The discovery of governing equations using the Physics Informed Neural Network (PINN) based on spatial-temporal data is revolutionizing the field of statistical physics. This study combines neural network technology with deterministic model equations and molecular simulation to find an appropriate description of stochastic phenomena. Conventional stochastic solvers rely on molecular interactions and enforce basic conservation laws on a microscopic level. Data-driven algorithms like PINN, ...

The purpose of this project is to develop a model that is capable of recognizing daily basic human activities under real-world conditions, using data collected by a waist-mounted triaxial accelerometer and gyroscope built into a cellphone (in our study, a Samsung Galaxy S II). Activity recognition is formulated as a supervised classification problem, whose data is obtained via an experiment having 30 human subjects perform each of the activities. Our classi...

Natural Language Processing is a flourishing aspect of Data Science in both academia and industry. This paper examines the technique of sentiment classification on text data using automated Machine learning approaches. It will delve into newly introduced embedding techniques and machine learning model pipelines. The models explored in this paper consist of a simple Naive Bayes classifier, as well as several Deep Neural Models, including a Gated Recurrent...

This is a critical research work on numbers, their distribution; even and uneven, and how it affects their multiplication.This work contains underlying principles of numbers and how to increase their rate of multiplicity, which can be applied in mathematics, sciences, economics and basic life style.CONTENTS:THE LAW OF EXPONENTIAL MULTIPLICITY.FIRST LAWSECOND LAWTHIRD LAWINFERENCEMATHEMATICAL PROOFBIOLOGICAL PROOFCONCLUSIONREFERENCES.

This paper aims to have a brief study on the operation of an airbag deployment system usingdifferent sensors. Automobile airbag has gained acceptance over the years as an effectivemeasure to reduce the morbidity and mortality associated with motor vehicle accidents, as such more vehicles have become equipped with them.As noble as the idea sounds new problems have been encountered with the deployment system and its relative sensors which have led to the following injuries retinal damage...

ABSTRACTElastic foundation can be refered to as soil surface that can expand and assume its original position on application of force. Numerous research works has been carried out on pipeline supported beam using different method of analysis such as Differential Transform Method, Finite difference Method Finite Quadrature Element Method and so on. This work examines the vibration analysis of pipeline supported beam on elastic foundation using Fourier Transform Method in form of non-prismatic...

The vibrations of axially functionally graded (AFG) beams are examined incorporating shear deformation and an imperfection. A coupled nonlinear model is developed in the Hamiltonian framework for an AFG imperfect beam. Different sources of displacement nonlinearities are involved in this problem, namely, the geometrical nonlinearities due to the large deformations, and the nonlinearities due to the presence of a geometrical imperfection along the length of the beam. Expressions for the virtua...

AbstractOne major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it bec...

A major grief of network and data security experts and consultants universally is about the capabilities of infectious malicious proxies (Malware) to overrun the whole systems on networks stations in order to inflict mayhem encompassing identity theft, financial scam and systemic digital assault on infrastructures and national resources. In this work, we studied the interactions of two vulnerable classes with the infected and recovered terminals on the systems network and the active use of an...

ABSTRACT A powerful and effective numerical tool called the Variational Iteration Method has been used to solve various kinds of differential equations over the years. Though the Variational Iteration Method has not been used solely to solve various kinds of differential equations as it has always been&n...

An article on Information Technology

R program that calculate mathematical interest theory such as dollar weighted yield rate, time weighted yield rate, simple and compound interest and all others.

ABSTRACT The Employee Human Resource Management and Payroll System is an integrated system that encompasses managing all resources associated to employee such as recruitment details, payment and issues pertaining employee records processing. It is develop to eradicate the errors emanating from manual processing of staff record. Moreover, it provide employee Bio data, staff voucher preparation.TABLE OF CONTENTTitle &...

What is computer?Computer can be defined as an electronic device that operates under the control of instruction that is installed in its memory units.It can also mean an electronic device that receive data as an input, process and bring out the result as an output.With the definition above, one can understand that computer is just a device (electronic device) which operate and control other parts.What is computer system?Computer system like any other system is the combination of internal that...