Essays about: "Real time operating system"
Showing result 1 - 5 of 207 essays containing the words Real time operating system.
-
1. Evaluation of OPAL-RT Simulator through Simulation of Microgrid with High Penetration of DER
University essay from Uppsala universitet/ElektricitetsläraAbstract : This thesis was written in collaboration with the department of electrical engineering at Uppsala University. It evaluates and tests the potentials and limitations of using the OPAL-RT simulator as a tool for designing and developing control strategies used in microgrids with a high penetration of distributed energy resources. READ MORE
-
2. Real-Time System Benchmarking with Embedded Linux and RT Linux on a Multi-Core Hardware Platform
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : To catch up with the growing trend of parallelism, this thesis work focuses on the adaption of embedded real-time systems to a multicore platform. We use the embedded system of Xilinx ZCU-102, a multicore board, as an example of an embedded system without getting deep into its architecture. READ MORE
-
3. EMONAS : Evolutionary Multi-objective Neuron Architecture Search of Deep Neural Network
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Customized Deep Neural Network (DNN) accelerators have been increasingly popular in various applications, from autonomous driving and natural language processing to healthcare and finance, etc. However, deploying them directly on embedded system peripherals within real-time operating systems (RTOS) is not easy due to the paradox of the complexity of DNNs and the simplicity of embedded system devices. READ MORE
-
4. Anomaly Detection for Condition Monitoring in Robot Systems
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : This thesis addresses the detection of wear patterns in robot joints as an indication of the increase in wear level or impending failures. The main challenges include identifying key wear features, developing efficient anomaly detection algorithms, ensuring generalization across different joints and operating conditions, and enabling real-time monitoring. READ MORE
-
5. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE