3,779 research outputs found

    Effect of Various Irrigation Methods on Growth, Flowering and Yield of Tuberose (Polyanthes tuberosa Linn.)

    Get PDF
    Tuberose flower has very good fragrance and is suitable for loose and cut flowers. Although crop improvement has been researched upon in various institutes and state agricultural universities, irrigation management in this crop has not been given much emphasis. This factor is important and crucial in crop production. A field trial was conducted at Precision Farming Development Centre, Rahuri, with the objective of studying performance of tuberose cv. Suvasini Double under three irrigation systems, viz., drip, micro-sprinkler and surface irrigation (conventional method). Irrigation through drip and micro-sprinkler was applied at 0.85 PE; and in the conventional method of irrigation, the interval was set at 60 mm CPE with 6 cm depth of irrigation. Micro-sprinkler system proved to be the best and gave a flower yield of 6.77 lakh spikes/ ha with better flower quality, than drip or surface method of irrigation. B:C ratio was also higher under micro-sprinkler (2.68 )

    Architecture for Automated Irrigation System

    Get PDF
    Agriculture sector provides food as well as large employment. Impact of agriculture development as traditional framing is unable to increase the crop yield. In our country , the growth of population is around 2% per year. Thus food production should increase about 2.6% per year to provide an effcient food intake. The use of water resources to be optimally connected and beneficially utilized with appropriate priorities of use. Therefore the real values of soil moisture, air humidity, temperature and water level in the soil are wirelessly transmitted using wireless technology and same is monitored for optimum production of crop production

    Farmers’ suicides in the Vidarbha region of Maharashtra, India: a qualitative exploration of their causes

    Get PDF
    Background: To explore the various perceived reasons for farmers’ suicides in the Vidarbha region of Maharashtra, their common factors, and to suggest solutions. METHODS: The present formative research was undertaken in the 23 villages surrounding the Anji Primary Health Centre, located in the Vidarbha region of Maharashtra, India. A triangulation of free list and pile sort exercises was used. The data was analyzed by Anthropac 4.98.1/X software. This was followed by a semi-structured focus group discussion. To increase the validity of the results, these findings were presented to the participants and later they were circulated to the 26 farmers’ clubs in the villages for comment and discussion during their monthly, village-based meetings. RESULTS: Farmers perceived debt, addiction, environmental problems, poor prices for farm produce, stress and family responsibilities, government apathy, poor irrigation, increased cost of cultivation, private money lenders, use of chemical fertilizers and crop failure as the reasons for farmers’ suicides. Participants suggested solutions such as self-reliance and capacity building among farmers, a monitoring and support system for vulnerable farmers, support and counseling services, a village-level, transparent system for the disbursement of relief packages. CONCLUSIONS: Farmers’ suicides in Vidarbha are caused by the complex interplay of social, political and environmental constraints. Hence, a comprehensive intervention to ensure self-reliance and capacity building among farmers in modern farming techniques , monitoring and support system for vulnerable farmers, a village-level, transparent system for disbursement of relief packages is required to prevent farmer suicides in the near future. Apart from this, there is a need to strengthen the National Mental Health Program at primary health care level to offer support and counseling to vulnerable farmers in rural area

    Pretreatments of Textiles Prior to Dyeing: Plasma Processing

    Get PDF

    Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditor

    Full text link
    Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance. Cloud is a commonplace for storing data as well as sharing of that data. However, preserving the privacy and maintaining integrity of data during public auditing remains to be an open challenge. In this paper, we introducing a third party auditor (TPA), which will keep track of all the files along with their integrity. The task of TPA is to verify the data, so that the user will be worry-free. Verification of data is done on the aggregate authenticators sent by the user and Cloud Service Provider (CSP). For this, we propose a secure cloud storage system which supports privacy-preserving public auditing and blockless data verification over the cloud

    An Enhanced Multi-layered Cryptosystem Based Secure and Authorized De-duplicaton Model in Cloud Storage System

    Full text link
    Data de-duplication is one of the essential data compression techniques for eliminating duplicate copies of repeating data, and it has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the privacy of sensitive data while supporting de-duplication, the salt encryption technique has been proposed to encrypt the data before its outsourcing. To protect the data security in a better way, this paper makes the first attempt to formally address the problem of authorized data de-duplication. Different from traditional de-duplication systems, the derivative privileges of users are further considered in duplicate check besides the data itself. We also present various new de-duplication constructions which supports the authorized duplicate check in hybrid cloud architecture. Security analysis demonstrates that the scheme which we used is secure in terms of the definitions specified in the proposed security model. We enhance our system in security. Specially, we present a forward-looking scheme to support a stronger security by encrypting file with differential privilege keys. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations

    A Survey on Sentiment Mining

    Get PDF
    In past days before putting money into any product people used to ask judgment to their family, friend circle and colleagues and then they take the decision. In today’s world there is a boom of World Wide Web, enormous amount of data is available on internet so while purchasing a product instead of asking to people customer take decisions by analyzing electronic text. As the growth of e-commerce crowds of people encouraged to write their opinion about numerous merchandise in the form of statements/comments on countless sites like facebook,flipkart,snapdeal,amazon,bloggres,twiter,etc.This comments are the sentiments about the services expressed by users and they are categorized into positive, negative and neutral. Different techniques are use for summarizing reviews like Information Retrieval, Text Mining Text Classification, Data Mining, and Text Summarizing. Countless people write their sentiments on plenty of sites. These comments are written in random order so it may cause trouble in usefulness of the information. If someone wants to find out the impact of the usability of any product then he has to manually read all the sentiments and then classify it, which is practically burdensome task. Sentiment mining is playing major role in data mining; it is also referred as sentiment analysis. This field helps to analyze and classify the opinion of users. In this paper we will discuss various techniques, applications and challenges face by the sentiment mining

    Development of RFID Based Smart Sensor Prototype for Wireless Industrial Monitoring and Control

    Get PDF
    The Purpose of this paper is to present one of the various wireless technologies currently available for industrial monitoring and control. Applications of wireless data transmission are universal. In industrial automation, the benefits of adopting wireless technologies in eliminating the needs for cables in hard to reach areas within the plant, increasing data availability and quality and monitoring and controlling remote assets, that otherwise were inaccessible. Radio frequency identification (RFID) technology is commonly used for object or animal identification and tracking. This article explores the feasibility of its use in a rapid solution to wireless real time monitoring of industry. A prototype system for wireless industrial monitoring and control was developed using a commercially available 12.5 GHZ RFID passive tags. Various parameters are sensed by respective sensors (Slaves), which are then monitored by low power, high performance, 8bit AVR microcontroller. Monitored signals are then sent to the RFID tag or transponder unit, hence the smart feature of the sensor. A receiving unit (Interrogator) emits an electromagnetic field which when detected by passive RFID tag causes it to transfer sensor information (data stored in memory) to the interrogator. Interrogator detects these parameters and sends them to the data collection PC (Master Unit). The architecture of the developed wireless sensor prototype allows for additional RFID tags (Slave Units) to be integrated into it without changes to the sensor designs. Design also provides means to update operating and monitoring parameters as well as sensors/RF link specific firmware modules ‘over - the - air’
    • …
    corecore