SlideShare a Scribd company logo
1 of 17
Download to read offline
San Jose, CA
May 25, 2018
Giuseppe Natale - giuseppe.natale@polimi.it
Machine Learning
@NECST
It’s all about Data
!2
!3
Machine Learning
Using data to answer questions.
!4
Machine Learning
Training. to answer questions.
!5
Machine Learning
Prediction.Training.
Decision Trees
Support Vector Machines
Artificial Neural Networks
!6
Machine Learning Methods
DReAMS
System Architectures System Security
MaTA
Malware and Threat Analysis

FraudSec
Frauds Analysis and Detection 

MoSec
Mobile Security 

CyPhy
Security of Cyber-physical systems
DReAMS
Reconfigurable computing and
FPGA-based systems

ORCA
Unleashed Computing Architectures
and Operating Systems

STeEL
Smart Technology Easy Life
!7
NECST Research
!8
Exploiting ML @NECST
Banksealer
M. Carminati
Framework for banking fraud detection
Models user’s behavior through his/her interaction with
the online banking services to detect fraudulent activities
Behaviors Identification in Social Individuals
G. Muscioni
Develop a hierarchical model to extract behavior at multiple
levels of aggregation (individual behavior, dyadic interactions
and group-level activities)
?
?
?
?
?
?
?
?
?
?
?
SeNSE
P. Cancian, L. Cerina, G. Franco
Accelerate Features Extraction and for Electromyography
signals on FPGA (with applications to robotic prostheses)
Exploits Recurrent Neural Networks for Classification
!9
Exploiting ML @NECST
Banksealer
M. Carminati
Framework for banking fraud detection
Models user’s behavior through his/her interaction with
the online banking services to detect fraudulent activities
0,02% false positives
98% detection rate of fraud anomalies
!10
Exploiting ML @NECST
Behaviors Identification in Social Individuals
G. Muscioni
Develop a hierarchical model to extract behavior at multiple
levels of aggregation (individual behavior, dyadic interactions
and group-level activities)
?
?
?
?
?
?
?
?
?
?
?
RESULT-INDIVIDUAL RESULT-GROUP
!11
Exploiting ML @NECST
SeNSE
P. Cancian, L. Cerina, G. Franco
Accelerate Features Extraction and for Electromyography
signals on FPGA (with applications to robotic prostheses)
Exploits Recurrent Neural Networks for Classification
!12
Optimizing ML @NECST
!13
Optimizing ML for the Cloud
Pretzel
A. Scolari
Prediction-serving system for scheduling trained ML
models on cloud machines
White box approach
Optimize execution for lower
latency and higher throughput
Sharing operators' common
state, to increase model density
per machine
!14
Optimizing ML with FPGAs
!15
FPGA in Datacenters
CONDOR
N. Raspa, M. Bacis, G. Natale
Acceleration of Convolutional Neural Network
inference on FPGAs
Cloud Integration
via Amazon F1 Instances
Automatic creation of
an hardware accelerator
for FPGA
Support main deep
learning libraries
!16
FPGA in Embedded Systems
Deep Learning on PYNQ
L. Stornaiuolo
Framework to help implementing Deep Learning
algorithms on the PYNQ-Z1
Exploits the PYNQ platform
SpiNN
L. Cavinato, E. Migliorini, P. Cancian, M. Arnaboldi
Use Spiking Neural Networks for Reinforcement Learning in
Robotics
Implement efficiently Spiking Neural Networks on FPGAs
SESSION AGENDA
Title: Pretzel: optimized Machine Learning framework for low-latency
and high throughput workloads
Speaker: Alberto Scolari, PhD Student @ Politecnico di Milano
Title: CONDOR: An automated framework to accelerate convolutional
neural networks on FPGA
Speakers: Niccolo’ Raspa, MSc Student @ Politecnico di Milano,
Marco Bacis, MSc Student @ Politecnico di Milano
Title: On how to efficiently implement Deep Learning algorithms on
PYNQ platform
Speaker: Luca Stornaiuolo, PhD Student @ Politecnico di Milano
Title: SpiNN, learning through spiking neural networks
Speaker: Lara Cavinato, MSc Student @ Politecnico di Milano
San Jose, CA
May 25, 2018
Giuseppe Natale - giuseppe.natale@polimi.it

More Related Content

What's hot

Emotion detection using cnn.pptx
Emotion detection using cnn.pptxEmotion detection using cnn.pptx
Emotion detection using cnn.pptxRADO7900
 
Neural networks and deep learning
Neural networks and deep learningNeural networks and deep learning
Neural networks and deep learningRADO7900
 
RNN basics in deep learning
RNN basics in deep learningRNN basics in deep learning
RNN basics in deep learningchauhankapil
 
Algorithms that mimic the human brain
Algorithms that mimic the human brainAlgorithms that mimic the human brain
Algorithms that mimic the human brainBindu Reddy
 
Algorithms that mimic the human brain (1)
Algorithms that mimic the human brain (1)Algorithms that mimic the human brain (1)
Algorithms that mimic the human brain (1)Bindu Reddy
 

What's hot (9)

Mrunal Patil
Mrunal PatilMrunal Patil
Mrunal Patil
 
Emotion detection using cnn.pptx
Emotion detection using cnn.pptxEmotion detection using cnn.pptx
Emotion detection using cnn.pptx
 
SoftComputing1
SoftComputing1SoftComputing1
SoftComputing1
 
Neural networks and deep learning
Neural networks and deep learningNeural networks and deep learning
Neural networks and deep learning
 
RNN basics in deep learning
RNN basics in deep learningRNN basics in deep learning
RNN basics in deep learning
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Algorithms that mimic the human brain
Algorithms that mimic the human brainAlgorithms that mimic the human brain
Algorithms that mimic the human brain
 
Algorithms that mimic the human brain (1)
Algorithms that mimic the human brain (1)Algorithms that mimic the human brain (1)
Algorithms that mimic the human brain (1)
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 

Similar to Intro on ML @ NECST

ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062Wael Alawsey
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
Future Trends in Artificial Intelligence
Future Trends in Artificial IntelligenceFuture Trends in Artificial Intelligence
Future Trends in Artificial IntelligenceDR.P.S.JAGADEESH KUMAR
 
An Overview On Neural Network And Its Application
An Overview On Neural Network And Its ApplicationAn Overview On Neural Network And Its Application
An Overview On Neural Network And Its ApplicationSherri Cost
 
System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveyIRJET Journal
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityIRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET Journal
 
Reservoir computing fast deep learning for sequences
Reservoir computing   fast deep learning for sequencesReservoir computing   fast deep learning for sequences
Reservoir computing fast deep learning for sequencesClaudio Gallicchio
 
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...IRJET Journal
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYCynthia King
 
Neural Networks
Neural Networks Neural Networks
Neural Networks Eric Su
 
Artificial intelligence and Neural Network
Artificial intelligence and Neural NetworkArtificial intelligence and Neural Network
Artificial intelligence and Neural NetworkAbdullah Saghir Ahmad
 
deep_learning_in_speech_and_visual_applications
deep_learning_in_speech_and_visual_applicationsdeep_learning_in_speech_and_visual_applications
deep_learning_in_speech_and_visual_applicationsShailesha P Maganahalli
 
Deep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceDeep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceLukas Masuch
 
A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING
A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING
A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING mlaij
 
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...IJCI JOURNAL
 

Similar to Intro on ML @ NECST (20)

ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
ARTIFICIAL INTELLIGENT ( ITS / TASK 6 ) done by Wael Saad Hameedi / P71062
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Future Trends in Artificial Intelligence
Future Trends in Artificial IntelligenceFuture Trends in Artificial Intelligence
Future Trends in Artificial Intelligence
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
An Overview On Neural Network And Its Application
An Overview On Neural Network And Its ApplicationAn Overview On Neural Network And Its Application
An Overview On Neural Network And Its Application
 
System for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A SurveySystem for Detecting Deepfake in Videos – A Survey
System for Detecting Deepfake in Videos – A Survey
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Reservoir computing fast deep learning for sequences
Reservoir computing   fast deep learning for sequencesReservoir computing   fast deep learning for sequences
Reservoir computing fast deep learning for sequences
 
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
A Intensified Approach on Deep Neural Networks for Human Activity Recognition...
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Neural Networks
Neural Networks Neural Networks
Neural Networks
 
Ml vs dl
Ml vs dlMl vs dl
Ml vs dl
 
Ml vs dl
Ml vs dlMl vs dl
Ml vs dl
 
Artificial intelligence and Neural Network
Artificial intelligence and Neural NetworkArtificial intelligence and Neural Network
Artificial intelligence and Neural Network
 
deep_learning_in_speech_and_visual_applications
deep_learning_in_speech_and_visual_applicationsdeep_learning_in_speech_and_visual_applications
deep_learning_in_speech_and_visual_applications
 
Deep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceDeep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial Intelligence
 
A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING
A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING
A SURVEY OF NEURAL NETWORK HARDWARE ACCELERATORS IN MACHINE LEARNING
 
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...
POTENTIAL IMPACT OF GENERATIVE ARTIFICIAL INTELLIGENCE(AI) ON THE FINANCIAL I...
 
CV _Manoj
CV _ManojCV _Manoj
CV _Manoj
 

More from NECST Lab @ Politecnico di Milano

Embedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposingEmbedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposingNECST Lab @ Politecnico di Milano
 
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...NECST Lab @ Politecnico di Milano
 
EMPhASIS - An EMbedded Public Attention Stress Identification System
 EMPhASIS - An EMbedded Public Attention Stress Identification System EMPhASIS - An EMbedded Public Attention Stress Identification System
EMPhASIS - An EMbedded Public Attention Stress Identification SystemNECST Lab @ Politecnico di Milano
 
Maeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matchingMaeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matchingNECST Lab @ Politecnico di Milano
 

More from NECST Lab @ Politecnico di Milano (20)

Mesticheria Team - WiiReflex
Mesticheria Team - WiiReflexMesticheria Team - WiiReflex
Mesticheria Team - WiiReflex
 
Punto e virgola Team - Stressometro
Punto e virgola Team - StressometroPunto e virgola Team - Stressometro
Punto e virgola Team - Stressometro
 
BitIt Team - Stay.straight
BitIt Team - Stay.straight BitIt Team - Stay.straight
BitIt Team - Stay.straight
 
BabYodini Team - Talking Gloves
BabYodini Team - Talking GlovesBabYodini Team - Talking Gloves
BabYodini Team - Talking Gloves
 
printf("Nome Squadra"); Team - NeoTon
printf("Nome Squadra"); Team - NeoTonprintf("Nome Squadra"); Team - NeoTon
printf("Nome Squadra"); Team - NeoTon
 
BlackBoard Team - Motion Tracking Platform
BlackBoard Team - Motion Tracking PlatformBlackBoard Team - Motion Tracking Platform
BlackBoard Team - Motion Tracking Platform
 
#include<brain.h> Team - HomeBeatHome
#include<brain.h> Team - HomeBeatHome#include<brain.h> Team - HomeBeatHome
#include<brain.h> Team - HomeBeatHome
 
Flipflops Team - Wave U
Flipflops Team - Wave UFlipflops Team - Wave U
Flipflops Team - Wave U
 
Bug(atta) Team - Little Brother
Bug(atta) Team - Little BrotherBug(atta) Team - Little Brother
Bug(atta) Team - Little Brother
 
#NECSTCamp: come partecipare
#NECSTCamp: come partecipare#NECSTCamp: come partecipare
#NECSTCamp: come partecipare
 
NECSTCamp101@2020.10.1
NECSTCamp101@2020.10.1NECSTCamp101@2020.10.1
NECSTCamp101@2020.10.1
 
NECSTLab101 2020.2021
NECSTLab101 2020.2021NECSTLab101 2020.2021
NECSTLab101 2020.2021
 
TreeHouse, nourish your community
TreeHouse, nourish your communityTreeHouse, nourish your community
TreeHouse, nourish your community
 
TiReX: Tiled Regular eXpressionsmatching architecture
TiReX: Tiled Regular eXpressionsmatching architectureTiReX: Tiled Regular eXpressionsmatching architecture
TiReX: Tiled Regular eXpressionsmatching architecture
 
Embedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposingEmbedding based knowledge graph link prediction for drug repurposing
Embedding based knowledge graph link prediction for drug repurposing
 
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
PLASTER - PYNQ-based abandoned object detection using a map-reduce approach o...
 
EMPhASIS - An EMbedded Public Attention Stress Identification System
 EMPhASIS - An EMbedded Public Attention Stress Identification System EMPhASIS - An EMbedded Public Attention Stress Identification System
EMPhASIS - An EMbedded Public Attention Stress Identification System
 
Luns - Automatic lungs segmentation through neural network
Luns - Automatic lungs segmentation through neural networkLuns - Automatic lungs segmentation through neural network
Luns - Automatic lungs segmentation through neural network
 
BlastFunction: How to combine Serverless and FPGAs
BlastFunction: How to combine Serverless and FPGAsBlastFunction: How to combine Serverless and FPGAs
BlastFunction: How to combine Serverless and FPGAs
 
Maeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matchingMaeve - Fast genome analysis leveraging exact string matching
Maeve - Fast genome analysis leveraging exact string matching
 

Recently uploaded

8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...Amil baba
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUankushspencer015
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdfKamal Acharya
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New HorizonMorshed Ahmed Rahath
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxMANASINANDKISHORDEOR
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.benjamincojr
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...drjose256
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxCHAIRMAN M
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptamrabdallah9
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashidFaiyazSheikh
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsVIEW
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxKarpagam Institute of Teechnology
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 

Recently uploaded (20)

8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
analog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptxanalog-vs-digital-communication (concept of analog and digital).pptx
analog-vs-digital-communication (concept of analog and digital).pptx
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 

Intro on ML @ NECST

  • 1. San Jose, CA May 25, 2018 Giuseppe Natale - giuseppe.natale@polimi.it Machine Learning @NECST
  • 3. !3 Machine Learning Using data to answer questions.
  • 6. Decision Trees Support Vector Machines Artificial Neural Networks !6 Machine Learning Methods
  • 7. DReAMS System Architectures System Security MaTA Malware and Threat Analysis FraudSec Frauds Analysis and Detection MoSec Mobile Security CyPhy Security of Cyber-physical systems DReAMS Reconfigurable computing and FPGA-based systems ORCA Unleashed Computing Architectures and Operating Systems STeEL Smart Technology Easy Life !7 NECST Research
  • 8. !8 Exploiting ML @NECST Banksealer M. Carminati Framework for banking fraud detection Models user’s behavior through his/her interaction with the online banking services to detect fraudulent activities Behaviors Identification in Social Individuals G. Muscioni Develop a hierarchical model to extract behavior at multiple levels of aggregation (individual behavior, dyadic interactions and group-level activities) ? ? ? ? ? ? ? ? ? ? ? SeNSE P. Cancian, L. Cerina, G. Franco Accelerate Features Extraction and for Electromyography signals on FPGA (with applications to robotic prostheses) Exploits Recurrent Neural Networks for Classification
  • 9. !9 Exploiting ML @NECST Banksealer M. Carminati Framework for banking fraud detection Models user’s behavior through his/her interaction with the online banking services to detect fraudulent activities 0,02% false positives 98% detection rate of fraud anomalies
  • 10. !10 Exploiting ML @NECST Behaviors Identification in Social Individuals G. Muscioni Develop a hierarchical model to extract behavior at multiple levels of aggregation (individual behavior, dyadic interactions and group-level activities) ? ? ? ? ? ? ? ? ? ? ? RESULT-INDIVIDUAL RESULT-GROUP
  • 11. !11 Exploiting ML @NECST SeNSE P. Cancian, L. Cerina, G. Franco Accelerate Features Extraction and for Electromyography signals on FPGA (with applications to robotic prostheses) Exploits Recurrent Neural Networks for Classification
  • 13. !13 Optimizing ML for the Cloud Pretzel A. Scolari Prediction-serving system for scheduling trained ML models on cloud machines White box approach Optimize execution for lower latency and higher throughput Sharing operators' common state, to increase model density per machine
  • 15. !15 FPGA in Datacenters CONDOR N. Raspa, M. Bacis, G. Natale Acceleration of Convolutional Neural Network inference on FPGAs Cloud Integration via Amazon F1 Instances Automatic creation of an hardware accelerator for FPGA Support main deep learning libraries
  • 16. !16 FPGA in Embedded Systems Deep Learning on PYNQ L. Stornaiuolo Framework to help implementing Deep Learning algorithms on the PYNQ-Z1 Exploits the PYNQ platform SpiNN L. Cavinato, E. Migliorini, P. Cancian, M. Arnaboldi Use Spiking Neural Networks for Reinforcement Learning in Robotics Implement efficiently Spiking Neural Networks on FPGAs
  • 17. SESSION AGENDA Title: Pretzel: optimized Machine Learning framework for low-latency and high throughput workloads Speaker: Alberto Scolari, PhD Student @ Politecnico di Milano Title: CONDOR: An automated framework to accelerate convolutional neural networks on FPGA Speakers: Niccolo’ Raspa, MSc Student @ Politecnico di Milano, Marco Bacis, MSc Student @ Politecnico di Milano Title: On how to efficiently implement Deep Learning algorithms on PYNQ platform Speaker: Luca Stornaiuolo, PhD Student @ Politecnico di Milano Title: SpiNN, learning through spiking neural networks Speaker: Lara Cavinato, MSc Student @ Politecnico di Milano San Jose, CA May 25, 2018 Giuseppe Natale - giuseppe.natale@polimi.it