Essays about: "complex computer systems."

Showing result 16 - 20 of 170 essays containing the words complex computer systems..

  1. 16. Modeling, Simulation, and Injection of Camera Images/Video to Automotive Embedded ECU : Image Injection Solution for Hardware-in-the-Loop Testing

    University essay from Uppsala universitet/Signaler och system

    Author : Anton Lind; [2023]
    Keywords : ADAS; AD; ADS; HIL; Hardware in the loop; Hardware-in-the-loop; ECU; VCU; Automotive; Embedded; System; Systems; Camera; Image; Video; Injection; FPGA; MPSoC; Vivado; Vitis; VHDL; Volvo; Cars; FMC; HPC; LPC; MIPI CSI2; GMSL2; AMBA AXI4; Xilinx; RTL; Implementation; Synthesis; Intelectual Property; IP; Vehicle computing unit; Electronic control unit; TEB0911; TEF0007; TEF0010; CSI2 Tx; CSI2 Tx Subsystem; Zynq; SerDes; AXI4; AXI4-Lite; Programmable Logic; PL; Processor System; PS; C; C ; Video test pattern generator; VTPG; Axi traffic generator; ATG; Ultrascale ; Virtual input output; VIO; Integrated logic analyzer; ILA; Interface Unit;

    Abstract : Testing, verification and validation of sensors, components and systems is vital in the early-stage development of new cars with computer-in-the-car architecture. This can be done with the help of the existing technique, hardware-in-the-loop (HIL) testing which, in the close loop testing case, consists of four main parts: Real-Time Simulation Platform, Sensor Simulation PC, Interface Unit (IU), and unit under test which is, for instance, a Vehicle Computing Unit (VCU). READ MORE

  2. 17. User Experience for Digital Onboarding : Examining fragmented system environments

    University essay from Umeå universitet/Institutionen för informatik

    Author : Sarah Lorenzo; Rebecka Herrgård; [2023]
    Keywords : Digital onboarding; digital employee experience; fragmentation; human-computer interaction; Research through Design; user experience;

    Abstract : As system environments become more complex, digital onboarding plays an increasingly vital role in helping new hires adapt to their digital surroundings. However, the user experience for new employees during digital onboarding in the workplace remains understudied compared to non-digital onboarding. READ MORE

  3. 18. Optimizing Consensus Protocols with Machine Learning Models : A cache-based approach

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kun Wu; [2023]
    Keywords : Distributed Systems; Consensus Algorithms; Machine Learning; Caching; Distribuerade system; Konsensusalgoritmer; Maskininlärning; Cachning;

    Abstract : Distributed systems offer a reliable and scalable solution for tackling massive and complex tasks that cannot be handled by a single computer. However, standard consensus protocols used in such systems often replicate data without considering the workload, leading to unnecessary retransmissions. READ MORE

  4. 19. FPGA implementation of an undistortion model with high parameter flexibility and DRAM-free operation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zacharie McCormick; [2023]
    Keywords : FPGA; Computer Vision; Lens correction; Remapping; FPGA; Datorseende; Linskorrigering; Omvandling;

    Abstract : Computer Vision (CV) has become omnipresent in our everyday life and it’s starting to see more and more use in the industry. This movement creates a demand for ever more performant systems to keep up with the increasing demands in manufacturing speed and autonomous behaviours. READ MORE

  5. 20. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Hugo Andersson; Per Andersson; [2023]
    Keywords : CTF; Capture the flag;

    Abstract : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. READ MORE