1,165 research outputs found

    An interesting case of suicidal poisoning

    Get PDF
    Aconite is one of the most poisonous known herbs. It has been known to be used as a homicidal poison from long time in history. However this is rarely known to be used as suicidal poison. Poisoning with aconite is usually fatal and death commonly occurs due to arrhythmias and cardiotoxicity. We report a case of attempted suicidal poisoning by aconite where patient survived in spite of documented cardiotoxic effects of the poison

    A Study of Crop Yield Prediction Using Machine Learning Approaches

    Get PDF
    Agriculture plays a pivotal role in our society by providing food, fiber, and raw materials for various industries. The world's population is steadily growing, and there is increasing pressure on agriculture to meet the rising global food demand. In this context, the use of machine learning approaches to predict crop yields has gained significant importance. This paper aim is to study the significance of crop yield prediction through machine learning, its methods, applications, and its potential to revolutionize the agricultural sector

    Contrasting origin of graphite in Lützow Holm Complex, East Antarctica ; Evidence from carbon isotope geochemistry

    Get PDF
    第30回極域地学シンポジウム「極域から探る固体地球ダイナミクス」ポスター発

    128-bit Vectorization on Cha-Cha20 Algorithm for Device-to-Device Communication

    Get PDF
    In 5G networks, device to device(D2D) communication is the advanced technology, and it has the major advantages when compared with traditional systems. The coverage area of the system increases by device-to-device transmission which renders with low latency. No doubt, for the upcoming technologies D2D communications is an added advantage but in various views this kind of transmission is still under risk. D2D communication is transferring the information from one device to another device without the involvement of base station. So, the communication is possible with less delay time. Attackers are possible into the D2D communications. To provide the security in communication, encryption algorithms are used. The main theme of the Encryption algorithms is it should execute with less delay time to provide faster communication and in particular CHA-CHA20 offers the secure communication for encrypting the data packets to securing the data. Vectorization on Cha-Cha20 Algorithm provides the security with less delay time compared to AES encryption Algorithm and Cha-Cha20 algorithm. Compared to other encryption algorithms in cryptography, Cha-Cha20 is suited for resource constrained devices

    Landing of Alopias pelagicus (Nakamura, 1936) at Visakhapatnam

    Get PDF
    Two specimens of the pelagic thresher shark Alopias pelagicus (Nakamura, 1936) were landed at Visakhapatnam Fishing Harbour on 28.06.2011. One specimen was male (Fig. 1) and the other was female. The male pelagic thresher shark measured 940 mm and weighed 900 g. The female measured 829 mm (caudal fin tip was absent) and weighed 750 g. The specimens were characterised by large eye size and very long upper lobe of caudal fin. According to Compagno (1984) and Fisher and Bianchi (1984), the pelagic thresher is ovoviviparous, with at least two young, born at a length greater than 96 cm

    A Hybrid Differential Evolution Approach for Simultaneous SchedulingProblems in a Flexible Manufacturing Environment

    Get PDF
    Scheduling of machines and transportation devices like Automated Guided Vehicles (AGVs) in a Flexible Manufacturing System(FMS) is a typical N-P hard problem. Even though several algorithms were employed to solve this combinatorial optimization problem, most of the work concentrated on solving the problems of machines and material handling independently. In this paper the authors have attempted to schedule both the machines and AGVs simultaneously, with makespan minimization as objective, for which Differential Evolution (DE) is applied. Operations based coding is employed to represent the solution vector, which is further modified to suit the DE application. The authors have proposed two new strategies of DE in this paper which better suits the problem. We have developed a separate heuristic for assigning the vehicles and this is integrated with the traditional DE approach. The hybridized approach is tested on a number of benchmark problems whose results outperformed those available in the literature
    corecore