Study university: University of Oulu
Introduction to C programming for embedded devices FITech 3 ECTS
This course teaches principles of C programming language, with special focus in important aspects for embedded devices such as memory allocation, bitwise operations, reading/writing data from registers and data serialization. However, this course uses a PC or workstation to compile, run and execute the code. Course contents Learning outcomes After completing the course you Course
Measurement systems FITech 1–5 ECTS
This course introduces the LabVIEW program and how to create a data acquisition system. The software allows to create measurement systems that can automatically collect and process sensor data. Course contents Learning outcomes After completing the course, the student is able to Course material All course material including the video material and exercises are available
Electronic measurement techniques FITech 1–5 ECTS
This course introduces the elements of an electronic measurement system: From the sensor that measures a physical quantity until the data is visible for example on the screen of a smartphone or uploaded to the cloud. We will discuss how to obtain data with the help of sensors, how to process sensor data until the
Electrical measurement principles FITech 1–5 ECTS
Course contents This course introduces units of measures, standards of measures, analysis of errors, most commonly used analog and digital measuring methods, equipment and electrical safety regulations. Learning outcomes After completing the course, the student is able to Course material All course material including the video material and virtual laboratory exercises are available through Moodle.
Energy efficiency in embedded systems (Special course in electronic design)
Max amount of FITech students: 15 Persons without a valid study right at a Finnish university or university of applied sciences have preference to this course. The course covers the energy consumption of an embedded SoC (processor, memory, analog, power management, SW, but excluding sensors and radio), both the individual components and their cross-effects. The
VR systems and humans
Virtual reality (VR) technology transports us to real or synthetic places that may be inaccessible, breathtaking, complex beyond our wildest imagination, or just simple and relaxing. Applications include entertainment, social interaction, virtual travel, remote training, architectural walkthroughs, cultural appreciation, and learning enhancement. Although VR has been around for decades, it always came with a high
Simulations and tools for telecommunications 1 ECTS
In this course you will learn basics about the wireless communication channel, how the system performance can be evaluated, about different simulation levels and simulation as a process. You will get short introduction to some simulation software like Matlab, Simulink, OPNET, CST and/or ADS without practical simulations. Course contents Learning outcomes After the course, the
Cryptographic systems and their weaknesses
The course teaches the basic concepts of cryptography from an applied engineering perspective and shows how the implementations of these cryptographic concepts have failed over the years. Course contents Basic concepts of cryptography, definitions and concepts of cryptographic security and testing these through programming. Showing different cryptographic weaknesses and demonstrating different implementations of these through
Introduction to XR systems
The course provides you with an overview of XR hardware, XR systems software and a high level overview of human physiology, neuroscience, and human perception in relation to XR hardware and software. The practical part consists of homework assignments where you learn to build an XR experience with Unity. Course contents Learning outcomes After having
Privacy and social engineering
Max amount of FITech students: 10 Persons without a valid study right at a Finnish university or university of applied sciences have preference to this course. This course gives an introduction to privacy in our digital world and the threat of social engineering in cybersecurity. Course contents Presentation of the concepts, regulation and technologies related