Blar i Department of Informatics på tittel
Viser treff 3-22 av 999
-
A Comparative Analysis of Super Resolution in Smart Meter Data Using Machine Learning Techniques
(Master thesis, 2024-03-18) -
A customizable and modular VR game for use in pain distraction
(Master thesis, 2024-06-03)Chronic pain is defined as pain persisting for more than three months. The cause of these conditions varies from musculoskeletal issues to nerve damage. These issues may cause reduced movement, further impacting the patient's ... -
A Domain-Specific Language for the Development of Heterogeneous Multi-Robot Systems
(Master thesis, 2019-06-28)Robots are becoming more advanced each year and will increasingly become a bigger part of our lives. This thesis explores how model-driven software engineering can be used in the development of heterogeneous multi-robot ... -
A Modular Approach for Creating Web Applications with 3D Geology Using React and X3DOM
(Master thesis, 2019-06-29)The thesis details the work for creating a web application that allows a user to see a visualization for geological data like topography, seismic data and well measurements from the subsurface. This application uses the ... -
A Snakemake workflow for analysing alternative splicing events from short-read RNA-seq data
(Master thesis, 2022-04-13) -
A Visual Analytics Dashboard for Mental Health Therapists
(Master thesis, 2019-06-29)Mental health disorders are a significant problem throughout the western world. Cognitive Behavioral Therapy (CBT) is a common treatment form for these disorders. Internet-based Cognitive Behavioral Therapy (iCBT) provides ... -
A workflow-integrated brain tumor segmentation system based on fastai and MONAI
(Master thesis, 2022-06-01)Artificial intelligence (AI) has achieved great results in medical imaging tasks and has the potential to improve the experiences of clinicians and patients in the future, but on the way toward AI integration in medicine, ... -
Abstractions for Language-Independent Program Transformations
(Doctoral thesis, 2007-06-27) -
Accuracy and efficiency of germline variant calling pipelines for human genome data
(Journal article; Peer reviewed, 2020)Advances in next-generation sequencing technology have enabled whole genome sequencing (WGS) to be widely used for identification of causal variants in a spectrum of genetic-related disorders, and provided new insight into ... -
Accurate analysis of genuine CRISPR editing events with ampliCan
(Peer reviewed; Journal article, 2019)We present ampliCan, an analysis tool for genome editing that unites highly precise quantification and visualization of genuine genome editing events. ampliCan features nuclease-optimized alignments, filtering of experimental ... -
Acyclic, star, and injective colouring: bounding the diameter∗
(Journal article; Peer reviewed, 2022)We examine the effect of bounding the diameter for a number of natural and well-studied variants of the COLOURING problem. A colouring is acyclic, star, or injective if any two colour classes induce a forest, star forest ... -
An adaptive heuristic for Feeder Network Design with optional transshipment
(Journal article; Peer reviewed, 2023)This paper studies the Feeder Network Design Problem (FNDP), which considers the design of a minimum cost liner shipping network for the transportation of cargo (containers) between a given hub port and a set of feeder ... -
Additive Schwarz preconditioner for the finite volume element discretization of symmetric elliptic problems
(Peer reviewed; Journal article, 2015-09-25)A symmetric and a nonsymmetric variant of the additive Schwarz preconditioner are proposed for the solution of a class of finite volume element discretization of the symmetric elliptic problem in two dimensions, with large ... -
Algebraic Attack on Small Scale Variants of AES using Compressed Right Hand Sides
(Master thesis, 2018-04-07)The Advanced Encryption Standard is probably the most used symmetric encryption cipher in use today, which makes it particularly interesting for cryptanalysis. This thesis attacks smallscale variants of AES through a ... -
Algebraic Attacks on the Encryption Scheme HADESMiMC
(Master thesis, 2023-11-20)HADESMiMC is a recent symmetric cryptographic algorithm working with elements in a finite field. It is proposed as a candidate cipher for secure data transfers using Multiparty Computation (MPC). MPC is particularly useful ... -
Algebraic Cryptanalysis of Cryptographic Schemes with Extension Field Structure
(Doctoral thesis, 2021-09-06)Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Recent advances in quantum computing have made this kind of cryptography necessary, and research in the field has surged over ... -
Algebraic Reasoning About Timeliness
(Journal article; Peer reviewed, 2023)Designing distributed systems to have predictable performance under high load is difficult because of resource exhaustion, non-linearity, and stochastic behaviour. Timeliness, i.e., delivering results within defined time ... -
Algorithmic Complexity of Clustering and Low-Rank Approximation Problems
(Doctoral thesis, 2021-03-29)The two most popular unsupervised learning problems are k-Clustering and Low-Rank Approximation. Consider a set of n datapoints, in the k-Clustering problem, the objective is to partition these points into k clusters and ... -
An Algorithmic Meta-Theorem for Graph Modification to Planarity and FOL
(Journal article; Peer reviewed, 2020)In general, a graph modification problem is defined by a graph modification operation ⊠ and a target graph property 𝒫. Typically, the modification operation ⊠ may be vertex removal, edge removal, edge contraction, or edge ... -
An Algorithmic Meta-Theorem for Graph Modification to Planarity and FOL
(Journal article; Peer reviewed, 2023)In general, a graph modification problem is defined by a graph modification operation ⊠ and a target graph property 𝒫. Typically, the modification operation ⊠ may be vertex deletion, edge deletion, edge contraction, or ...