Bachelor Informatica



2024-2025
Student Thesis Content
Altfeld, L. (Leon)Multiobjective Bayesian Hyperparameter Optimization for a Traveling Salesman Problem
Asraoui, A. (Adam)Guiding Collaboration: Exploring Teaching Assistants’ Views on Group Work in Higher Computer Science Education
Badloe, V. (Vrinda)Relevant e-health application factors for the HHQA-model
Bayraktar, S. (Serdar)Phonetic and Semantic Alignment of Spoken Language: Conceptual Understanding of Languages without Text
Behari, R. (Ryan)Solving Fillomino: An Algorithmic and SMT-Based Approach
Boer, N. (Noëlle)An Analysis of CuBirds using Different Decision-Making Agents
Brown, M.C. (Mark)Three-player Combinatorial Games
Chatterjee, S. (Soham)Synthetic Data Generation for Lung Tumor Detection: A Comparison of StyleGAN3 and Latent Diffusion
Claassen, R. (Robbie)Hyperparameter Optimization of Pixel-based Diffusion Models with AutoML
Cotino, T.C. (Tristan)Investigating the Effectiveness of Complementary NNENUM Portfolios for Neural Network Verification Using Auto-Verify
Daleman, L. (Luuk)Reviewing the Educational Value of the ChocoPy Compiler Framework
Dekker, T.W. (Thijs)Godapt: Introducing General Video Game AI to the Godot Game Engine
Dongen, M. van (Maxime)The Teaching Methods and Strategies of Programming Education within High Schools in The Netherlands
El Madkouki, A. (Ashraf)Web Privacy in the Netherlands: A Study of Tracker Dynamics
Elderbroek, L. (Liam)Constructing a Forward-Looking Adaptation of Retrograde Analysis Through the Lens of Onitama
Farzad, A. (Alette)Teaching the Importance of Critically Reviewing the Output of Generative AI through Games
Georghiou, C. (Christos)Topology of Decentralized Social Networks: A Case Study of Bluesky
Gibb, H. (Hannah)Usability Optimisation for Fundamental Rights Assessment of Algorithms
Haasdijk, T. (Tim)Evaluating The Impact of Integrating Domain-Specific Assumptions Into Auto-sklearn
Hassan, N. (Nour)Monte Carlo Methods and Algorithms for the Card Game Hanamikoji
Heuvel, A.J. van den (Jonathan)VeryBadUSB: Expanding the Capabilities of BadUSB with USB Type-C
Hobrecker, F.J. (Francesca)Solving the Bounded Distance Decoding Problem - A Generalization of Barnes-Wall Lattice Decoding and Its Application to Tensor Hexagonal Lattices
Hoor, O. ten (Olivier)Exploring the Effectiveness of SMT Solving for Proving and Disproving the Existence of Mutually Unbiased Bases
IJkema, T. (Tiemen)Generalising, Solving, Classifying and Generating Hashi Puzzles
Jansen, T. (Thomas)Analyzing Optimization Variables in GPU Kernel Tuning
Jong, D. de (Daan)Monte Carlo Tree Search with Contextual Bandits
Kaak, B. (Bryan)Efficiency of Two SAT Encodings of Yajilin Puzzles
Kooij, J. (Jasper)AI Methods in Checkers Board Variations
Kroon, M. (Margriet)Enhancing Computational Learning and Enthusiasm in Scouts through Unplugged Activities
Kruijf, R. (Robin)PiCraft: From Text to Image to Minecraft
Leenen, J. van (Jort)Practical Equivalence Checking of P4 Packet Parsers
Monster, L. (Leon)Enhancing Prefuse-SSHFS Performance Through Page and Metadata Caching
Rijnfrank, J. (Joris)Finding the Sources of Vulnerable Code Patterns
Ruigrok, M. (Max)Generating and Solving Sigmar’s Garden Puzzles
Salden, R.C. (Robert)Developing a Digital Twin of a Food Industry Imaging Setup in Unity3D
Schagen, N. van (Niels)Developing a Backend Compiler for PDE Simulation on the Anadigm AN231E04 Hybrid Computer
Setropawiro, A. (Amy)Audio Deepfake Detection Using HuBERT Features
Smedeman, R. (Ronan)Anomaly Detection on Pollutant Levels in European Air Quality
Soest, D. van (Domen)A Data-Driven Approach to Determine Personalised Stage Suitability
Sprang, L. van (Lana)Cultural Prompting and Theory of Mind in LLMs
Stevens, P. (Pieter)SuperCode A Step Towards Sustainable Algorithms Using SLMs
Stokkermans, V. (Valentijn)Optimizing and Profiling the Preprocessing Speed of the Contraction Hierarchies Algorithm
Straathof, H. (Hanna)Solving and generating Kuroshuto puzzles
Tali, T.A. (Taylan Ali)Security Vulnerabilities in LLM-Generated Code: Analyzing Programming Queries and Their Security Risk
Timman, R. (Roy)Generating CT Scan Images of the Heart Using Generative Adversarial Networks
Treffers, B. (Bas)PassGAN and Hashcat - A Look at How Traditional Password Crackers Can Be Used to Complement PassGAN
Versteeg, N. (Niels)Accelerating Solving the Vehicle Routing Problem by Using Generative Initialization
Visser, O. (Olivier)Radio Interference Monitoring with Low-end AI-hardware
Vonk, J. (Jeppe)Designing an Auto-Scalable Benchmark Suite for GPU Kernels
Vroegop, T. (Thomas)Hyper-minimisation of Probabilistic Deterministic Finite Automata
Waart, J. de (Jente)Comparing Different Encodings for the Continuity Rule of the Logic Puzzle Context
Wekken, M. van der (Miguel)Algorithms for Rummikub Puzzles
Wierenga, R. (Rick)Optimizing Automated, Low-Volume Liquid Transfers
Wiskerke, J. (Jamie)Probability theory in the Category of Diffeological Spaces
Witteveen, E. (Eef)The Crew: a Strategy Analysis
Zuijderduijn, T. (Tim)Fineman’s Parallel Digraph Reachability in Practice
Zwet, J. van der (Jasper)Reverse Multiplication Friendly Embeddings over Ring Extensions and their Application to Multiparty Computation