首页 > 最新文献

2022 Systems and Information Engineering Design Symposium (SIEDS)最新文献

英文 中文
Restoration of Water Streams Utilizing Unmanned Aerial Vehicles 利用无人机修复溪流
Pub Date : 2022-04-28 DOI: 10.1109/SIEDS55548.2022.9799347
E. Emch, K. Hayes, Erin Janiga, T. Benzing, A. Salman
As the world progresses in technological advances, more efficient ways to track and manage streams, tributaries, and rivers can be developed. In this project, we are implementing wireless sensors and Unmanned Aerial Vehicle (UAV) technology to further progress monitoring and potentially restoring a local stream. This advanced technology and new method of water testing is autonomous and is especially useful for water bodies that are difficult to access or are very remote. By having consistent and available water data, water bodies can be restored more efficiently. In this study, we are specifically focusing on restoring Boone Run, a forested mountain stream on the South Fork of the Shenandoah River in Virginia, that is managed by the VA Department of Forestry. The methodology includes using handheld meters to collect data each month to collect and analyze temperature, pH, dissolved oxygen, and conductivity. The methodology also includes a more innovative collection of data using two remote water sensors, and further using UAV technology to retrieve the data, to make a fully autonomous system. The two remote water sensors utilize wireless technology and consist of three probes: temperature, pH, and conductivity and also a raspberry pi and circuit board to transfer and store the data. With the use of wireless and remotely collecting data, more frequent data will be found and can be analyzed in more depth to get the most accurate understanding of the water quality. The collection of both of these forms of data will then be further analyzed to find the averages of the different parameters being measured, and also to see how the stream changes overtime. A comparison of the manually collected data and automated collected data will also be made to see accuracy differences and will further help explain the results. Overall, the autonomous and continuous system of using the sensor nodes and the UAV will ultimately reduce labor, costs, and time associated with manually collecting data. The ultimate goal of analyzing this data is to recognize if the stream's conditions can support brook trout life, a keystone species of the stream. If the stream's conditions align with the conditions that trout can inhabit, it indicates the stream is in good health, and restoration initiatives can begin to reintroduce trout life.
随着世界技术的进步,可以开发出更有效的方法来跟踪和管理溪流、支流和河流。在这个项目中,我们正在实施无线传感器和无人机(UAV)技术,以进一步监测和潜在地恢复本地流。这种先进的技术和新的水测试方法是自主的,对难以进入或非常偏远的水体特别有用。有了一致和可用的水数据,水体可以更有效地恢复。在这项研究中,我们特别关注恢复布恩流,这是弗吉尼亚州谢南多厄河南叉的一条森林山涧,由弗吉尼亚州林业部管理。方法包括每月使用手持式仪表收集数据,以收集和分析温度,pH值,溶解氧和电导率。该方法还包括使用两个远程水传感器进行更具创新性的数据收集,并进一步使用无人机技术检索数据,从而形成一个完全自主的系统。这两个远程水传感器利用无线技术,由三个探头组成:温度、pH值和电导率,还有一个树莓派和电路板来传输和存储数据。通过使用无线和远程收集数据,可以发现更频繁的数据,并可以更深入地分析,从而最准确地了解水质。然后将进一步分析这两种形式的数据的集合,以找到正在测量的不同参数的平均值,并查看流如何随时间变化。还将对手动收集的数据和自动收集的数据进行比较,以查看准确性差异,并进一步帮助解释结果。总体而言,使用传感器节点和无人机的自主和连续系统最终将减少人工收集数据相关的劳动力、成本和时间。分析这些数据的最终目的是确定河流的条件是否能支持溪鳟鱼的生活,溪鳟鱼是河流的重要物种。如果溪流的条件与鳟鱼可以栖息的条件一致,这表明溪流健康状况良好,恢复计划可以开始重新引入鳟鱼的生命。
{"title":"Restoration of Water Streams Utilizing Unmanned Aerial Vehicles","authors":"E. Emch, K. Hayes, Erin Janiga, T. Benzing, A. Salman","doi":"10.1109/SIEDS55548.2022.9799347","DOIUrl":"https://doi.org/10.1109/SIEDS55548.2022.9799347","url":null,"abstract":"As the world progresses in technological advances, more efficient ways to track and manage streams, tributaries, and rivers can be developed. In this project, we are implementing wireless sensors and Unmanned Aerial Vehicle (UAV) technology to further progress monitoring and potentially restoring a local stream. This advanced technology and new method of water testing is autonomous and is especially useful for water bodies that are difficult to access or are very remote. By having consistent and available water data, water bodies can be restored more efficiently. In this study, we are specifically focusing on restoring Boone Run, a forested mountain stream on the South Fork of the Shenandoah River in Virginia, that is managed by the VA Department of Forestry. The methodology includes using handheld meters to collect data each month to collect and analyze temperature, pH, dissolved oxygen, and conductivity. The methodology also includes a more innovative collection of data using two remote water sensors, and further using UAV technology to retrieve the data, to make a fully autonomous system. The two remote water sensors utilize wireless technology and consist of three probes: temperature, pH, and conductivity and also a raspberry pi and circuit board to transfer and store the data. With the use of wireless and remotely collecting data, more frequent data will be found and can be analyzed in more depth to get the most accurate understanding of the water quality. The collection of both of these forms of data will then be further analyzed to find the averages of the different parameters being measured, and also to see how the stream changes overtime. A comparison of the manually collected data and automated collected data will also be made to see accuracy differences and will further help explain the results. Overall, the autonomous and continuous system of using the sensor nodes and the UAV will ultimately reduce labor, costs, and time associated with manually collecting data. The ultimate goal of analyzing this data is to recognize if the stream's conditions can support brook trout life, a keystone species of the stream. If the stream's conditions align with the conditions that trout can inhabit, it indicates the stream is in good health, and restoration initiatives can begin to reintroduce trout life.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130025837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Low-Cost Autonomous Epipelagic Profiling System for Oceanic Research 用于海洋研究的低成本自主上层海洋剖面系统设计
Pub Date : 2022-04-28 DOI: 10.1109/sieds55548.2022.9799420
Danyi Chen, Danette Martinez, T. H. Taylor
The epipelagic zone, the region from the surface of the ocean to 200 meters in depth, is an area of interest for ecologists, biologists, oceanographers, and other researchers interested in studying marine life and the environment. While autonomous underwater vehicles that can allow researchers to collect data throughout the epipelagic zone exist, most of these solutions are too expensive to enable smaller institutions and individual research labs to conduct their own explorations. This project aims to create an autonomous epipelagic zone profiling system that is relatively inexpensive (<$2000), requires minimal maintenance, and is accessible to smaller and/or landlocked institutions. By providing a more accessible means of data collection, researchers can more cost efficiently conduct targeted studies of marine ecosystems to better understand the environment and topics such as the impacts of climate change on the oceans, or the changing population size of phytoplankton in the environment, etc. Through conversations with our stakeholders, Dr. Sheri Floge of the Wake Forest University (WFU) Department of Biology and Electrical and Computer Engineer Dr. Kyle Luthy of the WFU Department of Engineering, we established that our system should be able to autonomously descend to a depth of 50 to 100 meters underwater and collect data such as water temperature, and pressure, as well as capture images. U sing a systematic design process, the team was able to conceptualize a design for a low-cost modular buoyancy-controlled capsule. The capsule will be attached to a buoy system, to maintain its longitudinal and latitudinal position, from which it will be able to traverse the epipelagic zone to collect data. The team is currently in the process of prototyping and testing the system, and although the prototype will only have a few sensors, the modularity of the design will enable future users to purchase and attach various sensors (such as a PlanktoScope) that suit their needs. Over the coming weeks, the team will be completing assembly and conducting laboratory and field testing of the prototype.
从海洋表面到200米深的区域,是生态学家、生物学家、海洋学家和其他对研究海洋生物和环境感兴趣的研究人员感兴趣的领域。虽然已经有自主水下航行器可以让研究人员在整个上层海域收集数据,但大多数这些解决方案都过于昂贵,无法让较小的机构和个人研究实验室进行自己的探索。该项目旨在创建一个自主的上层海洋区域分析系统,该系统相对便宜(< 2000美元),需要最少的维护,并且小型和/或内陆机构可以使用。通过提供一种更容易获得的数据收集手段,研究人员可以更经济有效地对海洋生态系统进行有针对性的研究,以更好地了解环境和主题,如气候变化对海洋的影响,或环境中浮游植物种群规模的变化等。通过与我们的利益相关者,威克森林大学(WFU)生物系的Sheri Floge博士以及电气和计算机工程师WFU工程系的Kyle Luthy博士的对话,我们确定我们的系统应该能够自主下潜到水下50到100米的深度,收集水温、压力等数据,并捕获图像。通过系统的设计过程,该团队能够将低成本模块化浮力控制胶囊的设计概念化。该太空舱将连接到一个浮标系统,以保持其纵向和纬度位置,从那里它将能够穿越上层海域收集数据。该团队目前正在对该系统进行原型制作和测试,虽然原型只有几个传感器,但设计的模块化将使未来的用户能够购买并安装适合他们需要的各种传感器(如浮游镜)。在接下来的几周内,该团队将完成原型机的组装并进行实验室和现场测试。
{"title":"Design of a Low-Cost Autonomous Epipelagic Profiling System for Oceanic Research","authors":"Danyi Chen, Danette Martinez, T. H. Taylor","doi":"10.1109/sieds55548.2022.9799420","DOIUrl":"https://doi.org/10.1109/sieds55548.2022.9799420","url":null,"abstract":"The epipelagic zone, the region from the surface of the ocean to 200 meters in depth, is an area of interest for ecologists, biologists, oceanographers, and other researchers interested in studying marine life and the environment. While autonomous underwater vehicles that can allow researchers to collect data throughout the epipelagic zone exist, most of these solutions are too expensive to enable smaller institutions and individual research labs to conduct their own explorations. This project aims to create an autonomous epipelagic zone profiling system that is relatively inexpensive (<$2000), requires minimal maintenance, and is accessible to smaller and/or landlocked institutions. By providing a more accessible means of data collection, researchers can more cost efficiently conduct targeted studies of marine ecosystems to better understand the environment and topics such as the impacts of climate change on the oceans, or the changing population size of phytoplankton in the environment, etc. Through conversations with our stakeholders, Dr. Sheri Floge of the Wake Forest University (WFU) Department of Biology and Electrical and Computer Engineer Dr. Kyle Luthy of the WFU Department of Engineering, we established that our system should be able to autonomously descend to a depth of 50 to 100 meters underwater and collect data such as water temperature, and pressure, as well as capture images. U sing a systematic design process, the team was able to conceptualize a design for a low-cost modular buoyancy-controlled capsule. The capsule will be attached to a buoy system, to maintain its longitudinal and latitudinal position, from which it will be able to traverse the epipelagic zone to collect data. The team is currently in the process of prototyping and testing the system, and although the prototype will only have a few sensors, the modularity of the design will enable future users to purchase and attach various sensors (such as a PlanktoScope) that suit their needs. Over the coming weeks, the team will be completing assembly and conducting laboratory and field testing of the prototype.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi - Criteria Decision Analysis Tool for Capital Planning and Prioritization of WMATA Facilities and Assets WMATA设施和资产的资本规划和优先排序的多标准决策分析工具
Pub Date : 2022-04-28 DOI: 10.1109/sieds55548.2022.9799407
Latifa Al Jlayel, Kazi Asifa Ashrafi, Yumna Dahab, Diing Manyang
The Washington Metropolitan Area Transit Authority (WMATA), also known as Metro, spans three states and serves thousands of customers daily with transportation services. Due to the transit agency's influence on the area, as well as its size, WMATA has countless assets, thus making asset management and resource allocation challenging tasks. To develop a prioritization schema for efficient capital allocation within WMATA's facility, the project's intended goal was to perform an integrated approach with combined Multi - Criteria Decision Analysis (MCDA) methods and Mixed Knapsack. MCDA methods such as Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) were implemented in our evaluation framework to develop ranked alternatives, and for its relative simplicity in logical computations. Additionally, the project applied Mixed Knapsack to develop an optimized model to minimize budget and ensure high-priority projects are not excluded. To evaluate the robustness of the criteria's weights and scoring metrics of the assets, a sensitivity analysis was carried out within the MCDA process. The proposed deliverable, consisting of a user-friendly Power BI dashboard and Excel model, will assist WMATA's Facility Asset Management Office (FAMO) in their initiative to support the capital planning decision-making process within the transit agency. The prioritization tool will also allow transparency of various elements that impact an asset's performance and its direct influence on the Quality-of-service delivery within WMATA
华盛顿大都会地区交通管理局(WMATA),也被称为Metro,横跨三个州,每天为数千名客户提供交通服务。由于交通机构在该地区的影响力,以及其规模,WMATA拥有无数的资产,从而使资产管理和资源分配成为一项具有挑战性的任务。为了在WMATA设施内制定有效资本分配的优先级方案,该项目的预期目标是执行一种结合多标准决策分析(MCDA)方法和混合背包的综合方法。在我们的评估框架中实施了MCDA方法,如理想解决方案相似性偏好排序技术(TOPSIS),以开发排序的备选方案,并且在逻辑计算中相对简单。此外,该项目还应用了Mixed backpack来开发一个优化模型,以最小化预算并确保高优先级项目不被排除在外。为了评估标准权重和资产评分指标的稳健性,在MCDA过程中进行了敏感性分析。拟议的交付成果包括用户友好的Power BI仪表板和Excel模型,将协助WMATA的设施资产管理办公室(FAMO)主动支持运输机构内部的资本规划决策过程。优先排序工具还将使影响资产性能的各种因素及其对WMATA内服务质量交付的直接影响变得透明
{"title":"Multi - Criteria Decision Analysis Tool for Capital Planning and Prioritization of WMATA Facilities and Assets","authors":"Latifa Al Jlayel, Kazi Asifa Ashrafi, Yumna Dahab, Diing Manyang","doi":"10.1109/sieds55548.2022.9799407","DOIUrl":"https://doi.org/10.1109/sieds55548.2022.9799407","url":null,"abstract":"The Washington Metropolitan Area Transit Authority (WMATA), also known as Metro, spans three states and serves thousands of customers daily with transportation services. Due to the transit agency's influence on the area, as well as its size, WMATA has countless assets, thus making asset management and resource allocation challenging tasks. To develop a prioritization schema for efficient capital allocation within WMATA's facility, the project's intended goal was to perform an integrated approach with combined Multi - Criteria Decision Analysis (MCDA) methods and Mixed Knapsack. MCDA methods such as Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) were implemented in our evaluation framework to develop ranked alternatives, and for its relative simplicity in logical computations. Additionally, the project applied Mixed Knapsack to develop an optimized model to minimize budget and ensure high-priority projects are not excluded. To evaluate the robustness of the criteria's weights and scoring metrics of the assets, a sensitivity analysis was carried out within the MCDA process. The proposed deliverable, consisting of a user-friendly Power BI dashboard and Excel model, will assist WMATA's Facility Asset Management Office (FAMO) in their initiative to support the capital planning decision-making process within the transit agency. The prioritization tool will also allow transparency of various elements that impact an asset's performance and its direct influence on the Quality-of-service delivery within WMATA","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Chemical Supply Chain Criticality in the Water Treatment Industry: A Risk Analysis and Mitigation Model 评估水处理行业化学品供应链的临界性:风险分析和缓解模型
Pub Date : 2022-04-28 DOI: 10.1109/sieds55548.2022.9799375
Syrine Mefteh, Alexa L. Rosdahl, Kaitlin G. Fagan, Anirudh Kumar
The assurance of the operability of surface water treatment facilities lies in many factors, but the factor with the largest impact on said assurance is the availability of the necessary chemicals. Facilities across the country vary in their processes and sources, but all require chemicals to produce potable water. The purpose of this project was to develop a risk assessment tool to determine the shortfalls and risks in the water treatment industry's chemical supply chain, which was used to produce a risk mitigation plan ensuring plant operability. To achieve this, a Fault Tree was built to address four main areas of concern: (i) market supply and demand, (ii) chemical substitutability, (iii) chemical transportation, and (iv) chemical storage process. Expert elicitation was then conducted to formulate a Failure Modes and Effects Analysis (FMEA) and develop Radar Charts, regarding the operations and management of specific plants. These tools were then employed to develop a final risk mitigation plan comprising two parts: (i) a quantitative analysis comparing and contrasting the risks of the water treatment plants under study and (ii) a qualitative recommendation for each of the plants-both culminating in a mitigation model on how to control and monitor chemical-related risks.
地表水处理设施的可操作性的保证取决于许多因素,但对这种保证影响最大的因素是必要化学品的可获得性。全国各地的设施在生产过程和来源上各不相同,但都需要化学品来生产饮用水。该项目的目的是开发一种风险评估工具,以确定水处理行业化学品供应链中的不足和风险,并用于制定一项风险缓解计划,确保工厂的可操作性。为了实现这一目标,我们建立了一个故障树来解决四个主要问题:(i)市场供需,(ii)化学品可替代性,(iii)化学品运输,(iv)化学品储存过程。然后,就特定工厂的操作和管理,进行专家咨询,制定故障模式和影响分析(FMEA),并编制雷达图。然后利用这些工具制定最终的风险缓解计划,其中包括两部分:(i)定量分析,比较和对比所研究的水处理厂的风险;(ii)对每个工厂提出定性建议——两者最终形成一个关于如何控制和监测化学品相关风险的缓解模型。
{"title":"Evaluating Chemical Supply Chain Criticality in the Water Treatment Industry: A Risk Analysis and Mitigation Model","authors":"Syrine Mefteh, Alexa L. Rosdahl, Kaitlin G. Fagan, Anirudh Kumar","doi":"10.1109/sieds55548.2022.9799375","DOIUrl":"https://doi.org/10.1109/sieds55548.2022.9799375","url":null,"abstract":"The assurance of the operability of surface water treatment facilities lies in many factors, but the factor with the largest impact on said assurance is the availability of the necessary chemicals. Facilities across the country vary in their processes and sources, but all require chemicals to produce potable water. The purpose of this project was to develop a risk assessment tool to determine the shortfalls and risks in the water treatment industry's chemical supply chain, which was used to produce a risk mitigation plan ensuring plant operability. To achieve this, a Fault Tree was built to address four main areas of concern: (i) market supply and demand, (ii) chemical substitutability, (iii) chemical transportation, and (iv) chemical storage process. Expert elicitation was then conducted to formulate a Failure Modes and Effects Analysis (FMEA) and develop Radar Charts, regarding the operations and management of specific plants. These tools were then employed to develop a final risk mitigation plan comprising two parts: (i) a quantitative analysis comparing and contrasting the risks of the water treatment plants under study and (ii) a qualitative recommendation for each of the plants-both culminating in a mitigation model on how to control and monitor chemical-related risks.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122656118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe and Sustainable Fleet Management with Data Analytics and Reinforcement Training 安全和可持续的车队管理与数据分析和强化培训
Pub Date : 2022-04-28 DOI: 10.1109/sieds55548.2022.9799401
Ryan Ahmadiyar, J. Chun, Caroline Fuccella, Damir Hrnjez, Grace Parzych, Benjamin Weisel, Zeyu Mu, Michael E. Duffy, B. Park
The University of Virginia's Facilities Management (FM) Fleet consists of around 260 total vehicles and is committed to safe and sustainable driving. The fleet vehicles contain telematic tracking systems which provide feedback on a multitude of driving behavioral measures, including speeding, harsh braking, hard acceleration, seat belt usage, harsh cornering, and idling time. In a previous study, data collected on these measures was used to develop relevant educational materials on mindful driving. This paper aims to further improve safe and eco-friendly FM driving behaviors by analyzing if reinforcement training, additional scorecards and manager conversations, proved to be effective when given proactively or reactively to increased violations of driving behavioral measures. This paper outlines the process we used in determining when and how to administer the two different training programs and which vehicle shops to involve. One group of shops received in-depth training before any notable violations were detected, which was deemed proactive training. A separate shop received the reactive training after any significant increase in vehicle incidents was detected. These reinforcement training programs were largely based on the professional FM education modules and provided conversation templates for managers to use in order to re-educate their shop's respective drivers. The research showed that reactive reinforcement training was statistically significant for speeding while proactive reinforcement training was not statistically significant; however, further expansion upon both trainings may still be warranted.
弗吉尼亚大学的设施管理(FM)车队由大约260辆车组成,致力于安全和可持续驾驶。车队车辆包含远程信息跟踪系统,该系统可以提供大量驾驶行为措施的反馈,包括超速、急刹车、硬加速、安全带使用情况、急转弯和空转时间。在之前的一项研究中,收集到的这些数据被用来开发有关用心驾驶的教育材料。本文旨在通过分析强化训练、附加记分卡和管理者对话是否被证明在主动或被动地给予违规驾驶行为措施时是有效的,从而进一步改善安全和环保的FM驾驶行为。本文概述了我们在确定何时以及如何管理两种不同的培训计划以及涉及哪些汽车商店时所使用的过程。在发现任何明显违规行为之前,一组商店接受了深入培训,这被视为主动培训。在发现车辆事故明显增加后,另一间车间接受反应性训练。这些强化培训项目主要基于专业的FM教育模块,并提供对话模板供经理使用,以重新教育他们各自的商店司机。研究表明,被动强化训练对超速的影响有统计学意义,而主动强化训练对超速的影响无统计学意义;但是,这两种培训的进一步扩大可能仍然是必要的。
{"title":"Safe and Sustainable Fleet Management with Data Analytics and Reinforcement Training","authors":"Ryan Ahmadiyar, J. Chun, Caroline Fuccella, Damir Hrnjez, Grace Parzych, Benjamin Weisel, Zeyu Mu, Michael E. Duffy, B. Park","doi":"10.1109/sieds55548.2022.9799401","DOIUrl":"https://doi.org/10.1109/sieds55548.2022.9799401","url":null,"abstract":"The University of Virginia's Facilities Management (FM) Fleet consists of around 260 total vehicles and is committed to safe and sustainable driving. The fleet vehicles contain telematic tracking systems which provide feedback on a multitude of driving behavioral measures, including speeding, harsh braking, hard acceleration, seat belt usage, harsh cornering, and idling time. In a previous study, data collected on these measures was used to develop relevant educational materials on mindful driving. This paper aims to further improve safe and eco-friendly FM driving behaviors by analyzing if reinforcement training, additional scorecards and manager conversations, proved to be effective when given proactively or reactively to increased violations of driving behavioral measures. This paper outlines the process we used in determining when and how to administer the two different training programs and which vehicle shops to involve. One group of shops received in-depth training before any notable violations were detected, which was deemed proactive training. A separate shop received the reactive training after any significant increase in vehicle incidents was detected. These reinforcement training programs were largely based on the professional FM education modules and provided conversation templates for managers to use in order to re-educate their shop's respective drivers. The research showed that reactive reinforcement training was statistically significant for speeding while proactive reinforcement training was not statistically significant; however, further expansion upon both trainings may still be warranted.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Machine Learning to Evaluate Real Estate Prices Using Location Big Data 利用位置大数据利用机器学习评估房地产价格
Pub Date : 2022-04-28 DOI: 10.48550/arXiv.2205.01180
W. Coleman, Ben Johann, Nicholas Pasternak, Jaya Vellayan, N. Foutz, Heman Shakeri
With everyone trying to enter the real estate market nowadays, knowing the proper valuations for residential and commercial properties has become crucial. Past researchers have been known to utilize static real estate data (e.g, number of beds, baths, square footage) or even a combination of real estate and demographic information to predict property prices. In this investigation, we attempted to improve upon past research. So we decided to explore a unique approach - we wanted to determine if mobile location data could be used to improve the predictive power of popular regression and tree-based models. To prepare our data for our models, we processed the mobility data by attaching it to individual properties from the real estate data that aggregated users within 500 meters of the property for each day of the week. We removed people that lived within 500 meters of each property, so each property's aggregated mobility data only contained non-resident census features. On top of these dynamic census features, we also included static census features, including the number of people in the area, the average proportion of people commuting, and the number of residents in the area. Finally, we tested multiple models to predict real estate prices. Our proposed model is two stacked random forest modules combined using a ridge regression that uses the random forest outputs as predictors. The first random forest model used static features only and the second random forest model used dynamic features only. Comparing our models with and without the dynamic mobile location features concludes the model with dynamic mobile location features achieves 3 % lower mean squared error than the same model but without dynamic mobile location features.
如今,每个人都试图进入房地产市场,了解住宅和商业物业的适当估值变得至关重要。过去的研究人员已经知道利用静态房地产数据(例如,床的数量,浴室,平方英尺),甚至房地产和人口统计信息的组合来预测房地产价格。在这次调查中,我们试图改进过去的研究。因此,我们决定探索一种独特的方法——我们想确定移动位置数据是否可以用来提高流行的回归和基于树的模型的预测能力。为了为我们的模型准备数据,我们通过将移动数据附加到房地产数据中的各个属性来处理移动数据,这些房地产数据汇总了一周中每天在该属性500米内的用户。我们剔除了居住在每套房产500米范围内的人,因此每套房产的汇总流动性数据只包含非居民人口普查特征。在这些动态人口普查特征的基础上,我们还纳入了静态人口普查特征,包括该地区的人口数量、通勤人口的平均比例和该地区的居民数量。最后,我们测试了多个模型来预测房地产价格。我们提出的模型是两个堆叠的随机森林模块,使用脊回归将随机森林输出作为预测因子。第一个随机森林模型只使用静态特征,第二个随机森林模型只使用动态特征。将我们的模型与不含动态移动位置特征的模型进行比较,发现含动态移动位置特征的模型比不含动态移动位置特征的模型均方误差低3%。
{"title":"Using Machine Learning to Evaluate Real Estate Prices Using Location Big Data","authors":"W. Coleman, Ben Johann, Nicholas Pasternak, Jaya Vellayan, N. Foutz, Heman Shakeri","doi":"10.48550/arXiv.2205.01180","DOIUrl":"https://doi.org/10.48550/arXiv.2205.01180","url":null,"abstract":"With everyone trying to enter the real estate market nowadays, knowing the proper valuations for residential and commercial properties has become crucial. Past researchers have been known to utilize static real estate data (e.g, number of beds, baths, square footage) or even a combination of real estate and demographic information to predict property prices. In this investigation, we attempted to improve upon past research. So we decided to explore a unique approach - we wanted to determine if mobile location data could be used to improve the predictive power of popular regression and tree-based models. To prepare our data for our models, we processed the mobility data by attaching it to individual properties from the real estate data that aggregated users within 500 meters of the property for each day of the week. We removed people that lived within 500 meters of each property, so each property's aggregated mobility data only contained non-resident census features. On top of these dynamic census features, we also included static census features, including the number of people in the area, the average proportion of people commuting, and the number of residents in the area. Finally, we tested multiple models to predict real estate prices. Our proposed model is two stacked random forest modules combined using a ridge regression that uses the random forest outputs as predictors. The first random forest model used static features only and the second random forest model used dynamic features only. Comparing our models with and without the dynamic mobile location features concludes the model with dynamic mobile location features achieves 3 % lower mean squared error than the same model but without dynamic mobile location features.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131521214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence Across Behavioral and Self-report Measures Evaluating Individuals' Trust in an Autonomous Golf Cart 在自动高尔夫球车中评估个人信任的行为和自我报告测量的收敛性
Pub Date : 2022-04-28 DOI: 10.1109/sieds55548.2022.9799431
Jenna E. Cotter, Emily H. O’Hear, R. C. Smitherman, Addison B. Bright, N. Tenhundfeld, Jason Forsyth, N. Sprague, Samy El-Tawab
As automation is becoming more prevalent across everything from military and health care settings to everyday household items, it is necessary to understand the nature of human interactions with these systems. One critically important element of these interactions is user trust, as it can predict automated systems' safe and effective use. Past research has evaluated individuals' trust in automation through a host of different assessment techniques such as self-report, physiological, and behavioral measures. However, to date, there has been little evaluation of the convergence across these measures in a real-world environment. Convergence across measures is a useful tool in understanding the mechanisms by which a cognitive construct is impacted and providing greater confidence that any single measure is evaluating what it purports to measure. The present study used an autonomous golf cart that drove participants to different locations around the campus of James Madison University while a camera recorded them. In addition, participants were given the AICP-R and TOAST to evaluate their complacency potential and trust, respectively. Researchers coded videos for verification/checking behaviors (i.e., participants looked at or interacted with the GUI used to control the cart) and nervous behaviors (i.e., bracing, fidgeting, etc.). Additionally, environmental 'obstacles' such as pedestrians, food-delivery robots, and construction were also coded for by watching a front-facing camera. Results indicate a disconnect between the self-report and behavioral measures evaluating trust. However, there was a relationship between the coded nervous behaviors and verification behaviors and a relationship between those and the presence of obstacles. This lack of convergence across measures indicates a need for future research to understand whether this non-convergence represents shortcomings with the measures themselves, the existing definition of trust as a construct, or perhaps indicates that there is a nuance that can be afforded by some measures over another.
随着自动化在从军事和医疗保健环境到日常家居用品的各个领域变得越来越普遍,有必要了解人类与这些系统交互的本质。这些交互的一个至关重要的因素是用户信任,因为它可以预测自动化系统的安全和有效使用。过去的研究通过一系列不同的评估技术,如自我报告、生理和行为测量来评估个人对自动化的信任。然而,到目前为止,在现实环境中对这些措施的收敛性进行的评估很少。在理解认知结构受到影响的机制方面,跨度量的趋同是一个有用的工具,并提供了更大的信心,即任何单个度量都在评估它声称要测量的内容。目前的研究使用了一辆自动高尔夫球车,它将参与者带到詹姆斯麦迪逊大学校园内的不同地点,同时一台摄像机将他们记录下来。此外,参与者还分别获得了AICP-R和TOAST来评估他们的自满潜力和信任。研究人员将视频编码为验证/检查行为(即,参与者查看或与用于控制购物车的GUI交互)和紧张行为(即,支撑,坐立不安等)。此外,通过观察前置摄像头,行人、送餐机器人和建筑等环境“障碍”也会被编码。结果表明,自我报告和评估信任的行为措施之间存在脱节。然而,编码神经行为与验证行为之间存在一定的关系,而验证行为与障碍存在之间也存在一定的关系。这些措施之间缺乏趋同表明需要进行未来的研究,以了解这种不趋同是否代表了这些措施本身的缺点,现有的信任定义作为一种结构,或者可能表明一些措施可以提供另一个措施的细微差别。
{"title":"Convergence Across Behavioral and Self-report Measures Evaluating Individuals' Trust in an Autonomous Golf Cart","authors":"Jenna E. Cotter, Emily H. O’Hear, R. C. Smitherman, Addison B. Bright, N. Tenhundfeld, Jason Forsyth, N. Sprague, Samy El-Tawab","doi":"10.1109/sieds55548.2022.9799431","DOIUrl":"https://doi.org/10.1109/sieds55548.2022.9799431","url":null,"abstract":"As automation is becoming more prevalent across everything from military and health care settings to everyday household items, it is necessary to understand the nature of human interactions with these systems. One critically important element of these interactions is user trust, as it can predict automated systems' safe and effective use. Past research has evaluated individuals' trust in automation through a host of different assessment techniques such as self-report, physiological, and behavioral measures. However, to date, there has been little evaluation of the convergence across these measures in a real-world environment. Convergence across measures is a useful tool in understanding the mechanisms by which a cognitive construct is impacted and providing greater confidence that any single measure is evaluating what it purports to measure. The present study used an autonomous golf cart that drove participants to different locations around the campus of James Madison University while a camera recorded them. In addition, participants were given the AICP-R and TOAST to evaluate their complacency potential and trust, respectively. Researchers coded videos for verification/checking behaviors (i.e., participants looked at or interacted with the GUI used to control the cart) and nervous behaviors (i.e., bracing, fidgeting, etc.). Additionally, environmental 'obstacles' such as pedestrians, food-delivery robots, and construction were also coded for by watching a front-facing camera. Results indicate a disconnect between the self-report and behavioral measures evaluating trust. However, there was a relationship between the coded nervous behaviors and verification behaviors and a relationship between those and the presence of obstacles. This lack of convergence across measures indicates a need for future research to understand whether this non-convergence represents shortcomings with the measures themselves, the existing definition of trust as a construct, or perhaps indicates that there is a nuance that can be afforded by some measures over another.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Use, Acceptance, and Adoption of Automated Systems with Intrinsic and Extrinsic Motivation Based Incentive Mechanisms 基于内在和外在动机的激励机制的自动化系统的使用、接受和采用
Pub Date : 2022-04-28 DOI: 10.1109/SIEDS55548.2022.9799319
Hannah M. Barr, R. C. Smitherman, Bryan L. Mesmer, Kristin Weger, Douglas L. Van Bossuyt, Robert Semmens, N. Tenhundfeld
Incentive mechanisms are used to encourage a behavior. Incentive mechanisms can be reputation incentives (social standing risks and rewards), gamification incentives (game-based elements in non-gaming environments), and feedback incentives (verbal or text feedback). Previous research suggests that reputation and gamification incentives provide extrinsic motivation (EM), while feedback incentives provide intrinsic motivation (IM). Incentive mechanisms vary in effectiveness, but most studies indicate that IM yielding incentives are most effective. Incentive mechanisms used to promote the use, acceptance, and adoption of automated systems can prove useful to organizations that do not want to waste resources on unused systems. Incentivizing the use, acceptance, and adoption of automated systems can enhance productivity, overall safety, and work-life balance. Though there are many studies on these topics, the relative effectiveness of different IM and EM incentive mechanisms has not been studied. This study fills that gap by examining the effectiveness of incentive mechanisms that affect IM and EM. The current study utilized reputation incentives, gamification incentives, feedback incentives, and a control group to compare the use, acceptance, and adoption of an unmanned aerial vehicle (UAV) in a simulated hostage rescue task. Data were collected on how frequently participants used the system. Following the hostage rescue task, participants were given questionnaires measuring motivation, acceptance, and adoption. This study provides insight into the relative influence of IM and EM-based incentive mechanisms to promote automated technologies. These results will help elucidate the steps that organizations like the Military can take to enhance warfighter buy-in and use of new technologies.
激励机制是用来鼓励某种行为的。激励机制可以是声誉激励(社会地位风险和奖励)、游戏化激励(非游戏环境中的游戏元素)和反馈激励(口头或文本反馈)。以往的研究表明,声誉激励和游戏化激励提供了外在激励(EM),而反馈激励提供了内在激励(IM)。激励机制的有效性各不相同,但大多数研究表明,收益激励是最有效的。用于促进自动化系统的使用、接受和采用的激励机制对于不想在未使用的系统上浪费资源的组织是有用的。鼓励使用、接受和采用自动化系统可以提高生产力、整体安全性和工作与生活的平衡。虽然这方面的研究很多,但不同的外部激励机制和外部激励机制的相对有效性尚未得到研究。本研究通过考察影响IM和EM的激励机制的有效性来填补这一空白。目前的研究利用声誉激励、游戏化激励、反馈激励和对照组来比较无人机(UAV)在模拟人质救援任务中的使用、接受和采用。数据收集了参与者使用该系统的频率。在人质营救任务之后,参与者收到了测量动机、接受度和接受度的问卷。本研究提供了IM和em为基础的激励机制对促进自动化技术的相对影响。这些结果将有助于阐明像军方这样的组织可以采取的步骤,以增强作战人员对新技术的购买和使用。
{"title":"Use, Acceptance, and Adoption of Automated Systems with Intrinsic and Extrinsic Motivation Based Incentive Mechanisms","authors":"Hannah M. Barr, R. C. Smitherman, Bryan L. Mesmer, Kristin Weger, Douglas L. Van Bossuyt, Robert Semmens, N. Tenhundfeld","doi":"10.1109/SIEDS55548.2022.9799319","DOIUrl":"https://doi.org/10.1109/SIEDS55548.2022.9799319","url":null,"abstract":"Incentive mechanisms are used to encourage a behavior. Incentive mechanisms can be reputation incentives (social standing risks and rewards), gamification incentives (game-based elements in non-gaming environments), and feedback incentives (verbal or text feedback). Previous research suggests that reputation and gamification incentives provide extrinsic motivation (EM), while feedback incentives provide intrinsic motivation (IM). Incentive mechanisms vary in effectiveness, but most studies indicate that IM yielding incentives are most effective. Incentive mechanisms used to promote the use, acceptance, and adoption of automated systems can prove useful to organizations that do not want to waste resources on unused systems. Incentivizing the use, acceptance, and adoption of automated systems can enhance productivity, overall safety, and work-life balance. Though there are many studies on these topics, the relative effectiveness of different IM and EM incentive mechanisms has not been studied. This study fills that gap by examining the effectiveness of incentive mechanisms that affect IM and EM. The current study utilized reputation incentives, gamification incentives, feedback incentives, and a control group to compare the use, acceptance, and adoption of an unmanned aerial vehicle (UAV) in a simulated hostage rescue task. Data were collected on how frequently participants used the system. Following the hostage rescue task, participants were given questionnaires measuring motivation, acceptance, and adoption. This study provides insight into the relative influence of IM and EM-based incentive mechanisms to promote automated technologies. These results will help elucidate the steps that organizations like the Military can take to enhance warfighter buy-in and use of new technologies.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123142215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Threat Modeling for Enterprise Cybersecurity Architecture 面向企业网络安全架构的威胁建模
Pub Date : 2022-04-28 DOI: 10.1109/sieds55548.2022.9799322
Branko Bokan, Joost Santos
The traditional threat modeling methodologies work well on a small scale, when evaluating targets such as a data field, a software application, or a system component–but they do not allow for comprehensive evaluation of an entire enterprise architecture. They also do not enumerate and consider a comprehensive set of actual threat actions observed in the wild. Because of the lack of adequate threat modeling methodologies for determining cybersecurity protection needs on an enterprise scale, cybersecurity executives and decision makers have traditionally relied upon marketing pressure as the main input into decision making for investments in cybersecurity capabilities (tools). A new methodology, originally developed by the Department of Defense then further expanded by the Department of Homeland Security, for the first time allows for a threat-based, end-to-end evaluation of cybersecurity architectures and determination of gaps or areas in need of future investments. Although in the public domain, this methodology has not been used outside of the federal government. This paper examines the new threat modeling approach that allows organizations to look at their cybersecurity protections from the standpoint of an adversary. The methodology enumerates threat actions that have been observed in the wild using a cyber threat framework and scores cybersecurity architectural capabilities for their ability to protect, detect, and recover from each threat action. The results of the analysis form a matrix called capability coverage map that visually represents the coverage, gaps, and overlaps against threat actions. The threat actions can be further prioritized using a threat heat map – a visual representation of the prevalence and maneuverability of threat actions that can be overlaid on top of a coverage map. The paper discusses the new threat modeling methodology and proposes future research with a goal to establish a decision-making framework for selecting cybersecurity architectural capability portfolios that maximize protections against known cybersecurity threats.
当评估数据字段、软件应用程序或系统组件等目标时,传统的威胁建模方法在小范围内工作得很好,但是它们不允许对整个企业架构进行全面评估。他们也没有列举和考虑在野外观察到的一套全面的实际威胁行为。由于缺乏足够的威胁建模方法来确定企业规模的网络安全保护需求,网络安全高管和决策者传统上依赖于营销压力作为网络安全能力(工具)投资决策的主要输入。一种新方法最初由国防部开发,随后由国土安全部进一步扩展,首次允许对网络安全架构进行基于威胁的端到端评估,并确定需要未来投资的差距或领域。尽管在公共领域,这种方法还没有在联邦政府之外使用。本文研究了新的威胁建模方法,该方法允许组织从对手的角度来看待他们的网络安全保护。该方法列举了使用网络威胁框架在野外观察到的威胁行为,并对网络安全架构功能的保护、检测和从每个威胁行为中恢复的能力进行评分。分析的结果形成一个称为能力覆盖图的矩阵,可视化地表示针对威胁行动的覆盖、缺口和重叠。可以使用威胁热图进一步确定威胁行动的优先级——威胁行动的流行程度和可操作性的可视化表示,可以覆盖在覆盖图上。本文讨论了新的威胁建模方法,并提出了未来的研究目标,以建立一个决策框架,以选择网络安全架构能力组合,最大限度地保护已知的网络安全威胁。
{"title":"Threat Modeling for Enterprise Cybersecurity Architecture","authors":"Branko Bokan, Joost Santos","doi":"10.1109/sieds55548.2022.9799322","DOIUrl":"https://doi.org/10.1109/sieds55548.2022.9799322","url":null,"abstract":"The traditional threat modeling methodologies work well on a small scale, when evaluating targets such as a data field, a software application, or a system component–but they do not allow for comprehensive evaluation of an entire enterprise architecture. They also do not enumerate and consider a comprehensive set of actual threat actions observed in the wild. Because of the lack of adequate threat modeling methodologies for determining cybersecurity protection needs on an enterprise scale, cybersecurity executives and decision makers have traditionally relied upon marketing pressure as the main input into decision making for investments in cybersecurity capabilities (tools). A new methodology, originally developed by the Department of Defense then further expanded by the Department of Homeland Security, for the first time allows for a threat-based, end-to-end evaluation of cybersecurity architectures and determination of gaps or areas in need of future investments. Although in the public domain, this methodology has not been used outside of the federal government. This paper examines the new threat modeling approach that allows organizations to look at their cybersecurity protections from the standpoint of an adversary. The methodology enumerates threat actions that have been observed in the wild using a cyber threat framework and scores cybersecurity architectural capabilities for their ability to protect, detect, and recover from each threat action. The results of the analysis form a matrix called capability coverage map that visually represents the coverage, gaps, and overlaps against threat actions. The threat actions can be further prioritized using a threat heat map – a visual representation of the prevalence and maneuverability of threat actions that can be overlaid on top of a coverage map. The paper discusses the new threat modeling methodology and proposes future research with a goal to establish a decision-making framework for selecting cybersecurity architectural capability portfolios that maximize protections against known cybersecurity threats.","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130114941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handwritten Text and Digit Classification on Rwandan Perioperative Flowsheets via YOLOv5 通过YOLOv5对卢旺达围手术期流程进行手写文本和数字分类
Pub Date : 2022-04-28 DOI: 10.1109/sieds55548.2022.9799426
Navya Annapareddy, Kara Fallin, Ryan Folks, W. Jarrard, Marcel Durieux, Nazanin Moradinasab, B. Naik, S. Sengupta, Christian Ndaribitse, Donald Brown
The African Surgical Outcomes Study, a seven-day, prospective, observational cohort study across 25 countries in Africa reported a rate of serious postoperative complications of 18% and mortality of 2% [1]. 95% of these deaths occurred in the postoperative period and were considered preventable. There are many factors that contribute to postoperative outcomes, but a key approach to decreasing complications is the ability to predict patient outcome trajectories from perioperative parameters [2]. In order to efficiently predict these outcomes, electronic medical record systems are needed. As compared to handwritten paper records, these systems offer profound advantages, including automated transfer of medical information, dynamic search queries, and improved resilience for data backups. In this paper, we implement the digitization of the drug and physiological indicator portions of 363 handwritten perioperative flowsheets sourced from the University Teaching Hospital of Kigali in Rwanda. In both sections, the detection of handwritten words and digits is accomplished using a YOLOv5 model trained on a single class. The bounding boxes are then cropped and classified by a convolutional neural network (CNN). Our experimental results suggest that our proposed method can successfully detect handwritten digits and words as evaluated on object mean average precision (mAP).
非洲手术结果研究是一项为期7天的前瞻性观察队列研究,涉及非洲25个国家,报告严重术后并发症发生率为18%,死亡率为2%[1]。95%的死亡发生在术后,被认为是可以预防的。影响术后预后的因素有很多,但减少并发症的一个关键方法是根据围手术期参数预测患者预后轨迹的能力[2]。为了有效地预测这些结果,需要电子病历系统。与手写的纸质记录相比,这些系统具有深刻的优势,包括医疗信息的自动传输、动态搜索查询和数据备份的改进弹性。在本文中,我们实现了来自卢旺达基加利大学教学医院的363张手写围手术期流程的药物和生理指标部分的数字化。在这两个部分中,手写单词和数字的检测都是使用在单个类上训练的YOLOv5模型完成的。然后用卷积神经网络(CNN)对边界框进行裁剪和分类。实验结果表明,我们的方法可以成功地检测手写数字和单词,并对目标平均精度(mAP)进行了评估。
{"title":"Handwritten Text and Digit Classification on Rwandan Perioperative Flowsheets via YOLOv5","authors":"Navya Annapareddy, Kara Fallin, Ryan Folks, W. Jarrard, Marcel Durieux, Nazanin Moradinasab, B. Naik, S. Sengupta, Christian Ndaribitse, Donald Brown","doi":"10.1109/sieds55548.2022.9799426","DOIUrl":"https://doi.org/10.1109/sieds55548.2022.9799426","url":null,"abstract":"The African Surgical Outcomes Study, a seven-day, prospective, observational cohort study across 25 countries in Africa reported a rate of serious postoperative complications of 18% and mortality of 2% [1]. 95% of these deaths occurred in the postoperative period and were considered preventable. There are many factors that contribute to postoperative outcomes, but a key approach to decreasing complications is the ability to predict patient outcome trajectories from perioperative parameters [2]. In order to efficiently predict these outcomes, electronic medical record systems are needed. As compared to handwritten paper records, these systems offer profound advantages, including automated transfer of medical information, dynamic search queries, and improved resilience for data backups. In this paper, we implement the digitization of the drug and physiological indicator portions of 363 handwritten perioperative flowsheets sourced from the University Teaching Hospital of Kigali in Rwanda. In both sections, the detection of handwritten words and digits is accomplished using a YOLOv5 model trained on a single class. The bounding boxes are then cropped and classified by a convolutional neural network (CNN). Our experimental results suggest that our proposed method can successfully detect handwritten digits and words as evaluated on object mean average precision (mAP).","PeriodicalId":286724,"journal":{"name":"2022 Systems and Information Engineering Design Symposium (SIEDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 Systems and Information Engineering Design Symposium (SIEDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1