Essays about: "mac implementation"

Showing result 1 - 5 of 47 essays containing the words mac implementation.

  1. 1. Evaluation of Ferroelectric Tunnel Junction memristor for in-memory computation in real world use cases

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Alec Guerin; Christos Papadopoulos; [2023]
    Keywords : FTJ; Ferroelectric Tunneling Junction; Analog in-memory computing; AIMC; Memristor; A.I.; AIHWKIT; Semantic segmentation; Natural Language Processing; NLP; Neuromorphic Computing; Matrix Vector Multiplication; Technology and Engineering;

    Abstract : Machine learning algorithms are experiencing unprecedented attention, but their inherent computational complexity leads to high energy consumption. However, a paradigm shift in computing methods has the potential to address the issue. READ MORE

  2. 2. Implementation of LPWAN protocols for Water Sense : Integration of LoRa and Contiki OS with the Rime stack

    University essay from Uppsala universitet/Signaler och system

    Author : Barry Dyi; [2022]
    Keywords : Contiki; LoRa; Telecommunications; Embedded Systems; WSN; IoT;

    Abstract : The purpose of this thesis rose from tackling a specific project led by Cybercom Group. Water Sense was proposed after municipalities expressed the need to conveniently conduct measurements on water in Swedish lakes, and remotely get access to these data. READ MORE

  3. 3. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  4. 4. UWB-TWR performance comparison in a hybrid node network

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Oskar Sundin; [2021]
    Keywords : UWB; TWR; CSMA; Token ring;

    Abstract : This thesis investigated the performance of a positioning system that utilised UWB technology where devices regularly shifts between acting as an initiator and as a responder for distance measurements between each other. The goal was to investigate existing positional techniques and to implement a novel network where devices initiates and responds to distance measurement exchanges. READ MORE

  5. 5. Creating Digital Twin Distributed Networks Using Switches With Programmable Data Plane

    University essay from Linköpings universitet/Programvara och system

    Author : Rasmus Larsson; [2021]
    Keywords : P4; Programmable switches; SDN; Network Virtualisation; Ethernet VPN; VPN; BMv2;

    Abstract : The domain specific language P4 is a novel initiative which extends the Software-Defined Networking (SDN) paradigm by allowing for data plane programmability. Network virtualisation is a class of network technologies which can be used to abstract the addressing in a network, allowing multiple tenants to utilise the network resources while being agnostic to the underlying network and the other tenants. READ MORE