Essays about: "Power profiling"

Showing result 11 - 15 of 36 essays containing the words Power profiling.

  1. 11. "No Justice, No Peace, No Racist Police" : A diachronic comparative study and analysis of the power relations revealed in French media discourses

    University essay from Malmö universitet/Institutionen för globala politiska studier (GPS)

    Author : Julie Alves Canteiro; [2021]
    Keywords : Police violence; power relations; racial profiling; media and communication; France;

    Abstract : On May 26th, 2020, the world was shocked after learning that George Floyd had died at the hands of the police while being wrongfully arrested. Protests took place worldwide, demanding justice for Floyd as well as the end of the systematic racism present institutionally in police forces. READ MORE

  2. 12. Estimating energy consumption of Wifi transceiver circuits on a single board computer

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frida Mattsson; [2021]
    Keywords : Transceiver circuit; 802.11; energy consumption; software profiling; single-board computer; Raspberry Pi; Transceiver; 802.11; energikonsumtion; mjukvaruprofilering; enkortsdator; Raspberry Pi;

    Abstract : This work comprises an approximation of the energy consumption of the transceiver circuit in a single board computer. Single board computers, such as the Raspberry Pi 4 Model B that is used here, are usually cheap and therefore more accessible. READ MORE

  3. 13. Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Filip Björklund; Niklas Landin; [2021]
    Keywords : side-channel attack; deep learning; poweranalysis; ATtiny85; diversity; sidokanalsattack; djupinlärning; effektanalys; ATtiny85; mångfald;

    Abstract : Hardware security is an increasingly relevant topic because more and more systems and products are equipped with embedded microcontrollers. One type of threat against hardware security is attacks against encryption implementations in embedded hardware. READ MORE

  4. 14. Runtime cross-layer optimization for visual-inertial localization on resource-constrained devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jessica Ivy Kelly; [2021]
    Keywords : Cross-layer optimization; Resource management; Resource-constrained devices; Runtime control; Visual-inertial localization.;

    Abstract : An increasing number of complex applications are being executed on resource constrained devices, such as drones and rovers. Such systems often operate in dynamic and unknown environments, and consequently have dynamic performance requirements based on their surroundings. READ MORE

  5. 15. Force-velocity profiling among handball-players

    University essay from Göteborgs universitet/Institutionen för kost- och idrottsvetenskap

    Author : Pontus Axell; Kalle Öberg; [2020-08-17]
    Keywords : Force-Velocity Profiling; Force-Velocity Relationship; Handball; Performance Analysis; Activity profiles; Vertical Jump; Developing Power;

    Abstract : Modern handboll har en intermittent karaktär som inkluderar ett flertal komplexa fysiska kvalitéer. Kunskap om dessa individuella fysiska krav mellan positioner verkar vara essentiella för att designa optimala tränings program för att maximera spelarnas potential på plan. READ MORE