A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mahalakshmi, P.
- Efficacy of Organic Amendments on Wilt of Carnation (dianthus Caryophyllus L.) Caused by Fusarium Oxysporum F.sp.dianthi in Vitro
Authors
1 Department of Plant Pathology, Agricultural College and Research Institute, Madhurai T.N.
2 Department of Plant Pathology, Agricultural College and Research Institute, Madhurai T.N., IN
Source
International Journal of Plant Protection, Vol 6, No 1 (2013), Pagination: 59-61Abstract
Studies were conducted to test the effect of oil cakes and organic manures on the growth of wilt pathogen under in vitro conditions. The extracts of different oil cakes and organic manures were tested against F.oxysporum f.sp.dianthi by poisoned food technique in in vitro. Least growth of pathogen was recorded in extracts of neem cake showing excellent inhibitory effect of 80.44 per cent reduction over control. Next best in order of merit was Mahua cake (75.11%) followed by neem seed kernel extract (60%) and pungam cake (38.22%) and least by others. Among the organic manures tested, vermicompost and composted coir pith showed maximum growth inhibition of 37.56 and 36.55 per cent over control, respectively.Keywords
Carnation Wilt, Fusarium Oxysporum F.sp.dianthi, Oil Cakes, Organic Manures- Integrated Management of Rice Sheath Rot Incited by sarocladium Oryzae
Authors
1 Department of Plant Pathology, Agricultural College and Research Institute, Madhurai T.N.
2 Department of Plant Pathology, Agricultural College and Research Institute, Madhurai T.N., IN
Source
International Journal of Plant Protection, Vol 6, No 1 (2013), Pagination: 82-85Abstract
In the field trial conducted during Kharif season, spraying at booting stage (85DAS) and 15 days later with carbendazim (500 g/ha) + phosphamidon (1 lit./ha) was the most effective in reducing sheath rot disease incidence, besides giving the maximum yield. Among the plant products and antagonists, neem oil (3%) spray had the maximum efficacy in reducing the disease incidence followed by neem seed kernel extract (5%), Pseudomonas fluorescens (1 kg/ha), Bacillus subtilis (1 kg/ha), leaf extracts (10%) of Acalypha indica , Convolvulus arvensis and in the Rabi season experiment also, the same trend was observed. The maximum cost benefit ratio was recorded in P. fluorescens sprayed plots.Keywords
Rice Sheath Rot, Integrated Management, Sarocladium Oryzae- The Future and Scope of Big Data Analytics in Enhancing Agriculture Sector
Authors
1 IFET College of Engineering, Villupuram, IN
2 Computer Applications Department, IFET College of Engineering, IN
Source
Software Engineering, Vol 8, No 4 (2016), Pagination: 105-108Abstract
The expected human population is to grow upto 9 billions by 2050 is the need for food [1],[15]. Big data capability to fill the void in the existing agricultural practices to drive the increase in crop-yield to satisfy the growing need for food [11],[16].
The Broadband connectivity could be the next hurdle affecting the precision agricultural.
Technology chain, employment of ‘big data’ and Telematics services. Without connectivity adequate of the transferring ‘big data’ from cloud or machine-to-machine, inefficiencies are created.
The methodology DEA more useful to estimate the foregone societal value and farm-level profitability due to lack of broadband connectivity [18]. In addition to constraining the profitability of agricultural firms; lack of broadband connectivity limits of precision agricultural technologies is adoption that make use of or relies upon near real time connectivity.
The producers that have adequate connectivity to employ ‘big data’ and telematics will be more efficient than producers without is an excepted results. Thus, the adequate connectivity importance is can be evaluated [1].Depend on that storing of data in big data, we map the population of world and need of food of the population of world.
Using statistical analysis of big data for future population and needed food for the world are provide in statistical analysis provide by using the charts like histogram and graph [1]etc.
Keywords
Crop-Yield, Telematics Services, DEA [Data Envelopment Analysis], Statistical Analysis, Histogram, Big Data.- Soft Biometrics Based on Continuous Authentication for Standalone Workstation
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 6 (2016), Pagination: 139-142Abstract
The conventional authentication system only requests the user to provide the authorized account and password to log into the system once they start to use a computer or a terminal. However, under this authentication framework, the machine can only recognize the user’s identity from the login information. It lacks the information to know who is using it. The common drawback of the one-time authentication system, which people use in the daily life, is that when the user leaves the seat for a short break, i.e., to get some documents or have a drink, anyone can sneak up to the computer and pretend to be the authorized user to access their data, or do anything under a fake identity. Later on, nobody will know who used the computer. This kind of security defect is not acceptable in some applications with the sensitive data, for example, the banking financial record or the customer personal information, the military industry, and the business confidentiality. To avoid this disadvantage soft biometrics is used. Hence the project suggests the use of Soft biometrics for user identification .Only an authorized user can login, user id and password is used in the computer application. As soon as the login process is completed soft biometrics start functioning. In soft biometrics a webcam is used that functions in the background. A webcam continuously takes the image of the person in real time and segregates the face from the whole image. Once the face is identified it keeps track of the face. Viola Jones algorithm is used to detect the face with various postures such as movement of face, etc. The identification can also be done even with spectacles and beard and mustaches. This greatly improves the authentication process. Whenever a person moves away from his place the soft biometrics fails and looks for face. If it’s not able to find face within a short time it immediately locks the computer.