Essays about: "example computer technology thesis"

Showing result 1 - 5 of 128 essays containing the words example computer technology thesis.

  1. 1. Modeling, Simulation, and Injection of Camera Images/Video to Automotive Embedded ECU : Image Injection Solution for Hardware-in-the-Loop Testing

    University essay from Uppsala universitet/Signaler och system

    Author : Anton Lind; [2023]
    Keywords : ADAS; AD; ADS; HIL; Hardware in the loop; Hardware-in-the-loop; ECU; VCU; Automotive; Embedded; System; Systems; Camera; Image; Video; Injection; FPGA; MPSoC; Vivado; Vitis; VHDL; Volvo; Cars; FMC; HPC; LPC; MIPI CSI2; GMSL2; AMBA AXI4; Xilinx; RTL; Implementation; Synthesis; Intelectual Property; IP; Vehicle computing unit; Electronic control unit; TEB0911; TEF0007; TEF0010; CSI2 Tx; CSI2 Tx Subsystem; Zynq; SerDes; AXI4; AXI4-Lite; Programmable Logic; PL; Processor System; PS; C; C ; Video test pattern generator; VTPG; Axi traffic generator; ATG; Ultrascale ; Virtual input output; VIO; Integrated logic analyzer; ILA; Interface Unit;

    Abstract : Testing, verification and validation of sensors, components and systems is vital in the early-stage development of new cars with computer-in-the-car architecture. This can be done with the help of the existing technique, hardware-in-the-loop (HIL) testing which, in the close loop testing case, consists of four main parts: Real-Time Simulation Platform, Sensor Simulation PC, Interface Unit (IU), and unit under test which is, for instance, a Vehicle Computing Unit (VCU). READ MORE

  2. 2. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE

  3. 3. Evaluation of Generic GraphQL Servers for Accessing Legacy Databases

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Muhammad Ismail; [2022]
    Keywords : GraphQL; GraphQL vs REST; PostGraphile; Hasura; PostgreSQL; Performance Metrics; Throughput; Query execution time; PostGraphile vs Hasura; Latest web technology; Web solutions; communication over internet;

    Abstract : Over a few years back, REST APIs were considered standard web APIs, which nowhave a strong competitor. REST APIs provide some excellent features like stateless serversand structured access to resources. However, over time, it doesn’t offer flexibility withthe access of data and client changing requirements. READ MORE

  4. 4. The Application of a Wildfire Evacuation Tool to Swedish locations

    University essay from Lunds universitet/Avdelningen för Brandteknik

    Author : Johannes Jovlunden; [2022]
    Keywords : Wildfire evacuations; evacuation simulation; wildfire simulation; WUI-NITY; FARSITE; Prometheus; Swedish wildfire evacuations; geo-spatial data; computer modelling; Technology and Engineering;

    Abstract : WUI-NITY is a computer modelling program for wildfire evacuation simulations. This thesis examines the applicability of WUI-NITY to locations in Sweden. The program was tested at example locations representing the Swedish landscape. READ MORE

  5. 5. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE