Advanced search

Showing result 1 - 5 of 12 essays matching the above criteria.

  1. 1. A lightweight deep learning architecture for text embedding : Comparison between the usage of Transformers and Mixers for textual embedding

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Corentin Royer; [2023]
    Keywords : Deep Learning; Entity Retrieval; Mixer; Transformer;

    Abstract : Text embedding is a widely used method for comparing pieces of text together by mapping them to a compact vector space. One such application is deduplication which consists in finding textual records that refer to the same underlying idea in order to merge them or delete one of them. READ MORE

  2. 2. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  3. 3. FPGA Accelerated Digital Image Correlation For Clamping Force Measurement

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : János Csanád Csuvarszki; [2023]
    Keywords : Digital image correlation; Field-programmable gate array; High-level synthesis;

    Abstract : Digital image correlation is a contactless optical method used for displacement and strain measurement which has become increasingly popular in the field of experimental mechanics. A specialized use case for the algorithm is to measure the clamping force in bolted joints, a crucial metric when considering the longevity and reliability of the constructs. READ MORE

  4. 4. FPGA accelerated packet capture with eBPF : Performance considerations of using SoC FPGA accelerators for packet capturing.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Duchniewicz; [2022]
    Keywords : Field Programmable Gate Array; Acceleration; Networking; Embedded Linux; Field Programmable Gate Array; Field Programmable Gate Array; Acceleration; Nätverksarbete; Inbyggd Linux; sprzętowa akceleracja; sieci internetowe; wbudowany system Linux;

    Abstract : With the rise of the Internet of Things and the proliferation of embedded devices equipped with an accelerator arose a need for efficient resource utilization. Hardware acceleration is a complex topic that requires specialized domain knowledge about the platform and different trade-offs that have to be made, especially in the area of power consumption. READ MORE

  5. 5. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE