Pages
- 1
- 2
- document
-
Huang, Ruoyu (author)Internet of Things (IoT) devices regularly process sensitive data, including personal information. Therefore, ensuring their security is crucial to avoid damage and prevent data breaches. The Advanced Encryption Standard (AES) is generally regarded as one of the most popular cryptographic algorithms for ensuring data security. Typical...master thesis 2023
- document
-
Lung, Stefan (author)Rowhammer is a security exploit used to cause bit errors DRAM chips. Newer DRAM technologies are becoming more vulnerable to rowhammer attacks, and existing protec- tion methods are starting to reach their limits. This thesis provides methods for DRAM characterization by means of reverse engineering, an in-depth analysis of vulnerable cells...master thesis 2023
- document
-
Hu, Zhewen (author)Over the last decade, applications like self-driving, image recognition and speech processing are having more and more impact on the society, all these applications are based on machine learning, and machine learning is all about metrics and vectors. For that reason, vector processors are getting attraction again.<br/><br/>Most of the previous...master thesis 2023
- document
-
Pathak, Karan (author)Computer Architects often walk the tightrope between performance, power and area while designing modern day processors. This daunting task is made even more challenging by short Time-to-Market requirements set by the clients. In light of these challenges, architectural simulators provide a much needed tool for the architects to gauge the impact...master thesis 2023
- document
-
van Tuijn, Jan (author)Manufacturers of CubeSats prefer the use of COTS electronic components such as microcontrollers (MCU) and SDRAM but these components are vulnerable to errors caused by radiation. A specific type of error caused by radiation are soft errors which can be corrected by Error Detection and Correction (EDAC) methods. Unfortunately, it is uncommon for...master thesis 2022
- document
-
Shi, Jia (author)Over the last decade, the recognition of the potential value of augmented reality (AR) and other human-machine interfaces has been growing. These applications are all based on depth sensing technologies. Among various depth sensing technologies, the Time-of-Flight (ToF) approach is emerging as a widely applicable method because it has the...master thesis 2022
- document
-
Molenkamp, Michaƫl (author)Many devices currently connect to the internet. Some are pretty well secured, while others lack security due to bugs or other vulnerabilities. A scanner searches for available services on the internet or computer host using standard network protocols. An adversary uses a scanner to search for leaks in security. However, scanners encode their...master thesis 2021
- document
-
Nicou, Nikolas (author)The field of Computing has been a significant catalyst for innovation across various segments of our lives. Computational neuroscience keeps demanding increased perfor- mance to implement powerful simulators able to closely approximate brain behavior using complex mathematical models. This resulted in various High-Performance Com- puting systems...master thesis 2020
- document
-
Vermond, Lukas (author)In an effort to make DNA sequencing more accessible and affordable, Oxford Nanopore Technologies developed the MinION: A portable cellphone sized DNA sequencing device. Translating the information from this device to a nucleotide sequence is called basecalling, and is done with the aid of artificial neural networks. In this thesis, we accelerate...master thesis 2020
- document
-
Pulli, A. (author)Over the past years, a considerable amount of effort has been devoted to the definition and implementation of techniques for the optimization and acceleration of applications on various computing platforms. Among these techniques, the extension of a given instruction-set architecture with custom instructions has become a common approach. Custom...master thesis 2014
- document
-
Cao, J. (author)Ultra Wideband (UWB) radio represents a promising way of communication for low power applications in interference-prone environments. For achieving a low power solution the digital baseband architecture needs to be carefully optimized to reduce the total power consumption. Particularly for the computationally intensive synchronization phase that...master thesis 2012
- document
-
Cinserin, G. (author)Over the past decade, products enabled by 3D technology have been increasingly adopted in the consumer market. The current challenge in the field is to explore the methods of free-viewpoint interpolation for 3D TVs. Free-viewpoint interpolation enhances the user experience significantly by allowing the viewer to select and alter the desired...master thesis 2011
- document
-
Brandon, A.A.C. (author)In this thesis we describe a new generic approach for accelerating software functions using a reconfigurable device connected through a high-speed link to a general purpose system. In order for our solution to be generic, as opposed to related ISA extension approaches, we insert system calls into the original program to control the...master thesis 2010
- document
- Noroozi, A. (author) master thesis 2010
- document
-
Stafylarakis, D. (author)The thesis addresses the topic of security and privacy for RFID systems. The current state of the art on RFID technology is presented, along with a brief overview of the physical principles governing such systems. A description of the concepts of security and privacy and potential problems in RFID systems due to lack thereof follows. Within this...master thesis 2010
- document
-
Dave, D. (author)As we move towards an aging population, it is likely that an increasing number of people will require an increasing diversity of implants, but at a lower cost to the society. Also, as computer technology progresses, smaller, more powerful, and less battery intensive implants can be designed. However, present implant design methodology is highly...master thesis 2010
- document
-
Chandrasekar, K. (author)Network-on-Chip (NoC) is established as the most scalable and efficient solution for the on-chip communication challenges in the multi-core era, since it guarantees scalable high-speed communication with minimal wiring overhead and physical routing issues. However, efficiency of the NoC depends on its design decisions, which must be made...master thesis 2009
- document
- Abikhaled, A.M. (author) master thesis 2009
- document
-
Keyser, S. (author), Velzeboer, T. (author)The RFID guardian is an embedded device to protect the privacy of people using their RFID (Radio Frequency IDentification) enabled products. This BSc. project is about how version 2 of the RFID Guardian hardware was designed. Besides the description about the hardware it handles some obligatory paperwork for the design flow which was used during...bachelor thesis 2009
- document
-
Roumi, M. (author)Feature extraction is a key function in various image processing applications. A feature is an image characteristic that can capture certain visual property of the image. Texture is an important feature of many image types, which is the pattern of information or arrangement of the structure found in a picture. Texture features are used in...master thesis 2009
Pages
- 1
- 2