Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sathya, R.
- Collection of Coconut Diseases Databases using ASP.Net
Abstract Views :528 |
PDF Views:538
Authors
Affiliations
1 Department of bioinformatics, Prist University, Thanjavur - 613403, Tamil Nadu, IN
2 Department of Crop Improvement Vanavarayar Institute of Agriculture, Manakkadavu, Pollachi, Coimbatore-642103, Tamil Nadu, IN
1 Department of bioinformatics, Prist University, Thanjavur - 613403, Tamil Nadu, IN
2 Department of Crop Improvement Vanavarayar Institute of Agriculture, Manakkadavu, Pollachi, Coimbatore-642103, Tamil Nadu, IN
Source
Indian Journal of Bioinformatics and Biotechnology, Vol 1, No 1 (2012), Pagination: 2-5Abstract
Coconut (Cocosnucifera) is an important multipurpose perennial oil crop of humid tropics. This crop is highly prone to various diseases cost by microbial agent such as fungi, bacteria and viruses. These diseases make the trees week and leads to reduction in yield continuously till the crop completely dies. Once the diseases starts proper, remedial measures should be taken well in time otherwise the trees may not recover and die ultimately, the loss in yield is severe and the economic loss is very great the farmer losses income completely and this in turn is a national loss. The database of various diseases may be used by the researchers and farmers do devises an appropriate and effective control measures to save the crops from damages or complete death.Keywords
Coconut Diseases, ASP.NetReferences
- Albert-Laslo, Y. Soon-Hyung and J. Hawoong (2002). Modeling the Internet’s large-scale topology-84. Proceedings of the National Academy of Sciences USA, 13382-13386.
- J.C. Arundell and N.A. Straw (2001). Hornet clearwing moth (Sesia apiformis (Clerck)) and dieback of poplars in eastern England. Arboricultural Journal. 25, 235–253.
- R.H. Arnold. (1967). A canker and foliage disease of yellow birch. Canadian Journal of Botany, 45, 783–80.
- R.W. Doane (1913).The rhinoceros beetle (Oryctes rhinoceros L.) in Samoa. Journal of Economic Entomology. 6, 437-442.
- J.L. Gressit (1953). The coconut rhinoceros beetle (Oryctes rhinoceros L.), with particular reference to the Palau Islands. Bernice P. Bishop Museum Bulletin. No. 212, 157-159.
- J.W.Kloepper, S. Tuzun and J.A. Kuć (1992). Proposed definitions related to induced diseases resistance. Biocontrol Science and Technology. 2, 349-351.
- A.S. Summanwar, S.P. Raychandhuri, K. Jagdish Chandra, Nam Prakash, S.B. Lai (1969). “Virus Associated with Coconut Wilt (Root) Disease. Current Science. 20, 208-210.
- Combining Ability Analysis of Three Line Hybrids in Rice (Oryza sativa L.) under Aerobic Condition
Abstract Views :327 |
PDF Views:1
Authors
R. Sathya
1,
S. Jebaraj
2
Affiliations
1 Department of Plant Breeding and Genetics, Vanavarayar Institute of Agriculture, Manakkadavu, Pollachi, COIMBATORE (T.N.), IN
2 Department of Plant Breeding and Genetics, Agricultural College and Research Institute, MADURAI (T.N.), IN
1 Department of Plant Breeding and Genetics, Vanavarayar Institute of Agriculture, Manakkadavu, Pollachi, COIMBATORE (T.N.), IN
2 Department of Plant Breeding and Genetics, Agricultural College and Research Institute, MADURAI (T.N.), IN
Source
International Journal of Plant Sciences, Vol 10, No 2 (2015), Pagination: 122-129Abstract
Information on the availability of genetic variability and mode of gene action are critically important for choosing effective breeding methods that result in appreciable improvement in performance under drought stress. An investigation in rice (Oryza sativa L.) was carried out subjecting six 'lines' and 15 'testers' crossed in a line × tester mating design and the 90 hybrids along with 21 parents were tested for gene action, combining ability for 19 traits under aerobic condition. Three 'lines' viz., IR79128A (L1), IR79156A (L2) and IR70369A (L4) and three 'testers' viz., IR7925A-428-2-1-1R (T4), KMP -148 (T12) and BI-33 (T15) were identified as the best general combiners. The genotype IR70369A is suggested for conversion to cytoplasmic male sterility with suitable male sterile source. The parents MAS -26, IR 7925A-428-2-1-1R and KMP-105 are recommended for testing their restorability with suitable CMS source.Keywords
Additive Genetic Variance (σ2A), Dominance Genetic Variance (σ2D), General Combining Ability Variance/Effects, Specific Combining Ability Variance/Effects, Aerobic Rice.- An Effective Security Approach for MANET using Detection Algorithm
Abstract Views :155 |
PDF Views:3
Authors
Affiliations
1 Computer Science Department, Saveetha Engineering College, Chennai - 602 105, IN
2 Information Technology Department, Saveetha Engineering College, Chennai - 602 105, IN
1 Computer Science Department, Saveetha Engineering College, Chennai - 602 105, IN
2 Information Technology Department, Saveetha Engineering College, Chennai - 602 105, IN
Source
Wireless Communication, Vol 4, No 12 (2012), Pagination: 702-707Abstract
Mobile Ad-hoc Network (MANET) is a self-configuring infrastructureless network of mobile devices connected by wireless links. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. MANET does not require any fixed infrastructure and it is capable of self configuring, these unique characteristics made MANET ideal to be deployed in a remote or mission critical area like military use or remote exploration. However, the open medium and wide distribution of nodes in MANET leave it vulnerable to various means of attacks. This paper proposes a TAODV for improving security in adhoc routing protocol. The proposed TAODV detects the network layer attacks like blackhole and wormhole attack and rectifies it by using the trust values. This proposed scheme is based on incentives and penalties depending on the behavior of the nodes in the network. The TAODV allow the source node to choose the trusted and the shortest path during the route discovery and isolate malicious node in the network.Keywords
Black Hole Attack, MANET, Security, Trust, Wormhole Attack.- Survey on Underwater Image Enhancement
Abstract Views :172 |
PDF Views:3
Authors
R. Sathya
1,
M. Bharathi
1
Affiliations
1 Electronics and Communication Engg, Kumaraguru College of Tech, Coimbatore, IN
1 Electronics and Communication Engg, Kumaraguru College of Tech, Coimbatore, IN
Source
Digital Image Processing, Vol 7, No 3 (2015), Pagination: 93-95Abstract
This survey paper deals with the methods to improve the visibility range of underwater image enhancement techniques. Normally underwater images are suffered by several factors like light scattering, color absorption, color change these leads to poor visibility and low contrast of an underwater images. Techniques used in an image enhancement are different due to the underwater environment distortions when compared to the normal image enhancement method. To rectify the problems in underwater images number of existing system is available in the survey of underwater image processing.
Keywords
Filtering and Dedoising, Image Fusion, RGB Color Model, Dehazing.- Personalized Ontology Based on Consumer Emotion and Behavior Analysis
Abstract Views :187 |
PDF Views:2
Authors
Source
Data Mining and Knowledge Engineering, Vol 6, No 1 (2014), Pagination: 17-20Abstract
This paper will document the relationship between the consumer and their behaviors. Using this technique the consumers can use the web to find the information about the product and services. Ontologism can be constructed manually using ontology but the process can be tedious. The integration of knowledge acquisition with machine learning facilitates research toward automating the ontology generation process. Many approaches have been investigated for generating ontology. These include Natural Language Processing (NLP) techniques association rule mining hierarchical clustering translation from relational databases and Formal Concept Analysis. However these techniques focus mainly on constructing concept hierarchies from text documents or relational databases. They can also be used to find groups of people with similar interests. A major problem of traditional association rule mining techniques is that each item in a transaction is considered only to either exist or not. Thus, the user's preference and interest in each transaction item cannot be precisely represented. Since the concepts of preference and interest are fuzzy data fuzzy logic can be applied. For example combine fuzzy association rule mining and case-based reasoning (CBR) to improve the quality of web access pattern prediction. The fuzzy rule set was found to perform better in prediction accuracy and rule coverage than traditional rule set.Keywords
Behavioral Tracking, Semantic Web, Knowledge Integration, Natural Language Processing.- Enhancing the Bioavailability of Iron from Mungbean (Vigna Radiata) through Simple Modifications in Cooking
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Department of Family and Community Science, Avinashilingam University, Coimbatore, IN
1 Department of Family and Community Science, Avinashilingam University, Coimbatore, IN