Spiking neural networks (SNNs) emulate biological neurons transmitting information through discrete spikes or pulses of activity. SNNs found extensive application in neuromorphic computing due to efficient cognitive-a...
详细信息
ISBN:
(纸本)9798350387186;9798350387179
Spiking neural networks (SNNs) emulate biological neurons transmitting information through discrete spikes or pulses of activity. SNNs found extensive application in neuromorphic computing due to efficient cognitive-aware computation, event-driven processing, and robustness to noise and faults. Numerous applications in pattern recognition, sensory processing, computer vision, etc., require complicated networks for enhanced performance and reliability. Realizing such complex SNNs on circuits poses significant challenges due to limitations in scaling up a single array of fully connected neurons within hardware resource and energy constraints. Contemporary neuromorphic chips incorporate small crossbars with time-multiplexed interconnects to address this issue. However, designing robust and efficient neuromorphic systems based on small crossbars is impractical. Therefore, strategic segmentation and positioning of SNNs are crucial for efficiently mapping them onto neuromorphic circuits. This work proposes the hill climbing optimization method to effectively translate SNNs onto neuromorphic circuits, minimizing the spike communication on the interconnect.
In order to improve the spectrum sensing performance of cognitive radio systems under low signal-to-noise ratio conditions, a non negative matrix decomposition spectrum sensing method based on convolutional neural net...
详细信息
In analyzing and recognizing wrist pulse signals, it isn’t easy to mine the nonlinear information of wrist pulse signals using analysis methods such as time and frequency. Traditional machine learning methods require...
详细信息
We present a protocol for carrying device authentication information in packets breaking out of the 5G network and entering the computing resources of a Multiaccess Edge computing (MEC) site. The authentication inform...
详细信息
ISBN:
(纸本)9798350363869;9798350363852
We present a protocol for carrying device authentication information in packets breaking out of the 5G network and entering the computing resources of a Multiaccess Edge computing (MEC) site. The authentication information is then used in a network function, called Customer Edge Switch (CES), inserted in front of the ingress into the computing resources, which authorizes traffic flows originated in the mobile network to access computing resources on a per-user and per-service basis according to the principles of zero-trust security. We evaluate the performance of our solution in an emulation environment that includes the 5G domain, a prototype implementation of the CES using the P4 language, and a Function-as-a-Service computing environment. Results show that the processing delay in the CES is small. We also provide a mathematical model for computing the maximum number of devices that can be managed at wire speed. (1)
This article examines the current state of the intelligent building monitoring system created for the University of Santiago de Compostela (USC) in the framework of the OPERE project and proposes a modification based ...
详细信息
ISBN:
(纸本)9798350366495;9798350366488
This article examines the current state of the intelligent building monitoring system created for the University of Santiago de Compostela (USC) in the framework of the OPERE project and proposes a modification based on the Fog computing paradigm. The study is developed in the context of the European regulations for the energy efficiency of facilities and the reduction of greenhouse gases. The current system implements the data processing in DADIS modules, developed by this research group for the acquisition and flexible transmission of information. These modules provide the information to the monitoring system which offers functionalities such as energy consumption dashboards, configurable operation schedules and ad hoc data visualization. However, the limitations of the current system include the difficulty in scaling the processing of the acquired information and database queries. The described upgrade proposes the extensive use of MQTT to standardize communications and allow the development of stand-alone applications to scale processing. The same architecture facilitates the incorporation of Big Data infrastructures that would solve even more complex query problems than those addressed in this scenario.
This paper discusses the application of a cloud-edge continuum implemented with containerized and event-driven processing for environmental monitoring. We propose an architecture based on a serverless computing paradi...
详细信息
ISBN:
(纸本)9798331533847;9798331533830
This paper discusses the application of a cloud-edge continuum implemented with containerized and event-driven processing for environmental monitoring. We propose an architecture based on a serverless computing paradigm that allows managing software and digital assets. We demonstrate its functionality on a levee monitoring use case. In the use case, we utilize CloudEvents specification to deliver messages in a protocol-agnostic way. We also build and evaluate mechanisms for task migrations based purely on Kuberentes and Knative. Because the execution process spans across different serverless environments, we utilize hybrid servereless approach [1]. In our system prototype, we also build and evaluate the concept of nanoservices [2] in delivering environmental monitoring solutions. Our early results show that, with our approach, we can build scalable and elastic digital twin applications and scenarios capable of analyzing large-scale infrastructure.
作者:
Chaudhri, Shiv Nath
Faculty of Engineering & Technology Department of Computer Science and Design Wardha India
Organoid intelligence (OI), the next paradigm of intelligence, draws inspiration from the biological learning of organs. On the other hand, artificial intelligence (AI) draws its inspiration only from the cognitive pr...
详细信息
Artificial Intelligence (AI) is increasingly used in cognitive health assessments, with the Clock Drawing Test (CDT) being an effective cognitive evaluation tool. However, the complexity of CDT image structures, high ...
详细信息
5G and beyond support the deployment of vertical applications, which is particularly appealing in combination with network slicing and edge computing to create a logically isolated environment for executing customer s...
详细信息
ISBN:
(纸本)9798350348439;9798350384611
5G and beyond support the deployment of vertical applications, which is particularly appealing in combination with network slicing and edge computing to create a logically isolated environment for executing customer services. Even if serverless computing has gained significant interest as a cloud-native technology its adoption at the edge is lagging, especially because of the need to support stateful tasks, which are commonplace in, e.g., cognitive services, but not fully amenable to being deployed on limited and decentralized computing infrastructures. In this work, we study the emerging paradigm of stateful Function as a Service (FaaS) with lightweight task abstractions in WebAssembly. Specifically, we assess the implications of deploying inter-dependent tasks with an internal state on edge computing resources using a stateless vs. stateful approach and then derive a mathematical model to estimate the energy consumption of a workload with given characteristics, considering the power used for both processing and communication. The model is used in extensive simulations to determine the impact of key factors and assess the energy trade-offs of stateless vs. stateful.
Innovative rehabilitation treatments are needed since stroke is a major cause of long-term impairment globally. In this paper, it presents a smart robotics-assisted rehabilitation system for stroke patients that uses ...
详细信息
暂无评论