SH

S. Hamdioui

11 records found

Identifying and Modulating Pathological Brain Connectivity: A Computational Approach

Patient-Specific, Virtual Brain Twins and Network Neuromodulation

Neuromodulation is a promising treatment methodology for disorders of the brain. However, current clinical applications are primarily focused on a rudimentary form of neuromodulation, exclusively targeting individual regions in the brain. This has led to limitations in effective ...
With the prosperity of the Internet of Things (IoT) and artificial intelligence (AI), more and more edge devices have been deployed to enable intelligent applications. However, due to the limited energy budget and computation resources, it is challenging to deploy deep neural net ...
Neuromorphic systems offer a promising solution to the computational challenges of intra-cortical Brain-Computer Interfaces (iBCIs), leveraging the event-driven nature of biological neural networks for enhanced power efficiency and data scalability. The exponential growth in neur ...
Ultra-low power Edge AI hardware is in increasing demand due to the battery-limited energy budget of typical Edge devices such as smartphones, wearables, and IoT sensor systems. For this purpose, this Thesis introduces an ultra-low power event-driven SRAM-based Compute In-Memory ...
The ever-increasing energy demands of traditional computing platforms (CPU, GPU) for large-scale deployment of Artificial Intelligence (AI) has spawned an exploration for better alternatives to existing von-Neumann compute architectures. Computation In-Memory (CIM) using emerging ...
As of 2021, the world economic forum deems cyber-security failures as one of the most potent threats to the world. According to a McAfee report, the cost of cybercrimes in 2020 reached nearly 1 trillion US dollars, which was around 50 percent more than what it was in 2018. Exacer ...

Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...

The adoption of Microprocessors is increasingly diversifying to several embedded and mo- bile devices. Growingly they can also be found in Smart Cards, RFID tags, SIM cards, Pay TVs, identity cards and passports. These devices store, processes and transact sensitive information l ...
Hardware implementations of encryption schemes are unprotected against side-channel analysis techniques. Physical realizations of secure algorithms leak side-channel information through power, noise, time, sound and electromagnetic radiation. Data-dependent correlations with this ...

Circumventing Secure JTAG

A detailed plan of attack

Forensic science is the cornerstone of the modern justice system, as it allows us to analyze evidence in order to discover the truth behind a crime scene. As mobile phones became more important to our daily lives they've taken up a bigger part in forensic research as well. These ...

Autonomous battery less sensor for IoT applications in Smart Buildings

Low-power Energy Conversion and Storage for RF Energy Harvesting

This report discusses one part of a project consisting of three parts. The goal of the project is to design a battery less sensor powered by RF energy fields present in an office environment. The sensor is able to measure the temperature and is able to communicate wirelessly usin ...