410 research outputs found
Enzymes of the intermediary carbohydrate metabolism of Polyangium cellulosum.
Dept. of Biological Sciences. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis1985 .S282. Source: Masters Abstracts International, Volume: 40-07, page: . Thesis (M.Sc.)--University of Windsor (Canada), 1985
Energy and Mobility Models based Performance Evaluation in MANET
Mobile ad hoc networks are constituted with randomly moving nodes and movement of these nodes is depended upon moving model used in the network. Performance of the network directly depends on the movements and energy consumed in a specific time period by the nodes. Also performance of the protocol used for communication depends on the type of mobility model used by that specific protocol. In this paper, performance of AODV (Ad hoc On demand Distance Vector) routing protocol have been evaluated in respect of five mobility models Random Way Point Mobility Model, Manhattan Grid Mobility Model, Gauss Markov Mobility Model, Random Direction Mobility Model, RPGM (Reference Point Group Mobility)). Performance metrics are considered as: average energy consumption and average residual energy. By varying the network connections, speed of the nodes, and node densities, in different scenarios, routing protocol has been simulated in network simulator 2. Simulation results show that reference point group mobility model is best suitable model as compared to other mobility models for AODV protocol in terms of energy consumption
Analyzing Three Different Tuning Strategies for Random Forest Hyperparameters for Fraud Detection
Technology is advancing rapidly, and more tasks are becoming online than ever. Along with the benefits comes the disadvantages of this great advancement. While online services relieve from the struggle of in person activities, it also puts you on the risk of getting deceived by the fraudsters. This paper aims to detect the fraudulent transactions made online from a bank using a synthetically produced dataset. A random forest model has been trained to predict the fraudulent transactions. To achieve the best performance, the hyperparameters of the model have been tuned using three different tuning methods. As it turns out, grid search proved to be the best tuning strategy in terms of the mean cv score, precision, recall, f1-score and accuracy. It only lacked in providing the best run time, where Bayesian Optimization scored well than the others
Impact of Multiple Insect-Pest Incidence on Yield in Basmati Rice
The experiments for determining the multiple insect-pest incidence on yield loss in basmati rice was conducted for two crop seasons. Five treatments were, viz. application of imidacloprid in vegetative stage; application of granular insecticide in vegetative stage; application of higher dose of Urea; augmentive releases of yellow stem borer egg mass at vegetative and booting stage; untreated control. During both the years, the correlation between grain yield and dead heart, leaf folder damage and planthopper population at 50 and 65 DAT and white ear at maturity was negative. The analysis of variance of regression analysis of yield Vs damage levels at different crop growth stages during both the years revealed a significant linear relationship. The yield loss was highly related to incidence of stem borer and leaf folder damage at 50 and 65 DAT during both the years. For integrated pest management, effective monitoring of stem borer and leaf folder from 50 to 65 DAT is required, which appeared as a critical crop growth stage. The farmers should remain cautious during this period to prevent yield loss
KÄliáš garaášášha and its Buddhist Connections
Invasion of the kingdom of KÄliáš
ga (KÄliáš
garaášášha) by King AĹoka and his consequent Dhamma policy is a recurrent theme in the Buddhist folk lore. In fact, the KÄliáš
ga event is often cited as an example in Buddhism of a cruel king becoming a righteous king by taking shelter in Buddhism. The long term consequences of the KÄliáš
ga War as well as the motive of AĹoka behind the war and its subsequent justificatory politics have been debated by historians. In this paper an attempt has been made to understand AĹokaâs reason for invading KÄliáš
ga as well as KÄliáš
gaâs importance in the spread of Buddhism in South East Asia and Sri Lanka. In the paper it has been shown that AĹoka had invaded KÄliáš
ga primarily because of its commercial importance. Its port of Kaliáš
gapaášnam carried on maritime trade with South East Asia and the Roman empire and Buddhist missionaries travelled from here to popularize Buddhism in South East Asia and Sri Lanka.Various inscriptions from SÄlihuášá¸Äm VihÄra hint at its international profile.The left eye-tooth of the Buddha as well as a branch of the Bodhi Tree were taken to Sri Lanka via the KÄliáš
garaášášha. King Vijaya, the founder of SiášhÄlÄ race was also connected to KÄliáš
garaášášha. In all likelihood, SÄlihuášá¸Äm served the religious and spiritual needs of KÄliáš
garaášášha
Thresholds of descending algorithms in inference problems
We review recent works on analyzing the dynamics of gradient-based algorithms
in a prototypical statistical inference problem. Using methods and insights
from the physics of glassy systems, these works showed how to understand
quantitatively and qualitatively the performance of gradient-based algorithms.
Here we review the key results and their interpretation in non-technical terms
accessible to a wide audience of physicists in the context of related works.Comment: 8 pages, 4 figure
- âŚ