Dr. Nidhi Mishra, Dr. F Rahman, Mr. Om Hari Naryan Kushwaha
A compelling group the board framework offers prompt receptive or proactive treatment of possible problem areas, including packed circumstances and dubious developments, which relieve or evades serious episodes and fatalities. The group the board space creates spatial and transient goal that requests different modern components to quantify, concentrates, and interact with the information to deliver a significant reflection. Swarm the board incorporates demonstrating the developments of a group to project compelling systems that help fast emersion from a risky and deadly circumstance. Web of Things (IoT) advancements, AI procedures, and specialized techniques can be utilized to detect the group trademark/thickness and proposition early recognition of such occasions or far superior expectation of likely mishaps to illuminate the administration specialists. Different AI strategies have been applied for swarm the board; in any case, the quick progression in profound various leveled models that gains from a nonstop stream of information has not been completely explored in this specific situation. For instance, Hierarchical Temporal Memory (HTM) has shown strong capacities for application areas that require internet learning and demonstrating transient data. This paper proposes another HTM-based structure for peculiarity identification in a group the board framework. The proposed system offers two capabilities: (1) responsive discovery of group oddities and (2) proactive location of peculiarities by foreseeing expected irregularities before occurring. The exact assessment demonstrates that HTM accomplished 94.22%, which outflanks k-Nearest Neighbor Global Anomaly Score (kNN-GAS) by 18.12%, Independent Component Analysis-Local Outlier Probability (ICA-LoOP) by 18.17%, and Singular Value Decomposition Influence Outlier (SVD-IO) by 18.12%, in swarm different irregularity location. Besides, it shows the capacity of the proposed alarming system in anticipating potential group irregularities. For this reason, a mimicked swarm dataset was made utilizing the MassMotion swarm recreation device.
{"title":"Use of Hierarchical Temporal Memory to Assess Reactive and Proactive Dissonance for Anomaly Signal Management","authors":"Dr. Nidhi Mishra, Dr. F Rahman, Mr. Om Hari Naryan Kushwaha","doi":"10.17762/msea.v71i3s.17","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.17","url":null,"abstract":"A compelling group the board framework offers prompt receptive or proactive treatment of possible problem areas, including packed circumstances and dubious developments, which relieve or evades serious episodes and fatalities. The group the board space creates spatial and transient goal that requests different modern components to quantify, concentrates, and interact with the information to deliver a significant reflection. Swarm the board incorporates demonstrating the developments of a group to project compelling systems that help fast emersion from a risky and deadly circumstance. Web of Things (IoT) advancements, AI procedures, and specialized techniques can be utilized to detect the group trademark/thickness and proposition early recognition of such occasions or far superior expectation of likely mishaps to illuminate the administration specialists. Different AI strategies have been applied for swarm the board; in any case, the quick progression in profound various leveled models that gains from a nonstop stream of information has not been completely explored in this specific situation. For instance, Hierarchical Temporal Memory (HTM) has shown strong capacities for application areas that require internet learning and demonstrating transient data. This paper proposes another HTM-based structure for peculiarity identification in a group the board framework. The proposed system offers two capabilities: (1) responsive discovery of group oddities and (2) proactive location of peculiarities by foreseeing expected irregularities before occurring. The exact assessment demonstrates that HTM accomplished 94.22%, which outflanks k-Nearest Neighbor Global Anomaly Score (kNN-GAS) by 18.12%, Independent Component Analysis-Local Outlier Probability (ICA-LoOP) by 18.17%, and Singular Value Decomposition Influence Outlier (SVD-IO) by 18.12%, in swarm different irregularity location. Besides, it shows the capacity of the proposed alarming system in anticipating potential group irregularities. For this reason, a mimicked swarm dataset was made utilizing the MassMotion swarm recreation device.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45748795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Munshi Lal Patel, Mrs. Smita Premanand, Mr. Kapil Kelkar
Multiagent frameworks give an ideal climate to the assessment and examination of true issues utilizing support learning calculations. Most customary ways to deal with multiagent learning are impacted by lengthy preparation periods as well as high computational intricacy. Flawless (NeuroEvolution of Augmenting Topologies) is a well-known developmental methodology used to get the best performing brain network design frequently used to handle streamlining issues in the field of man-made reasoning. This paper uses the NEAT calculation to accomplish serious multiagent learning on a changed pong game climate in a productive way. The contending specialists keep various guidelines while having comparable perception space boundaries. The proposed calculation uses this property of the climate to characterize a particular neuro transformative system that gets the ideal strategy for every one of the specialists. The ordered outcomes show that the proposed execution accomplishes ideal conduct in an exceptionally short preparation period when contrasted with existing multiagent support learning models.
{"title":"Efficient Application of Competitive Multiagent Learning by Neuroevolution","authors":"Dr. Munshi Lal Patel, Mrs. Smita Premanand, Mr. Kapil Kelkar","doi":"10.17762/msea.v71i3s.24","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.24","url":null,"abstract":"Multiagent frameworks give an ideal climate to the assessment and examination of true issues utilizing support learning calculations. Most customary ways to deal with multiagent learning are impacted by lengthy preparation periods as well as high computational intricacy. Flawless (NeuroEvolution of Augmenting Topologies) is a well-known developmental methodology used to get the best performing brain network design frequently used to handle streamlining issues in the field of man-made reasoning. This paper uses the NEAT calculation to accomplish serious multiagent learning on a changed pong game climate in a productive way. The contending specialists keep various guidelines while having comparable perception space boundaries. The proposed calculation uses this property of the climate to characterize a particular neuro transformative system that gets the ideal strategy for every one of the specialists. The ordered outcomes show that the proposed execution accomplishes ideal conduct in an exceptionally short preparation period when contrasted with existing multiagent support learning models.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42664150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We introduce and examine several applications of neutrosophic beta omega closed sets namely , , , , in this study. We also introduce the concept of neutrosophic betaomega continuous mapping in neutrosophic topology. Furthermore, we study the relation between the neutrosophic betaomega continuous mapping with the already existing neutrosophic continuous mapping. In addition, we discuss the properties of neutrosophic betaomega continuous mapping.
{"title":"Neutrosophic Beta Omega Closed Sets in Neutrosophic Topological Spaces","authors":"S. P. M. A. Anusuya, A. Nagarajan","doi":"10.17762/msea.v71i3s.13","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.13","url":null,"abstract":"We introduce and examine several applications of neutrosophic beta omega closed sets namely , , , , in this study. We also introduce the concept of neutrosophic betaomega continuous mapping in neutrosophic topology. Furthermore, we study the relation between the neutrosophic betaomega continuous mapping with the already existing neutrosophic continuous mapping. In addition, we discuss the properties of neutrosophic betaomega continuous mapping.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47830179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Plant sicknesses cause significant harvest creation misfortunes around the world, and a great deal of huge exploration exertion has been coordinated toward making plant infection distinguishing proof and therapy methods more viable. It would be of extraordinary advantage to ranchers to have the option to use the ongoing innovation to use the difficulties confronting horticultural creation and thus further develop crop creation and activity productivity. In this work, we planned and executed an easy-to-understand cell phone-based plant illness discovery and treatment suggestion framework utilizing AI (ML) methods. CNN was utilized for include extraction while the ANN and KNN were utilized to order the plant infections; a substance-based sifting proposal calculation was utilized to recommend significant medicines for the recognized plant illnesses after grouping. The aftereffect of the execution shows that the framework accurately identified and suggested treatment for plant illnesses.
{"title":"Apply Machine Learning with Smartphones to Detect and Recommend the Right Treatment for Plant Diseases","authors":"Dr. Nidhi Mishra, Dr. F Rahman, Dr. PritiKumari","doi":"10.17762/msea.v71i3s.23","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.23","url":null,"abstract":"Plant sicknesses cause significant harvest creation misfortunes around the world, and a great deal of huge exploration exertion has been coordinated toward making plant infection distinguishing proof and therapy methods more viable. It would be of extraordinary advantage to ranchers to have the option to use the ongoing innovation to use the difficulties confronting horticultural creation and thus further develop crop creation and activity productivity. In this work, we planned and executed an easy-to-understand cell phone-based plant illness discovery and treatment suggestion framework utilizing AI (ML) methods. CNN was utilized for include extraction while the ANN and KNN were utilized to order the plant infections; a substance-based sifting proposal calculation was utilized to recommend significant medicines for the recognized plant illnesses after grouping. The aftereffect of the execution shows that the framework accurately identified and suggested treatment for plant illnesses.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42333412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is turning into the principal computing model in the future because of its benefits, for example, high asset use rate and save significant expense of execution. The existing algorithms for security issues in cloud computing are basically advanced version of cryptography. Mainly cloud computing algorithm are concerning about data security and privacy preserving of user. To protect the privacy of data owner and data user the cryptographic data are shared and stored in cloud storage by applying HE-homomorphic encryption. According to environment of HE, this paper proposed a new hybrid algorithm by combining the two algorithms of cryptography i.e., AES and ECC with the concept of splitting algorithm. By the implementation of this hybrid algorithm, we will split any file into binary version and then after processing the cryptography technique. This hybrid algorithm provided higher protection against attacks over cloud storage and data sharing.
{"title":"Elliptic Curve Cryptography Based Homomorphic End-to-End Encryption Security in Cloud Computing","authors":"Dr. G. N. Kodanda Ramaiah, Savita A. Harkude","doi":"10.17762/msea.v71i3s.8","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.8","url":null,"abstract":"Cloud computing is turning into the principal computing model in the future because of its benefits, for example, high asset use rate and save significant expense of execution. The existing algorithms for security issues in cloud computing are basically advanced version of cryptography. Mainly cloud computing algorithm are concerning about data security and privacy preserving of user. To protect the privacy of data owner and data user the cryptographic data are shared and stored in cloud storage by applying HE-homomorphic encryption. According to environment of HE, this paper proposed a new hybrid algorithm by combining the two algorithms of cryptography i.e., AES and ECC with the concept of splitting algorithm. By the implementation of this hybrid algorithm, we will split any file into binary version and then after processing the cryptography technique. This hybrid algorithm provided higher protection against attacks over cloud storage and data sharing.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48227520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Searching for the spatial co-area that shows up as often as possible in neighboring space is generally utilized in numerous areas, including cell phone administrations and traffic the board. To accomplish this objective, the SGCT calculation further develops different calculations which use tables to find applicant sets. It utilizes an undirected chart to mine up-and-comers of the maximal co-area designs first, then, at that point, utilizes a dense tree design to store example clubs of competitors. In any case, as how much information develops, the SGCT calculation might store enormous number of hubs during the time spent producing the tree. In this paper, we propose another system which will think about the quantity of occasions of every occasion. We propose a Count-Ordered Instances-tree to record competitors of connection sets. From our trial results, we show that our methodology needs more limited time and costs less extra room than the SGCT calculation.
{"title":"Maximum Co-Location Patterns of Mining Based on Count-Ordered Citations-Analysis of Spatial Databases","authors":"Dr. Nidhi Mishra, Dr. Kumar Shwetabh","doi":"10.17762/msea.v71i3s.19","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.19","url":null,"abstract":"Searching for the spatial co-area that shows up as often as possible in neighboring space is generally utilized in numerous areas, including cell phone administrations and traffic the board. To accomplish this objective, the SGCT calculation further develops different calculations which use tables to find applicant sets. It utilizes an undirected chart to mine up-and-comers of the maximal co-area designs first, then, at that point, utilizes a dense tree design to store example clubs of competitors. In any case, as how much information develops, the SGCT calculation might store enormous number of hubs during the time spent producing the tree. In this paper, we propose another system which will think about the quantity of occasions of every occasion. We propose a Count-Ordered Instances-tree to record competitors of connection sets. From our trial results, we show that our methodology needs more limited time and costs less extra room than the SGCT calculation.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46652326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As of late, the fast advancement of web innovation brings numerous serious organization security issues connected to vindictive interruptions. Interruption Detection System is viewed as one of the huge procedures to defend the organization from both outer and inward assaults. In any case, with the quick development of the IoT organization, cyberattacks are additionally evolving rapidly, and numerous obscure sorts are appearing in the contemporary organization climate. Thusly, the productivity of conventional mark based and oddity based Intrusion Detection System is inadequate. We propose a clever Intrusion Detection System, which utilizes a developmental strategy based include choice methodology and a Random Forest-based classifier. The development based include selector utilizes an imaginative Fitness Function to choose the significant elements and decreases aspects of the information, which raise the Ture Positive Rate and lessen the False Positive Rate simultaneously. With extraordinary high precision in multi-order errands and remarkable abilities of taking care of commotion in gigantic information situations, the Random Forest strategy is broadly utilized in peculiarity identification. This examination proposes a structure that can choose all the more consistent highlights and further develop the order results as contrasted and different innovations. The proposed structure is tried and investigated UNSW-NB15 datasets and NSL-KDD datasets. Different measurable outcomes and itemized correlation with different strategies are introduced inside this article.
{"title":"Intrusion Detection Using Combination of GA Based Feature Selection and Random Forest Machine Learning Supervised Approach","authors":"Sachin Sharma, Shubhashish Goswami, Gesu Thakur","doi":"10.17762/msea.v71i3s.20","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.20","url":null,"abstract":"As of late, the fast advancement of web innovation brings numerous serious organization security issues connected to vindictive interruptions. Interruption Detection System is viewed as one of the huge procedures to defend the organization from both outer and inward assaults. In any case, with the quick development of the IoT organization, cyberattacks are additionally evolving rapidly, and numerous obscure sorts are appearing in the contemporary organization climate. Thusly, the productivity of conventional mark based and oddity based Intrusion Detection System is inadequate. We propose a clever Intrusion Detection System, which utilizes a developmental strategy based include choice methodology and a Random Forest-based classifier. The development based include selector utilizes an imaginative Fitness Function to choose the significant elements and decreases aspects of the information, which raise the Ture Positive Rate and lessen the False Positive Rate simultaneously. With extraordinary high precision in multi-order errands and remarkable abilities of taking care of commotion in gigantic information situations, the Random Forest strategy is broadly utilized in peculiarity identification. This examination proposes a structure that can choose all the more consistent highlights and further develop the order results as contrasted and different innovations. The proposed structure is tried and investigated UNSW-NB15 datasets and NSL-KDD datasets. Different measurable outcomes and itemized correlation with different strategies are introduced inside this article.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47414775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The instability in agriculture production of major crops of NCR-districts of Haryana state is studied using Cuddy Della Valle Index method (CDVI). The study includes 13 National Capital Region (NCR) district like Bhiwani, Mahendergarh, Jind, Rewari, Gurugram, Faridabad, Jhajjar, Rohtak, Sonipat, Panipat, Karnal, Mewat and Palwal except the newly established district Charkhi Dadari. For the study a period of last fifteen years, that is, from 2004-05 to 2018-19 is taken for the analysiswhich is divided in to three equal sub-intervals: period-I (2004-05 to 2008-09), period-II (2009-10 to 2013-14) and period-III (2014-15 to 2018-19). The secondary data is collected from the various issues of the Economical Survey of Haryana and the Statistical Abstract of Haryana for the period of 15 years, that is, from 2004-05 to 2018-19.
采用Cuddy Della Valle指数法(CDVI)对哈里亚纳邦ncr区主要作物的农业生产不稳定性进行了研究。该研究包括13个国家首都区(NCR),如比瓦尼、马亨德加尔、金德、瑞瓦里、古卢格拉姆、法里达巴德、贾贾尔、罗塔克、索尼帕特、帕尼帕特、卡纳尔、梅瓦特和帕尔瓦尔,除了新成立的查尔希达达里区。本研究选取过去15年,即2004-05年至2018-19年进行分析,分为三个相等的子区间:第一阶段(2004-05年至2008-09年),第二阶段(2009-10年至2013-14年)和第三阶段(2014-15年至2018-19年)。二级数据收集自《哈里亚纳邦经济调查》和《哈里亚纳邦统计摘要》的各期,时间为15年,即2004-05年至2018-19年。
{"title":"Statistical Methods for Instability in Production of Major Crops in National Capital Region (NCR) of Haryana","authors":"Madhu Ahlawat, Pooja Kumari","doi":"10.17762/msea.v71i3s.11","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.11","url":null,"abstract":"The instability in agriculture production of major crops of NCR-districts of Haryana state is studied using Cuddy Della Valle Index method (CDVI). The study includes 13 National Capital Region (NCR) district like Bhiwani, Mahendergarh, Jind, Rewari, Gurugram, Faridabad, Jhajjar, Rohtak, Sonipat, Panipat, Karnal, Mewat and Palwal except the newly established district Charkhi Dadari. For the study a period of last fifteen years, that is, from 2004-05 to 2018-19 is taken for the analysiswhich is divided in to three equal sub-intervals: period-I (2004-05 to 2008-09), period-II (2009-10 to 2013-14) and period-III (2014-15 to 2018-19). The secondary data is collected from the various issues of the Economical Survey of Haryana and the Statistical Abstract of Haryana for the period of 15 years, that is, from 2004-05 to 2018-19.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46214034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mr. Om Hari Naryan Kushwaha, Mr. Dindayal Singh, Dr. Utkarsh Anand
The review was taken up to appraise genotypic and phenotypic changeability, heritability with hereditary development, relationship, and bunch examination on development and yield boundaries in 10 variations of assortment T-9 of Brassica campestris (toria). These variations were acquired through mutagenesis. Examination of change uncovers that there are profoundly massive contrasts among every one of the characteristics considered. Completely, phenotypic coefficients of fluctuation were higher than their separate genotypic coefficients of change for every one of the characteristics. High GCV was noticed for cases plant-1, snout length, and seed yield plant-1 while most noteworthy PCV was displayed for auxiliary branches plant-1. Expansive sense heritability went from most reduced 16.41 for auxiliary branches per plant to most noteworthy 72.35 for plant level. Units plant-1, plant level, mouth length, case length, and seed yield plant-1 showed high hereditary development over mean percent. The consequences of connection uncovered that seed yield plant-1 showed an exceptionally huge positive relationship with stem border, optional branches, cases on a fundamental raceme, unit plant-1, and 100 seed weight, albeit critical negative connection with bill length. The attributes which showed a positive connection with seed yield were the fundamental supporter of high seed yield plant-1. All genotypes were assembled into two groups at 3% linkage. Bunch I contains variations with a most extreme mean incentive for plant level, raceme length, and case length though group II genotypes showed high mean incentive for unit plant-1, 100 seed weight, and seed yield plant-1. The consequence of hereditary uniqueness in variations shows that it is useful in the choice of prevalent yield credits in the rearing system of oilseed Brassicas.
{"title":"Evaluation of Correlations and Cluster Analysis of Genetic Variants, Heritability, and Genetic Advances Using Mutagens Driven Ten Variants of Brassica Campestris","authors":"Mr. Om Hari Naryan Kushwaha, Mr. Dindayal Singh, Dr. Utkarsh Anand","doi":"10.17762/msea.v71i3s.25","DOIUrl":"https://doi.org/10.17762/msea.v71i3s.25","url":null,"abstract":"The review was taken up to appraise genotypic and phenotypic changeability, heritability with hereditary development, relationship, and bunch examination on development and yield boundaries in 10 variations of assortment T-9 of Brassica campestris (toria). These variations were acquired through mutagenesis. Examination of change uncovers that there are profoundly massive contrasts among every one of the characteristics considered. Completely, phenotypic coefficients of fluctuation were higher than their separate genotypic coefficients of change for every one of the characteristics. High GCV was noticed for cases plant-1, snout length, and seed yield plant-1 while most noteworthy PCV was displayed for auxiliary branches plant-1. Expansive sense heritability went from most reduced 16.41 for auxiliary branches per plant to most noteworthy 72.35 for plant level. Units plant-1, plant level, mouth length, case length, and seed yield plant-1 showed high hereditary development over mean percent. The consequences of connection uncovered that seed yield plant-1 showed an exceptionally huge positive relationship with stem border, optional branches, cases on a fundamental raceme, unit plant-1, and 100 seed weight, albeit critical negative connection with bill length. The attributes which showed a positive connection with seed yield were the fundamental supporter of high seed yield plant-1. All genotypes were assembled into two groups at 3% linkage. Bunch I contains variations with a most extreme mean incentive for plant level, raceme length, and case length though group II genotypes showed high mean incentive for unit plant-1, 100 seed weight, and seed yield plant-1. The consequence of hereditary uniqueness in variations shows that it is useful in the choice of prevalent yield credits in the rearing system of oilseed Brassicas.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67700097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is a significant role for electronic resources to play in promoting higher education and in accomplishing educational goals. E-resources provide a wealth of information for students who are looking for additional learning tools outside of the classroom. In this study we have discussed about the brief ancient background and development of e-resources, forms of electronic resources, electronic resources and service in university libraries, traditional libraries towards virtual libraries, presents scenario of the library’s e-resources.
{"title":"A Study on Development and Forms of Electronic Resources in Libraries","authors":"Vijay Parashar, Dr. Praveen Babel","doi":"10.17762/msea.v71i3.127","DOIUrl":"https://doi.org/10.17762/msea.v71i3.127","url":null,"abstract":"There is a significant role for electronic resources to play in promoting higher education and in accomplishing educational goals. E-resources provide a wealth of information for students who are looking for additional learning tools outside of the classroom. In this study we have discussed about the brief ancient background and development of e-resources, forms of electronic resources, electronic resources and service in university libraries, traditional libraries towards virtual libraries, presents scenario of the library’s e-resources.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45907426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}