Fungal Identification method by RDNA sequence analysis:Molecular approach to revel the role of microbial community invermicomposting
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Internal transcribed spacer is a special sequence that present in between sequence of ribosomalDNA. It is present in multiple copies and act as a conservative sequence. This sequence is unique for particularliving being there for it is used as tool for identification.Present study carried out to identification of floraldegrading fungi by using of PCR method. This process was done with the help of specific primer. The length ofprimer was different for different group of fungi. There were four fungi which identified were Aspergillus flavus,A. fumigatus, A. terrus and Alternaria alternate.
Authors and Affiliations
Shobha Shouche , Zeemi Nema , Praveesh Bhati
Increasing Quality of the Interframe and also extract Histogram using Super-Imposing
Video enhancement approach aiming to achieve high qualities in entire video. Proposes a Superimposing algorithm for improve quality of intraframe based on multiple regions-of-interest and create piecewise tone mapp...
Improved Technique for Gait Reconigition & Performing Feature Extraction Using Videos of Different Forms
Abstract: This paper describes the importance of GAIT Recognition where identification of human being from far distance without any sort of co-operation from his side is performed. Motive to develop automatic ident...
Efficient design of feedforward network for pattern classification
A feedforward neural network is a computing device whose processing units (the nodes) are distributed in adjacent layers connected through unidirectional links (the weights).Feedforward networks are widely used...
A Survey Report on the Novel Approach on Use ofRecommendation Outline in Query Recommender System
Abstract: The DBMS applications are becoming increasingly popular in the scientific community to supportthe interactive exploration of huge data. A result of heavy usage has also lead to a lot of tavles generated i...
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security a...