Anurag Dagar

Learn More
Gene expression at harvest was compared for two stone fruit cultivars, a peach and its near-isogenic nectarine mutant, using two microarray platforms, μPEACH1.0 and ChillPeach. Together, both platforms covered over 6,000 genes out of which 417 were differentially expressed between the fruits of the two cultivars at a p value of 0.05. A total of 47 genes in(More)
Cold storage induces chilling injury (CI) disorders in peach fruit (woolliness/mealiness, flesh browning and reddening/bleeding) manifested when ripened at shelf life. To gain insight into the mechanisms underlying CI, we analyzed the transcriptome of ‘Oded’ (high tolerant) and ‘Hermoza’ (relatively tolerant to woolliness, but sensitive to browning and(More)
This paper presents an efficient coverage scheme for wireless sensor networks. This scheme focuses on two coverage strategies of wireless sensor network which are compared on different parameters , where Delaunay triangulation is more efficient coverage strategy as compared to square grid deployment strategy because in Square grid coverage strategy if we(More)
Encryption is the process of scrambling a message so that only the intended recipient can read it. With the fast progression of digital data exchange in electronic way, Information Security is becoming much more important in data storage and transmission. Caesar cipher is a mono alphabetic cipher. It is a type of substitution cipher in which each letter in(More)
Two trials were conducted to determine the e¡ects of dietary enrichmentswith themicroalgaParietochloris incisa, rich in arachidonic acid (ARA), on stress resistance in guppies Poecilia reticulata.The microalgawas added to commercial diets as a neutral lipid (NL) extract and its fractions or as broken cells. Experimental diets were applied for a period of 14(More)
Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of(More)
  • 1