Abstract: Measurements and quantitative analysis of kinematic
parameters of human hand movements have an important role in
different areas such as hand function rehabilitation, modeling of
multi-digits robotic hands, and the development of machine-man
interfaces. In this paper the assessment and evaluation of the reachto-
grasp movement by using computerized and robot-assisted method
is described. Experiment involved the measurements of hand
positions of seven healthy subjects during grasping three objects of
different shapes and sizes. Results showed that three dominant phases
of reach-to-grasp movements could be clearly identified.
Abstract: Passing the entrance exam to a university is a major
step in one's life. University entrance exam commonly known as
Kankor is the nationwide entrance exam in Afghanistan. This
examination is prerequisite for all public and private higher education
institutions at undergraduate level. It is usually taken by students who
are graduated from high schools. In this paper, we reflect the major
educational school graduates issues and propose ICT-based test
preparation environment, known as ‘Online Kankor Exam Prep
System’ to give students the tools to help them pass the university
entrance exam on the first try. The system is based on Intelligent
Tutoring System (ITS), which introduced an essential package of
educational technology for learners that features: (I) exam-focused
questions and content; (ii) self-assessment environment; and (iii) test
preparation strategies in order to help students to acquire the necessary
skills in their carrier and keep them up-to-date with instruction.
Abstract: We have developed a new computer program in
Fortran 90, in order to obtain numerical solutions of a system
of Relativistic Magnetohydrodynamics partial differential equations
with predetermined gravitation (GRMHD), capable of simulating
the formation of relativistic jets from the accretion disk of matter
up to his ejection. Initially we carried out a study on numerical
methods of unidimensional Finite Volume, namely Lax-Friedrichs,
Lax-Wendroff, Nessyahu-Tadmor method and Godunov methods
dependent on Riemann problems, applied to equations Euler in
order to verify their main features and make comparisons among
those methods. It was then implemented the method of Finite
Volume Centered of Nessyahu-Tadmor, a numerical schemes that
has a formulation free and without dimensional separation of
Riemann problem solvers, even in two or more spatial dimensions,
at this point, already applied in equations GRMHD. Finally, the
Nessyahu-Tadmor method was possible to obtain stable numerical
solutions - without spurious oscillations or excessive dissipation -
from the magnetized accretion disk process in rotation with respect
to a central black hole (BH) Schwarzschild and immersed in a
magnetosphere, for the ejection of matter in the form of jet over a
distance of fourteen times the radius of the BH, a record in terms
of astrophysical simulation of this kind. Also in our simulations,
we managed to get substructures jets. A great advantage obtained
was that, with the our code, we got simulate GRMHD equations in
a simple personal computer.
Abstract: Operations research science (OR) deals with good
success in developing and applying scientific methods for problem
solving and decision-making. However, by using OR techniques, we
can enhance the use of computer decision support systems to achieve
optimal management for institutions. OR applies comprehensive
analysis including all factors that effect on it and builds mathematical
modeling to solve business or organizational problems. In addition, it
improves decision-making and uses available resources efficiently.
The adoption of OR by universities would definitely contributes to
the development and enhancement of the performance of OR
techniques. This paper provides an understanding of the structures,
approaches and models of OR in problem solving and decisionmaking.
Abstract: Over the last few decades, oilfield service rolling
equipment has significantly increased in weight, primarily because of
emissions regulations, which require larger/heavier engines, larger
cooling systems, and emissions after-treatment systems, in some
cases, etc. Larger engines cause more vibration and shock loads,
leading to failure of electronics and control systems.
If the vibrating frequency of the engine matches the system
frequency, high resonance is observed on structural parts and mounts.
One such existing automated control equipment system comprising
wire rope mounts used for mounting computers was designed
approximately 12 years ago. This includes the use of an industrialgrade
computer to control the system operation. The original
computer had a smaller, lighter enclosure. After a few years, a newer
computer version was introduced, which was 10 lbm heavier. Some
failures of internal computer parts have been documented for cases in
which the old mounts were used. Because of the added weight, there
is a possibility of having the two brackets impact each other under
off-road conditions, which causes a high shock input to the computer
parts. This added failure mode requires validating the existing mount
design to suit the new heavy-weight computer.
This paper discusses the modal finite element method (FEM)
analysis and experimental modal analysis conducted to study the
effects of vibration on the wire rope mounts and the computer. The
existing mount was modelled in ANSYS software, and resultant
mode shapes and frequencies were obtained. The experimental modal
analysis was conducted, and actual frequency responses were
observed and recorded.
Results clearly revealed that at resonance frequency, the brackets
were colliding and potentially causing damage to computer parts. To
solve this issue, spring mounts of different stiffness were modeled in
ANSYS software, and the resonant frequency was determined.
Increasing the stiffness of the system increased the resonant
frequency zone away from the frequency window at which the engine
showed heavy vibrations or resonance. After multiple iterations in
ANSYS software, the stiffness of the spring mount was finalized,
which was again experimentally validated.
Abstract: Science and technology has a major impact on many
societal domains such as communication, medicine, food,
transportation, etc. However, this dominance of modern technology
can have a negative unintended impact on indigenous systems, and in
particular on indigenous foods. This problem serves as a motivation
to this study whose aim is to examine the perceptions of learners on
the usefulness of Information and Communication Technologies
(ICTs) for learning about indigenous foods. This aim will be
subdivided into two types of research objectives. The design and
identification of theories and models will be achieved using literature
content analysis. The objective on the empirical testing of such
theories and models will be achieved through the survey of
Hospitality studies learners from different schools in the iLembe and
Umgungundlovu Districts of the South African Kwazulu-Natal
province. SPSS is used to quantitatively analyze the data collected by
the questionnaire of this survey using descriptive statistics and
Pearson correlations after the assessment of the validity and the
reliability of the data. The main hypothesis behind this study is that
there is a connection between the demographics of learners, their
perceptions on the usefulness of ICTs for learning about indigenous
foods, and the following personality and eLearning related theories
constructs: Computer self-efficacy, Trust in ICT systems, and
Conscientiousness; as suggested by existing studies on learning
theories. This hypothesis was fully confirmed by the survey
conducted by this study except for the demographic factors where
gender and age were not found to be determinant factors of learners’
perceptions on the usefulness of ICTs for learning about indigenous
foods.
Abstract: Real time image and video processing is a demand in
many computer vision applications, e.g. video surveillance, traffic
management and medical imaging. The processing of those video
applications requires high computational power. Thus, the optimal
solution is the collaboration of CPU and hardware accelerators. In
this paper, a Canny edge detection hardware accelerator is proposed.
Edge detection is one of the basic building blocks of video and image
processing applications. It is a common block in the pre-processing
phase of image and video processing pipeline. Our presented
approach targets offloading the Canny edge detection algorithm from
processing system (PS) to programmable logic (PL) taking the
advantage of High Level Synthesis (HLS) tool flow to accelerate the
implementation on Zynq platform. The resulting implementation
enables up to a 100x performance improvement through hardware
acceleration. The CPU utilization drops down and the frame rate
jumps to 60 fps of 1080p full HD input video stream.
Abstract: The paper describes a Chinese shadow play animation
system based on Kinect. Users, without any professional training, can
personally manipulate the shadow characters to finish a shadow play
performance by their body actions and get a shadow play video
through giving the record command to our system if they want. In our
system, Kinect is responsible for capturing human movement and
voice commands data. Gesture recognition module is used to control
the change of the shadow play scenes. After packaging the data from
Kinect and the recognition result from gesture recognition module,
VRPN transmits them to the server-side. At last, the server-side uses
the information to control the motion of shadow characters and video
recording. This system not only achieves human-computer interaction,
but also realizes the interaction between people. It brings an
entertaining experience to users and easy to operate for all ages. Even
more important is that the application background of Chinese shadow
play embodies the protection of the art of shadow play animation.
Abstract: Braille alphabet is an important tool that enables
visually impaired individuals to have a comfortable life like those
who have normal vision. For this reason, new applications related to
the Braille alphabet are being developed. In this study, a new
Refreshable Braille Display was developed to help visually impaired
individuals learn the Braille alphabet easier. By means of this system,
any text downloaded on a computer can be read by the visually
impaired individual at that moment by feeling it by his/her hands.
Through this electronic device, it was aimed to make learning the
Braille alphabet easier for visually impaired individuals with whom
the necessary tests were conducted.
Abstract: The star network is one of the promising
interconnection networks for future high speed parallel computers, it
is expected to be one of the future-generation networks. The star
network is both edge and vertex symmetry, it was shown to have
many gorgeous topological proprieties also it is owns hierarchical
structure framework. Although much of the research work has been
done on this promising network in literature, it still suffers from
having enough algorithms for load balancing problem. In this paper
we try to work on this issue by investigating and proposing an
efficient algorithm for load balancing problem for the star network.
The proposed algorithm is called Star Clustered Dimension Exchange
Method SCDEM to be implemented on the star network. The
proposed algorithm is based on the Clustered Dimension Exchange
Method (CDEM). The SCDEM algorithm is shown to be efficient in
redistributing the load balancing as evenly as possible among all
nodes of different factor networks.
Abstract: The inspection of underneath vehicle system has been
given significant attention by governments after the threat of
terrorism become more prevalent. New technologies such as mobile
robots and computer vision are led to have more secure environment.
This paper proposed that a mobile robot like Aria robot can be used
to search and inspect the bombs under parking a lot vehicle. This
robot is using fuzzy logic and subsumption algorithms to control the
robot that movies underneath the vehicle. An OpenCV library and
laser Hokuyo are added to Aria robot to complete the experiment for
under vehicle inspection. This experiment was conducted at the
indoor environment to demonstrate the efficiency of our methods to
search objects and control the robot movements under vehicle. We
got excellent results not only by controlling the robot movement but
also inspecting object by the robot camera at same time. This success
allowed us to know the requirement to construct a new cost effective
robot with more functionality.
Abstract: The paper follows a discourse on computer-assisted
language learning. We examine problems of foreign language
teaching and learning and introduce a metamodel that can be used to
define learning models of language grammar structures in order to
support teacher/student interaction. Special attention is paid to the
concept of a virtual language lab. Our approach to language
education assumes to encourage learners to experiment with a
language and to learn by discovering patterns of grammatically
correct structures created and managed by a language expert.
Abstract: Augmented Reality is a technology that involves the
overlay of virtual content, which is context or environment sensitive,
on images of the physical world in real time. This paper presents the
development of a catalog system that facilitates and allows the
creation, publishing, management and exploitation of augmented
multimedia contents and Augmented Reality applications, creating an
own space for anyone that wants to provide information to real
objects in order to edit and share it then online with others. These
spaces would be built for different domains without the initial need of
expert users. Its operation focuses on the context of Web 2.0 or
Social Web, with its various applications, developing contents to
enrich the real context in which human beings act permitting the
evolution of catalog’s contents in an emerging way.
Abstract: Sports games conducted as a group are a form of
therapeutic exercise for aged people with decreased strength and for
people suffering from permanent damage of stroke and other
conditions. However, it is difficult for patients with different athletic
abilities to play a game on an equal footing. This study specifically
examines a computer video game designed for therapeutic exercise,
and a game system with support given depending on athletic ability.
Thereby, anyone playing the game can participate equally. This
video-game, to be specific, is a popular variant of balloon volleyball,
in which players hit a balloon by hand before it falls to the floor. In this
game system, each player plays the game watching a monitor on which
the system displays tailor-made video-game images adjusted to the
person’s athletic ability, providing players with player-adaptive assist
support. We have developed a multiplayer game system with an image
generation technique for the tailor-made video-game and conducted
tests to evaluate it.
Abstract: Skin detection is an important task for computer
vision systems. A good method of skin detection means a good and
successful result of the system.
The colour is a good descriptor for image segmentation and
classification; it allows detecting skin colour in the images. The
lighting changes and the objects that have a colour similar than skin
colour make the operation of skin detection difficult.
In this paper, we proposed a method using the YCbCr colour space
for skin detection and lighting effects elimination, then we use the
information of texture to eliminate the false regions detected by the
YCbCr skin model.
Abstract: Artificial Immune Systems (AIS), inspired by the
human immune system, are algorithms and mechanisms which are
self-adaptive and self-learning classifiers capable of recognizing and
classifying by learning, long-term memory and association. Unlike
other human system inspired techniques like genetic algorithms and
neural networks, AIS includes a range of algorithms modeling on
different immune mechanism of the body. In this paper, a mechanism
of a human immune system based on apoptosis is adopted to build an
Intrusion Detection System (IDS) to protect computer networks.
Features are selected from network traffic using Fisher Score. Based
on the selected features, the record/connection is classified as either
an attack or normal traffic by the proposed methodology. Simulation
results demonstrates that the proposed AIS based on apoptosis
performs better than existing AIS for intrusion detection.
Abstract: The use of information and communication
technologies such as computers, mobile phones and the Internet is
becoming prevalent in today’s world; and it is facilitating access to a
vast amount of data, services and applications for the improvement of
people’s lives. However, this prevalence of ICTs is hampered by the
problem of low income levels in developing countries to the point
where people cannot timeously replace or repair their ICT devices
when damaged or lost; and this problem serves as a motivation for
this study whose aim is to examine the perceptions of teachers on the
reliability of cellphones when used for teaching and learning
purposes. The research objectives unfolding this aim are of two
types: Objectives on the selection and design of theories and models,
and objectives on the empirical testing of these theories and models.
The first type of objectives is achieved using content analysis in an
extensive literature survey: and the second type of objectives is
achieved through a survey of high school teachers from the ILembe
and UMgungundlovu districts in the KwaZulu-Natal province of
South Africa. Data collected from this questionnaire based survey is
analysed in SPSS using descriptive statistics and Pearson correlations
after checking the reliability and validity of the questionnaires. The
main hypothesis driving this study is that there is a relationship
between the demographics and the attribution identity of teachers on
one hand, and their perceptions on the reliability of cellphones on the
other hand, as suggested by existing literature; except that attribution
identities are considered in this study under three angles: intention,
knowledge and ability, and action. The results of this study confirm
that the perceptions of teachers on the reliability of cellphones for
teaching and learning are affected by the school location of these
teachers, and by their perceptions on learners’ cellphones usage
intentions and actual use.
Abstract: This paper presents the electromagnetic interference
(EMI) shielding effectiveness of rice husk and carbon nanotubes
(RHCNTs) composites in the X-band region (8.2-12.4 GHz). The
difference weight ratio of carbon nanotubes (CNTs) were mix with
the rice husk. The rectangular waveguide technique was used to
measure the complex permittivity of the RHCNTs composites
materials. The complex permittivity is represented in terms of both
the real and imaginary parts of permittivity in X-band frequency. The
conductivity of RHCNTs shows increasing when the ratio of CNTs
mixture increases. The composites materials were simulated using
Computer Simulation Technology (CST) Microwave Studio
simulation software. The shielding effectiveness of RHCNTs and
pure rice husk was compared. The highest EMI SE of 30 dB is
obtained for RHCNTs composites of 10 wt % CNTs with 10mm
thickness.
Abstract: Apps are today the most important possibility to adapt
mobile phones and computers to fulfill the special needs of their
users. Location- and context-sensitive programs are hereby the key to
support the interaction of the user with his/her environment and also
to avoid an overload with a plenty of dispensable information. The
contribution shows, how a trusted, secure and really bi-directional
communication and interaction among users and their environment
can be established and used, e.g. in the field of home automation.
Abstract: In new energy development, wind power has boomed.
It is due to the proliferation of wind parks and their operation in
supplying the national electric grid with low cost and clean resources.
Hence, there is an increased need to establish a proactive
maintenance for wind turbine machines based on remote control and
monitoring. That is necessary with a real-time wireless connection in
offshore or inaccessible locations while the wired method has many
flaws. The objective of this strategy is to prolong wind turbine
lifetime and to increase productivity. The hardware of a remote
control and monitoring system for wind turbine parks is designed. It
takes advantage of GPRS or Wi-Max wireless module to collect data
measurements from different wind machine sensors through IP based
multi-hop communication. Computer simulations with Proteus ISIS
and OPNET software tools have been conducted to evaluate the
performance of the studied system. Study findings show that the
designed device is suitable for application in a wind park.