Essays about: "Resource-constrained devices"
Showing result 1 - 5 of 56 essays containing the words Resource-constrained devices.
-
1. The Impact of Deep Neural Network Pruning on the Hyperparameter Performance Space: An Empirical Study
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : With the continued growth of deep learning models in terms of size and computational requirements, the need for efficient models for deployment on resource-constrained devices becomes crucial. Structured pruning has emerged as a proven method to speed up models and reduce computational requirements. READ MORE
-
2. Towards Adaptive Image Resolution for Visual SLAM on Resource-constrained Devices
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today, a large number of devices with small form factors and limited resources are being integrated with processes to perform complex tasks such as localization and mapping. One example of this are headsets used for Extended Reality. READ MORE
-
3. Evaluating Thread network performance, locating and strengthening weak radio links
University essay from Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakultetenAbstract : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. READ MORE
-
4. Exploration and Evaluation of RNN Models on Low-Resource Embedded Devices for Human Activity Recognition
University essay from KTH/Mekatronik och inbyggda styrsystemAbstract : Human activity data is typically represented as time series data, and RNNs, often with LSTM cells, are commonly used for recognition in this field. However, RNNs and LSTM-RNNs are often too resource-intensive for real-time applications on resource constrained devices, making them unsuitable. READ MORE
-
5. Anomaly Detection for Network Traffic in a Resource Constrained Environment
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE