Collection: education
(41 - 60 of 65)

Pages

document
Tideman, Leonoor (author)
Imaging mass spectrometry (IMS) is a multiplexed chemical imaging technique that enables the spatially targeted molecular mapping of biological samples at cellular resolutions. Within a single experiment, IMS can measure the spatial distribution and relative concentration of thousands of distinct molecular species across the surface of a tissue...
master thesis 2019
document
de Vries, Marieke (author)
This thesis is dedicated to the application of data science to sports data. The research for this thesis is part of a bigger project on injury prevention and sport performance called Citius Altius Sanius (CAS). Two data sets from two different projects within CAS are analysed, with two different goals; one focusses on sports injury prevention in...
master thesis 2019
document
Graur, Dan (author)
Given the increasing popularity of Machine Learning, and the ever increasing need to solve larger and more complex learning challenges, it is unsurprising that numerous distributed learning strategies have been brought forward in recent years, along with many large scale Machine Learning frameworks. It is however unclear how well these...
master thesis 2019
document
Friđriksdóttir, Esther (author)
Physical activity and mobility are important indicators of the recovery process of patients in the general ward of the hospital. Currently, monitoring mobility of hospitalized patients relies largely on direct observation from the caregivers. Accelerometers have the potential to quantify physical activity of patients objectively and without...
master thesis 2019
document
Kras, Etienne (author)
Today's coastal zones are densely inhabited as the majority of the world's population lives in these attractive areas. The shorelines in coastal zones are shaped by complex spatial and temporal variable interactions between natural forcings like changes in mean sea-level, tides, wave and wind conditions, and storm surges. Besides, natural...
master thesis 2019
document
van der Valk, Daan (author)
Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on unintended leakage. Profiled attacks are the most powerful SCAs, as they assume the attacker has a perfect copy of the target device under his control. In recent years, machine learning (ML) and deep learning (DL) techniques have became popular as...
master thesis 2019
document
Diab Montero, Hamed (author)
The study of Gravitational Waves (GWs) opened a new window of possibilities to improve our understanding of the Universe. GWs provide suitable astronomical messengers for studying events that were not possible before through electromagnetic radiation, or in other cases complementing their observations. Ground-based interferometers like LIGO have...
master thesis 2019
document
Roubos, Jochem (author)
To calculate tsunami forces on coastal structures, the wave type in front of the coast is of great importance. Hence this paper aims to find ways to predict the type of tsunami wave breaking. Based on literature review, video footage, analytical reasoning and numerical modelling (SWASH) it can be concluded that both the continental shelf slope ...
master thesis 2019
document
Tzounakos, Nikos (author)
The use of 3D models has been rapidly expanding, finding applications in both<br/>scientific and commercial fields. One common requirement for these various applications is the geometrical and topological validity of these models. However, many models available online contain deficiencies in various forms, such as duplicated geometry, gaps in...
master thesis 2019
document
Alkemade, Aaron (author)
To push the performance of the next generation Ultimaker 3D printers further, a new positioning system is required to improve the printing speed, print accuracy and print repeatability. The expectation is that a linear motor positioning system will perform significantly better than a conventional belt driven system. For this reason, the aim of...
master thesis 2019
document
de Jong, Richard (author)
Persistent surveillance is an urgent proficiency. For security, surveillance cameras are a strong asset as they support the automatic tracking of people and are directly interpretable by a human operator. Radar on the other hand can be used under a broad range of circumstances: radar can penetrate mediums such as clouds, fogs, mist and snow, and...
master thesis 2019
document
Janssen, Janeau (author)
In-situ sample holders with double-tilting capabilities are used to insert and position samples inside a transmission electron microscope for dynamic imaging. However, the performance of these sample holders, regarding energy-dispersive X-ray spectroscopy (EDS) analysis, is not on par with their single-tilt counterparts. By analyzing the EDS...
master thesis 2018
document
Montesinos García, Lucas (author)
Authentication is becoming an increasingly important application in the connected world and is driven by the growing use of mobile and IoT devices that use an increasing number of applications that require transactions of sensitive data. Security usually relies on passwords and/or two-factor authentication which are too intrusive for daily use....
master thesis 2018
document
Maton, Max (author)
Creating big datasets is often difficult or expensive which causes people to augment their dataset with rendered images. This often fails to significantly improve accuracy due to a difference in distribution between real and rendered datasets. This paper shows that the gap between synthetic and real-world image distributions can be closed by...
bachelor thesis 2018
document
Immerzeel, Ronald (author)
Every year about 1.25 million people die as a result of road traffic accidents. Besides the traffic on the road increases every day, including the environmental impact due to the corresponding traffic emissions. Autonomous driving could be a unique opportunity to increase these traffic safety, traffic flow efficiency and to reduce emissions in...
master thesis 2018
document
Samiotis, Ioannis Petros (author)
Side-Channel Attacks, are a prominent type of attacks, used to break cryptographic implementations on a computing system. They are based on information "leaked" by the hardware of a computing system, rather than the encryption algorithm itself. Recent studies showed that Side-Channel Attacks can be performed using Deep Learning models. In this...
master thesis 2018
document
Hemmes, Tom (author)
There is a paradigm shift from two- to three-dimensional data, from maps to information dense models. Self-driving cars, digitization of historic buildings or maintenance of highway infrastructure are a small selection of many applications that use laser scanning to acquire three-dimensional data of our physical surroundings. Most of these...
master thesis 2018
document
Sorgedrager, Riemer (author)
This study focuses on automated malaria diagnosis in low quality blood smear images, captured by a low-cost smartphone based microscope system. The aim is to localize and classify the healthy and infected erythrocytes (red blood cells) in order to evaluate the parasitaemia in an infected blood smear. Due to the lower quality of the smartphone...
master thesis 2018
document
Portengen, Leonoor (author)
Mangroves are forest ecosystems growing in (sub)tropical saline coastal environments. With their unique root structure they serve as important natural coastal protection and provide habitats with excellent conditions for cultivating fish, shrimp and crab species. Despite all benefits mangrove forests are disappearing at alarming rates around the...
master thesis 2017
document
van der Valk, Dirk (author)
In the Second World War Dutch New Guinea was a strategic battle front for both the Japanese and the Allied forces in the Pacific War. A lot of airstrips were constructed and bombed during this time, of which at least three (Mongosah, Otowari and Sagan) have never been visited after the war. This provided a great opportunity to find potential war...
master thesis 2017
Collection: education
(41 - 60 of 65)

Pages