2,733 research outputs found
Effect of Various Irrigation Methods on Growth, Flowering and Yield of Tuberose (Polyanthes tuberosa Linn.)
Tuberose flower has very good fragrance and is suitable for loose and cut flowers. Although crop improvement has been researched upon in various institutes and state agricultural universities, irrigation management in this crop has not been given much emphasis. This factor is important and crucial in crop production. A field trial was conducted at Precision Farming Development Centre, Rahuri, with the objective of studying performance of tuberose cv. Suvasini Double under three irrigation systems, viz., drip, micro-sprinkler and surface irrigation (conventional method). Irrigation through drip and micro-sprinkler was applied at 0.85 PE; and in the conventional method of irrigation, the interval was set at 60 mm CPE with 6 cm depth of irrigation. Micro-sprinkler system proved to be the best and gave a flower yield of 6.77 lakh spikes/ ha with better flower quality, than drip or surface method of irrigation. B:C ratio was also higher under micro-sprinkler (2.68 )
Antimicrobial activity of the marine actinomycetes
Antibacterial activity of 107 marine actinomycetes isolated form near sea shore sediment and seawater from Konkan  coast of Maharashtra was studied. A total 107 actinomycetes were subjected to primary screening by perpendicular streak method against various test microorganisms. Among 107 actinomycetes 22,14,34,14,07,52,27 and 6 number of actinomycetal isolates were antagonistic against Bacillus subtilis, Staphylococcus aureus, Proteus vulgaris ,Escherichia coli, Klebsiella aerogenes , Pseudomonas aeruginosa.,Candida albicans and Aspergillus. niger respectively. Out of 107 actinomycetal isolates 13 isolates showing maximum antagonistic activities that were subjected for the secondary screening by agar well method. Finally 0 5 isolates were selected for further study on the basis of maximum zone of inhibition and broad spectrum activity. Selected 05 isolates were inoculated in glucose soybean broth 7 days at 300C and antibacterial substances were extracted with ethyl acetate.T L C of the ethyl acetate extract was carried out using N butanol : acetic acid : water ( 4:1:5 ) as a solvent system. Spots were observed under UV light and in iodine chamber. Bioautograhy of ethyl acetate extract of selected 05 isolates were carried using test organisms B. subtilus and P. vulgaris. Inhibition zones were observed and they were associated with the purple spots at the chromatograms as detected under UV light. This may indicate the same compound was responsible for the antibacterial activity of the actinomycetes.Finaly one potent  actinomycetal isolate (GA-22) was selected and it’s morphological, cultural, physiological and biochemical characters was studied.  It was found that biochemically GA-22 was very active marine actinomycetes it was able to produce variety of enzymes and utilize number of sugars
Facile fabrication of lateral nanowire wrap-gate devices with improved performance
We present a simple fabrication technique for lateral nanowire wrap-gate
devices with high capacitive coupling and field-effect mobility. Our process
uses e-beam lithography with a single resist-spinning step, and does not
require chemical etching. We measure, in the temperature range 1.5-250 K, a
subthreshold slope of 5-54 mV/decade and mobility of 2800-2500 --
significantly larger than previously reported lateral wrap-gate devices. At
depletion, the barrier height due to the gated region is proportional to
applied wrap-gate voltage.Comment: 3 pages, 3 figure
Recommended from our members
Design Principles for Two-Dimensional Molecular Aggregates Using Kasha's Model: Tunable Photophysics in Near and Short-Wave Infrared
Technologies
which utilize near-infrared (700 – 1000 nm) and short-wave infrared (1000 –
2000 nm) electromagnetic radiation have applications in deep-tissue imaging,
telecommunications and satellite telemetry due to low scattering and decreased
background signal in this spectral region. It is therefore necessary to develop
materials that absorb light efficiently beyond 1000 nm. Transition dipole
moment coupling (e.g. J-aggregation) allows for redshifted excitonic states and
provides a pathway to highly absorptive electronic states in the infrared. We present aggregates of two cyanine dyes whose
absorption peaks redshift dramatically upon aggregation in water from ~800
nm to 1000 nm and 1050 nm respectively with sheet-like morphologies and high
molar absorptivities (e ~ 105 M-1cm-1). We use Frenkel exciton theory to extend
Kasha’s model for J and H aggregation and describe the excitonic states of
2-dimensional aggregates whose slip is controlled by steric hindrance in the
assembled structure. A consequence of the increased dimensionality is the
phenomenon of an intermediate “I-aggregate”, one which redshifts yet displays
spectral signatures of band-edge dark states akin to an H-aggregate. We
distinguish between H-, I- and J-aggregates by showing the relative position of
the bright (absorptive) state within the density of states using temperature
dependent spectroscopy. I-aggregates hold potential for applications as charge
injection moieties for semiconductors and donors for energy transfer in NIR and
SWIR. Our results can be used to better design chromophores with predictable
and tunable aggregation with new photophysical properties
Study of Reversible Scheme for Data Hiding
Web is the prominent correspondence media now a days yet message exchange over the web is confronting a few issue, for example, copyright control, information security, information, confirmation and so forth. Information stowing away assumes a critical part in information security. It is a procedure in which mystery information or data is put away or covered up into cover media. Thus many explores are advancing on the field like web security, steganography, and cryptography. At the point when exchange the safe or private information over a shaky channel it is expected to encode cover or unique information and after that insert the protected information into that unique or, on the other hand cover picture
Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. A cover image is fused with secret image; fused image is divided into n shares. k possible shares able to construct secret image. PSNR parameter are used for image quality The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database
A Review on an Authentication System using Secret Sharing
Security using Authentication system is an important concern in the field of information technology. It is an important thing as per as concern to the ruling of internet over people today. The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. This New threats, risks and vulnerabilities emphasize the need of a strong authentication system. The cryptography is a secret sharing scheme where a secret data gets divided into number of pieces called shares and not a single share discloses any information about secret data. There are some automated methods to identify and verify the user based on the physiological characteristics. To deal with such methods, there is a technology called biometrics which measures and statistically analyses the biological data. The biometric samples which are stored in the database as a secret are unique for each user so that no one can predict those samples. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses more than one factor for authentication. There is some difficulty with authentication systems such as user privacy considerations in case of multiple biometric features, huge size databases and centralized database which may create security threats. To address such tribulations, the Authentication System using Secret Sharing is proposed, Secret sharing splits the centralized database across the different locations. This helps in reducing the database size and removal of threats in centralized database. Also user privacy is maintained due to the decentralized database
Psoas abscess due to mycobacterium tuberculosis: a case report
Iliopsoas abscess (IPA), a collection of pus in the iliopsoas compartment that has traditionally been classified into primary and secondary according to its origin, is an infrequent condition worldwide. Mostly active TB is confined to the lung, but approximately 15% are extrapulmonary. The most common types of extrapulmonary TB are, in descending order of frequency, pleural, lymphatic, bone and joint, genitourinary, miliary disease, meningitis, and peritonitis. Tuberculosis (TB) remains as one of the leading opportunistic infection in patients in developing countries. Here we report a rare case of psoas abscess of tubercular origin in patient who presented with back pain and limping. Diagnosis is done based on history, physical examination, plain radiology, microbiological investigation and CT scan of abdomen which revealed a large psoas abscess caused by M. tuberculosis. Patient was diagnosed as psoas abscess due to Mycobacterium tuberculosis and treated empirically with DOTS category I and significant functional improvement was noted on follow up
- …