ABSTRACT This work presents an intelligent system for fault diagnosis for automobiles. The main goal of this work is to use the vast knowledge previously acquired from human experts by system experts, to visualize, localize and fix a fault in a car. The project is motivated by the need to guide car owners and motor mechanics in the maintenance and troubleshooting of motor problems without having to resort to assumptions. A rule-based artificial intelligence (AI) technique was used to establ...

The discovery of governing equations using the Physics Informed Neural Network (PINN) based on spatial-temporal data is revolutionizing the field of statistical physics. This study combines neural network technology with deterministic model equations and molecular simulation to find an appropriate description of stochastic phenomena. Conventional stochastic solvers rely on molecular interactions and enforce basic conservation laws on a microscopic level. Data-driven algorithms like PINN, when...

The purpose of this project is to develop a model that is capable of recognizing daily basic human activities under real-world conditions, using data collected by a waist-mounted triaxial accelerometer and gyroscope built into a cellphone (in our study, a Samsung Galaxy S II). Activity recognition is formulated as a supervised classification problem, whose data is obtained via an experiment having 30 human subjects perform each of the activities. Our classification models have been trained...

Natural Language Processing is a flourishing aspect of Data Science in both academia and industry. This paper examines the technique of sentiment classification on text data using automated Machine learning approaches. It will delve into newly introduced embedding techniques and machine learning model pipelines. The models explored in this paper consist of a simple Naive Bayes classifier, as well as several Deep Neural Models, including a Gated Recurrent Unit (GRU) and a Long Term Short Te...

This is a critical research work on numbers, their distribution; even and uneven, and how it affects their multiplication. This work contains underlying principles of numbers and how to increase their rate of multiplicity, which can be applied in mathematics, sciences, economics and basic life style. CONTENTS: THE LAW OF EXPONENTIAL MULTIPLICITY. FIRST LAW SECOND LAW THIRD LAW INFERENCE MATHEMATICAL PROOF BIOLOGICAL PROOF CONCLUSION REFERENCES.

This paper aims to have a brief study on the operation of an airbag deployment system using different sensors. Automobile airbag has gained acceptance over the years as an effective measure to reduce the morbidity and mortality associated with motor vehicle accidents, as such more vehicles have become equipped with them.As noble as the idea sounds new problems have been encountered with the deployment system and its relative sensors which have led to the following injuries retinal damage caus...

ABSTRACT Elastic foundation can be refered to as soil surface that can expand and assume its original position on application of force. Numerous research works has been carried out on pipeline supported beam using different method of analysis such as Differential Transform Method, Finite difference Method Finite Quadrature Element Method and so on. This work examines the vibration analysis of pipeline supported beam on elastic foundation using Fourier Transform Method in form of non-prisma...

The vibrations of axially functionally graded (AFG) beams are examined incorporating shear deformation and an imperfection. A coupled nonlinear model is developed in the Hamiltonian framework for an AFG imperfect beam. Different sources of displacement nonlinearities are involved in this problem, namely, the geometrical nonlinearities due to the large deformations, and the nonlinearities due to the presence of a geometrical imperfection along the length of the beam. Expressions for the virtua...

Abstract One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studi...

A major grief of network and data security experts and consultants universally is about the capabilities of infectious malicious proxies (Malware) to overrun the whole systems on networks stations in order to inflict mayhem encompassing identity theft, financial scam and systemic digital assault on infrastructures and national resources. In this work, we studied the interactions of two vulnerable classes with the infected and recovered terminals on the systems network and the active use of an...

ABSTRACT A powerful and effective numerical tool called the Variational Iteration Method has been used to solve various kinds of differential equations over the years. Though the Variational Iteration Method has not been used solely to solve various kinds of differential equations as it has always been coupled with polynomials/transforms. The core of this project is centred on using basically the Variational Iteration Method...

An article on Information Technology

R program that calculate mathematical interest theory such as dollar weighted yield rate, time weighted yield rate, simple and compound interest and all others.