ARCHIVES
Model Aphid Predator Neuroptera (Insecta): Web-Based Digital Key Development from Dichotomous Key by Computer Programming
Published Online: January-April 2023
Pages: 01-10
Cite this article
No DOIAbstract
The bulk of scientific problems given by biologists could never be answered or even envisioned without reference to some sort of hierarchical arrangement of tax a, making classification the most fundamental component of all biological sciences. The majority of biologists may agree that the goal of taxonomy should be to identify the many components of biodiversity, especially considering the significance of accurate organism identification for bio security and the best crop management practises. However, field experience in taxonomy and application is disappearing. As a result, it is essential to find any pests or other creatures. Since adopting new taxonomic technologies in 2011, the USDA Animal and Plant Health Inspection Service, Plant Protection and Quarantine (APHIS-PPQ) has created an incredible array of identification tools, some of which are gaining enormous popularity. There isn't yet a database or programme in India that is suited for this use and uses Indian algorithms. We have chosen the predator group of aphids as our model organism in order to create our own "Digital Key" experiment and identify insects that can control aphids as biocontrol agents. This is because the Neuroptera (Insecta) of West Bengal, India is region-specific database reliant (Homoptera: Aphididae). As a result, we made an experimental website called www.lacewingsofwestbengal.in and a "Digital Key" of "Families" of a particular group of Neuropterans.
Related Articles
2023
Distributed computing and Large Information Investigation
2023
Relative Investigation: Wi-Fi Security Conventions
2023
Near Investigation of Characterization Calculations for Web Spam Recognition
2023
Heart Disease Prediction with Novel Machine Learning Technique
2023
Implementing KLM Algorithm and Open CV for Real Time Hand movement Tracking
2023
Advanced Detection and Mitigation of Cross-Site Scripting Attacks through Intelligent JavaScript Code Injection Analysis
Share Article
Or copy link
*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.