44 entries found.


Bachelor Informatica



2023-2024
Student Thesis Content
Adelaar, B. (Branco)The Greeting Problem - How to Have People Greet One Another in a Rectangular Room
Adwan, A. (Amr)Impact of Hyperparameters on Model Performance in Split Learning
Akker, T. van den (Tristan)Using Trains for Ice Block Puzzles
Baarsen, S.T.A.N. van (Stan)Using Binary Decision Diagrams for Exploring Graph State Orbits
Baron, B.R. (Björn Roy)Exception Handling Support for the Cranelift Code Generator
Beerens, P. (Pjotr)Families of Defining Polynomials of Finite Fields through Prime Power Torsion on Elliptic Curves
Bergsma, T. (Teun) Monte Carlo Methods for the Board Game Patchwork
Boon, M. (Milan) deTeacher Experiences on the New Digital Literacy Learning Trajectory in Primary School Education
Bron, K. (Koen)Collaborative Web-Based Tool Support for IAMA Assessments on Public Sector Algorithms
Combé, M. (Martijn)Extending Mixed-Scale Dense CNNS for Classification
Deursen, A. van (Aník)The Role of Instruction Method in an Educational Game
Deutz, F. (Fenna)Implementing a Storage Solution Sacilitating Future Analysis of ADTs Generated by the ADT Web App
Dongen, M. van (Maxime)The Teaching Methods and Strategies of Programming Education within High Schools in The Netherlands
Drenth, O. (Ole)Generating Abdominal CT Scan Data for Pancreatic Cancer Detection Using Latent Diffusion
Fazlija, R. (Reshit)Development of User-Friendly Interfaces In a Technical Tool Used To Create Attack Defense Trees for Non-Technical Users
Frericks, M. (Martijn)Optimizing the Energy Efficiency of the Nvidia Jetson
Griffioen, D. (Daan)TimeSync: Deepfake Detection with Temporal Lip Sync
Groeneweg, T. (Thijs)Adapting the CoThought Pipeline for Training a BabyLM on Dutch Data
Halevy, G. (Giovanni)Transferring Video Captioning Models from Human to Animal Data
Hebinck, J. (Jayme)ADT Create: Determination of Equivalence and Satisfiability of Attack-Defense Trees
Heslenfeld, N. (Niels)Solving and Generating Fobidoshi Puzzles
Hulsebosch, H. (Hugo) An Exploration of C2 Server Fingerprinting Capabilities with Probed HTTP Data
Janssen, M. (Maxim)Optimally Weighted Machine Learning Model Ensembles using Quadratic Optimization in Python
Jong, C. (Casper) deCan the Waves of the Sea Speak to Us?
Jong, T. (Tim) deOptimizing RISC-V Binaries Using LLVM-based Same-Architecture Binary Translation
Kiele, R. (Rutger)Hartenjagen met Monte Carlo Tree Search
Klaver, A. (Arie)LLM Personalization Using Summarization: A Robotic Fitness Coach Case Study
Koene, E. (Esther)Determining game values of Hackenbush with Monte Carlo Tree Search
Kroon, M. (Margriet)Enhancing Computational Learning and Enthusiasm in Scouts through Unplugged Activities
Kuiper, D. (Daniel)Automating Dynamic Analysis of Python Proof of Concept Exploits
Nehoray, M. (Mai)AI-Driven Creativity: The Power of Dual-Agent Systems
Noteborn, D. (David)Creating a language to describe Turing machines On creating a Towards Turing machine compiler
Ooijen, I. van (Imke)Optimizing AES for RISC-V Cores
Opdam, C. (Chika) Automatic Action Detection in Cell Imaging
Roestenburg, M. (Melvin)Optimal Graph-State Preparation for Quantum Computers with SAT-Solvers
Saint-Genez, A. (Arnaud) Reinforcement Learning in Inventory Management: Addressing Finite Shelf Life and Lead Time in Infinite Horizon Problems
Selles, L.H. (Lars)Privacy-preserving Explainable AI in the Active Security Model
Serraris, A. (Alexander)Assessing Corporate Communication Alignment with Stated Goals Using Large Language Models
Shreef, B. (Barmad)Illuminating the EC-Bestiary: Conceptual Analysis and Benchmarking of the Invasive Weed Optimization Algorithm
Son, T. (Tijn) vanEvaluating Whale Optimization Algorithm: Mathematical Rigor, Reproducibility and Performance
Verwaal, T. (Thomas)Analysing the Maximum and Minimum Scores in Azul and the Orders in Which They can be Achieved
Visser, M. (Max)Using Image Captioning Model for Event and Object Recognition in Football Images
Wit, N. de (Niels)Power Leakage of AES Implementations
Zuurmond, L. (Lucas)Probably Approximately Correct Automata Extraction from Neural Networks