Essays about: "Resource constrained embedded systems"

Showing result 1 - 5 of 12 essays containing the words Resource constrained embedded systems.

  1. 1. Exploring the Depth-Performance Trade-Off : Applying Torch Pruning to YOLOv8 Models for Semantic Segmentation Tasks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinchen Wang; [2024]
    Keywords : Deep Learning; Semantic segmentation; Network optimization; Network pruning; Torch Pruning; YOLOv8; Network Depth; Djup lärning; Semantisk segmentering; Nätverksoptimering; Nätverksbeskärning; Fackelbeskärning; YOLOv8; Nätverksdjup;

    Abstract : In order to comprehend the environments from different aspects, a large variety of computer vision methods are developed to detect objects, classify objects or even segment them semantically. Semantic segmentation is growing in significance due to its broad applications in fields such as robotics, environmental understanding for virtual or augmented reality, and autonomous driving. READ MORE

  2. 2. ANOMALY DETECTION FOR INDUSTRIAL APPLICATIONS USING COMMODITY HARDWARE

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : John Moberg; Jonathan Widén; [2023]
    Keywords : Computer Vision; Anomaly Detection; Single Board Computer; Embedded systems;

    Abstract : As the Automotive industry is heavily regulated from a quality point of view, excellence in pro-duction is obligatory. Due to the fact that removing human error from humans is impossible, new solutions must be found. READ MORE

  3. 3. Exploration and Evaluation of RNN Models on Low-Resource Embedded Devices for Human Activity Recognition

    University essay from KTH/Mekatronik och inbyggda styrsystem

    Author : Helgi Hrafn Björnsson; Jón Kaldal; [2023]
    Keywords : Recurrent Neural Networks; Long Short-Term Memory Networks; Embedded Systems; Human Activity Recognition; Edge AI; TensorFlow Lite Micro; Recurrent Neural Networks; Long Short-Term Memory Networks; Innbyggda systyem; Mänsklig aktivitetsigenkänning; Edge AI; TensorFlow Lite Micro;

    Abstract : Human activity data is typically represented as time series data, and RNNs, often with LSTM cells, are commonly used for recognition in this field. However, RNNs and LSTM-RNNs are often too resource-intensive for real-time applications on resource constrained devices, making them unsuitable. READ MORE

  4. 4. Anomaly Detection for Network Traffic in a Resource Constrained Environment

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pontus Lidholm; Gaia Ingletto; [2023]
    Keywords : Network Traffic; Anomaly Detection; Embedded Systems; Machine Learning; Random Forest;

    Abstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE

  5. 5. Smart Attack Detection for IoT Networks

    University essay from KTH/Kommunikationssystem, CoS

    Author : Yang Yang; [2022]
    Keywords : Internet of Things; Security; Machine learning; Intrusion detection; Sakernas Internet; Säkerhet; Maskininlärning; Intrångsdetektering;

    Abstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE