Searched for: subject%3A%22compare%22
(1 - 9 of 9)
document
Dujmović, Grga (author)
The increasing presence of Machine Learning in all fields of study requires an improvement in how it is taught. Previous research on this topic examined how to teach ML concepts and highlighted the importance of using technology and leveraging relevant pedagogical content knowledge. It did not compare the impact of previous programming knowledge...
bachelor thesis 2024
document
Vasilev, Kiril (author)
The data used in machine learning algorithms strongly influences the algorithms' capabilities. Feature selection techniques can choose a set of columns that meet a certain learning goal. There is a wide variety of feature selection methods, however, the ones we cover in this comparative analysis are part of the information-theoretical-based...
bachelor thesis 2023
document
van Wieringen, Victor (author)
In this research the Metropolis-Hastings algorithmis implemented for the problem of program synthesis and compared with Brute, a best-first search, together with multiple other different search algorithms. The implementation and choices of the Metrolpolis-Hastings algorithm are discussed in detail. The algorithms are tested for three different...
bachelor thesis 2022
document
Alkan, Efe (author)
Pseudo-random number generators are the essential part of many security protocols such as signature schemes, key-exchange protocols and encryption algorithms. The security of these protocols is usually dependent on the quality of the generators they use. The generation of unpredictable random numbers supplies refreshment to the protocols, which...
bachelor thesis 2021
document
Berendsen, Dan Dan (author)
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitive data the security for these devices is of greater importance. As these devices are connected with the internet being able to have secure communication is crucial. Some of the major aspects for secure communication are identification and message...
bachelor thesis 2021
document
Adriaanse, P.E.A. (author)
With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a...
bachelor thesis 2021
document
Eckhardt, Thomas (author)
Wireless Sensor Networks(WSN's) are networks of sensor that wirelessly communicate to each other. The communication of these sensors needs to be secured to prevent leaking of potentially sensitive information of the data sent between the user, gateway and sensors. For WSN's lightweight authentication, protocols have been developed in order to...
bachelor thesis 2021
document
de Heer, Hugo (author)
MalPaCA makes use of unsupervised machine learning to provide malware capability assessment by clustering the temporal behaviour of malware network packet traces. A comparative analysis was performed on various clustering algorithms to determine the best clustering algorithm in terms of network behaviour discovery. The clustering algorithms...
bachelor thesis 2021
document
Moring, S. (author), Pols, A.F. (author)
Currently, the Nuon Solar Team is building their new solar car, which makes use of solar panels. Solar panels have a Maximum Power Point (MPP), which, when operated at that point, ensures the maximum available power is obtained from them. In this thesis, different options were explored to solve the problem of tracking the MPP of a solar panel....
bachelor thesis 2012
Searched for: subject%3A%22compare%22
(1 - 9 of 9)