- document
-
Bestebreur, Timon (author)The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...master thesis 2024
- document
-
Rätz, R. (author), Ratschat, A.L. (author), Cividanes Garcia, N. (author), Ribbers, G.M. (author), Marchal Crespo, L. (author)In stroke rehabilitation, simple robotic devices hold the potential to increase the training dosage in group therapies and to enable continued therapy at home after hospital discharge. However, we identified a lack of portable and cost-effective devices that not only focus on improving motor functions but also address sensory deficits. Thus, we...journal article 2024
- document
-
Anker, Thomas (author)Post-mortem interval estimation (PMI) is a key part of forensic investigation. Accurately obtaining a PMI early in the investigative process improves the reconstruction of events, directs follow-up research and narrows down suspects in case of homicide. Currently, PMI is determined using Henssge’s nomogram requiring ambient temperature, rectal...master thesis 2023
- document
-
Moonen, Anne (author)This project addresses the subject of integrating Computerized Maintenance Management Systems (CMMS) into low-to-middle income healthcare contexts, with a specific focus on Nepal. CMMS play a prominent role in enabling Biomedical Equipment Technicians (BMETs) to monitor and optimize the performance of medical equipment (WHO, 2012), streamline...master thesis 2023
- document
-
Juhošová, Sára (author)Formal verification is a powerful tool for ensuring program correctness but is often hard to learn to use and has not yet spread into the commercial world. This thesis focuses on finding an easy-to-use solution to make formal verification available in popular programming language ecosystems. We propose a solution where users can write code in an...master thesis 2023
- document
-
Voorneveld, Elvira (author)Behavior support applications aim to provide personalized and flexible support to users in various domains. To achieve this, understanding users' preferences, values, and context is crucial. Creating user models that incorporate users' norms and values has been proposed as a solution to capture the relationship between desired behaviors and...bachelor thesis 2023
- document
-
Abdelgawad, Ahmed A. (author), Comes, M. (author)Evaluation and testing are significant steps in developing any information system. More attention must be devoted to these steps if the system is to be used in high-risk contexts, such as the response to conflict disasters. Several testing methodologies are designed to guarantee that software fulfills technology requirements; others will assure...book chapter 2023
- document
-
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...journal article 2023
- document
-
Meijer, Mirjam (author)In this graduation project for the start-up Dispertech, the usability and workflow of their NanoCET device is improved. The NanoCET is a research tool used in hospital and university laboratories, for which the following problem was stated: researchers and technicians working in labs have difficulty setting up and using the NanoCET device and...master thesis 2022
- document
-
Cardaioli, Matteo (author), Conti, M. (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)Ideally, secure user sessions should start and end with authentication and de-Authentication phases, respectively. While the user must pass the former to start a secure session, the latter's importance is often ignored or underestimated. Dangling or unattended sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, the...conference paper 2022
- document
-
Rometsch, Flavie A.A.S.D.T. (author), Casini, Andrea E.M. (author), Drepper, Anne (author), Cowley, Aidan (author), de Winter, J.C.F. (author), Guo, J. (author)Humans are embarking on a new era of space exploration with the plan of sending crewed spacecraft to the Moon, Mars, and beyond. Extravehicular activities (EVAs) will be an essential part of the scientific activities to be carried out in these missions, and they will involve extensive geological fieldwork. These EVAs entail many challenges as...journal article 2022
- document
-
Dorronzoro-Zubiete, Enrique (author), Rivera-Romero, Octavio (author), Giunti, Guido (author), Sevillano, José Luis (author)The lifespan of older people is growing together with their proportion in the population growth in the older population. This leads to an increasing need for support services for older adults who will inevitably experience a significant decrease in their cognitive capabilities and mental health conditions. Cognitive functions, including...book chapter 2022
- document
-
Pilshchikova, L. (author), Zuiderwijk-van Eijk, A.M.G. (author), Janssen, M.F.W.H.A. (author)Non-profit organisations (NPOs) are one type of open data intermediaries connecting different actors in the open data ecosystem. They perform a number of activities, from requesting the government to open up the data to application development. Such activities can have an effect on open data usability barriers that other actors in the open data...conference paper 2022
- document
-
Bengtson, M.L. (author), Onasanya, A.A. (author), Oyibo, P.O. (author), Meulah, Brice (author), Samenjo, K.T. (author), Braakman, I.G. (author), Andi, Wellington Oyibo (author), Diehl, J.C. (author)Schistosomiasis is a neglected tropical disease thatis predominantly diagnosed by conventional microscopy in Sub-Saharan Africa. However, effective diagnosis by conventional microscopy is limited by multiple technical and logistic barriers.Alternative diagnostic techniques are needed. The Schistoscope is a digital optical device that has been...conference paper 2022
- document
-
Wenk, Nicolas (author), Buetler, Karin A. (author), Penalver-Andres, Joaquin (author), Müri, René M. (author), Marchal Crespo, L. (author)Background: The relearning of movements after brain injury can be optimized by providing intensive, meaningful, and motivating training using virtual reality (VR). However, most current solutions use two-dimensional (2D) screens, where patients interact via symbolic representations of their limbs (e.g., a cursor). These 2D screens lack depth...journal article 2022
- document
-
Faber, Robin (author)Agent-based simulation models are rising in popularity recently due to their ability to model real-world problems in a wide range of domains. Inherent to these types of simulations is the fact that an enormous amount of data can be generated, which needs to be analysed in order to make the simulation useful. At the moment, the available tools to...master thesis 2021
- document
-
Steenbergen, Merel (author)Self-sovereign identity (SSI) provides users of the internet control over their own data by letting them store it on their own device or in a decentralized way, such as on a blockchain. The Super App is an SSI application currently under development by the Delft Blockchain Lab, but it still lacks one of the core features of SSI, which is...bachelor thesis 2021
- document
-
Beeris, Casper (author)Nacra is a catamaran builder focused on racing catamarans. Nacra wants to broader its target market. The design goal is to develop a solution that makes Nacra’s recreational catamarans accessible but look and feel high-performance. The project results in a more accessible catamaran for novice sailors and sailors without prior<br/>experience on a...master thesis 2021
- document
-
Wenk, N. (author), Penalver-Andres, J. (author), Buetler, K. A. (author), Nef, T. (author), Müri, R. M. (author), Marchal Crespo, L. (author)Virtual reality (VR) is a promising tool to promote motor (re)learning in healthy users and brain-injured patients. However, in current VR-based motor training, movements of the users performed in a three-dimensional space are usually visualized on computer screens, televisions, or projection systems, which lack depth cues (2D screen), and...journal article 2021
- document
-
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...journal article 2021