Publications by authors named "K Aditya"

Article Synopsis
  • Farmers combat fungal wilt in pigeon pea with chemical fungicides, which can be harmful, leading to a need for safer alternatives like green pesticides.
  • This study aimed to find indigenous bacterial strains effective against the pathogen, using techniques like PCR and MALDI-TOF to identify active components.
  • NBAIR BSWG1 was highlighted as an efficient strain, exhibiting significant antifungal activity (79.84% inhibition) and producing beneficial compounds such as surfactin, fengycin, and iturin.
View Article and Find Full Text PDF

Galleria mellonella, the greater wax moth has always been an important pest against honeybees and has remained a nightmare for beekeeping farmers. Management of G. mellonella in live honeybee colonies is very difficult because most current management practices can destroy whole honeybee colonies.

View Article and Find Full Text PDF

Spot blotch disease of wheat caused by Bipolaris sorokiniana (Sacc.) Shoem is considered as an economically important disease which affects all the growing stages of wheat crop. Therefore, it is important to search some effective management strategies against the spot blotch pathogen.

View Article and Find Full Text PDF

Spatial statistical analysis of multivariate volumetric data can be challenging due to scale, complexity, and occlusion. Advances in topological segmentation, feature extraction, and statistical summarization have helped overcome the challenges. This work introduces a new spatial statistical decomposition method based on level sets, connected components, and a novel variation of the restricted centroidal Voronoi tessellation that is better suited for spatial statistical decomposition and parallel efficiency.

View Article and Find Full Text PDF

Nowadays, several malicious applications target computers and mobile users. So, malware detection plays a vital role on the internet so that the device is secure without any malicious activity affecting or gathering the useful content of the user. Researches indicate that the vulnerability of adversarial attacks is more in deep neural networks.

View Article and Find Full Text PDF