Search results for: computer code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3663

Search results for: computer code

2733 Numerical Simulation of Two-Dimensional Porous Cylinder Flow in In-Line Arrangement

Authors: Hamad Alhajeri, Abdulrahman Almutairi, A. H. Alenezi, M. H. Alhajeri, Ayedh Alajmi

Abstract:

The flow around three porous cylinders in inline arrangement is investigated in this paper computationally using the commercial code FLUENT. The arrangement generally operates with the dirty gases passing through the porous cylinders, the particulate material being deposited on the outside of the cylinders. However, in a combined cycle power plant, filtration is required to allow the hot exhaust gases to be fed to a turbine without causing any physical damage to the turbine blades. Three cylinder elements are placed in a two-dimensional rectangle duct with fixed face velocity and varying the velocity ratio between the approach and face velocity. Particle trajectories are obtained for a number of particle diameters and different inlet (approach) velocity to face filtration velocity ratios to investigate the behavior of particles around the cylinder.

Keywords: porous cylinders, CFD, fluid flow, filtration

Procedia PDF Downloads 484
2732 Numerical Analysis of Laminar Mixed Convection within a Complex Geometry

Authors: Y. Lasbet, A. L. Boukhalkhal, K. Loubar

Abstract:

The study of mixed convection is, usually, focused on the straight channels in which the onset of the mixed convection is well defined as function of the ratio between Grashof number and Reynolds number, Gr/Re. This is not the case for a complex channel wherein the mixed convection is not sufficiently examined in the literature. Our paper focuses on the study of the mixed convection in a complex geometry in which our main contribution reveals that the critical value of the ratio Gr/Re for the onset of the mixed convection increases highly in the type of geometry contrary to the straight channel. Furthermore, the accentuated secondary flow in this geometry prevents the thermal stratification in the flow and consequently the buoyancy driven becomes negligible. To perform these objectives, a numerical study in complex geometry for several values of the ratio Gr/Re with prescribed wall heat flux (H2), was realized by using the CFD code.

Keywords: complex geometry, heat transfer, laminar flow, mixed convection, Nusselt number

Procedia PDF Downloads 495
2731 Heat Transfer Enhancement by Turbulent Impinging Jet with Jet's Velocity Field Excitations Using OpenFOAM

Authors: Naseem Uddin

Abstract:

Impinging jets are used in variety of engineering and industrial applications. This paper is based on numerical simulations of heat transfer by turbulent impinging jet with velocity field excitations using different Reynolds Averaged Navier-Stokes Equations models. Also Detached Eddy Simulations are conducted to investigate the differences in the prediction capabilities of these two simulation approaches. In this paper the excited jet is simulated in non-commercial CFD code OpenFOAM with the goal to understand the influence of dynamics of impinging jet on heat transfer. The jet’s frequencies are altered keeping in view the preferred mode of the jet. The Reynolds number based on mean velocity and diameter is 23,000 and jet’s outlet-to-target wall distance is 2. It is found that heat transfer at the target wall can be influenced by judicious selection of amplitude and frequencies.

Keywords: excitation, impinging jet, natural frequency, turbulence models

Procedia PDF Downloads 274
2730 Brain-Computer Interface Based Real-Time Control of Fixed Wing and Multi-Rotor Unmanned Aerial Vehicles

Authors: Ravi Vishwanath, Saumya Kumaar, S. N. Omkar

Abstract:

Brain-computer interfacing (BCI) is a technology that is almost four decades old, and it was developed solely for the purpose of developing and enhancing the impact of neuroprosthetics. However, in the recent times, with the commercialization of non-invasive electroencephalogram (EEG) headsets, the technology has seen a wide variety of applications like home automation, wheelchair control, vehicle steering, etc. One of the latest developed applications is the mind-controlled quadrotor unmanned aerial vehicle. These applications, however, do not require a very high-speed response and give satisfactory results when standard classification methods like Support Vector Machine (SVM) and Multi-Layer Perceptron (MLPC). Issues are faced when there is a requirement for high-speed control in the case of fixed-wing unmanned aerial vehicles where such methods are rendered unreliable due to the low speed of classification. Such an application requires the system to classify data at high speeds in order to retain the controllability of the vehicle. This paper proposes a novel method of classification which uses a combination of Common Spatial Paradigm and Linear Discriminant Analysis that provides an improved classification accuracy in real time. A non-linear SVM based classification technique has also been discussed. Further, this paper discusses the implementation of the proposed method on a fixed-wing and VTOL unmanned aerial vehicles.

Keywords: brain-computer interface, classification, machine learning, unmanned aerial vehicles

Procedia PDF Downloads 284
2729 Heritage Sharing Problems in Land Registry: Case Study of Konya, Turkey

Authors: Tayfun Cay, Sabahattin Akkus

Abstract:

Due to inheritance, urban areas can not be arranged in a planned and programmed manner. As a result of this, the social fabric is disrupted and the hostility is increasing among the people. This contradicts the understanding of the social state. The Turkish Civil Code and the Urban Development Law are effective in sharing heritage in urban areas in Turkey. Within the framework of this legislation; How to make heritage sharing and services in the title deed. In this study, these laws, regulations, and statutes are examined. In the frame of this legislation, land registry problems on inheritance are examined and the province of Konya - Selçuk district, is selected as an application place to solve the problems. In this study, the problems of heritage sharing in the land registry were investigated. The evaluation of the work is done and the results are determined and possible solutions are proposed.

Keywords: land, land registry, heritage sharing, sharing problems of heritage

Procedia PDF Downloads 286
2728 Teacher Characteristics That Influence Development of Oral Language Skills among Pre-Primary School Pupils: Case Study of Nairobi City County, Kenya

Authors: Kenneth Okelo, Esther Waithaka, Maureen Mweru

Abstract:

Development of oral language skills is a precursor to writing and reading acquisition. Oral skill is a means of communication through which people express their desires, ideas, excitements, amusements, disappointments and exchange information. In addition, oral skills have been found to be an important tool for thinking and concept development in children. Research carried out in industrialised countries have identified some appropriate teaching strategies used to enhance acquisition of oral language skills such as repetition, substitution, explanation, contrast, exemplification and code-switching. However, these studies’ geographical locations do not reflect the diversity of the Kenyan society. In addition, studies conducted in Kenya in the past have not established why pre-primary school teachers are not using appropriate teaching strategies. The purpose of this study was to find out whether teachers’ experience, academic qualification and type of training influences their choice of teaching strategies in the development of oral language skills inside and out of the classroom in selected preschools in Kibra Sub-County, Nairobi County. In addition, this study aimed at finding out the strategies used by teachers in Kibra Sub-County to promote oral skills development among pre-primary school children. The study was guided by Holdaway’s theory of language acquisition. Descriptive survey design was employed during this study. Questionnaires and observation schedules were used to collect data. Eighty-three (83) preschool teachers were sampled using multistage sampling methods for observation. Data was analysed using SPSS version 20. The researcher carried out content analysis on the qualitative data. The main descriptive methods used were tabulation of frequencies and percentages. Chi squire test was the inferential statistic used to test the relationship between variables. The main findings of the study indicate that teaching strategies that were mostly used by pre-primary school teachers were code-switching, examples, repetition, substitution and explanation. While questions, direction, expansion of children words and contrast were the least used teaching strategies when teaching oral language skills. The study revealed that the there is a slight correlation between the type of training of teachers and the teaching strategies as most of DICECE trained teachers used more teaching strategies when teaching oral skills compared to other teachers. The findings also revealed that there was a partial significant correlation between teacher’s academic qualifications and a few teaching strategies. A similar correlation was also observed between teaching experience and a few teaching strategies. Since the strategies used by pre-primary school teachers under the study were less than half of the recommended teaching strategies to promote oral skills, the study recommends that teachers should be encouraged to use more in structural strategies to improve children’s oral language skills.

Keywords: Kenya early childhood education, Kenya education, oral language skills acquisition, teaching methods

Procedia PDF Downloads 266
2727 Analysis of Policy Issues on Computer-Based Testing in Nigeria

Authors: Samuel Oye Bandele

Abstract:

A policy is a system of principles to guide activities and strategic decisions of an organisation in order to achieve stated objectives and meeting expected outcomes. A Computer Based Test (CBT) policy is therefore a statement of intent to drive the CBT programmes, and should be implemented as a procedure or protocol. Policies are hence generally adopted by an organization or a nation. The concern here, in this paper, is the consideration and analysis of issues that are significant to evolving the acceptable policy that will drive the new CBT innovation in Nigeria. Public examinations and internal examinations in higher educational institutions in Nigeria are gradually making a radical shift from Paper Based or Paper-Pencil to Computer-Based Testing. The need to make an objective and empirical analysis of Policy issues relating to CBT became expedient. The following are some of the issues on CBT evolution in Nigeria that were identified as requiring policy backing. Prominent among them are requirements for establishing CBT centres, purpose of CBT, types and acquisition of CBT equipment, qualifications of staff: professional, technical and regular, security plans and curbing of cheating during examinations, among others. The descriptive research design was employed based on a population consisting of Principal Officers (Policymakers), Staff (Teaching and non-Teaching-Policy implementors), and CBT staff ( Technical and Professional- Policy supports) and candidates (internal and external). A fifty-item researcher-constructed questionnaire on policy issues was employed to collect data from 600 subjects drawn from higher institutions in South West Nigeria, using the purposive and stratified random sampling techniques. Data collected were analysed using descriptive (frequency counts, means and standard deviation) and inferential (t-test, ANOVA, regression and Factor analysis) techniques. Findings from this study showed, among others, that the factor loadings had significantly weights on the organizational and National policy issues on CBT innovation in Nigeria.

Keywords: computer-based testing, examination, innovation, paper-based testing, paper pencil based testing, policy issues

Procedia PDF Downloads 249
2726 Technology Computer Aided Design Simulation of Space Charge Limited Conduction in Polycrystalline Thin Films

Authors: Kunj Parikh, S. Bhattacharya, V. Natarajan

Abstract:

TCAD numerical simulation is one of the most tried and tested powerful tools for designing devices in semiconductor foundries worldwide. It has also been used to explain conduction in organic thin films where the processing temperature is often enough to make homogeneous samples (often imperfect, but homogeneously imperfect). In this report, we have presented the results of TCAD simulation in multi-grain thin films. The work has addressed the inhomogeneity in one dimension, but can easily be extended to two and three dimensions. The effect of grain boundaries has mainly been approximated as barriers located at the junction between two adjacent grains. The effect of the value of grain boundary barrier, the bulk traps, and the measurement temperature have been investigated.

Keywords: polycrystalline thin films, space charge limited conduction, Technology Computer-Aided Design (TCAD) simulation, traps

Procedia PDF Downloads 215
2725 Continuous and Discontinuos Modeling of Wellbore Instability in Anisotropic Rocks

Authors: C. Deangeli, P. Obentaku Obenebot, O. Omwanghe

Abstract:

The study focuses on the analysis of wellbore instability in rock masses affected by weakness planes. The occurrence of failure in such a type of rocks can occur in the rock matrix and/ or along the weakness planes, in relation to the mud weight gradient. In this case the simple Kirsch solution coupled with a failure criterion cannot supply a suitable scenario for borehole instabilities. Two different numerical approaches have been used in order to investigate the onset of local failure at the wall of a borehole. For each type of approach the influence of the inclination of weakness planes has been investigates, by considering joint sets at 0°, 35° and 90° to the horizontal. The first set of models have been carried out with FLAC 2D (Fast Lagrangian Analysis of Continua) by considering the rock material as a continuous medium, with a Mohr Coulomb criterion for the rock matrix and using the ubiquitous joint model for accounting for the presence of the weakness planes. In this model yield may occur in either the solid or along the weak plane, or both, depending on the stress state, the orientation of the weak plane and the material properties of the solid and weak plane. The second set of models have been performed with PFC2D (Particle Flow code). This code is based on the Discrete Element Method and considers the rock material as an assembly of grains bonded by cement-like materials, and pore spaces. The presence of weakness planes is simulated by the degradation of the bonds between grains along given directions. In general the results of the two approaches are in agreement. However the discrete approach seems to capture more complex phenomena related to local failure in the form of grain detachment at wall of the borehole. In fact the presence of weakness planes in the discontinuous medium leads to local instability along the weak planes also in conditions not predicted from the continuous solution. In general slip failure locations and directions do not follow the conventional wellbore breakout direction but depend upon the internal friction angle and the orientation of the bedding planes. When weakness plane is at 0° and 90° the behaviour are similar to that of a continuous rock material, but borehole instability is more severe when weakness planes are inclined at an angle between 0° and 90° to the horizontal. In conclusion, the results of the numerical simulations show that the prediction of local failure at the wall of the wellbore cannot disregard the presence of weakness planes and consequently the higher mud weight required for stability for any specific inclination of the joints. Despite the discrete approach can simulate smaller areas because of the large number of particles required for the generation of the rock material, however it seems to investigate more correctly the occurrence of failure at the miscroscale and eventually the propagation of the failed zone to a large portion of rock around the wellbore.

Keywords: continuous- discontinuous, numerical modelling, weakness planes wellbore, FLAC 2D

Procedia PDF Downloads 501
2724 Numerical Investigation on the Effects of Deep Excavation on Adjacent Pile Groups Subjected to Inclined Loading

Authors: Ashkan Shafee, Ahmad Fahimifar

Abstract:

There is a growing demand for construction of high-rise buildings and infrastructures in large cities, which sometimes require deep excavations in the vicinity of pile foundations. In this study, a two-dimensional finite element analysis is used to gain insight into the response of pile groups adjacent to deep excavations in sand. The numerical code was verified by available experimental works, and a parametric study was performed on different working load combinations, excavation depth and supporting system. The results show that the simple two-dimensional plane strain model can accurately simulate the excavation induced changes on adjacent pile groups. It was found that further excavation than pile toe level and also inclined loading on adjacent pile group can severely affect the serviceability of the foundation.

Keywords: deep excavation, inclined loading, lateral deformation, pile group

Procedia PDF Downloads 275
2723 Comparison of Various Response Spectrum of Nuclear Power Plant at Chashma Site

Authors: J. Iqbal, A. Shah, M. Zeeshan

Abstract:

UBC-97, USNRC, chines origin code GB50011-2011 and site response spectrum was used to make comparison between them for Chashma site and most conservative one was selected and the USNRC was the most conservative one. The dynamic analysis of CHASNUPP-2 containment building was performed using SAP-2000 for dead load, live load (crane), pre stressed loads, wind load, temperature load, accidental pressure during LOCA, earthquake loads and the conservative response spectrum. After applying selected response spectrum on model, detail comparison was made against area of steal calculated from the analysis and the actually provided. Then prepared curve of area of steal vs. g value which shows that if the particular site was design on that spectrum that much steel needed for structural integrity.

Keywords: response spectrum, USNRC, LOCA, area of steel, structure integrity

Procedia PDF Downloads 680
2722 Numerical Modeling for Water Engineering and Obstacle Theory

Authors: Mounir Adal, Baalal Azeddine, Afifi Moulay Larbi

Abstract:

Numerical analysis is a branch of mathematics devoted to the development of iterative matrix calculation techniques. We are searching for operations optimization as objective to calculate and solve systems of equations of order n with time and energy saving for computers that are conducted to calculate and analyze big data by solving matrix equations. Furthermore, this scientific discipline is producing results with a margin of error of approximation called rates. Thus, the results obtained from the numerical analysis techniques that are held on computer software such as MATLAB or Simulink offers a preliminary diagnosis of the situation of the environment or space targets. By this we can offer technical procedures needed for engineering or scientific studies exploitable by engineers for water.

Keywords: numerical analysis methods, obstacles solving, engineering, simulation, numerical modeling, iteration, computer, MATLAB, water, underground, velocity

Procedia PDF Downloads 465
2721 Skills Development: The Active Learning Model of a French Computer Science Institute

Authors: N. Paparisteidi, D. Rodamitou

Abstract:

This article focuses on the skills development and path planning of students studying computer science in EPITECH: french private institute of Higher Education. The researchers examine students’ points of view and experience in a blended learning model based on a skills development curriculum. The study is based on the collection of four main categories of data: semi-participant observation, distribution of questionnaires, interviews, and analysis of internal school databases. The findings seem to indicate that a skills-based program on active learning enables students to develop their learning strategies as well as their personal skills and to actively engage in the creation of their career path and contribute to providing additional information to curricula planners and decision-makers about learning design in higher education.

Keywords: active learning, blended learning, higher education, skills development

Procedia PDF Downloads 104
2720 Parameters Tuning of a PID Controller on a DC Motor Using Honey Bee and Genetic Algorithms

Authors: Saeid Jalilzadeh

Abstract:

PID controllers are widely used to control the industrial plants because of their robustness and simple structures. Tuning of the controller's parameters to get a desired response is difficult and time consuming. With the development of computer technology and artificial intelligence in automatic control field, all kinds of parameters tuning methods of PID controller have emerged in endlessly, which bring much energy for the study of PID controller, but many advanced tuning methods behave not so perfect as to be expected. Honey Bee algorithm (HBA) and genetic algorithm (GA) are extensively used for real parameter optimization in diverse fields of study. This paper describes an application of HBA and GA to the problem of designing a PID controller whose parameters comprise proportionality constant, integral constant and derivative constant. Presence of three parameters to optimize makes the task of designing a PID controller more challenging than conventional P, PI, and PD controllers design. The suitability of the proposed approach has been demonstrated through computer simulation using MATLAB/SIMULINK.

Keywords: controller, GA, optimization, PID, PSO

Procedia PDF Downloads 544
2719 Comparing Student Performance on Paper-Based versus Computer-Based Formats of Standardized Tests

Authors: Jin Koo

Abstract:

During the coronavirus pandemic, there has been a further increasing demand for computer-based tests (CBT), and now it has become an important test mode. The main purpose of this study is to investigate the comparability of student scores obtained from computerized-based formats of a standardized test in the two subject areas of reading and mathematics. Also, this study investigates whether there is an interaction effect between test modes of CBT and paper-based tests (PBT) and gender/ability level in each subject area. The test used in this study is a multiple-choice standardized test for students in grades 8-11. For this study, data were collected during four test administrations: 2015-16, 2017-18, and 2020-21. This research used a one-factor between-subjects ANOVA to compute the PBT and CBT groups’ test means for each subject area (reading and mathematics). Also, 2-factor between-subjects ANOVAs were conducted to investigate examinee characteristics: gender (male and female), ethnicity (African-American, Asian, Hispanic, multi-racial, and White), and ability level (low, average, and high-ability groups). The author found that students’ test scores in the two subject areas varied across CBT and PBT by gender and ability level, meaning that gender, ethnicity, and ability level were related to the score difference. These results will be discussed according to the current testing systems. In addition, this study’s results will open up to school teachers and test developers the possible influence that gender, ethnicity, and ability level have on a student’s score based on whether they take the CBT or PBT.

Keywords: ability level, computer-based, gender, paper-based, test

Procedia PDF Downloads 101
2718 A Model-Driven Approach of User Interface for MVP Rich Internet Application

Authors: Sarra Roubi, Mohammed Erramdani, Samir Mbarki

Abstract:

This paper presents an approach for the model-driven generating of Rich Internet Application (RIA) focusing on the graphical aspect. We used well known Model-Driven Engineering (MDE) frameworks and technologies, such as Eclipse Modeling Framework (EMF), Graphical Modeling Framework (GMF), Query View Transformation (QVTo) and Acceleo to enable the design and the code automatic generation of the RIA. During the development of the approach, we focused on the graphical aspect of the application in terms of interfaces while opting for the Model View Presenter pattern that is designed for graphics interfaces. The paper describes the process followed to define the approach, the supporting tool and presents the results from a case study.

Keywords: metamodel, model-driven engineering, MVP, rich internet application, transformation, user interface

Procedia PDF Downloads 354
2717 Behaviour of Reinforced Concrete Infilled Frames under Seismic Loads

Authors: W. Badla

Abstract:

A significant portion of the buildings constructed in Algeria is structural frames with infill panels which are usually considered as non structural components and are neglected in the analysis. However, these masonry panels tend to influence the structural response. Thus, these structures can be regarded as seismic risk buildings, although in the Algerian seismic code there is little guidance on the seismic evaluation of infilled frame buildings. In this study, three RC frames with 2, 4, and 8 story and subjected to three recorded Algerian accelerograms are studied. The diagonal strut approach is adopted for modeling the infill panels and a fiber model is used to model RC members. This paper reports on the seismic evaluation of RC frames with brick infill panels. The results obtained show that the masonry panels enhance the load lateral capacity of the buildings and the infill panel configuration influences the response of the structures.

Keywords: seismic design, RC frames, infill panels, non linear dynamic analysis

Procedia PDF Downloads 546
2716 Application of Genetic Programming for Evolution of Glass-Forming Ability Parameter

Authors: Manwendra Kumar Tripathi, Subhas Ganguly

Abstract:

A few glass forming ability expressions in terms of characteristic temperatures have been proposed in the literature. Attempts have been made to correlate the expression with the critical diameter of the bulk metallic glass composition. However, with the advent of new alloys, many exceptions have been noted and reported. In the present approach, a genetic programming based code which generates an expression in terms of input variables, i.e., three characteristic temperatures viz. glass transition temperature (Tg), onset crystallization temperature (Tx) and offset temperature of melting (Tl) with maximum correlation with a critical diameter (Dmax). The expression evolved shows improved correlation with the critical diameter. In addition, the expression can be explained on the basis of time-temperature transformation curve.

Keywords: glass forming ability, genetic programming, bulk metallic glass, critical diameter

Procedia PDF Downloads 334
2715 Investigating the Capacity of Cracking Torsion of Rectangular and Cylindrical RC Beams with Spiral and Normal Stirrups

Authors: Hadi Barghlame, M. A. Lotfollahi-Yaghin, Mehdi Mohammad Rezaei, Saeed Eskanderzadeh

Abstract:

In this paper, the capacity of cracking torsion on rectangular and cylindrical beams with spiral and normal stirrups in similar properties are investigated. Also, in the beams with spiral stirrups, stirrups are not wrapping and spiral stirrups similar to normal stirrups in ACI code. Therefore, models of above-mentioned beams have been numerically analyzed under various loads using ANSYS software. In this research, the behavior of rectangular reinforced concrete beams is compared with the cylindrical reinforced concrete beams. The capacity of cracking torsion of rectangular and cylindrical RC beams with spiral and normal stirrups are same. In the other words, the behavior of rectangular RC beams is similar to cylindrical beams.

Keywords: cracking torsion, RC beams, spiral stirrups, normal stirrups

Procedia PDF Downloads 292
2714 Study on Inverse Solution from Remote Displacements to Reservoir Process during Flow Injection

Authors: Sumei Cai, Hong Li

Abstract:

Either during water or gas injection into reservoir, in order to understand the areal flow pressure distribution underground, associated bounding deformation is prevalently monitored by ground or downhole tiltmeters. In this paper, an inverse solution to elastic response of far field displacements induced by reservoir pressure change due to flow injection was studied. Furthermore, the fundamental theory on inverse solution to elastic problem as well as its spatial smoothing approach is presented. Taking advantage of source code development based on Boundary Element Method, numerical analysis on the monitoring data of ground surface displacements to further understand the behavior of reservoir process was developed. Numerical examples were also conducted to verify the effectiveness.

Keywords: remote displacement, inverse problem, boundary element method, BEM, reservoir process

Procedia PDF Downloads 119
2713 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 222
2712 Analysis of Matching Pursuit Features of EEG Signal for Mental Tasks Classification

Authors: Zin Mar Lwin

Abstract:

Brain Computer Interface (BCI) Systems have developed for people who suffer from severe motor disabilities and challenging to communicate with their environment. BCI allows them for communication by a non-muscular way. For communication between human and computer, BCI uses a type of signal called Electroencephalogram (EEG) signal which is recorded from the human„s brain by means of an electrode. The electroencephalogram (EEG) signal is an important information source for knowing brain processes for the non-invasive BCI. Translating human‟s thought, it needs to classify acquired EEG signal accurately. This paper proposed a typical EEG signal classification system which experiments the Dataset from “Purdue University.” Independent Component Analysis (ICA) method via EEGLab Tools for removing artifacts which are caused by eye blinks. For features extraction, the Time and Frequency features of non-stationary EEG signals are extracted by Matching Pursuit (MP) algorithm. The classification of one of five mental tasks is performed by Multi_Class Support Vector Machine (SVM). For SVMs, the comparisons have been carried out for both 1-against-1 and 1-against-all methods.

Keywords: BCI, EEG, ICA, SVM

Procedia PDF Downloads 279
2711 On the Development of Medical Additive Manufacturing in Egypt

Authors: Khalid Abdelghany

Abstract:

Additive Manufacturing (AM) is the manufacturing technology that is used to fabricate fast products direct from CAD models in very short time and with minimum operation steps. Jointly with the advancement in medical computer modeling, AM proved to be a very efficient tool to help physicians, orthopedic surgeons and dentists design and fabricate patient-tailored surgical guides, templates and customized implants from the patient’s CT / MRI images. AM jointly with computer-assisted designing/computer-assisted manufacturing (CAD/CAM) technology have enabled medical practitioners to tailor physical models in a patient-and purpose-specific fashion and helped to design and manufacture of templates, appliances and devices with a high range of accuracy using biocompatible materials. In developing countries, there are some technical and financial limitations of implementing such advanced tools as an essential portion of medical applications. CMRDI institute in Egypt has been working in the field of Medical Additive Manufacturing since 2003 and has assisted in the recovery of hundreds of poor patients using these advanced tools. This paper focuses on the surgical and dental use of 3D printing technology in Egypt as a developing country. The presented case studies have been designed and processed using the software tools and additive manufacturing machines in CMRDI through cooperative engineering and medical works. Results showed that the implementation of the additive manufacturing tools in developed countries is successful and could be economical comparing to long treatment plans.

Keywords: additive manufacturing, dental and orthopeadic stents, patient specific surgical tools, titanium implants

Procedia PDF Downloads 315
2710 Problems Occurring in the Process of Audit by Taking into Consideration their Theoretic Aspects against the Background of Reforms Conducted in a Country: The Example of Georgia

Authors: Levan Sabauri

Abstract:

The purpose of this article is an examination of the meaning of theoretic aspects of audit in the context of solving of specific problems of the audit. The audit’s aim is the estimation of financial statements by the auditor, i.e. if they are prepared according to the basic requirements of current financial statements. By examination of concrete examples, we can clearly see problems created in an audit and in often cases, those contradictions which can be caused by incompliance of matters regulated by legislation and by reality. An important part of this work is the analysis of reform in the direction of business accounting, statements and audit in Georgia and its comparison with EU countries. In the article, attention is concentrated on the analysis of specific problems of auditing practice and ways of their solving by taking into consideration theoretical aspects of the audit are proposed.

Keywords: audit, auditor, auditors’ ethic code, auditor’s risk, financial statement, objectivity

Procedia PDF Downloads 358
2709 Lab Support: A Computer Laboratory Class Management Support System

Authors: Eugenia P. Ramirez, Kevin Matthe Caramancion, Mia Eleazar

Abstract:

Getting the attention of students is a constant challenge to the instructors/lecturers. Although in the computer laboratories some networking and entertainment websites are blocked, yet, these websites have unlimited ways of attracting students to get into it. Thus, when an instructor gives a specific set of instructions, some students may not be able to follow sequentially the steps that are given. The instructor has to physically go to the specific remote terminal and show the student the details. Sometimes, during an examination in laboratory set-up, a proctor may prefer to give detailed and text-written instructions rather than verbal instructions. Even the mere calling of a specific student at any time will distract the whole class especially when activities are being performed. What is needed is : An application software that is able to lock the student's monitor and at the same time display the instructor’s screen; a software that is powerful enough to process in its side alone and manipulate a specific user’s terminal in terms of free configuration that is, without restrictions at the server level is a required functionality for a modern and optimal server structure; a software that is able to send text messages to students, per terminal or in group will be a solution. These features are found in LabSupport. This paper outlines the LabSupport application software framework to efficiently manage computer laboratory sessions and will include different modules: screen viewer, demonstration mode, monitor locking system, text messaging, and class management. This paper's ultimate aim is to provide a system that increases instructor productivity.

Keywords: application software, broadcast messaging, class management, locking system

Procedia PDF Downloads 439
2708 Calibration of a Large Standard Step Height with Low Sampled Coherence Scanning Interferometry

Authors: Dahi Ghareab Abdelsalam Ibrahim

Abstract:

Scanning interferometry is commonly used for measuring the three-dimensional profiling of surfaces. Here, we used a scanning stage calibrated with standard gauge blocks to measure a standard step height of 200μm. The stage measures precisely the envelope of interference at the platen and at the surface of the step height. From the difference between the two envelopes, we measured the step height of the sample. Experimental measurements show that the measured value matches well with the nominal value of the step height. A light beam of 532nm from a Tungsten Lamp is collimated and incident on the interferometer. By scanning, two envelopes were produced. The envelope at the platen surface and the envelope at the object surface were determined precisely by a written program code, and then the difference between them was measured from the calibrated scanning stage. The difference was estimated to be in the range of 198 ± 2 μm.

Keywords: optical metrology, digital holography, interferometry, phase unwrapping

Procedia PDF Downloads 76
2707 Vibration Characteristics of Functionally Graded Thick Hollow Cylinders Using Galerkin Method

Authors: Pejman Daryabor, Kamal Mohammadi

Abstract:

In the present work, the study of vibration characteristics of a functionally graded thick hollow cylinder is investigated. The cylinder natural frequencies are obtained using Galerkin finite element method. The functionally graded cylinder is assumed to be made from many subcylinders. Each subcylinder is considered as an isotropic layer. Material’s properties in each layer are constant and functionally graded properties result by exponential function of layer radius in multilayer cylinder. To validate the FE results code, plane strain model of functionally graded cylinder are also modeled in ABAQUS. Analytical results are validated for both models. Also, a good agreement is found between the present results and those reported in the literature.

Keywords: natural frequency, functionally graded material, finite element method, thick cylinder

Procedia PDF Downloads 473
2706 Criminal Exhibit the Feminine Violent Victim within Thai Newspaper

Authors: Supaporn Wimonchailerk

Abstract:

This research aims to critical analyze the feminine violent within Thai daily newspaper. This study was qualitative base; content analysis from two popular newspapers (Thairath and Dailynews) two qualitative newspapers (Thaipost and Mathichon). Purposive sampling was used to select eleven specialize news reporters to do in-depth interview. The result found that, popular newspapers, Thairath and dailynews have presented feminine violent news in their paper more than Thaipost and Mathichon the qualitative newspaper. Beside, majority of sample present the feminine violent within news under the code of ethic, The National Press Council of Thailand. Interesting, the age of feminine violent victim was the information that has been focused most. The popular newspaper have illustrated crime scene photo on their first-page while qualitative newspaper used only headline to present the same news.

Keywords: ethic, feminine, journalism, newspaper, violent victim

Procedia PDF Downloads 191
2705 Hand Detection and Recognition for Malay Sign Language

Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Norhafilah Bara

Abstract:

Developing a software application using an interface with computers and peripheral devices using gestures of human body such as hand movements keeps growing in interest. A review on this hand gesture detection and recognition based on computer vision technique remains a very challenging task. This is to provide more natural, innovative and sophisticated way of non-verbal communication, such as sign language, in human computer interaction. Nevertheless, this paper explores hand detection and hand gesture recognition applying a vision based approach. The hand detection and recognition used skin color spaces such as HSV and YCrCb are applied. However, there are limitations that are needed to be considered. Almost all of skin color space models are sensitive to quickly changing or mixed lighting circumstances. There are certain restrictions in order for the hand recognition to give better results such as the distance of user’s hand to the webcam and the posture and size of the hand.

Keywords: hand detection, hand gesture, hand recognition, sign language

Procedia PDF Downloads 307
2704 A Study of Management Principles Incorporating Corporate Governance and Advocating Ethics to Reduce Fraud at a South African Bank

Authors: Roshan Jelal, Charles Mbohwa

Abstract:

In today’s world, internal fraud remains one of the most challenging problems within companies worldwide and despite investment in controls and attention given to the problem, the instances of internal fraud has not abated. To the contrary it appears that internal fraud is on the rise especially in the wake of the economic downturn. Leadership within companies believes that the more sophisticated the controls employed the less likely it would be for employees to pilfer. This is a very antiquated view as investment in controls may not be enough to curtail internal fraud; however, ensuring that a company drives the correct culture and behaviour within the organisation is likely to yield desired results. This research aims to understand how creating a strong ethical culture and embedding the principle of good corporate governance impacts on levels of internal fraud with an organization (a South African Bank).

Keywords: internal fraud, corporate governance, ethics, reserve bank, the King Code

Procedia PDF Downloads 416