2,711 research outputs found

    Effect of Various Irrigation Methods on Growth, Flowering and Yield of Tuberose (Polyanthes tuberosa Linn.)

    Get PDF
    Tuberose flower has very good fragrance and is suitable for loose and cut flowers. Although crop improvement has been researched upon in various institutes and state agricultural universities, irrigation management in this crop has not been given much emphasis. This factor is important and crucial in crop production. A field trial was conducted at Precision Farming Development Centre, Rahuri, with the objective of studying performance of tuberose cv. Suvasini Double under three irrigation systems, viz., drip, micro-sprinkler and surface irrigation (conventional method). Irrigation through drip and micro-sprinkler was applied at 0.85 PE; and in the conventional method of irrigation, the interval was set at 60 mm CPE with 6 cm depth of irrigation. Micro-sprinkler system proved to be the best and gave a flower yield of 6.77 lakh spikes/ ha with better flower quality, than drip or surface method of irrigation. B:C ratio was also higher under micro-sprinkler (2.68 )

    Antimicrobial activity of the marine actinomycetes

    Get PDF
    Antibacterial activity of 107 marine actinomycetes isolated form near sea shore sediment and seawater from Konkan   coast of Maharashtra was studied. A total 107 actinomycetes were subjected to primary screening by perpendicular streak method against various test microorganisms. Among 107 actinomycetes 22,14,34,14,07,52,27 and 6 number of actinomycetal  isolates were antagonistic against Bacillus  subtilis, Staphylococcus aureus, Proteus vulgaris ,Escherichia  coli, Klebsiella aerogenes , Pseudomonas  aeruginosa.,Candida albicans  and  Aspergillus. niger respectively. Out of 107 actinomycetal isolates 13 isolates showing maximum antagonistic activities that were subjected for the secondary screening by agar well method. Finally 0 5 isolates were selected for further study on the basis of maximum zone of inhibition and broad spectrum activity. Selected 05 isolates were inoculated in glucose soybean broth 7 days at 300C and antibacterial substances were extracted with ethyl acetate.T L C of the ethyl acetate extract was carried out using N butanol : acetic acid : water  ( 4:1:5 ) as a solvent system. Spots were observed under UV light and in iodine chamber. Bioautograhy of ethyl acetate extract of selected 05 isolates were carried using test organisms B. subtilus and P. vulgaris. Inhibition zones were observed and they were associated with the purple spots at the chromatograms as detected under UV light. This may indicate the same compound was responsible for the antibacterial activity of the actinomycetes.Finaly one potent   actinomycetal isolate (GA-22) was selected and it’s morphological, cultural, physiological and biochemical characters was studied.   It was found that biochemically GA-22 was very active marine actinomycetes it was able to produce variety of enzymes and utilize number of sugars

    Facile fabrication of lateral nanowire wrap-gate devices with improved performance

    Full text link
    We present a simple fabrication technique for lateral nanowire wrap-gate devices with high capacitive coupling and field-effect mobility. Our process uses e-beam lithography with a single resist-spinning step, and does not require chemical etching. We measure, in the temperature range 1.5-250 K, a subthreshold slope of 5-54 mV/decade and mobility of 2800-2500 cm2/Vscm^2/Vs -- significantly larger than previously reported lateral wrap-gate devices. At depletion, the barrier height due to the gated region is proportional to applied wrap-gate voltage.Comment: 3 pages, 3 figure

    Study of Reversible Scheme for Data Hiding

    Get PDF
    Web is the prominent correspondence media now a days yet message exchange over the web is confronting a few issue, for example, copyright control, information security, information, confirmation and so forth. Information stowing away assumes a critical part in information security. It is a procedure in which mystery information or data is put away or covered up into cover media. Thus many explores are advancing on the field like web security, steganography, and cryptography. At the point when exchange the safe or private information over a shaky channel it is expected to encode cover or unique information and after that insert the protected information into that unique or, on the other hand cover picture

    Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. A cover image is fused with secret image; fused image is divided into n shares. k possible shares able to construct secret image. PSNR parameter are used for image quality The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database

    A Review on an Authentication System using Secret Sharing

    Get PDF
    Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database

    Psoas abscess due to mycobacterium tuberculosis: a case report

    Get PDF
    Iliopsoas abscess (IPA), a collection of pus in the iliopsoas compartment that has traditionally been classified into primary and secondary according to its origin, is an infrequent condition worldwide. Mostly active TB is confined to the lung, but approximately 15% are extrapulmonary. The most common types of extrapulmonary TB are, in descending order of frequency, pleural, lymphatic, bone and joint, genitourinary, miliary disease, meningitis, and peritonitis. Tuberculosis (TB) remains as one of the leading opportunistic infection in patients in developing countries. Here we report a rare case of psoas abscess of tubercular origin in patient who presented with back pain and limping. Diagnosis is done based on history, physical examination, plain radiology, microbiological investigation and CT scan of abdomen which revealed a large psoas abscess caused by M. tuberculosis. Patient was diagnosed as psoas abscess due to Mycobacterium tuberculosis and treated empirically with DOTS category I and significant functional improvement was noted on follow up
    • …
    corecore