Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249221
G. Young, Alexis Post, Zaley Kaelberer, W. Guthrie
With the growing demand for civil engineers in the United States, understanding factors that influence students to select civil engineering as a major in college can lead to valuable insights for recruitment of future civil engineers. The influential factor that this paper analyzed and discussed is the impact of personal relationships on a student's decision to become a civil engineer. The most influential person was the father, with 40.7% of students specifically reporting that their father influenced their decision to pursue civil engineering. The second most influential figures were high school teachers in the STEM disciplines, where 11.2% of the students mentioned that either a math or science teacher influenced their decision. Unique to BYU, 9.8% of students mentioned the influence of church leaders and church members. Based on these findings, recruitment of civil engineering students to BYU will be most effective through outreach to fathers and STEM teachers.
{"title":"Influence of Personal Relationships on Selection of Civil Engineering as a Career","authors":"G. Young, Alexis Post, Zaley Kaelberer, W. Guthrie","doi":"10.1109/IETC47856.2020.9249221","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249221","url":null,"abstract":"With the growing demand for civil engineers in the United States, understanding factors that influence students to select civil engineering as a major in college can lead to valuable insights for recruitment of future civil engineers. The influential factor that this paper analyzed and discussed is the impact of personal relationships on a student's decision to become a civil engineer. The most influential person was the father, with 40.7% of students specifically reporting that their father influenced their decision to pursue civil engineering. The second most influential figures were high school teachers in the STEM disciplines, where 11.2% of the students mentioned that either a math or science teacher influenced their decision. Unique to BYU, 9.8% of students mentioned the influence of church leaders and church members. Based on these findings, recruitment of civil engineering students to BYU will be most effective through outreach to fathers and STEM teachers.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116782938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249149
Dylan Lasher, P. Bodily
A current challenge in AI research is enabling AI systems to be inspired by external sources. We present a method for subselecting portions of a training corpus based on relevance to an external inspiring source. Our system takes an external, text-based inspiring source (e.g., tweet), extracts weighted lexical topics contained in the inspiring source, and uses these weighted topics to rank training instances in a corpus of song lyrics according to their relevance to the inspiring source. The system extends on the capabilities of the Empath framework by automatically generating domain-specific categories and mapping functions. The system offers a novel approach toward improved lexical semantic analyses for comparative corpus ranking.
{"title":"Tweet-Inspired Intelligent Subselection of Semantically-Related Lyrical Training Data","authors":"Dylan Lasher, P. Bodily","doi":"10.1109/IETC47856.2020.9249149","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249149","url":null,"abstract":"A current challenge in AI research is enabling AI systems to be inspired by external sources. We present a method for subselecting portions of a training corpus based on relevance to an external inspiring source. Our system takes an external, text-based inspiring source (e.g., tweet), extracts weighted lexical topics contained in the inspiring source, and uses these weighted topics to rank training instances in a corpus of song lyrics according to their relevance to the inspiring source. The system extends on the capabilities of the Empath framework by automatically generating domain-specific categories and mapping functions. The system offers a novel approach toward improved lexical semantic analyses for comparative corpus ranking.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249111
Neil B. Harrison, L. Thackeray
Scrum is an agile project management methodology, founded on principles of a learning organization. The principles of a learning organization are systems thinking, personal mastery, mental models, shared vision, and team learning. However, if organizations follow the Scrum practices without understanding the underlying principles, Scrum does not work as well as intended. Ideally, the foundational principles should be learned together with the Scrum practices, but often teams learn the practices without the principles. We have successfully taught Scrum practices and principles together in a graduate course in software engineering, and found students were able to execute Scrum effectively. We propose how the principles can also be taught in an industrial setting where practitioners know Scrum practices but not the foundation.
{"title":"Teaching Systems Thinking as a Foundation of Scrum","authors":"Neil B. Harrison, L. Thackeray","doi":"10.1109/IETC47856.2020.9249111","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249111","url":null,"abstract":"Scrum is an agile project management methodology, founded on principles of a learning organization. The principles of a learning organization are systems thinking, personal mastery, mental models, shared vision, and team learning. However, if organizations follow the Scrum practices without understanding the underlying principles, Scrum does not work as well as intended. Ideally, the foundational principles should be learned together with the Scrum practices, but often teams learn the practices without the principles. We have successfully taught Scrum practices and principles together in a graduate course in software engineering, and found students were able to execute Scrum effectively. We propose how the principles can also be taught in an industrial setting where practitioners know Scrum practices but not the foundation.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249209
James Green, Carlos R. Vilorio, Kalliyan Lay, Christine Lastra, A. Hawkins
We have designed and fabricated a silicon microchip capable of gas chromatography. The microchips feature onboard heaters and direct interfacing with silica capillaries for the lowest possible thermal mass and are capable of operating at over 300°C.
{"title":"Silicon Micro Gas Chromatography with Silk Screen Heater and Polyimide Capillary Insertion","authors":"James Green, Carlos R. Vilorio, Kalliyan Lay, Christine Lastra, A. Hawkins","doi":"10.1109/IETC47856.2020.9249209","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249209","url":null,"abstract":"We have designed and fabricated a silicon microchip capable of gas chromatography. The microchips feature onboard heaters and direct interfacing with silica capillaries for the lowest possible thermal mass and are capable of operating at over 300°C.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122671469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249100
Kailee Parkinson, A. Minaie, Reza Sanati-Mehrizy
This project uses Computer Vision to verify that Jackson Pollock's drip-and-pour style paintings exhibit fractal behavior. Pseudocode provided from a different study of fractals in his artwork is converted into a working program that is easily replicable and runnable from a web browser. The Detrended Fluctuation Analysis (DFA) Algorithm is applied to a dataset of Pollock's artwork using Python and Jupytr Notebooks to verify that the output of the algorithm mirrors a power law distribution. The program converts a dataset of Pollock's drip-and-pour style paintings into black-and-white images, and saves off the luminance values into two-dimensional matrices. The algorithm is run on these matrices, and the matrices are then segmented and evaluated at increasingly magnified scales. The final results are then displayed in graphs, which are assessed against a power law distribution graph. The resulting graphs created in this project do verify that fractal behavior is observed. The program is housed in a github repository that can be uploaded and run in Google Colab. The final result is a code base that is broken into multiple sections to help any user gain an understanding of the Computer Vision algorithm.
{"title":"Recognizing Fractal Behavior in Jackson Pollock Artwork through Computer Vision","authors":"Kailee Parkinson, A. Minaie, Reza Sanati-Mehrizy","doi":"10.1109/IETC47856.2020.9249100","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249100","url":null,"abstract":"This project uses Computer Vision to verify that Jackson Pollock's drip-and-pour style paintings exhibit fractal behavior. Pseudocode provided from a different study of fractals in his artwork is converted into a working program that is easily replicable and runnable from a web browser. The Detrended Fluctuation Analysis (DFA) Algorithm is applied to a dataset of Pollock's artwork using Python and Jupytr Notebooks to verify that the output of the algorithm mirrors a power law distribution. The program converts a dataset of Pollock's drip-and-pour style paintings into black-and-white images, and saves off the luminance values into two-dimensional matrices. The algorithm is run on these matrices, and the matrices are then segmented and evaluated at increasingly magnified scales. The final results are then displayed in graphs, which are assessed against a power law distribution graph. The resulting graphs created in this project do verify that fractal behavior is observed. The program is housed in a github repository that can be uploaded and run in Google Colab. The final result is a code base that is broken into multiple sections to help any user gain an understanding of the Computer Vision algorithm.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128569946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249163
Rawan Alnsour, Basil J. Hamdan
The purpose of this paper is threefold. First, it makes the case for incorporating cybersecurity principles into undergraduate Engineering Technology Education and for incorporating Industrial Control Systems (ICS) principles into undergraduate Information Technology (IT)/Cybersecurity Education. Specifically, the paper highlights the knowledge/skill gap between engineers and IT/Cybersecurity professionals with respect to the cybersecurity of the ICS. Secondly, it identifies several areas where traditional IT systems and ICS intercept. This interception not only implies that ICS are susceptible to the same cyber threats as traditional IT/IS but also to threats that are unique to ICS. Subsequently, the paper identifies several areas where cybersecurity principles can be applied to ICS. By incorporating cybersecurity principles into Engineering Technology Education, the paper hopes to provide IT/Cybersecurity and Engineering Students with (a) the theoretical knowledge of the cybersecurity issues associated with administering and operating ICS and (b) the applied technical skills necessary to manage and mitigate the cyber risks against these systems. Overall, the paper holds the promise of contributing to the ongoing effort aimed at bridging the knowledge/skill gap with respect to securing ICS against cyber threats and attacks.
{"title":"Incorporating SCADA Cybersecurity in Undergraduate Engineering Technology & Information Technology Education","authors":"Rawan Alnsour, Basil J. Hamdan","doi":"10.1109/IETC47856.2020.9249163","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249163","url":null,"abstract":"The purpose of this paper is threefold. First, it makes the case for incorporating cybersecurity principles into undergraduate Engineering Technology Education and for incorporating Industrial Control Systems (ICS) principles into undergraduate Information Technology (IT)/Cybersecurity Education. Specifically, the paper highlights the knowledge/skill gap between engineers and IT/Cybersecurity professionals with respect to the cybersecurity of the ICS. Secondly, it identifies several areas where traditional IT systems and ICS intercept. This interception not only implies that ICS are susceptible to the same cyber threats as traditional IT/IS but also to threats that are unique to ICS. Subsequently, the paper identifies several areas where cybersecurity principles can be applied to ICS. By incorporating cybersecurity principles into Engineering Technology Education, the paper hopes to provide IT/Cybersecurity and Engineering Students with (a) the theoretical knowledge of the cybersecurity issues associated with administering and operating ICS and (b) the applied technical skills necessary to manage and mitigate the cyber risks against these systems. Overall, the paper holds the promise of contributing to the ongoing effort aimed at bridging the knowledge/skill gap with respect to securing ICS against cyber threats and attacks.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130612221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249168
G. Hodgson, Neil B. Harrison, George Rudolph, C. Allison
Mappings in software architecture from components to requirements have the potential to reveal valuable information to both architects and stakeholders. This research creates a desktop application to explore the patterns and meanings of these mappings through visualization. Observations from the visualization tool provide a foundation to potentially improve the architecture process. This could enable architects to make better decisions in order to resiliently handle feature enhancements to the architecture, in addition to scalability and maintenance.
{"title":"Visualization of Requirements to Software Architecture Component Mappings","authors":"G. Hodgson, Neil B. Harrison, George Rudolph, C. Allison","doi":"10.1109/IETC47856.2020.9249168","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249168","url":null,"abstract":"Mappings in software architecture from components to requirements have the potential to reveal valuable information to both architects and stakeholders. This research creates a desktop application to explore the patterns and meanings of these mappings through visualization. Observations from the visualization tool provide a foundation to potentially improve the architecture process. This could enable architects to make better decisions in order to resiliently handle feature enhancements to the architecture, in addition to scalability and maintenance.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249180
Taher Deemyad, Ryan Moeller, Anish Sebastian
This paper analyzes the design of a prototype chassis for an autonomous ground vehicle (AGV). This prototype is a four-wheel powered vehicle which would be used for identifying and removal of potatoes affected by virus Y (PVY) in the field. Potato fields are fraught with rough terrain and deep irrigation ruts. Navigation of such a terrain is very challenging and demanding on the robot chassis. An optimization routine was used for finding the ideal size and material for the chassis. Seven different stress analysis were conducted to help narrow down the chassis design and material for the prototype. In addition to a general overview of the various vehicle sub-systems, a detailed description of the force and stress analysis for the chassis of this vehicle is provided. All stress analysis for this chassis passed the design requirements in CAD model (SolidWorks) and has been built and tested in the field.
{"title":"Chassis Design and Analysis of an Autonomous Ground Vehicle (AGV) using Genetic Algorithm","authors":"Taher Deemyad, Ryan Moeller, Anish Sebastian","doi":"10.1109/IETC47856.2020.9249180","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249180","url":null,"abstract":"This paper analyzes the design of a prototype chassis for an autonomous ground vehicle (AGV). This prototype is a four-wheel powered vehicle which would be used for identifying and removal of potatoes affected by virus Y (PVY) in the field. Potato fields are fraught with rough terrain and deep irrigation ruts. Navigation of such a terrain is very challenging and demanding on the robot chassis. An optimization routine was used for finding the ideal size and material for the chassis. Seven different stress analysis were conducted to help narrow down the chassis design and material for the prototype. In addition to a general overview of the various vehicle sub-systems, a detailed description of the force and stress analysis for the chassis of this vehicle is provided. All stress analysis for this chassis passed the design requirements in CAD model (SolidWorks) and has been built and tested in the field.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116504126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249219
C. P. Morrey
A method for modeling an educational program as a flow chart is given. An example model is created for the Master of Science in Cybersecurity program at Utah Valley University.
给出了一种用流程图对教育计划进行建模的方法。为犹他谷大学网络安全硕士项目创建了一个示例模型。
{"title":"Pathway Mapping for an Educational Program","authors":"C. P. Morrey","doi":"10.1109/IETC47856.2020.9249219","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249219","url":null,"abstract":"A method for modeling an educational program as a flow chart is given. An example model is created for the Master of Science in Cybersecurity program at Utah Valley University.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249154
G. G. Jaman, Nusrat Farheen, M. Schoen
The study of mobile robot(s) based applications recently gained much popularity in academic settings. Different types of locomotion techniques exist for mobile robots, among them, wheeled robots are popular for educational purposes. Mobile robot applications may consist of single or multiple robot units. Some of the key issues to be addressed in mobile robot navigation are related to the condition of the underlying terrains, obstacles, localizations, mapping, and communication, among others. In many robotics related academic course works, students are often required to apply mobile robot localization and mapping capabilities in order to meet robot task objectives. This paper addresses an obstacle free scenario with a planar platform and presents cost-effective techniques for mobile robot localization and mapping. The paper includes a review of general fixed wheeled robot dynamics, addresses simple navigation techniques based on a given reference location for standard wheeled robots, and discusses strategies for building mapping configurations. In addition, constraints and troubleshoot approaches across different types of sensors used for mapping are presented.
{"title":"Cost Effective Mobile Robots Navigation and Mapping System for Education","authors":"G. G. Jaman, Nusrat Farheen, M. Schoen","doi":"10.1109/IETC47856.2020.9249154","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249154","url":null,"abstract":"The study of mobile robot(s) based applications recently gained much popularity in academic settings. Different types of locomotion techniques exist for mobile robots, among them, wheeled robots are popular for educational purposes. Mobile robot applications may consist of single or multiple robot units. Some of the key issues to be addressed in mobile robot navigation are related to the condition of the underlying terrains, obstacles, localizations, mapping, and communication, among others. In many robotics related academic course works, students are often required to apply mobile robot localization and mapping capabilities in order to meet robot task objectives. This paper addresses an obstacle free scenario with a planar platform and presents cost-effective techniques for mobile robot localization and mapping. The paper includes a review of general fixed wheeled robot dynamics, addresses simple navigation techniques based on a given reference location for standard wheeled robots, and discusses strategies for building mapping configurations. In addition, constraints and troubleshoot approaches across different types of sensors used for mapping are presented.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}