Searched for: subject%3A%22machine%255C%2Blearning%22
(1 - 20 of 772)

Pages

document
Mulder, Tijmen (author)
From 2019 into 2021, phishing incidents tripled, while phishing was found to be the largest used cyberattack vector. One commonly used type of phishing is a credential phishing attack over email. This is an act where an attacker tries to steal credential information from a target via a phishing website. This phishing website is delivered to the...
master thesis 2022
document
Westerborg, Ties (author)
Learning to Rank is the application of Machine Learning in order to create and optimize ranking functions. Most Learning to Rank methods follow a listwise approach and optimize a listwise loss function which closely resembles the same metric used in the evaluation. Popular listwise loss functions such as nDCG, AP and nRBP do not have consistent...
master thesis 2022
document
Wolters, Anouk (author)
There is a need for a more comprehensive sociotechnical systems view on ML. Such a view looks at the development and use of an ML system in practice as being a sociotechnical ML system: "a system consisting of technical artefacts, human agents and institutions, in which a machine-based subsystem influences its real or virtual environment by...
master thesis 2022
document
Narra, Snigdha (author)
Aerosol is defined as the suspension of solid or liquid in the atmosphere. While some aerosols do not pose any serious threat to humankind, others have devastating effects. Thus, it is important to understand the type and distribution of these aerosols in the atmosphere. While traditional satellite data pose delays due to the huge amount of data...
master thesis 2022
document
Mouwen, Dennis (author)
Every day, Intrusion Detection Systems around the world generate huge amounts of data. This data can be used to learn attacker behaviour, such as Techniques, Tactics, and Procedures (TTPs). Attack Graphs (AGs) provide a visual way of describing these attack patterns. They can be generated without expert knowledge and vulnerability reports. The...
master thesis 2022
document
Veraart, Maartje (author)
The rise of alarming cyber breaches and cyber security attacks is causing the world to consider the security of our cyber space. A Security Operations Center (SOC) is a center where the security of a company is monitored to prevent cyber breaches. Security analysts in the SOC examine alerts that come from different devices and analyse what is...
master thesis 2022
document
Meister, S. (author)
In modern aircraft, structural lightweight composite components are increasingly<br/>used. To manufacture these components in a costeffective way, robust production systems for the manufacturing of complex fibre composite components are necessary. A rather novel but already established process for fibre material deposition is the Automated Fibre...
doctoral thesis 2022
document
Ordeman, Sam (author)
Digital Soil Mapping (DSM) of soil types in geotechnical project areas is a top priority. These maps are often used in decision making and can have significant consequences related to costs and risks. Usually, these maps are generated by digital soil models that interpolate soil types at known locations. In practice, conventional spatial...
master thesis 2022
document
Kamphuis, Arian (author)
Climatic conditions in uence peak discharges in rivers and change sea levels; therefore, attention to the safety of dikes is of ever growing importance. Macro instability is one of the dike failure mechanisms that can inundate the hinterland. Soil heterogeneity plays an important role in assessing dike safety, especially for slope stability,...
master thesis 2022
document
Huang, Wenxuan (author)
Supervised machine learning is a growing assistive framework for professional decision-making. Yet bias that causes unfair discrimination has already been presented in the datasets. This research proposes a method to reduce model unfairness during the machine learning training process without altering the sample value or the prediction value....
master thesis 2022
document
Ajithkumar Pillai, Krishna (author)
Cracks in masonry structures are a cause for concern as they signal a potential lack of functionality and/or aesthetics. It thus becomes important to identify the cause of damage in order to mitigate it and to prevent its occurrence in the future. Similarities in crack patterns may correlate to similarities in the damage cause. Currently, the...
master thesis 2022
document
van der Heijden, Lars (author)
Missions to small bodies are increasingly gaining interest as they might hold the secrets to our solar system’s origin while some are also posing a threat to life on Earth. The small size and irregular shape result in complex dynamics complicating the close-proximity operations. Furthermore, due to the long round-trip time communication delays...
master thesis 2022
document
van Zijl, Job (author)
Deep Reinforcement Learning (DRL) shows great potential for flight control, due to its adaptability, fault-tolerance, and as it does not require an accurate system model. However, these techniques, like many machine learning applications, are considered black-box as their inner workings are hidden. This paper aims to break open the black box of...
master thesis 2022
document
Schleipfenbauer, Bent (author)
The Dutch public procurement market is a multi-billion industry, with a total value of 73 billion euros per year. Competitive tendering is the most popular method of selecting a supplier for the required construction services. The realisation of a tender bid is an expensive and complex process, established on the intersection of various...
master thesis 2022
document
Hoogland, Pavel (author)
In the use of Machine Learning systems, attaining the trust of those that are the end-users can often be difficult. Many of the current state-of-the-art systems operate as Black-Boxes. Errors produced by these Black-Box systems, without further explanation as to why these decisions were made, will deteriorate trust. This effect is especially...
master thesis 2022
document
van den Akker, Daniel (author)
Multi-Layer Perceptron and Support Vector Machine have both been widely used in machine learning. In this research paper, these models have been applied to binary classification on an individual time series basis. The goal was to see whether they can predict earthquakes, using earthquakes measured at specific stations across New Zealand. As it...
bachelor thesis 2022
document
Meijer, Caspar (author)
Machine learning models are increasingly being used in fields that have a direct impact on the lives of humans. Often these machine learning models are black-box models and they lack transparency and trust which is holding back the implementation. To increase transparency and trust this research investigates whether imitation learning,...
bachelor thesis 2022
document
Free, Renske (author)
Anticipatory action requires models that can accurately and reliably predict the impact of natural hazards. However, impact forecasts are often underestimated when consecutive hazards are not considered. In the Bicol region in the Philippines, typhoons trigger 90% of landslides, causing a lot of fatalities and damage to infrastructure and...
master thesis 2022
document
Heijdra, Amber (author)
Hypertrophic cardiomyopathy (HCM) is known as a frequent, genetic cardiovascular disease, often caused by mutations of sarcomere protein genes. HCM is primarily characterized by the presence of an increased left ventricular wall thickness, i.e. left ventricular hypertrophy (LVH). However, the disease appears to be asymptomatic in some patients,...
master thesis 2022
document
RUIZ ALBA, MAITE (author)
<b>Background and purpose</b>: One of the main challenges in external beam radiotherapy treatment of locally advanced cervical cancer patients is dealing with bladder and rectum filling. Organ filling causes inter­fraction motion of the uterus, requiring large treatment planning volumes, or a plan library. Current assessment of tumor position is...
master thesis 2022
Searched for: subject%3A%22machine%255C%2Blearning%22
(1 - 20 of 772)

Pages