THE FORMULATION AND DISCRETIZATION ANALYSIS USING THE BEM
Published In: 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND ELECTRICAL TECHNOLOGY
Author(s): TWAIBU SEMWOGERERE
Abstract: Boundary discretization has been has been an ideal technique in solving boundary problems that are a common phenomenon in mathematics. The boundary element method (BEM) is one of the methods which has had an advantage of discretizing the boundary than the finite element method (FEM) and the finite difference method FDM) for quite so long. The curved and straight elements are crucial for the discretization process. In this study, the BEM has been used to analyze and compare curved or straight boundary discretization. The BEM and its applications was reviewed in relation to curved and straight elements. The Laplace equation with its boundary integral formulation was done and the BEM applied. The Dirac-Delta and the Green’s functions were behind the use of the BEM. Finally, three model problems were tested for analysis of the BEM with curved and straight elements in relation to solving the Laplace problem. The MATLAB programs and subprograms were used among others to solve the problem and
- Publication Date: 13-Mar-2016
- DOI: 10.15224/978-1-63248-087-3-16
- Views: 0
- Downloads: 0
DESIGN OF INFORMATION SYSTEMS (IS) REAL-TIME AND HISTORICAL LOG EVENTS ANALYZER FOR SYSTEM ADMINISTRATOR
Published In: 5TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND ELECTRICAL TECHNOLOGY
Author(s): AYHAN AKBAL , MOHAMED MOHAMUD
Abstract: The logs generated by the operating systems, and application programs, network devices, web browsers and all devices in the information systems during their normal course of operation are very important and allow system administrators to ensure that they have a reliable information system, and track what is going on in the IS, such as what web sites clients visited, whom they are sending e-mails to and receiving e-mails from and what applications are accessed. The main goal of this study is to develop software which can parse both logs generated by the information systems (IS) in real time and logs written to historical text files, and store logs in a central database in order to perform various analyses for reporting and detecting anomaly tasks on the system. Daily log entries belonging to the information systems department of Firat University Hospital are applied with the program and various analysis results were obtained. In general, information systems logs can be easily analyzed a
- Publication Date: 13-Mar-2016
- DOI: 10.15224/978-1-63248-087-3-17
- Views: 0
- Downloads: 0