Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Suresh, S. R.
- Exploration, Mine Development and Pilot Plant Operation at Gadag Gold Field, Karnataka, India
Abstract Views :218 |
PDF Views:139
Authors
R. H. Sawkar
1,
Rahul Baldota
2,
S. R. Suresh
2,
P. T. Sastri
2,
A. S. Kulageri
3,
B. R. Nagabhushan
3,
D. S. Sarma
4,
D. V. Subbarao
4,
S. Nirmal Charan
4,
S. M. Naqvi
4
Affiliations
1 Bangalore, IN
2 MSPL Ltd., Hospet, IN
3 Hutti Gold Mines Co. Ltd., Chitradurga, IN
4 National Geophysical Research Institute, Hyderabad, IN
1 Bangalore, IN
2 MSPL Ltd., Hospet, IN
3 Hutti Gold Mines Co. Ltd., Chitradurga, IN
4 National Geophysical Research Institute, Hyderabad, IN
Source
Journal of Geological Society of India (Online archive from Vol 1 to Vol 78), Vol 54, No 3 (1999), Pagination: 322-326Abstract
No Abstract.- Morphological Variability of Macrophomina phaseolina (Tassi) Goid, Causal Agent of Dry Root Rot Disease of Chickpea (Cicer arietinum L.)
Abstract Views :207 |
PDF Views:1
Authors
Affiliations
1 Department of Plant Pathology, University of Agricultural Sciences, GKVK, BENGALURU (KARNATAKA), IN
2 AICRP on Chickpea, Zonal Agricultural Research Station, (UAS, GKVK), BENGALURU (KARNATAKA), IN
3 Department of Plant Pathology, University of Agricultural Sciences, DHARWAD (KARNATAKA), IN
1 Department of Plant Pathology, University of Agricultural Sciences, GKVK, BENGALURU (KARNATAKA), IN
2 AICRP on Chickpea, Zonal Agricultural Research Station, (UAS, GKVK), BENGALURU (KARNATAKA), IN
3 Department of Plant Pathology, University of Agricultural Sciences, DHARWAD (KARNATAKA), IN
Source
International Journal of Plant Protection, Vol 8, No 1 (2015), Pagination: 69-72Abstract
To find out the best sources of nutrients for the fungal growth, different solid media were tested. Maximum radial growth was recorded on PDA and Czapek's agar with mean colony diameter of 90mm and on par with each other compared to other media tested. Carrot agar recorded maximum number of sclerotial production (48 per microscopic field) followed by PDA (46 per microscopic field) and the minimum sclerotial production was observed in Czapek's agar (39.33 per microscopic field). PDA and carrot media supported good mycelial growth and sclerotia production. The maximum sclerotial size was observed in PDA (0.5×0.4 μm) whereas Czapek's agar recorded minimum size of sclerotia (0.3×0.2 μm). Ellipsoidal shape of sclerotia was observed in Czapek's agar whereas, irregular shaped sclerotia were observed in other media. Maximum dry mycelial weight was recorded eighth day of incubation (150mg).Keywords
Chickpea, Macrophomina phaseolina, Sclerotia, Solid Media.- Estimation of Yield Loss in Sunflower Due to New Sunflower Leaf Curl Virus Disease at Different Stages of Crop Growth
Abstract Views :196 |
PDF Views:1
Authors
Affiliations
1 Department of Plant Pathology, University of Agricultural Sciences, RAICHUR (KARNATAKA), IN
2 Department of Plant Pathology, University of Agricultural Sciences, DHARWAD (KARNATAKA), IN
1 Department of Plant Pathology, University of Agricultural Sciences, RAICHUR (KARNATAKA), IN
2 Department of Plant Pathology, University of Agricultural Sciences, DHARWAD (KARNATAKA), IN
Source
International Journal of Plant Protection, Vol 8, No 1 (2015), Pagination: 138-141Abstract
An experiment was carried out to assess the crop loss due to sunflower leaf curl virus (SuLCV) disease. The crop loss assessment in terms of growth and yield components was recorded at first appearance of symptoms of SuLCV at 30 days to 90 days during the crop growth. The SuLCV disease infection in sunflower significantly affected the plant height (72.60 to 157cm), size of the head (8.60 to 18.78cm), 100 seed weight (2.20 to 6.32g), oil content (31.24% to 38.26%), and weight of seeds/10 heads (77.20 to 372.2g) as compared to the healthy control plants. In the plants, first appearance of symptoms at 30 DAS was recorded the seed yield loss of 79.25 per cent.Keywords
Sunflower, SuLCV, Yield Loss Estimation, Yield Components.- An Electronic Digital Library Using Integrated Security Methods and Cloud Storages
Abstract Views :146 |
PDF Views:1
Authors
Affiliations
1 Principal, Sriram College of Arts and Science, Chennai, IN
1 Principal, Sriram College of Arts and Science, Chennai, IN
Source
International Journal of Advanced Networking and Applications, Vol 13, No 1 (2021), Pagination: 4839-4844Abstract
In earlier days, the customer retrieved library materialized structured information are difficult due to enormous database acted in particular location. This paper deals the privacy and security concern includes threats, attacks, data integrity, data leakage, data availability, loss of control, vulnerability and flaws during distribution of services, resources and information. This technique verifies customer verification and validation between cloud clients and cloud providers. Storing the library information system in digital manner is essential through cloud technologies. As an outcome, library consumers can access resources from outside of physical library using cloud methods. This proposed method enforces the use control and access log technique to reduce the data leakage, improve the efficiency and user privacy of the confidential information. It evaluates the several challenges and issues of cloud such as user authentication, data availability, data confidentiality in a cloud environment. This paper depicted the various investigation reports and reviews of various researchers on electronic digital information based library and its resources by cloud methods and storages. This system provides a scheme of a cloud storages functional construction for building knowledge based digital library. Client’s confidential data are stored in global data center storage and numerous local data centers through redundant array of independent disk method in this cloud environment that leads to recovery from the user control and data leakage. This new innovative flexible system delivers the combination of methods like multi-level security with data availability on dissimilar storages, encryption and decryption technique with customer verification and validation method. The electronic digital library resources and services create novel development in scheme of multiple storages with respect to information access and distribution of confidential data in cloud. The multiple cloud storage architecture for digital electronic library offers data handling, speedy transmission of information and linking of communication among library patrons and cloud providers. It will endorse the maturity level from official level members to higher administrate that meet user request and identify the defensible development of knowledge based digital library system. This capable digital library system maintains the cloud computing environment with better performance evaluation. This functional structure progressively established electronic digital library knowledge management by means of user participation. This digital library using multiple cloud storage implementations creates well organized data integration, reduced cost, accessible any-where at any time of services and resources, scalability, elasticity and portability. Furthermore, cloud security and privacy enquiries know the ability of the adaptable digital library system using cloud computing techniques and extent abundant effectiveness with protected cloud environment.Keywords
Digital Library, Authentication, Cloud Storage, Data Integrity, Security, Privacy.References
- Guoman Lin, “Research on Electronic Data Security Strategy Based on Cloud Computing”, 2012 IEEE second International conference on Consumer Electronics,ISBN: 978-1-4577-1415-3, pp.1228-1231, 2012.
- Akhil Behl, Kanika Behl, “An Analysis of Cloud Computing Security Issues”, 2012 IEEE proceedings World Congress on Information and Communication Technologies, ISBN: 978-1-4673-4805-8, pp.109-114.2012.
- Uma Somani, Kanika Lakhani, Manish Mundra, ”Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), ISBN: 978-1-4244-7674-9, pp.211-216, 2010.
- Akhil Behl,” Emerging Security Challenges in Cloud Computing”, 2011 IEEE, ISBN: 978-1-4673-0126-8, pp.217-222,2011.
- S.Srinivasan, K.Raja, “Preventing Cloud Attacks using Bio-Metric Authentication in Cloud Computing”, Indian Journal of Science and Technology, Vol9(23), : 10.17485 ijst/2016/ v9i23/88322, June 2016
- Liu, C., Zhao, X. M., & Liu, Y.(2013). Building of cloud computing in university employment information library. Journal of Convergence Information Technology, 8(6), 434-441, 2013.
- Liu, W., & Cai, H. H.(2013). Embracing the shift to cloud computing: Knowledge and skills for systems librarians. OCLC Systems and Services, 29(1), 22-29, 2013.
- Nandzik, J. et al, (2013). Contentus-technologies for next generation multimedia libraries:Automatic multimedia processing for semantic search. Multimedia Tools and Applications, 63(2), 287-329,2013..
- Shafi, M. , Balraj, B., & Kumar, S.(2012). Cloud computing solutions: Library perspectives.International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012; Dubai; United Arab Emirates; 8 December 2012 through 10 December 2012; Code 96492,2012.
- Singh, S.P., & Veralakshmi, R. S. R. (2012). Cloud computing: A promising economic model for library and information centers. DESIDOC Journal of Library and Information Technology, 32(6), 526-532,2012.
- Wang, P. Y., et al.(2012). A duplication software for cloud-based web site: An example of Google sites. 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012; Phuket; Thailand; 24 July 2012 through 26 July 2012; Category numberE4821; Code 93137.,2012.
- Abidi, F. , Abidi, H.J., & Armani, S. (2012). Cloud libraries: A novel application of cloud computing. 2012 International Conference on Education and e-Learning Innovations, ICEELI 2012.
- Bansode, S.Y., & Pujar, S.M.(2012). Cloud computing and libraries. DESIDOC Journal of Library and Information Technology, 32(6), 506-512,2012.
- Huang, M. & Du, W.(2011). A service chain for digital library based on cloud computing. Advances in Intelligent and Soft Computing. 123, 261-266,2011.
- Chun, Y. (2010). Tactics for the library service based on the cloud service. Proceedings of the International Conference on E-Business and E-Government, Guangzhou; China; 7 May 2010 through 9 May 2010; Category numberE3997; Code 82349,2010.
- Decman, M. & Vintar, M. (2013), “A possible solution for digital preservation of e-government: A centralised repository within a cloud computing framework”, Aslib Proceedings, 65 (4), 406 – 424,2013.
- Srinivasan. S, K.Raja,” An Advanced Dynamic Authentic Security Method for Cloud Computing”, In: Bokhari M., Agrawal N., Saini D. (eds) Cyber Security - Advances in Intelligent Systems and Computing(AISC) Book Series, Volume 729, (pp.143-152), Springer, Singapore, June 2018.
- Akhil Behl, ”Emerging Security Challenges in Cloud Computing”, 2011 IEEE, ISBN: 978-1-4673-0126-8, pp.217-222,2011.
- Decman, M. & Vintar, M. (2013), “A possible solution for digital preservation of e-government: A centralised repository within a cloud computing framework”, Aslib Proceedings, 65 (4), 406- 424,2013.
- Ramya.D, Dr.Raja.K, and Srinivasan.S, “An analysis of third party auditing techniques in cloud computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue No.11, November 2014.
- Srinivasan.S, K. Raja, “An Innovative Adaptive Method for Reducing Vulnerabilities and Flaws in Cloud Computing Environment”, International Journal of Applied Engineering and Research, Vol.10, No.17,2015.
- Prof. Jay Dave; Dr. Dhaval Vyas, “Multi- Level Data Security Model for Big Data on Public Cloud: A New Model”, International Journal of Advanced Networking and Applications (IJANA) Volume: 09 Issue: 06 Pages: 3654-3657 (2018) ISSN: 0975-0290