- document
-
Dukalski, M. (author), Rovetta, D. (author), van der Linde, S.G. (author), Möller, M. (author), Neumann, N. (author), Phillipson, F. (author)Much of recent progress in geophysics can be attributed to the adaptation of heterogeneous high-performance computing architectures. It is projected that the next major leap in many areas of science, and hence hopefully in geophysics too, will be due to the emergence of quantum computers. Finding a right combination of hardware, algorithms, and...article 2023
- document
-
Schoonderwoerd, T.A.J. (author), van Zoelen, E.M. (author), van den Bosch, K. (author), Neerincx, M.A. (author)The rapid advancement of technology empowered by artificial intelligence is believed to intensify the collaboration between humans and AI as team partners. Successful collaboration requires partners to learn about each other and about the task. This human-AI co-learning can be achieved by presenting situations that enable partners to share...article 2022
- document
-
Kim, L.J. (author), Phillipson, F. (author), Wezeman, R.S. (author)This paper considers the problem of identifying optimal locations for wireless service installations in smart cities. The problem is modelled as a facility location problem with multiple service types, known as the Multi Service Facility Location Problem (MSCFLP). Given a set of potential facility locations and demand point data, the goal is to...conference paper 2022
- document
-
van der Burg, E. (author), Yu, J. (author), Hogervorst, M.A. (author), Bin, L. (author), Culpepper, J. (author), Toet, A. (author)In order to assess camouflage and the role of movement under widely ranging (lighting, weather, background) conditions simulation techniques are highly useful. However, sufficient level of fidelity of the simulated scenes is required to draw conclusions. Here, live recordings were obtained of moving soldiers and simulations of similar scenes...conference paper 2021
- document
-
Paver, R. (author), de Witte, H. (author), Rothmann, S. (author), van den Broeck, A. (author), Blonk, R.W.B. (author)No validated intervention that specifically addresses the psychosocial needs of unemployed people exists in the South African context. This study intends to evaluate an evidence-based job-search program, called the JOBS intervention, that is aimed at the self-efficacy, amotivation, and self-esteem related to participants searching for jobs. A...article 2020
- document
-
Hauge, M. (author), Mjelde, T.M. (author), Holtzer, A. (author), Drijver, F. (author), in't Velt, R. (author), Hegland, A.M. (author), Orbekk, E. (author), Barz, C. (author), Kirchhoff, J. (author), Rogge, H. (author)Combining several mobile networks in order to build a federated network at the tactical edge is a challenge because of the high degree of mobility and limited data capacity available in these networks. Providing the different partners in a coalition with direct connectivity at the tactical edge can be beneficial since it allows for better...conference paper 2020
- document
-
van der Burg, E. (author), Hogervorst, M.A. (author), Toet, A. (author)Targets that are well camouflaged under static conditions are often easily detected as soon as they start moving. We investigated and evaluated ways to design camouflage that dynamically adapts to the background and conceals the target while taking the variation in potential viewing directions into account. In a human observer experiment...conference paper 2020
- document
-
Toet, A. (author), Hoogervorst, M.A. (author)In military operations signature reduction techniques such as camouflage nets, low-emissive paints, and camouflage patterns are typically deployed to optimize the survivability of high value assets by minimizing their detectability. Various methods have been developed to assess the effectiveness of these camouflage measures. There are three main...article 2020
- document
-
van Rooijen, A.L. (author), Bouma, H. (author), Verbeek, F. (author)Person re-identification (re-id) is the task of identifying a person of interest across disjoint camera views in a multi-camera system. This is a challenging problem due to the different poses, viewpoints and lighting conditions. Deeply learned systems have become prevalent in the person re-identification field as they are capable to deal with...conference paper 2019
- document
-
Grappiolo, C. (author), van Gerwen, M.J.A.M. (author), Verhoosel, J.P.C. (author), Somers, L. (author)The booming popularity of data science is also affecting high-tech industries. However, since these usually have different core competencies - building cyber-physical systems rather than e.g. machine learning or data mining algorithms - delving into data science by domain experts such as system engineers or architects might be more cumbersome...conference paper 2019
- document
-
Fransman, J.E. (author), Sijs, J. (author), Dol, H.S. (author), Theunissen, E. (author), de Schutter, B. (author)In this paper, Mine Counter-Measures (MCM) operations with multiple cooperative Autonomous Underwater Vehicles (AUVs) are examined within the Distributed Constraint optimization Problem (DCOP) framework. The goal of an MCM-operation is to search for mines and mine-like objects within a predetermined area so that ships can pass the area through a...conference paper 2019
- document
-
Newall, M. (author), van Gulijk, C. (author)It is often necessary to parse large volumes of text in the process of carrying out Safety and Risk Management duties. One example of this is the Close Call system, operated in the UK to log safety related incidents on the GB railways. Approximately 300,000 unstructured text reports are added each year. Traditionally, locating and categorizing...conference paper 2019
- document
-
van der Burg, E. (author), Cass, J. (author), Theeuwes, T. (author)In this study we investigated under what conditions motion direction changes pop out in continuously moving target/distractor environments. Participants were presented with vertically oriented Gabor patches whose carrier components drifted at a constant speed from left to right and then reversed direction. On any given trial, one of these...article 2019
- document
-
Vazquez, A.R. (author), Goos, P. (author), Schoen, E.D. (author)Two-level orthogonal arrays of N runs, k factors, and a strength of 3 provide suitable fractional factorial designs in situations where many of the main effects are expected to be active, as well as some two-factor interactions. If they consist of N/2 mirror image pairs, these designs are fold-over designs. They are called even and provide at...article 2019
- document
-
Toet, A. (author), Hogervorst, M.A. (author)In military operations signature reduction techniques such as camouflage nets, low-emissive paints, and camouflage patterns are typically deployed to optimize the survivability of high value assets by minimizing their detectability. Various methods have been developed to assess the effectiveness of these camouflage measures. There are three main...article 2019
- document
- Toet, A. (author), Hogervorst, M.A. (author) public lecture 2019
- document
-
van de Weijgert, M. (author), van der Burg, E. (author), Donk, M. (author)The aim of the present study was to investigate how display density affects attentional guidance in heterogeneous search displays. In Experiment 1 we presented observers with heterogeneous sparse and dense search displays which were adaptively changed over the course of the experiment using genetic algorithms. We generated random displays, and...article 2019
- document
- Pereira Barata, A. (author), Takes, F.W. (author), van den Herik, H.J. (author), Veenman, C.J. (author) conference paper 2019
- document
-
Madadi, B. (author), van Nes, R. (author), Snelder, M. (author), van Arem, B. (author)This paper presents a bi-level model to optimize automated-vehicle-friendly subnetworks in urban road networks and an efficient algorithm to solve the model, which is relevant for the transition period with vehicles of different automation levels. We formulate the problem as a network design problem, define solution requirements, present an...article 2019
- document
-
Grappiolo, C. (author), Verhoosel, J. (author), van Gerwen, E. (author), Somers, L. (author)The booming popularity of data science is also affecting high-tech industries. However, since these usually have different core competencies — building cyber-physical systems rather than e.g. machine learning or data mining algorithms — delving into data science by domain experts such as system engineers or architects might be more cumbersome...conference paper 2018