Searched for: contributor%3A%22Reinders%2C+M.J.T.+%28graduation+committee%29%22
(41 - 53 of 53)
- document
-
Habben Jansen, Geert (author)Ever since the invention of the Internet, more and more computers are connected throughout the world. Though this has brought numerous new inventions used every day, like social media, e-commerce, and video conferencing, it also opens up new opportunities for cyber criminals. As the intrusion detection systems used to identify malicious behavior...master thesis 2021
- document
-
Verschuuren, Rolf (author)Methods for learning vector space representations of words have yielded spaces which contain semantic and syntactic regularities. These regularities mean that vector arithmetic operations in the latent space represent meaningful and interpretable relations between words. These word vectors have been so successful in capturing such relations, as...master thesis 2021
- document
-
Zhao, Xunyi (author)Dropout is one of the most popular regularization methods used in deep learning. The general form of dropout is to add random noise to the training process, limiting the complexity of the models and preventing overfitting. Evidence has shown that dropout can effectively reduce overfitting. This thesis project will show some results where dropout...master thesis 2021
- document
-
Verkooijen, Paul (author)Double strand breaks are lesions to the DNA and can be fatal for cells. Therefore these breaks are repaired, primarily by one of the three major repair pathways. Two of these pathways are non-homologous end-joining (NHEJ) and theta-mediated end-joining (TMEJ). These pathways leave genetic alterations in their repair products, a form of DNA...master thesis 2021
- document
-
Pytel, Rafal (author)Occlusion degrades the performance of human pose estimation. In this paper, we introduce targeted keypoint and body part occlusion attacks. The effects of the attacks are systematically analyzed on the best-performing methods. In addition, we propose occlusion specific data augmentation techniques against keypoint and part attacks. Our extensive...master thesis 2020
- document
-
Seale, Colm (author)Synthetic lethality (SL) arises between two genes when loss of function of both genes would lead cells to become inviable. This can be exploited for therapy, where a drug is used to selectively kill diseased cells by perturbing one gene of an SL pair where the other gene is inactive (e.g. through naturally occurring mutation). Computational...master thesis 2020
- document
-
Elghlan, Faris (author)This M.Sc. thesis report investigates the application of one-class classification techniques to complex high-dimensional data. The aim of a one-class classifier is to separate target data from non-target data, but only a dataset containing target data is available for training. The issue with high-dimensional data is that it is difficult to...master thesis 2019
- document
-
Lengyel, Attila (author)This work investigates how prior knowledge from physics-based reflection models can be used to improve the performance of semantic segmentation models under an illumination-based domain shift. We implement various color invariants as a preprocessing step and find that CNNs trained on these color invariants get stuck in worse local minima...master thesis 2019
- document
-
Priadi Teguh Wibowo, Priadi (author)Visualizing runners trajectory from video data is not straightforward because the video data does not contain the explicit information of which runners appear in the video. Only the visual information related to the runner, such as runner’s unique ID (called bib number), is available. To this end, we propose two automatic runner detection...master thesis 2019
- document
-
Dhar, Aniket (author)Convolutional neural networks are showing incredible performance in image classification, segmentation, object detection and other computer vision applications in recent years. But they lack understanding of affine transformations to input data. In this work, we introduce rotational invariant<br/>convolutional neural networks that learn...master thesis 2018
- document
-
Adhikari, Ajay (author)Machine Learning (ML) is a rapidly growing field. There has been a surge of complex black-box models with high performance. On the other hand, the application of these models especially in high-risk domains is more stagnant due to lack of transparency and trust in these black-box models. There is a disconnect between the black-box character of...master thesis 2018
- document
-
Liu, Lu (author)During the last decades, people detection has received great attention in computer vision and pattern recognition because of its various applications. Though there are thousands of papers provide approaches for people detection, most of them focus on datasets from side view. People detection from overhead cameras, as an important situation for...master thesis 2018
- document
-
Liu, Xin (author)This work proposes a method for matching images from different domains in an unsupervised manner, and detecting outlier samples in the target domain at the same time. This matching problem is made difficult by i) the different domain images that are related but under different conditions (e.g. photos of the same location captured in different...master thesis 2018
Searched for: contributor%3A%22Reinders%2C+M.J.T.+%28graduation+committee%29%22
(41 - 53 of 53)