Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 926

Full-Text Articles in Engineering

Emulating Future Neurotechnology Using Magic, Jay A. Olson, Mariève Cyr, Despina Z. Artenie, Thomas Strandberg, Lars Hall, Matthew L. Tompkins, Amir Raz, Petter Johansson Dec 2022

Emulating Future Neurotechnology Using Magic, Jay A. Olson, Mariève Cyr, Despina Z. Artenie, Thomas Strandberg, Lars Hall, Matthew L. Tompkins, Amir Raz, Petter Johansson

Psychology Faculty Articles and Research

Recent developments in neuroscience and artificial intelligence have allowed machines to decode mental processes with growing accuracy. Neuroethicists have speculated that perfecting these technologies may result in reactions ranging from an invasion of privacy to an increase in self-understanding. Yet, evaluating these predictions is difficult given that people are poor at forecasting their reactions. To address this, we developed a paradigm using elements of performance magic to emulate future neurotechnologies. We led 59 participants to believe that a (sham) neurotechnological machine could infer their preferences, detect their errors, and reveal their deep-seated attitudes. The machine gave participants randomly assigned positive …


Overview Of Research And Application On Autonomous Vehicle Oriented Perception System Simulation, Ruoxuan Wang, Jianping Wu, Hui Xu Dec 2022

Overview Of Research And Application On Autonomous Vehicle Oriented Perception System Simulation, Ruoxuan Wang, Jianping Wu, Hui Xu

Journal of System Simulation

Abstract: Following the rapid progress of science and technology, vehicles with autonomous driving or auxiliary driving function enter into vehicle market. However, in the past decade, traffic accidents still occurred frequently, and the safety of these functions become the focus. Simulation technology provides a good platform to test the perception system of autonomous vehicle. Focus on the sensor simulation modeling of autonomous vehicle perception system, from the perspective of single sensor simulation, multi-sensor simulation and classic simulation platform including millimeter wave radar, lidar and camera, the existing research are reviewed, and the shortcomings and development trends of simulation modeling of …


Simulation-Driven Based Utility Evaluation And Recommendation Of Expressway Proactive Speed Limit, Geqi Qi, Sijin Liu, Yikang He, Meng Wang, Ailing Huang Dec 2022

Simulation-Driven Based Utility Evaluation And Recommendation Of Expressway Proactive Speed Limit, Geqi Qi, Sijin Liu, Yikang He, Meng Wang, Ailing Huang

Journal of System Simulation

Abstract: Outside the specific punishment area, the traditional roadside passive speed limit mode lacks traffic management, and thus which indirectly leads to the inconsistency or even sudden change of vehicle behaviors in time and space, thereby affects the traffic efficiency and safety. Focusing on the proactive speed limit mode at vehicle side, a utility evaluation and recommendation method is proposed, which carries out the multi-scenario traffic simulation for varied proactive and passive speed limit considering road line types, traffic flow and vehicle type proportion. From the two perspectives of safety and efficiency, the utility evaluation indicators and weights are extracted …


Short-Term Prediction Method Of Wind Power Based On Blp-Alo-Svm, Yefeng Jiao, Yan Wang, Zhicheng Ji Dec 2022

Short-Term Prediction Method Of Wind Power Based On Blp-Alo-Svm, Yefeng Jiao, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: To effectively predict the short-term wind power and its fluctuation range, a prediction method based on hybrid algorithm-optimized support vector machine is proposed. Exploratory data analysis is used to preprocess the original wind speed data to improve the data quality. Chaotic map, Levy flight strategy and particle swarm optimization are used to improve the ant lion algorithm. The support vector machine model optimized by hybrid algorithm is used to predict the wind power. The experimental results show that, compared with the new wind power prediction model, the prediction error of the output results of the method is lower, and …


Low Voltage Ride-Through Modeling For Wind Turbines Based On Neural Odes, Qiping Lai, Tannan Xiao, Dongsheng Li, Chen Shen Dec 2022

Low Voltage Ride-Through Modeling For Wind Turbines Based On Neural Odes, Qiping Lai, Tannan Xiao, Dongsheng Li, Chen Shen

Journal of System Simulation

Abstract: Considering the difficulty of equivalent modeling of low voltage ride-through(LVRT) characteristics of a wind farm, a neural ordinary differential equation(ODE)-based wind farm LVRT modeling methodis proposed. The input of the model is the voltage and wind speed of each wind turbine at the grid connection point of wind farm, and the output is the current at the grid connection point. The model can better characterize the strong nonlinear switching process and describe LVRT characteristics of wind farms under different wind speed scenarios. A simulation example of a wind farm including three doubly-fed induction generators(DFIGs) is established on …


Anomaly Detection Method Of Electrical Power Consumption Based On Deep Autoencoder, Ningke Sun, Yan Wang, Zhicheng Ji Dec 2022

Anomaly Detection Method Of Electrical Power Consumption Based On Deep Autoencoder, Ningke Sun, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: Aiming at the nonlinear and non-stationary characteristics of electrical power consumption data, an abnormal electrical power consumption detection model based on deep autoencoder is proposed. Gated recurrent unit (GRU) network of the deep learning is combined with autoencoder structure, and the encoder and decoder parts of traditional autoencoder are realized by gated recurrent unit network, which gives full play to the data feature extraction capability of gated recurrent unit and the data reconstruction function of autoencoder structure. Based on the reconstruction error between original data and reconstructed data, abnormal data points of the electrical power consumption are detected. By …


Sis-Based Modeling And Simulation Analysis On Exercise Benefit Perception Transmission, Lei Wang, Jinhai Sun, Tuojian Li Dec 2022

Sis-Based Modeling And Simulation Analysis On Exercise Benefit Perception Transmission, Lei Wang, Jinhai Sun, Tuojian Li

Journal of System Simulation

Abstract: In order to distinguish the relationship between individual health behavior change and collective health behavior emergence, deal with the challenges of mathematical description of typical health information dissemination processes in social networks and social experiments, SIS(susceptible-infected-susceptible)model is introduced to simulate the dissemination process of classical health information exercise effect perception to meet the requirements of social system complexity, individual diversity and intelligence. To carry out numerical experiments on the propagation process of exercise effect perception to identify the phase change process of the collective health behavior emergence, agent-based modeling and simulation are utilized through NetLogo. Experimental results show …


Simulation On Flood Disaster In Urban Building Complex System Based On Lbm, Shen Zhang, Zewang Yang, Yifan Wang, Liang Sun, Ming Cheng, Fankai Meng, Ting Li Dec 2022

Simulation On Flood Disaster In Urban Building Complex System Based On Lbm, Shen Zhang, Zewang Yang, Yifan Wang, Liang Sun, Ming Cheng, Fankai Meng, Ting Li

Journal of System Simulation

Abstract: Because of the extreme climate change, the potential flood disaster risk in the southeast coastal areas of China can not be ignored. Based on lattice Boltzmann computational fluid dynamics method, a three-dimensional simulation study of waterlogging process in tsunami impact scenario is carried out for a coastal city building complex system, and the reliability and accuracy of the numerical simulation method for the flood impact test of an ideal building complex are verified. The results show that the buildings along rivers and coastlines have obvious cloaking effect, while the buildings inside the city are less affected by floods. The …


Long-Term Resilience Simulation On Low-Carbon Urban Grid Based On Evolutionary Game, Zhengda Cui, Weiqiang Yao, Qin Xu, Chen Fang, Ying Chen Dec 2022

Long-Term Resilience Simulation On Low-Carbon Urban Grid Based On Evolutionary Game, Zhengda Cui, Weiqiang Yao, Qin Xu, Chen Fang, Ying Chen

Journal of System Simulation

Abstract: Because of the more frequent extreme disasters, the resilience of urban grid becomes more important. In the background of carbon neutralization policy, the decarbonization transition of urban grid also affects the development of grid resilience. An evolutionary game is used to simulate the resilience evolution of low-carbon urban grid and the evolution model is constructed. The decision to install photovoltaic and energy storage system for residents and to upgrade the grid for resilience is considered in the model and the stability conditions of equilibriums of the evolutionary game are analyzed. The resilience evolution simulation model considering disaster stochasticity is …


Research On Complex Combat Network Dynamic Evolution Based On Information Entropy, Lianyi Zhang, Xisheng Shen, Duzheng Qing, Han Zhang, Min Zhou, Xifu Wang Dec 2022

Research On Complex Combat Network Dynamic Evolution Based On Information Entropy, Lianyi Zhang, Xisheng Shen, Duzheng Qing, Han Zhang, Min Zhou, Xifu Wang

Journal of System Simulation

Abstract: Network-centric warfare, distributed and decentralized command and control gradually replace separately the traditional platform-centric warfare and centralized command and control, and information has become a combat capability. Based on the new information weapon equipment system operation loop, a complex combat network model based on information entropy is constructed, and the combat capability measurement method is proposed. On the basis of the combat capability upgrade being the network driving force, the dynamic evolution rule of the complex combat network is designed and the preferential evolution and stochastic evolution models are constructed. According to a typical system combat example, the influence …


Research On Modeling And Simulation Technology Of Microwave Radar High Precision Tracking Loop, Jiaji Lou, Jing Ma, Xiaowei Li, Yue Zhao, Youbin Song Dec 2022

Research On Modeling And Simulation Technology Of Microwave Radar High Precision Tracking Loop, Jiaji Lou, Jing Ma, Xiaowei Li, Yue Zhao, Youbin Song

Journal of System Simulation

Abstract: Aiming at the key problem of high-precision tracking loop design of a measurement radar for the weak signal (low carrier to noise ratio signal) in dynamic environment, the design and optimization methods of carrier tracking loop and code tracking loop are focused on. A signal structure with a single carrier as a pilot is proposed, and the loop structure of the frequency-locked loop and the phase-locked loop working together is studied. The modeling and simulation on the two structures show that for the week signal tracking in a dynamic environment, the loop combination structure of the frequency-serial auxiliary …


Research On Parameter Construction Method Of Blue Army Equipment Model Based On A Deep Network, Boyuan Zhang, Guanghong Gong, Ze Wang, Ni Li Dec 2022

Research On Parameter Construction Method Of Blue Army Equipment Model Based On A Deep Network, Boyuan Zhang, Guanghong Gong, Ze Wang, Ni Li

Journal of System Simulation

Abstract: The modeling of blue army equipment is an indispensable part of adversarial simulation environment construction. Aiming at the limited available parameters of "information-poor" and "small sample" characteristics to the blue system, a deep network-based method is proposed to generate the parameters of blue army equipment model. By injecting the information into the simulation model of the blue army equipment, the simulation data is generated and trained in the deep neural network. The obtained network has a certain generalization ability to the unknown parameters prediction of the same type of equipment and can be used directly in prediction or be …


Fast Generation Method Of Multi-Sensing Channel Fusion Virtual Experiment, Jingwei Deng, Hanwu He, Yueming Wu, Jianhao Su Dec 2022

Fast Generation Method Of Multi-Sensing Channel Fusion Virtual Experiment, Jingwei Deng, Hanwu He, Yueming Wu, Jianhao Su

Journal of System Simulation

Abstract: Aiming at the low development efficiency and single experience in traditional virtual experiments, a rapid generation method of multi-sensing channel fusion virtual experiment visualization is proposed. The experimental steps and sequence of experimental steps of the virtual experiment are defined. A parameterized description method of experimental elements based on Petri net is proposed to describe the sequence of experimental steps, which breaks through the constraints the established procedure steps of traditional virtual experiments and supports the exploratory virtual experiments. The visual expression method of the routing graph and the conversion method between the routing graph and the Petri …


Multi-Robot Path Planning Based On Cbs Algorithm, Qiao Qiao, Yan Wang, Zhicheng Ji Dec 2022

Multi-Robot Path Planning Based On Cbs Algorithm, Qiao Qiao, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: Aiming at the long multi-robot planning path and long one-way search running time of conflict-based search(CBS) in the multi-agent path finding(MAPF), an improved CBS algorithm is proposed, which in a two-way A* focus search is used to optimize the search direction and search method. The suboptimal factorωis introduced into the underlying search function of the CBS algorithm to improve the efficiency of path search. The one-way search in the conflict search algorithm is optimized to a two-way A* search. The experimental results show that the path cost of the improved CBS algorithm is shortened …


Reliability Parameter Optimization Complex System Simulation Based On R-Vikor Method, Zhiguang Wang, Baiting Liu, Xiaolei Wang, Tao Liu, Zhaowei Yang Dec 2022

Reliability Parameter Optimization Complex System Simulation Based On R-Vikor Method, Zhiguang Wang, Baiting Liu, Xiaolei Wang, Tao Liu, Zhaowei Yang

Journal of System Simulation

Abstract: The operation of complex simulation system is not isolated, and always affected by multiple external factors and its own performance. In simulation reliability calculation, parameters need to be chosen, and different performance indexes need to be taken into account when comparing with the reference model. The research is transformed into the multi-attribute decision. An system simulation trusted parameter optimization method based on R-VIKOR(resist rank reversal of visekriterijumska optimizacija | kompromisno resenje) is proposed. Multiple sets of aerodynamic parameters of the new model are obtained through model migration theory, and similarity calculation is carried out with the optimal parameters of …


Research On Low Computational Predictive Control Strategy Of Three-Level Four-Arm Apf, Guifeng Wang, Jinxing Guo Dec 2022

Research On Low Computational Predictive Control Strategy Of Three-Level Four-Arm Apf, Guifeng Wang, Jinxing Guo

Journal of System Simulation

Abstract: Four-arm active power filter(APF) is an ideal device to the power quality of three-phase four-wire distribution network. Owing to the sufficient number of base vectors, three-level four-arm APF has better current tracking performance, but the prediction calculation amount is too large when model predictive current control is applied. A model prediction voltage control strategy based on the idea of space stratification is proposed. Based on the deadbeat control idea and the discrete mathematical model in αβγ coordinate system, the expected reference voltage is predicted from the reference current, and the multiple current predictions are converted into the single voltage …


Research On Emotional Contagion And Intervention Strategy Of Indoor Evacuation Based On Risk Perception, Yang Zeng, Jinling Li, Haixiang Guo, Weiming Chen Dec 2022

Research On Emotional Contagion And Intervention Strategy Of Indoor Evacuation Based On Risk Perception, Yang Zeng, Jinling Li, Haixiang Guo, Weiming Chen

Journal of System Simulation

Abstract: Aiming at the panic emotion contagion in the indoor emergency evacuation with multi-exit and multi-obstacle, an emotional contagion model is constructed on personality traits, risk perception differences of age and gender, and consciousness regulation. The simulation is carried out by using AnyLogic, which combines individual emotions with evacuation speed to realize the real-time updating of emotional state and speed. That personnel intervention in the process of evacuation can effectively alleviate the spread of panic emotion, is verified and can provide the theoretical basis for panic contagion in the process of emergency evacuation. The results show that the degree of …


Simulation Research On Appearance Detection Of Ampoules Based On Lightweight Network And Model Compression, Zhihao Zhu, Yan Wang, Zhicheng Ji Dec 2022

Simulation Research On Appearance Detection Of Ampoules Based On Lightweight Network And Model Compression, Zhihao Zhu, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: Aiming at the large scale and redundant parameters of target detection network model, which result in the difficult to deploy the ampoule bottle appearance defect detection model to edge devices, an LC-Faster R-CNN defect detection algorithm based on lightweight network and model compression is proposed. MobileNet-V2 is used as the backbone, and the redundant channels in the convolutional network are trimmed by model pruning strategy. The floating-point parameters are quantized into integers through saturation truncation mapping. Knowledge distillation is used to restore the accuracy of the compressed network. Tested on the self-built ampoule appearance defect dataset, the model volume …


Research On Iterative Calculation And Optimization Methods Of Aero-Engine On-Board Model, Xinghua Luo, Jia Geng, Ming Li, Bei Liu, Lei Wang, Zhiping Song Dec 2022

Research On Iterative Calculation And Optimization Methods Of Aero-Engine On-Board Model, Xinghua Luo, Jia Geng, Ming Li, Bei Liu, Lei Wang, Zhiping Song

Journal of System Simulation

Abstract: Aeroengine is a complex and time-varying multivariable thermophysical system. The research on the convergence accuracy and rate of the component-level model is of great significance to the model-based engine health management, performance and fault-tolerant control. The existing engine component-level models are generally based on the traditional quasi-Newton method to solve the equilibrium equations simultaneously. Compared with the traditional Newton-Raphson method (N-R method), the convergence speed is optimized, but it is difficult to meet accuracy and real-time requirements of the dynamic model airborne applications within the full envelope. An adaptive variable step factor quasi-Newton method is proposed, which can reduce …


Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn Dec 2022

Hybrid Life Cycles In Software Development, Eric Vincent Schoenborn

Culminating Experience Projects

This project applied software specification gathering, architecture, work planning, and development to a real-world development effort for a local business. This project began with a feasibility meeting with the owner of Zeal Aerial Fitness. After feasibility was assessed the intended users, needed functionality, and expected user restrictions were identified with the stakeholders. A hybrid software lifecycle was selected to allow a focus on base functionality up front followed by an iterative development of expectations of the stakeholders. I was able to create various specification diagrams that express the end projects goals to both developers and non-tech individuals using a standard …


Cloud Container Security’ Next Move, Vishakha Sadhwani Dec 2022

Cloud Container Security’ Next Move, Vishakha Sadhwani

Dissertations and Theses

In the last few years, it is apparent to cybersecurity experts everywhere that the proverbial container tech genie is out of the bottle, and has been widely embraced across multiple organizations. To achieve the flexibility of building and deploying applications anywhere and everywhere, cloud native environments have gained great momentum and made the development lifecycle simpler than ever. However, container environments brings with them a range of cybersecurity issues that includes images, containers, hosts, runtimes, registries, and orchestration platforms, which needs the necessity to focus on investing in securing your container stack.

According to this report[1], released by cloud-native …


A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood Dec 2022

A Call For Research: Ethical Dilemmas Of Autonomous Vehicle Manufacturers, Remy Harwood

Cybersecurity Undergraduate Research Showcase

While autonomous vehicles accounted for about 31.4 million vehicles on the road in 2019 (Placek). They have continued to flood the market and have a projected growth to 58 million in just 8 years from now (Placek) As well as a market cap in the billions of dollars. Even the comparatively new AV company Tesla has over 3 times the market cap value of the leading non AV brand Toyota (Market Cap) who are also working toward AVs as well, like their level 2 teammate driver assistance. Following Moore’s Law, as technology continues to improve, their social impact and ethical …


Ethical Concerns In Self-Driving Cars, Victoria Shand Dec 2022

Ethical Concerns In Self-Driving Cars, Victoria Shand

Cybersecurity Undergraduate Research Showcase

Automobiles have been in existence since 1672 and only went up from there. Self-driving cars are a fantastic piece of technology; they can self-park, laser ranger finder, and near vision; they can map the road in advance, understand road signs, and, in some cases, handle certain variables on the road.

When talking about any form of technology, the possibilities are endless technology is a continuously evolving idea. When discussing self-driving cars, they have some fantastic and encouraging benefits and ideas. Some ideas would be that vehicles could communicate with each other, we could eliminate the need for traffic lights, and …


A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan Dec 2022

A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan

Cybersecurity Undergraduate Research Showcase

Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …


Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer Dec 2022

Actively Guided Cansats For Assisting Localization And Mapping In Unstructured And Unknown Environments, Cary Chun, M. Hassan Tanveer

Symposium of Student Scholars

When navigating in unknown and unstructured environments, Unmanned Arial Vehicles (UAVs) can struggle when attempting to preform Simultaneous Localization and Mapping (SLAM) operations. Particularly challenging circumstance arise when an UAV may need to land or otherwise navigate through treacherous environments. As the primary UAV may be too large and unwieldly to safely investigate in these types of situations, this research effort proposes the use of actively guided CanSats for assisting in localization and mapping of unstructured environments. A complex UAV could carry multiple of these SLAM capable CanSats, and when additional mapping and localization capabilities where required, the CanSat would …


An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan Dec 2022

An Empirical Study On The Classification Of Python Language Features Using Eye-Tracking, Jigyasa Chauhan

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Python, currently one of the most popular programming languages, is an object-
oriented language that also provides language feature support for other programming
paradigms, such as functional and procedural. It is not currently understood how
support for multiple paradigms affects the ability of developers to comprehend that
code. Understanding the predominant paradigm in code, and how developers classify
the predominant paradigm, can benefit future research in program comprehension as
the paradigm may factor into how people comprehend that code. Other researchers
may want to look at how the paradigms in the code interact with various code smells.
To investigate how …


Use Of Machine Learning And Natural Language Processing To Enhance Traffic Safety Analysis, Md Abu Sayed Dec 2022

Use Of Machine Learning And Natural Language Processing To Enhance Traffic Safety Analysis, Md Abu Sayed

Theses and Dissertations

Despite significant advances in vehicle technologies, safety data collection and analysis, and engineering advancements, tens of thousands of Americans die every year in motor vehicle crashes. Alarmingly, the trend of fatal and serious injury crashes appears to be heading in the wrong direction. In 2021, the actual rate of fatalities exceeded the predicted rate. This worrisome trend prompts and necessitates the development of advanced and holistic approaches to determining the causes of a crash (particularly fatal and major injuries). These approaches range from analyzing problems from multiple perspectives, utilizing available data sources, and employing the most suitable tools and technologies …


Identification Of Factors Contributing To Traffic Crashes By Analysis Of Text Narratives, Cristian D. Arteaga-Sanchez Dec 2022

Identification Of Factors Contributing To Traffic Crashes By Analysis Of Text Narratives, Cristian D. Arteaga-Sanchez

UNLV Theses, Dissertations, Professional Papers, and Capstones

The fatalities, injuries, and property damage that result from traffic crashes impose a significant burden on society. Current research and practice in traffic safety rely on analysis of quantitative data from crash reports to understand crash severity contributors and develop countermeasures. Despite advances from this effort, quantitative crash data suffers from drawbacks, such as the limited ability to capture all the information relevant to the crashes and the potential errors introduced during data collection. Crash narratives can help address these limitations, as they contain detailed descriptions of the context and sequence of events of the crash. However, the unstructured nature …


An Ultrasensitive Bacterial Detection Platform For Culture-Free Diagnosis Of Infections, Xuyang Shi Dec 2022

An Ultrasensitive Bacterial Detection Platform For Culture-Free Diagnosis Of Infections, Xuyang Shi

ETD Archive

The current methods of the diagnosis of bloodstream infections are based on bacterial culture growth, a process that requires considerable time, e.g., 12-16 hours, to obtain a result. This long wait time for the result creates many problems, including the generation of multi-drug resistant organisms (MDROs). At the same time, infected bloodstream usually contains a very low concentration of bacteria, i.e., lower than 5 CFU/mL. The long diagnosis time and the extremely low concentration of bacteria in the infected bloodstream make such infections difficult to diagnose. Here, we demonstrate a culture-free approach for the diagnosis of bloodstream infections using a …


Denoising And Deconvolving Sperm Whale Data In The Northern Gulf Of Mexico Using Fourier And Wavelet Techniques, Kendal Mccain Leftwich Dec 2022

Denoising And Deconvolving Sperm Whale Data In The Northern Gulf Of Mexico Using Fourier And Wavelet Techniques, Kendal Mccain Leftwich

University of New Orleans Theses and Dissertations

The use of underwater acoustics can be an important component in obtaining information from the oceans of the world. It is desirable (but difficult) to compile an acoustic catalog of sounds emitted by various underwater objects to complement optical catalogs. For example, the current visual catalog for whale tail flukes of large marine mammals (whales) can identify even individual whales from their individual fluke characteristics. However, since sperm whales, Physeter microcephalus, do not fluke up when they dive, they cannot be identified in this manner. A corresponding acoustic catalog for sperm whale clicks could be compiled to identify individual …