Search Results

20 results

Biased Random Walker Gang Territories City Layout
Gang-related violence poses a significant challenge in numerous countries across the world. While previous research have explored modeling formation of gang territories, none of them incorporated a city layout such as roads, water bodies and parks while doing so. Hence, this rese ...
Attention Code completion
In recent years, deep learning techniques, particularly transformer models, have demonstrated remarkable advancements in the accuracy and efficiency of language models. These models provide the foundation for many natural language processing tasks, including code completion. The ...
Concept drift is an unforeseeable change in the underlying data distribution of streaming data, and because of such a change, deployed classifiers over that data show a drop in accuracy. Concept drift detectors are algorithms capable of detecting such a drift, and unsupervised on ...
Code completion Type annotations
Numerous papers have empirically studied the performance of deep learning based code completion models. However, none of these papers considered nor investigated whether good performance on statically typed languages translates to good performance on dynamically typed languages. ...
Explainable Artificial Intelligence Explainable Machine Learning Evaluation Evaluation metrics
Many artificial intelligence (AI) systems are built using black-box machine learning (ML) algorithms. The lack of transparency and interpretability reduces their trustworthiness. In recent years, research into explainable AI (XAI) has increased. These systems are designed to tack ...
Python Graph Dependency Graph Time-Based Graph Python Ecosystem Pagerank
The use of open-source packages is a common practice among developers. It decreases the development time and improves maintainability. But adding a dependency to a project comes with inherit risks such as introducing vulnerabilities. A few solutions that help visualize all of the ...
F-formations Rotation Social interaction
In our daily life people encounter many social interactions, for example in the supermarket, at work and in schools. Currently the most reliable way to find social interactions in groups, is to manually annotate the data. Manual annotation takes a lot of time and human resources ...
Electromagnetic fields Quasi-static Low noise amplifier Nderwater communication Hardware development
As electromagnetic waves cannot propagate sufficiently far in water, underwater communication is mainly performed using either acoustics or optics. However, none of these technologies have been proven to be completely effective in every situation. Therefore, research in new under ...
Process capability indices Quality assurance Asymmetric tolerance
The classical process capability indices are still the most prominently used by practitioners for asymmetrical tolerances even while not accurately reflecting on process capability. It appears that an adequate measure of capability for asymmetrical tolerances is yet to be discove ...
Natural Language Processing Moral Foundation Theory Moral values Domain Adaptation Transfer learning
Moral values play a crucial role in our decision-making process by defining what is right and wrong. With the emergence of political activism and moral discourse on social media, and the latest developments in Natural Language Processing, we are looking at an opportunity to analy ...
Dependency Analysis Call graph Vulnerability detection
Nowadays software development greatly relies upon using third-party source code. A logical consequence is that vulnerabilities from such sources can be propagated to applications making use of those. Tools like Dependabot can alert developers about packages they use, which entail ...
Blockchain Storage Centralised Distributed On-chain Off-chain
Patient monitoring and clinical trial management generate continuous large volumes of healthcare data, causing the healthcare industry to be a data-intensive domain. Existing data storage techniques and access mechanics in the healthcare domain exhibit several challenges related ...
Items being misplaced in warehouses easily get lost. To combat this, warehouses have to send people in scanning all barcodes in the warehouse. This is highly inefficient, which is why Eonics wants to build a drone handling this. There are options out there to scan barcodes, but n ...
In total 326 terpen in the Netherlands are classified as national monuments. A large portion of the terpen are located in the province Groningen. Groningen is often in the news, because of the earthquakes that took place, which were caused by the gas-extraction activities. The ea ...

Causal inference

An introduction

Causal Inference
Experiments have always been the way to study what the effect is of interventions. Causal inference is an important aspect. In this thesis we gave an introduction to causal inference. We did this by giving an example that illustrates the Fundamental Problem of Causal Inference. T ...
Fluid mud Mud Movement
This thesis describes the research about the effect of movement on fluid mud. This was done by exposing several samples of fluid mud from the port of Hamburg to different types of movement for an extended amount of time. It was found that when fluid mud is exposed to kinetic ener ...

Flower

Workflow management and heat-aware scheduling for modern cloud infrastructures

Virtualization Scheduling Container Workflow Flower Kubernetes
Cloud computing has given users access to virtually infinite computing power. Cloud service providers operate data centers consisting of hundreds, sometimes thousands of interconnected machines. The machines dissipate heat that is undesirable because it may lead components to ove ...
Understanding code can be cumbersome. CodeStories strives to provide the tools to make code more understandable by creating a tight coupling between code execution and explanatory elements such as visualizations. Currently CodeStories only supports JavaScript, but extending it wi ...

Underbalanced drilling operations

Friction loss modeling of two phase annular flow

Underbalanced drilling Two-phase annular flow Software tool
This project develops a software tool to model pressure loss of two phase flow in the annulus of a well during underbalanced drilling. By adjusting the Mukherjee and Brill correlation for production/injection wells, insight into which parameters are of influence in predicting the ...

Xylos

Creating a game for the Imagine Cup 2009

Game Scrum Imagine Cup L-systems Time travel Game design Cannibal
During the last ten months, we have designed and developed a game for the Microsoft Imagine Cup. This game, built on the Cannibal Engine, was to revolve around the Millennium Development Goals. The obvious goal was to win the Imagine Cup, or at least to get as far as we could pos ...