top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Best practices and tools for creating WebSphere Commerce sites [[electronic resource] /] / [Hernan Cunico, Nicolai Nielsen, Sanjeev Sharma]
Best practices and tools for creating WebSphere Commerce sites [[electronic resource] /] / [Hernan Cunico, Nicolai Nielsen, Sanjeev Sharma]
Autore Cunico Hernan
Edizione [1st ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2005
Descrizione fisica 1 online resource (274 p.)
Altri autori (Persone) NielsenNicolai
SharmaSanjeev
Collana WebSphere software
IBM redbooks
Soggetto topico Electronic commerce
Web sites - Design
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910450120103321
Cunico Hernan  
[S.l.], : IBM, International Technical Support Organization, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Best practices and tools for creating WebSphere Commerce sites [[electronic resource] /] / [Hernan Cunico, Nicolai Nielsen, Sanjeev Sharma]
Best practices and tools for creating WebSphere Commerce sites [[electronic resource] /] / [Hernan Cunico, Nicolai Nielsen, Sanjeev Sharma]
Autore Cunico Hernan
Edizione [1st ed.]
Pubbl/distr/stampa [S.l.], : IBM, International Technical Support Organization, c2005
Descrizione fisica 1 online resource (274 p.)
Disciplina 658.8/72
Altri autori (Persone) NielsenNicolai
SharmaSanjeev
Collana WebSphere software
IBM redbooks
Soggetto topico Electronic commerce
Web sites - Design
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910783530203321
Cunico Hernan  
[S.l.], : IBM, International Technical Support Organization, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Climate change adaptation, risk management and sustainable practices in the Himalaya / / edited by Sanjeev Sharma, [and three others]
Climate change adaptation, risk management and sustainable practices in the Himalaya / / edited by Sanjeev Sharma, [and three others]
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (421 pages)
Disciplina 411
Soggetto topico Climatic changes
ISBN 3-031-24659-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1-Introduction: Climate Change, adaptation and risk management for the mountain sustainability -- 2-Dynamics of demographic, socio-cultural, economic and ecological aspects -- 3-Indigenous knowledge system and traditional sustainable management practices in the Himalayan region -- 4-Anthropogenic intervention, globalized economic development impacts and trans border political issues in the Himalaya -- 5-Urbanization, migration and assessment of the carrying capacity of Himalayan mountain ecosystem -- 6-Environmental degradation and ecological instability: Issues, challenges and way forwarded in the Himalaya -- 7-Climate change, natural hazards and dynamics of landscape changes -- 8-Socio-economic, livelihood and ecological transformation in the Himalayan region -- 9-Human-animal conflicts and wildlife management in the Himalaya -- 10-Climate Change in glacial, periglacial and paraglacial regions of the Himalaya -- 11-Climate induced and geophysical disasters, and risk reduction management in mountains regions -- 12-Available field-based, geophysical and geospatial tools and techniques, their applied practice, strengths, and limitations to study Mountain environment -- 13-Millennium to centennial to contemporary period climate trends and associated climatic variability over the mountain areas of Himalaya -- 14-Regional variation of climatic changes and associated environmental modifications -- 15-Mountain policy, law, governance and role of Institutional and organization for sustaining Himalayan mountain ecosystem -- 16-Interface of technology-science-policy-society and environmental sustainability in the Himalaya -- 17-Integrated ecological restoration, upstream-downstream integration and sustainable development in the Himalaya -- 18-Integrated planning for mountain sustainability and sustainable development: new challenges, innovative approaches and way forward -- 19-Climate change coping strategies and climate smart communities adaptation in the Mountain ecosystem -- 20-Environmental Governance for Environmental Sustainability of Mountainous regions.
Record Nr. UNINA-9910682597903321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Climate Change and Human Adaptation in India : Sustainability and Public Policy
Climate Change and Human Adaptation in India : Sustainability and Public Policy
Autore Sharma Kaushal Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (276 pages)
Altri autori (Persone) SharmaSanjeev
PandeyVijendra Kumar
SinghRupendra
Collana Sustainable Development Goals Series
ISBN 3-031-55821-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgments -- About the Editors -- Contents -- Part I: Proxy Evidences of Climate Change -- Glaciological Study and Climate Change in Indian Perspective -- 1 Introduction -- 2 Latest Technology in Glaciological Studies -- 3 Glacier Inventory -- 4 Geomorphological Mapping -- 5 Climate Glacier Relationship Studies -- References -- Climate Change Impact on Hydrogeochemical Characteristics of Himalayan Glacier Meltwater -- 1 Introduction -- 2 Study Area -- 3 Materials and Methods -- 3.1 Glacier Meltwater Analysis -- 4 Result and Discussion -- 4.1 Hydro-geochemistry of Himalayan Glacier Meltwater -- 4.2 Changes in Temperature and Precipitation Pattern in the Himalayan Region -- 4.3 Impacts of Climate Change on the Hydro-geochemistry of Glacier Meltwater -- 5 Conclusion -- References -- Impact of Changing Climate on the Cryospheric Region and Glacier Retreat in the Himalayan Region -- 1 Introduction -- 1.1 Significance of the Current Study -- 2 Study Area -- 3 Himalayan Glaciers-Understanding Changes -- 3.1 Glaciers Retreat in the Himalayas -- 4 Glaciers Retreat and Climate Change -- 4.1 Historical Trends of Glacier Retreat -- 4.2 Glacier Thinning -- 5 Studies on Some Important Glaciers in the Himalayan Region -- 5.1 Dokriani -- 5.2 Chhota Shigri -- 5.3 Satopanth and Bhagirath Kharak -- 5.4 Milam -- 6 Challenges Ahead -- 6.1 Data Availability and Accessibility -- 6.2 Modelling Water Flow Is Complicated -- 6.3 Regional Differences - Present Challenge -- 7 Conclusions -- 8 Future Aspects -- References -- Indian Himalayan Glaciers' Health Under Changing Climate -- 1 Introduction -- 2 Changing Climate and the Glaciers of the Indian Himalayan Region -- 2.1 Observed and Projected Temperature Change -- 2.2 Observed and Projected Precipitation Change -- 3 Glaciers and Their Measurement.
3.1 Himalayan Glacier Extent and Retreat Rates -- 4 Melting Glaciers, Impact on River Hydrology and Society -- 5 Required Key Actions -- 6 Conclusions -- References -- Role of Aerosols in Atmospheric Dynamics and Deciphering the Climate Change -- 1 Introduction -- 1.1 Properties and Sources of Aerosols -- 1.1.1 Type, Size, and Composition of Aerosols -- 1.2 Natural and Anthropogenic Sources of Aerosols -- 1.3 Spatial and Temporal Distribution of Aerosols -- 2 Aerosol-Climate Interactions -- 3 Role of Aerosol in Modifying the Regional Meteorology -- 4 Modeling Aerosol Effects on Climate -- 4.1 Uncertainties and Challenges in Modeling Aerosol-Climate Interactions -- 5 Conclusion -- References -- Examining Rainfall Trends in Guntur District, Andhra Pradesh, India, Amidst the Climate Change Challenge: A Comprehensive Analysis of Global Warming Impacts -- 1 Introduction -- 2 Objectives -- 3 Hypothesis -- 4 Data Resources -- 5 Methodology -- 6 Study Area -- 7 Relevance of the Study -- 8 Patterns of Rainfall Distribution -- 8.1 Trend Analysis of Average Annual Rainfall -- 8.2 Decadal Annual and Seasonal Variations of Rainfall -- 8.3 Decadal Variations of Rainfall -- 8.4 Decadal Annual and Seasonal Variations of Rainfall -- 9 Factors Responsible for Climatic Variations -- 9.1 Demography -- 9.2 Land Use/Land Cover Changes -- 9.3 Industrial Activity in Guntur District -- 10 Results -- 11 Discussion -- 12 Conclusion -- References -- Part II: Climate-Induced Vulnerability: Approaches Towards Sustainable Livelihood -- Climate-Induced Vulnerability, Adaptation, and Mitigation Strategies: A Case Study of Chamoli District, Garhwal Himalayas -- 1 Introduction -- 2 Study Area -- 3 Methodology -- 4 Results and Discussion -- 4.1 Climate Change Repercussions -- 4.2 Climate-Induced Vulnerability and Livelihood Insecurity.
4.3 Livelihood Diversification: Mitigation and Adjustment to New Circumstances -- 5 Conclusion -- References -- Climate Change and Nature-Based Solutions: Harnessing Nature's Potential for Adaptation and Mitigation -- 1 Introduction -- 1.1 Current State of Climate Change and Its Effects on Ecosystems and Societies -- 1.2 Nature-Based Solutions and Their Significance in the Context of Climate Change -- 1.3 Chapter Purpose and Structure -- 2 Recognizing Nature-Based Solutions -- 2.1 Definition and Concepts of Nature-Based Solution -- 2.2 Examples of Nature-Based Solutions: Ecosystem Restoration, Green Infrastructure, Natural Resource Management, and Biodiversity Conservation -- 2.3 The Role of NbS in Delivering Cobenefits like Ecological Services, Social Well-Being, and Economic Development -- 3 Nature-Based Climate Change Adaptation Solutions -- 3.1 Investigating the Potential of NbS to Improve Climate Resilience and Reduce Vulnerability -- 3.2 Case Studies Demonstrating the Application of NbS for Adaptation Such as Coastal Protection via Mangrove Restoration, Watershed Management, and Urban Green Spaces -- 4 Nature-Based Climate Change Mitigation Solutions -- 4.1 Investigating How NbS Can Help with Carbon Sequestration and Greenhouse Gas Reduction -- 4.2 Examining the Function of Forests, Wetlands, Agro-Forestry, and Sustainable Land Management in Mitigating Climate Change -- 4.3 Showcasing Proven NbS Applications for Carbon Storage and Emission Reduction -- 5 The Advantages and Difficulties of Using Nature-Based Solutions -- 5.1 Evaluating the Benefits of NbS Such as Cost-Effectiveness, Ecological Resilience, and Community Engagement -- 5.2 Addressing Implementation Problems Such as Policy Integration, Finance, and Monitoring and Evaluation -- 6 Including Nature-Based Solutions in Climate Change Policies and Strategies.
6.1 The Role of International Treaties and Frameworks in the Promotion of NbS -- 6.2 Policy Suggestions for Incorporating NbS into National and Regional Climate Change Policies -- 6.3 The Significance of Cross-Sectoral Collaboration and Stakeholder Participation in Successful Implementation -- 7 Conclusion -- 7.1 Recap of Key Findings and Insights from the Chapter -- 7.2 Stressing the Significance of Incorporating Nature-Based Solutions into Climate Change Responses -- 7.3 Emphasizing NbS's Ability to Contribute to Sustainable Development, Resilience, and a More Harmonious Relationship with Nature -- References -- Human Vulnerability in the Changing Environment of the Active Delta Region of India: Impacts in the Indian Sunderbans -- 1 Introduction -- 2 Study Area -- 3 Research Methodology -- 4 Results -- 4.1 Livelihood Vulnerability Index (LVI) -- 5 Discussion -- 5.1 Sea Level Rise -- 5.2 Salinization in Delta -- 5.3 Lack of Displacement Policies -- 6 Conclusion -- References -- Understanding Livelihood Diversification as a Sustainable Adaptive Strategy to Existing Challenges in the Higher Himalayan Villages -- 1 Introduction -- 2 Study Area -- 3 Materials and Methods -- 4 Results -- 4.1 Social Institutions -- 4.2 Livelihood Profile -- 4.2.1 Crops -- 4.2.2 Cash Crops -- 4.2.3 Medicinal Plant -- 4.3 Challenges Related to Agriculture -- 4.3.1 Geographical Factors -- 4.3.2 Socioeconomic Factors -- 4.3.3 Climate Variability -- 4.3.4 Human-Animal Conflict -- 4.3.5 Irrigation -- 4.4 Diversified Off-Farm Income Sources -- 4.4.1 Pastoralism -- 4.4.2 NREGA -- 4.4.3 Migration -- 4.4.4 Yarsagumba -- 4.4.5 Beekeeping -- 4.4.6 Ringal -- 5 Discussion -- 6 Conclusion -- References -- Sustainability Through Sacred Groves -- 1 Introduction -- 2 Understanding Sacred from the Indian Perspective.
2.1 Services Provided by Forests/Sacred Groves (Fig. 2) -- 3 Methodology -- 4 Results -- 4.1 Sacred Groves: A Tool to Achieve Sustainable Development -- 5 Discussion -- 6 Conclusion -- References -- The Climate Refugees of Bundelkhand: A Study on Issues and Challenges to Sustainable Livelihoods in Bundelkhand -- 1 Introduction -- 2 Study Area -- 3 Research Methodology -- 4 Conceptual Framework -- 5 The Vicious Cycle -- 5.1 The Linkage Between Climate Refugees and Livelihood -- 6 The Plight of the People -- 6.1 Implication on the Sustainable Livelihood -- 7 Refuge for the Refugees -- 7.1 Strategy for Mitigation of the Livelihood Challenges -- 8 Conclusion -- References -- Emerging Need to Sustain and Preserve the Traditional Knowledge of Indigenous Communities to Combat Climate Change -- 1 Introduction -- 2 Research Methodology -- 3 Results and Discussion -- 3.1 Threats to Traditional Knowledge -- 3.2 Developments in Traditional Knowledge -- 3.3 Traditional Knowledge Developments in India -- 3.4 Inclusion of Traditional Knowledge -- 3.5 Challenges to Traditional Knowledge -- 4 Conclusions and Recommendations -- References -- Part III: Policy and Governance -- Climate Change Adaptation Policies and Governance: A Critical Appraisal -- 1 Introduction -- 2 Climatic Variability-A Challenge in India -- 3 Climate Change Adaptation Policies -- 4 Climate Change Adaptation Strategies of India -- 5 National Action Plan on Climate Change -- 6 National Adaptation Fund for Climate Change -- 7 Way Forward -- 8 Conclusion and Recommendations -- References -- Adaptation Policy and Governance Towards Tribal Communities of Southern Rajasthan, India -- 1 Introduction -- 2 Purpose of the Study -- 3 Research Methodology -- 3.1 Understanding Tribal Communities -- 3.2 Climate Change Impacts on Tribal Communities.
3.3 Adaptation Policies for Tribal Communities.
Record Nr. UNINA-9910865279003321
Sharma Kaushal Kumar  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data, engineering and applications : select proceedings of IDEA 2021 / / edited by Sanjeev Sharma, [and four others]
Data, engineering and applications : select proceedings of IDEA 2021 / / edited by Sanjeev Sharma, [and four others]
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (693 pages)
Disciplina 170
Collana Lecture Notes in Electrical Engineering
Soggetto topico Big data
ISBN 981-19-4687-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Distortion Controlled Secure Reversible Data Hiding in H.264 Videos -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Distortion Cost Calculation and IPCM Selection -- 3.2 Data Embedding in IPCM Block -- 4 Results -- 4.1 PSNR Comparison -- 4.2 MSE Comparison -- 4.3 Embedding Capacity Comparison -- 5 Conclusion -- References -- A Method for Improving Efficiency and Security of FANET Using Chaotic Black Hole Optimization-Based Routing (BHOR) Technique -- 1 Introduction -- 2 Proposed Chaotic Black Hole Optimization-Based Routing (Chaotic BHOR) Technique -- 2.1 Key Link Exploitation -- 2.2 Link Energy Cost -- 2.3 Absolute Link Involvement -- 2.4 Black Hole Optimization (BHO) Technique -- 2.5 Absolute Drone Involvement -- 2.6 Working and Operation of Chaotic BHOR Technique -- 3 Result and Analysis -- 3.1 Packet Delivery Ratio (PDR) -- 3.2 End-To-End Delay (EED) -- 3.3 Power Expenses -- 3.4 Throughput -- 4 Conclusion -- References -- Machine Learning Techniques for Intrusion Detection System: A Survey -- 1 Introduction -- 2 Intrusion Detection -- 3 Intrusion Detection System -- 3.1 Types of IDS -- 3.2 Limitations of Traditional IDS -- 3.3 Survey on Intrusion Detection Method -- 4 Machine Learning -- 5 Machine Learning Techniques -- 5.1 Supervised Learning -- 5.2 Unsupervised Learning -- 5.3 Reinforcement Learning -- 6 Types of Machine Learning Techniques -- 6.1 Supervised Machine Learning Techniques -- 6.2 Unsupervised Machine Learning Techniques -- 7 Literature Survey -- 8 Conclusion -- References -- Software Fault Detection by Using Rider Optimization Algorithm (ROA)-Based Deep Neural Network (DNN) -- 1 Introduction -- 2 Software Quality -- 3 Software Faults and Testing -- 4 Objectives -- 5 Related Work -- 6 Datasets -- 7 Features Learning and Classifiers -- 8 Proposed Method -- 8.1 Dataset.
9 Rider Optimization-Based Features Selection for KNN -- 10 Fitness Function -- 11 Deep Neural Network-Based Fault Detection -- 12 Results and Discussion -- 13 Performance Evaluation -- 14 Comparative Study -- 15 Conclusion -- References -- An Approach for Predicting Admissions in Post-Graduate Programme by Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Support Vector Regression -- 3.2 Hyperplane -- 3.3 Kernel -- 3.4 Boundary Line -- 3.5 Support Vector -- 4 Proposed Method -- 4.1 Data Pre-processing -- 4.2 Data Partitioning -- 4.3 Fitting Model -- 4.4 Accuracy Evaluation -- 4.5 Importance of Variables -- 5 Implementation and Experimentation -- 5.1 User Interface (UI) Working -- 5.2 Server Working -- 5.3 User Interface of Web-Application -- 5.4 Working Manifestation -- 5.5 Critical Analysis -- 6 Conclusion -- References -- A Survey on Various Representation Learning of Hypergraph for Unsupervised Feature Selection -- 1 Introduction -- 2 Feature Selection -- 2.1 Feature Selection Classification -- 3 Representation Learning -- 3.1 Representation Learning Applications -- 3.2 Latent Representation Learning -- 3.3 Hypergraph Learning -- 4 Optimization Techniques -- 5 Literature Survey -- 6 Conclusion -- References -- Adoption of Blockchain Technology for Storage and Verification of Educational Documents -- 1 Introduction -- 2 Developing -- 2.1 Possibility of Using the Distributed Registry for the Document Storage -- 2.2 Blockchain Technology Offers the Following Five Benefits [8] -- 3 Conclusion -- References -- Obstacle Collision Prediction Model for Path Planning Using Obstacle Trajectory Clustering -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experimental Results -- 5 Conclusion -- References -- Human Saliency Based Object Detection from Natural Images -- 1 Introduction.
2 Background of Saliency Detection Models -- 2.1 Context-Aware Saliency Detection Model -- 2.2 Graph-Based Visual Saliency -- 2.3 Spectral Residual Approach -- 2.4 Itti and Koch Model -- 3 Methodology -- 4 Experimental Results and Discussion -- 4.1 Dataset -- 4.2 System Specification -- 4.3 Discussion -- 5 Conclusion -- References -- Dynamic Education Background: Procure the Maximum Initiation from PBL for Education Naïve Bayes Algorithm for Machine Learning -- 1 Introduction -- 2 Knowledge Policy in Engineering Teaching: The Problem-Based Learning Approach (PBL) -- 3 Case Study: Issues and Context PBL -- 4 Naïve Bayes Machine Learning Platform Analysis and Discussion (PBL) -- 5 Conclusion -- References -- Hybrid Microarray Gene Data Classification Based on GA-ACO Optimization -- 1 Introduction -- 2 Literature Review -- 3 System Design -- 3.1 Genetic Algorithm -- 3.2 Ant Colony Optimization -- 3.3 Hybrid Algorithm -- 4 Result and Discussion -- 5 Conclusion -- References -- An In-Field Real-Time Automatic Weed Detection Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology and Approach -- 3.1 Methodology -- 3.2 Dataset Collection -- 3.3 Approach -- 4 Results and Discussion -- 4.1 Training -- 4.2 Performance Metrics -- 4.3 Result -- 5 Conclusion and Future Work -- References -- Sentiment Analysis of Indians Due to Conflict Between India and China at the Actual Line of Control in Galwan Valley, Ladakh -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Extracting Data -- 3.2 Data Cleaning -- 3.3 Natural Language Processing (NLP) -- 3.4 Getting Subjectivity and Polarity of Each Tweet -- 3.5 Assigning Positive, Negative, and Neutral Sentiments -- 4 Experimental Results -- 5 Conclusion -- References -- Feature Selection Using Information Gain for Software Effort Prediction Using Neural Network Model.
1 Introduction -- 2 Related Work -- 2.1 ANN for Software Effort Estimation -- 2.2 Feature Selection -- 2.3 Proposed Problem -- 3 Artificial Neural Network (ANN) -- 3.1 FITNET: Feed-Forward Neural Network with Multiple Layers -- 4 Experiment Design -- 4.1 Datasets -- 4.2 Overall Procedure -- 4.3 Evaluation Metrics -- 5 Results and Discussion -- 6 Conclusions and Future Possibilities -- References -- A Comprehensive Survey of Web and Mobile Apps for Fishermen -- 1 Introduction -- 1.1 Motivation -- 2 Literature Survey -- 2.1 Survey of Web Apps -- 2.2 Survey of Mobile Applications -- 3 Discussion on the Identified Web and Mobile Apps -- 3.1 Requirements of the Fishermen -- 4 Conclusion -- References -- Study of Machine Learning Classifiers for Intrusion Detection System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Machine Learning Classifiers -- 4 Results and Discussion -- 5 Conclusion -- References -- The Analysis of Time Series Data -- 1 Introduction -- 2 Literature Review -- 2.1 Biopharmaceutical Community -- 2.2 Statistical Computing and Programming Environment -- 2.3 Roadmap -- 2.4 Popularity of the Internet -- 2.5 Spatial Associations and Trends in Mobility -- 2.6 Proxy for Inventive Product -- 2.7 Understanding of Technology -- 3 Methodology -- 4 Result and Observations -- 5 Conclusion and Future Scope -- References -- Computed Tomography Image Processing Methods for Lung Nodule Detection and Classification: A Review -- 1 Introduction -- 2 Existing Techniques -- 3 Result and Discussion -- 4 Conclusion -- References -- Implementation and Analyzing SURF Feature Detection and Extraction on WANG Images Using Custom Bag of Features Model -- 1 Introduction -- 2 Detection and Extraction of Local Features -- 2.1 Feature Detection and Extraction Using SURF -- 3 Bag of Visual Words -- 4 Classifier: SVM (Supervised Vector Machine).
5 Dataset, Implementation, and Results -- 5.1 Dataset -- 5.2 BOVW Bag of Feature Model -- 5.3 Algorithm BOVW for Bag of Feature Model -- 5.4 Implementation -- 5.5 Results -- 5.6 Analysis -- 6 Conclusions and Future Work -- References -- Machine Learning Approaches for Image-Based Screening of Cervical Cancer -- 1 Introduction -- 2 Approaches Used for Image-Based Applications -- 2.1 Traditional Machine Learning-Based Methods -- 2.2 Challenges with the Traditional Approaches -- 2.3 Deep-Learning-Based Methods -- 3 Dataset -- 3.1 Herlev Dataset -- 3.2 SIPaKMed Database -- 3.3 CRIC Searchable Image Database -- 3.4 Overlapping Cells Dataset of ISBI 2014 and ISBI 2015 Challenge -- 3.5 National Cancer Institute (NCI) -- 4 Performance Measures -- 4.1 Evaluation Metrics for Recognition Tasks at the Cellular-Level and Cervigram Images -- 4.2 Evaluation Metrics for Segmentation Task in ISBI 2014 and ISBI 2015 Challenge -- 5 Discussion and Conclusion -- References -- A Comparative Analysis of Image Steganography Based on Discrete Wavelet Transform (DWT) and Exploiting Modification Direction (EMD) -- 1 Introduction -- 2 Review -- 2.1 Least Significant Bit (LSB)-Based Methods -- 2.2 Least Significant Bit (LSB)-Based Methods -- 3 Discussion -- 4 Conclusion -- References -- Web Attack Detection Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 System Implementation and Result Analysis -- 5 Conclusion -- References -- Pragmatic Analysis of Web Service Discovery Models and Architectures from a Qualitative Perspective -- 1 Introduction -- 2 Literature Review -- 3 Quantitative Analysis -- 4 Conclusion and Future Scope -- References -- An Integrated Semi-Supervised Learning Framework for Image Compression Using DCT, Huffman Encoding, and LZW Coding -- 1 Introduction -- 2 Literature Review -- 3 Methodology.
3.1 Compression Techniques.
Record Nr. UNINA-9910616384303321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data, engineering and applications : select proceedings of IDEA 2021 / / edited by Sanjeev Sharma, [and four others]
Data, engineering and applications : select proceedings of IDEA 2021 / / edited by Sanjeev Sharma, [and four others]
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (693 pages)
Disciplina 170
Collana Lecture Notes in Electrical Engineering
Soggetto topico Big data
ISBN 981-19-4687-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Distortion Controlled Secure Reversible Data Hiding in H.264 Videos -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Distortion Cost Calculation and IPCM Selection -- 3.2 Data Embedding in IPCM Block -- 4 Results -- 4.1 PSNR Comparison -- 4.2 MSE Comparison -- 4.3 Embedding Capacity Comparison -- 5 Conclusion -- References -- A Method for Improving Efficiency and Security of FANET Using Chaotic Black Hole Optimization-Based Routing (BHOR) Technique -- 1 Introduction -- 2 Proposed Chaotic Black Hole Optimization-Based Routing (Chaotic BHOR) Technique -- 2.1 Key Link Exploitation -- 2.2 Link Energy Cost -- 2.3 Absolute Link Involvement -- 2.4 Black Hole Optimization (BHO) Technique -- 2.5 Absolute Drone Involvement -- 2.6 Working and Operation of Chaotic BHOR Technique -- 3 Result and Analysis -- 3.1 Packet Delivery Ratio (PDR) -- 3.2 End-To-End Delay (EED) -- 3.3 Power Expenses -- 3.4 Throughput -- 4 Conclusion -- References -- Machine Learning Techniques for Intrusion Detection System: A Survey -- 1 Introduction -- 2 Intrusion Detection -- 3 Intrusion Detection System -- 3.1 Types of IDS -- 3.2 Limitations of Traditional IDS -- 3.3 Survey on Intrusion Detection Method -- 4 Machine Learning -- 5 Machine Learning Techniques -- 5.1 Supervised Learning -- 5.2 Unsupervised Learning -- 5.3 Reinforcement Learning -- 6 Types of Machine Learning Techniques -- 6.1 Supervised Machine Learning Techniques -- 6.2 Unsupervised Machine Learning Techniques -- 7 Literature Survey -- 8 Conclusion -- References -- Software Fault Detection by Using Rider Optimization Algorithm (ROA)-Based Deep Neural Network (DNN) -- 1 Introduction -- 2 Software Quality -- 3 Software Faults and Testing -- 4 Objectives -- 5 Related Work -- 6 Datasets -- 7 Features Learning and Classifiers -- 8 Proposed Method -- 8.1 Dataset.
9 Rider Optimization-Based Features Selection for KNN -- 10 Fitness Function -- 11 Deep Neural Network-Based Fault Detection -- 12 Results and Discussion -- 13 Performance Evaluation -- 14 Comparative Study -- 15 Conclusion -- References -- An Approach for Predicting Admissions in Post-Graduate Programme by Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Support Vector Regression -- 3.2 Hyperplane -- 3.3 Kernel -- 3.4 Boundary Line -- 3.5 Support Vector -- 4 Proposed Method -- 4.1 Data Pre-processing -- 4.2 Data Partitioning -- 4.3 Fitting Model -- 4.4 Accuracy Evaluation -- 4.5 Importance of Variables -- 5 Implementation and Experimentation -- 5.1 User Interface (UI) Working -- 5.2 Server Working -- 5.3 User Interface of Web-Application -- 5.4 Working Manifestation -- 5.5 Critical Analysis -- 6 Conclusion -- References -- A Survey on Various Representation Learning of Hypergraph for Unsupervised Feature Selection -- 1 Introduction -- 2 Feature Selection -- 2.1 Feature Selection Classification -- 3 Representation Learning -- 3.1 Representation Learning Applications -- 3.2 Latent Representation Learning -- 3.3 Hypergraph Learning -- 4 Optimization Techniques -- 5 Literature Survey -- 6 Conclusion -- References -- Adoption of Blockchain Technology for Storage and Verification of Educational Documents -- 1 Introduction -- 2 Developing -- 2.1 Possibility of Using the Distributed Registry for the Document Storage -- 2.2 Blockchain Technology Offers the Following Five Benefits [8] -- 3 Conclusion -- References -- Obstacle Collision Prediction Model for Path Planning Using Obstacle Trajectory Clustering -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experimental Results -- 5 Conclusion -- References -- Human Saliency Based Object Detection from Natural Images -- 1 Introduction.
2 Background of Saliency Detection Models -- 2.1 Context-Aware Saliency Detection Model -- 2.2 Graph-Based Visual Saliency -- 2.3 Spectral Residual Approach -- 2.4 Itti and Koch Model -- 3 Methodology -- 4 Experimental Results and Discussion -- 4.1 Dataset -- 4.2 System Specification -- 4.3 Discussion -- 5 Conclusion -- References -- Dynamic Education Background: Procure the Maximum Initiation from PBL for Education Naïve Bayes Algorithm for Machine Learning -- 1 Introduction -- 2 Knowledge Policy in Engineering Teaching: The Problem-Based Learning Approach (PBL) -- 3 Case Study: Issues and Context PBL -- 4 Naïve Bayes Machine Learning Platform Analysis and Discussion (PBL) -- 5 Conclusion -- References -- Hybrid Microarray Gene Data Classification Based on GA-ACO Optimization -- 1 Introduction -- 2 Literature Review -- 3 System Design -- 3.1 Genetic Algorithm -- 3.2 Ant Colony Optimization -- 3.3 Hybrid Algorithm -- 4 Result and Discussion -- 5 Conclusion -- References -- An In-Field Real-Time Automatic Weed Detection Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology and Approach -- 3.1 Methodology -- 3.2 Dataset Collection -- 3.3 Approach -- 4 Results and Discussion -- 4.1 Training -- 4.2 Performance Metrics -- 4.3 Result -- 5 Conclusion and Future Work -- References -- Sentiment Analysis of Indians Due to Conflict Between India and China at the Actual Line of Control in Galwan Valley, Ladakh -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Extracting Data -- 3.2 Data Cleaning -- 3.3 Natural Language Processing (NLP) -- 3.4 Getting Subjectivity and Polarity of Each Tweet -- 3.5 Assigning Positive, Negative, and Neutral Sentiments -- 4 Experimental Results -- 5 Conclusion -- References -- Feature Selection Using Information Gain for Software Effort Prediction Using Neural Network Model.
1 Introduction -- 2 Related Work -- 2.1 ANN for Software Effort Estimation -- 2.2 Feature Selection -- 2.3 Proposed Problem -- 3 Artificial Neural Network (ANN) -- 3.1 FITNET: Feed-Forward Neural Network with Multiple Layers -- 4 Experiment Design -- 4.1 Datasets -- 4.2 Overall Procedure -- 4.3 Evaluation Metrics -- 5 Results and Discussion -- 6 Conclusions and Future Possibilities -- References -- A Comprehensive Survey of Web and Mobile Apps for Fishermen -- 1 Introduction -- 1.1 Motivation -- 2 Literature Survey -- 2.1 Survey of Web Apps -- 2.2 Survey of Mobile Applications -- 3 Discussion on the Identified Web and Mobile Apps -- 3.1 Requirements of the Fishermen -- 4 Conclusion -- References -- Study of Machine Learning Classifiers for Intrusion Detection System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Machine Learning Classifiers -- 4 Results and Discussion -- 5 Conclusion -- References -- The Analysis of Time Series Data -- 1 Introduction -- 2 Literature Review -- 2.1 Biopharmaceutical Community -- 2.2 Statistical Computing and Programming Environment -- 2.3 Roadmap -- 2.4 Popularity of the Internet -- 2.5 Spatial Associations and Trends in Mobility -- 2.6 Proxy for Inventive Product -- 2.7 Understanding of Technology -- 3 Methodology -- 4 Result and Observations -- 5 Conclusion and Future Scope -- References -- Computed Tomography Image Processing Methods for Lung Nodule Detection and Classification: A Review -- 1 Introduction -- 2 Existing Techniques -- 3 Result and Discussion -- 4 Conclusion -- References -- Implementation and Analyzing SURF Feature Detection and Extraction on WANG Images Using Custom Bag of Features Model -- 1 Introduction -- 2 Detection and Extraction of Local Features -- 2.1 Feature Detection and Extraction Using SURF -- 3 Bag of Visual Words -- 4 Classifier: SVM (Supervised Vector Machine).
5 Dataset, Implementation, and Results -- 5.1 Dataset -- 5.2 BOVW Bag of Feature Model -- 5.3 Algorithm BOVW for Bag of Feature Model -- 5.4 Implementation -- 5.5 Results -- 5.6 Analysis -- 6 Conclusions and Future Work -- References -- Machine Learning Approaches for Image-Based Screening of Cervical Cancer -- 1 Introduction -- 2 Approaches Used for Image-Based Applications -- 2.1 Traditional Machine Learning-Based Methods -- 2.2 Challenges with the Traditional Approaches -- 2.3 Deep-Learning-Based Methods -- 3 Dataset -- 3.1 Herlev Dataset -- 3.2 SIPaKMed Database -- 3.3 CRIC Searchable Image Database -- 3.4 Overlapping Cells Dataset of ISBI 2014 and ISBI 2015 Challenge -- 3.5 National Cancer Institute (NCI) -- 4 Performance Measures -- 4.1 Evaluation Metrics for Recognition Tasks at the Cellular-Level and Cervigram Images -- 4.2 Evaluation Metrics for Segmentation Task in ISBI 2014 and ISBI 2015 Challenge -- 5 Discussion and Conclusion -- References -- A Comparative Analysis of Image Steganography Based on Discrete Wavelet Transform (DWT) and Exploiting Modification Direction (EMD) -- 1 Introduction -- 2 Review -- 2.1 Least Significant Bit (LSB)-Based Methods -- 2.2 Least Significant Bit (LSB)-Based Methods -- 3 Discussion -- 4 Conclusion -- References -- Web Attack Detection Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 System Implementation and Result Analysis -- 5 Conclusion -- References -- Pragmatic Analysis of Web Service Discovery Models and Architectures from a Qualitative Perspective -- 1 Introduction -- 2 Literature Review -- 3 Quantitative Analysis -- 4 Conclusion and Future Scope -- References -- An Integrated Semi-Supervised Learning Framework for Image Compression Using DCT, Huffman Encoding, and LZW Coding -- 1 Introduction -- 2 Literature Review -- 3 Methodology.
3.1 Compression Techniques.
Record Nr. UNISA-996495563703316
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Social Networking and Computational Intelligence [[electronic resource] ] : Proceedings of SCI-2018 / / edited by Rajesh Kumar Shukla, Jitendra Agrawal, Sanjeev Sharma, Narendra S. Chaudhari, K. K. Shukla
Social Networking and Computational Intelligence [[electronic resource] ] : Proceedings of SCI-2018 / / edited by Rajesh Kumar Shukla, Jitendra Agrawal, Sanjeev Sharma, Narendra S. Chaudhari, K. K. Shukla
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (789 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Electrical engineering
Computational Intelligence
Communications Engineering, Networks
ISBN 981-15-2071-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Acknowledgements -- Organizing Committee -- About the Conference -- Table of Contents -- About the Editors -- 60 -- Author Index.
Record Nr. UNINA-9910484756303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sustainable management of potato pests and diseases / / Swarup Kumar Chakrabarti, Sanjeev Sharma and Mohd Abas Shah, editors
Sustainable management of potato pests and diseases / / Swarup Kumar Chakrabarti, Sanjeev Sharma and Mohd Abas Shah, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (544 pages)
Disciplina 635.2198
Soggetto topico Potatoes - Diseases and pests - Control
Sustainable agriculture
Potatoes - Diseases and pests
ISBN 981-16-7694-1
981-16-7695-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- 1: Potato Pests and Diseases: A Global Perspective -- 1.1 Introduction -- 1.2 Pests and Diseases of Potato: Economic Importance -- 1.2.1 Emerging Pests and Diseases -- 1.3 Effect of Climate Change on Occurrence and Distribution of Potato Pests and Diseases -- 1.4 Pests and Pathogens of Quarantine Significance -- 1.5 Innovations in Disease Diagnostics -- 1.6 Development in the Area of Pest/Disease Forecasting -- 1.7 Innovations in Pest and Disease Management -- 1.8 Conclusion -- References -- 2: Phytosanitary Standards and International Exchange of Potato -- 2.1 Background -- 2.2 Role of Standards and Regulations -- 2.3 The International Plant Protection Convention (IPPC) -- 2.3.1 International Standards on Phytosanitary Measures -- 2.3.2 Process for Developing International Standards for Phytosanitary Measures (ISPMs) -- 2.4 Phytosanitary Standards Relevant to Exchange of Potato -- 2.4.1 ISPM 1: Phytosanitary Principles for the Protection of Plants and the Application of Phytosanitary Measures in Internati... -- 2.4.2 ISPM 2: Framework for Pest Risk Analysis (Adopted in 1995, Revised in 2007) -- 2.4.3 ISPM 3: Guidelines for the Export, Shipment, Import, and Release of Biological Control Agents and Other Beneficial Organ... -- 2.4.4 ISPM 4: Requirements for the Establishment of Pest-Free Areas (Adopted in 1995) -- 2.4.5 ISPM 5: Glossary of Phytosanitary Terms (Updated as Needed) -- 2.4.6 ISPM 6: Surveillance (Adopted in 1997, Revised in 2018) -- 2.4.7 ISPM 7: Phytosanitary Certification System (Adopted in 1997, Revised in 2011) -- 2.4.8 ISPM 8: Determination of Pest Status in an Area (Adopted in 1998) -- 2.4.9 ISPM 9: Guidelines for Pest Eradication Programs (Adopted in 1998).
2.4.10 ISPM 10: Requirements for the Establishment of Pest-Free Places of Production and Pest-Free Production Sites (Adopted i... -- 2.4.11 ISPM 11: Pest Risk Analysis for Quarantine Pests (Adopted in 2001, Revised in 2004 and 2013) -- 2.4.12 ISPM 12: Phytosanitary Certificates (Adopted in 2001, Revised in 2011)-Appendix 1: Electronic Phytosanitary Certificate... -- 2.4.13 ISPM 13: Guidelines for the Notification of Noncompliance and Emergency Action (Adopted in 2001) -- 2.4.14 ISPM 14: The Use of Integrated Measures in a Systems Approach for Pest Risk Management (Adopted in 2002) -- 2.4.15 ISPM 16: Regulated Non-quarantine Pests: Concept and Application (Adopted in 2002) -- 2.4.16 ISPM 17: Pest Reporting (Adopted in 2002) -- 2.4.17 ISPM 18: Guidelines for the Use of Irradiation as a Phytosanitary Measure (Adopted in 2003) -- 2.4.18 ISPM 19: Guidelines on Lists of Regulated Pests (Adopted in 2003) -- 2.4.19 ISPM 20: Guidelines for a Phytosanitary Import Regulatory System (Adopted in 2004, Revised in 2017) -- 2.4.19.1 Annex 1 Arrangements for verification of compliance of consignments by the importing country in the exporting country... -- 2.4.20 ISPM 21: Pest Risk Analysis for Regulated Non-quarantine Pests (Adopted in 2004) -- 2.4.21 ISPM 22: Requirements for the Establishment of Areas of Low Pest Prevalence (Adopted in 2005) -- 2.4.22 ISPM 23: Guidelines for Inspection (Adopted in 2005) -- 2.4.23 ISPM 24: Guidelines for the Determination and Recognition of Equivalence of Phytosanitary Measures (Adopted in 2005) -- 2.4.24 ISPM 25: Consignments in Transit (Adopted in 2006) -- 2.4.25 ISPM 27: Diagnostic Protocols for Regulated Pests (Adopted in 2006) -- 2.4.26 ISPM 28: Phytosanitary Treatments for Regulated Pests (Adopted in 2007) -- 2.4.27 ISPM 29: Recognition of Pest-Free Areas and Areas of Low Pest Prevalence (Adopted in 2007).
2.4.28 ISPM 31: Methodologies for Sampling of Consignments (Adopted in 2008) -- 2.4.29 ISPM 32: Categorization of Commodities According to their Pest Risk (Adopted in 2009) -- 2.4.30 ISPM-33: Pest-Free Potato (Solanum Spp.) Micropropagative Material and Minitubers for International Trade -- 2.4.31 ISPM 42: Requirements for the Use of Temperature Treatments as a Phytosanitary Measures (Adopted in 2018) -- 2.5 National Standards: The Case of India -- 2.6 Perspectives -- References -- 3: Fungicide Resistance: Threats and Management Approaches -- 3.1 Introduction -- 3.2 History of Chemical Control and Resistance -- 3.3 Resistance Defined -- 3.4 Mechanism of Resistance -- 3.4.1 Alteration of the Target Site so that Sensitivity to the Fungicide Is Reduced -- 3.4.2 Detoxification or Metabolism of the Fungicide -- 3.4.3 Overexpression of the Target -- 3.4.4 Exclusion or Expulsion from the Target Site -- 3.5 Evaluating Resistance Risk -- 3.6 Detecting and Monitoring Resistance -- 3.6.1 Bioassays -- 3.6.2 Molecular Assays -- 3.6.3 Biochemical Assays -- 3.7 Fungicide Resistance Management Approaches -- 3.7.1 Managing the Application Dose -- 3.7.2 Managing the Number of Sprays -- 3.7.3 The Use of Fungicide Mixtures -- 3.7.4 The Use of Fungicide Alternations -- 3.7.5 Alternations Versus Mixtures -- 3.7.6 Protective Versus Curative Use -- 3.8 Fungicide Resentence Action Committee (FRAC) -- 3.8.1 Purpose -- 3.8.2 FRAC Guidelines -- 3.9 FRAC Guidelines: Potato Diseases -- 3.9.1 Oxysterol Binding Protein Homologue Inhibitor (OSBPI) Fungicides (FRAC Code 49) (Updated April 2021) -- 3.9.2 QoI Fungicides (FRAC Code 11) (Updated June 2020) -- 3.9.3 Late Blight (Phytophthora Infestans) -- 3.9.4 Early Blight (Alternaria Solani, Alternaria Alternata) -- 3.9.5 CAA Fungicides (FRAC Code 40) (Updated April 2020).
3.9.6 Phenylamide Fungicides (FRAC Code 4) (Updated March 2020) -- 3.9.7 QiI Fungicides (FRAC Code 21) (Updated February 2021) -- 3.9.8 Fluzinam Fungicides (FRAC Code 29) (Updated June 2020) -- 3.9.9 Cymoxanil Fungicides (FRAC Code 27) (Updated February 2021) -- 3.9.10 Ametoctradin Fungicides (FRAC Code 45) (Updated June 2021) -- 3.10 Importance of Multisite Fungicides in Managing Pathogen Resistance -- 3.11 Conclusion and Future Outlook -- References -- 4: Role of Plant Nutrition in Disease Development and Management -- 4.1 Introduction -- 4.2 Plant Nutrition, Disease Occurrence, and Host-Pathogen Interactions in Relation to Nutrient Acquisition -- 4.3 Plant Nutrition and Systemic Induced Resistance or Systemic Acquired Resistance -- 4.4 Role of Nutrient Elements in Disease Incidence -- 4.4.1 Nitrogen -- 4.4.2 Phosphorus -- 4.4.3 Potassium -- 4.4.4 Calcium -- 4.4.5 Sulfur and Magnesium -- 4.4.6 Micronutrients -- 4.4.6.1 Zinc -- 4.4.6.2 Boron -- 4.4.6.3 Manganese -- 4.4.6.4 Copper -- 4.4.6.5 Iron -- 4.4.6.6 Chlorine -- 4.4.7 Beneficial Elements -- 4.5 Cultural Methods for Improved Plant Nutrition and Disease Resistance -- 4.5.1 Soil Organic Matter -- 4.5.2 Crop Rotation and Cover Crops -- 4.5.3 Intercropping -- 4.5.4 Soil Tillage -- 4.6 Future Perspectives -- 4.7 Conclusion -- References -- 5: Secondary Metabolites of Microbials as Potential Pesticides -- 5.1 Introduction -- 5.2 Secondary Metabolites in Pest Management -- 5.3 Fungal Secondary Metabolites Against Pests of Agricultural Importance -- 5.4 Bacterial Secondary Metabolites Against Pests of Agricultural Importance -- 5.5 Secondary Metabolites Against Plant Parasitic Nematodes -- 5.6 Mode of Action of Secondary Metabolites Against Insect Pest and Diseases -- 5.6.1 Mode of Action of Secondary Metabolites of Entomopathogenic Bacteria -- 5.6.1.1 Mode of Action of Cry Toxins in Lepidoptera.
5.6.1.2 Mode of Action of Cyt Toxins in Diptera -- 5.6.1.3 Mode of Action of Vegetative Insecticidal Proteins (VIPs) -- 5.6.1.4 Mode of Action of Thuringiensin -- 5.6.2 Mode of Action of Secondary Metabolites of Entomopathogenic Fungi -- 5.6.2.1 Mechanism of Insecticidal Activity of Destruxins -- 5.6.2.2 Mode of Action of Beauvericin -- 5.7 Mass Production of Secondary Metabolites of Microbes -- 5.8 Pros and Cons to the Use of Secondary Metabolites in Pest Management -- 5.8.1 Pros of Secondary Metabolites in Pest Management -- 5.8.2 Cons of Secondary Metabolites in Pest Management -- 5.9 Success Stories on the Use of Secondary Metabolites for Pest Management -- 5.9.1 Secondary Metabolites in Insect Pest Management -- 5.9.1.1 Spinosads -- 5.9.1.2 Avermectins -- 5.9.2 Secondary Metabolites in Disease Management -- 5.9.2.1 Strobularins -- 5.9.3 Secondary Metabolites in Weed Management -- 5.9.3.1 Glufosinate -- 5.10 Conclusion and Future Prospects -- References -- 6: Advances and Approaches in Mitigating Bacterial Diseases of Potato -- 6.1 Introduction -- 6.2 Bacterial Wilt -- 6.2.1 Symptoms -- 6.2.2 Causal Organism -- 6.2.3 Disease Occurrence and Distribution -- 6.2.4 Disease Cycle -- 6.2.5 Survival -- 6.2.6 Spread -- 6.2.7 Management -- 6.2.7.1 Healthy Seed -- 6.2.7.2 Field Sanitation and Cultural Management -- 6.2.7.3 Chemical Control -- 6.2.7.4 Biological Control -- 6.2.7.5 Breeding for Resistance -- 6.3 Common Scab of Potato -- 6.3.1 Symptoms -- 6.3.2 Causal Organism -- 6.3.3 Disease Occurrence and Distribution -- 6.3.4 Disease Cycle -- 6.3.5 Management -- 6.4 Bacterial Soft Rot -- 6.4.1 Symptoms -- 6.4.2 Causal Organism -- 6.4.3 Disease Occurrence and Distribution -- 6.4.4 Disease Cycle -- 6.4.5 Management -- 6.5 Conclusion and Future Outlook -- References -- 7: Advances in Management of Late Blight of Potato -- 7.1 Introduction.
7.2 The Causal Organism.
Record Nr. UNINA-9910743211303321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui