- document
-
van Zoelen, E.M. (author), van den Bosch, K. (author), Abbink, D. (author), Neerincx, M.A. (author)When humans and AI-agents collaborate, they need to continuously learn about each other and the task. We propose a Team Design Pattern that utilizes adaptivity in the behavior of human and agent team partners, causing new Collaboration Patterns to emerge. Human-AI Co-Learning takes place when partners can formalize recognized patterns of...conference paper 2023
- document
-
Neumann, N.M.P. (author), de Heer, P.B.U.L. (author), Phillipson, F. (author)In this paper, we present implementations of an annealing-based and a gate-based quantum computing approach for finding the optimal policy to traverse a grid and compare them to a classical deep reinforcement learning approach.We extended these three approaches by allowing for stochastic actions instead of deterministic actions and by...article 2023
- document
-
Snelder, M. (author), Smit, S. (author), Schadd, M. (author), Walraven, E. (author)Network design problems such as the optimization of road capacities, public transport lines and frequencies, mobility hub locations, shared mobility services and traffic signal settings have been extensively studied in literature using sequential bi-level optimization. However, due to the computational burden, the design and response spaces that...conference paper 2023
- document
-
Yang, Q. (author), Coutino, M. (author), Leus, G. (author), Giannakis, G.B. (author)Graph-based learning and estimation are fundamental problems in various applications involving power, social, and brain networks, to name a few. While learning pair-wise interactions in network data is a well-studied problem, discovering higher-order interactions among subsets of nodes is still not yet fully explored. To this end, encompassing...article 2023
- document
-
Stroek, K. (author), Visser, A. (author), van der Ploeg, C.P.B. (author), Zwaveling-Soonawala, N. (author), Heijboer, A.C. (author), Bosch, A.M. (author), van Trotsenburg, P. (author), Boelen, A. (author), Hoogendoorn, M. (author), de Jonge, R. (author)Objective. The Dutch Congenital hypothyroidism (CH) Newborn Screening (NBS) algorithm for thyroidal and central congenital hypothyroidism (CH-T and CH-C, respectively) is primarily based on determination of thyroxine (T4) concentrations in dried blood spots, followed by thyroid-stimulating hormone (TSH) and thyroxine-binding globulin (TBG)...article 2023
- document
-
Viera, J. (author), Aguilar, J. (author), Rodriguez-Moreno, M. (author), Quintero-Gull, C. (author)Analyzing energy consumption is currently of great interest to define efficient energy management strategies. In particular, studying the evolution of the behavior of the consumption pattern can allow energy policies to be defined according to the time of the year. In this sense, this work proposes to study the evolution of energy behavior...article 2023
- document
-
Difrancesco, S. (author), van Baardewijk, J.U. (author), Cornelissen, A.S. (author), Varon, C. (author), Hendriks, R.C. (author), Brouwer, A.M. (author)Wearable sensors offer new opportunities for the early detection and identification of toxic chemicals in situations where medical evaluation is not immediately possible. We previously found that continuously recorded physiology in guinea pigs can be used for early detection of exposure to an opioid (fentanyl) or a nerve agent (VX), as well as...article 2023
- document
-
Verriet, J. (author), van der Sanden, B. (author), van der Veen, G. (author), van Splunter, A. (author), Lousberg, S. (author), Hendriks, M. (author), Basten, T. (author)Product family development facilitates reuse across all phases of systems engineering; in case of model-based systems engineering, this reuse involves the models as well. Introducing a model-based way of working is challenging, especially for product family development. This paper describes a case of introducing a modelbased way of working in...conference paper 2023
- document
-
Dimitrovski, T. (author), Bergman, T. (author), Zuraniewski, P. (author)The use of Machine Learning in many control and management processes is rising fast. This is especially true for the management of cloud native applications and for anomaly detection in cyber-security mechanisms. However, it has been shown that ML is an attack surface on its own, especially when the attack is performed by another ML system....conference paper 2023
- document
-
Stuldreher, I.V. (author), Merasli, A. (author), Thammasan, N. (author), van Erp, J.B.F. (author), Brouwer, A.M. (author)Research on brain signals as indicators of a certain attentional state is moving from laboratory environments to everyday settings. Uncovering the attentional focus of individuals in such settings is challenging because there is usually limited information about real-world events, as well as a lack of data from the real-world context at hand...article 2022
- document
-
Souto Lima, E. (author), van Stokkum, R. (author), van der Klauw, M. (author), Hooftman, W.E. (author)Dit rapport bevat een beschrijving van de aanleiding, methoden en resultaten van het project “Machine Learning: A Data Driven Burnout Risk Analysis”, uitgevoerd in het voorjaar van 2019. In dit project zijn moderne machine learning (ML) algoritmes gebruikt om op een data gedreven manier oorzaken te vinden van burn-out symptomen in het...report 2022
- document
- Bartezzaghi, A. (author), Giurgiu, I. (author), Marchiori, C. (author), Rigotti, M. (author), Sebastian, R. (author), Malossi, C. (author) conference paper 2022
- document
-
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...conference paper 2022
- document
-
Peysakhovich, V. (author), Ledegang, W. (author), Houben, M. (author), Groen, E. (author)Eye movements analysis has great potential for understanding operator behaviour in many safety-critical domains, including aviation. In addition to traditional eye-tracking measures on pilots’ visual behavior, it seems promising to incorporate machine learning approaches to classify pilots’ visual scanning patterns. However, given the multitude...conference paper 2022
- document
-
Schultes, E. (author), Roos, M. (author), Bonino da Silva Santos, L.O. (author), Guizzardi, G. (author), Bouwman, J. (author), Hankemeier, T. (author), Baak, A. (author), Mons, B. (author)Although all the technical components supporting fully orchestrated Digital Twins (DT) currently exist, what remains missing is a conceptual clarification and analysis of a more generalized concept of a DT that is made FAIR, that is, universally machine actionable. This methodological overview is a first step toward this clarification. We...article 2022
- document
-
A Systematic Approach for Interfacing Component-Based Software with an Active Automata Learning ToolAslam, K. (author), Hendriks, D. (author)Applying Model-Driven Engineering can improve development efficiency. But gaining such benefits for legacy software requires models, and creating them manually is both laborious and error prone. Active automata learning has the potential to make it cost-effective, but practitioners face practical challenges applying it to software components of...conference paper 2022
- document
-
van Rooij, S.B. (author), Uysal, F. (author), Papari, G. (author), Kruithof, M.C. (author), Caro Cuenca, M. (author)Radar systems play a very important role in Space Situational Awareness (SSA) since they are able to provide a wealth of information on remote objects. In particular, imaging radars can characterize space objects using Inverse Synthetic Aperture Radar (ISAR) techniques. Under the right circumstances, ISAR images can provide details of a...conference paper 2022
- document
-
Santos, R.D. (author), Aguilar, J. (author), Rodriguez-Moreno, M.D. (author)In a smart environment like the smart grids, it is necessary to have knowledge models that allow solving emerging problems. However, large datasets are required to automatically create these models, which in the vast majority of cases are not available. Therefore, in these environments is essential to have a data generator for each context. In...conference paper 2022
- document
-
Differentially Private Block Coordinate Descent for Linear Regression on Vertically Partitioned Datade Jong, J. (author), Kamphorst, B. (author), Kroes, S. (author)We present a differentially private extension of the block coordinate descent algorithm by means of objective perturbation. The algorithm iteratively performs linear regression in a federated setting on vertically partitioned data. In addition to a privacy guarantee, we derive a utility guarantee; a tolerance parameter indicates how much the...article 2022
- document
-
Farella, M. (author), Arrigo, M. (author), Tosto, C. (author), Taibi, D. (author), Seta, L. (author), Chifari, A. (author), Goei, S.L. (author), Pronk, J. (author), Mangina, E. (author), Denaro, P. (author), Dhrami, D. (author), Chiazzese, G. (author)The spread of Augmented Reality (AR) and the recent technological developments, provide innovative techniques and tools that show a growing potential in education. One of the pilots of the European Horizon 2020 project ARETE (Augmented Reality Interactive Educational System) aims to investigate and evaluate for the first time the introduction of...conference paper 2022