Arduino under the Hood (Task Scheduling)


In my capacity as assistant and adjunct professor at various institutes in India and Singapore, I gained extensive experience how to communicate theoretical concepts. My approach is more practically oriented and I follow the principle: Learning by doing.

Due to my research, I became an expert in cybersecurity with significant practical experience in embedded systems, processor architectures, and FPGAs.

Some successful projects in those areas:

Embedded Systems: Battery powered devices have been deployed in Antarctica to monitor nesting behaviors. Such harsh environments are challenging in terms of components, but especially the limited power resources. The software needed to be highly optimized to squeeze every bit out of those batteries to maximize its operational lifetime.

Processor Architectures: Side-channel attacks are attacks which use a involuntary channels to leak information. Those channels are often unavoidable consequences of computations and include electromagnetic emission or power consumption of the processor. In this project the aim is to harden the processor against side-channel attacks by modifying the processor itself and to make the compiler side-channel aware. The processor that has been used for this project is the new RISC-V.

FPGAs: Those devices are perfect for machine learning (ML) algorithms due to their spatial (parallel) computation capabilities. While interference latencies are usually reduced by using GPUs, those processors have a power budget that is too high for embedded systems. FPGAs offer a flexible alternative, however the data interface to load weights for the neurons is limited. In this project, new algorithms and symmetries are developed to achieve high accuracy and throughput.

Read more course:  Financial Modeling for Corporates

Arduino under the Hood (Task Scheduling), Free Tutorials Download

Download Arduino under the Hood (Task Scheduling) Free Directs Link

Go to Download Tutorials Page Go to HomePage Tutorials

Password :


Related Courses

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.