 document

van Kempen, Matt (author)In this paper we started by explaining what a Markov chain is. After this we defined some key concepts such as stationarity, reversibility and ergodicity which were used throughout the rest of the paper. Next, the classical central limit theorem was stated in order to refresh the reader of this theorem and to show that, because of the dependence...bachelor thesis 2022
 document

Gort, Timo (author)<i>Context.</i> In the nearfuture, exoplanets can be observed directly through telescopes. Although the resolution of the planet's image will only be one pixel at first, the intensity of this pixel will change over time because of the orbit around its host star and its diurnal rotation. This intensity as a function of time is called the light...bachelor thesis 2022
 document

Ronner, Arthur (author)In this report, a model is presented to alleviate some of the computational work that goes into the effort of finding the magnetic properties of magnetocaloric materials. The model utilizes an interior point optimization routine to solve for the minimal exchange energy configuration of a system, given the exchange interactions of the material....bachelor thesis 2022
 document

Gajadhar, Vivek (author)Dose calculations in proton therapy need to be computed as fast as possible for successful cancer treatment planning and execution. The dose calculation algorithms that provide enough accuracy for treatment planning, takes too much time to utilise; therefore there is a need for faster alternatives. One of the alternatives is using a...bachelor thesis 2022
 document

Swinkels, Bart (author)The "Number Hides Game" (NHG) is 2player game played on a board that consists of a row of p consecutive coins. Player I and player II simultaneously choose subsets of m and n consecutive coins respectively. Player II pays the number of coins that lie in the intersection of the subsets to player I. This thesis introduces basic knowledge from the...bachelor thesis 2022
 document

Mulder, Tim (author)This thesis develops a method to map the surface of an exoplanet. The problem of exoplanet mapping sounds easy to solve. Take a few photographs of an exoplanet and sew them together to create a map of the surface. The telescope required to do this is far beyond our technological capabilities. However, our current telescopes could allow us to...bachelor thesis 2022
 document

de Graaff, Ruben (author), Fontenai, Nicolas (author)In 2019 the European Aviation Environmental Report stated showed a relative increase in CO2 emissions of 16% compared to 2005 to 2017. It also stated that an increase of 42% is expected according to current models. Aviation is thus a big sector of the global warming problem. The solution to this is to go full electric. There are already more...bachelor thesis 2022
 document

Bhagat, Naval Tapan (author)Visible Light Positioning (VLP) is an emerging field of research with several possible application. While most stateoftheart VLP systems work with active modulation of light (switching lights on/off rapidly), this poses issues such as the flickering problem and excessive power consumption. In contrast, passive modulation of light (twisting...bachelor thesis 2022
 document

Narchi, William (author)This paper presents how a convolutional neural network can be constructed in order to recognise gestures using photodiodes and ambient light. A number of candidates are presented and evaluated, with the most performant being adopted for indepth analysis. This network is then compressed in order to be ran on an Arduino Nano 33 BLE...bachelor thesis 2022
 document

Durmuş, Merdan (author)Visible Light Communication (VLC) is becoming an important research area where Visible Light Sources such as LED, Halogen Lamps and even the sun can be used for Wireless Communication. LEDtoCamera Communication is a form of VLC, where the camera can notice intermittent stimuli changes above a certain threshold frequency (flicker fusion...bachelor thesis 2022
 document

Dijkstra, Finn (author)Packages to encode Machine Learned models into optimization problems is an underdeveloped area, despite the advantages is could provide. The main draw of implementing Machine Learned models into optimization models, is that it allows the optimizer to better account for the human experience.<br/>Maragno D., Wiberg H. et al. constructed an...bachelor thesis 2022
 document

Halevy, Avi (author)In this work residual error estimates are constructed using Neural Networks for Finite Element Method. These can be used to do adaptive mesh refinement. Two neural networks are developed the Multilayer Perceptron and the Transformer model. The error estimates are made for 1d poisson equations but the idea will generalise to higher dimensions as...bachelor thesis 2022
 document

van Dam, Otte (author)Previous studies have found that there is a strong correlation between the social presence of a teacher and perceived performance of students, and that an increased cognitive load decreases the effectiveness in problem solving. The objective of this study was to find out to what extend holograms can be used to improve the social presence of the...bachelor thesis 2022
 document

Glasbeek, Arnoud (author)In agricultural studies it is often important to predict the performance of genetically different plants. To make sure predictions are done well, it is necessary to make sure they are not influenced by effects of the field on which they are planted. These field effects or spatial effects are in practice often quite complicated and can be due to...bachelor thesis 2022
 document

Datema, Tobias (author)In this thesis, we consider the threshold metric dimension problem of graphs, related to and motivated by source detection.<br/>We construct a graph G = (V,E) for a given set of sensors of size m: {s1, s2, ..., sm} and a range k > 0. We want that each node v ∈ V has a unique combination of distances (dk (s1, v),dk (s2, v), ...,dk (sm, v)),...bachelor thesis 2022
 document

van Donkelaar, Mirko (author)A code C is defined to be a set of S words, where a word is a sequence of n entries. We call S the size and n the length of the code. The entries of the code can have k different values, {0, .., (k − 1)}. Define a perfect khash code (PHC) as a code with the property that any collection of v words in the code is different at at least one index....bachelor thesis 2022
 document

Velev, Viktor (author)In the past decade datadriven approaches have been at the core of many business and research models. In critical domains such as healthcare and banking, data privacy issues are very stringent. Synthetic tabular data is an emerging solution to privacy guarantee concerns. Generative Adversarial Networks (GANs) are one of the emerging solutions...bachelor thesis 2022
 document

Daemen, Mieke (author)The main aim of the research presented in this report is investigating analytical methods to model fluidstructure interaction in largescale offshore floating photovoltaics. The model that was attempted to be solved analytically is based on a model presented by Pengpeng Xu (2022).<br/>The dimensions in the equations were removed. Applying a...bachelor thesis 2022
 document

Heezen, Mark (author)Many drugs cannot be made without homogeneous catalysis. To increase the yield of drug synthesis, the search for new catalysts continues. Computational catalysis is becoming a more prominent tool since it en ables to screen many catalysts without performing (m)any laboratory experiments. In this research a com putational workflow has been...bachelor thesis 2022
 document

van de Klok, Margot (author)Describing phylogenetic trees or networks with a polynomial is a tool to distinguish between them. In this thesis, a new polynomial for describing rooted binary internally labeled phylogenetic networks and trees is introduced based on the research of P. Liu and J. Pons et al. Two different cases are considered, one where the reticulation nodes...bachelor thesis 2022