distributed Machine Learning (DML) at the edge of the network involves model learning and inference across networking nodes over distributed data. One type of model learning could be the delivery of predictive analyti...
详细信息
The trend in Internet of Things research points toward performing increasingly compute-intensive data analysis tasks on embedded sensor nodes, rather than server centers. Exploiting the technological advances in both ...
详细信息
ISBN:
(数字)9781665469753
ISBN:
(纸本)9781665469753
The trend in Internet of Things research points toward performing increasingly compute-intensive data analysis tasks on embedded sensor nodes, rather than server centers. Exploiting the technological advances in both energy efficiency, and Tiny Machine Learning algorithms and methods, an increasing number of recognition and classification tasks can be performed by small, low-power, wireless sensor nodes. This paper presents WideVision, a wireless, wide-area sensing platform capable of performing on-board person detection with power requirements in the mW range. The WideVision platform integrates seamlessly into the Internet of Things, by coupling a dedicated multiradio platform, including a LoRa interface, enabling medium and long-range communication, with a novel parallel RISC-V microcontroller. We evaluate the proposed platform with the GAP8 microcontroller, which includes an 8-core RISC-V cluster, and greyscale camera to perform person detection by training and deploying an advanced, quantized neural network, achieving a statistical accuracy 84.5% for a 5-person detection task with a latency of only 182 ms. Experimental results demonstrate that the WideVision sensor node platform while performing inference at a rate of one image per minute on-board, is capable of lasting 300 days on a 2400 mAh Li-ion battery, and 65 days when evaluating one image per 10 seconds while providing effective surveillance of its perimeter.
To provide high performance and cope with ever-increasing traffic demand, Content Delivery Network (CDN) providers have started considering the use of multi-tier architectures, including simple caching devices that ca...
详细信息
In recent years, distributed denial of service (DDoS) attacks have grown to be a serious threat to network security, severely disrupting internet services and enterprises. Due to the dynamic and evolving nature of the...
详细信息
distributed denial of service (DDoS) attacks can cause considerable financial harm and operational concerns in the internet business era. Detecting such attacks necessitates overcoming two challenges: distinguishing n...
详细信息
This paper proposes a Q-learning-based task allocation approach for wireless coded distributedcomputing systems with heterogeneous worker nodes. Task allocation in such systems is challenging due to the heterogeneity...
详细信息
ISBN:
(数字)9798331506940
ISBN:
(纸本)9798331506957
This paper proposes a Q-learning-based task allocation approach for wireless coded distributedcomputing systems with heterogeneous worker nodes. Task allocation in such systems is challenging due to the heterogeneity in computation and communication capabilities, leading to non-identically and independently distributed processing times across nodes. By modeling the task allocation problem as a Markov decision process and applying Q-learning, the master node learns to allocate tasks effectively, adapting to node heterogeneity and minimizing the average processing time. This approach highlights the potential of reinforcement learning to optimize distributedcomputing in heterogeneous environments.
This paper will describe the most important aspects of cybersecurity systems oriented for distributed communication as well as dispersed computation. Especially the most important ways how to guarantee the highest lev...
详细信息
We are developing an autonomous distributed storage system that autonomously relocates data blocks according to their utilization and the effective performance of storage. This paper proposes an enhancement to the dis...
详细信息
This paper describes a demonstrator of a post-quantum-secure facial authentication system distributed between a mobile device acting as a client and a remote computer acting as an authentication server. Homomorphic en...
详细信息
ISBN:
(纸本)9781450391818
This paper describes a demonstrator of a post-quantum-secure facial authentication system distributed between a mobile device acting as a client and a remote computer acting as an authentication server. Homomorphic encryption based on Classic McEliece, one of the fourth-round candidates of the NIST post-quantum standardization process, is carried out by the client for protecting the biometric data extracted from the users' faces at enrollment and verification. The remote computer only stores and compares the received protected data, thus preserving user privacy. An Android App and a Graphical User Interface (GUI) were implemented at the client and the server, respectively, to show the system performance in terms of computation and security.
暂无评论