Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara University (31)
- California Polytechnic State University, San Luis Obispo (30)
- Wright State University (26)
- Air Force Institute of Technology (20)
- Chulalongkorn University (16)
-
- University of Arkansas, Fayetteville (15)
- University of Central Florida (13)
- Florida Institute of Technology (10)
- University of Massachusetts Amherst (10)
- West Virginia University (10)
- Western University (10)
- University of Kentucky (9)
- Louisiana State University (8)
- University of New Mexico (8)
- Boise State University (7)
- California State University, San Bernardino (7)
- Old Dominion University (7)
- City University of New York (CUNY) (6)
- Kennesaw State University (6)
- Missouri University of Science and Technology (6)
- University of Denver (6)
- University of South Florida (6)
- University at Albany, State University of New York (5)
- University of Louisville (5)
- Washington University in St. Louis (5)
- Georgia Southern University (4)
- New Jersey Institute of Technology (4)
- Northern Illinois University (4)
- University of Nevada, Las Vegas (4)
- University of North Florida (4)
- Keyword
-
- Computer Science (26)
- Department of Computer Science and Engineering (26)
- Machine learning (19)
- Robotics (11)
- Blockchain (10)
-
- Computer Engineering (10)
- Machine Learning (10)
- Center_CCR (8)
- Artificial Intelligence (7)
- Deep learning (7)
- Cybersecurity (6)
- Daniel Felix Ritchie School of Engineering and Computer Science (6)
- Deep Learning (6)
- Security (6)
- FPGA (5)
- Academic -- UNF -- Master of Science in Computer and Information Sciences; Dissertations (4)
- Artificial intelligence (4)
- Automation (4)
- Classification (4)
- Communication (4)
- Computer Vision (4)
- Computer vision (4)
- Data mining (4)
- IOS (4)
- Neural networks (4)
- Thesis; University of North Florida; UNF; Dissertations (4)
- Algorithms (3)
- Application (3)
- Autonomous (3)
- Cloud Computing (3)
- Publication
-
- Theses and Dissertations (37)
- Electronic Theses and Dissertations (30)
- Browse all Theses and Dissertations (26)
- Computer Science and Engineering Senior Theses (21)
- Computer Engineering (19)
-
- Chulalongkorn University Theses and Dissertations (Chula ETD) (16)
- Doctoral Dissertations (13)
- Master's Theses (11)
- Electronic Thesis and Dissertation Repository (10)
- Graduate Theses, Dissertations, and Problem Reports (10)
- Boise State University Theses and Dissertations (7)
- Computer Science and Computer Engineering Undergraduate Honors Theses (7)
- Electronic Theses, Projects, and Dissertations (7)
- Graduate Theses and Dissertations (7)
- Masters Theses (7)
- USF Tampa Graduate Theses and Dissertations (6)
- Dissertations and Theses (5)
- Legacy Theses & Dissertations (2009 - 2024) (5)
- Master of Science in Computer Science Theses (5)
- McKelvey School of Engineering Theses & Dissertations (5)
- Theses and Dissertations--Computer Science (5)
- Computer Science ETDs (4)
- Computer Science and Engineering Master's Theses (4)
- Graduate Research Theses & Dissertations (4)
- LSU Doctoral Dissertations (4)
- LSU Master's Theses (4)
- UNF Graduate Theses and Dissertations (4)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (4)
- Wayne State University Dissertations (4)
- Computational Modeling & Simulation Engineering Theses & Dissertations (3)
Articles 331 - 360 of 362
Full-Text Articles in Engineering
Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov
Software Implementations And Applications Of Elliptic Curve Cryptography, Kirill Kultinov
Browse all Theses and Dissertations
Elliptic Curve Cryptography (ECC) is a public-key cryptography system. Elliptic Curve Cryptography (ECC) can achieve the same level of security as the public-key cryptography system, RSA, with a much smaller key size. It is a promising public key cryptography system with regard to time efficiency and resource utilization. This thesis focuses on the software implementations of ECC over finite field GF(p) with two distinct implementations of the Big Integer classes using character arrays, and bit sets in C++ programming language. Our implementation works on the ECC curves of the form y^2 = x^3 + ax + b (mod p). The …
Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy
Rules With Right Hand Existential Or Disjunction With Rowltab, Sri Jitendra Satpathy
Browse all Theses and Dissertations
One hotly debated research topic is, “What is the best approach for modeling ontologies?”. In the earlier stages of modeling ontologies, researchers have favored the usage of description logic to capture knowledge. One such choice is the Web Ontology Language (OWL) that is based on description logic. Many tools were designed around this principle and are still widely being used to model and explore ontologies. However, not all users find description logic to be intuitive, at least not without an extensive background in formal logics. Due to this, researchers have tried to explore other ways that will enable such users …
Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal
Scalable Clustering For Immune Repertoire Sequence Analysis, Prem Bhusal
Browse all Theses and Dissertations
The development of the next-generation sequencing technology has enabled systems immunology researchers to conduct detailed immune repertoire analysis at the molecule level. Large sequence datasets (e.g., millions of sequences) are being collected to comprehensively understand how the immune system of a patient evolves over different stages of disease development. A recent study has shown that the hierarchical clustering (HC) algorithm gives the best results for B-cell clones analysis - an important type of immune repertoire sequencing (IR-Seq) analysis. However, due to the inherent complexity, the classical hierarchical clustering algorithm does not scale well to large sequence datasets. Surprisingly, no algorithms …
Testing And Validation Framework For Closed-Loop Physiology Management Systems For Critical And Perioperative Care, Farooq M. Gessa
Testing And Validation Framework For Closed-Loop Physiology Management Systems For Critical And Perioperative Care, Farooq M. Gessa
Master’s Theses
The research aims at developing a framework for testing systems such as closed-loop physiology management systems to ensure that they are safe and effective for use with patients. Building medical devices that are both robust and safe is a challenge. There has been a tremendous increase in modernization and innovation of various medical systems but many of these systems either fail trials or are recalled due to safety issues.
Medical operation rooms require care teams responsible for monitoring the patients and other technical surgical devices. The care process requires a balancing administration that takes care of the drugs and fluids …
Volumetric Error Compensation For Industrial Robots And Machine Tools, Le Ma
Volumetric Error Compensation For Industrial Robots And Machine Tools, Le Ma
Doctoral Dissertations
“A more efficient and increasingly popular volumetric error compensation method for machine tools is to compute compensation tables in axis space with tool tip volumetric measurements. However, machine tools have high-order geometric errors and some workspace is not reachable by measurement devices, the compensation method suffers a curve-fitting challenge, overfitting measurements in measured space and losing accuracy around and out of the measured space. Paper I presents a novel method that aims to uniformly interpolate and extrapolate the compensation tables throughout the entire workspace. By using a uniform constraint to bound the tool tip error slopes, an optimal model with …
Neuroengineering Of Clustering Algorithms, Leonardo Enzo Brito Da Silva
Neuroengineering Of Clustering Algorithms, Leonardo Enzo Brito Da Silva
Doctoral Dissertations
"Cluster analysis can be broadly divided into multivariate data visualization, clustering algorithms, and cluster validation. This dissertation contributes neural network-based techniques to perform all three unsupervised learning tasks. Particularly, the first paper provides a comprehensive review on adaptive resonance theory (ART) models for engineering applications and provides context for the four subsequent papers. These papers are devoted to enhancements of ART-based clustering algorithms from (a) a practical perspective by exploiting the visual assessment of cluster tendency (VAT) sorting algorithm as a preprocessor for ART offline training, thus mitigating ordering effects; and (b) an engineering perspective by designing a family of …
Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy
Investigation And Development Of Exhaust Flow Rate Estimation Methodologies For Heavy-Duty Vehicles, Chakradhar Reddy Vardhireddy
Graduate Theses, Dissertations, and Problem Reports
Exhaust gas flow rate from a vehicle tailpipe has a great influence on emission mass rate calculations, as the emission fractions of individual gases in the exhaust are calculated by using the measured exhaust flow rate. The development of high-end sensor technologies and emission pollutant measurement instruments, which can give instantaneous values of volume concentration of pollutants flowing out of the engine are gaining importance because of their ease of operation. The volume concentrations measured can then be used with the instantaneous exhaust flow rate values to obtain mass flow rates of pollutants.
With the recent promulgation of real world …
Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu
Abusive And Hate Speech Tweets Detection With Text Generation, Abhishek Nalamothu
Browse all Theses and Dissertations
According to a Pew Research study, 41% of Americans have personally experienced online harassment and two-thirds of Americans have witnessed harassment in 2017. Hence, online harassment detection is vital for securing and sustaining the popularity and viability of online social networks. Machine learning techniques play a crucial role in automatic harassment detection. One of the challenges of using supervised approaches is training data imbalance. Existing text generation techniques can help augment the training data, but they are still inadequate and ineffective. This research explores the role of domain-specific knowledge to complement the limited training data available for training a text …
Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker
Automated Vehicle Electronic Control Unit (Ecu) Sensor Location Using Feature-Vector Based Comparisons, Gregory S. Buthker
Browse all Theses and Dissertations
In the growing world of cybersecurity, being able to map and analyze how software and hardware interact is key to understanding and protecting critical embedded systems like the Engine Control Unit (ECU). The aim of our research is to use our understanding of the ECU's control flow attained through manual analysis to automatically map and identify sensor functions found within the ECU. We seek to do this by generating unique sets of feature vectors for every function within the binary file of a car ECU, and then using those feature sets to locate functions within each binary similar to their …
Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth
Recognition Of Incomplete Objects Based On Synthesis Of Views Using A Geometric Based Local-Global Graphs, Michael Christopher Robbeloth
Browse all Theses and Dissertations
The recognition of single objects is an old research field with many techniques and robust results. The probabilistic recognition of incomplete objects, however, remains an active field with challenging issues associated to shadows, illumination and other visual characteristics. With object incompleteness, we mean missing parts of a known object and not low-resolution images of that object. The employment of various single machine-learning methodologies for accurate classification of the incomplete objects did not provide a robust answer to the challenging problem. In this dissertation, we present a suite of high-level, model-based computer vision techniques encompassing both geometric and machine learning approaches …
Knowledge Graph Reasoning Over Unseen Rdf Data, Bhargavacharan Reddy Kaithi
Knowledge Graph Reasoning Over Unseen Rdf Data, Bhargavacharan Reddy Kaithi
Browse all Theses and Dissertations
In recent years, the research in deep learning and knowledge engineering has made a wide impact on the data and knowledge representations. The research in knowledge engineering has frequently focused on modeling the high level human cognitive abilities, such as reasoning, making inferences, and validation. Semantic Web Technologies and Deep Learning have an interest in creating intelligent artifacts. Deep learning is a set of machine learning algorithms that attempt to model data representations through many layers of non-linear transformations. Deep learning is in- creasingly employed to analyze various knowledge representations mentioned in Semantic Web and provides better results for Semantic …
Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat
Knowledge-Enabled Entity Extraction, Hussein S. Al-Olimat
Browse all Theses and Dissertations
Information Extraction (IE) techniques are developed to extract entities, relationships, and other detailed information from unstructured text. The majority of the methods in the literature focus on designing supervised machine learning techniques, which are not very practical due to the high cost of obtaining annotations and the difficulty in creating high quality (in terms of reliability and coverage) gold standard. Therefore, semi-supervised and distantly-supervised techniques are getting more traction lately to overcome some of the challenges, such as bootstrapping the learning quickly. This dissertation focuses on information extraction, and in particular entities, i.e., Named Entity Recognition (NER), from multiple domains, …
Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen
Kidney Ailment Prediction Under Data Imbalance, Ranaa Mahveen
Graduate Theses, Dissertations, and Problem Reports
Chronic Kidney Disease (CKD) is the leading cause for kidney failure. It is a global health problem affecting approximately 10% of the world population and about 15% of US adults. Chronic Kidney Diseases do not generally show any disease specific symptoms in early stages thus it is hard to detect and prevent such diseases. Early detection and classification are the key factors in managing Chronic Kidney Diseases.
In this thesis, we propose a new machine learning technique for Kidney Ailment Prediction. We focus on two key issues in machine learning, especially in its application to disease prediction. One is related …
Light Touch Based Virtual Cane For Balance Assistance During Standing, Sindhu Reddy Alluri
Light Touch Based Virtual Cane For Balance Assistance During Standing, Sindhu Reddy Alluri
Masters Theses
"Can additional information about one's body kinematics provided through hands improve human balance? Light-Touch (LT) through hands helps improve balance in a wide range of populations, both healthy and impaired. The force is too small to provide any meaningful mechanical assistance -- rather, it is suggested that the additional sensory information through hands helps the body improve balance.
To investigate the potential for improving human balance through biofeedback through hands, we developed a Virtual Cane (VC) for balance assistance during standing. The VC mimics the physical cane's function of providing information about one's body in space. Balance experiments on 10 …
Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister
Less Is More: Beating The Market With Recurrent Reinforcement Learning, Louis Kurt Bernhard Steinmeister
Masters Theses
"Multiple recurrent reinforcement learners were implemented to make trading decisions based on real and freely available macro-economic data. The learning algorithm and different reinforcement functions (the Differential Sharpe Ratio, Differential Downside Deviation Ratio and Returns) were revised and the performances were compared while transaction costs were taken into account. (This is important for practical implementations even though many publications ignore this consideration.) It was assumed that the traders make long-short decisions in the S&P500 with complementary 3-month treasury bill investments. Leveraged positions in the S&P500 were disallowed. Notably, the Differential Sharpe Ratio and the Differential Downside Deviation Ratio are risk …
Controlled Switching In Kalman Filtering And Iterative Learning Controls, He Li
Controlled Switching In Kalman Filtering And Iterative Learning Controls, He Li
Masters Theses
“Switching is not an uncommon phenomenon in practical systems and processes, for examples, power switches opening and closing, transmissions lifting from low gear to high gear, and air planes crossing different layers in air. Switching can be a disaster to a system since frequent switching between two asymptotically stable subsystems may result in unstable dynamics. On the contrary, switching can be a benefit to a system since controlled switching is sometimes imposed by the designers to achieve desired performance. This encourages the study of system dynamics and performance when undesired switching occurs or controlled switching is imposed. In this research, …
Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey
Hometracker: A Household Information Feedback System For Food/Energy/Water Metabolism, Nichole Mackey
Dissertations, Master's Theses and Master's Reports
The Food, Energy and Water Conscious (FEWCON) project seeks to understand how food, energy and water (FEW) as independent resources within households are connected. In the main study of the project, intervention messages that link household FEW consumption to equivalent climate consequences are pushed to the households. The goal of the FEWCON study is to determine potential intervention messages that influence household FEW consumption behavior.
A key component of the FEWCON study is a web application named HomeTracker (Household Metabolism Tracker) which collects FEW consumption data within households, then uses this data to select consumption-specific feedback to the homeowners. To …
Virtual Morphology As A Method Of Robotic Control, Conner Todd Castle
Virtual Morphology As A Method Of Robotic Control, Conner Todd Castle
Graduate Theses, Dissertations, and Problem Reports
This thesis presents Virtual Morphology (VM), a method that explores a different perspective on the design of robot autonomy using inspiration from morphological computing and programmed computation. Morphological computation offers physical solutions that solve complex tasks, like robotic grasping of unknown objects, with relative ease. Unfortunately, these physical solutions are difficult to adjust post-development, and are usually designed to complete only one or a few specific tasks. Programmed computational approaches are more flexible because they can be implemented and adjusted through software, but unfortunately, these approaches can become rather complex as tasks become more difficult. This thesis explores the potential …
Autonomous Combat Robot, Andrew J. Szabo Ii, Chris Heldman, Tristin Weber, Tanya Tebcherani, Holden Leblanc, Fabian Ardeljan
Autonomous Combat Robot, Andrew J. Szabo Ii, Chris Heldman, Tristin Weber, Tanya Tebcherani, Holden Leblanc, Fabian Ardeljan
Williams Honors College, Honors Research Projects
This honors project will also serve as an engineering senior design project.
The objective is to design and build the software and electrical systems for a 60 lb weight class combat robot that will function autonomously and outperform manually driven robots during competition.
While running autonomously, the robot will use LiDAR sensors to detect and attack opponent robots. This robot will also be able to be remote controlled in manual mode. This will mitigate the risk in case the autonomy or sensors fail. LED lights on the robot will indicate whether it is in autonomous or manual mode. The system …
Safe Pass, Alycia Riese, Julia Hariharan, Greg Synek, Jonathan Hall
Safe Pass, Alycia Riese, Julia Hariharan, Greg Synek, Jonathan Hall
Williams Honors College, Honors Research Projects
The purpose of this project is to design a sensor to be mounted on Class IV and higher vehicles to detect on-coming traffic. If traffic has been detected, the system is to warn drivers behind the stopped vehicle that passing is unsafe. The vehicle detection is to be implemented using a LiDAR detection method along with signal processing. A wireless transceiver is to transmit from the front radar module to the rear warning indicator module when the conditions are unsafe for passing. The project goals are to increase road safety and maintain traffic flow. The report details the challenges due …
Smart Parking Deck, Ryne Turner, Matthew Mcdade, Julie Aichinger, Laveréna Wienclaw
Smart Parking Deck, Ryne Turner, Matthew Mcdade, Julie Aichinger, Laveréna Wienclaw
Williams Honors College, Honors Research Projects
The Smart Parking Deck employs elementary circuit design elements and mobile application development. Each device module uses laser proximity sensors to check the availability of an individual parking space and a Zigbee unit to communicate with the adjacent device module. The modules are connected to a network hub that manages all of the incoming and outgoing parking data. This data is displayed on the mobile application. The system is easily manageable and energy efficient, significantly decreasing the costs associated with other smart parking systems on the market. This system is aimed at decreasing commute time for students by allowing them …
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …
The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi
The Evaluation Of An Android Permission Management System Based On Crowdsourcing, Pulkit Rustgi
Theses and Dissertations
Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a crowdsource based Android recommendation tool and framework, is a proposed avenue …
Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam
Energy Efficient Spintronic Device For Neuromorphic Computation, Md Ali Azam
Theses and Dissertations
Future computing will require significant development in new computing device paradigms. This is motivated by CMOS devices reaching their technological limits, the need for non-Von Neumann architectures as well as the energy constraints of wearable technologies and embedded processors. The first device proposal, an energy-efficient voltage-controlled domain wall device for implementing an artificial neuron and synapse is analyzed using micromagnetic modeling. By controlling the domain wall motion utilizing spin transfer or spin orbit torques in association with voltage generated strain control of perpendicular magnetic anisotropy in the presence of Dzyaloshinskii-Moriya interaction (DMI), different positions of the domain wall are realized …
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
A Compiler Target Model For Line Associative Registers, Paul S. Eberhart
Theses and Dissertations--Electrical and Computer Engineering
LARs (Line Associative Registers) are very wide tagged registers, used for both register-wide SWAR (SIMD Within a Register )operations and scalar operations on arbitrary fields. LARs include a large data field, type tags, source addresses, and a dirty bit, which allow them to not only replace both caches and registers in the conventional memory hierarchy, but improve on both their functions. This thesis details a LAR-based architecture, and describes the design of a compiler which can generate code for a LAR-based design. In particular, type conversion, alignment, and register allocation are discussed in detail.
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Curricular Optimization: Solving For The Optimal Student Success Pathway, William G. Thompson-Arjona
Theses and Dissertations--Electrical and Computer Engineering
Considering the significant investment of higher education made by students and their families, graduating in a timely manner is of the utmost importance. Delay attributed to drop out or the retaking of a course adds cost and negatively affects a student’s academic progression. Considering this, it becomes paramount for institutions to focus on student success in relation to term scheduling.
Often overlooked, complexity of a course schedule may be one of the most important factors in whether or not a student successfully completes his or her degree. More often than not students entering an institution as a first time full …
T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus
T-Count Optimization Of Quantum Carry Look-Ahead Adder, Vladislav Ivanovich Khalus
Theses and Dissertations--Electrical and Computer Engineering
With the emergence of quantum physics and computer science in the 20th century, a new era was born which can solve very difficult problems in a much faster rate or problems that classical computing just can't solve. In the 21st century, quantum computing needs to be used to solve tough problems in engineering, business, medical, and other fields that required results not today but yesterday. To make this dream come true, engineers in the semiconductor industry need to make the quantum circuits a reality.
To realize quantum circuits and make them scalable, they need to be fault tolerant, …
Quantum Comparator Circuit On Superconducting Quantum Computer, Naphan Benchasattabuse
Quantum Comparator Circuit On Superconducting Quantum Computer, Naphan Benchasattabuse
Chulalongkorn University Theses and Dissertations (Chula ETD)
In this thesis, we present an optimised quantum comparator circuit based on Cuccaro's ripple-carry quantum adder using relative phase techniques from Maslov's multiple control Toffoli optimisation. We extend the cost function from simply counting C-Not and Toffoli gate to Qiskit cost which defines arbitrary single qubit gate cost as unity and C-Not as the only two qubit gate cost as ten. We report the comparison result between our comparator circuit with previous comparator circuits from literature using optimal Toffoli implementation with Qiskit cost, C-Not count, and circuit depth. We also report our experiment of implementing a two-bit comparator on IBM …
A Peer-To-Peer Protocol For Prioritized Software Updates On Wireless Sensor Networks, Natchanon Nuntanirund
A Peer-To-Peer Protocol For Prioritized Software Updates On Wireless Sensor Networks, Natchanon Nuntanirund
Chulalongkorn University Theses and Dissertations (Chula ETD)
Software updating is essential for devices in wireless sensor networks for adding new features, improving performance, or patching vulnerabilities. But since some deployed devices are unable to be accessed directly, data dissemination protocol is used for distributing the update to those devices. However, each software updating may have different priority, for instance, an update that adds an optional feature does not have to be applied as fast as an update that patches severe vulnerabilities. This research presents a reliable data dissemination protocol which is configurable for energy-speed trade-off deriving some concepts from BitTorrent such as Handshaking, Segmented File Transfer, and …
Semantic Segmentation On Remotely Sensed Images Using Deep Convolutional Encoder-Decoder Neural Network, Teerapong Panboonyuen
Semantic Segmentation On Remotely Sensed Images Using Deep Convolutional Encoder-Decoder Neural Network, Teerapong Panboonyuen
Chulalongkorn University Theses and Dissertations (Chula ETD)
One of the fundamental tasks in remote sensing is the semantic segmentation of the aerial and satellite images. It plays a vital role in applications, such as agriculture planning, map updates, route optimization, and navigation. The state-of-the-art model is the Deep Convolutional Encoder-Decoder (DCED). However, the accuracy is still limited since the architecture is not designed for recovering low-level features, e.g., river, low vegetation on remotely sensed images, and the training data in this domain are deficient. In this dissertation, we aim to propose the semantic segmentation architecture in five aspects, designed explicitly for the remotely sensed field. First, we …