxicology Laboratory, Department of Agricultural Entomology, Tamil Nadu Agricultural University, Coimbatore, Tamil Nadu, IN
6 Department of Plant Biotechnology, Tamil Nadu Agricultural University, Coimbatore, Tamil Nadu, IN
Source
Journal of Biological Control, Vol 35, No 3 (2021), Pagination: 187-195Abstract
Gliotoxin is a potent antibiotic showing antifungal activity against various phytopathogenic fungi. It is produced by Q strains of Trichoderma virens and gliotoxin non-producing strains of T. virens are designated as P strains. There is no detailed study on effect of gliotoxin on suppression of damping off of tomato caused by Pythium aphanidermatum and its phytotoxicity effect on tomato plants. Thus, the present study was carried out to assess the effect of gliotoxin on inhibition of mycelial growth of P. aphanidermatum, its phytotoxicity effect on tomato and its role on the suppression of damping off of tomato. Culture filtrates of Q strains of T. virens containing gliotoxin highly inhibited the mycelial growth of P. aphanidermatum compared to that of P strains of T. virens. Purified gliotoxin but not bis-thiomethyl gliotoxin effectively inhibited the mycelial growth of P. aphanidermatum. Tomato seeds treated with purified gliotoxin did not inhibit the germination of seeds, its ischolar_main and shoot length even at higher concentration that is at 1000 ppm (fivefold inhibitory concentration against P. aphanidermatum). Foliar spray of gliotoxin on tomato plants did not show any phytotoxic effect at lower concentration but showed scorching effect at higher concentration. Seed treatment with gliotoxin producing Q strains of T. virens showed greater suppression of damping-off tomato compared to P strains of T. virens. This study clearly showed that gliotoxin producing T. virens could be used in suppression of damping-off disease incidence in tomato.
Keywords
Bio-control, damping-off, gliotoxin, Trichoderma virens- Region Based Secured Data Transmission Protocol for Wireless Sensor Network
Authors
1 Department of Computer Science, SRMV College of Arts and Science, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 5 (2022), Pagination: 533-544Abstract
Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game- based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.Keywords
Outlier Detection Based on Region, Data Transmission, Wireless Sensor Networks, Acknowledgment, Data Aggregation, Privacy, Memory OverheadReferences
- Tomić I., Mccann J.A. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. IEEE Int. Things J. 2017;4:1910– 1923.
- Rawat P., Singh K.D., Chaouchi H., Bonnin J.M. Wireless sensor networks: a survey on recent developments and potential synergies. J.Supercomput. 2014;68:1–48.
- Zhang Z., Mehmood A., Shu L., Huo Z., Zhang Y., Mukherjee M. A survey on Fault Diagnosis in Wireless Sensor
- Networks. IEEE 2016;6:11349–11364.
- Qiu T., Qiao R., Wu D.O. EABS: An Event-Aware Backpressure Scheduling Scheme for Emergency Internet of Things. IEEE Trans.
- Mob. Comput. 2018;17:72–84.
- Qiu T., Chen N., Li K., Atiquzzaman M., Zhao W. How can heterogeneous Internet of Things build our future: A survey. IEEE Commun. Surv. Tutorials. 2018;20:2011–2027.
- Qiu T., Zheng K., Song H., Han M., Kantarci B. A local-optimization emergency scheduling scheme with self-recovery for smart grid. IEEE Trans. Ind. Inf. 2017;13:3195–3205.
- Dhurgadevi M., Devi P.M. An Analysis of Energy Efficiency Improvement through Wireless Energy Transfer in Wireless Sensor Network. Wirel. Pers. Commun. 2018;98:3377–3391.
- Chandola V., Banerjee A., Kumar V. Anomaly detection: A survey. ACM Comput. Surv. 2009;41:1–58.
- doi: 10.1145/1541880.1541882.
- Butun, I., Morgera, S. D., &Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEEcommunications surveys & tutorials, 16(1), 266-282.
- Chow, P., Rhee, W., Tehrani, A. M., &Goldburg, M. (2016). U.S.
- Patent No. 9,369,370. Washington, DC: U.S. Patent and Trademark Office.
- Kenkre, P. S., Pai, A., &Colaco, L. (2015). Real-time intrusion detection and prevention system. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 405-411). Springer, Cham.
- Krishnan, D. (2015). A distributed self-adaptive Intrusion Detection System for Mobile Ad-hoc Networks using tamper evident mobile agents. Procedia Computer Science, 46, 1203-1208.
- Ahmadifard, N., Nabizadeh, H., &Abbaspour, M. (2014). ISEFF: An ID-based scalable and efficient distributed file sharing technique in vehicular ad hoc networks. Wireless personal communications, 75(2), 821-841.
- Hadded, M., Muhlethaler, P., Laouiti, A., Zagrouba, R., &Saidane, L. A. (2015). TDMA-based MAC protocols for vehicular ad hoc networks: a survey, qualitative analysis, and open research issues. IEEE Communications Surveys & Tutorials, 17(4), 2461-2492.
- Sharma, S. K., Kumar, R., Gangwar, A., &Pakhre, K. (2014). Routing protocols and security issues in MANET: A survey. International Journal of Emerging Technology and Advanced
- Engineering,(IJETAE), 4(4), 918-924.
- Shaikh, F., & Parekh, C. (2017). A Review Paper on Intrusion Detection System in MANETs.
- Lin, W. C., Ke, S. W., & Tsai, C. F. (2015). CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based systems, 78, 13-21.
- Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., &Barde, S. S. (2017). Framework for Threat Analysis and Attack Modelling of Network Security Protocols. International Journal of Synthetic Emotions (IJSE), 8(2), 62-75.
- Gai, K., Qiu, M., Tao, L., & Zhu, Y. (2016). Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), 3049-3058.
- Mehrotra, A., Saxena, A., &Tolani, M. (2014). Performance comparison of different routing protocols for traffic monitoring
- application. International Journal of Computer Applications, 92(4).
- Srivastava, V., Tripathi, S., & Singh, K. (2020). Energy efficient optimized rate based congestion control routing in wireless sensor network. Journal of Ambient Intelligence and Humanized
- Computing, 11(3), 1325-1338.
- Kalnoor, G., &Agarkhed, J. (2016, March). QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks. In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (pp. 1-6). IEEE.
- Thangaramya, K., Kulothungan, K., Gandhi, S. I., Selvi, M., Kumar, S.
- S., &Arputharaj, K. (2020). Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, 24(21), 16483-16497.
- Jan, M. A. (2016). Energy-efficient routing and secure communication in wireless sensor networks (Doctoral dissertation).
- Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637-1658.
- Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W.
- (2016). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123-140.
- Latha, A., Prasanna, S., Hemalatha, S., &Sivakumar, B. (2019). A harmonized trust assisted energy efficient data aggregation scheme for distributed sensor networks. Cognitive Systems Research, 56, 14-22.
- Beheshtiasl, A., &Ghaffari, A. (2019). Secure and trust-aware routing scheme in wireless sensor networks. Wireless Personal
- Communications, 107(4), 1799-1814.
- Dhand, G., &Tyagi, S. S. (2019). SMEER: secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks. Wireless Personal Communications, 105(1), 17-35.
- AlFarraj, O., AlZubi, A., &Tolba, A. (2018). Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 1-11.
- V. Nagaraju, N. J. Kumar, A. M. Ali, T. B. R. Bapu and N. Partheeban, "Efficient Data Transmission Scheme using Modified Wireless Communication Protocol Design," 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), 2022, pp. 1-7, doi: 10.1109/ACCAI53970.2022.9752622.
- Khot, P. S., &Naik, U. L. (2022). Cellular automata-based optimised routing for secure data transmission in wireless sensor
- networks. Journal of Experimental & Theoretical Artificial Intelligence, 34(3), 431-449.
- Survey, identification and management of Fusarium wilt of banana in Tamirabarani tract of Southern districts of Tamil Nadu
Authors
1 Department of Plant Pathology, Agricultural College and Research Institute, Killikulam, Vallanad, Thoothukudi - 628252, Tamil Nadu, India ., IN
2 Department of Plant Pathology, Agricultural College and Research Institute, Madurai - 625104, Tamil Nadu, India ., IN
Source
Journal of Biological Control, Vol 36, No 1 (2022), Pagination: 64 - 70Abstract
In Tamil Nadu state, Thoothukudi district ranked second in banana production and especially the Tamirabarani tract of Thoothukudi and Tirunelveli districts are known for the production of various banana cultivars like Rasthali, Andhra Kozhi, Karpooravalli, Neypoovan, Poovan, Peyan and Chakkai. Among these varieties, cultivation of Rasthali faces 50-60% yield loss due to the incidence of Fusarium wilt disease. As the farmers have been practising ratooning for 6-7 year continuously which enhances the inoculum load of the pathogen and make the plantains succumb to Fusarium oxysporum f. sp. cubense (Foc). Studies carried out on different treatments in the management of Fusarium wilt of banana, Trichoderma sp. Tsp1(ALG) showed a maximum reduction of mycelial growth of Foc (72.18%) over control which was on par with Pseudomonas fluorescence 1(Pf1). Under pot culture conditions the combination of three treatments, Tsp1(ALG)+Pf1+ neem cake excelled and showed an 80% reduction of wilt incidence. A multifaceted approach comprising the application of biocontrol agents (Trichoderma sp.) + Pseudomonas sp. 1 (TNAU) and organic amendments was found to be the best management practice in containing the wilt.Keywords
Banana, fusarium wilt, internal transcribed spacer, Trichoderma spReferences
- Bancroft J. 1876. Report of the board appointed to enquire into the cause of disease affecting livestock and plants. Votes and Proceedings, Queensland.
- Cook RJ. 2000. Advances in plant health management in the twentieth century. Annu Rev Phytopathol, 38: 95-116. https://doi.org/10.1146/annurev.phyto.38.1.95 PMid:11701838
- Dennis C, Webster J. 1971. Antagonistic properties of species-groups of Trichoderma: III. Hyphal interaction. Trans Br Mycol, 57: 363-369. https://doi.org/10.1016/ S0007-1536(71)80050-5
- Dhivya M, Muthamilan, Kalaivanan R, Devrajan K, Chinnaiah C. 2017. Effect of oilcakes on the management of wilt disease of tomato caused by Fusarium oxysporum f. sp.lycopersici. Int J curr microbiol appl sci, 6: 2138-2140. https://doi.org/10.20546/ijcmas.2017.612.245
- Ghag SB. 2019. Fusarium wilt disease of banana in India: Current scenario. Agrotech, 8: 121. https://doi.
- org/10.35248/2168-9881.19.8.e121
- Golakiya BB, Bhimani MD, Akbari LF. 2018. Efficacy of different fungicides for the management of chickpea wilt (Fusarium oxysporum f. sp. ciceri). Int J Chem Stud, 6: 199-205.
- Leong SK, Latiffah Z, Baharuddin S. 2019. Molecular characterization of Fusarium oxysporum f. sp. cubense of banana. Am J Appl Sci, 6: 1301. https://doi.org/10.3844/ ajassp.2009.1301.1307
- Mohamed AA, Mak C, Liew KW, Ho HW. 2001. Early evaluation of banana plants at nursery stage for fusarium wilt tolerance. In: International workshop on the banana fusarium wilt disease, Malaysia.
- Patra S, Biswas MK. 2016. Efficacy of fungicides for the management of chickpea wilt disease caused by Fusarium oxysporum f. sp. ciceri. Int j adv res, 4: 14571461.
- Ploetz RC. 2000. Panama disease: A classic and destructive disease of banana. Plant Health Prog, 1: 10. https://doi. org/10.1094/PHP-2000-1204-01-HM
- Ploetz RC. 2006. Fusarium wilt of banana is caused by several pathogens referred to as Fusarium oxysporum f. sp. cubense. Phytopathology, 96: 653-656. https://doi.org/10.1094/PHYTO-96-0653 PMid:18943184
- Riker AJ, Riker RS. 1936. Introduction to research on plant diseases. John S. SwifCo.Inc.
- Saravanan T, Muthusamy M, Marimuthu T. 2003. Development of integrated approach to manage the Fusarial wilt of banana. Crop Prot, 22: 117-1123. https://doi.org/10.1016/S0261-2194(03)00146-7
- Schmitz H. 1930. Poisoned food technique. Ind Eng Chem Anal Ed, 2: 361-363 https://doi.org/10.1021/ ac50072a004
- Somu R, Thammaiah N, Swamy GSK, Kulkarni MS, Devappa V. 2014. In vitro evaluation of fungicides against Fusarium oxysporum f. sp. cubense. Int J Plant Prot, 7: 221-224.
- Yadav SL, Ahir RR, Rathore BS, Yadav SL. 2014. Efficacy of different fungicides and organic amendments alone and in combinations against basal rot of onion caused by Fusarium oxysporum in pot condition. Environment and Ecology, 32: 1187-1189.
- Yelmame MG, Mehta BP, Deshmukh AJ, Patil VA. 2010. Evaluation of some organic extracts in vitro to control Fusarium solanicausing chilli wilt. Int J Pharma Bio Sci, 6: 122-126.
- Yin X, Xu B, Zheng W, Wang Z, Wang BZ, Ha WH, Mao HT, Li JY, Sheng Z, Wang D, He Y, Han L, Chen S, Zhang J, Fu Y, Wang J, aJin Z. 2011. Characterisation of early events in banana roots infected with green fluorescent protein-tagged Fusarium oxysporum f. sp. cubense. Acta Hortic, 897: 371-376. https://doi.org/10.17660/ ActaHortic.2011.897.50