Alternative control of corn weevil,Sitophilus zeamais, in storage using byproducts of oil shaleprocessing in Paraná, Brazil.
DOI:
https://doi.org/10.33240/rba.v4i3.49036Keywords:
grains storage pests, inert powder, ashes of oil shale, siliconAbstract
Annual losses caused by pests during the grain storage are estimated to be equivalent 10% of the Brazil production. The market provides traditional pesticides for control, but the farmer ecological base havefew alternatives. So, this study aimed at checking the efficacy of byproducts of oil shale as control of S.zeamaisin corn seeds. Were employed powders of retorted oil shale, dust refuse oil shale, limeshale, ashes of oil shale at 2 and 5 Kg/1000 Kg of seeds, diatomaceous earth and untreated a checks. The experiments were conducted in completely randomized design, three replicates for location and time of evaluation. The insect mortality was assayed bimonthly at 180 days. Treatment effect was verified through of ANOVA and mean differences by L. S. D. (Fisher Modified), at level of P≤0,05. Ashes of oilshale was efficient until 180 days of storage. There was no negative influence of the rock powders in germination and vigor. Ashes of oil shale present potential big to control of S. zeamais in plantation ecological base.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2009 autor
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright Notice
The copyright of articles published in this journal remains with the authors, with first publication rights for the journal.
License
When published in this open access journal, licensed through CC BY 4.0, articles are distributed free of charge and can be shared and adapted for any purpose, including commercial. As attribution of use, the license requires that due credit be given, with a link to the license and indication of changes. This does not mean that the licensor endorses the use of the information in the article, or the person who used this information. It also implies the impossibility of applying legal or technological measures that restrict the use of the information by third parties.