Deogratias Nurwaha and Xinhou Wang
This study presents the application of Artificial Intelligence (AI) techniques to predict the morphology of nanofibers
produced by needless electrospinning method. Two straight and parallel copper wire electrodes electrospinning
method was used to produce nanofibers. Using digital image processing software Image Journal, Mean Nanofiber
Diameter (MFD) and Nanofiber Diameter Standard Deviation (NFSD) have been measured and recorded. Adaptive
Neuro-Fuzzy Inference Systems (ANFIS), Support Vector Machines (SVMs) and Gene Expression Programming
(GEP) methods were used for prediction of electrospun nanofiber morphology. Prediction results and experimental
were compared. It was found that SVMs model has better predictive power in comparison with both ANFIS and Gene
Expression Programming models. However, results provided by both GEP and ANFIS are also acceptable. The
relative importance of process parameters as contributor to the nanofiber morphology was also investigated. It was
found that nanofiber morphology was strongly or weakly dependent on processing parameters.
Ameer Khan* and Zartashia Gull
In this paper, the performance of a multi- swarm Harris Hawk’s Optimization algorithm is reported on a set of benchmark functions provided by CEC2005. In literature, any multi-swarming technique has not been applied to Harris Hawk’s Optimization. In this algorithm, the population is designed to include a number of swarms. All the swarms follow the original algorithm of HHO; however, agents from different swarms are regrouped frequently. Regrouping is performed using random permutation and the global best among all the swarms is considered as Rabbit or Best Solution so far, after iteration. Results show significant improvements in benchmark functions
This manuscript based on the results of a survey, reviews the typical computer applications encountered in the manufacturing industry. The use of computers and available operations research techniques, for production planning and control, amongst companies participating in this survey is discussed. Difficulties, encountered by existing users, in implementing their computer systems are outlined. The article concludes with a brief discussion of the impact of computer use on a number of significant measures of performance.
This manuscript based on the results of a survey, reviews the typical of cell application which can be used for there development of the human and technology in this manuscript we are focusing on the computer and technology and show our well defined to technology in the manuscript. Difficulties, encountered by existing users, in implementing their computer systems are outlined. The article concludes with a brief discussion of the impact of computer use on a number of significant measures of performance.
DOI: 10.37421/2229-8711.2020.11.251
Space correspondence is turning into an essential piece of national and worldwide frameworks. Nations are progressively subject to worldwide satellite abilities for national and global frameworks, which incorporate frameworks overseeing the route of airplane and boats, military choice emotionally supportive networks, money related exchanges, and interchanges through the Internet. Digital security dangers to space interchanges are a moderately new wonder, with expanding associations with the bleeding edge of worry for the basic frameworks because of the weaknesses that such dangers may misuse and contrarily sway. Truth be told, such weaknesses may influence military order frameworks, dispatch frameworks, correspondences, telemetry, following and order, and mission finishing. All the more significantly, space frameworks are frequently utilized as reinforcement answers for customary correspondence system: thus, they are not made sure about by structure.
While working to deliver an app that send commands to the vehicle, I noticed it will not function properly when the phone battery dies. I thought to have the other regular key as alternative solution but the customers did not like to carry the bulky keys. I did some research and came up with a credit card form factor with the same functionalities of a regular key. I added value of Bluetooth chip that connects to the app. I also realized some customers own multiple vehicles and I added a memory chip to save the key learning of up to four vehicles. From the app we can decide what the active profile is.
A system includes a mobile device and a fob, each having a short-range wireless transceiver. The mobile device is programmed to transmit a message to the fob indicating a fob action using the mobile device transceiver. The fob is programmed to, using the fob transceiver, receive the message and transmit a second message to a vehicle requesting the vehicle to perform the fob action.
In one or more illustrative examples, a system includes a mobile device and a fob, each having a short-range wireless transceiver. The mobile device is programmed to transmit a message to the fob indicating a fob action using the mobile device transceiver, and the fob is programmed to, using the fob transceiver, receive the message and transmit a second message to a vehicle requesting the vehicle to perform the fob action.
In one or more illustrative examples, a method includes transitioning a fob into valet mode by sending a wireless short-range message to the fob responsive to receiving input to a mobile device to set the fob into valet mode; and transitioning the fob from valet mode into full access mode by sending a second wireless short-range message to the fob responsive to receiving second input to the mobile device to remove the fob from valet mode. In one or more illustrative examples, a system includes a mobile device and a fob, each having a short-range wireless transceiver. The mobile device is programmed to, responsive to user input, transmit a message using the mobile device transceiver to the fob to transition the fob from being configured to control a first vehicle profile to being configured to control a second vehicle profile, and the fob is programmed to, using the fob transceiver, receive the message and control the second vehicle.
In this paper an improvement of a well-known nature inspired meta-heuristic algorithm is compared with the original algorithm i.e. Multi-Verse Optimizer (MVO). Multi-Verse Optimizer with Time Freeze Effect (MVOTFE) is compared with original MVO in terms of optimization performance, time taken and convergence behavior. MVOTFE is first tested with same 19 benchmark test problems that are used by MVO. MVOTFE uses same mathematical model as used by MVO with only addition of time freeze effect in the algorithm. Comparative analysis suggests that MVOTFE not only outperforms original MVO in 16 out of 19 test problems but also provides faster convergence in lesser time. As indicated by convergence curves, it also effectively escapes from local optima present in the search space.
Erica Cohen
Firstly we would like to extend our warm gratitude to the Editors of this Open Access Journal. Global Journal of Technology and Optimization has collaboration with more than 50 eminent Editors and is successfully publishing quality articles in the field of ‘technology and optimization’. We are using an Editorial Tracking System for quality in peer-review process which is an online manuscript submission, review and tracking systems. Review processing is performed by the editorial board members of the Journal or outside experts; at least two independent reviewers approval followed by editor approval is required for acceptance of any citable manuscript. Authors may submit manuscripts and track their progress through the system, hopefully to publication.
A vehicle that includes in-vehicle controller(s) coupled to an external network transceiver, and configured to register a key fob and/or a mobile device configured as a key fob. The transceiver is configured to communicate autonomously with remote servers to respond to a key fob signal received from the server, which includes an authentication code and a remote control command generated by the key fob and/or mobile device configured as the key fob. In further variations, the key fob is also configured to be paired and/or registered by an external mobile device, by the authentication code, and to generate the remote control command via the mobile device. In response to the key fob signal, the controller(s) autonomously adjust vehicle systems, such as locking or unlocking, arming and disarming a security system, adjusting cabin and/or seat temperature and configuration preferences, as well as other driver vehicle preferences.
Many types of personal, commercial, and industrial vehicles, including combustion engine and hybrid, plug-in hybrid, and battery electric vehicles, hereafter collectively referred to as "vehicles," include several types of in-vehicle computing systems, controllers, interfaces, networks, communications capabilities, and applications. Such onboard systems and applications enable vehicle operation, as well as vehicle to vehicle and vehicle to infrastructure communications, and related communications and remote control capabilities that utilize key fobs and other types of mobile devices via such contemplated communications systems.
The disclosure is directed to a vehicle that includes at least one and/or one or more in-vehicle and/or onboard controller(s) that is/are coupled to an external network transceiver. The controller(s) are configured to register and/ or "pair" a key fob having an authentication code, to enable remote control of the vehicle by the key fob. The transceiver is configured to communicate autonomously with one or more remote server(s) in communication with an external network, such as the internet, and may be one or more transceivers each configured for particular communications protocols and capabilities, such as for example, Wi-Fi and cellular communications.
The focus of the study is to apply the mapping method to innovate curriculum design. The purpose is to explore how to use the teaching method concept mapping to help learners build scaffolding, so that learners can organize scattered knowledge and construct meaningful integer knowledge through concept mapping. In other words, it helps the intermediate phase learners to present integer abstract concepts in a practical way and show the interrelated concepts and facts when working with integers. Concept mapping is regarded as a powerful tool for teaching Science and this study explores how effective the concept mapping skills can be used in exploring Mathematical concepts such as integers. The analysis of this paper is done using the Blooms Taxonomy.
The purpose of this paper was to investigate the preferred contexts in learning number concepts in integers. The research also looked at the impact of contexts in the interpretation of the integer using stories. The researcher decided to interrogate and find out if the use of contexts could enhance the learners’ academic performances. The problem is the intermediate phase learners are operating two grade levels behind the expected and South African intermediate phase learners are performing poorly in Mathematics. The scope is on focus relevance, appropriateness, and correctness in the development of mathematical thinking and practice. The argument is the use of contexts in learning number concepts can facilitate the understanding of the learning of the number concept integers. Discussions on different contexts for learning integers were done by intermediate phase learners (Grade 4-6) in one primary school in Johannesburg North in Gauteng Province. Interviews on preferred contexts in learning number concept integers comprised 29 learners. The research adopted a qualitative approach of analyzing the interview responses from the learners. Analysis of results indicates that the use of preferred contexts in learning number concepts in contexts can either facilitate or hinder the learning of number concepts in integers in the intermediate phase. The findings imply that the use of contexts has a positive or a negative impact on the learning of number concepts in context integers. These results can be generalized to all the other learners who are in the same phase.
Allocation of subjects is an important task for every educational institution. Subject allocation is considered as a major factor to the teaching quality.
In this study, we used the Fuzzy allocation methods: centroid ranking method and Robust ranking method, for allocating the subjects in a department for the coming semester. We used the scores obtained by the faculty members, from the Chairman, Course Director and the students, based on the performance in the previous semester.
Natalia Williams
ME Conferences cordially welcome all the participants all over the world to the "8th World Machine Learning and Deep learning Conference" which is going to be held at November 15-16 in Barcelona, Spain The theme of the conference is “Intensify the world with Machine Learning”. Check out where the world is going with the recent advancements in the field of Machine Learning by grabbing this magnificent opportunity.
Natalia Williams
Webinar on Mechatronics Scheduled on August 17, 2021 in London, UK. The goal of the webinar is therefore to bring together international researchers from industry and academia, from authorities and other institutions, from all over the world, to convey the information and share the latest developments across the immense and distinct fields of Mechatronics.
Natalia Williams
Conference Series invites all the experts and researchers from the Automation and Artificial Intelligence sector all over the world to attend “2nd International Conference on Automation and Artificial Intelligence which is going to be held on June 24-25, 2022 at Toronto, Canada. Artificial Intelligence 2022 conference includes Keynote presentations, Oral talks, Poster Presentations, Workshops, and Exhibitors. Artificial Intelligence is a region of software engineering that emphasizes the production of intelligent machines that work and respond like people. Artificial intelligence is expert in studying how human brain thinks, learn, decide, and work while trying to solve a problem, and then using the products of this study as a source of increasing smart software and systems. In the real life, the knowledge has some undesirable properties. In the modern world, Artificial Intelligence can be used in many ways to control robots, Sensors, actuators etc.
Erica Cohen
Geometry lies at the root of a 3D application as it forms the main shape of a model. To get smoother reflections and faster rendering you should keep
the mesh as regular as possible. In the beginning, you should decide on the level of details you want to have in your scene, and stick to that when modelling; (B):
When modeling creases, better use smooth groups instead of adding more polygons
Erica Cohen
A simple sketch of a Transmission Electron Microscope (TEM) and Scanning Electron Microscope (SEM) compared to an optical transmission microscope and a cathode ray tube (CRT) TV screen-both systems have many things on common with the electron microscope. The optical microscope uses lenses to control the lights pathway through the system and is in many ways built up like a TEM-only the TEM uses electromagnetic lenses to direct the beam of electrons. The CRT uses electromagnetic lenses as the TEM and SEM to control the electron beam, and generates an image for the viewer by scanning the beam over a fluorescent screen - in the same way the a SEM generates an image by scanning the electron beam over a small sample.
DOI: 10.37421/2229-8711.2022.13.309
A sudden drop in pressure causes vapour and gas bubbles to form within a liquid medium (alsocalled cavitation). This causes a slew of (important) engineering issues, including material loss, noise, and vibration of hydraulic machinery. Cavitation, on the other hand, is a potentially useful phenomenon: extreme conditions are increasingly being used for a wide range of applications, including surface cleaning, enhanced chemistry, and wastewater treatment (bacteria eradication and virus inactivation). Despite these significant advances, there is still a significant gap between our understanding of the mechanisms that contribute to the effects of cavitation and its application.
DOI: 10.37421/2229-8711.2022.13.310
Threats to global food security have been widely publicised, including population growth, ageing farming populations, meat consumption trends, climate-change effects on abiotic and biotic stresses, and the environmental impacts of agriculture. Furthermore, with increasing pest, disease, and weed tolerance, traditional crop genetic and protective chemistry technologies of the 'Green Revolution' are under increasing strain. To alleviate the burden of these challenges, efforts have been made to automate and robotize aspects of the farming process. This drive has typically focused on higher-value sectors, such as horticulture and viticulture, which have historically relied on seasonal manual labour to maintain produce supply.
DOI: 10.37421/2229-8711.2022.13.311
DOI: 10.37421/2229-8711.2022.13.312
DOI: 10.37421/2229-8711.2022.13.313
Global Journal of Technology and Optimization received 847 citations as per Google Scholar report