Artificial Intelligence (AI) is moving towards the edge. Training an AI model for edge computing on a centralized server increases latency, and the privacy of edge users is jeopardized due to private data transfer thr...
详细信息
ISBN:
(数字)9781728186719
ISBN:
(纸本)9781728186719
Artificial Intelligence (AI) is moving towards the edge. Training an AI model for edge computing on a centralized server increases latency, and the privacy of edge users is jeopardized due to private data transfer through a less secure communication channels. Additionally, existing high-power computingsystems are battling with memory and data transfer bottlenecks between the processor and memory. Federated Learning (FL) is a collaborative AI learning paradigm for distributed local devices that operates without transferring local data. Local participant devices share the updated network parameters with the central server instead of sending the original data. The central server updates the global AI model and deploys the model to the local clients. As the local data resides only on the edge, these devices need to be protected from cyberattacks. The Federated Intrusion Detection System (FIDS) could be a viable system to protect edge devices as opposed to a centralized protection system. However, on-device training of the model in resource constrained devices may suffer from excessive power drain, in addition to memory and area overhead. In this work we present a memristor based system for AI training on edge devices. Memristor devices are ideal candidates for processing in memory, as their dynamic resistance properties allow them to perform multiply-add operations in parallel in the analog domain with extreme efficiency. Alternatively, existing CMOS-based PIM systems are typically developed for edge inference based on pretrained weights, and are not equipped for on-chip training. We show the effectiveness of the system, where successful learning and recognition is achieved completely within edge devices. The classification accuracy of the memristor system shows negligible loss when compared a software implementation. To the best of our knowledge, this first demonstration of a memristor based federated learning system. We demonstrate the effectiveness of this system as
Considering that energy suppliers within the Integrated Electricity and Heat System (IEHS) typically provide only partial information to other suppliers for privacy protection, traditional centralized scheduling metho...
详细信息
Ensuring safety against potential fire threats is of utmost significance due to the development of IoT devices in numerous areas. Most of the time, human involvement is required for traditional fire detection systems,...
详细信息
Accurate traffic forecasting is crucial for managing urban congestion and reducing delays. With the expansion of urban areas, traditional traffic prediction models increasingly struggle to adapt to the complexity and ...
详细信息
In uncertain and dynamic environments, decentralized data fusion (DDF) techniques have been widely used to estimate the states and the uncertainty levels over large mission spaces in a robust and scalable way. In data...
详细信息
ISBN:
(纸本)9798350371420;9781737749769
In uncertain and dynamic environments, decentralized data fusion (DDF) techniques have been widely used to estimate the states and the uncertainty levels over large mission spaces in a robust and scalable way. In data fusion frameworks using distributed sensor networks, undetected sensor failures can degrade the quality of fusion results of the entire system. Therefore, DDF methods which are robust to inconsistent data are needed. In this paper, a fault-tolerant Bayesian DDF method using Gaussian mixture models is developed. The probability of agent reliability states, which represent consistency of local estimates that agents share with their neighbors, are modeled as weights of mixture models and estimated together with the target process. The target process and reliability states are updated in a decentralized Bayesian way, exploiting the properties of Gaussian mixture models. To prevent the hypothesis explosion problem of Gaussian mixture models, a mixture compression method considering the physical meaning of mixture weights is utilized. A numerical simulation on a 2D dynamic target tracking problem is presented to verify performance of the suggested algorithm and compared with existing DDF methods. It is shown that the suggested algorithm gives more compact fusion results compared to existing fault-tolerant DDF method.
One interesting aspect of distributedsystems is cloud computing. It offers its services on an as-needed, pay-per-use basis. Research challenges in cloud computing include the scheduling and balance of tasks. Scheduli...
详细信息
ISBN:
(纸本)9798350390179
One interesting aspect of distributedsystems is cloud computing. It offers its services on an as-needed, pay-per-use basis. Research challenges in cloud computing include the scheduling and balance of tasks. Scheduling tasks entails assigning them to available resources (Virtual Machines), whereas load balancing is spreading out the work over multiple available resources. We offer a job scheduling technique that takes into account anticipated demands on compute nodes. We begin by investigating the reasons for the disparity in workloads and the viability of redistributing computing resources. All of the complex simulations are run in clouds. The process consisted of two distinct parts. The simulation begins with a randomly generated workload. Second, we combine the workload prediction model with an application and workload-aware scheduling algorithm (AAWAS) [14]. We present a parallel job scheduling approach using computational node workload prediction AAWAS to simplify the AAWAS algorithm. Experimental results reveal that AAWA is superior to other algorithms in terms of minimizing makespan and optimizing resource utilization, and the proposed method is compared to FCFS, SJF, Min-Min, and EDF. To make Task scheduling in compute clouds faces various challenges due to the highly dynamic environment, such as availability, access policies, security, and reliability of computing resources. Furthermore, the collaborative nature of cloud computing projects on the internet adds complexity to task scheduling. From simulation results, it is evident that our proposed scheduler AAWAS outperforms A2C, DQN, and PPO across the board by 4.1%, 2.6%, and 3.4%, respectively. Because AAWS relies on policy for learning rather than Q-value, its superiority can be defended. Several environmental factors affect AAWAS and contribute to its consistent learning process and the high chance of accurate predictions. As a result, AAWASC may learn from experiences independently of target networks,
Finding the connected components in a graph is a fundamental problem in graph theory and network science. A connected component in a graph is a maximal set of vertices such that there is a path between any two vertice...
详细信息
This study proposed, a combined scheme of conservation voltage reduction (CVR), VAr optimization (VO), and distributed generation (DG) to lower apparent substation demand. This research also seeks to optimize the DG p...
详细信息
ISBN:
(纸本)9781665411202
This study proposed, a combined scheme of conservation voltage reduction (CVR), VAr optimization (VO), and distributed generation (DG) to lower apparent substation demand. This research also seeks to optimize the DG placement problem during the implementation of CVR and OCP. The optimal allocation of shunt capacitor and DG has been identified using the grey wolf optimization (GWO) method. The proposed approach is illustrated on the modified ieee-33 feeder system. To show the benefits of proposed approach, four different modes such as normal operation, CVR with VO, CVR with DG, and CVR with VO and DG have been carried out. Simulation results reveal that operating CVR with DG and VO has achieved a higher reduction in apparent substation demand in comparison with the remaining modes.
This study proposes a pipeline identification method for identifying pipelines in Piping and Instrumentation Diagrams (P&IDs) in image format. Automating this process is an important issue for the process plant in...
详细信息
distributed multiple-input multiple-output non-orthogonal multiple access (D-MIMO-NOMA) is a potential technology for ultra-reliable low-latency communication (URLLC). In this paper, we propose a pilot scheme and deri...
详细信息
暂无评论