Searched for: subject%3A%22Coding%22
(1 - 20 of 382)

Pages

document
Kumbul, U. (author)
Autonomous driving is a new emerging technology that will enhance traffic safety. Automotive radars are essential to attaining autonomous driving since they can function in adverse weather conditions and are used for detection, tracking, and classification in traffic settings. However, the dramatic growth in the number of radar sensors used for...
doctoral thesis 2023
document
Lovato, S. (author)
The increasing size of today's ships is a major concern for navigation in confined waters. In order to ensure safe manoeuvres, port authorities prescribe, among others, a minimum under-keel clearance that must be maintained by the ships during navigation.<br/>However, the seabed of ports situated at the estuaries or along rivers is often covered...
doctoral thesis 2023
document
Westfalewicz, Andrzej (author)
Software security plays a crucial role in the modern world governed by software. And while closed source projects can enjoy a sense of confidentiality when addressing security issues, open source projects undertake them publicly even though just as many projects rely on them. In 50% of documented cases, the vulnerabilities could have been...
master thesis 2023
document
Schouhamer Immink, Kees A. (author), Weber, J.H. (author)
We present and analyze a new construction of bipolar balanced codes where each codeword contains equally many -1's and +1's. The new code is minimally modified as the number of symbol changes made to the source word for translating it into a balanced codeword is as small as possible. The balanced codes feature low redundancy and time...
journal article 2023
document
Li, Zhuoheng (author)
Programmers usually write test cases to test onboard software. However, this procedure is time-consuming and needs sufficient prior knowledge. As a result, small satellite developers may not be able to test the software thoroughly. <br/> <br/>A promising direction to solve this problem is reinforcement learning (RL) based testing. It searches...
master thesis 2022
document
Redel, Floor (author)
Ill-posed Linear Inverse Problems arise in various research domains, such as control engineering and image processing. Having a fast algorithm is a great benefit when working with high-dimensional signals, such as images. However, fast convergence and iterations with low computational complexity are challenging.<br/>In this master thesis report,...
master thesis 2022
document
Loor, Stephan (author)
In the past few years, the search for good quantum low density parity check (qLDPC) codes suddenly took flight, and many different constructions of these codes have since been presented, including many product constructions. As these code constructions have a natural interpretation in the language of homology, this thesis studies the interplay...
master thesis 2022
document
van Prooijen, Birgit (author)
While the Minimum Euclidean Distance detection is known to be optimal for channels affected by Gaussian noise, it has been shown that Minimum Pearson Distance detection (MPD) may perform better when the channel is also affected by an unknown offset, though for a good performance some adaptations for classical binary block codes are necessary. It...
bachelor thesis 2022
document
Katzy, Jonathan (author)
We explored the effect of augmenting a standard language model’s architecture (BERT) with a structural component based on the Abstract Syntax Trees (ASTs) of the source code. We created a universal abstract syntax tree structure that can be applied to multiple languages to enable the model to work in a multilingual setting. We adapted the...
master thesis 2022
document
van Tuijn, Jan (author)
Manufacturers of CubeSats prefer the use of COTS electronic components such as microcontrollers (MCU) and SDRAM but these components are vulnerable to errors caused by radiation. A specific type of error caused by radiation are soft errors which can be corrected by Error Detection and Correction (EDAC) methods. Unfortunately, it is uncommon for...
master thesis 2022
document
van Donkelaar, Mirko (author)
A code C is defined to be a set of S words, where a word is a sequence of n entries. We call S the size and n the length of the code. The entries of the code can have k different values, {0, .., (k − 1)}. Define a perfect k-hash code (PHC) as a code with the property that any collection of v words in the code is different at at least one index....
bachelor thesis 2022
document
Zhang, Haiyin (author)
The popularity of machine learning has wildly expanded in recent years. Machine learning techniques have been heatedly studied in academia and applied in the industry to create business value. However, there is a lack of guidelines for code quality in machine learning applications. Although machine learning code is usually integrated as a small...
master thesis 2022
document
Zwart, David (author)
LoRaWAN is a public Wireless Sensor network with excellent properties like being long-range, low-energy radios and resulting in long battery life. Devices are connected to this network through gateways, and they will run in that deployment for years without replacement. Therefore, bugs and security issues in such devices' firmware are present...
master thesis 2022
document
Broekhoff, Jochem (author)
Agda, a promising dependently typed function language, needs more mainstream adoption. By the process of code extraction, we compile proven Agda code into a popular existing language, allowing smooth integration with existing workflows. Due to Agda’s pluggable nature, this process is relatively straightforward. We implement a solution in Haskell...
bachelor thesis 2022
document
Milliken, Louis (author)
Dependently typed languages such as Agda can provide users certain guarantees about the correct- ness of the code that they write, however, this comes at the cost of excess code that is not used at run time. Agda code is currently compiled to another language before it is run, there are not many target languages in popular use, so it is unclear...
bachelor thesis 2022
document
Zimmerhackl, Lukas (author)
Dependent programming languages such as Agda show a lot of promise in creating new ways of writing code, but currently suffer from a lack of support and features. In this paper we attempt to create a new back-end for Agda targeting Java which has a huge and thriving ecosystem.<br/><br/>We implement the new back-end for Agda in Haskell and we...
bachelor thesis 2022
document
Meluzzi, Matteo (author)
Dependently typed languages such as Agda have the potential to revolutionize the way we write software because they allow the programmer to catch more bugs at compile time than classical languages. Nonetheless, dependently typed languages are hardly used in practice. One of the reasons is the lack of mature compilers for them.<br/>This paper...
bachelor thesis 2022
document
Peeters, Hector (author)
Agda is a functional programming language with built-in support for dependent types. A dependent type depends on a value. This allows the developer to specify strict constraints for the types used in an application. Writing code with dependent types results in fewer type-related errors slipping through the compilation process. <br/>When...
bachelor thesis 2022
document
van Dam, Tim (author)
Numerous papers have empirically studied the performance of deep learning based code completion models. However, none of these papers considered nor investigated whether good performance on statically typed languages translates to good performance on dynamically typed languages. A lack of available type information can make code completion more...
bachelor thesis 2022
document
Mesters, Brendan (author)
Effect Handler Oriented Programming is a promising new programming paradigm, delivering separation of of concerns with regards to side effects in an otherwise functional environment.<br/>This paper discusses the applicability of this new paradigm to static code analysis programs. <br/>Different code analyzers often have many similar, if not...
bachelor thesis 2022
Searched for: subject%3A%22Coding%22
(1 - 20 of 382)

Pages