Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249141
Sazida B. Islam, Damian Valles, M. Forstner
Camera-traps are noninvasive tools that can capture thousands of images of wildlife species per deployment. To conduct collaborative wildlife monitoring for conservation and to collect up to date information about wildlife species, integrated camera-sensor networking systems have been established at a large scale in Bastrop County, Texas. Species recognition from gathered images is a challenging assignment for computers due to a large amount of intra-class variability, viewpoint variation, lighting illumination, occlusion, background clutter, and deformation. Moreover, processing millions of captured images is daunting, expensive, and time-consuming as most of the images contain only background absent species of interest. This paper proposes a framework of automated wildlife species recognition by image classification using computer-vision techniques and machine learning algorithms. A Convolutional Neural Network (CNN) architecture has been suggested to classify any two species automatically. As an initial experiment, a binary CNN network has been trained and validated with a small public dataset of snakes, and toads/frogs to classify them within their group. The model evaluation achieved 76% accuracy on average for the test data that supports the prospects for the recommended model.
{"title":"Herpetofauna Species Classification from Images with Deep Neural Network","authors":"Sazida B. Islam, Damian Valles, M. Forstner","doi":"10.1109/IETC47856.2020.9249141","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249141","url":null,"abstract":"Camera-traps are noninvasive tools that can capture thousands of images of wildlife species per deployment. To conduct collaborative wildlife monitoring for conservation and to collect up to date information about wildlife species, integrated camera-sensor networking systems have been established at a large scale in Bastrop County, Texas. Species recognition from gathered images is a challenging assignment for computers due to a large amount of intra-class variability, viewpoint variation, lighting illumination, occlusion, background clutter, and deformation. Moreover, processing millions of captured images is daunting, expensive, and time-consuming as most of the images contain only background absent species of interest. This paper proposes a framework of automated wildlife species recognition by image classification using computer-vision techniques and machine learning algorithms. A Convolutional Neural Network (CNN) architecture has been suggested to classify any two species automatically. As an initial experiment, a binary CNN network has been trained and validated with a small public dataset of snakes, and toads/frogs to classify them within their group. The model evaluation achieved 76% accuracy on average for the test data that supports the prospects for the recommended model.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130236367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249190
Soha Boroojerdi, A. Jahanian, E. Rohani
A DNA computer requires DNA processor. A fundamental component of the processor is an arithmetic logic unit (ALU). The ALU performs all arithmetic operations in binary format, and the most critical operation is two's complement addition, which can involve addition, subtraction, multiplication, and division. Two's complement adders can be synthesized using multiple full adders. In this paper, a noise-resistant DNA computing full adder circuit is presented. The proposed adder circuit, unlike other circuits, takes strands as inputs and produces the results in the form of DNA strands. This is an important characteristic, since it enables multiple-level design. In addition, since all possible hybridization in this circuit is desired, it can control an abundance of unwanted strands. As a result, the synthesized adder is noise-resistant. While other multi-level designs might be possible (e.g., Nor-Nor design), the proposed design implements the full adder circuit as an integrated gate. The benefit of having an integrated circuit is that it eliminates the need for separate suppressors and activators. Before synthesizing the adder, we implemented AND, OR, and inverter gates and then extended these basic components to implement the desired circuit. The proposed designs were implemented and tested using Visual DSD programming and simulation tool.
{"title":"Noise Resistant Full Adder Using DNA Strands","authors":"Soha Boroojerdi, A. Jahanian, E. Rohani","doi":"10.1109/IETC47856.2020.9249190","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249190","url":null,"abstract":"A DNA computer requires DNA processor. A fundamental component of the processor is an arithmetic logic unit (ALU). The ALU performs all arithmetic operations in binary format, and the most critical operation is two's complement addition, which can involve addition, subtraction, multiplication, and division. Two's complement adders can be synthesized using multiple full adders. In this paper, a noise-resistant DNA computing full adder circuit is presented. The proposed adder circuit, unlike other circuits, takes strands as inputs and produces the results in the form of DNA strands. This is an important characteristic, since it enables multiple-level design. In addition, since all possible hybridization in this circuit is desired, it can control an abundance of unwanted strands. As a result, the synthesized adder is noise-resistant. While other multi-level designs might be possible (e.g., Nor-Nor design), the proposed design implements the full adder circuit as an integrated gate. The benefit of having an integrated circuit is that it eliminates the need for separate suppressors and activators. Before synthesizing the adder, we implemented AND, OR, and inverter gates and then extended these basic components to implement the desired circuit. The proposed designs were implemented and tested using Visual DSD programming and simulation tool.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249216
D. V. João, Paula Zenni Lodetti, Aguinaldo dos Santos, M. A. Izumida Martins, João Felipe Brandão Almeida, Daniel Marques da Silva Chaves
Virtual reality is being considered as an innovative way to perform training in many industry sector. Even though it has being developed in many aspects, the final users still resistant for its full use in electrical power sector. This paper evaluate the opinion of expert professionals in the electrical utility sector to analyses an underground activity in virtual reality. The main goal is to observe what is needed to have a complete application of Virtual Reality in a risk operation present in the electrical sector, and to propose functionalities that may improve the immersion and satisfaction in the Virtual Reality training procedures.
{"title":"Virtual Reality Training in Electric Utility Sector - An Underground Application Study Case","authors":"D. V. João, Paula Zenni Lodetti, Aguinaldo dos Santos, M. A. Izumida Martins, João Felipe Brandão Almeida, Daniel Marques da Silva Chaves","doi":"10.1109/IETC47856.2020.9249216","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249216","url":null,"abstract":"Virtual reality is being considered as an innovative way to perform training in many industry sector. Even though it has being developed in many aspects, the final users still resistant for its full use in electrical power sector. This paper evaluate the opinion of expert professionals in the electrical utility sector to analyses an underground activity in virtual reality. The main goal is to observe what is needed to have a complete application of Virtual Reality in a risk operation present in the electrical sector, and to propose functionalities that may improve the immersion and satisfaction in the Virtual Reality training procedures.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114070833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249217
John Edwards, Joseph Ditton, Bishal Sainju, Joshua Dawson
This paper reports an analysis of quantitative data obtained during four weeks of a CS1 course. The data consists of programming events logged while students complete eight programming projects and include keystrokes, text pastes, task switches, and run attempts. We analyze the data to answer two related research questions. The first is which commonly studied student programming behaviors generalize well as predictors across programming assignments. The second question is which commonly studied student programming behaviors generalize well as predictors across outcome measures. We find that of the attributes we tested only a small subset are consistent predictors of success across projects, although most have some correlation in some projects. Few attributes were consistent across performance measures. Considering that many intervention strategies use small numbers of projects for student classification, our results suggest that care should be taken in drawing conclusions from data analyzed in the aggregate, both across programming projects and across performance measures.
{"title":"Different assignments as different contexts: predictors across assignments and outcome measures in CS1","authors":"John Edwards, Joseph Ditton, Bishal Sainju, Joshua Dawson","doi":"10.1109/IETC47856.2020.9249217","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249217","url":null,"abstract":"This paper reports an analysis of quantitative data obtained during four weeks of a CS1 course. The data consists of programming events logged while students complete eight programming projects and include keystrokes, text pastes, task switches, and run attempts. We analyze the data to answer two related research questions. The first is which commonly studied student programming behaviors generalize well as predictors across programming assignments. The second question is which commonly studied student programming behaviors generalize well as predictors across outcome measures. We find that of the attributes we tested only a small subset are consistent predictors of success across projects, although most have some correlation in some projects. Few attributes were consistent across performance measures. Considering that many intervention strategies use small numbers of projects for student classification, our results suggest that care should be taken in drawing conclusions from data analyzed in the aggregate, both across programming projects and across performance measures.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249114
Gabriel H. S. Costa, B. Pacheco, M. A. Martins, R. O. Brandão
Distribution grids become increasingly dynamic due to grid automation, increased distributed energy resources and continuous load variations. Faced with these conditions, distribution utilities have difficulty keeping their protection system operating at an optimal point for their entire distribution system. As a solution to ease protection settings calculation throughout the utility operating area, common protection methodologies are used, which consist in generic oversized parameters. Without the optimal design of protection parameters, distribution utilities are constantly facing fault detection problems for broken cables or high impedance faults. This work presents an Adaptive Protection System, designed to learn the grid load profile and adapt neutral overcurrent protections, in order to make the protection more sensitive. The proposed system uses two types of adaptive protection, Planned and Emergency, so that distribution protection can always be updated, even in the event of load growth in the grid, distributed energy resources increase, or even after a load-switching event on the distribution system. The article focuses on a new philosophy of autonomous and dynamic protection adjustments, as the distribution grid undergoes through changes.
{"title":"Adaptive Protection System Using Neutral Currents Studies and Load Estimation","authors":"Gabriel H. S. Costa, B. Pacheco, M. A. Martins, R. O. Brandão","doi":"10.1109/IETC47856.2020.9249114","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249114","url":null,"abstract":"Distribution grids become increasingly dynamic due to grid automation, increased distributed energy resources and continuous load variations. Faced with these conditions, distribution utilities have difficulty keeping their protection system operating at an optimal point for their entire distribution system. As a solution to ease protection settings calculation throughout the utility operating area, common protection methodologies are used, which consist in generic oversized parameters. Without the optimal design of protection parameters, distribution utilities are constantly facing fault detection problems for broken cables or high impedance faults. This work presents an Adaptive Protection System, designed to learn the grid load profile and adapt neutral overcurrent protections, in order to make the protection more sensitive. The proposed system uses two types of adaptive protection, Planned and Emergency, so that distribution protection can always be updated, even in the event of load growth in the grid, distributed energy resources increase, or even after a load-switching event on the distribution system. The article focuses on a new philosophy of autonomous and dynamic protection adjustments, as the distribution grid undergoes through changes.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249169
Tavish Burnah, George Rudolph
Recognition of handwritten text from historical documents is a very difficult problem that has not been fully solved. Many approaches have been used to recognize text and many new machine-learning-based approaches are currently being developed. To develop new methods of handwriting recognition, many ancillary steps that are not directly related to the new method must be put in place. These additional steps include loading images, cleaning documents, measuring performance, and displaying outputs. These extra actions take time that could instead be focused on the new method. This paper describes an application that was designed and created to provide all the supplementary steps needed to develop new approaches to offline handwriting recognition. It explains a pipeline-based approach that fits the sequence of steps most often used in the recognition process. The resulting application provides the framework that allows researchers to focus on their primary area of experimentation in the handwriting recognition process.
{"title":"Offline Handwriting Recognition Pipeline Testing Tool","authors":"Tavish Burnah, George Rudolph","doi":"10.1109/IETC47856.2020.9249169","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249169","url":null,"abstract":"Recognition of handwritten text from historical documents is a very difficult problem that has not been fully solved. Many approaches have been used to recognize text and many new machine-learning-based approaches are currently being developed. To develop new methods of handwriting recognition, many ancillary steps that are not directly related to the new method must be put in place. These additional steps include loading images, cleaning documents, measuring performance, and displaying outputs. These extra actions take time that could instead be focused on the new method. This paper describes an application that was designed and created to provide all the supplementary steps needed to develop new approaches to offline handwriting recognition. It explains a pipeline-based approach that fits the sequence of steps most often used in the recognition process. The resulting application provides the framework that allows researchers to focus on their primary area of experimentation in the handwriting recognition process.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127734749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249105
S. Scott, J. Willard, J. Edwards
We introduce a visualization technique to analyze event simulation data. In particular, we allow the user to discover families of events based on the topological evolution of discrete events across simulations. Discovering how events behave across simulations has applications in financial market analysis, military simulations, physical mechanics, and other settings. Our approach is to use established methods to produce a linearized tour through the parameter space of arbitrary dimension and visualize events of interest in two dimensions. The first dimension is the tour ordering and the second dimension is usually time. This paper presents our novel approach and gives examples in the context of simulations of magnet dynamics. Our initial findings are that, while z-ordering does allow the user to analyze event families, other ordering techniques would likely improve the visualization by improving spatial locality.
{"title":"High Dimensional Event Exploration Over Multiple Simulations","authors":"S. Scott, J. Willard, J. Edwards","doi":"10.1109/IETC47856.2020.9249105","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249105","url":null,"abstract":"We introduce a visualization technique to analyze event simulation data. In particular, we allow the user to discover families of events based on the topological evolution of discrete events across simulations. Discovering how events behave across simulations has applications in financial market analysis, military simulations, physical mechanics, and other settings. Our approach is to use established methods to produce a linearized tour through the parameter space of arbitrary dimension and visualize events of interest in two dimensions. The first dimension is the tour ordering and the second dimension is usually time. This paper presents our novel approach and gives examples in the context of simulations of magnet dynamics. Our initial findings are that, while z-ordering does allow the user to analyze event families, other ordering techniques would likely improve the visualization by improving spatial locality.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249206
Ryan T. Beazer, Jared E. Payne, Peter R. Nyholm, G. Nielson, S. Schultz
Silicon carbide has many desirable properties that make it a high demand product. Some of these properties make it difficult to machine silicon carbide for industrial use. This work demonstrated the ability to machine silicon carbide using Electrical Discharge Machining.
{"title":"Micromachining of Silicon Carbide using Wire Electrical Discharge Machining","authors":"Ryan T. Beazer, Jared E. Payne, Peter R. Nyholm, G. Nielson, S. Schultz","doi":"10.1109/IETC47856.2020.9249206","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249206","url":null,"abstract":"Silicon carbide has many desirable properties that make it a high demand product. Some of these properties make it difficult to machine silicon carbide for industrial use. This work demonstrated the ability to machine silicon carbide using Electrical Discharge Machining.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114340296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249104
H. Nieto-Chaupis
When the Keller-Segel equation is treated in a semiclassical scenario of electrodynamics involving Quantum Mechanics measurements, it is possible to implement the formalism of input-output in a nature manner without ambiguities. In this paper we explore such edge of this mathematical-biology equation in a systematic manner to describe virus and bacteria colonization in a healthy host. We provide numerical calculations in terms of energy. Present a set of diagrams that might enclose information about the realization of bacterial aggregations in their purpose to carry out a specific task. For this end we implement the concept of transfer function of a system. Simulations are presented in order to make predictions and validate the ideas of the proposal of this paper.
{"title":"The Input-Output Approach in Semiclassical Electrodynamics of Keller-Segel Equation","authors":"H. Nieto-Chaupis","doi":"10.1109/IETC47856.2020.9249104","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249104","url":null,"abstract":"When the Keller-Segel equation is treated in a semiclassical scenario of electrodynamics involving Quantum Mechanics measurements, it is possible to implement the formalism of input-output in a nature manner without ambiguities. In this paper we explore such edge of this mathematical-biology equation in a systematic manner to describe virus and bacteria colonization in a healthy host. We provide numerical calculations in terms of energy. Present a set of diagrams that might enclose information about the realization of bacterial aggregations in their purpose to carry out a specific task. For this end we implement the concept of transfer function of a system. Simulations are presented in order to make predictions and validate the ideas of the proposal of this paper.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121991819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-02DOI: 10.1109/IETC47856.2020.9249185
Ivann Velasco, Patrick Spackman, S. Schultz
This paper explores a new method developed for body armor testing using Fiber Bragg Gratings as the main sensing element for dynamic shape sensing. This will be used to help address injuries that result from armor deformation known as blunt force trauma. Tests were done with projectiles at speeds of up to 420+ m/s and the resulting displacement from the shape sensing algorithm produced profiles with errors less than 10% of the actual shape.
{"title":"Body Armor Shape Sensing Using Fiber Bragg Gratings","authors":"Ivann Velasco, Patrick Spackman, S. Schultz","doi":"10.1109/IETC47856.2020.9249185","DOIUrl":"https://doi.org/10.1109/IETC47856.2020.9249185","url":null,"abstract":"This paper explores a new method developed for body armor testing using Fiber Bragg Gratings as the main sensing element for dynamic shape sensing. This will be used to help address injuries that result from armor deformation known as blunt force trauma. Tests were done with projectiles at speeds of up to 420+ m/s and the resulting displacement from the shape sensing algorithm produced profiles with errors less than 10% of the actual shape.","PeriodicalId":186446,"journal":{"name":"2020 Intermountain Engineering, Technology and Computing (IETC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134087742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}