Chinese citrus fly, Bactrocera minax (Enderlein), is one of the most important pests of citrus. The pest is more problematic in the eastern part of the country, Nepal. Because of the difficulties associated with the control of this pest by chemical insecticides, farmers had experienced great losses in Sweet Orange. Therefore, a participatory field survey was conducted under farmer field conditions to assess losses and measure the efficacy of different local and recommended management options to address the problem of this pest. Study consisted of two major parts: monitoring of pest population and farmer’s survey. For monitoring three orchards were selected located at different altitude i.e. 1200 masl, 1300 masl and 1400 masl. Great Fruit fly Bait (25% protein hydrolysate and 0.1% abamectin) in McPhail traps were used for monitoring. Monitoring was done in every 7 days interval and lures were changed in every 15 days for the effectiveness. Only 18.3% farmers were using protein bait for the management of fruit fly. B. minax had peak population intensity at May and was found decreasing after June so the management practices should be adopted before June to prevent the loss by fruit fly. However, for best effective control attention for monitoring and management procedures has to take place throughout the life cycle of the insect.
In the current environment, cloud computing has developed into a commercial technology that enables users to quickly access resources via the internet on a pay-per-use basis. The customer receives these resources in the form of services. The three service models offered by the cloud services are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). As a result of the enormous improvement in cloud computing technology, it is now widely employed by a variety of business applications, industry apps, Enterprise organizations that have committed to multi-cloud designs, and most IT expenditures are based on the cloud. However, security is the main issue that requires more attention. Recent research indicate that resource availability is the main security issue that cloud users must deal with. The distributed denial of service attack is the main cause of this availability problem. A more advanced form of denial of service is the Distributed DoS assault. It is used by everyone to share knowledge, not just researchers. Therefore, the internet is used to transmit all information to any location in the world. As a result, the internet needs to be more dependable, secure, and safe. The number of attacks has increased exponentially with the growth of the internet. Among all attacks, DDOS is the most upsetting and intensive attack for reducing the network's resource or bandwidth. In this study, we will look at various DDoS attack types, their tactics, and associated defences. The treatment of several DDoS attack defence tactics, such as detection, defence, and mitigation, is explored in this study as well.
A strong IP technology that builds a secure and encrypted connection tunnel over the less secure internet is required by the majority of enterprise organizations. Joint location and link connectivity issues must be resolved for distant users and branch offices to have secure access to corporate applications and other resources. This ensures security while data passes over encrypted tunnels. Despite the development of IP-based VPN, JLP and LCP for VPN customer edge devices and provider edge nodes have not yet been completely investigated. The purpose of this work is to apply cutting-edge viewpoints to VPN-IP design that may be used in IP multi-protocol label switching (MPLSVPN) infrastructure for cloud computing. The system architecture includes mathematical formulas. End-to-end delay, throughput, and resource consumption behavior for IP tunneling are seen to behave moderately for low scale workloads. While showcasing the benefits of an MPLS-based IP-based VPN architecture, the difficulties of VPN-IP tunneling are explored. This study suggests cloud-based MPLS-VPN as a workable substitute for traditional VPN-IP tunneling in order to get the best performance and service delivery
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.