Searched for: subject%3A%22Hardware%22
(1 - 20 of 122)

Pages

document
van Wijk, Rijk (author)
Forensics is the art of gathering evidence, which for electronics amounts to accurately recovering data. Often, this can only be archived with state-of-the-art hacking techniques.<br/>However, replicating state-of-the-art research in hardware security can be difficult, due to the large number of components and connections. To counter this, a...
master thesis 2023
document
Wang, X. (author), Baldi, S. (author), Feng, Xuewei (author), Wu, Changwei (author), Xie, Hongwei (author), De Schutter, B.H.K. (author)
The vector field method was originally proposed to guide a single fixed-wing Unmanned Aerial Vehicle (UAV) towards a desired path. In this work, a non-uniform vector field method is proposed that changes in both magnitude and direction, for the purpose of achieving formations of UAVs. As compared to related work in the literature, the...
journal article 2023
document
Jiang, Longxing (author)
Convolutional Neural Networks (CNN) have become a popular solution for computer vision problems. However, due to the high data volumes and intensive computation involved in CNNs, deploying CNNs on low-power hardware systems is still challenging.<br/>The power consumption of CNNs can be prohibitive in the most common implementation platforms:...
master thesis 2022
document
Dommisse, Joost (author)
At this moment, the problem of plastic pollution does not need an introduction. Although recycling rates are slowly rising, plastic pollution remains one of the biggest threads to the global ecosystem. Especially in low-to-middle-income countries, industrial recycling systems are sparse due to their required investment.<br/><br/>Precious Plastic...
master thesis 2022
document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
ZHANG, Junsheng (author)
With the development of sustainable energy technology and the increasing emphasis on environmental protection, the popularity of electric vehicles is increasing. However, As the number of electric vehicles increases, so does the pressure on the grid due to charging. If a large number of electric vehicles are charged at the same time, the grid...
master thesis 2022
document
van den Broek, Geert (author)
An Industrial Control System (ICS) is used to monitor and control industrial processes and critical infrastructure, and is therefore crucial to modern society. This makes them attractive targets for malicious cyber-attacks, which have become more advanced and abundant in recent history. To properly defend ICSs from these cyber-attacks,...
master thesis 2022
document
Bubberman, Wolf (author)
Side-Channel Attacks (SCA) attempt to recover the secret cryptographic key from an electronic device by exploiting the unintended physical leakages of said device. With the devices that are being attacked becoming more sophisticated, so is SCA. In the past few years, the focus of the research in the field of SCA shifted towards the application...
master thesis 2022
document
Reukers, Matthijs (author)
Tydi is an open specification for streaming dataflow designs in digital circuits, allowing designers to express how composite and variable-length data structures are transferred over streams using clear, data-centric types. This provides a higher-level method for defining interfaces between components as opposed to existing bit- and byte-based...
master thesis 2022
document
de Vos, Adriaan (author)
The upcoming IEEE 802.1CB standard aims to solve performance and reliability issues in Time-Sensitive Networking (TSN). Mission-critical systems often use these standards for communication in automotive, industrial, and avionic networks. However, researchers did not sufficiently investigate the security risks and possible mitigation solutions to...
master thesis 2022
document
van Mourik, Floris (author), Onstein, Teije (author)
As electromagnetic waves cannot propagate sufficiently far in water, underwater communication is mainly performed using either acoustics or optics. However, none of these technologies have been proven to be completely effective in every situation. Therefore, research in new underwater communication systems can still bring large benefits to a...
bachelor thesis 2022
document
Huijgens, L.J.G. (author), Vrijdag, A. (author), Hopman, J.J. (author)
The interaction between ship propulsion machinery, propellers and the highly dynamic environment which is the sea is a complex yet highly relevant subject. During a storm, for example, waves and ship motions may cause the propeller to draw air, or ventilate, resulting in rapid changes in propeller thrust and load torque. These fluctuations...
journal article 2022
document
Chen, Jie (author), Gallo, A.J. (author), Yan, Shuo (author), Parisini, Thomas (author), Yuen Ron Hui, Shu (author)
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber-attacks remain a threat to such distributed control. This paper...
journal article 2022
document
Hou, Jue (author), Liu, Zhou (author), Wang, Shaorong (author), Chen, Zhe (author), Xie, Wei (author), Fang, Cheng (author), Wei, Xinchi (author), Popov, M. (author)
Supplementary control (SC) technology is widely leveraged by power supply companies in active distribution networks (ADNs) to improve their stability and dynamic characteristics. Yet, the existed SCs are generally implemented from inside the converter controllers of distributed generators (DGs) or active loads, so there is a need to redesign...
journal article 2022
document
Overwater, R.W.J. (author), Babaie, M. (author), Sebastiano, F. (author)
Quantum error correction (QEC) is required in quantum computers to mitigate the effect of errors on physical qubits. When adopting a QEC scheme based on surface codes, error decoding is the most computationally expensive task in the classical electronic back-end. Decoders employing neural networks (NN) are well-suited for this task but their...
journal article 2022
document
Köylü, T.C. (author), Caetano Garaffa, L. (author), Reinbrecht, Cezar (author), Zahedi, M.Z. (author), Hamdioui, S. (author), Taouil, M. (author)
The massive deployment of Internet of Things (IoT) devices makes them vulnerable against physical tampering attacks, such as fault injection. These kind of hardware attacks are very popular as they typically do not require complex equipment or high expertise. Hence, it is important that IoT devices are protected against them. In this work, we...
conference paper 2022
document
Fang, G. (author), Tian, Yingjun (author), Yang, Zhi Xin (author), Geraedts, Jo M.P. (author), Wang, C.C. (author)
This article presents an efficient learning-based method to solve the &lt;italic&gt;inverse kinematic&lt;/italic&gt; (IK) problem on soft robots with highly nonlinear deformation. The major challenge of efficiently computing IK for such robots is due to the lack of analytical formulation for either forward or inverse kinematics. To address...
journal article 2022
document
Yousefzadeh, Amirreza (author), Stuijt, Jan (author), Hijdra, Martijn (author), Liu, Hsiao-Hsuan (author), Gebregiorgis, A.B. (author), Singh, A. (author), Hamdioui, S. (author), Catthoor, Francky (author)
Computation-in-Memory (CIM) is an emerging computing paradigm to address memory bottleneck challenges in computer architecture. A CIM unit cannot fully replace a general-purpose processor. Still, it significantly reduces the amount of data transfer between a traditional memory unit and the processor by enriching the transferred information....
journal article 2022
document
Beliautsou, Viktar (author), Alfonso, Jesus (author), Giltay, J.N.P. (author), Büchner, Florian (author), Shyrokau, B. (author), Castellanos, Jose A. (author), Ivanov, Valentin (author)
This paper presents the validation of an integrated chassis controller that unites three groups of actuators for the electric vehicle (EV) with independent in-wheel electric motors (IWMs) for each wheel. Controlled actuators are the IWMs, the active suspension, and the braking system. The models of test benches and the designed architecture of...
conference paper 2022
document
Tomlinson, Andrew (author), Parkin, S.E. (author), Shaikh, Siraj Ahmed (author)
The decisions involved in choosing technology components for systems are poorly understood. This is especially so where the choices pertain to system security and countering the threat of cybersecurity attack. Although common in some commercial products, secure hardware chips provide security functions such as authentication, secure execution...
journal article 2022
Searched for: subject%3A%22Hardware%22
(1 - 20 of 122)

Pages