Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (102)
- Digital Communications and Networking (38)
- Social and Behavioral Sciences (38)
- Business (32)
- Physical Sciences and Mathematics (32)
-
- Computer Sciences (28)
- Electrical and Computer Engineering (27)
- Operations Research, Systems Engineering and Industrial Engineering (24)
- Technology and Innovation (22)
- Communication (20)
- Management Information Systems (20)
- E-Commerce (19)
- Operational Research (19)
- Business Intelligence (18)
- Management Sciences and Quantitative Methods (18)
- Computer and Systems Architecture (15)
- Law (14)
- Arts and Humanities (13)
- Communication Technology and New Media (12)
- Computer Law (11)
- Science and Technology Studies (9)
- Art and Design (8)
- Data Storage Systems (8)
- Information Security (8)
- Library and Information Science (8)
- Civil and Environmental Engineering (7)
- Education (7)
- Science and Technology Law (7)
- Systems and Communications (7)
- Institution
-
- University of South Carolina (27)
- California State University, San Bernardino (25)
- Technological University Dublin (12)
- Embry-Riddle Aeronautical University (8)
- California Polytechnic State University, San Luis Obispo (7)
-
- Missouri University of Science and Technology (7)
- Old Dominion University (6)
- Stony Brook University (6)
- Selected Works (4)
- University of Pennsylvania Carey Law School (4)
- Air Force Institute of Technology (3)
- Purdue University (3)
- University of Wollongong (3)
- Association of Arab Universities (2)
- Edith Cowan University (2)
- New Jersey Institute of Technology (2)
- Penn State Dickinson Law (2)
- University for Business and Technology in Kosovo (2)
- University of Central Florida (2)
- University of Kentucky (2)
- University of New Hampshire (2)
- Utah State University (2)
- Bowling Green State University (1)
- Cedarville University (1)
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- Cleveland State University (1)
- Georgia Southern University (1)
- Iowa State University (1)
- Michigan Technological University (1)
- Publication Year
- Publication
-
- Faculty Publications (27)
- Journal of International Technology and Information Management (20)
- Journal of Network Music and Arts (6)
- Electrical and Computer Engineering Faculty Research & Creative Works (5)
- Theses Digitization Project (5)
-
- All Faculty Scholarship (4)
- Conference papers (4)
- Electronic Theses and Dissertations (4)
- Publications (4)
- Theses and Dissertations (4)
- Articles (3)
- Electrical and Computer Engineering Faculty Publications (3)
- Journal of Digital Forensics, Security and Law (3)
- Computer Engineering (2)
- Dickinson Law Review (2017-Present) (2)
- Dissertations (2)
- Electrical Engineering (2)
- Engineering Management and Systems Engineering Faculty Research & Creative Works (2)
- Information Science Faculty Publications (2)
- Master's Theses (2)
- Mechanical & Aerospace Engineering Faculty Publications (2)
- The ITB Journal (2)
- 2012 Energy Justice Conference and Technology Exposition (September 17-18) (1)
- Associate Professor Katina Michael (1)
- CLCWeb: Comparative Literature and Culture (1)
- Computational Medicine Center Faculty Papers (1)
- Computer Science Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Conference Papers (1)
- Doctoral Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 160
Full-Text Articles in Engineering
Light Based Wireless Communication, Nick Ghaffarian, Gibson Puckett
Light Based Wireless Communication, Nick Ghaffarian, Gibson Puckett
Electrical Engineering
The demand for high-speed, secure wireless communication is escalating, particularly in high-density environments like urban areas, and critical sectors such as healthcare and defense. Traditional Wi-Fi struggles with issues like signal congestion, electromagnetic interference, and security vulnerabilities, compromising connectivity quality. LiFi is much more suitable for areas like hospitals which contain equipment highly sensitive to electromagnetic interference, has a high bandwidth far away from standard radio waves which enables strong communication in highly congested areas.
We developed a small scale, low-cost LiFi system to demonstrate a proof of concept of LiFi that grants the user full access to the internet. …
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant
Theses/Capstones/Creative Projects
The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …
Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva
Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva
Conference Papers
Easy and uncontrolled access to the Internet provokes the wide propagation of false information, which freely circulates in the Internet. Researchers usually solve the problem of fake news detection (FND) in the framework of a known topic and binary classification. In this paper we study possibilities of BERT-based models to detect fake news in news flow with unknown topics and four categories: true, semi-true, false and other. The object of consideration is the dataset CheckThat! Lab proposed for the conference CLEF-2022. The subjects of consideration are the models SBERT, RoBERTa, and mBERT. To improve the quality of classification we use …
How Online Discourse Networks Fields Of Practice: The Discursive Negotiation Of Autonomy On Art Organisation About Pages, Tommie Soro
Articles
This article examines how the online discourse of art organisations forges relationships between the artworld and the fields of politics and economy. Combining elements of Pierre Bourdieu’s field analysis and Norman Fairclough’s critical discourse analysis, the article analyses an elite art magazine, e-flux, and an elite art museum, IMMA, and the activities of discourses, genres, and utterances on their about pages. Its results suggest that the about pages of these organisations forge links between the artworld and the fields of politics and economy by mobilising discourse in these fields and by incorporating discourse practices from these fields. The ideological tension …
Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi
Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi
Williams Honors College, Honors Research Projects
Audio and video streaming across delay tolerant networks are relatively new phenomena. During the Apollo 11 mission, video and audio were streamed directly back to Earth using fully analog radios. This streaming capability atrophied over time. The gradual conversion to digital electronics contributed greatly to this. Additionally, 21st century space systems face the new requirement of interconnectedness. Delay Tolerant Networking (DTN) attempts to solve this requirement by uniting traditional point to point links into a robust and dynamic network. However, DTN implementations present bottlenecks due to low performance. High-Rate Delay Tolerant Networking (HDTN) is a performance-optimized DTN implementation. This work …
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Honors Projects
As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and …
واقع تواصل أولياء أمور الطلبة مع مدارس أبنائهم في المرحلة الأساسية الأولى بمحافظة نابلس في فلسطين واتجاهاتهم نحو توظيف خدمات شبكة الإنترنت لتحسينه, Magdi Hinnawi
Palestine Technical University Research Journal
This study aimed at exploring the reality of communication between parents and the schools of their children in addition to investigating the parents’ attitudes towards using the Internet services to communicate with the schools at the basic elementary stage in Nablus Directorate /Palestine. Furthermore, the study aimed at examining the effect of some variables on these attitudes. To achieve these objectives, the descriptive method was employed by means of a questionnaire used to collect data. The sample of the study consisted of 120 parents chosen through the cluster-regional-randomized design. Results indicated that all parents support the importance of communication with …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
Articles
This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami
Future Computing and Informatics Journal
It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce
Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce
Michigan Tech Publications
Internet-related electricity consumption is rising rapidly as global Internet users spend more than 6.5 h per day online. Open source ad blockers have the potential to reduce the time and thus electricity spent using computers by eliminating ads during Internet browsing and video streaming. In this study, three open source ad blockers are tested against a no-ad blocker control. Page load time is recorded for browsing a representative selection of the globally most-accessed websites, and the time spent watching ads on videos is quantified for both trending and non-trending content. The results show that page load time dropped 11% with …
False Data Injection Attack (Fdia): An Overview And New Metrics For Fair Evaluation Of Its Countermeasure, Mohiuddin Ahmed, Al-Sakib Khan Pathan
False Data Injection Attack (Fdia): An Overview And New Metrics For Fair Evaluation Of Its Countermeasure, Mohiuddin Ahmed, Al-Sakib Khan Pathan
Research outputs 2014 to 2021
The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically means the case when an attacker compromises sensor readings in such tricky way that undetected errors are introduced into calculations of state variables and values. Due to the rapid growth of the Internet and associated complex adaptive systems, cyber attackers are interested in exploiting similar attacks in other application domains such as healthcare, finance, defense, governance, etc. In today’s increasingly perilous cyber world of complex adaptive systems, FDIA has become one of the top-priority issues to deal …
Ensemble Machine Learning Approaches For Webshell Detection In Internet Of Things Environments, Binbin Yong, Wei Wei, Kuan-Ching Li, Jun Shen, Qingguo Zhou, Marcin Wozniak, Dawid Polap, Robertas Damasevicius
Ensemble Machine Learning Approaches For Webshell Detection In Internet Of Things Environments, Binbin Yong, Wei Wei, Kuan-Ching Li, Jun Shen, Qingguo Zhou, Marcin Wozniak, Dawid Polap, Robertas Damasevicius
Faculty of Engineering and Information Sciences - Papers: Part B
The Internet of things (IoT), made up of a massive number of sensor devices interconnected, can be used for data exchange, intelligent identification, and management of interconnected “things.” IoT devices are proliferating and playing a crucial role in improving the living quality and living standard of the people. However, the real IoT is more vulnerable to attack by countless cyberattacks from the Internet, which may cause privacy data leakage, data tampering and also cause significant harm to society and individuals. Network security is essential in the IoT system, and Web injection is one of the most severe security problems, especially …
Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison
Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison
Journal of Network Music and Arts
In 2016, I created an interactive installation called Video Voto Matic. This project was a mashup between the Votomatic voting system and a Roland TR-808 drum machine. To coincide with the 2020 election season, I am currently working on an update of the project that will include a touch screen voting interface and multiple networked stations that also produce audio and video output. The interface will be housed in the same voting booths that once housed the Diebold Accuvote TS. The Diebold Accuvote TS is a screen-based voting machine that does not utilize paper as a backup. Researchers have examined …
Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice
Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice
Journal of Network Music and Arts
Participation in conferences is an elemental component of professional life throughout the world. Two problems offset the social synergy gained from attending a far-away gathering of like-minded people. The first is the highly pronounced carbon footprint from air travel, and the second is the expense involved to participate in a conference which may be on another continent. These factors prevent many from participating who could otherwise benefit as well as contribute. As videoconferencing becomes more common and more sophisticated, it will serve as an alternative that not only benefits constituencies, but will expand the reach of a conference to more …
Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler
Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler
Journal of Network Music and Arts
Under the conditions of its geographic distribution, the “telematic performance” can be regarded as a remediation of traditional concert, theater or dance formats. Conversely, and as this paper argues, the telematic performance can also be understood as an artistic format of its own right, one which then can serve as a trope for social interaction under the conditions of critical posthumanism. To gain a wider perspective, this paper analyzes Alan Turing’s “Imitation Game” from his seminal article Computing Machinery and Intelligence, 1950, proposing it as an early conceptualization of a telematic performance. This against-the-grain reading of Turing’s text reveals certain …
Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius
Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius
Journal of Network Music and Arts
INTIMAL is an interactive system for relational listening, which integrates physical-virtual interfaces for people to sonically improvise between distant locations. The aim is to embrace two key aspects in the context of human migration: the sense of place and the sense of presence. This paper reflects on the use of INTIMAL in a long-distance improvisation between the cities of Oslo, Barcelona and London in May 2019. This improvisation was performed by nine Colombian migrant women, who had been involved in a research process using the Deep Listening® practice developed by Pauline Oliveros. Here we describe the performance setting and the …
Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon
Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon
Journal of Network Music and Arts
No abstract provided.
Editorial, Sarah Weaver
Editorial, Sarah Weaver
Journal of Network Music and Arts
Welcome to the Journal of Network Music and Arts (JONMA). JONMA is a peer-reviewed open access digital research journal published by Stony Brook University. Network Music and Arts utilize the Internet and related technologies as an artistic medium for works created for this platform. JONMA will publish research by artists, technologists, educators, and related scholars. The journal content will include articles, audio and video documentation, and reviews for books and recordings.
A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa
A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa
Journal of International Technology and Information Management
World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …
Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond
Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond
Journal of International Technology and Information Management
There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …
Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng
Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng
Information Science Faculty Publications
The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …
Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj
Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj
International Journal of Business and Technology
With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).
In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …
Me2b
SIGNED: The Magazine of The Hong Kong Design Institute
Fixing the internet's biggest flaw
Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al.
Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al.
Marc Compere
This paper describes a human-in-the-loop motion-based simulator interfaced to hybrid-electric power system hardware, both of which were used to measure the duty cycle of a combat vehicle in a virtual simulation environment. The project discussed is a greatly expanded follow-on to the experiment published in [1,7]. This paper is written in the context of [1,7] and therefore highlights the enhancements. The most prominent of these enhancements is the integration (in real-time) of the Power & Energy System Integration Lab (P&E SIL) with a motion base simulator by means of a “long haul” connection over the Internet (a geographical distance of …
Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto
Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto
Electronic Theses and Dissertations
The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home.
Transforming Yekaterinburg Into A Safe, Resilient-Smart And Sustainable City, S. A. Timashev, V. N. Alekhin, L. V. Poluyan, I. Fontanals, A. Gheorghe
Transforming Yekaterinburg Into A Safe, Resilient-Smart And Sustainable City, S. A. Timashev, V. N. Alekhin, L. V. Poluyan, I. Fontanals, A. Gheorghe
Engineering Management & Systems Engineering Faculty Publications
The initiative (since 2014) project described in this paper is a product of a joint innovative research and implementation effort of the Civil Engineering and Architecture Institute, Ural Federal University, the Science and Engineering Centre "Reliability and Safety of Large Systems and Machines", Ural Branch Russian Academy of Sciences (both Yekaterinburg), Start-up OptiCits, Barcelona, Spain and the Old Dominion University, Norfolk, VA, USA. The project is based on using the MAICS convergent technology [1] to create a versatile multi-purpose tool for optimizing the science and art of risk based governance of resilience-smart and sustainable city infrastructure and communities operating in …
Automating The Crowd-Mapping Workflow With Deep Learning, Lasith Niroshan
Automating The Crowd-Mapping Workflow With Deep Learning, Lasith Niroshan
Theses
Maintaining updated maps in an ever-changing built environment is important for supporting modern society in many ways. The usage of online crowdsourced maps in particular has gained importance in a wide range of recent location-based applications (route planning/navigation, urban planning, real estate, tourism, etc). However, both traditional map production methods and updating today’s online maps suffer from early obsolescence due to their largely manual map production/update workflows. Significant research efforts have focused on refining techniques to identify changes in raster satellite images, aiming to improve and streamline map production processes. Concurrently, the surge in Internet usage has led to a …