Searched for: mods_note_programme_s:"Computer%5C+Science"
(1 - 20 of 221)

Pages

document
van der Tas, Veerle (author)
More and more parcels are delivered all over the world, by numerous carriers. Collaboration between couriers can benefit both companies and their customers, as it has the potential to reduce cost and reduce the number of couriers stopping at the same location. Furthermore, autonomous driving is gradually picking up traction opening up another...
master thesis 2020
document
Jokūbauskas, Algirdas (author)
Software development is more and more reliant on external code. This external code is developed, bundled into packages and shared using package repositories like crates.io or npm. Reusing shared code bundles greatly improves development speed but without proper care and knowledge of included external code it can cause issues as well. Over...
master thesis 2020
document
van Veen, Carmen (author)
The Dutch version of the Public Records Request is named the ‘Wet Openbaarheid van Bestuur’ (Wob) , which provides the public with the right to request access to records from any governmental institution. The government has the obligation to provide information about policy and the execution of policy; however individuals who wish to obtain more...
master thesis 2020
document
Gerling, Jan (author)
Refactorings tackle the challenge of architectural degradation of object-oriented software projects by improving its internal structure without changing the behavior. Refactorings improve software quality and maintainability if applied correctly. However, identifying refactoring opportunities is a challenging problem for developers and...
master thesis 2020
document
Voortman, Jens (author)
Agile is a software development approach based on a set of 4 values and 12 principles. Using this set Scrum was developed as a agile framework in the early 1990s, which still remains the most popular framework today. However, Scrum originated to be used by a small number of co-located teams. When the amount of teams and the distance between the...
master thesis 2020
document
Mulders, Maurits (author)
A side-channel attack is performed by analyzing unwanted physical leakage to achieve a more effective attack on the cryptographic key. An attacker performs a profiled attack when he has a physical and identical copy of the target device, meaning the attacker is in full control of the target device. Therefore, these profiled attacks are known as...
master thesis 2020
document
Rustici, Pietro (author)
This study investigates whether an automatic anonymization algorithm that takes as input a 3D model of a human face can produce an output model exempt from General Data Protection Regulation (GDPR) biometric data definition. The algorithm first uses Random Sample Consensus (RANSAC) for registering the source point cloud globally to an oriented...
bachelor thesis 2020
document
Ding, Kaixin (author)
Intrusion detection problem in Industrial Control Systems(ICS), such as water treat- ment plant and power grid, is an important real-world problem. Real-time anomaly detection have been proposed to minimize the risk of cyber attack. In this study, two different kind of intrusion detection mode-based approach are learned from normal behaviour of...
master thesis 2020
document
Proost, Rick (author)
Monitoring software behaviour is being done in various ways. Log messages are being output by almost any kind of running software system. Therefore, learning how software behaves from doing analysis over log data can lead to new insights about the system. However, the number of log messages in a computer system grow fast, and analysing the log...
master thesis 2020
document
van Deursen, Max (author)
Many applications employ models to represent real-life environments efficiently. To allow these models to be realistic it is commonly fitted using a dataset containing labeled samples. When obtaining a label for a sample from the environment is expensive, it is key that the dataset contains only those samples that aid in providing a realistic...
master thesis 2020
document
Budhrani, Ravish (author)
Classical computing has been evolving, to help solve harder problems. Following Moore’s Law the miniaturisation of transistors has helped improve performance. However, this has led to a ”Power Wall”. The clock frequency of processors have not been making the leaps predicted by Moore’s law. This is simply because the power dissipation becomes too...
master thesis 2020
document
van Rossum, Tim (author)
The Internet consists of many subnetworks, which are connected to each other. These subnetworks are the autonomous systems (ASes) that make up the Internet: each hosts a part of it. In order to successfully determine routes from one of these ASes to the other, the Border Gateway Protocol (BGP) is used. This protocol has several security flaws...
master thesis 2020
document
van Steijn, Z.A. (author)
Principal component analysis (PCA) is commonly used in the fields of computer graphics and geometry processing for constructing subspaces that represent the variability present in a dataset. Examples of such datasets are configurations of a non-rigid object, poses of a deformable character or snapshots from a simulation. By applying PCA to the...
master thesis 2020
document
Sellik, Hendrig (author)
Mistakes in binary conditions are a source of error in many software systems. They happen when developers use < or > instead of <= or >=. These boundary mistakes are hard to find for developers and pose a manual labor-intensive work. While researches have been proposing solutions to identify errors in boundary conditions, the problem...
master thesis 2020
document
Hanagodimath, Anmol (author)
Panorama maps can be defined as aerial-view paintings of geologically complex landscapes that are represented in a convenient manner to non-expert viewers. This thesis focuses on a specific variant of panorama maps known as "ski-panorama maps" or "piste-maps" drawn by the french landscape and panorama artist, Pierre Novat. These maps usually...
master thesis 2020
document
Schröder, Casper (author)
Code quality of software products often degrades while they grow. Counteracting the degradation of code quality or improving it requires immense effort. Tools that reduce this effort are a hot topic in software engineering research. Software Modularization in particular aims to aid in the process of improving the quality of code structure, by...
master thesis 2020
document
Rijlaarsdam, Matthijs (author)
With this thesis project, we improve the classical simulation of quantum computers using stabilizers in the GSLC formalism. We do this in two ways: we present new algorithms that speed up their simulation and extend their applicability by defining new operations and subroutines for existing general circuit simulation using GSLC. To be precise:...
master thesis 2020
document
Ding, Ruiyang (author)
In the traditional software development life cycle, development and operation are divided into different departments. The conflict between departments and, besides, the lack of automation usually leads to low software development efficiency and slow software delivery. Thus, the concept of DevOps is introduced, which combines different...
master thesis 2020
document
Liu, J.C.M. (author)
Since the introduction of the Web, online platforms have become a place to share opinions across various domains (e.g., social media platforms, discussion fora or webshops). Consequently, many researchers have seen a need to classify, summarise or categorise these large sets of unstructured user-generated content. A field related to this task is...
master thesis 2020
document
Doekemeijer, N.A. (author)
Graphs are a ubiquitous concept used for modeling entities and their relationships. Large graphs, present in a variety of domains, are often fundamentally difficult to process because of sheer size and irregular computation structure. In recent years, both academia and industry have committed to designing scalable solutions to efficiently...
master thesis 2020
Searched for: mods_note_programme_s:"Computer%5C+Science"
(1 - 20 of 221)

Pages