Circular Image

K.G. Langendoen

61 records found

Sunlight-based Passive VLC

Utilizing the sun to establish wireless connections

Nowadays,wireless connectivity is ubiquitous: humans use smartphones, smartwatches, laptops and other devices, while at the same time, the Internet of Things (IoT) is adding millions of connected objects. This large number of devices uses mainly the radio frequency (RF) spectrumf ...
After the potential of this work is realized, people will be able to physically manipulate remote environments. For example, a skilled artist in Tokyo could paint delicate calligraphy on a canvas in Paris, feeling each stroke as if they were local. A surgeon in London could opera ...
AI/ML-based approaches are at the forefront of resource management in modern communication networks. Deep learning, in particular, enables fast and high-performing decision-making when sufficient representative training data is available to build accurate offline models. Converse ...
Embedded real-time systems, essential in industries like automotive, aviation, and medical devices, increasingly rely on multi-core platforms for efficient parallel processing to meet rising computational demands. However, they face significant challenges with energy consumption, ...
In practical situations, computer vision technique is applied to solve various tasks, including image classification, object detection, image segmentation, and so on. The commonly used supervised learning training paradigm for the network models used to solve these tasks requires ...
The proliferation of video recording devices and facial recognition technology has led to significant privacy concerns, as surveillance systems can capture and identify individuals without their consent. Traditional facial obfuscation systems, which introduce pixel-level perturba ...
Path finding is an important component in solving a wide array of engineering problems, ranging from video games to real-life applications such as automated warehouse management and autonomous vehicles.
Path finding algorithms are designed to solve complex problems, and in o ...
Human activity recognition plays an interesting and important role nowadays as there are a variety of use cases. It is utilized in health monitoring, in the development of human-computer interaction system and in security monitoring. However current methods involve usage of priva ...

Personalized Gesture Range Detection Using Transductive Parameter Transfer

Rethinking Ubiquitous Smart Sensing of Social Behaviour In The Wild

This research investigates the detection of gestures using a torso-worn accelerometer sensor. Using the Conflab dataset, we focus on gestures during conversations in mingling scenarios. Due to significant variability in gesture styles among individuals, traditional methods face ...

Identifying Speaking and Drinking Events Within Audio Recordings for Multiactivity Analysis

Rethinking Ubiquitous Smart Sensing of Social Behaviour in the Wild

Multiactivity analysis investigates one's coordination of actions within a social context, such as gestures and speech, usually using video recordings of the social activity, to further understand the rules of human behaviour. This paper focuses specifically on the coordination b ...

Bugs in Haskell Programs

What are the different stages of bugs in Haskell programs?

Various studies already exist about the lifecycle of software programs written in languages like Java, C and C++, but this is an under-reported area for the pure, functional programming language Haskell. This report explores steps in the development of Haskell programs, and parti ...

Emotion Recognition in Virtual Reality

Creation and validation of a VR-based multi-modal emotion recognition dataset

Emotion recognition in Virtual Reality(VR) has the potential to offer numerous benefits across various sectors such as mental healthcare, education, marketing, entertainment, etc. Although emotion recognition itself is a mature field, the sub-field of VR-based emotion recognition ...
This thesis project explores how V2X communication between electric vehicles (EV) and charging stations can be used to reduce en-route charging times. This is done using standardized V2X messages for EV charging, as well as proposing an extension to these messages to include data ...
Saxophone is a musical instrument that tends to be out of tune. I have invented an automatic tuning saxophone mouthpiece that can help saxophonists play in tune by correcting their notes' frequencies in real time during performances using a stepper motor.
The increasing number of portable electronics and Internet of Things (IoT) devices demand scalable, low-power, and versatile networks. The Radio Frequency (RF) band has long been the main carrier for communication technologies. For instance, Bluetooth, Wi-Fi, and LoRa are assigne ...
Much like wearable devices today, ingestible devices have emerged as a promising platform for continuous health monitoring, and potentially even intervention. Recent research has demonstrated the feasibility of ingestible devices with a retention mechanism, enabling them to remai ...
Computer Architects often walk the tightrope between performance, power and area while designing modern day processors. This daunting task is made even more challenging by short Time-to-Market requirements set by the clients. In light of these challenges, architectural simulators ...
High Performance Computing (HPC) facilities play a crucial role in acceler- ating Electronic Design Automation (EDA) procedures at NXP Semiconduct- ors. The increasing number of job requests and workloads has led to a surge in memory demand, which is a costly resource. To address ...

Backoff Reset

Finding the limits of IEEE 802.11 modelling

This thesis has studied an oversight in the scientific literature on Wi-Fi 6 modelling and attempts to quantify the prevalence and effect of this omission.
This effect was dubbed the ”backoff reset” and roughly means that a device connected to a Wi-Fi 6 network that recently ...