Bachelor Informatica



2024-2025
Student Thesis Content
Altfeld, L. (Leon)Multiobjective Bayesian Hyperparameter Optimization for a Traveling Salesman Problem
Asraoui, A. (Adam)Guiding Collaboration: Exploring Teaching Assistants’ Views on Group Work in Higher Computer Science Education
Badloe, V. (Vrinda)Relevant e-health application factors for the HHQA-model
Bayraktar, S. (Serdar)Phonetic and Semantic Alignment of Spoken Language: Conceptual Understanding of Languages without Text
Brown, M.C. (Mark)Three-player Combinatorial Games
Chatterjee, S. (Soham)Synthetic Data Generation for Lung Tumor Detection: A Comparison of StyleGAN3 and Latent Diffusion
Cotino, T.C. (Tristan)Investigating the Effectiveness of Complementary NNENUM Portfolios for Neural Network Verification Using Auto-Verify
Daleman, L. (Luuk)Reviewing the Educational Value of the ChocoPy Compiler Framework
Dekker, T.W. (Thijs)Godapt: Introducing General Video Game AI to the Godot Game Engine
Elderbroek, L. (Liam)Constructing a Forward-Looking Adaptation of Retrograde Analysis Through the Lens of Onitama
Farzad, A. (Alette)Teaching the Importance of Critically Reviewing the Output of Generative AI through Games
Georghiou, C. (Christos)Topology of Decentralized Social Networks: A Case Study of Bluesky
Gibb, H. (Hannah)Usability Optimisation for Fundamental Rights Assessment of Algorithms
Haasdijk, T. (Tim)Evaluating The Impact of Integrating Domain-Specific Assumptions Into Auto-sklearn
Hassan, N. (Nour)Monte Carlo Methods and Algorithms for the Card Game Hanamikoji
Heuvel, A.J. van den (Jonathan)VeryBadUSB: Expanding the Capabilities of BadUSB with USB Type-C
Hobrecker, F.J. (Francesca)Solving the Bounded Distance Decoding Problem - A Generalization of Barnes-Wall Lattice Decoding and Its Application to Tensor Hexagonal Lattices
Hoor, O. ten (Olivier)Exploring the Effectiveness of SMT Solving for Proving and Disproving the Existence of Mutually Unbiased Bases
Jansen, T. (Thomas)Analyzing Optimization Variables in GPU Kernel Tuning
Jong, D. de (Daan)Monte Carlo Tree Search with Contextual Bandits
Raven, J. (Jip)Completeness and Decidability of (Guarded) Kleene Algebra (with Tests) under the Hypothesis e = 0
Rijnfrank, J. (Joris)Finding the Sources of Vulnerable Code Patterns
Salden, R.C. (Robert)Developing a Digital Twin of a Food Industry Imaging Setup in Unity3D
Santos Cordeira, P. dos (Phoebe)Object Detection and Rotation Estimation Using IntelRealsense Depth Camera
Schagen, N. van (Niels)Developing a Backend Compiler for PDE Simulation on the Anadigm AN231E04 Hybrid Computer
Smedeman, R. (Ronan)Anomaly Detection on Pollutant Levels in European Air Quality
Soest, D. van (Domen)A Data-Driven Approach to Determine Personalised Stage Suitability
Stevens, P. (Pieter)SuperCode A Step Towards Sustainable Algorithms Using SLMs
Stokkermans, V. (Valentijn)Optimizing and Profiling the Preprocessing Speed of the Contraction Hierarchies Algorithm
Straathof, H. (Hanna)Solving and generating Kuroshuto puzzles
Tali, T.A. (Taylan Ali)Security Vulnerabilities in LLM-Generated Code: Analyzing Programming Queries and Their Security Risk
Timman, R. (Roy)Generating CT Scan Images of the Heart Using Generative Adversarial Networks
Treffers, B. (Bas)PassGAN and Hashcat - A Look at How Traditional Password Crackers Can Be Used to Complement PassGAN
Visser, O. (Olivier)Radio Interference Monitoring with Low-end AI-hardware
Wekken, M. van der (Miguel)Algorithms for Rummikub Puzzles
Wierenga, R. (Rick)Optimizing Automated, Low-Volume Liquid Transfers
Wiskerke, J. (Jamie)Probability theory in the Category of Diffeological Spaces
Zuijderduijn, T. (Tim)Fineman’s Parallel Digraph Reachability in Practice
Zwet, J. van der (Jasper)Reverse Multiplication Friendly Embeddings over Ring Extensions and their Application to Multiparty Computation