Av
A.J. van Genderen
32 records found
1
Disinfection of seeds is a method used by the seed industry to remove pathogens. However, conventional methods have their shortcomings in terms of energy efficiency and yield. This thesis focuses on the design of a fluidized bed setup with sensors for the purpose of DBD plasma di
...
Plasma DBD Electrodes
For a Seed Disinfection Fluidized Bed Reactor
As a novel alternative for conventional seed disinfection methods, a new design has been proposed in this report using a surface dielectric barrier discharge (SDBD) fractal electrode. The discharge mechanism for this electrode is a diffuse microdischarge under AC or short-pulsed
...
Mechanism to detect mismatches and provide recommendations about the users' preference in negotiation support systems
A case study about issue weight mismatches with the pocket negotiator
Negotiation Support Systems (NSSs) can provide help based on the preference setting (domain, issue weights, issue ranking, strategies, etc.) of the users of the systems. However, sometimes the users of the systems might make mistakes in the preference setting. With wrong preferen
...
Agar/NaCl tissue phantom mimicking electrical properties of human body in low frequency spectrum
A Brain-Computer Interface Inside Your Earphones
This report details the design and development of an agar/NaCl gel-like tissue phantom mimicking the electrical properties of wet human skin. The skin phantom provides a reliable, reproducible testing ground for dry-contact polydimethylsiloxane (CNT/PDMS) electrodes, with the aim
...
Global Navigation Satellite Systems (GNSSs) have become a critical part of the infrastructure of modern society. Radio interference can introduce position or timing errors in systems that use GNSS or, in a worst-case scenario, block the reception of GNSS signals in full. Part of
...
Voxelwise rs-fMRI representation learning
A non-linear variational approach
Resting-state fMRI (rs-fMRI) has become an important imaging modality and is commonly used to study intrinsic brain networks. These networks can be obtained by decomposing rs-fMRI data into components, using independent component analysis (ICA). Recently, these ICA components hav
...
With modern multi-function radars becoming more flexible, handling the limited amount of resources of these radars becomes increasingly important. In this thesis the radar resource management (RRM) problem in a multi-target tracking scenario is considered. Partially observable Ma
...
Gathering a Machine Learning dataset for object detection from a satellite-platform
On bandwidth-efficient gathering of a Machine Learning dataset for Object Detection with Faster-RCNN from a satellite-platform
In the past years, small Earth Observation (EO) satellites have become increasingly capable of taking high-resolution images at high sample rates. These images contain valuable information for different sectors, such as the agricultural and military sector. Furthermore they can c
...
What Humans Consider Good Object Detection
Analysis on how automatic object detectors align with what humans consider good object detection
How do automatic object detector outputs align with what humans consider good object detection? Our study is based on the responses of 70 participants for a survey. The participants are presented with images having bound- ing box predictions, their task is to choose images which
...
Designing a wireless communication system for smart sensor shorts in football
Using lossless data compression and pattern diversity
Decreasing injuries in football is a topic of interest for the KNVB and KNHB. To reach this goal, the use of smart sensor pants is researched. The data will be used to develop models for finding injury risk factors that are related to movements. Currently, the system is capable o
...
2.5D shape display is a recent idea in the market that emerged as a platform of interaction between a computer and human. 2.5D shape display is essentially a grid-like matrix consisting of actuators and pins moving up and down in vertical motion to create pseudo-3D images. Focuse
...
Software bugs in many different variants can potentially leak sensitive data to an attacker. Implementing a separation mechanism for security domains can prevent incorrect or malicious code to leak sensitive data from one security domain to another. This work presents a separatio
...
We present a new MAC protocol for networks of devices. We specifically target certain applications. To cater for this setting, we introduce a new concept. This concept is instrumental to improve performance in these network scenarios. We build a proof of concept implementation of
...
This thesis report focuses on possible methods of digital implementation of motional feedback in a bass loudspeaker. In this thesis, the control system will be created for a monopole and a dipole speaker specifically. It does so by sketching the outlines of such a
...
Interactive Learning in State-space
Enabling robots to learn from non-expert humans
Imitation Learning is a technique that enables programming the behavior of agents through demonstration, as opposed to manually engineering behavior. However, Imitation Learning methods require demonstration data (in the form of state-action labels) and in many scenarios, the dem
...
Long Range Wide Area Networks (LoRaWAN) offer easy deployment, robustness against interference, and operational longevity to energy constrained IoTdevices which communicate in a best-e_ort fashion in extended ranges. However, the simple (ALOHA-like) design of the MAC layer leads
...
UnmannedAerial Vehicles(UAVs) have multi-domain applications and fixed-wing UAVs are a widely used class. There is ongoing research on topics in view to optimize the control and guidance of UAVs. This work explores the design, implementation and Software-in-the-Loop validation of
...
In the past few years, convolutional neural networks (CNNs) have been widely utilized and shown state-of-the-art performances on computer vision tasks. However, CNN based approaches usually require a large amount of storage, run-time memory, as well as computation power in both t
...
Anomaly detection is a task of interest in many domains. Typical way of tackling this problem is using an unsupervised way. Recently, deep neural network based density estimators such as Normalizing flows have seen a huge interest. The ability of these models to do the exact late
...