In a power system, operators maintain voltage stability through adequate reactive reserves. Maintaining and accessing an efficient allocation of reactive reserves is prohibitively complex because of reactive line losses, the variety of reactive resources, and either limited or variable reactive outputs from renewable sources. By clustering the system into smaller...
The central focus of this thesis is the design, fabrication and characterization of amorphous oxide semiconductor (AOS) thin-film transistor (TFT) current mirrors. The thin-film deposition and circuit fabrication methods used to realize zinc tin oxide (ZTO) TFT
current mirrors are addressed in order to elucidate the processing challenges for this...
The primary objective of this thesis is to develop a process for fabricating integrated circuits based on thin-film transistors (TFTs) using zinc tin oxide (ZTO) as the channel layer. ZTO, in contrast to indium- or gallium-based amorphous oxide semiconductors (AOS), is perceived to be a more commercially viable AOS choice...
The prevalence of Internet-of-Things (IoT) applications leads to an increasing focus on the design and optimization of sensor nodes. Battery lifetime and associated costs of battery replacement often limits the long term operation and viability of sensor nodes. RF wireless energy harvesting on the other hand can be appealing since...
Currently, a popular approach to image classification uses the deep Transformer architecture. In a Transformer, the attention mechanism enables the model to learn efficiently with fewer computational resources than the convolutional neural networks (CNNs). In this thesis, we study the sparse attention mechanism widely used in the Transformers developed specifically...
The number of wind turbines and wind farms in the Pacific Northwest has increased dramatically in the past six years, which represents a significant amount of electrical generation capacity connected to the public electric grid. However, the variable nature of wind sometimes introduces excessive power, or conversely shortages, in power...
Low-distortion architecture is widely used in wideband discrete-time switched-capacitor delta-sigma ADC design. However, it suffers from the power-hungry active adder and critical timing for quantization and dynamic element matching (DEM). To solve this problem, this dissertation presents a delta-sigma modulator architecture with shifted loop delays. In this project, shifted loop...
Nowadays, needs for wideband and high accuracy analog-to-digital converter are increasing rapidly in manifold applications such as wireless communication, digital video and other consumer electronics. Besides, low power consumption is required to have longer battery life in portable systems. CMOS technology scaling and innovative modulator topology make the implementation much...
There is a significant need in recent mobile communication and wireless broadband
systems for high-performance analog-to-digital converters (ADCs) that have wide
bandwidth (BW>5-MHz) and high data rate (>100-Mbps). A delta-sigma ADC is
recognized as a power-efficient ADC architecture when high resolution (>12-b) is
required. This is due to several advantages...
The WEPP (Water Erosion Prediction Project) application computes soil loss and sediment yield from a field based on the data on crops, management practices, and operations. In order to make WEPP, which is a Windows-based application, easily accessible, Web WEPP (Web-based WEPP) was developed by our research group.
Web WEPP...
WebGen 5 is a software tool for automatically generating Web scripts that display Web forms and operate on data in a database. WebGen 5 is implemented as a collection of templates. Each template, combined with a corresponding configuration file, generates one of the following six types of Web scripts: search,...
We have developed a framework for Web-based GIS/database (WebGD) applications
that allow users to insert, query, and delete data with map interfaces displayed by Web
browsers. The framework uses such open source software packages as Minnesota
MapServer, PostGIS, and PostgreSQL. With this framework, we can create the map
interface of...
Deep learning and neural network has been widely used in research, deep learning has empowered many tasks such as point clouds segmentation and shape recognition. One of the main advantages of deep interaction point cloud segmentation is that it allows the feature extraction can be learned through neural network based...
GEM-GIS is a prototype of a web-based GIS/Database application for managing a germplasm collection. This application include a database, a map interface, a set of web forms for database access, and an analysis module. The analysis module perform statistical analysis for the accessions of a species selected by the user...
The thesis focuses on activity recognition from sensor data, which has spurred a great deal of interest due to its impact on health care and security. Previous work on activity recognition from multivariate time series data has mainly applied supervised learning techniques which require a high degree of annotation effort...
Efficient time-series analysis can impact multiple application domains such as motif discovery in gene analysis or music data, extracting spectro-temporal patterns in acoustic scene analysis, or annotating and classifying electrical bio-signals (such as ECG, EEG, and EMG) for medical applications.
Time-series analysis involves a variety of tasks.
To predict future...
In supervised learning, label information can be provided at different levels of granularity. For small datasets, it is possible to acquire a label for each data instance. However, in the big-data regime, this fine granularity approach is prohibitively costly. For example, in semi-supervised learning, only a limited number of samples...
Wave energy converter research continues to advance and new developers are continuing to emerge, leading to the need for a general modeling methodology. This work attempts to outline the design methodology necessary to perform frequency domain analysis on a generic wave energy converter. A two-body point absorber representing a generic...
Approximate string matching is commonly used to align genetic sequences (DNA
or RNA) to determine their shared characteristics. In contrast with the standard
dynamic programming methods which use local edit distance models, the Walking
Tree heuristic method was created to handle non-local changes, e.g., translocations,
inversions, and duplications, altogether and...
Realistic (ideally photorealistic) real-time rendering has remained an elusive goal in computer graphics. While photorealistic rendering has certainly been achieved at the expense of tremendous computational resources and corresponding rendering times; real-time rendering typically must accept a great number of compromises to achieve adequate performance, such as aliasing artifacts, the...
Oftentimes in visualization, the goal of using volume datasets is not just to visualize them but also to analyze and compare them. In order to compare the two volumes, we cannot take all the voxels into consideration. The size of a typical volume data set is quite large (maybe a...
3D datasets acquire great importance in the context of medical imaging. In this thesis we survey and enhance solutions to problems inherently associated with 3D datasets-processing time,noise and visualization. Efforts include development of a tool kit to provide a multi-threaded processing platform to cut processing time, produce real time visualization...
Uploading everyday information about food intake, sleep, number of steps and then generating consolidated peer visual reports for participants in large-scale health studies, often divided into multiple treatment groups, can be challenging.
This challenge is even bigger if subjects are young teenagers between the age of 14-19 active in sports,...
Graphics hardware in mobile devices has become more powerful, allowing rendering techniques such as ray-cast volume rendering to be done at interactive rates. This increase of performance provides desktop capabilities combined with the portability of a tablet. Volumes can demand a high amount of memory in order to be loaded...
Open Source software gives users the freedom to copy, modify and redistribute source code without legal entanglements. The evolution of these software communities usually depend a lot on how the participating developers and users interact and co-operate with each other. Over the past few years, open source software have become...
N-ary relationships, which relate N entities where N is not necessarily two, are omnipresent in real life. In this thesis, we develop a visualization technique for N-ary relationships.
First, we propose a visual metaphor that utilizes vertices and polygons to represent entities and N-ary relationships. Based on this visual metaphor,...
Transportation infrastructure provides a vital service for the functionality of a
city. The efficient design of road networks poses an interesting topic in computer
science for digital content developers. For civil engineers, the visualization of
analysis results on infrastructure both efficiently and intuitively is crucial. The
following contributions are made...
Cold air pools are spatiotemporal phenomena that occur when cold air from higher elevations roll down the slope to accumulate in lower elevations. Behaviors like this lead to microclimate anomalies such as the city of Corvallis (Oregon) experiencing persistent cold weather even on a sunny day. We analyze multivariate temperature...
Learning to recognize objects is a fundamental and essential step in human perception and understanding of the world. Accordingly, research of object discovery across diverse modalities plays a pivotal role in the context of computer vision. This field not only contributes significantly to enhancing our understanding of visual information but...
While individual portfolio diversity analysis is a well-studied problem in visualization, the visual analysis of individual or groups of portfolios, over time, has received little attention. Such analysis, however, is important to researchers who are interested in better understanding portfolio management behavior of experts as well as novices. We conducted...
With the increase in demand for streaming media capabilities across the Internet, the focus has shifted from traditional client-server to peer-to-peer approaches. Content Distribution Networks (CDNs) have also recently moved from web acceleration to media streaming. P2P CDNs can be used both as a delivery mechanism and as an independent...
This report presents an efficient method for semi-supervised video object segmentation – the problem of identifying foreground pixels occupied by a target object. The target is specified by the ground-truth mask in the first video frame. While the state of the art achieves a segmentation accuracy greater than 80%, it...
This thesis consists of two major components. The first part is concerned with video object instance segmentation (VOS), which is the task of assigning per-pixel labels perframe of a video sequence to indicate foreground object instance membership, given the first frame ground truth mask. VOS has myriad applications, from video...
With an increasing number of wireless applications at microwave frequencies, the frequency spectrum is becoming quite crowded. Due to this congestion, the current state of technology is leading towards upper microwave and millimeter wave spectra as they also offer other distinct advantages such as larger bandwidth and smaller component footprint....
Software history and version control systems (VCS) are an important source of information for developers. This entails the need for a principled understanding of developers’ information seeking in VCS, both for improving existing tools as well as understanding requirements for new tools. However, it is only recently that researchers have...
Information Foraging Theory (IFT) has successfully explained how people seek information in various domains, in turn, informing the design of several tools and information-intensive environments. However, prior research has not explored foraging in the presence of several, very similar variants of the same artifact. Such variants are commonplace in several...
The study of variational typing originated from the problem of type inference for variational programs, which encode numerous different but related plain programs. In this dissertation, I present a sound and complete type inference algorithm for inferring types of all plain programs encoded in variational programs. The proposed algorithm runs...
Over the last two decades, satisfiability and satisfiability-modulo theory (SAT/SMT) solvers have grown powerful enough to be general purpose reasoning engines throughout software engineering and computer science. However, most practical use cases of SAT/SMT solvers require not just solving a single SAT/SMT problem, but solving sets of related SAT/SMT problems....
With the development of technologies in genome sequencing and variant detection, a huge number of variants are detected. To further analyze the variants, it requires an efficient tool to annotate the functional effect of variants. This project managed to develop an efficient program to annotate the functional effect of variants...
In networked control systems (NCS) information or packets usually flow from a
sensor or a set of sensors to a remotely located controller. Then the controller
processes the received information and sends a series of control commands to the
actuators through a communication network which could be either wireless or...
When the term renewable energy is mentioned in a conversation, wind, solar, and hydro energy typically come to mind. However, there is one major resource that has remained mostly untapped: wave energy. Wind and solar power technologies are well established around the world but they cannot generate electricity all the...
Real time indoor positioning awareness systems aim to add localization capabilities to upcoming wireless technologies that are quickly becoming an important feature for indoor environment. RF-based impulse-radio ultra-wideband (IR-UWB) is a promising technology for in-door positioning systems due to obstacle penetration capabilities, immunity to multi-path and fading, and high resolution....
Desktop widget engines have emerged as an alternative for completing simple tasks without the need for a full-blown application or constant user interaction. Widgets can simply display data in a compact and visually appealing manner (such as stock tickers, weather forecasts, and news notifications), or go so far as to...
Air traffic flow management over the U.S. airpsace is a difficult problem. Current management approaches lead to hundreds of thousands of hours of delay, costing billions of dollars annually. Weather and airport conditions may instigate this delay, but routing decisions balancing delay with congestion contribute significantly to the propagation of...
In the field of Human-Computer Interaction, provenance refers to the complete history and genealogy of a document. Provenance can be useful in identifying related resources, such as different versions of the same document or resources used in the creation of a new document. Though methods of provenance collection and applications...
Appropriate representations of variational software simplify the analysis of their properties.This thesis proposes tailored representations of two kinds variational softwares: difference files of merge commits in Git and feature models. For the former, we use the Choice Edit Model, which is based on the choice calculus, to represent changes introduced...
Apple launched their first “tap-and-pay” mobile payment solution called “ApplePay” in October 2014 in the United States. Quickly catching up with the popularity of Apple Pay, Google launched their own mobile “tap-and-pay” paymentsolution called “Android Pay”. Both the companies claim that their tap-and-paysolutions are more convenient and more secure than...
Streaming media and interactive television viewing experiences are becoming more commonplace with the introduction of services such as Netflix Streaming, the Apple TV, and Google TV aided by the increase adoption of broadband internet. As these services make their way into the living room, and developers struggle to accommodate more...
Over the last decade, wind penetration in the Pacific Northwest has increased rapidly. The variable nature of this massive new resource has increased stress on the hydropower resource to the point where system limits are currently being reached. In order to cultivate continued growth of the wind energy industry both...
Continuous integration (CI) systems automate the compilation, building, and testing of software. Despite CI rising as a big success story in automated software engineering, it has received almost no attention from the research community. For example, how widely is CI used in practice, and what are some costs and benefits...
Scientists and engineers have to analyze and query multiple large databases. Analysis over databases created by phasor measurement units can provide insight into the health of the grid, thereby improving control over operations. Realizing this data-driven control, however, requires validating, processing and storing massive amounts of PMU data efficiently, which...
A Mobile Ad-hoc NETwork (MANET) is collection of wireless mobile nodes without a network infrastructure or centralized administration. Although MANETs can be used in many applications, such as mobile Internet, military communication, and disaster relief networks, a number of challenges remain. These include routing, medium access control, security, scalability, energy...
Software maintenance accounts for a large portion of the software development cost, particularly the process of updating programs either to adapt for requirement change or to enhance design or efficiency. Currently, program updates are generally performed manually by programmers using text editors. This is an unreliable
method because syntax and...
Recent developments in computing technology have generated a demand for more streamlined and effective test systems. By replacing traditional in-chassis wired interconnects with a broadcast wireless system, fault detection and error susceptibility will drastically improve, input/output capabilities will expand, and routing complexity will decrease. Ultra-wideband impulse radio's (UWB-IR) characteristic multipath-immunity...
Enabled by a rich ecosystem of Machine Learning (ML) libraries, programming using learned models, i.e., Software-2.0, has gained substantial adoption. However, we do not know what challenges developers encounter when they use ML libraries. With this knowledge gap, researchers miss opportunities to contribute to new research directions, tool builders do...
A bad software development process leads to wasted effort and inferior products. In order to improve a software process, it must be first understood. In this work I focus on understanding software processes.
The first process we seek to understand is Continuous Integration (CI). CI systems automate the compilation, building,...
End users' programs are fraught with errors, costing companies millions of dollars. One reason may be that researchers and tool designers have not yet focused on end-user debugging strategies. To investigate this possibility, this dissertation presents eight empirical studies and a new strategy-based end-user debugging tool for Excel, called StratCel....
The ability to extract uncertainties from predictions is crucial for the adoption of deep learning systems to safety-critical applications. Uncertainty estimates can be used as a failure signal, which is necessary for automating complex tasks where safety is a concern. Furthermore, current deep learning systems do not provide uncertainty estimates,...
Impulse-radio ultra-wide-band (IR-UWB) signaling is a promising technique
for high-speed, short-range relay communications networks. Depending on how
the relay node retransmits the signal, there are two main relay schemes: conventional
one-directional (one-way) relay model, and bi-directional (two-way) relay
model. In bi-directional relay communications, wireless network coding (WNC),
also called physical-layer...
This paper proposes a novel means of using analog correlators to improve upon existing Ultra-Wideband receiver architectures. Current architectures aim for an all-digital design for the sake of ease of implementation and conceptual simplicity. This causes some notable design challenges including an ultra-high sampling rate, and difficulty capturing multipath energy....
Indoor localization systems have a variety of applications such as tracking of assets, indoor robot navigation, and monitoring of people (e.g. patients) in hospitals or at home. Global positioning system (GPS) offers location accuracy of several meters and is mainly used for outdoor location-based applications as its accuracy degrades significantly...
As the number of autonomous data collection applications keep increasing, the demand for wireless sensor networks (WSNs) has seen explosive growth. In this dissertation, an ultra-low-energy WSN transmitter is developed to reduce the energy consumption of sensor nodes in WSNs. With an ultra-low-energy transceiver, it is possible to eliminate the...
In wireless sensor network applications, low-power operation of the wireless receiver is critical. To address this need an ultra-low power Binary Frequency Shift Keying (BFSK) receiver using the super-regenerative architecture is developed.
A prototype receiver is built and tested for operation in the 900 MHz ISM band. Lab measurements show...
Low energy design techniques for digital circuits are examined to determine their suitability for use in a digital logic controller for wireless sensor network nodes. Transistor level simulations are used to evaluate the techniques and those demonstrating an energy reduction are used to implement a digital logic controller. The digital...
This thesis presents a low-energy application specific digital controller for a battery-free 2.4 GHz wireless sensor network (WSN) node. The digital controller has been designed and fabricated in a standard 0.13 μm CMOS and implements a simple protocol for WSNs. Techniques such as supply voltage reduction and power gating have...
Silicon photonics has become the most promising platform for future large-scale optical interconnect and optical computing systems due to its inherent CMOS compatibility, which brings exclusive advantages in bandwidth density, energy efficiency, and cost effectiveness. Parallel optical interconnects based on photonic integrated circuits (PICs) have the capacity to meet the...
In Radio Frequency Integrated Circuits (RFIC) or high frequency digital
ICs, there is a demand to probe the internal nodes for testing. The ultra low
capacitance RFIC probe presented in his work is a flexible tool for these
applications. The probe utilizes the coupling between a tungsten needle and the...
We consider the problem of tactical assault planning in real-time strategy games where a team of friendly agents must launch an assault on an enemy. This problem offers many challenges including a highly dynamic and uncertain environment, multiple agents, durative actions, numeric attributes, and different optimization objectives. While the dynamics...
Ensuring correctness of real-world software applications is a challenging task. Testing can be used to find many bugs, but is typically not sufficient for proving correctness or even eliminating entire classes of bugs. However, formal proof and verification techniques tend to be very heavy weight and are simply not available...
Emergence of highly accurate Convolutional Neural Networks (CNNs) with the capability to process large datasets, has led to their popularity in many applications, including safety/security-sensitive (e.g. disease recognition, self-driving cars). Despite the high accuracy of convolutional neural networks, they have been found to be susceptible to adversarial noise added to...
The project team surveyed and interviewed forty identified experts within the diverse tsunami community. The survey revealed that this community is a sophisticated user of Internet search engines and tools and is very familiar with existing information. The sites mentioned most frequently as being helpful were those of the National...
People like going on trips with friends and tend to plan their trips well in advance to have the best possible experience of a destination and get the most out of the places they visit and/or the activities they plan to partake in. Right now, the Internet provides a wealth...
This thesis focuses on two aspects of transparent electronics, SnO₂ transparent thin-film transistors (TTFTs) and transparent circuits. Both depletion- and enhancement-mode SnO₂ TTFTs are realized. The maximum effective mobility for the depletion- and enhancement-mode devices are 2 cm²V⁻¹s⁻¹ and 0.8 cm²V⁻¹s⁻¹, respectively. A variety of techniques to decrease the carrier...
Hybrid automatic repeat request (HARQ) schemes combine packet retransmission with forward error correction to ensure a reliable communications. In multiple-input multiple output (MIMO) systems, interference cancellation (IC) detection is widely used where the detection and cancellation steps of the simultaneously transmitted data streams occur. In principle, the signal stream estimated...
Tracr is a modern browser-based user interface, designed to be used with languages that can generate customized explanations from execution traces. While Tracr is primarily designed for use with the Xtra language, Tracr defines a generalized interface that would allow it to be used with other languages as well. Explanations...
With the rapid advancement of educational technology and the need for personalized, engaging content to accommodate diverse learning needs, Virtual Reality (VR) holds promises for the present and future. However, VR applications suffer from challenges, including usability concerns, lack of pedagogical value, and evaluation standards. This thesis focuses on two...
Increasing threats of terrorism and contraband smuggling have led to a growing interest in millimeter wave/ THz security sensors. Recently, systems combining active and passive sensing into one unit have been proposed where the active mode provides information on range and reflectivity, and the passive mode complements the active by...
Narratives are central to communication and the human experience. For a computer system to understand a narrative, it must be able to identify the key facts or plot elements that describe what happened or how the world has changed. These element are called events;establishing a document’s events and the relationships...
The rapid population growth in large urban cities has led to an unprecedented increase in both the number and the diversity of wireless devices and applications with varying quality of service requirements in terms of latency and data rates. LinkNYC is an example of an urban communication network infrastructure, which...
Software maintenance tasks often require finding information within existing code, which is time-consuming and difficult even for professional programmers. For example, programmers may need to know what code implements certain functionality or what is the purpose of certain code. In response, researchers have developed tools to help programmers find information...
Simultaneous speech translation (SimulST) is widely useful in many cross-lingual communication scenarios, including multinational conferences and international traveling. Since text-based simultaneous machine translation (SimulMT) has achieved great success in recent years. The conventional cascaded approach for SimulST uses a pipeline of streaming ASR followed by simultaneous MT but suffers from...
In recent years, RF (Radio Frequency) device fingerprinting using deep learning has emerged as a method of identifying devices solely by their RF transmissions. Conventional approaches to this type of device fingerprinting are not portable to different domains. That is, if a model for this purpose is trained on data...
Developers frequently change the type of a program element and update all its references for performance, security, concurrency, library migration, or better maintainability. Despite type changes being a common program transformation, it is the least automated and the least studied. Manually performing type changes is tedious since the programmers have...
There has been little research into how end users might be able to communicate advice to machine learning systems. If this resource--the users themselves--could somehow work hand-in-hand with machine learning systems, the accuracy of learning systems could be improved and the users' understanding and trust of the system could improve...
The results of a machine learning from user behavior can be thought of as a program, and like all programs, it may need to be debugged. Providing ways for the user to debug it matters because without the ability to fix errors, users may find that the learned program’s errors...
In this thesis, we introduce a novel Explanation Neural Network (XNN) to explain the predictions made by a deep network. The XNN works by embedding a high-dimensional activation vector of a deep network layer non-linearly into a low-dimensional explanation space while retaining faithfulness i.e., the original deep learning predictions can...
In this work, I examine the problem of understanding American football in video. In particular, I present several mid-level computer vision algorithms that each accomplish a different sub-task within a larger system for annotating, interpreting, and analyzing collections of American football video. The analysis of football video is useful in...
In recent years there have been many improvements in the reliability of critical infrastructure systems. Despite these improvements and despite targeted efforts to improve the operation and control of the electric grid, the power systems industry has seen relatively small advances in this regard. For instance, today's power system is...
Analysis, visualization, and design of vector fields on surfaces have a wide variety of major applications in both scientific visualization and computer graphics. On the one hand, analysis and visualization of vector fields provide critical insights to the flow data produced from simulation or experiments of various engineering processes. On...
This work presents a new energy saving technique for modern digital designs. We propose Time Interleaved Multi-Rail (TIMR) - a method for providing two dynamic supply rails to a circuit. This technique uses the first supply rail to mask the transition delay while changing the voltage of the second rail....
In the first part of this dissertation, low frequency l/f or flicker noise in the frequency range of Hz to kHz has been identified and demonstrated to be described by temperature fluctuations in heat conduction in bipolar transistors operated at higher power densities. This noise phenomenon is not described by...
Timing attacks enable an attacker to extract secret information from a cryptosystem by observing timing differences with respect to different inputs given to an encryption or decryption algorithm. Werner Schindler has proposed a timing attack on smart card devices. We implemented this attack based on the same approach for RSA...
In this dissertation, time-based signal processing techniques and their applications in oversampling and noise-shaping data converters are examined. These techniques demonstrate the ability to shift the burden of high performance analog circuits from the compressed voltage-domain to the augmented time-domain. First, the potential of high order noise-shaping and phase-domain feedback...
As CMOS processes size continues to shrink, a number of factors limit the ability of analog circuit performance to scale with the process. These issues include smaller transistor intrinsic gains and lower supply voltages. However, scaling continues to increase the speed and decrease the power of digital circuits. In this...
In an industrial and consumer electronic marketplace that is increasingly demanding greater real-world interactivity in portable and distributed devices, analog to digital converter efficiency and performance is being carefully examined. The successive approximation (SAR) analog to digital converter (ADC) architecture has become popular for its high efficiency at mid-speed and...
Recent advances in wireless technologies have helped the proliferation of wireless devices, ranging from hand-held devices such as cellular phones to more powerful mobile computing platforms as such laptops [1]. Along with that, the end users’
applications running on these devices, ranging from text message to multimedia applications such as...
Threshold-based time of arrival (TOA) estimation is a technique for high-precision indoor localization. Existing threshold selection methods, such as xed thresh- old and normalized threshold methods, do not consider the signal-to-noise radio (SNR) value at the receiver. This is not desired for high-precision positioning. A proper threshold value depends on...
RNA structure prediction is a challenging problem, especially with pseudoknots. Recently, there has been a shift from the classical minimum free energy-based methods (MFE) to partition function-based ones that assemble structures based on base-pairing probabilities. Two typical examples of the latter group are the popular maximum expected accuracy (MEA) method...
High Performance Computing can find ubiquitous applications in the industry. HPC-applications are specifically designed to take advantage of the parallel nature of the computing systems which is often enabled by Multi-core/Many-core architectures. With this advent of Multi-processors in the mainstream systems, inter-core communication has been one of the major challenges...
Coarse resolution imagery, such as that produced by the MODIS instrument, poses the challenge of estimating sub-pixel proportions of di erent land cover types. This problem is di cult because of the variety and variability of vegetation within individual pixels. This thesis describes and compares two existing algorithms for estimating...