- document
-
Suryanarayanan, Surya Narayanan (author)Inverse design with topology optimization has followed the same computational<br/>graph for decades. The unknown material density is distributed within a domain,<br/>a computational analysis predicts the response of that design and its derivative<br/>with respect to the unknown, and this information is used by a chosen gradientÂ<br/>based...master thesis 2021
- document
-
Chandra, Anant (author)A Low-Pressure Micro-resistojet (LPM) is a type of in-space electrothermal propulsion system for satellites that works by heating low-pressure (50 to 300 Pa) fluid flowing through microchannels/slots (typically <1 mm diameter) using resistive heating elements like thin-film Molybdenum. This thesis delineates a response surface based method to...master thesis 2021
- document
-
Mikalauskas, Liudas (author)Logging is a common practice in software development that assists developers with the maintenance of software. Logging a system optimally is a challenging task, thus Li et al. have proposed a state-of-the-art log recommendation model. However, no further attempts exist to improve the model or reproduce their results using different training data...bachelor thesis 2021
- document
-
Molenaar, Mitchel (author)Patellar tendinopathy (PT) is a common manifestation in jumping sports characterized by pain and a reduced load bearing capacity. The exact cause of PT has not been determined, which makes it difficult to prevent and treat. A stiffer landing technique might be a risk-factor for PT. Retraining of the landing technique into a less stiffer...master thesis 2020
- document
-
van der Valk, Daan (author)Side-channel attacks (SCA) aim to extract a secret cryptographic key from a device, based on unintended leakage. Profiled attacks are the most powerful SCAs, as they assume the attacker has a perfect copy of the target device under his control. In recent years, machine learning (ML) and deep learning (DL) techniques have became popular as...master thesis 2019