Blogs
Articles and Thoughts
CPU Stress Testing using Random Disturbances
The performance of modern processors has substantially improved by exploiting techniques like out-of-order execution, on-chip caching, speculative execution, prefetching, and thread switching.
Leveraging GenAI and LLMs for Accurate Video Ad Classification
Video advertising is an integral part of the digital marketing ecosystem, playing a crucial role in engaging audiences and driving brand awareness. With the exponential rise of multimedia content
VSLAM Series – Loop Closure Detection
In the third installment of our Visual SLAM series, we delve into the pivotal concept of loop closure.
VSLAM Series – Triangulation & Map Point Creation
The second part of the Visual SLAM blog series discusses one of the key components in visual SLAM: the feature extraction pipeline, which includes triangulation and map point creation. These
VSLAM Series – Feature Extraction & Description Pipeline
This Series of blogs explores the exciting field of Feature based Visual Simultaneous Localization and Mapping (VSLAM). It also discusses the two state-of-the-art algorithms that are widely used in this
Enhancing ISO26262 Functional Safety Validation: Challenges and Best Practices
Functional safety is a vital discipline in engineering, focusing on ensuring system safety in areas impacting human safety or the environment.
Navigating Over-the-Air Updates on Android Automotive OS
From in-vehicle infotainment systems to advanced driver assistance systems (ADAS), OTA updates play a crucial role in keeping automotive software up-to-date and ensuring optimal performance.
Early Audio in Android Automotive
Android Automotive OS (AAOS) is designed to provide a seamless and integrated experience for drivers and passengers, offering features such as navigation, media playback, communication, and vehicle controls.
Software Crypto Stack for Automotive ECUs
The increasing need for cyber security in Automotive domain was discussed in our previous blog, We investigated different mechanisms by which a hacker could exploit an ECU, like compromising the
Getting started with RISC-V Verification using SPIKE library
RISC-V is an open-source instruction set architect (ISA) based on reduced instruction set computing principles.
Cybersecurity for Automotive ECUs – An Introduction
One of the biggest challenges faced by OEMs today is automotive cyber security with the amount of hardware and software integrated into vehicles increasing significantly over the last few decades.
Performance Evaluation Metrics of Adaptive filter Algorithms
Performance Evaluation is important to do comparative study of different algorithms and decide which algorithm is better than others.
pybind11 — Seamless operability between C++11 and Python
In the ever-evolving landscape of programming languages, Python has established itself as a favorite among developers for its simplicity, readability, and extensive libraries. Moreover, we love Python.
Smart Infrastructure Inspection Using Aerial Imaging
Civil infrastructure like roadways, bridges, tunnels, pipelines, transmission towers, residential and commercial buildings require continuous monitoring to ensure structural integrity.
Ignitarium-Renesas Pretrained AI libraries Release-2
If you found our previous blog 'Ignitarium Releases Pre-trained AI Applications Library for Renesas RZ/V2L' interesting, we are back with the second release of pretrained AI libraries targeted for Renesas
Redefining Rail Inspection with AI-Based Computer Vision
Railroads are the connective tissue of our world’s infrastructure. But despite their critical role in global transportation and supply chains, most railroad track maintenance begins with a human inspector.
Getting Started With Formal Verification
As design complexity is increasing, the goal of 100% functional coverage becomes harder to achieve even after using constrained random stimulus and directed scenarios, therefore there is a need to
3D LiDAR SLAM – Loop Closure Explained
Robots are all equipped with simultaneous localization and mapping (SLAM) algorithms that help them build a map of its surroundings. For SLAM to produce reliable results, loop closure detection and