...CD for softcopy. Do the assignment in group and each group consists of five members. QUESTION 1 The nonlinear resistive circuit shown below is described by the nonlinear equation TOPIC: CHAPTER 1, 2,3 & 4 DUE/DURATION: ASSESSMENT: ASSIGNMENT 2nd May 2014 (before 5 P.M) WEEK 11 MARKS: 100 f ( x) g ( x) ( E x) 0 R The function g ( x) gives the current through the nonlinear resistor as a function of the voltage x cross its terminals as shown in the following Figure 1. Figure 1 Assuming that g ( x) 9sin( x 5) 10 and consider the three following cases: Case 1: E 5, R 1, Case 2: E 15, R 3, Case 3: E 4, R 0.5. (a) (b) (c) By using an appropriate method that you have learned in this course, find all the solutions of the nonlinear resistive circuit equation for the all cases. Select suitable starting points for xl and xu by plotting f over the interval [0,4] for the all cases, and visually selecting a good starting point. Find the lowest root over the the interval [0,4] by using (i) Bisection method and (ii) False position method. Use the starting points xl and xu in (b) and terminate the computation if a 104. (For (a) and (b) use two decimal places, for (c) use eight decimal places) (20 Marks) QUESTION 2 In the design of all – terrain vehicles (ATV), it is necessary to consider the failure of the vehicle when attempting to negotiate two types of obstacles. One type of failure is called hang-up failure and occurs when the vehicle attempts...
Words: 1147 - Pages: 5
...solution in CD for softcopy. Do the assignment in group as allow by your lecturer. QUESTION 1 The nonlinear resistive circuit shown below is described by the nonlinear equation f ( x) g ( x) ( E x) 0 R TOPIC: CHAPTER 1, 2,3 & 4 DUE/DURATION: MARKS: ASSESSMENT: ASSIGNMENT 2nd May 2014 (before 5 P.M) WEEK 11 100 The function g ( x) gives the current through the nonlinear resistor as a function of the voltage x cross its terminals as shown in the following Figure 1. Figure 1 Assuming that g ( x) 9sin( x 5) 10 and consider the three following cases: Case 1: E 5, R 1, Case 2: E 15, R 3, Case 3: E 4, R 0.5. (a) (b) (c) By using an appropriate method that you have learned in this course, find all the solutions of the nonlinear resistive circuit equation for the all cases. Select suitable starting points for xl and xu by plotting f over the interval [0,4] for the all cases, and visually selecting a good starting point. Find the lowest root over the the interval [0,4] by using (i) Bisection method and (ii) False position method. Use the starting points xl and xu in (b) and terminate the computation if a 104. (For (a) and (b) use two decimal places, for (c) use eight decimal places) (20 Marks) QUESTION 2 In the design of all – terrain vehicles (ATV), it is necessary to consider the failure of the vehicle when attempting to negotiate two types of obstacles. One type of failure is called hang-up failure and occurs when the vehicle attempts...
Words: 1140 - Pages: 5
...number of unobservable factors F1, F2, : : :, Fk . The fact that the factors are not observable disquali¯es regression and other methods previously examined. We shall see, however, that under certain conditions the hypothesized factor model has certain implications, and these implications in turn can be tested against the observations. Exactly what these conditions and implications are, and how the model can be tested, must be explained with some care. 14.2 AN EXAMPLE Factor analysis is best explained in the context of a simple example. Students entering a certain MBA program must take three required courses in ¯nance, marketing and business policy. Let Y1, Y2 , and Y3 , respectively, represent a student's grades in these courses. The available data consist of the grades of ¯ve students (in a 10-point numerical scale above the passing mark), as shown in Table 14.1. Table 14.1 Student grades Student no. 1 2 3 4 5 Finance, Y1 3 7 10 3 10 Grade in: Marketing, Y2 6 3 9 9 6 Policy, Y3 5 3 8 7 5 °Peter Tryfos, 1997. This version printed: 14-3-2001. c 2 Chapter 14: Factor analysis It has been suggested that these grades are functions of two underlying factors, F1 and F2, tentatively and rather loosely described as quantitative ability and verbal ability, respectively. It is assumed that each Y variable is linearly related to the two factors, as follows: Y1 = ¯10 + ¯11 F1 + ¯ 12 F2 + e1 Y2 = ¯20 + ¯21 F1 + ¯ 22 F2 + e2 Y3 = ¯30 + ¯31 F1 + ¯ 32 F2 + e3 (14:1) The...
Words: 6747 - Pages: 27
...International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 ISSN 2229-5518 1 Autonomous Room Air Cooler Using Fuzzy Logic Control System M. Abbas, M. Saleem Khan, Fareeha Zafar Abstract— This research paper describes the design and implementation of an autonomous room air cooler using fuzzy rule based control system. The rule base receives two crisp input values from temperature and humidity sensors, divides the universe of discourse into regions with each region containing two fuzzy variables, fires the rules, and gives the output singleton values corresponding to each output variable. Three defuzzifiers are used to control the actuators; cooler fan, water pump and room exhaust fan. The results obtained from the simulation were found correct according to the design model. This research work will increase the capability of fuzzy logic control systems in process automation with potential benefits. MATLAB-simulation is used to achieve the designed goal. Index Terms— Fuzzy Logic Control, Inference Engine, MATLAB simulation and Rule Selection. —————————— —————————— 1 INTRODUCTION ODERN processing systems are heavily dependent on automatic control systems. The control automation has become essential for machines and processes to run successfully for the achievement of consistent operation, better quality, reduced operating costs, and greater safety. The control system design, development and implementation need the specification of plants...
Words: 4158 - Pages: 17
...test for Case 1 | | | | | | | |Phenotype |Observed No. (o) |Expected No. (e) |(o-e) |(o-e) 2 |(o-e) 2 | | | | | | |e | |Red eyes |31 |33 |2 |4 |.1212 | |Sepia eyes |13 |11 |2 |4 |.3636 | | |.4848 | |(2 (to the nearest ten-thousandth) | | Questions 1. Why is it important to remove the adults in the parental generation? Its important to separate so one knows that F1 flies aer being crossed. 2. What generation will their offspring be? F2 generation is the new offspring 3. Based on the data obtained, is the cross in Case 1 monohybrid or dihybrid? Explain. Since there is only one trait (eye color) the cross is monohybrid which also shows a 3 to 1 ratio. If it was showing in a dihybrid it would have been 9:3:3:1ratio. 4. Is the cross in Case 1 sex–linked...
Words: 320 - Pages: 2
...Damodaran’s Country Risk Premium: A Serious Critique Lutz Kruschwitz∗Andreas Löffler†& Gerwald Mandl‡ , Version from July 31, 2010 Contents 1 Introduction 2 2 2 CRP concept 3 Critique of the CRP concept 7 3.1 The theoretical foundation of Damodaran’s equations – built on sand 7 3.2 Damodoran’s empirical basis – a hotchpotch of ad hoc ideas . . . . . 12 4 Conclusion 19 ∗ Freie Universität Berlin, Germany, Chair of Finance and Banking, E-Mail LK@wacc.de. † Universität Paderborn, Germany, Chair of Finance and Investment, E-Mail AL@wacc.de. ‡ Universität Graz, Austria, Chair of Accounting and Auditing, E-Mail Gerwald.Mandl@uni-graz.at. 1 Electronic copy available at: http://ssrn.com/abstract=1651466 1 Introduction For several years, when setting discount rates Damodaran has advocated more consideration of country risk premiums (CRP ) when it comes to assessing companies with activities in emerging markets. We have to acknowledge that his approach is enjoying growing support among investment banks and auditing firms. At the same time, it is to be noted that Damodaran’s concept has failed to resonate sufficiently with the academic community. This is reason enough to perform a systematic analysis and critical discussion of his country risk premium concept. Damodaran’s initial considerations concerning a country risk premium can be found in Damodaran (1999a) and Damodaran (2003), with further essentially unchanged mentions in his more recent publications. In our contribution...
Words: 7452 - Pages: 30
...Genetic Analysis? Lab Notebook Chi-Square test for Case 1 | | | | | | | |Phenotype |Observed No. (o) |Expected No. (e) |(o-e) |(o-e) 2 |(o-e) 2 | | | | | | |e | |Red eyes |31 |33 |2 |4 |0.1212 | |Sepia eyes |13 |11 |2 |4 |0.3636 | | |0.4848 | |(2 (to the nearest ten-thousandth) | | Questions 1. Why is it important to remove the adults in the parental generation? It is important to keep the generations separate so that you know you are crossing only F1 flies. 2. What generation will their offspring be? The new offspring are the F2 generation. 3. Based on the data obtained, is the cross in Case 1 monohybrid or dihybrid? Explain. The cross is monohybrid because only one trait –eye color– is involved. Further, the data show a 3 : 1 ratio. A dihybrid cross would have resulted...
Words: 449 - Pages: 2
...literature focuses on code constructions that trade storage capacity for perfect security. In other words, by decreasing the amount of original data that it can store, the system can guarantee that the adversary, which eavesdrops up to a certain number of storage nodes, obtains no information (in Shannon’s sense) about the original data. In this work we introduce the concept of block security for DSS and investigate minimum bandwidth regenerating (MBR) codes that are block secure against adversaries of varied eavesdropping strengths. Such MBR codes guarantee that no information about any group of original data units up to a certain size is revealed, without sacrificing the storage capacity of the system. The size of such secure groups varies according to the number of nodes that the adversary can eavesdrop. We show that code constructions based on Cauchy matrices provide block security. The opposite conclusion is drawn for codes based on Vandermonde matrices. I. I NTRODUCTION A. Background In recent years, the demand for large-scale data storage has grown explosively, due to numerous applications including large files and video sharing, social networks, and back-up systems. Distributed Storage Systems (DSS) store a tremendous amount of data using a massive collection of distributed storage nodes. Applications of DSS include large data centers and P2P storage systems such as OceanStore [1], Total Recall...
Words: 4963 - Pages: 20
...If you’re working from the shell, this is done using the javac command (where “c” is for compiler). Usually we will be compiling using the Xcode IDE. Once compiled, the program is executed using the Java interpreter (a.k.a. the Java Virtual Machine or JVM). From the shell, the JVM is invoked with the “java” command. Again we will usually be doing this with the Build and Go or Debug options of the Xcode IDE. A Java program must have a routine called main(), which is the starting point for program execution. main() will always look something like this: public static void main (String args[]) { // insert code here... System.out.println("Hello World!"); } Source Code Formatting Keep in mind the following when writing Java source code: Java is case sensitive (“foo”, “Foo”, and “fOO” are all considered to be different in Java). • Every line of code in Java must end in a semi-colon (“;”). • Java doesn’t care about white space (line breaks, tabs, etc.) but consistent and thoughtful use of white space makes code much easier to read and is part of good programming style. • You can create comments in Java using // for a single-line comment or /* */ for a block comment. Examples: // This comment is just this one line /* This comment includes many lines. Code inside is inactive (“commented...
Words: 968 - Pages: 4
...www.ccsenet.org/ijbm International Journal of Business and Management Vol. 7, No. 3; February 2012 Recent Unrest in the RMG Sector of Bangladesh: Is this an Outcome of Poor Labour Practices? Chowdhury Golam Hossan (Corresponding author) Assistant Professor of Management College of Business Administrations, Abu Dhabi University Abu Dhabi, UAE Tel: 972-501-5710 E-mail: Chowdhury.Hossan@adu.ac.ae Md. Atiqur Rahman Sarker (Lecturer) Department of Business Administration, East West University 43 Mohakhali, Dhaka 1212, Bangladesh Tel: 88-017-4427-0243 E-mail: mars@ewubd.edu Rumana Afroze (Lecturer) Department of Business Administration, East West University 43 Mohakhali, Dhaka 1212, Bangladesh Tel: 880-181-888-3767 Received: July 2, 2011 doi:10.5539/ijbm.v7n3p206 Abstract The RMG sector of Bangladesh has experienced disputes and violent protest by the workers in recent times. This study explores the reasons for recent unrest in the garment sector. Since managers are mainly responsible for applying human resource practices, this paper has given particular attention to their views on recent attitude changes of workers. Results show that mutual understanding among workers and managers is absent in the RMG sector. This study also states that high-work load, poor behaviour of line managers, low skills and low wage rates are the notable reasons for high job turnover and social unrest. Poor relationship between workers and supervisors is the main source of conflict. This study...
Words: 9644 - Pages: 39
...architecture and learning algorithm that can be applied to various natural language processing tasks including part-of-speech tagging, chunking, named entity recognition, and semantic role labeling. This versatility is achieved by trying to avoid task-specific engineering and therefore disregarding a lot of prior knowledge. Instead of exploiting man-made input features carefully optimized for each task, our system learns internal representations on the basis of vast amounts of mostly unlabeled training data. This work is then used as a basis for building a freely available tagging system with good performance and minimal computational requirements. Keywords: natural language processing, neural networks 1. Introduction Will a computer program ever be able to convert a piece of English text into a programmer friendly data structure that describes the meaning of the natural language text? Unfortunately, no consensus has emerged about the form or the existence of such a data structure. Until such fundamental Articial Intelligence problems are resolved, computer scientists must settle for the reduced objective of extracting simpler representations that describe limited aspects of the textual information. These simpler representations are often motivated by specific applications (for instance, bagof-words...
Words: 4649 - Pages: 19
...use effective pricing strategies to maximize profits from F1 ticket sales. We believe this to be an important objective for the F1 management given high costs of hosting the F1 race each year. Effective pricing strategies can help to recoup the cost of the race and possibly even generate revenue for the organizers. The first part of this report focuses on the effectiveness of existing price strategies such as perception based pricing, price discrimination, bundling and discount management. Our analysis suggests that the F1 tickets in Singapore are wrongly priced as it fails to capture perceived benefits such as having a city track and being the first ever night race. It is, however, too late to reset the price as the reference point has been established. Next, we argue that while the use of price discrimination has increased the total revenue from ticket sales, the extensive use of early-bird based pricing has reduced the effectiveness of discount pricing. While some bundling strategies currently in place, we believe that more can be done to increase the perceived value and to capture greater market share. We have provided suggests for this in section 7. We further evaluated the use of discount management for quantity purchases and conclude that the use of high discount (≈15%) for greater quantity sale will only be financially justified through high volume sales. Finally, we propose several solutions to increase F1 revenue yield. We believed that more bundled deals and the...
Words: 3864 - Pages: 16
...1.Introduction Relational database design theory is mainly based on a class of constraints called Functional Dependencies (FDs).FDs are a generalization of keys. This theory defines when a relation is in normal form (e.g., in Third Normal Form or 3NF) for a given set of FDs. It is usually a sign of bad DB design if a schema contains relations that violate the normal form requirements. If a normal form is violated, data is stored redundantly, and information about different concepts is intermixed. To reduce the redundancy in a given relation we need to decompose it in two or more sub relations . Decomposition into highest normal forms required maintaining properties like loss less join decomposition and dependency preserving decomposition. To normalize a relation R we have to remove certain dependencies that exist in it like partial dependency& transitive dependency. Basic definitions 1.1 Functional dependency: In a given table, an attribute Y is said to have a functional dependency on a set of attributes X (written X → Y) if and only if each X value is associated with precisely one Y value. For example, in an "Employee" table that includes the attributes "Employee ID" and "Employee Date of Birth", the functional dependency {Employee ID} → {Employee Date of Birth} would hold. It follows from the previous two sentences that each {Employee ID} is associated with precisely one {Employee Date of Birth}. 1.2 Trivial functional dependency A trivial functional dependency...
Words: 2812 - Pages: 12
...PUBLIC HIGHER EDUCATION INSTITUTIONS The diagram below offers a broad summary of the ways in which funds flow to public universities and technikons in South Africa. Diagram 1: Sources of funds of public higher education institutions Government grants 50% Student tuition & other fees 25% Annual funds for public higher education 100% Other private income 25% The proportions reflected in the diagram are averages for the system as a whole. These proportions can differ widely between institutions. For example, government grants as a proportion of total income can be as low as 35% if an institution is able to raise large amounts of private funds through research contracts, donations and investments and can be as high as 65% in the case of institutions which are not able to generate substantial amounts of private income. The Ministry of Education has direct control over only government grants to public universities and technikons. The Ministry furthermore takes no account of income raised from student fees and other private sources when distributing government grants to individual institutions. These institutions are however required, as public entities, to submit to the Ministry annual financial statements which reflect all expenditures and all income from all public as well as private sources. This paper explains how the Ministry of Education...
Words: 7577 - Pages: 31
...Indian J. Genet., 69(4) (Spl. issue): 352-360 (2009) Analysis of diversity among cytoplasmic male sterile sources and their utilization in developing F1 hybrids in Pearl millet [Pennisetum glaucum (R.) Br] C. Tara Satyavathi*, Sakkira Begum, B. B. Singh, K. V. Unnikrishnan and C. Bharadwaj Division of Genetics, Indian Agricultural Research Institute, New Delhi 110 012 Abstract The present study aims at analysis of diversity among parental lines of different cytoplasmic sources and their utilization in developing F1 hybrids. Seven male sterile cytoplasmic lines belonging to A1 – 3; A4 – 2 and A5 – 2 were crossed with three elite restorers. The cluster analysis done with molecular data obtained from genomic DNA using SSR markers grouped the parental lines belonging to A1 cytoplasm into one cluster, A4 into one and A5 into the other. The assessment of the performance of the F1 hybrids was done through standard heterosis, heterobeltiosis and economic heterosis. The study clearly indicated that all the seven cytoplasmic male sterile lines coming from different cytoplasmic sources are capable of producing new superior hybrids. Physiological characters like chlorophyll, relative carotenoids and root length density have also been studied to assess the performance of parents and F1 hybrids. Higher economic heterosis was observed for yield in A 1 cytoplasm compared to A4 and A5 cytoplasms. Desirable effects of earliness and maturity can be obtained using A4 cytoplasm while desirable...
Words: 5522 - Pages: 23