The introduction of FPGAs in High-Performance Embedded computing and Artificial Intelligence still faces challenges regarding the difficulty of getting started. It requires hardware knowledge, familiarity with multipl...
详细信息
ISBN:
(纸本)9798350349603;9798350349597
The introduction of FPGAs in High-Performance Embedded computing and Artificial Intelligence still faces challenges regarding the difficulty of getting started. It requires hardware knowledge, familiarity with multiple tooling, libraries and frameworks and long synthesis times. To encourage the usage of FPGAs, this work proposes an ecosystem that includes a library with a set of pre-built accelerators for common Digital Signal Processing and Artificial Intelligence workloads, an engine for runtime arbitrary-precision quantisation and an agnostic API, allowing the development of FPGA-accelerated user applications while abstracting the details about the FPGA design and implementation. Our approach is based on hardware reuse, introducing software resource management of a series of pre-built IP cores, allowing low-end FPGAs to be used as hardware accelerators and multiple applications to share resources. Our work is better than managed FPGA standalone applications with Vitis HLS-based quantisation, accelerating 1.22x, thanks to our quantisation engine, which accelerates 5.12x the quantisation and 13.30x the de-quantisation, while keeping close the accelerator execution times.
Cooperative intelligent Transportation systems (C-ITS) are foundational evolution of vehicular networks, emphasizing the seamless coordination of Vehicle-to-Vehicle communication for exchanging vital information. In C...
详细信息
ISBN:
(纸本)9798350361360;9798350361353
Cooperative intelligent Transportation systems (C-ITS) are foundational evolution of vehicular networks, emphasizing the seamless coordination of Vehicle-to-Vehicle communication for exchanging vital information. In C-ITS, vehicles collaborate by distributing V2V messages throughout the network. However, the potential transmission of deceptive or inaccurate information by a malicious vehicle poses a significant risk to road safety. Detecting such malicious data promptly is crucial for taking appropriate actions. Current Misbehavior Detection systems (MBS) operate with the assumption of a centralized MBS existence, but the challenge lies in empowering vehicles to make local MBS decisions as early as possible. This approach avoids the exchange of all messages with the infrastructure, reducing excessive communication overhead. In response to this challenge, we introduce an innovative distributed misbehavior detection system designed to protect vehicular networks from potential attacks. Our proposed system harnesses the scalability benefits of Federated Learning, allowing vehicles to collaboratively learn a shared model for detecting faulty and malicious messages. Recognizing the impracticality of assuming that all vehicles possess fully labeled data in real-world settings, we propose Fisher-Discriminant Analysis and model regularization to generate an effective pseudo-labeling mechanism. The model regularization proves effective when multiple models from different vehicles produce less-confidence predictions for a given sequence of Basic Safety Messages. Our approach demonstrates efficacy in identifying a broad spectrum of faults and attacks, including rare types, by learning the inherent data distribution and essential network traffic characteristics.
Keeping pets can help people regulate their emotions, engage in physical activity, and cultivate friendships, all of which contribute to enhancing their overall quality of life. Based on a survey, pets are often left ...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Keeping pets can help people regulate their emotions, engage in physical activity, and cultivate friendships, all of which contribute to enhancing their overall quality of life. Based on a survey, pets are often left alone at home for an average of 8 hours, as their owners typically depart early and return late. Nonetheless, the current pet feeding systems available on the market exhibit issues like a restricted field of view, unreliable network connections, sluggish pet recognition speed, and subpar accuracy. In this paper, we introduce a more intelligent and efficient pet feeding system. This system leverages the fast and compact ResNet18 model and utilizes Jetson Nano and STM32F407ZGT6 chips to achieve pet image acquisition and species recognition functionalities. We employ the MQTT protocol to enable the uploading of environmental data and have designed a user-side webpage for convenient remote monitoring and timely checking of the pet's status. Furthermore, we implement an end-to-end interaction design, allowing users to remotely and flexibly adjust factors such as the amount of pet feeding, environmental temperature, humidity, and other related information. Lastly, we conducted real-world deployment and testing of the system in various households, achieving a remarkable pet recognition accuracy of 98.65%. This system effectively fulfills the requirements for a scientific, automated, and efficient approach to pet care in daily life.
In the cutting edge domain that is the ever so expanding smart city, the need for development tools that can keep up with such an urban environment is ever so prevalent. Moreover, the rapid expansion of such metropoli...
详细信息
ISBN:
(纸本)9798350359107;9798350359091
In the cutting edge domain that is the ever so expanding smart city, the need for development tools that can keep up with such an urban environment is ever so prevalent. Moreover, the rapid expansion of such metropolitan areas requires even more specialists than are currently available. This study presents a pioneering cloud-based solution for intelligent transportation and crime prevention, emphasizing the seamless integration of machine learning techniques within a web deployment framework. Utilizing data from sources like Automated Speed Enforcement, police crime statistics, and traffic monitoring programs, our approach employs advanced predictive analytics to accurately identify potential crime hotspots and optimize traffic management. A significant innovation of this research is the development of a scalable Software as a Service model, which allows for the effective predictions of traffic sensors across urban settings. The proposed system features a user-friendly graphical user interface and employs Dynamic Load Balancing to enhance computational efficiency, making it accessible to a wide range of users. By harnessing cloud computing, our solution offers a versatility for government officials, law enforcement, and researchers, promising improvements in road safety, crime prevention, and the overall quality of life.
Edge computing has gained significant attention in recent years due to its ability to provide low-latency services and handle the massive data generated by IoT devices. One of the critical challenges in edge computing...
详细信息
In the realm of Mobile Edge computing (MEC), mobile devices have the option to transfer their tasks to edge servers for processing, thereby significantly diminishing task completion duration and reducing the energy co...
详细信息
ISBN:
(纸本)9798350349603;9798350349597
In the realm of Mobile Edge computing (MEC), mobile devices have the option to transfer their tasks to edge servers for processing, thereby significantly diminishing task completion duration and reducing the energy consumption of mobile devices. This offloading mechanism optimizes resource utilisation and enhances overall efficiency by leveraging the computational capabilities of nearby edge servers. This paper addresses the issue of efficient task offloading from mobile devices to edge servers in resource-constrained Industrial Internet of Things (IIoT) heterogenous networks, focusing on minimising energy consumption and heterogenous network delay. The methodology involves checking the matching feasibility using Hall's Marriage Theorem and employing a server selection algorithm for task assignment. The results show that the proposed approach minimizes energy consumption and overall time delay compared to standard algorithms. The implications include the potential for improving various QoS factors in future research.
One of the main units of work of any system is information. That is why methods of its processing are important for the full functioning of the entire process. The article discusses the scope of intelligent informatio...
详细信息
Ransomware of the Advanced Persistent Threat (APT) type are very sophisticated and often have a contingency plan of attack in case they are discovered while the attack is in progress. Due to the ever-changing trait of...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Ransomware of the Advanced Persistent Threat (APT) type are very sophisticated and often have a contingency plan of attack in case they are discovered while the attack is in progress. Due to the ever-changing trait of such APT-type ransomware, an intelligent and robust intrusion detection system (IDS) is the need of the hour and in this paper, we put forward machine learning (ML) and natural language processing (NLP) based intrusion detection systems. We utilize a commercial simulator to run different real-world ransomware attacks to create, for the first time, a dataset for APT-type ransomware research. Then, we develop multiple IDSes by training ML models like support vector machine (SVM), logistic regression (LR), gradient boosting (GB) decision trees, random forest (RF), naive Bayes classifier (NBC), and an NLP model called BERT, on this dataset. With our intelligent IDS, we could precisely distinguish the system calls of processes spawned by ransomware from legitimate system calls. We compare the different intrusion detection systems developed using the six aforementioned models. The IDS using the NLP BERT model achieves the best accuracy of 99.98%, and the IDS using the Naive Bayes Classifier achieves an accuracy of 98.55%. Furthermore, we discuss the tradeoffs of these models for designing an intelligent IDS. The advancement in cyber attacks, especially ransomware-based attacks, necessitates this upgrade in IDS which is essential for a strong defense.
In this paper, we propose a lightweight mask detection algorithm and implement an intelligent vehicle system. The algorithm uses YOLOv5s as the backbone network, and at the same time incorporates the SE attention mech...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
In this paper, we propose a lightweight mask detection algorithm and implement an intelligent vehicle system. The algorithm uses YOLOv5s as the backbone network, and at the same time incorporates the SE attention mechanism to optimize the timeliness, and is finally deployed on an intelligent vehicle system with BCM2711 as the controlplatform. Experiments prove that the algorithm proposed in this paper reduces the detection time by 30% while ensuring a higher MAP, which has certain valuefor promotion.
This paper investigates the over-the-air computation (AirComp) problem in a hybrid intelligent reflecting surface (IRS) and cell-free massive multiple-input multiple-output (CF-mMIMO) assisted digital twin system, whe...
详细信息
ISBN:
(纸本)9798350354720;9798350354713
This paper investigates the over-the-air computation (AirComp) problem in a hybrid intelligent reflecting surface (IRS) and cell-free massive multiple-input multiple-output (CF-mMIMO) assisted digital twin system, where multiple users offload their data to access points (APs) and central processing unit (CPU) via the IRS for data aggregation. We formulate a joint beamforming design, IRS phase shift optimization, and power allocation problem to minimize the mean squared error (MSE) of data aggregation. We solve the resultant non-convex optimization problem in three steps. First, we transform the original problem into two sub-problems. Then, we exploit a convex optimization framework to respectively determine the beamforming design, IRS phase shift optimization, and power allocation. Last, we propose an alternating optimization algorithm for finding the jointly optimized results. The simulation results demonstrate the effectiveness of the proposed scheme as compared with other benchmark schemes.
暂无评论