EFFICACY OF AZADIRACHTA INDICA AND CAPSICUM ANNUUM POWDERS IN THE PROTECTION OF CEREAL SEEDS AGAINST HARVESTER ANTS MESSOR (HYMENOPTERA: FORMICIDAE) IN MUBI, NIGERIA

Authors

  • Jasini Wahedi Department of Zoology, Adamawa State University Mubi, Nigeria
  • Clement Oaya
  • Elkanah S.O.
  • Ishuwa, M. N.

DOI:

https://doi.org/10.33003/fjs-2020-0404-437

Keywords:

Azadirachta indica, Capsicum annuum, Harvester ant, Millet, Sorghum

Abstract

Harvester ants (Messor) have become a major pest to farmers because they swarm in to houses, farms and injure seeds, seedlings, and fruits, causing great damage to plants that falls within their vicinity. This study compared the efficacy of Azadirachta indica (neem) and Capsicum annuum (chili pepper) powder for the protection of sorghum and millet grains against harvester ants (Messor) at graded levels. Four ants hills (A, B, C, and D) were identified around Adamawa State University Campus.1.0g, 2.0g and 3.0g of each of the treatment including the positive control (Rambo) was constituted in each ant hill on a petri dish and 100 seeds each for the 2 grains were added. A control (untreated) experiment was set up in every ant hill which contains 100 seeds for every grain but no treatment was added. The results revealed the efficacy of the treatments when compared will the untreated control, but Capsicum annuum performed significantly better. Millet grains were also preferred by the ants, as they recorded the highest number of picking. Therefore, a sustainable used of these plant products in the protection of grains in the field from harvester ants is encouraged in order to have a maximum yield.

References

References

Chen, Z., Zhang, H., Hatcher, W.G., Nguyen, J. and Yu, W. (2016) ‘A streaming-based network monitoring and threat detection system’, in Proc. of 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA), June, pp.31–37.

Gao, W., Nguyen, J., Yu, W., Lu, C. and Ku, D. (2016) ‘Assessing performance of constrained application protocol (COAP) in manet using emulation’, in Proceedings of the International Conference on Research in Adaptive and Convergent Systems, RACS ’16, ACM, New York, NY, USA, October, pp.103–108.

Guo, H., Li, Y. and Jajodi, S. (2019) ‘Chaining watermarks for detecting malicious modifications to streaming data’, Information Sciences, January, Vol. 177, No. 1, pp.281–298.

Hatcher, W.G., Booz, J., McGiff, J., Lu, C. and Yu, W. (2017) ‘Edge computing based machine learning mobile malware detection’, in Proceedings of National Cyber Summit (NCS), June 2017.

Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H. and Zhao, W. (2019) ‘A survey on internet of things: architecture, enabling technologies, security and privacy, and applications’, IEEE Internet of Things Journal, October, Vol. 4, No. 5, pp.1125–1142.

Nguyen, J., Yu, W. and Ku, D. (2018) ‘Reliable transport for mobile ad hoc networks with constrained application protocol (coap) over negative-acknowledgment oriented reliable multicast (norm)’, in Proceedings of International Conference on Computing, Networking and Communications (ICNC), March.

Qadeer, M.A., Akhtar, N., Khan, F. and Haque, F. (2020) ‘Monitoring and analysis of data packets using data stream management system’, in Proc. of International Conference on Computer and Electrical Engineering, December.

Qayyum, A., Islam, M.H. and Jamil, M. (2018) ‘Taxonomy of statistical-based anomaly detection techniques for intrusion detection’, in Proc. of the IEEE Symposium on Emerging Technologies, September.

Sarkar, S., Chatterjee, S. and Misra, S. (2015) ‘Assessment of the suitability of fog computing in the context of internet of things’, IEEE Transactions on Cloud Computing, October, Vol. 6, No. 1, pp.46–59.

Slabicki, M. and Grochla, K. (2016) ‘Performance evaluation of COAP, SNMP, and NETCONF protocols in fog computing architecture’, in Proc. of IEEE/IFIP the First International Workshop on the Management of Fog Computing and the Internet of Things (ManFIoT), April.

Stankovic, J.A. (2017) ‘Research directions for the internet of things’, IEEE Internet of Things Journal, February, Vol. 1, No. 1, pp.3–9.

Stojmenovic, I. and Wen, S. (2014) ‘The fog computing paradigm: scenarios and security issues’, 2014 Federated Conference on Computer Science and Information Systems, Warsaw, October, pp.1–8.

Wei, S., Shen, D., Chen, G., Zhang, H., Yu, W., Blasch, E., Pham, K. and Cruz, J.B. (2015) ‘On the effectiveness of game-theoretic modelling and analysis against cyber threats for avionic systems’, in 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), September.

Wei, S., Zhang, H., Chen, G., Shen, D., Yu, W., Pham, K.D., Blasch, E.P. and Cruz, J.B. (2016) ‘On resilience studies of system detection and recovery techniques against stealthy insider attacks’, in Proc. of SPIE, April, Vol. 9838.

Xiao, Z. and Xiao, Y. (2014) ‘Achieving accountable MapReduce in cloud computing’, Future Generation Computer Systems, January, Vol. 30, No. 1, pp.1–13.

Xiao, Z., Xiao, Y. and Chen, H. (2014) ‘An accountable framework for sensing-oriented mobile cloud computing’, Journal of Internet Technology, September, Vol. 15, No. 5, pp.813–822.

Xu, G., Yu, W., Griffith, D., Golmie, N. and Moulema, P. (2017) ‘Toward integrating distributed energy resources and storage devices in smart grid’, IEEE Internet of Things Journal, February, Vol. 4, No. 1, pp.192–204.

Yang, Q., An, D. and Yu, W. (2013) ‘On-time desynchronization attack against IEEE 1588 protocol in power grid systems’, in 2013 IEEE Energytech, May, pp.1–5.

Yang, Q., Yang, J., Yu, W., An, D., Zhang, N. and Zhao, W. (2014) ‘On false data-injection attacks against power system state estimation: modelling and countermeasures’, IEEE Transactions on Parallel and Distributed Systems, March, Vol. 25, No. 3, pp.717–729.

Yang, X., Lin, J., Yu, W., Moulema, P.M., Fu, X. and Zhao, W. (2015) ‘A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems’, IEEE Transactions on Computers, January, Vol. 64, No. 1, pp.4–18.

Yang, X., Ren, X., Lin, J. and Yu, W. (2016) ‘On binary decomposition-based privacy-preserving aggregation schemes in real-time monitoring systems’, IEEE Transactions on Parallel and Distributed Systems, October, Vol. 27, No. 10, pp.2967–2983.

Yu, J., Yang, X., Yang, Q., Fu, X. And Zhao. And Zhao. And Zhao. 'Cyberphysical transportation enrooted real-time orders,' IEEE Automobile Technology Transactions, March, Vol. 66, No 3, pp. 2551-65. Sixty-six.

Yang, X., Zhao, P., Zhang, X., Lin, J. and Yu, W. (2019) ‘Toward a Gaussian-mixture model-based detection scheme against data integrity attacks in the smart grid’, IEEE Internet of Things Journal, February, Vol. 4, No. 1, pp.147–161.

Yang, X., Wang, T., Ren, X. and Yu, W. (2018) ‘Survey on improving data utility in differentially private sequential data publishing’, IEEE Transactions on Big Data, Early Access, June, p.1

Yang, Q., An, D., Min, R., Yu, W., Yang, X. and Zhao, W. (2017) ‘On optimal PMU placement-based defence against data integrity attacks in smart grid’, IEEE Transactions on Information Forensics and Security, July, Vol. 12, No. 7, pp.1735–1750.

Yu, H., Gibbons, P.B., Kaminsky, M. and Xiao, F. (2020) ‘Sybillimit: a near-optimal social network defence against Sybil attacks’, in Proc. of IEEE Symposium on Security and Privacy (S&P), June.

Yu, W., Griffith, D., Ge, L., Bhattarai, S. and Golmie, N. (2015) ‘An integrated detection system against false data injection attacks in the smart grid’, Security and Communication Networks, Vol. 8, No. 2, pp.91–109.

Yu, W., Liang, F., He, X., Hatcher, W.G., Lu, C., Lin, J. and Yang, X. (2018) ‘A survey on the edge computing for the internet of things’, IEEE Access, November, Vol. 6, pp.6900–6919.

Lu, R., Lai, C., Deng, R., Luan, R. and T.H. And Liang, H. And Liang. (2016) IEEE Internet of Things Journal, December, Vol 'Optimum operating load distribution in fog cloud computing to controlled delays and energy usage.' 3, Number 6, pp. 1171-1181.

Y, Yue-fei, Z., Jin-long, F. Chuan-long, Y. Xin-zheng and H. H. (2017) IEEE Entry, October, Vol. "Detection using recurrent neural networks." Deng, H., Xu, R., Li, J., 5, pp.21954–21961.

Yu, W., Xu, G., Chen, Z. and Moulema, P. (2013) ‘A cloud computing-based architecture for cybersecurity situation awareness’, in 2013 IEEE Conference on Communications and Network Security (CNS), October, pp.488–492.

Yu, W., Zhang, N., Fu, X., Bettati, R. and Zhao, W. (2010) ‘Location leakage of internet threat monitors: modelling and defence’, IEEE Transactions on Computers (TC), December, Vol. 59, No. 12, pp.1655–1668.

Zhang, H., Cole, Y., Ge, L., Wei, S., Yu, W., Lu, C., Chen, G., Shen, D., Blasch, E. and Pham, K.D. (2016) ‘Scan me mobile: a cloud-based android malware analysis service’, SIGAPP Appl. Comput. Rev., April, Vol. 16, No. 1, pp.36–49.

Zhang, N., Yu, W., Fu, X. and Das, S.K. (2020) ‘Towards effective defence against insider attacks: The establishment of defender’s reputation’, in 2020 14th IEEE International Conference on Parallel and Distributed Systems, December, pp.501–508.

Zhang. And Zhang. And Zhang. (2015) 'Anomaly detection of wireless ad-hoc network cooperative agent' in Proc. 12th ICPADS International Conference on Parallel and Embedded Computing, July.

Published

2021-06-12

How to Cite

Wahedi, J., Oaya, C., Elkanah, O., & Ishuwa, M. (2021). EFFICACY OF AZADIRACHTA INDICA AND CAPSICUM ANNUUM POWDERS IN THE PROTECTION OF CEREAL SEEDS AGAINST HARVESTER ANTS MESSOR (HYMENOPTERA: FORMICIDAE) IN MUBI, NIGERIA. FUDMA JOURNAL OF SCIENCES, 4(4), 85 - 89. https://doi.org/10.33003/fjs-2020-0404-437