Zobrazeno 1 - 10
of 18
pro vyhledávání: '"S N Pawar"'
Publikováno v:
Journal of Horticultural Sciences, Vol 5, Iss 1 (2010)
A field trial was conducted at Regional Fruit Research Station, Vengurle, Dist. Sindhudurg, (Maharashtra) to assess the efficacy of Ethrel® in relation to flowering behavior and yield enhancement in cashew on seven year old Cashew trees of Vengurle
Externí odkaz:
https://doaj.org/article/70be691ccb4a42d49ee179db157704c9
Autor:
S. N. Pawar, Kiran D. Tandale
Publikováno v:
2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC).
In this paper a review has been taken on different types of phishing attacks and detection techniques. Most of the cyber attacks are spreading through users weaknesses, which makes user weakest elements in security chain. Mostly this phishing targets
Autor:
S. N. Pawar
Publikováno v:
International Journal for Research in Applied Science and Engineering Technology. 6:2433-2449
Publikováno v:
AN ASIAN JOURNAL OF SOIL SCIENCE. 11:159-165
An experiment on the effect of organic manures on growth and yield of cashew cv. VENGURLA- 4 under Konkan region of Maharashtra was conducted under AICRP-Cashew programme during 2011-12 to 2014-15 at Regional Fruit Research Station, Vegurle-416 516,
Publikováno v:
INTERNATIONAL JOURNAL OF AGRICULTURAL ENGINEERING. 9:35-38
Drought is a natural hazard that has significant impact on economic, agricultural, environmental and social aspects. The main objective of the research reported herein has been to develop an approach to analyse of meteorological droughts based on ann
Publikováno v:
INTERNATIONAL JOURNAL OF AGRICULTURAL ENGINEERING. 9:86-93
Water balance of an area is an itemized statement of all gains, losses and changes of storage of water occurring in a given field within specified boundaries during aspecified period of time considering rainfall and evapotranspiration. Difference bet
Autor:
Vrushali Mane, S. N. Pawar
Publikováno v:
International Journal of Computer Applications. 136:29-34
means illegal entry or unwelcome addition of the system. So, Intrusion detection system is used to find out the signatures of an intrusion. The goal of the system is to protect system for various network attacks like Dos, U2R, R2L, Probing etc. Intru
Publikováno v:
INTERNATIONAL JOURNAL OF PROCESSING AND POST HARVEST TECHNOLOGY. 6:168-171
Autor:
S. N. Divekar, S. N. Pawar
Publikováno v:
International Journal of Computer Applications. 121:34-38
Autor:
S. N. Pawar, R. S. Bichkar
Publikováno v:
International Journal of Automation and Computing. 12:337-342
Genetic algorithm (GA) has received significant attention for the design and implementation of intrusion detection systems. In this paper, it is proposed to use variable length chromosomes (VLCs) in a GA-based network intrusion detection system. Fewe