Essays about: "Resource constrained embedded systems"
Showing result 1 - 5 of 12 essays containing the words Resource constrained embedded systems.
-
1. Exploring the Depth-Performance Trade-Off : Applying Torch Pruning to YOLOv8 Models for Semantic Segmentation Tasks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In order to comprehend the environments from different aspects, a large variety of computer vision methods are developed to detect objects, classify objects or even segment them semantically. Semantic segmentation is growing in significance due to its broad applications in fields such as robotics, environmental understanding for virtual or augmented reality, and autonomous driving. READ MORE
-
2. ANOMALY DETECTION FOR INDUSTRIAL APPLICATIONS USING COMMODITY HARDWARE
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : As the Automotive industry is heavily regulated from a quality point of view, excellence in pro-duction is obligatory. Due to the fact that removing human error from humans is impossible, new solutions must be found. READ MORE
-
3. Exploration and Evaluation of RNN Models on Low-Resource Embedded Devices for Human Activity Recognition
University essay from KTH/Mekatronik och inbyggda styrsystemAbstract : Human activity data is typically represented as time series data, and RNNs, often with LSTM cells, are commonly used for recognition in this field. However, RNNs and LSTM-RNNs are often too resource-intensive for real-time applications on resource constrained devices, making them unsuitable. READ MORE
-
4. Anomaly Detection for Network Traffic in a Resource Constrained Environment
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE
-
5. Smart Attack Detection for IoT Networks
University essay from KTH/Kommunikationssystem, CoSAbstract : The Internet of Things (IoT) is becoming related to more and more people's daily life. It is a network that consists of resource-constrained devices. Nowadays, the application of IoT like smart wearable devices is very common. Due to the wide and important application of IoT, its security also attracts research attention without any doubt. READ MORE