Essays about: "randomization"

Showing result 1 - 5 of 42 essays containing the word randomization.

  1. 1. Using Synthetic Data For Object Detection on the edge in Hazardous Environments

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Faraz Azarnoush; Damil Sabotic; [2024]
    Keywords : Technology and Engineering;

    Abstract : This thesis aims to evaluate which aspects are important when generating synthetic data with the purpose of running on a lightweight object detection model on an edge device. The task we constructed was to detect Canisters and whether they feature a protective valve called a Cap or not (called a No-Cap). READ MORE

  2. 2. Gamification for technology-enhanced mineral value chain teaching and learning: serious gaming for geometallurgy concept

    University essay from Luleå tekniska universitet/Institutionen för samhällsbyggnad och naturresurser

    Author : Lilian Schleret; [2024]
    Keywords : Gamification; Malmberget; Geometallurgy; Synthetic model;

    Abstract : The concept of gamification is being increasingly explored and applied to offer new teaching or training tools to teachers, students or employees. The field of geology and geometallurgy wasn’t particularly discussed in the topic of gamification. READ MORE

  3. 3. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Klasson Landin; Truls Julborg; [2023]
    Keywords : Side channel attack; Cryptography; Correlation power analysis; Chipwhisperer; Frequency; Hardware security;

    Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE

  4. 4. Sim2Real: Generating synthetic images from industry CAD models with domain randomization

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Duruo Li; [2023]
    Keywords : ;

    Abstract : Deep learning methods for computer vision applications require massive visual data for model training. Although it is possible to utilize public datasets such as ImageNet, MS COCO, and CIFAR-100, it becomes problematic when there is a need for more task-specific data when new training data collection typically is needed. READ MORE

  5. 5. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Linus Backlund; [2023]
    Keywords : Public-key Cryptography; Post-Quantum Cryptography; Kyber; Saber; Side-Channel Attack; Power Analysis; Asymetrisk Kryptering; Kvantsäker Kryptografi; Kyber; Saber; Sidokanalsattack; Effektanalys;

    Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE