Circular Image

17 records found

This thesis addresses the growing demand for faster and more reliable data transfer solutions in data-intensive applications, with a strong emphasis on scalability and flexibility. The research centers on the design and implementation of a high-speed data transfer system that uti ...
In modern High-Performance Computing (HPC) systems based on Field Programmable Gate Arrays (FPGA) accelerators, First-In, First-Out queues (FIFOs) are crucial for data buffering and balancing, particularly in demanding applications requiring high-throughput data streaming. Some p ...
Emerging, non-volatile memories are promising solutions to contemporary computing problems. These include In-Memory Computing, Neuromorphic Computing, and Machine Learning. We believe that these are not the only possible applications of non-volatile emerging memory devices and th ...
With the rise of the artificial intelligence starting in the late 2010s there has been a great increase of demand for neural networks. It seems AI is omnipresent these days, whether it is OpenAI releasing the famous or infamous large language model chatGPT, Google following by ad ...
The number of wireless devices has grown exponentially in recent years, and Bluetooth is a major component of personal wireless communication devices. In some Renesas Bluetooth devices, a Configurable Media Access Control (CMAC) is responsible for the real-time control of the rad ...
In the rapidly evolving realm of embedded systems, debugging is a critical component in the lifecycle of embedded firmware development, especially given the high demands of performance in real-time systems. Debugging embedded systems is inherently challenging and time-consuming d ...
Internet of Things (IoT) devices regularly process sensitive data, including personal information. Therefore, ensuring their security is crucial to avoid damage and prevent data breaches. The Advanced Encryption Standard (AES) is generally regarded as one of the most popular cryp ...
Rowhammer is a security exploit used to cause bit errors DRAM chips. Newer DRAM technologies are becoming more vulnerable to rowhammer attacks, and existing protec- tion methods are starting to reach their limits. This thesis provides methods for DRAM characterization by means of ...
Computer Architects often walk the tightrope between performance, power and area while designing modern day processors. This daunting task is made even more challenging by short Time-to-Market requirements set by the clients. In light of these challenges, architectural simulators ...
Over the last decade, applications like self-driving, image recognition and speech processing are having more and more impact on the society, all these applications are based on machine learning, and machine learning is all about metrics and vectors. For that reason, vector proce ...

FPGA-based soft error correction for the memory of microcontrollers

A generic methodology to transparent soft error correction for the off-chip memory of microcontrollers operating in space

Manufacturers of CubeSats prefer the use of COTS electronic components such as microcontrollers (MCU) and SDRAM but these components are vulnerable to errors caused by radiation. A specific type of error caused by radiation are soft errors which can be corrected by Error Detectio ...
Over the last decade, the recognition of the potential value of augmented reality (AR) and other human-machine interfaces has been growing. These applications are all based on depth sensing technologies. Among various depth sensing technologies, the Time-of-Flight (ToF) approach ...
Many devices currently connect to the internet. Some are pretty well secured, while others lack security due to bugs or other vulnerabilities. A scanner searches for available services on the internet or computer host using standard network protocols. An adversary uses a scanner ...
The field of Computing has been a significant catalyst for innovation across various segments of our lives. Computational neuroscience keeps demanding increased perfor- mance to implement powerful simulators able to closely approximate brain behavior using complex mathematical mo ...
In an effort to make DNA sequencing more accessible and affordable, Oxford Nanopore Technologies developed the MinION: A portable cellphone sized DNA sequencing device. Translating the information from this device to a nucleotide sequence is called basecalling, and is done with t ...
The increasing transistor density of Integrated Circuits (ICs) ever since their introduction, has scaled the computational performance of microprocessors. As a consequence of the gain in transistor density, the power dissipation density has also increased to a degree that has bec ...
The finite element method (FEM) is an ubiquitous method for the analysis of boundary value problems. Specifically, it can be used to find approximations to solutions of boundary value problems on a specific domain...