Advanced search
Showing result 1 - 5 of 42 essays matching the above criteria.
-
1. Using Synthetic Data For Object Detection on the edge in Hazardous Environments
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : This thesis aims to evaluate which aspects are important when generating synthetic data with the purpose of running on a lightweight object detection model on an edge device. The task we constructed was to detect Canisters and whether they feature a protective valve called a Cap or not (called a No-Cap). READ MORE
-
2. Gamification for technology-enhanced mineral value chain teaching and learning: serious gaming for geometallurgy concept
University essay from Luleå tekniska universitet/Institutionen för samhällsbyggnad och naturresurserAbstract : The concept of gamification is being increasingly explored and applied to offer new teaching or training tools to teachers, students or employees. The field of geology and geometallurgy wasn’t particularly discussed in the topic of gamification. READ MORE
-
3. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
4. Sim2Real: Generating synthetic images from industry CAD models with domain randomization
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Deep learning methods for computer vision applications require massive visual data for model training. Although it is possible to utilize public datasets such as ImageNet, MS COCO, and CIFAR-100, it becomes problematic when there is a need for more task-specific data when new training data collection typically is needed. READ MORE
-
5. A Side-Channel Attack on Masked and Shuffled Implementations of M-LWE and M-LWR Cryptography : A case study of Kyber and Saber
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In response to the threat of a future, large-scale, quantum computer, the American National Institute of Standards and Technology (NIST) initiated a competition for designs of quantum-resistant cryptographic primitives. In 2022, the lattice-based Module-Learning With Errors (M-LWE) scheme Kyber emerged as the winner to be standardized. READ MORE