236 research outputs found

    SAC Newsletter 2023

    Get PDF
    https://surface.syr.edu/sac_bulletin/1028/thumbnail.jp

    Resolving the confusion of the authorship attribution of a Bengali book

    Get PDF
    406-410The present paper aims to determine whether the Bengali book Londoner Naksa ebong France Bhraman (Wondrous Capers at London and Travelling in France) was written by the geologist Pramathanath Bose (P.N. Bose). To find it out, two well-established style markers often used in authorship attribution studies; namely, function words and punctuation marks, are used here. The result shows that possibly this book was penned by the geologist P.N. Bose. As a corollary, it may also be added that this approach may be used in future authorship attribution studies involving Bengali writings

    Resolving the confusion of the authorship attribution of a Bengali book

    Get PDF
    The present paper aims to determine whether the Bengali book Londoner Naksa ebong France Bhraman (Wondrous Capers at London and Travelling in France) was written by the geologist Pramathanath Bose (P.N. Bose). To find it out, two well-established style markers often used in authorship attribution studies; namely, function words and punctuation marks, are used here. The result shows that possibly this book was penned by the geologist P.N. Bose. As a corollary, it may also be added that this approach may be used in future authorship attribution studies involving Bengali writings

    5th International Symposium on Cage Aquaculture in Asia Book of Abstracts

    Get PDF
    The 5th International Symposium on Cage Aquaculture in Asia (CAA5) is being organised by the Asian Fisheries Society and the ICAR-Central Marine Fisheries Research Institute (CMFRI), in association with the Asian Fisheries Society Indian Branch, from the 25th to 28th of November 2015 at Kochi, India. The event will cover an array of topics related to cage culture under the broad headings of Marine Production Systems, Inland Production Systems, Breeding and Seed Production, Nutrition and Feed, Health and Environment Management and Economics, Livelihood and Policies

    A Comparative Analysis of Portfolio Optimization Using Mean-Variance, Hierarchical Risk Parity, and Reinforcement Learning Approaches on the Indian Stock Market

    Full text link
    This paper presents a comparative analysis of the performances of three portfolio optimization approaches. Three approaches of portfolio optimization that are considered in this work are the mean-variance portfolio (MVP), hierarchical risk parity (HRP) portfolio, and reinforcement learning-based portfolio. The portfolios are trained and tested over several stock data and their performances are compared on their annual returns, annual risks, and Sharpe ratios. In the reinforcement learning-based portfolio design approach, the deep Q learning technique has been utilized. Due to the large number of possible states, the construction of the Q-table is done using a deep neural network. The historical prices of the 50 premier stocks from the Indian stock market, known as the NIFTY50 stocks, and several stocks from 10 important sectors of the Indian stock market are used to create the environment for training the agent.Comment: The report is 52 pages long. It is based on the capstone project done in the post graduate course of data science in Praxis Business School, Kolkata, India, of the Autumn Batch, 202

    Characteristic Reassignment for Hardware Trojan Detection

    Get PDF
    With the current business model and increasing complexity of hardware designs, third-party Intellectual Properties (IPs) are prevalently incorporated into first-party designs. However, the use of third-party IPs increases security concerns related to hardware Trojans inserted by attackers. A core threat posed by Hardware Trojans is the difficulty in detecting such malicious insertions/alternations in order to prevent the damage. This thesis work provides major improvements on a soft IP analysis methodology and tool known as the Structural Checking tool, which analyzes Register-Transfer Level (RTL) soft IPs for determining their functionalities and screening for hardware Trojans. This is done by breaking down primary ports and internal signals into assigned assets that are spread out into six characteristics. Using characteristics based on the external primary ports and the internal signals connected to them, reassignment of assets can be used to match against entries using coarse-grained-to-coarse-grained matching against a subset of known-IPs to classify an unknown soft IP. After determining the soft IP’s functionality, asset reassignment occurs within the Golden Reference Library (GRL), a library consisting of known Trojan-free and Trojan-infested entries. A fine-grained-to-fine-grained asset reassignment is used against the GRL to contain the most up-to-date assets based on the unknown soft IP, where the matching process is used to determine if the soft IP is Trojan-free or Trojan-infested. With the increasing size of the GRL, the need to decrease computational resources while also maintaining high accuracy between unknown soft IPs and GRL entries is vital
    corecore