Computer / Mathematics Research Papers/Topics

An Electronic Based Essay Examination System For The College Of Natural And Applied Sciences, Crawford University

ABSTRACT Technology has been in support of online (Electronic) examination for a while now, and has progressively improved the online examination process over the years. However, some schools and institutions are still involved in the manual system of writing exam. This manual system, has a lot of downside such as the tediousness and time mismanagement etc. Some other institutions/Examination bodies are also involved in the use of multiple questions on an online web platform. But this develo...

DESIGN AND IMPLEMENTATION OF AN ONLINE BUS TICKETING SYSTEM (A case study of Sokoto state transport authority)

ABSTRACT Traditionally, bus ticket purchase has been over the counter in bus terminals, however, today it has evolved with the rapid expansion of e-commerce. This project addresses the study and development of an Online Bus Ticketing System web portal that enable customers (passengers) and the staff to make an online bus ticket sale/purchase, ticket cancel, ticket postponement, driver rating, generating of reports and etc. which also act as an operation tool for bus ticketing companies to ope...

AN AUTOMOBILE FAULT DETECTION SYSTEM

ABSTRACT This work presents an intelligent system for fault diagnosis for automobiles. The main goal of this work is to use the vast knowledge previously acquired from human experts by system experts, to visualize, localize and fix a fault in a car. The project is motivated by the need to guide car owners and motor mechanics in the maintenance and troubleshooting of motor problems without having to resort to assumptions. A rule-based artificial intelligence (AI) technique was used to establ...

Novel Quantitative Analysis of Gas Dynamics Equations using Physics Informed Neural Network (PINN) Raj Rashmi and Kojiro Suzuki (Univ. of Tokyo)

The discovery of governing equations using the Physics Informed Neural Network (PINN) based on spatial-temporal data is revolutionizing the field of statistical physics. This study combines neural network technology with deterministic model equations and molecular simulation to find an appropriate description of stochastic phenomena. Conventional stochastic solvers rely on molecular interactions and enforce basic conservation laws on a microscopic level. Data-driven algorithms like PINN, when...

Human Activity Recognition by Wearable Sensors

The purpose of this project is to develop a model that is capable of recognizing daily basic human activities under real-world conditions, using data collected by a waist-mounted triaxial accelerometer and gyroscope built into a cellphone (in our study, a Samsung Galaxy S II). Activity recognition is formulated as a supervised classification problem, whose data is obtained via an experiment having 30 human subjects perform each of the activities. Our classification models have been trained...

Improving Text Classification using Deep Neural Networks and Word Embeddings

Natural Language Processing is a flourishing aspect of Data Science in both academia and industry. This paper examines the technique of sentiment classification on text data using automated Machine learning approaches. It will delve into newly introduced embedding techniques and machine learning model pipelines. The models explored in this paper consist of a simple Naive Bayes classifier, as well as several Deep Neural Models, including a Gated Recurrent Unit (GRU) and a Long Term Short Te...

Law of Exponential Multiplicity

This is a critical research work on numbers, their distribution; even and uneven, and how it affects their multiplication. This work contains underlying principles of numbers and how to increase their rate of multiplicity, which can be applied in mathematics, sciences, economics and basic life style. CONTENTS: THE LAW OF EXPONENTIAL MULTIPLICITY. FIRST LAW SECOND LAW THIRD LAW INFERENCE MATHEMATICAL PROOF BIOLOGICAL PROOF CONCLUSION REFERENCES.

Automotive crash detection and airbag deployment using MEMS accelerometer1

This paper aims to have a brief study on the operation of an airbag deployment system using different sensors. Automobile airbag has gained acceptance over the years as an effective measure to reduce the morbidity and mortality associated with motor vehicle accidents, as such more vehicles have become equipped with them.As noble as the idea sounds new problems have been encountered with the deployment system and its relative sensors which have led to the following injuries retinal damage caus...

VIBRATION ANALYSIS OF PIPELINE SUPPORTED BEAMON ELASTIC FOUNDATION USING FOURIER TRANSFORM METHOD

ABSTRACT Elastic foundation can be refered to as soil surface that can expand and assume its original position on application of force. Numerous research works has been carried out on pipeline supported beam using different method of analysis such as Differential Transform Method, Finite difference Method Finite Quadrature Element Method and so on.  This work examines the vibration analysis of pipeline supported beam on elastic foundation using Fourier Transform Method in form of non-prisma...

APPLICATION OF DIFFERENTIAL TRANSFORM METHOD TO THE VIBRATION ANALYSIS OF SHEAR DEFORMABLE AFG BEAMS

The vibrations of axially functionally graded (AFG) beams are examined incorporating shear deformation and an imperfection. A coupled nonlinear model is developed in the Hamiltonian framework for an AFG imperfect beam. Different sources of displacement nonlinearities are involved in this problem, namely, the geometrical nonlinearities due to the large deformations, and the nonlinearities due to the presence of a geometrical imperfection along the length of the beam. Expressions for the virtua...

Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network

Abstract One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studi...

Computer Malware Propagation and Control

A major grief of network and data security experts and consultants universally is about the capabilities of infectious malicious proxies (Malware) to overrun the whole systems on networks stations in order to inflict mayhem encompassing identity theft, financial scam and systemic digital assault on infrastructures and national resources. In this work, we studied the interactions of two vulnerable classes with the infected and recovered terminals on the systems network and the active use of an...

Variations Iteration Method for Solving Delay Differential Equation/Numerical Analysis

ABSTRACT    A  powerful  and  effective  numerical  tool  called  the  Variational  Iteration Method  has  been  used  to  solve  various  kinds  of  differential  equations  over  the years. Though the Variational Iteration Method has not been used solely to solve various  kinds  of  differential  equations  as  it  has  always  been  coupled  with polynomials/transforms. The core of this project is centred on using basically the Variational Iteration Method...

INFORMATION TECH

An  article on Information Technology


16 - 30 Of 34 Results