Searched for: +
(1 - 20 of 168)

Pages

document
Holtgrefe, Tim (author)
Microtubules are long cylindrical polymers, assembled from tubulin proteins. Microtubule ends can be visualized using fluorescence and confocal microscopy. This allows for the study of microtubule dynamics. However, the manual annotation of microtubules is laborious, which is why automated tracking methods are used. In this project we have...
bachelor thesis 2023
document
Marinov, Atanas (author)
Multi-label learning is one of the hot problems in the field of machine learning. The deep neural networks used to solve it could be quite complex and have a huge capacity. This enormous capacity, however, could also be a negative, as they tend to eventually overfit the undesirable features of the data. One such feature presented in the real...
bachelor thesis 2021
document
Mikalauskas, Liudas (author)
Logging is a common practice in software development that assists developers with the maintenance of software. Logging a system optimally is a challenging task, thus Li et al. have proposed a state-of-the-art log recommendation model. However, no further attempts exist to improve the model or reproduce their results using different training data...
bachelor thesis 2021
document
van den Belt, Glenn (author)
Earthquakes can have tremendous effects. They can result in casualties, massive damage, and hurt the economy. Therefore, one would like to predict earthquakes as early as possible and with the highest accuracy possible. This paper contains the proposal for the optimal prediction-time, which is the time between the execution of a prediction and...
bachelor thesis 2022
document
d'Anjou, Raymond (author)
This study presents a comparison of different VariationalAutoencoder(VAE) models to see which VAE models arebetter at finding disentangled representations. Specificallytheir ability to encode biological processes into distinct la-tent dimensions. The biological processes that will be lookedat are the cell cycle and differentiation state. The...
bachelor thesis 2021
document
Runhaar, Yohan (author)
The increasingly growing expansion of the Internet of Things (IoT) along with the convergence of multiple technologies such as the arrival of next generation wireless broadband in 5G, is creating a paradigm shift from cloud computing towards edge computing. Performing tasks normally done by the cloud directly on edge devices would ensure...
bachelor thesis 2020
document
Applis, L.H. (author), Panichella, A. (author), van Deursen, A. (author)
Metamorphic testing is a well-established testing technique that has been successfully applied in various domains, including testing deep learning models to assess their robustness against data noise or malicious input. Currently, metamorphic testing approaches for machine learning (ML) models focused on image processing and object recognition...
conference paper 2021
document
Cao, Wen-Jun (author)
The train wheel flat is one of the most common damages in the railway system. It occurs when a wheel locks up while the train is moving. The early detection of wheel-flat severity is crucial for passenger comfort and the safety of the railway operation. However, it is still challenging to quantify the properties of wheel flats (e.g., sizes)...
conference paper 2020
document
Chaudhary, Shivam (author), Pandey, Pankaj (author), Miyapuram, Krishna Prasad (author), Lomas, J.D. (author)
In the modern world, it is easy to get lost in thought, partly because of the vast knowledge available at our fingertips via smartphones that divide our cognitive resources and partly because of our intrinsic thoughts. In this work, we aim to find the differences in the neural signatures of mind-wandering and meditation that are common across...
conference paper 2022
document
Lin, Y. (author), Wiersma, R.T. (author), Pintea, S. (author), Hildebrandt, K.A. (author), Eisemann, E. (author), van Gemert, J.C. (author)
Deep learning has improved vanishing point detection in images. Yet, deep networks require expensive annotated datasets trained on costly hardware and do not generalize to even slightly different domains, and minor problem variants. Here, we address these issues by injecting deep vanishing point detection networks with prior knowledge. This...
conference paper 2022
document
Yang, Ximei (author), Guendel, Ronny (author), Yarovoy, Alexander (author), Fioranelli, F. (author)
Human activities classification in assisted living is one of the emerging applications of radar. The conventional analysis considers micro-Doppler signatures as the chosen input for feature extraction or deep learning classification algorithms, or, less frequently, other radar data formats such as the range-time, the range-Doppler, or the...
conference paper 2022
document
Shengren, H. (author), Salazar, Edgar Mauricio (author), Vergara Barrios, P.P. (author), Palensky, P. (author)
Taking advantage of their data-driven and model-free features, Deep Reinforcement Learning (DRL) algorithms have the potential to deal with the increasing level of uncertainty due to the introduction of renewable-based generation. To deal simultaneously with the energy systems’ operational cost and technical constraints (e.g, generation-demand...
conference paper 2022
document
Abolfazli, Amir (author), Spiegelberg, Jakob (author), Anand, A. (author), Palmer, Gregory (author)
Configurable software systems have become increasingly popular as they enable customized software variants. The main challenge in dealing with configuration problems is that the number of possible configurations grows exponentially as the number of features increases. Therefore, algorithms for testing customized software have to deal with the...
conference paper 2023
document
Wu, L. (author), Ribera, Gerard (author), Beringuier-Boher, Noemie (author), Picek, S. (author)
Semi-invasive fault injection attacks are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selection of the fault injection parameters is of utmost importance and usually based on the experience of the attacker. Surprisingly, there exists no formal and general approach to...
conference paper 2020
document
Rahman, Muhammad Fazalul (author), Murukannaiah, P.K. (author), Sharma, Naveen (author)
Vacant lots are municipally-owned land parcels which were acquired post-abandonment or due to tax foreclosures. With time, failure to sell or find alternate uses for vacant lots results in them causing adverse effects on the health and safety of residents, and cost the city both directly and indirectly. Although existing research has tried to...
conference paper 2020
document
Gama, F. (author), Marques, Antonio G. (author), Leus, G.J.T. (author), Ribeiro, Alejandro (author)
In this ongoing work, we describe several architectures that generalize convolutional neural networks (CNNs) to process signals supported on graphs. The general idea of the replace time invariant filters with graph filters to generate convolutional features and to replace pooling with sampling schemes for graph signals. The different...
conference paper 2019
document
Gudi, A.A. (author), Bittner, M. (author), Lochmans, Roelof (author), van Gemert, J.C. (author)
Remote photo-plethysmography (rPPG) uses a remotely placed camera to estimating a person's heart rate (HR). Similar to how heart rate can provide useful information about a person's vital signs, insights about the underlying physio/psychological conditions can be obtained from heart rate variability (HRV). HRV is a measure of the fine...
conference paper 2019
document
Rijsdijk, Jorai (author), Wu, L. (author), Perin, G. (author)
Deep learning-based side-channel attacks are capable of breaking targets protected with countermeasures. The constant progress in the last few years makes the attacks more powerful, requiring fewer traces to break a target. Unfortunately, to protect against such attacks, we still rely solely on methods developed to protect against generic...
conference paper 2022
document
Nasri, Maedeh (author), Fang, Zhizhou (author), Baratchi, Mitra (author), Englebienne, Gwenn (author), Wang, Shenghui (author), Koutamanis, A. (author), Rieffe, Carolien (author)
Detecting and analyzing group behavior from spatio-temporal trajectories is an interesting topic in various domains, such as autonomous driving, urban computing, and social sciences. This paper revisits the group detection problem from spatio-temporal trajectories and proposes “WavenetNRI”, a graph neural network (GNN) based method. The...
conference paper 2023
document
Wu, L. (author), Perin, G. (author)
In recent years, the advent of deep neural networks opened new perspectives for security evaluations with side-channel analysis. Profiling attacks now benefit from capabilities offered by convolutional neural networks, such as dimensionality reduction and the inherent ability to reduce the trace desynchronization effects. These neural...
conference paper 2021
Searched for: +
(1 - 20 of 168)

Pages