410 research outputs found

    Enzymes of the intermediary carbohydrate metabolism of Polyangium cellulosum.

    Get PDF
    Dept. of Biological Sciences. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis1985 .S282. Source: Masters Abstracts International, Volume: 40-07, page: . Thesis (M.Sc.)--University of Windsor (Canada), 1985

    Energy and Mobility Models based Performance Evaluation in MANET

    Get PDF
    Mobile ad hoc networks are constituted with randomly moving nodes and movement of these nodes is depended upon moving model used in the network. Performance of the network directly depends on the movements and energy consumed in a specific time period by the nodes. Also performance of the protocol used for communication depends on the type of mobility model used by that specific protocol. In this paper, performance of AODV (Ad hoc On demand Distance Vector) routing protocol have been evaluated in respect of five mobility models Random Way Point Mobility Model, Manhattan Grid Mobility Model, Gauss Markov Mobility Model, Random Direction Mobility Model, RPGM (Reference Point Group Mobility)). Performance metrics are considered as: average energy consumption and average residual energy. By varying the network connections, speed of the nodes, and node densities, in different scenarios, routing protocol has been simulated in network simulator 2.  Simulation results show that reference point group mobility model is best suitable model as compared to other mobility models for AODV protocol in terms of energy consumption

    Analyzing Three Different Tuning Strategies for Random Forest Hyperparameters for Fraud Detection

    Get PDF
    Technology is advancing rapidly, and more tasks are becoming online than ever. Along with the benefits comes the disadvantages of this great advancement. While online services relieve from the struggle of in person activities, it also puts you on the risk of getting deceived by the fraudsters. This paper aims to detect the fraudulent transactions made online from a bank using a synthetically produced dataset. A random forest model has been trained to predict the fraudulent transactions. To achieve the best performance, the hyperparameters of the model have been tuned using three different tuning methods. As it turns out, grid search proved to be the best tuning strategy in terms of the mean cv score, precision, recall, f1-score and accuracy. It only lacked in providing the best run time, where Bayesian Optimization scored well than the others

    Impact of Multiple Insect-Pest Incidence on Yield in Basmati Rice

    Get PDF
    The experiments for determining the multiple insect-pest incidence on yield loss in basmati rice was conducted for two crop seasons. Five treatments were, viz. application of imidacloprid in vegetative stage; application of granular insecticide in vegetative stage; application of higher dose of Urea; augmentive releases of yellow stem borer egg mass at vegetative and booting stage; untreated control. During both the years, the correlation between grain yield and dead heart, leaf folder damage and planthopper population at 50 and 65 DAT and white ear at maturity was negative. The analysis of variance of regression analysis of yield Vs damage levels at different crop growth stages during both the years revealed a significant linear relationship. The yield loss was highly related to incidence of stem borer and leaf folder damage at 50 and 65 DAT during both the years. For integrated pest management, effective monitoring of stem borer and leaf folder from 50 to 65 DAT is required, which appeared as a critical crop growth stage. The farmers should remain cautious during this period to prevent yield loss

    Kāliṅgaraṭṭha and its Buddhist Connections

    Get PDF
    Invasion of the kingdom of Kāliṅga (Kāliṅgaraṭṭha) by King Aśoka and his consequent Dhamma policy is a recurrent theme in the Buddhist folk lore. In fact, the Kāliṅga event is often cited as an example in Buddhism of a cruel king becoming a righteous king by taking shelter in Buddhism. The long term consequences of the Kāliṅga War as well as the motive of Aśoka behind the war and its subsequent justificatory politics have been debated by historians. In this paper an attempt has been made to understand Aśoka’s reason for invading Kāliṅga as well as Kāliṅga’s importance in the spread of Buddhism in South East Asia and Sri Lanka. In the paper it has been shown that Aśoka had invaded Kāliṅga primarily because of its commercial importance. Its port of Kaliṅgapaṭnam carried on maritime trade with South East Asia and the Roman empire and Buddhist missionaries travelled from here to popularize Buddhism in South East Asia and Sri Lanka.Various inscriptions from Sālihuṇḍām Vihāra hint at its international profile.The left eye-tooth of the Buddha as well as a branch of the Bodhi Tree were taken to Sri Lanka via the Kāliṅgaraṭṭha. King Vijaya, the founder of Siṃhālā race was also connected to Kāliṅgaraṭṭha. In all likelihood, Sālihuṇḍām served the religious and spiritual needs of Kāliṅgaraṭṭha

    Thresholds of descending algorithms in inference problems

    Full text link
    We review recent works on analyzing the dynamics of gradient-based algorithms in a prototypical statistical inference problem. Using methods and insights from the physics of glassy systems, these works showed how to understand quantitatively and qualitatively the performance of gradient-based algorithms. Here we review the key results and their interpretation in non-technical terms accessible to a wide audience of physicists in the context of related works.Comment: 8 pages, 4 figure
    • …
    corecore