Searched for: subject:"Search"
(1 - 20 of 106)

Pages

document
Paver, R. (author), de Witte, H. (author), Rothmann, S. (author), van den Broeck, A. (author), Blonk, R.W.B. (author)
No validated intervention that specifically addresses the psychosocial needs of unemployed people exists in the South African context. This study intends to evaluate an evidence-based job-search program, called the JOBS intervention, that is aimed at the self-efficacy, amotivation, and self-esteem related to participants searching for jobs. A...
article 2020
document
Hauge, M. (author), Mjelde, T.M. (author), Holtzer, A. (author), Drijver, F. (author), in't Velt, R. (author), Hegland, A.M. (author), Orbekk, E. (author), Barz, C. (author), Kirchhoff, J. (author), Rogge, H. (author)
Combining several mobile networks in order to build a federated network at the tactical edge is a challenge because of the high degree of mobility and limited data capacity available in these networks. Providing the different partners in a coalition with direct connectivity at the tactical edge can be beneficial since it allows for better...
conference paper 2020
document
van der Burg, E. (author), Hogervorst, M.A. (author), Toet, A. (author)
Targets that are well camouflaged under static conditions are often easily detected as soon as they start moving. We investigated and evaluated ways to design camouflage that dynamically adapts to the background and conceals the target while taking the variation in potential viewing directions into account. In a human observer experiment...
conference paper 2020
document
Toet, A. (author), Hoogervorst, M.A. (author)
In military operations signature reduction techniques such as camouflage nets, low-emissive paints, and camouflage patterns are typically deployed to optimize the survivability of high value assets by minimizing their detectability. Various methods have been developed to assess the effectiveness of these camouflage measures. There are three main...
article 2020
document
Madadi, B. (author), van Nes, R. (author), Snelder, M. (author), van Arem, B. (author)
This paper presents a bi-level model to optimize automated-vehicle-friendly subnetworks in urban road networks and an efficient algorithm to solve the model, which is relevant for the transition period with vehicles of different automation levels. We formulate the problem as a network design problem, define solution requirements, present an...
article 2019
document
van Rooijen, A.L. (author), Bouma, H. (author), Verbeek, F. (author)
Person re-identification (re-id) is the task of identifying a person of interest across disjoint camera views in a multi-camera system. This is a challenging problem due to the different poses, viewpoints and lighting conditions. Deeply learned systems have become prevalent in the person re-identification field as they are capable to deal with...
conference paper 2019
document
Grappiolo, C. (author), van Gerwen, M.J.A.M. (author), Verhoosel, J.P.C. (author), Somers, L. (author)
The booming popularity of data science is also affecting high-tech industries. However, since these usually have different core competencies - building cyber-physical systems rather than e.g. machine learning or data mining algorithms - delving into data science by domain experts such as system engineers or architects might be more cumbersome...
conference paper 2019
document
Fransman, J.E. (author), Sijs, J. (author), Dol, H.S. (author), Theunissen, E. (author), de Schutter, B. (author)
In this paper, Mine Counter-Measures (MCM) operations with multiple cooperative Autonomous Underwater Vehicles (AUVs) are examined within the Distributed Constraint optimization Problem (DCOP) framework. The goal of an MCM-operation is to search for mines and mine-like objects within a predetermined area so that ships can pass the area through a...
conference paper 2019
document
Newall, M. (author), van Gulijk, C. (author)
It is often necessary to parse large volumes of text in the process of carrying out Safety and Risk Management duties. One example of this is the Close Call system, operated in the UK to log safety related incidents on the GB railways. Approximately 300,000 unstructured text reports are added each year. Traditionally, locating and categorizing...
conference paper 2019
document
van der Burg, E. (author), Cass, J. (author), Theeuwes, T. (author)
In this study we investigated under what conditions motion direction changes pop out in continuously moving target/distractor environments. Participants were presented with vertically oriented Gabor patches whose carrier components drifted at a constant speed from left to right and then reversed direction. On any given trial, one of these...
article 2019
document
Vazquez, A.R. (author), Goos, P. (author), Schoen, E.D. (author)
Two-level orthogonal arrays of N runs, k factors, and a strength of 3 provide suitable fractional factorial designs in situations where many of the main effects are expected to be active, as well as some two-factor interactions. If they consist of N/2 mirror image pairs, these designs are fold-over designs. They are called even and provide at...
article 2019
document
Toet, A. (author), Hogervorst, M.A. (author)
In military operations signature reduction techniques such as camouflage nets, low-emissive paints, and camouflage patterns are typically deployed to optimize the survivability of high value assets by minimizing their detectability. Various methods have been developed to assess the effectiveness of these camouflage measures. There are three main...
article 2019
document
Toet, A. (author), Hogervorst, M.A. (author)
public lecture 2019
document
van de Weijgert, M. (author), van der Burg, E. (author), Donk, M. (author)
The aim of the present study was to investigate how display density affects attentional guidance in heterogeneous search displays. In Experiment 1 we presented observers with heterogeneous sparse and dense search displays which were adaptively changed over the course of the experiment using genetic algorithms. We generated random displays, and...
article 2019
document
Pereira Barata, A. (author), Takes, F.W. (author), van den Herik, H.J. (author), Veenman, C.J. (author)
conference paper 2019
document
Grappiolo, C. (author), Verhoosel, J. (author), van Gerwen, E. (author), Somers, L. (author)
The booming popularity of data science is also affecting high-tech industries. However, since these usually have different core competencies — building cyber-physical systems rather than e.g. machine learning or data mining algorithms — delving into data science by domain experts such as system engineers or architects might be more cumbersome...
conference paper 2018
document
Saad, E. (author), Hindriks, K.V. (author), Neerincx, M.A. (author)
Task allocation and management is crucial for human-robot collaboration in Urban Search And Rescue response efforts. The job of a mission team leader in managing tasks becomes complicated when adding multiple and different types of robots to the team. Therefore, to effectively accomplish mission objectives, shared situation awareness and task...
conference paper 2018
document
Kuiper, O.X. (author), Bos, J.E. (author), Diels, C. (author)
Carsickness is associated with a mismatch between actual and anticipated sensory signals. Occupants of automated vehicles, especially when using a display, are at higher risk of becoming carsick than drivers of conventional vehicles. This study aimed to evaluate the impact of positioning of in-vehicle displays, and subsequent available...
article 2018
document
Mohammed, S. (author), Schoolderman, A.J. (author)
conference paper 2018
document
Raaijmakers, S.A. (author), Sappelli, M. (author), Kraaij, W. (author)
In this short paper, we address the interpretability of hidden layer representations in deep text mining: deep neural networks applied to text mining tasks. Following earlierwork predating deep learning methods, we exploit the internal neural network activation (latent) space as a source for performing k-nearest neighbor search, looking for...
conference paper 2017
Searched for: subject:"Search"
(1 - 20 of 106)

Pages