Search results for: computer aided instructional package
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3647

Search results for: computer aided instructional package

3077 Diagonal Crack Width of RC Members with High Strength Materials

Authors: J. Y. Lee, H. S. Lim, S. H. Yoon

Abstract:

This paper presents an analysis of the diagonal crack widths of RC members with various types of materials by simulating a compatibility-aided truss model. The analytical results indicated that the diagonal crack width was influenced by not only the shear reinforcement ratio but also the yield strength of shear reinforcement and the compressive strength of concrete. The yield strength of shear reinforcement and the compressive strength of concrete decreased the diagonal shear crack width of RC members for the same shear force because of the change of shear failure modes. However, regarding the maximum shear crack width at shear failure, the shear crack width of the beam with high strength materials was greater than that of the beam with normal strength materials.

Keywords: diagonal crack width, high strength stirrups, high strength concrete, RC members, shear behavior

Procedia PDF Downloads 301
3076 Code Mixing and Code-Switching Patterns in Kannada-English Bilingual Children and Adults Who Stutter

Authors: Vasupradaa Manivannan, Santosh Maruthy

Abstract:

Background/Aims: Preliminary evidence suggests that code-switching and code-mixing may act as one of the voluntary coping behavior to avoid the stuttering characteristics in children and adults; however, less is known about the types and patterns of code-mixing (CM) and code-switching (CS). Further, it is not known how it is different between children to adults who stutter. This study aimed to identify and compare the CM and CS patterns between Kannada-English bilingual children and adults who stutter. Method: A standard group comparison was made between five children who stutter (CWS) in the age range of 9-13 years and five adults who stutter (AWS) in the age range of 20-25 years. The participants who are proficient in Kannada (first language- L1) and English (second language- L2) were considered for the study. There were two tasks given to both the groups, a) General conversation (GC) with 10 random questions, b) Narration task (NAR) (Story / General Topic, for example., A Memorable Life Event) in three different conditions {Mono Kannada (MK), Mono English (ME), and Bilingual (BIL) Condition}. The children and adults were assessed online (via Zoom session) with a high-quality internet connection. The audio and video samples of the full assessment session were auto-recorded and manually transcribed. The recorded samples were analyzed for the percentage of dysfluencies using SSI-4 and CM, and CS exhibited in each participant using Matrix Language Frame (MLF) model parameters. The obtained data were analyzed using the Statistical Package for the Social Sciences (SPSS) software package (Version 20.0). Results: The mean, median, and standard deviation values were obtained for the percentage of dysfluencies (%SS) and frequency of CM and CS in Kannada-English bilingual children and adults who stutter for various parameters obtained through the MLF model. The inferential results indicated that %SS significantly varied between population (AWS vs CWS), languages (L1 vs L2), and tasks (GC vs NAR) but not across free (BIL) and bound (MK, ME) conditions. It was also found that the frequency of CM and CS patterns varies between CWS and AWS. The AWS had a lesser %SS but greater use of CS patterns than CWS, which is due to their excessive coping skills. The language mixing patterns were more observed in L1 than L2, and it was significant in most of the MLF parameters. However, there was a significantly higher (P<0.05) %SS in L2 than L1. The CS and CS patterns were more in conditions 1 and 3 than 2, which may be due to the higher proficiency of L2 than L1. Conclusion: The findings highlight the importance of assessing the CM and CS behaviors, their patterns, and the frequency of CM and CS between CWS and AWS on MLF parameters in two different tasks across three conditions. The results help us to understand CM and CS strategies in bilingual persons who stutter.

Keywords: bilinguals, code mixing, code switching, stuttering

Procedia PDF Downloads 70
3075 Scaffolding Pre-Service Teachers’ Experiences with Book Creator

Authors: Bekir Mugayitoglu

Abstract:

This work shares pre-service teachers' experiences with the Book Creator application during the face-to-face class. Participants for this work were pre-service teachers in a semester-long instructional technology course who developed their own e-books. The work was conducted during the Fall of 2023. Eleven pre-service teachers completed the project, producing books appropriate to their area of concentration. Analysis of participant progress reports shows, that Exemplars showcase creative ways to prepare pre-service teachers to design their own books and have an opportunity to use mobile apps to create a variety of e-material options. The findings support future opportunities for pre-service teachers to design and implement technology-supported literacy applications to integrate into their own classroom pedagogy.

Keywords: scaffolding, e-book, classroom pedagogy, face-to-face class

Procedia PDF Downloads 49
3074 Exploring Professional Development Needs of Mathematics Teachers through Their Reflective Practitioner Experiences

Authors: Sevket Ceyhun Cetin, Mehmet Oren

Abstract:

According to existing educational research studies, students learn better with high teacher quality. Therefore, professional development has become a crucial way of increasing the quality of novices and veteran in-service teachers by providing support regarding content and pedagogy. To answer what makes PD effective, researchers have studied different PD models and revealed some critical elements that need to be considered, such as duration of a PD and the manner of delivery (e.g., lecture vs. engaging). Also, it has been pointed out that if PDs are prepared as one-size-fits-all, they most likely be ineffective in addressing teachers’ needs toward improving instructional quality. Instead, teachers’ voices need to be heard, and the foci of PDs should be determined based on their specific needs. Thus, this study was conducted to identify professional development needs of middle school mathematics teachers based on their self-evaluation of their performances in light of teaching standards. This study also aimed to explore whether the PD needs with respect to years of teaching experience (novice vs. veteran). These teachers had participated in a federally-funded research grant, which aimed to improve the competencies of 6-9 grade-level mathematics teachers in pedagogy and content areas. In the research project, the participants had consistently videoed their lessons throughout a school year and reflected on their performances, using Teacher Advanced Program (TAPTM) rubric, which was based on the best practices of teaching. Particularly, they scored their performances in the following areas and provided evidence as the justifications of their scores: Standards and Objectives, Presenting Instructional Content, Lesson Structure and Pacing, Activities and Materials, Academic Feedback, Grouping Students, and Questioning. The rating scale of the rubric is 1 through 5 (i.e., 1=Unsatisfactory [performance], 3=Proficient, and 5=Exemplary). For each area mentioned above, the numerical scores of 77 written reports (for 77 videoed lessons) of 24 teachers (nnovices=12 and nveteran=12) were averaged. Overall, the average score of each area was below 3 (ranging between 2.43 and 2.86); in other words, teachers judged their performances incompetent across the seven areas. In the second step of the data analysis, the lowest three areas in which novice and veteran teachers performed poorly were selected for further qualitative analysis. According to the preliminary results, the lowest three areas for the novice teachers were: Questioning, Grouping Students, and Academic Feedback. Grouping Students was also one of the lowest areas of the veteran teachers, but the other two areas for this group were: Lesson Structure & Pacing, and Standards & Objectives. Identifying in-service teachers’ needs based on their reflective practitioner experiences provides educators very crucial information that can be used to create more effective PD that improves teacher quality.

Keywords: mathematics teacher, professional development, self-reflection, video data

Procedia PDF Downloads 363
3073 An Improved Circulating Tumor Cells Analysis Method for Identifying Tumorous Blood Cells

Authors: Salvador Garcia Bernal, Chi Zheng, Keqi Zhang, Lei Mao

Abstract:

Circulating Tumor Cells (CTC) is used to detect tumoral cell metastases using blood samples of patients with cancer (lung, breast, etc.). Using an immunofluorescent method a three channel image (Red, Green, and Blue) are obtained. These set of images usually overpass the 11 x 30 M pixels in size. An aided tool is designed for imaging cell analysis to segmented and identify the tumorous cell based on the three markers signals. Our Method, it is cell-based (area and cell shape) considering each channel information and extracting and making decisions if it is a valid CTC. The system also gives information about number and size of tumor cells found in the sample. We present results in real-life samples achieving acceptable performance in identifying CTCs in short time.

Keywords: Circulating Tumor Cells (CTC), cell analysis, immunofluorescent, medical image analysis

Procedia PDF Downloads 206
3072 Developing a Cloud Intelligence-Based Energy Management Architecture Facilitated with Embedded Edge Analytics for Energy Conservation in Demand-Side Management

Authors: Yu-Hsiu Lin, Wen-Chun Lin, Yen-Chang Cheng, Chia-Ju Yeh, Yu-Chuan Chen, Tai-You Li

Abstract:

Demand-Side Management (DSM) has the potential to reduce electricity costs and carbon emission, which are associated with electricity used in the modern society. A home Energy Management System (EMS) commonly used by residential consumers in a down-stream sector of a smart grid to monitor, control, and optimize energy efficiency to domestic appliances is a system of computer-aided functionalities as an energy audit for residential DSM. Implementing fault detection and classification to domestic appliances monitored, controlled, and optimized is one of the most important steps to realize preventive maintenance, such as residential air conditioning and heating preventative maintenance in residential/industrial DSM. In this study, a cloud intelligence-based green EMS that comes up with an Internet of Things (IoT) technology stack for residential DSM is developed. In the EMS, Arduino MEGA Ethernet communication-based smart sockets that module a Real Time Clock chip to keep track of current time as timestamps via Network Time Protocol are designed and implemented for readings of load phenomena reflecting on voltage and current signals sensed. Also, a Network-Attached Storage providing data access to a heterogeneous group of IoT clients via Hypertext Transfer Protocol (HTTP) methods is configured to data stores of parsed sensor readings. Lastly, a desktop computer with a WAMP software bundle (the Microsoft® Windows operating system, Apache HTTP Server, MySQL relational database management system, and PHP programming language) serves as a data science analytics engine for dynamic Web APP/REpresentational State Transfer-ful web service of the residential DSM having globally-Advanced Internet of Artificial Intelligence (AI)/Computational Intelligence. Where, an abstract computing machine, Java Virtual Machine, enables the desktop computer to run Java programs, and a mash-up of Java, R language, and Python is well-suited and -configured for AI in this study. Having the ability of sending real-time push notifications to IoT clients, the desktop computer implements Google-maintained Firebase Cloud Messaging to engage IoT clients across Android/iOS devices and provide mobile notification service to residential/industrial DSM. In this study, in order to realize edge intelligence that edge devices avoiding network latency and much-needed connectivity of Internet connections for Internet of Services can support secure access to data stores and provide immediate analytical and real-time actionable insights at the edge of the network, we upgrade the designed and implemented smart sockets to be embedded AI Arduino ones (called embedded AIduino). With the realization of edge analytics by the proposed embedded AIduino for data analytics, an Arduino Ethernet shield WizNet W5100 having a micro SD card connector is conducted and used. The SD library is included for reading parsed data from and writing parsed data to an SD card. And, an Artificial Neural Network library, ArduinoANN, for Arduino MEGA is imported and used for locally-embedded AI implementation. The embedded AIduino in this study can be developed for further applications in manufacturing industry energy management and sustainable energy management, wherein in sustainable energy management rotating machinery diagnostics works to identify energy loss from gross misalignment and unbalance of rotating machines in power plants as an example.

Keywords: demand-side management, edge intelligence, energy management system, fault detection and classification

Procedia PDF Downloads 247
3071 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 472
3070 2D and 3D Unsteady Simulation of the Heat Transfer in the Sample during Heat Treatment by Moving Heat Source

Authors: Zdeněk Veselý, Milan Honner, Jiří Mach

Abstract:

The aim of the performed work is to establish the 2D and 3D model of direct unsteady task of sample heat treatment by moving source employing computer model on the basis of finite element method. The complex boundary condition on heat loaded sample surface is the essential feature of the task. Computer model describes heat treatment of the sample during heat source movement over the sample surface. It is started from the 2D task of sample cross section as a basic model. Possibilities of extension from 2D to 3D task are discussed. The effect of the addition of third model dimension on the temperature distribution in the sample is showed. Comparison of various model parameters on the sample temperatures is observed. Influence of heat source motion on the depth of material heat treatment is shown for several velocities of the movement. Presented computer model is prepared for the utilization in laser treatment of machine parts.

Keywords: computer simulation, unsteady model, heat treatment, complex boundary condition, moving heat source

Procedia PDF Downloads 385
3069 Effects of Warning Label on Cigarette Package on Consumer Behavior of Smokers in Batangas City Philippines

Authors: Irene H. Maralit

Abstract:

Warning labels have been found to inform smokers about the health hazards of smoking, encourage smokers to quit, and prevent nonsmokers from starting to smoke. Warning labels on tobacco products are an ideal way of communicating with smokers. Since the intervention is delivered at the time of smoking, nearly all smokers are exposed to warning labels and pack-a-day smokers could be exposed to the warnings more than 7,000 times per year. Given the reach and frequency of exposure, the proponents want to know the effect of warning labels on smoking behavior. Its aims to identify the profile of the smokers associated with its behavioral variables that best describe the users’ perception. The behavioral variables are AVOID, THINK RISK and FORGO. This research study aims to determine if there is significant relationship between the effect of warning labels on cigarette package on Consumer behavior when grouped according to profile variable. The researcher used quota sampling to gather representative data through purposive means to determine the accurate representation of data needed in the study. Furthermore, the data was gathered through the use of a self-constructed questionnaire. The statistical method used were Frequency count, Chi square, multi regression, weighted mean and ANOVA to determine the scale and percentage of the three variables. After the analysis of data, results shows that most of the respondents belongs to age range 22–28 years old with percentage of 25.3%, majority are male with a total number of 134 with percentage of 89.3% and single with total number of 79 and percentage of 52.7%, mostly are high school graduates with total number of 59 and percentage of 39.3, with regards to occupation, skilled workers have the highest frequency of 37 with 24.7%, Majority of the income of the respondents falls under the range of Php 5,001-Php10,000 with 50.7%. And also with regards to the number of sticks consumed per day falls under 6–10 got the highest frequency with 33.3%. The respondents THINK RISK factor got the highest composite mean which is 2.79 with verbal interpretation of agree. It is followed by FORGO with 2.78 composite mean and a verbal interpretation of agree and AVOID variable with composite mean of 2.77 with agree as its verbal interpretation. In terms of significant relationship on the effects of cigarette label to consumer behavior when grouped according to profile variable, sex and occupation found to be significant.

Keywords: consumer behavior, smokers, warning labels, think risk avoid forgo

Procedia PDF Downloads 215
3068 Information Technology Approaches to Literature Text Analysis

Authors: Ayse Tarhan, Mustafa Ilkan, Mohammad Karimzadeh

Abstract:

Science was considered as part of philosophy in ancient Greece. By the nineteenth century, it was understood that philosophy was very inclusive and that social and human sciences such as literature, history, and psychology should be separated and perceived as an autonomous branch of science. The computer was also first seen as a tool of mathematical science. Over time, computer science has grown by encompassing every area in which technology exists, and its growth compelled the division of computer science into different disciplines, just as philosophy had been divided into different branches of science. Now there is almost no branch of science in which computers are not used. One of the newer autonomous disciplines of computer science is digital humanities, and one of the areas of digital humanities is literature. The material of literature is words, and thanks to the software tools created using computer programming languages, data that a literature researcher would need months to complete, can be achieved quickly and objectively. In this article, three different tools that literary researchers can use in their work will be introduced. These studies were created with the computer programming languages Python and R and brought to the world of literature. The purpose of introducing the aforementioned studies is to set an example for the development of special tools or programs on Ottoman language and literature in the future and to support such initiatives. The first example to be introduced is the Stylometry tool developed with the R language. The other is The Metrical Tool, which is used to measure data in poems and was developed with Python. The latest literature analysis tool in this article is Voyant Tools, which is a multifunctional and easy-to-use tool.

Keywords: DH, literature, information technologies, stylometry, the metrical tool, voyant tools

Procedia PDF Downloads 144
3067 Management and Evaluation of Developing Medical Device Software in Compliance with Rules

Authors: Arash Sepehri bonab

Abstract:

One of the regions of critical development in medical devices has been the part of the software - as an indispensable component of a therapeutic device, as a standalone device, and more as of late, as applications on portable gadgets. The chance related to a breakdown of the standalone computer program utilized inside healthcare is in itself not a model for its capability or not as a medical device. It is, subsequently, fundamental to clarify a few criteria for the capability of a stand-alone computer program as a medical device. The number of computer program items and therapeutic apps is persistently expanding and so as well is used in wellbeing education (e. g., in clinics and doctors' surgeries) for determination and treatment. Within the last decade, the use of information innovation in healthcare has taken a developing part. In reality, the appropriation of an expanding number of computer devices has driven several benefits related to the method of quiet care and permitted simpler get to social and health care assets. At the same time, this drift gave rise to modern challenges related to the usage of these modern innovations. The program utilized in healthcare can be classified as therapeutic gadgets depending on the way they are utilized and on their useful characteristics. In the event that they are classified as therapeutic gadgets, they must fulfill particular directions. The point of this work is to show a computer program improvement system that can permit the generation of secure and tall, quality restorative gadget computer programs and to highlight the correspondence between each program advancement stage and the fitting standard and/or regulation.

Keywords: medical devices, regulation, software, development, healthcare

Procedia PDF Downloads 104
3066 A Regulator's Assessment of Consumer Risk When Evaluating a User Test for an Umbrella Brand Name in an over the Counter Medicine

Authors: A. Bhatt, C. Bassi, H. Farragher, J. Musk

Abstract:

Background: All medicines placed on the EU market are legally required to be accompanied by labeling and package leaflet, which provide comprehensive information, enabling its safe and appropriate use. Mock-ups with results of assessments using a target patient group must be submitted for a marketing authorisation application. Consumers need confidence in non-prescription, OTC medicines in order to manage their minor ailments and umbrella brands assist purchasing decisions by assisting easy identification within a particular therapeutic area. A number of regulatory agencies have risk management tools and guidelines to assist in developing umbrella brands for OTC medicines, however assessment and decision making is subjective and inconsistent. This study presents an evaluation in the UK following the US FDA warning concerning methaemoglobinaemia following 21 reported cases (11 children under 2 years) caused by OTC oral analgesics containing benzocaine. METHODS: A standard face to face, 25 structured task based user interview testing methodology using a standard questionnaire and rating scale in consumers aged 15-91 years, was conducted independently between June and October 2015 in their homes. Whether individuals could discriminate between the labelling, safety information and warnings on cartons and PILs between 3 different OTC medicines packs with the same umbrella name was evaluated. Each pack was presented with differing information hierarchy using, different coloured cartons, containing the 3 different active ingredients, benzocaine (oromucosal spray) and two lozenges containing 2, 4, dichlorobenzyl alcohol, amylmetacresol and hexylresorcinol respectively (for the symptomatic relief of sore throat pain). The test was designed to determine whether warnings on the carton and leaflet were prominent, accessible to alert users that one product contained benzocaine, risk of methaemoglobinaemia, and refer to the leaflet for the signs of the condition and what to do should this occur. Results: Two consumers did not locate the warnings on the side of the pack, eventually found them on the back and two suggestions to further improve accessibility of the methaemoglobinaemia warning. Using a gold pack design for the oromucosal spray, all consumers could differentiate between the 3 drugs, minimum age particulars, pharmaceutical form and the risk factor methaemoglobinaemia. The warnings for benzocaine were deemed to be clear or very clear; appearance of the 3 packs were either very well differentiated or quite well differentiated. The PIL test passed on all criteria. All consumers could use the product correctly, identify risk factors ensuring the critical information necessary for the safe use was legible and easily accessible so that confusion and errors were minimised. Conclusion: Patients with known methaemoglobinaemia are likely to be vigilant in checking for benzocaine containing products, despite similar umbrella brand names across a range of active ingredients. Despite these findings, the package design and spray format were not deemed to be sufficient to mitigate potential safety risks associated with differences in target populations and contraindications when submitted to the Regulatory Agency. Although risk management tools are increasingly being used by agencies to assist in providing objective assurance of package safety, further transparency, reduction in subjectivity and proportionate risk should be demonstrated.

Keywords: labelling, OTC, risk, user testing

Procedia PDF Downloads 301
3065 Using a Card Game as a Tool for Developing a Design

Authors: Matthias Haenisch, Katharina Hermann, Marc Godau, Verena Weidner

Abstract:

Over the past two decades, international music education has been characterized by a growing interest in informal learning for formal contexts and a "compositional turn" that has moved from closed to open forms of composing. This change occurs under social and technological conditions that permeate 21st-century musical practices. This forms the background of Musical Communities in the (Post)Digital Age (MusCoDA), a four-year joint research project of the University of Erfurt (UE) and the University of Education Karlsruhe (PHK), funded by the German Federal Ministry of Education and Research (BMBF). Both explore songwriting processes as an example of collective creativity in (post)digital communities, one in formal and the other in informal learning contexts. Collective songwriting will be studied from a network perspective, that will allow us to view boundaries between both online and offline as well as formal and informal or hybrid contexts as permeable and to reconstruct musical learning practices. By comparing these songwriting processes, possibilities for a pedagogical-didactic interweaving of different educational worlds are highlighted. Therefore, the subproject of the University of Erfurt investigates school music lessons with the help of interviews, videography, and network maps by analyzing new digital pedagogical and didactic possibilities. In the first step, the international literature on songwriting in the music classroom was examined for design development. The analysis focused on the question of which methods and practices are circulating in the current literature. Results from this stage of the project form the basis for the first instructional design that will help teachers in planning regular music classes and subsequently reconstruct musical learning practices under these conditions. In analyzing the literature, we noticed certain structural methods and concepts that recur, such as the Building Blocks method and the pre-structuring of the songwriting process. From these findings, we developed a deck of cards that both captures the current state of research and serves as a method for design development. With this deck of cards, both teachers and students themselves can plan their individual songwriting lessons by independently selecting and arranging topic, structure, and action cards. In terms of science communication, music educators' interactions with the card game provide us with essential insights for developing the first design. The overall goal of MusCoDA is to develop an empirical model of collective musical creativity and learning and an instructional design for teaching music in the postdigital age.

Keywords: card game, collective songwriting, community of practice, network, postdigital

Procedia PDF Downloads 59
3064 Development of an Autonomous Automated Guided Vehicle with Robot Manipulator under Robot Operation System Architecture

Authors: Jinsiang Shaw, Sheng-Xiang Xu

Abstract:

This paper presents the development of an autonomous automated guided vehicle (AGV) with a robot arm attached on top of it within the framework of robot operation system (ROS). ROS can provide libraries and tools, including hardware abstraction, device drivers, libraries, visualizers, message-passing, package management, etc. For this reason, this AGV can provide automatic navigation and parts transportation and pick-and-place task using robot arm for typical industrial production line use. More specifically, this AGV will be controlled by an on-board host computer running ROS software. Command signals for vehicle and robot arm control and measurement signals from various sensors are transferred to respective microcontrollers. Users can operate the AGV remotely through the TCP / IP protocol and perform SLAM (Simultaneous Localization and Mapping). An RGBD camera and LIDAR sensors are installed on the AGV, using these data to perceive the environment. For SLAM, Gmapping is used to construct the environment map by Rao-Blackwellized particle filter; and AMCL method (Adaptive Monte Carlo localization) is employed for mobile robot localization. In addition, current AGV position and orientation can be visualized by ROS toolkit. As for robot navigation and obstacle avoidance, A* for global path planning and dynamic window approach for local planning are implemented. The developed ROS AGV with a robot arm on it has been experimented in the university factory. A 2-D and 3-D map of the factory were successfully constructed by the SLAM method. Base on this map, robot navigation through the factory with and without dynamic obstacles are shown to perform well. Finally, pick-and-place of parts using robot arm and ensuing delivery in the factory by the mobile robot are also accomplished.

Keywords: automated guided vehicle, navigation, robot operation system, Simultaneous Localization and Mapping

Procedia PDF Downloads 140
3063 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 91
3062 BingleSeq: A User-Friendly R Package for Single-Cell RNA-Seq Data Analysis

Authors: Quan Gu, Daniel Dimitrov

Abstract:

BingleSeq was developed as a shiny-based, intuitive, and comprehensive application that enables the analysis of single-Cell RNA-Sequencing count data. This was achieved via incorporating three state-of-the-art software packages for each type of RNA sequencing analysis, alongside functional annotation analysis and a way to assess the overlap of differential expression method results. At its current state, the functionality implemented within BingleSeq is comparable to that of other applications, also developed with the purpose of lowering the entry requirements to RNA Sequencing analyses. BingleSeq is available on GitHub and will be submitted to R/Bioconductor.

Keywords: bioinformatics, functional annotation analysis, single-cell RNA-sequencing, transcriptomics

Procedia PDF Downloads 197
3061 The Need for Interdisciplinary Approach in Studying Archaeology: An Evolving Cultural Science

Authors: Inalegwu Stephany Akipu

Abstract:

Archaeology being the study of mans past using the materials he left behind has been argued to be classified under sciences while some scholars are of the opinion that it does not deserve the status of being referred to as ‘science’. However divergent the opinions of scholars may be on the classification of Archaeology as a science or in the humanities, the discipline has no doubt, greatly aided in shaping the history of man’s past. Through the different stages that the discipline has transgressed, it has encountered some challenges. This paper therefore, attempts to highlight the need for the inclusion of branches of other disciplines when using Archaeology in reconstructing man’s history. The objective of course, is to add to the existing body of knowledge but specifically to expose the incomparable importance of archaeology as a discipline and to place it on such a high scale that it will not be regulated to the background as is done in some Nigerian Universities. The paper attempts a clarification of some conceptual terms and discusses the developmental stages of archaeology. It further describes the present state of the discipline and concludes with the disciplines that need to be imbibed in the use of Archaeology which is an evolving cultural science to obtain the aforementioned interdisciplinary approach.

Keywords: archaeology, cultural, evolution, interdisciplinary, science

Procedia PDF Downloads 320
3060 Spatial Analysis of the Perception of Family Planning among Teenage Mothers in Nigeria

Authors: Mbuotidem Brendan, Nathanael Afolabi

Abstract:

Teenage pregnancy is a major health concern because of its association with high morbidity and mortality for both mother and child. In 2013, 23% of women in Nigeria, aged 15 - 19 yr have begun childbearing: 17% have had a child and 5% are pregnant with their first child. Reported differences across locations have been attributed to factors such as educational attainment and exposure to mass media. This study therefore seeks to determine the difference in the level of exposure among teenage mothers and older women of reproductive age in Nigeria. Over 12,000 women of reproductive age (18 – 49 yr) were interviewed across 8 states from the Northern and Southern region of Nigeria. The women were further segregated into two groups of 0 (women aged 18 – 20 yr who had children of their own) and 1 (women of reproductive age excluding teenage mothers). Data was collected via structured questionnaires on mobile devices using the open data kit platform. Initial data formatting and recoding was done using STATA 13 package. Initial analysis was also conducted using SPSS version 21 and the data points were mapped on QuantumGIS package. From the results of analyzed data obtained from the studied states, there were various mean ages of first births across the supported states. Though Akwa Ibom had one of the oldest mean ages (21.2 yr) at first birth and the lowest fertility rate of 3.9 births/woman according to the National Demographic Health Survey 2013, Akwa Ibom had the highest rate of teenage pregnancy (18.2%) across the respondents. Based on education, the respondents that had completed secondary school education (56.9%) made up the greatest cohorts of the teenage parents. This is counter indicative of the initial thinking that there is an inverse relationship between level of education and teenage pregnancy. Akwa Ibom, Bauchi and Delta states are states where respondents felt that contraceptive use is dangerous to health and they were the top 4 states that had a large proportion of teenage mothers. Similarly, across the states examined, all the women of reproductive age felt they could convince their spouses to use contraceptives, as using family planning does not cause women to be promiscuous. This study thus reveals that across the states studied, there was no marked variation in the perception of family planning between teenage parents and women of reproductive age. The study also highlights the need for future planning and exposure to family planning messages at secondary school level.

Keywords: adolescent, family planning, mass media, teenage mothers

Procedia PDF Downloads 175
3059 Ischemic Stroke Detection in Computed Tomography Examinations

Authors: Allan F. F. Alves, Fernando A. Bacchim Neto, Guilherme Giacomini, Marcela de Oliveira, Ana L. M. Pavan, Maria E. D. Rosa, Diana R. Pina

Abstract:

Stroke is a worldwide concern, only in Brazil it accounts for 10% of all registered deaths. There are 2 stroke types, ischemic (87%) and hemorrhagic (13%). Early diagnosis is essential to avoid irreversible cerebral damage. Non-enhanced computed tomography (NECT) is one of the main diagnostic techniques used due to its wide availability and rapid diagnosis. Detection depends on the size and severity of lesions and the time spent between the first symptoms and examination. The Alberta Stroke Program Early CT Score (ASPECTS) is a subjective method that increases the detection rate. The aim of this work was to implement an image segmentation system to enhance ischemic stroke and to quantify the area of ischemic and hemorrhagic stroke lesions in CT scans. We evaluated 10 patients with NECT examinations diagnosed with ischemic stroke. Analyzes were performed in two axial slices, one at the level of the thalamus and basal ganglion and one adjacent to the top edge of the ganglionic structures with window width between 80 and 100 Hounsfield Units. We used different image processing techniques such as morphological filters, discrete wavelet transform and Fuzzy C-means clustering. Subjective analyzes were performed by a neuroradiologist according to the ASPECTS scale to quantify ischemic areas in the middle cerebral artery region. These subjective analysis results were compared with objective analyzes performed by the computational algorithm. Preliminary results indicate that the morphological filters actually improve the ischemic areas for subjective evaluations. The comparison in area of the ischemic region contoured by the neuroradiologist and the defined area by computational algorithm showed no deviations greater than 12% in any of the 10 examination tests. Although there is a tendency that the areas contoured by the neuroradiologist are smaller than those obtained by the algorithm. These results show the importance of a computer aided diagnosis software to assist neuroradiology decisions, especially in critical situations as the choice of treatment for ischemic stroke.

Keywords: ischemic stroke, image processing, CT scans, Fuzzy C-means

Procedia PDF Downloads 363
3058 The Analysis of Gizmos Online Program as Mathematics Diagnostic Program: A Story from an Indonesian Private School

Authors: Shofiayuningtyas Luftiani

Abstract:

Some private schools in Indonesia started integrating the online program Gizmos in the teaching-learning process. Gizmos was developed to supplement the existing curriculum by integrating it into the instructional programs. The program has some features using an inquiry-based simulation, in which students conduct exploration by using a worksheet while teachers use the teacher guidelines to direct and assess students’ performance In this study, the discussion about Gizmos highlights its features as the assessment media of mathematics learning for secondary school students. The discussion is based on the case study and literature review from the Indonesian context. The purpose of applying Gizmos as an assessment media refers to the diagnostic assessment. As a part of the diagnostic assessment, the teachers review the student exploration sheet, analyze particularly in the students’ difficulties and consider findings in planning future learning process. This assessment becomes important since the teacher needs the data about students’ persistent weaknesses. Additionally, this program also helps to build student’ understanding by its interactive simulation. Currently, the assessment over-emphasizes the students’ answers in the worksheet based on the provided answer keys while students perform their skill in translating the question, doing the simulation and answering the question. Whereas, the assessment should involve the multiple perspectives and sources of students’ performance since teacher should adjust the instructional programs with the complexity of students’ learning needs and styles. Consequently, the approach to improving the assessment components is selected to challenge the current assessment. The purpose of this challenge is to involve not only the cognitive diagnosis but also the analysis of skills and error. Concerning the selected setting for this diagnostic assessment that develops the combination of cognitive diagnosis, skills analysis and error analysis, the teachers should create an assessment rubric. The rubric plays the important role as the guide to provide a set of criteria for the assessment. Without the precise rubric, the teacher potentially ineffectively documents and follows up the data about students at risk of failure. Furthermore, the teachers who employ the program of Gizmos as the diagnostic assessment might encounter some obstacles. Based on the condition of assessment in the selected setting, the obstacles involve the time constrain, the reluctance of higher teaching burden and the students’ behavior. Consequently, the teacher who chooses the Gizmos with those approaches has to plan, implement and evaluate the assessment. The main point of this assessment is not in the result of students’ worksheet. However, the diagnostic assessment has the two-stage process; the process to prompt and effectively follow-up both individual weaknesses and those of the learning process. Ultimately, the discussion of Gizmos as the media of the diagnostic assessment refers to the effort to improve the mathematical learning process.

Keywords: diagnostic assessment, error analysis, Gizmos online program, skills analysis

Procedia PDF Downloads 176
3057 Building Information Modeling-Based Information Exchange to Support Facilities Management Systems

Authors: Sandra T. Matarneh, Mark Danso-Amoako, Salam Al-Bizri, Mark Gaterell

Abstract:

Today’s facilities are ever more sophisticated and the need for available and reliable information for operation and maintenance activities is vital. The key challenge for facilities managers is to have real-time accurate and complete information to perform their day-to-day activities and to provide their senior management with accurate information for decision-making process. Currently, there are various technology platforms, data repositories, or database systems such as Computer-Aided Facility Management (CAFM) that are used for these purposes in different facilities. In most current practices, the data is extracted from paper construction documents and is re-entered manually in one of these computerized information systems. Construction Operations Building information exchange (COBie), is a non-proprietary data format that contains the asset non-geometric data which was captured and collected during the design and construction phases for owners and facility managers use. Recently software vendors developed add-in applications to generate COBie spreadsheet automatically. However, most of these add-in applications are capable of generating a limited amount of COBie data, in which considerable time is still required to enter the remaining data manually to complete the COBie spreadsheet. Some of the data which cannot be generated by these COBie add-ins is essential for facilities manager’s day-to-day activities such as job sheet which includes preventive maintenance schedules. To facilitate a seamless data transfer between BIM models and facilities management systems, we developed a framework that enables automated data generation using the data extracted directly from BIM models to external web database, and then enabling different stakeholders to access to the external web database to enter the required asset data directly to generate a rich COBie spreadsheet that contains most of the required asset data for efficient facilities management operations. The proposed framework is a part of ongoing research and will be demonstrated and validated on a typical university building. Moreover, the proposed framework supplements the existing body of knowledge in facilities management domain by providing a novel framework that facilitates seamless data transfer between BIM models and facilities management systems.

Keywords: building information modeling, BIM, facilities management systems, interoperability, information management

Procedia PDF Downloads 108
3056 Texture Characteristics and Depositional Environment of the Lower Mahi River Sediment, Mainland Gujarat, India

Authors: Shazi Farooqui, Anupam Sharma

Abstract:

The Mahi River (~600km long) is an important west flowing the river of Central India. It originates in Madhya Pradesh and starts flowing in NW direction and enters into the state of Rajasthan. It flows across southern Rajasthan and then enters into Gujarat and finally debouches in the Gulf of Cambay. In Gujarat state, it flows through all four geomorphic zones i.e. eastern upland zone, shallow buried piedmont zone, alluvial zone and coastal zone. In lower reaches and particularly when it is flowing under the coastal regime, it provides an opportunity to study – 1. Land–Sea interaction and role of relative sea level changes, 2. Coastal/estuarine geological process, 3. Landscape evolution in marginal areas and so on. The Late Quaternary deposits of Mainland Gujarat is appreciably studied by Chamyal and his group of MS University of Baroda, and they have established that the 30-35m thick sediment package of the Mainland Gujarat is comprised of marine, fluvial and aeolian sediments. It is also established that in the estuarine zone, the upper few meter thick sediments package is of marine nature. However, its thickness, characters and the depositional environment including the role of climate and tectonics is still not clearly defined. To understand few aspects of the above mentioned, in the present study, a 17m subsurface sediment core has been retrieved from the estuarine zone of Mahi river basin. The Multiproxy studies which include the textural analysis (grain size), Loss on ignition (LOI), Bulk and clay mineralogy and geochemical studies have been carried out. In the entire sedimentary sequence, the grain size largely varies from coarse sand to clay; however, a solitary gravel bed is also noticed. The lower part (depth 9-17m), is mainly comprised of sub equal proportion of sand and silt. The sediments mainly have bimodal and leptokurtic distribution and deposited in alternate sand-silt package, probably indicating flood deposits. Relatively low moisture (1.8%) and organic carbon (2.4%) with increased carbonate values (12%) indicate that conditions must have to remain oxidizing. The middle part (depth 9–6m) has a 1m thick gravel bed at the bottom and overlain by coarse sand to very fine sand showing fining upward sequence. The presence of gravel bed suggests some kind of tectonic activity resulting into change in base level or enhanced precipitation in the catchment region. The upper part (depth 6–0m; top part of sequence) mainly comprised of fine sand to silt size grains (with appreciable clay content). The sediment of this part is Unimodal and very leptokurtic in nature suggesting wave and winnowing process and deposited in low energy suspension environment. This part has relatively high moisture (2.1%) and organic carbon (2.7%) with decreased carbonate content (4.2%) indicating change in the depositional environment probably under estuarine conditions. The presence of chlorite along with smectite clay mineral further supports the significant marine contribution in the formation of upper part of the sequence.

Keywords: grain size, statistical analysis, clay minerals, late quaternary, LOI

Procedia PDF Downloads 172
3055 The Impact of Blended Learning on Developing the students' Writing Skills and the Perception of Instructors and Students: Hawassa University in Focus

Authors: Mulu G. Gencha, Gebremedhin Simon, Menna Olango

Abstract:

This study was conducted at Hawassa University (HwU) in the Southern Nation Nationalities Peoples Regional State (SNNPRS) of Ethiopia. The prime concern of this study was to examine the writing performances of experimental and control group students, perception of experimental group students, and subject instructors. The course was blended learning (BL). Blended learning is a hybrid of classroom and on-line learning. Participants were eighty students from the School of Computer Science. Forty students attended the BL delivery involved using Face-to-Face (FTF) and campus-based online instruction. All instructors, fifty, of School of Language and Communication Studies along with 10 FGD members participated in the study. The experimental group went to the computer lab two times a week for four months, March-June, 2012, using the local area network (LAN), and software (MOODLE) writing program. On the other hand, the control group, forty students, took the FTF writing course five times a week for four months in similar academic calendar. The three instruments, the attitude questionnaire, tests and FGD were designed to identify views of students, instructors, and FGD participants on BL. At the end of the study, students’ final course scores were evaluated. Data were analyzed using independent samples t-tests. A statistically, significant difference was found between the FTF and BL (p<0.05). The analysis showed that the BL group was more successful than the conventional group. Besides, both instructors and students had positive attitude towards BL. The final section of the thesis showed the potential benefits and challenges, considering the pedagogical implications for the BL, and recommended possible avenues for further works.

Keywords: blended learning, computer attitudes, computer usefulness, computer liking, computer confidence, computer phobia

Procedia PDF Downloads 407
3054 Computer Self-Efficacy, Study Behaviour and Use of Electronic Information Resources in Selected Polytechnics in Ogun State, Nigeria

Authors: Fredrick Olatunji Ajegbomogun, Bello Modinat Morenikeji, Okorie Nancy Chituru

Abstract:

Electronic information resources are highly relevant to students' academic and research needs but are grossly underutilized, despite the institutional commitment to making them available. The under-utilisation of these resources could be attributed to a low level of study behaviour coupled with a low level of computer self-efficacy. This study assessed computer self-efficacy, study behaviour, and the use of electronic information resources by students in selected polytechnics in Ogun State. A simple random sampling technique using Krejcie and Morgan's (1970) Table was used to select 370 respondents for the study. A structured questionnaire was used to collect data on respondents. Data were analysed using frequency counts, percentages, mean, standard deviation, Pearson Product Moment Correlation (PPMC) and multiple regression analysis. Results reveal that the internet (= 1.94), YouTube (= 1.74), and search engines (= 1.72) were the common information resources available to the students, while the Internet (= 4.22) is the most utilized resource. Major reasons for using electronic information resources were to source materials and information (= 3.30), for research (= 3.25), and to augment class notes (= 2.90). The majority (91.0%) of the respondents have a high level of computer self-efficacy in the use of electronic information resources through selecting from screen menus (= 3.12), using data files ( = 3.10), and efficient use of computers (= 3.06). Good preparation for tests (= 3.27), examinations (= 3.26), and organization of tutorials (= 3.11) are the common study behaviours of the respondents. Overall, 93.8% have good study behaviour. Inadequate computer facilities to access information (= 3.23), and poor internet access (= 2.87) were the major challenges confronting students’ use of electronic information resources. According to the PPMC results, study behavior (r = 0.280) and computer self-efficacy (r = 0.304) have significant (p 0.05) relationships with the use of electronic information resources. Regression results reveal that self-efficacy (=0.214) and study behavior (=0.122) positively (p 0.05) influenced students' use of electronic information resources. The study concluded that students' use of electronic information resources depends on the purpose, their computer self-efficacy, and their study behaviour. Therefore, the study recommended that the management should encourage the students to improve their study habits and computer skills, as this will enhance their continuous and more effective utilization of electronic information resources.

Keywords: computer self-efficacy, study behaviour, electronic information resources, polytechnics, Nigeria

Procedia PDF Downloads 114
3053 Optimizing 3D Shape Parameters of Sports Bra Pads in Motion by Finite Element Dynamic Modelling with Inverse Problem Solution

Authors: Jiazhen Chen, Yue Sun, Joanne Yip, Kit-Lun Yick

Abstract:

The design of sports bras poses a considerable challenge due to the difficulty in accurately predicting the wearing result after computer-aided design (CAD). It needs repeated physical try-on or virtual try-on to obtain a comfortable pressure range during motion. Specifically, in the context of running, the exact support area and force exerted on the breasts remain unclear. Consequently, obtaining an effective method to design the sports bra pads shape becomes particularly challenging. This predicament hinders the successful creation and production of sports bras that cater to women's health needs. The purpose of this study is to propose an effective method to obtain the 3D shape of sports bra pads and to understand the relationship between the supporting force and the 3D shape parameters of the pads. Firstly, the static 3D shape of the sports bra pad and human motion data (Running) are obtained by using the 3D scanner and advanced 4D scanning technology. The 3D shape of the sports bra pad is parameterised and simplified by Free-form Deformation (FFD). Then the sub-models of sports bra and human body are constructed by segmenting and meshing them with MSC Apex software. The material coefficient of sports bras is obtained by material testing. The Marc software is then utilised to establish a dynamic contact model between the human breast and the sports bra pad. To realise the reverse design of the sports bra pad, this contact model serves as a forward model for calculating the inverse problem. Based on the forward contact model, the inverse problem of the 3D shape parameters of the sports bra pad with the target bra-wearing pressure range as the boundary condition is solved. Finally, the credibility and accuracy of the simulation are validated by comparing the experimental results with the simulations by the FE model on the pressure distribution. On the one hand, this research allows for a more accurate understanding of the support area and force distribution on the breasts during running. On the other hand, this study can contribute to the customization of sports bra pads for different individuals. It can help to obtain sports bra pads with comfortable dynamic pressure.

Keywords: sports bra design, breast motion, running, inverse problem, finite element dynamic model

Procedia PDF Downloads 50
3052 Development of a Computer Vision System for the Blind and Visually Impaired Person

Authors: Rodrigo C. Belleza, Jr., Roselyn A. Maaño, Karl Patrick E. Camota, Darwin Kim Q. Bulawan

Abstract:

Eyes are an essential and conspicuous organ of the human body. Human eyes are outward and inward portals of the body that allows to see the outside world and provides glimpses into ones inner thoughts and feelings. Inevitable blindness and visual impairments may result from eye-related disease, trauma, or congenital or degenerative conditions that cannot be corrected by conventional means. The study emphasizes innovative tools that will serve as an aid to the blind and visually impaired (VI) individuals. The researchers fabricated a prototype that utilizes the Microsoft Kinect for Windows and Arduino microcontroller board. The prototype facilitates advanced gesture recognition, voice recognition, obstacle detection and indoor environment navigation. Open Computer Vision (OpenCV) performs image analysis, and gesture tracking to transform Kinect data to the desired output. A computer vision technology device provides greater accessibility for those with vision impairments.

Keywords: algorithms, blind, computer vision, embedded systems, image analysis

Procedia PDF Downloads 312
3051 Language Use in Computer-Mediated Communication and Users’ Social Identity

Authors: Miramar Damanhouri

Abstract:

This study examines the relationship between language use in computer-mediated communication and the social identity of the user. The data were collected by surveying 298 Saudi bilingual speakers who are familiar with Arabizi, a blend of Latin characters and Arabic numerals to transliterate Arabic sounds, and then analyzed quantitatively by running tests for statistical confidence in order to determine differences in perceptions between young adults (ages 15-25 years) and middle-aged adults (ages 26-50 years). According to the findings of this study, English is the dominant language among most of the young adults surveyed, and when they do use Arabic, they use Arabizi because of its flexibility, compatibility with modern technology, and its acceptance among people of their age and sociocultural backgrounds. On the other hand, most middle-aged adults surveyed here tend to use Arabic, as they believe that they should show their loyalty to their origin. The results of the study demonstrate a mutual relationship between language use in computer-mediated communication and the user’s social identity, as language is used both to reflect and construct that identity.

Keywords: Arabizi, computer mediated communication, digital communication, language use

Procedia PDF Downloads 129
3050 Barriers to Innovation Based on Environmentally Friendly Technology Adoption in Developing Countries: The Case of Production in Rural Areas in Cauca-Colombia

Authors: Deycy Janeth Sanchez Preciado, Bjorn Claes, Paola Andrade

Abstract:

The development of appropriate environmentally friendly technologies has aided communities in rural areas in emerging economies to better use their natural resources, increase productivity while reducing pollution. Moreover, it has improved their innovation capabilities and ability to develop products for new markets. However, despite the advances, the adoption of these technologies is not generalized and does not always show the expected benefits for the communities and other actors involved in the co-creation process. In this paper, we study the barriers that inhibit the adoption of technologies to reach innovation levels and study comparative cases in rural areas of Cauca in Colombia. We develop and test a theory grounded framework, and we compile an overview of the most important of barriers.

Keywords: technology adoption, environmentally friendly technology, developing countries, rural production, innovation, appropriate technology

Procedia PDF Downloads 214
3049 Designing Social Media into Higher Education Courses

Authors: Thapanee Seechaliao

Abstract:

This research paper presents guiding on how to design social media into higher education courses. The research methodology used a survey approach. The research instrument was a questionnaire about guiding on how to design social media into higher education courses. Thirty-one lecturers completed the questionnaire. The data were scored by frequency and percentage. The research results were the lecturers’ opinions concerning the designing social media into higher education courses as follows: 1) Lecturers deem that the most suitable learning theory is Collaborative Learning. 2) Lecturers consider that the most important learning and innovation Skill in the 21st century is communication and collaboration skills. 3) Lecturers think that the most suitable evaluation technique is authentic assessment. 4) Lecturers consider that the most appropriate portion used as blended learning should be 70% in the classroom setting and 30% online.

Keywords: instructional design, social media, courses, higher education

Procedia PDF Downloads 506
3048 Mechanical Prosthesis Controlled by Brain-Computer Interface

Authors: Tianyu Cao, KIRA (Ruizhi Zhao)

Abstract:

The purpose of our research is to study the possibility of people with physical disabilities manipulating mechanical prostheses through brain-computer interface (BCI) technology. The brain-machine interface (BCI) of the neural prosthesis records signals from neurons and uses mathematical modeling to decode them, converting desired movements into body movements. In order to improve the patient's neural control, the prosthesis is given a natural feeling. It records data from sensitive areas from the body to the prosthetic limb and encodes signals in the form of electrical stimulation to the brain. In our research, the brain-computer interface (BCI) is a bridge connecting patients’ cognition and the real world, allowing information to interact with each other. The efficient work between the two is achieved through external devices. The flow of information is controlled by BCI’s ability to record neuronal signals and decode signals, which are converted into device control. In this way, we could encode information and then send it to the brain through electrical stimulation, which has significant medical application.

Keywords: biomedical engineering, brain-computer interface, prosthesis, neural control

Procedia PDF Downloads 169