 document

Cederhout, Q. (author)Dynamic Time Slot Management (DTSM) is a system often used in online retail to manage the delivery of goods to customers. With DTSM customers arrive over time and place orders. They get presented with a set of time slots and the customer picks the time slot in which he wants the goods to be delivered to his home. A DTSM system creates a time...master thesis 2020
 document

Stannat, Alexander (author)Online P2P file sharing networks rely on the cooperation of participants to function effectively. Agents upand download files to one another without the need for any central authority. If agents all contribute to the network and share roughly the same amounts of data as they contribute the network will operate, however if some agents decide to...master thesis 2020
 document

Slotboom, Cynthia (author)In a Vehicle Routing Problem with Time Windows (VRPTW), orders have to be picked up and delivered within certain time windows. In practice, planners often allow violations of these time windows, when the solutions with violations have better objective values. This is done by changing the problem into a Vehicle Routing Problem with Soft Time...master thesis 2019
 document

Slingerland, Eva (author)Nowadays, enormous amounts of data are produced on a daily basis. Whether it is a cute family<br/>picture, a funny cat video, or a scientic paper, all of the data is stored. The challenge in data<br/>storage nowadays is about nding a way to store a lot of data, in such a way that it will stay<br/>preserved for many years without too much...bachelor thesis 2019
 document

Janssen, AnneFleur (author)In Intensity Modiﬁed Proton Therapy, the number of energy layers and the number of beamlets determine the radiation time and the plan calculation time. The purpose of this research project is to test sparsity inducing terms to reduce both the energy layers and the beamlets.bachelor thesis 2019
 document

Mol, Jan (author)The Racah polynomial Rn(λ(x)) is a polynomial of degree n and is variable in λ(x). In this thesis two properties of this polynomial will be studied. One is the orthogonal property of the Racah polynomial. And the other is that the Racah polynomial can also be described as a polynomial of degree x and variable over λ(n). The Racah polynomials...bachelor thesis 2019
 document

van den Boom, Eddo (author)Symmetric and nonsymmetric Macdonald polynomials associated to root systems are very general families of orthogonal polynomials in multiple variables. Their definition is quite complex, but in certain cases one can define socalled interpolation polynomials that have a surprisingly simple definition and are related to the Macdonald polynomials...master thesis 2019
 document

Rissalah, Abdellah (author)In this thesis we research arithmetic progressions in random colourings of the integers. We ask ourselves how many arithmetic progressions are contained in zero density subsets of the integers? And what is the asymptotic distribution of the number of arithmetic progressions? Key motivation for this research are the famous results of Van der...bachelor thesis 2019
 document

Bachasingh, Ashni (author)In this thesis we try to capture the dependence structure of the publications of a scholar and the citations of those publications via copulas. To do so, we will use a sample of Quebec re searchers for who their publication amount as well as their citation amounts are known. We are provided with multiple variables concerning citation. We study...bachelor thesis 2018
 document

Wortelboer, Timo (author)In applying the levelset method in the context of a finiteelement method, errors can be minimized by adjusting the mesh to the shape of the levelset curve. The size of the different types of errors that occur depend on the goodness of fit to the zero levelset curve, the skewness of the triangles and the size of the triangles of the mesh. To...bachelor thesis 2018
 document

ten Hagen, Erik (author)Information is spatially distributed over data servers and for many services online it has to be available at all times, but those servers are not always available. If we store the information in a smart way, we might be able to still get our information even if we can not reach the servers.<br/>There are two factors we have to keep in mind when...bachelor thesis 2018
 document

Ros, Robin (author)There are several ways to write the number 5 as a sum of positive integers, disregarding order. A quick calculation shows that this can be done in 7 ways: 5 = 5, 5 = 4 + 1, 5 = 3 + 2, 5 = 3 + 1 + 1, 5 = 2 + 2 + 1, 5 = 2 + 1 + 1 + 1 and 5 = 1 + 1 + 1 + 1 + 1. In the same way, we can count the number of ways for each integer n. Although this...bachelor thesis 2018
 document

Wildschut, Guillermo (author)Schur multipliers are a concept from functional analysis that have various uses in mathematics. In this thesis we provide an introduction of the aforementioned Schur multipliers and the associated Schatten pclasses. We prove a number of results and introduce some concepts of functional analysis in order to get to the central topic: a conjecture...bachelor thesis 2018
 document

Perrenet, Yannick (author)A statistical approach to depict stock volatility based on general news headlines by exploiting Machine Learning methods such as sentiment analysis and neural networks. The results from the analysis are then used in the financial market with a particular trading strategy, called a bottom straddle. We conclude that not enough information can be...bachelor thesis 2018
 document

Stassen, Misha (author)Melvin Dresher beschouwde in zijn boek uit 1961 over speltheorie een getallenraadspel over N getallen. Hij liet zien hoe de optimale strategieën van beide spelers kon worden gevonden met behulp van lineair programmeren. Later toonde Selmer Johnson oplossingen voor N<=11 en merkte op dat de berekeningen steeds complexer werden bij toenemende N...bachelor thesis 2018
 document

van Leeuwen, Bodine (author)In 1969, the theorem of Reichert was formulated. Since then, two proofs have been found, both by Z. Jiang and Malcolm C. Smith, one of which in collaboration with Sara Y. Zhang. These proofs are based on the transfer functions of the electrical networks. <br/>The aim of this paper is to work toward a proof based on graph theory, linear algebra...bachelor thesis 2017
 document

Koole, Ruth (author)In this thesis, shrinkage and variable selection is used on one of the most famous models in survival analysis, the Cox proportional hazards model. <br/>First, the Cox proportional hazards model is statistically observed, by deriving the so called partial likelihood. This likelihood type of function is used for maximum likelihood estimation of...bachelor thesis 2017
 document

van Alebeek, Sanne (author)This bachelor thesis is about binary errorcorrecting codes. A binary code is a collection words with the same length n that consists only of zeroes and ones. The errorcorrecting quality of a code is determined by the Hamming distance d of a code. A classical question in coding theory is: What is the maximum number of codewords in a code with...bachelor thesis 2017