computerized interactive keys foridentification of fungi

نویسندگان

امید شناور

omid shenavar faculty of crop sciences, sari agricultural sciences and natural resources university, sari, iranدانشکده علوم زراعی، دانشگاه علوم کشاورزی و منابع طبیعی ساری رضا مستوفی زاده قلمفرسا

reza mostowfizadeh-ghalamfarsa department of plant protection, collage of agriculture, shiraz university, shiraz, iranبیماری شناسی گیاهی بخش گیاه پزشکی، دانشکده کشاورزی، دانشگاه شیراز

چکیده

shenavar  o. & mostowfizadeh-ghalamfarsa  r. 2015. computerized interactive keys for identification of fungi. plant pathology science 4(2):41-52 accurate identification of fungi and fungus-like organisms is one of the most important steps for finding an approach to employ or control them. nevertheless, this process is usually laborious and slow. application of interactive keys is one of the ways to save the time and have an accurate identification of the species. an interactive key is a computer program in which the user enters morphological or molecular attributes of the specimen and the program compares them with the data of its database to find a match species with the highest similarity.  such keys also allocate separate images and other data for any known species. in this paper some of the interactive identification keys and their function is discussed.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interactive computerized health care education.

The Patient Education and Activation System (PEAS) project aims to prepare people to take a more active role in their health care decisions. In this paper, the authors describe their work on the Layman Education and Activation Form (LEAF). LEAF is designed to be an interactive, Internet-based system for collecting a patient's medical history. It is unique in that it gives patients access to edu...

متن کامل

A Computerized Interactive Toy: TSU.MI.KI

Young children often build various structures with wooden blocks; structures that are often used for pretend play, subtly improving children’s creativity and imagination. Based on a traditional Japanese wooden block toy, Tsumiki, we propose a novel interactive toy for children, named “TSU.MI.KI”, maintaining the physical assets of wooden blocks and enhancing them with automation. “TSU.MI.KI” co...

متن کامل

students perception of computerized toefl test

تحقیق حاضر به بررسی درک دانشجویان از مزایا و معایب آزمون های کامپیوتری تافل و تاثیر جنسیت بر درک آنها پرداخته است. شرکت کنندگان در این تحقیق 100 نفرزبان آموز مرد و زن بودند که در آزمون کامپیوتری تافل در ایران شرکت کرده بودند. پرسشنامه یی که در مورد مزایا و معایب آزمون های کامپیوتری در مقایسه با آزمون های کاغذی توسط محقق تهیه شده بود جهت تکمیل به این افراد ارایه شد. داده های بدست آمده در این مطا...

15 صفحه اول

Computerized Interactive Gaming via Supporting Vector Machines

Computerized interactive gaming requires automatic processing of large volume of random data produced by players on spot, such as shooting, football kicking, and boxing. This paper describes a supporting vector machine-based artificial intelligence algorithm as one of the possible solutions to the problem of random data processing and the provision of interactive indication for further actions....

متن کامل

GazeTheKey: Interactive Keys to Enhance Gaze-based Typing Experience

Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. Co...

متن کامل

Non-interactive Opening for Ciphertexts Encrypted by Shared Keys

Let a sender Alice computes a ciphertext C of a message M by using a receiver Bob’s public key pkB . Damg̊ard, Hofheinz, Kiltz, and Thorbek (CT-RSA2008) has proposed the notion public key encryption with non-interactive opening (PKENO), where Bob can make an noninteractive proof π that proves the decryption result of C under skB is M , without revealing skB itself. When Bob would like to prove t...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
دانش بیماری شناسی گیاهی

جلد ۴، شماره ۲، صفحات ۵۲-۴۱

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023