1,024 research outputs found

    Role of trichomes on leaves and pods for imparting resistance in chickpea [Cicer arientinum (L.)] genotypes against Helicoverpa armigera (Hübner)

    Get PDF
    In chickpea, trichomes provide a potential resistance mechanism against Helicoverpa armigera (Hübner). The present study was conducted to evaluate the trichome density and trichome length on leaves and pods on nine genotypes of chickpea. Two types of trichomes were observed, i.e. non-glandular (on leaves) and glandular (pods). Few glandular trichomes were observed on leaves and a very few non-glandular trichomes were observed on pods. Highest number of non-glandular trichomes on leaves (33.66 trichomes/mm2) were observed in chickpea genotype 5282. Minimum number of glandular trichomes were observed on pods of genotype GL 25016 (12.66 glandular trichomes per mm2). In case of leaves, genotypes ICCL 86111 and GL 25016 recorded maximum non-glandular trichome length of 347.23 and 301.53 ?m, respectively. However, genotypes GL 25016, RSG 963 and 5282 rec-orded maximum glandular trichome length of 538.33, 564.97 and 432.61 ?m, respectively in pods. Density of non glandular trichomes on leaves showed significant and negative correlation with number of eggs, larval population, larval survival and per cent pod damage. However, density of glandular trichomes on pods showed significant and positive correlation with number of eggs , larval population of H. armigera, larval survival and pod damage. Length of non-glandular trichomes on leaves and glandular trichomes on pods showed non-significant and negative correlation with number of eggs, larval population of H. armigera, larval survival and pod damage. Hence, genotypes with more pubescent leaves, lesser pubescent pods and longer trichomes (both on leaves and pods) should be preferred for developing H. armigera tolerant chickpea genotypes

    Contradiction and Challenges: Second Generation Sikh Males in Canada

    Get PDF
    Considering the historical and current context of their community within Canadian society, and given the myriad of challenges facing young Sikhs as they negotiate family, gender, peer, cultural, and religious expectations, this study examined how Sikh youth living in the Greater Toronto Area make sense of the world around them. It is clear that by challenging the parameters of multiculturalism, Sikh males have made their presence felt in Canada. However, the experiences of younger generations in Western diasporas are relatively absent in scholarship. Given the sometimes varying nature of the expectations and relationships that these youth must negotiate, in addition to the current issues occurring in their communities, one component of this study ascertained how these Sikh males formulate their aspirations. What are the experiences of young Sikh males in a Canadian context where they negotiate conflicting messages about identity, religiosity, and community? The primary objective of this study was to gain an understanding of what it means to be a second generation Sikh male living in an ethnic enclave of suburban Toronto. It specifically examined the intersecting notions of identity, gender, social class, and religion amongst this population while analyzing the role of family as well as community in their lives. The theoretical concepts of transnationalism, hybrid identities, as well as notions of masculinity amongst Sikh males guided this paper. An important consideration is how youth are able to discern between the varying notions of the Sikh identity. In addition, it was important to examine how these youth negotiate conflicting liberal and traditional views that are promoted within their communities and families. More specifically, this paper examined how these young people reconcile their Canadian and Sikh identities. Considering the prominence of Sikhs in broader Canadian society, this study also inquired as to how youth perceive their own community. In summary, this exploratory study focused on how Sikh males use their social and cultural capital to negotiate a range of social institutions. It examined the kinds of thinking found amongst this group, taking into consideration the dynamics of the community in which they live and how they navigate the parameters of being a Sikh Canadian

    A case report: spontaneous postpartum rupture of unscarred uterus

    Get PDF
    Rupture of uterus is characterized by a breach in the wall of the uterus involving its full thickness. An unscarred uterus rupture is uncommon. It has non-specific symptoms and presentation differs according to site and time of rupture. Authors report an unusual case of spontaneous rupture of unscarred uterus. A 32-year-old, pregnant woman, developed postpartum bleeding with no history of prior uterine incision. She was diagnosed as a case of rupture of uterus and emergency laparotomy was done. Early diagnosis and immediate surgical intervention may significantly improve the prognosis. Differential diagnosis of uterine rupture should always be kept in mind in all patients with or without risk factors

    Infrared Avalanche Photodiode Detectors

    Get PDF
    This study presents on the design, fabrication and characteristics of HgCdTe mid-wave infrared avalanche photodiode (MWIR APD). The gain of 800 at - 8 V bias is measured in n+-ν-p+ detector array with pitch size of 30 μm. The gain independent bandwidth of 6 MHz is achieved in the fabricated device. This paper also covers the status of HgCdTe and III-V material based IR-APD technology. These APDs having high internal gain and bandwidth are suitable for the detection of attenuated optical signals such as in the battle field conditions/long range imaging in defence and space applications. It provides a combined solution for both detection and amplification if the detector receives a very weak optical signal. HgCdTe based APDs provide high avalanche gain with low excess noise, high quantum efficiency, low dark current and fast response time

    Cryptography for Secure E-mail Communication

    Get PDF
    Users share private information on the web through a variety of applications, suchas email, instant messaging, social media, and document sharing. Unfortunately, recentrevelations have shown that not only is users' data at risk from hackers and malicious insiders,but also from government surveillance. This state of affairs motivates the need for users tobe able to encrypt their online data specifically the e-mail communication. This paper shows the use of cryptographic algorithms for secure e-mail communication
    corecore