Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: mailtonexgentech@gmail.com.
www.nexgenproject.com
Mobile: 9791938249,9025656779
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
The IoT device requires a tiny controller performing a specific functionality. The Arduino platform makes it ideal to build the same. Delivered using ESP32 NodeMCU, this module will give you hands-on programming experience on how to set up, program and debug Embedded applications running in Arduino platform. You will get practical experience in reading data-sheets, hardware interfacing and communication protocols. With these learnings, you will be able to build an IoT device running an Embedded Application. This should communicate with IoT gateway using short range protocols like Bluetooth.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
IoT is the buzzword today. Wherever you go, people talk about it and there is more hype than reality. In this situation as fresh engineers it is important for you to understand IoT by taking an "inside-out" approach. It means to build understanding about various building blocks of IoT (Sensor | Device | Cloud | App) and technologies associated with it. This talk also focus on these key aspects and also derive key skills that engineers require to build a career in IoT. It will even map with our current ECEP course and make a connect with IoT.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: mailtonexgentech@gmail.com.
www.nexgenproject.com
Mobile: 9791938249,9025656779
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
The IoT device requires a tiny controller performing a specific functionality. The Arduino platform makes it ideal to build the same. Delivered using ESP32 NodeMCU, this module will give you hands-on programming experience on how to set up, program and debug Embedded applications running in Arduino platform. You will get practical experience in reading data-sheets, hardware interfacing and communication protocols. With these learnings, you will be able to build an IoT device running an Embedded Application. This should communicate with IoT gateway using short range protocols like Bluetooth.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
IoT is the buzzword today. Wherever you go, people talk about it and there is more hype than reality. In this situation as fresh engineers it is important for you to understand IoT by taking an "inside-out" approach. It means to build understanding about various building blocks of IoT (Sensor | Device | Cloud | App) and technologies associated with it. This talk also focus on these key aspects and also derive key skills that engineers require to build a career in IoT. It will even map with our current ECEP course and make a connect with IoT.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Conference on Cryptography and Blockchain (CRBL 2021)ijasuc
International Conference on Cryptography and Blockchain (CRBL 2021) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cryptography and Blockchain.
IOTA MAM and Internet of Underwater Things systems
The main problem of the IoT control devices and sensor is the lack of secure direct communication with thefinal trust point and different types of corruption and spoofing can occur. This introduces a great opportunity for data tampering and cyber-attack in addition no one can trust the sensor data in the first communication step.
No one guarantees that a right sensor sends out the right data due to no authentication and no truthfulness of sensors that are connected with a trusted point. The middle point is the first trusted point but no one can guarantee correctness and truthfulness in the data before this point. The aim of this talk is to reach out a new way to directly connect an embedded devices system, in this case, an underwater things system directly with a DL endpoint. The final purpose is to avoid an intermediary gateway step and port down the entire client system directly on embedded IoT devices, this will allow the device to directly communicate with blockchain with no additional middle step.
The entire project covers the needs to reach a secure and authenticate communication directly from the sensor node and in this way guarantee the CIA properties from the bottom.
We have therefore developed a solution that exploits the advantages of the IOTA MAM protocol and the advantages offered by the DL technology offered by IOTA to set up a protocol that allows direct communication between IOTA Tangle and low-level devices.
The solution is based on IOTA technology and IOTA environment and uses MAM protocol for message exchange on tangle. This protocol allows to sign and encrypt the message and thanks to the solidity of IOTA tangle is easy to reach the continuous availability and accessible to the service.
Call for papers - 11th International Conference on Ad hoc, Sensor & Ubiquitou...ijassn
11th International Conference on Ad hoc, Sensor & Ubiquitous Computing (ASUC 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Internet of Things or simply IoT is a technology which are having lot of advantages in building smart systems. The meaning of IoT is where things communication and share data among each other. IoT has lots of applications.
Microsoft's view of the Internet of Things (IoT) by Imran ShafqatAllied Consultants
Credits to Imran Shafqat, an x-colleague who presented this in the Allied Consultants office and then in MIC in Lahore
More IoT blogs on http://www.alliedc.com/blog/core-services/application-integration/iot/
The Internet of things (IOT) is the network of devices, vehicles, and home appliances that contain electronics, software and connectivity which allows these things to connect, interact and exchange data
VEDLIoT – A heterogeneous hardware platform for next-gen AIoT applications, Jens Hagemeyer, EU-IoT Training Session on “Machine Learning at the Edge and the FarEdge”, IoT Week (online event), August 2021
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...VEDLIoT Project
IoT - Accelerated Deep Learning for Cognitive Edge Computing, Jens Hagemeyer, EU-IoT Training Workshops Series – “AIoT and Edge Machine Learning”, May 2021
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)ijasuc
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
International Conference on Cryptography and Blockchain (CRBL 2021)ijasuc
International Conference on Cryptography and Blockchain (CRBL 2021) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cryptography and Blockchain.
IOTA MAM and Internet of Underwater Things systems
The main problem of the IoT control devices and sensor is the lack of secure direct communication with thefinal trust point and different types of corruption and spoofing can occur. This introduces a great opportunity for data tampering and cyber-attack in addition no one can trust the sensor data in the first communication step.
No one guarantees that a right sensor sends out the right data due to no authentication and no truthfulness of sensors that are connected with a trusted point. The middle point is the first trusted point but no one can guarantee correctness and truthfulness in the data before this point. The aim of this talk is to reach out a new way to directly connect an embedded devices system, in this case, an underwater things system directly with a DL endpoint. The final purpose is to avoid an intermediary gateway step and port down the entire client system directly on embedded IoT devices, this will allow the device to directly communicate with blockchain with no additional middle step.
The entire project covers the needs to reach a secure and authenticate communication directly from the sensor node and in this way guarantee the CIA properties from the bottom.
We have therefore developed a solution that exploits the advantages of the IOTA MAM protocol and the advantages offered by the DL technology offered by IOTA to set up a protocol that allows direct communication between IOTA Tangle and low-level devices.
The solution is based on IOTA technology and IOTA environment and uses MAM protocol for message exchange on tangle. This protocol allows to sign and encrypt the message and thanks to the solidity of IOTA tangle is easy to reach the continuous availability and accessible to the service.
Call for papers - 11th International Conference on Ad hoc, Sensor & Ubiquitou...ijassn
11th International Conference on Ad hoc, Sensor & Ubiquitous Computing (ASUC 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
Internet of Things or simply IoT is a technology which are having lot of advantages in building smart systems. The meaning of IoT is where things communication and share data among each other. IoT has lots of applications.
Microsoft's view of the Internet of Things (IoT) by Imran ShafqatAllied Consultants
Credits to Imran Shafqat, an x-colleague who presented this in the Allied Consultants office and then in MIC in Lahore
More IoT blogs on http://www.alliedc.com/blog/core-services/application-integration/iot/
The Internet of things (IOT) is the network of devices, vehicles, and home appliances that contain electronics, software and connectivity which allows these things to connect, interact and exchange data
VEDLIoT – A heterogeneous hardware platform for next-gen AIoT applications, Jens Hagemeyer, EU-IoT Training Session on “Machine Learning at the Edge and the FarEdge”, IoT Week (online event), August 2021
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...VEDLIoT Project
IoT - Accelerated Deep Learning for Cognitive Edge Computing, Jens Hagemeyer, EU-IoT Training Workshops Series – “AIoT and Edge Machine Learning”, May 2021
VEDLIOT – Accelerated AIoT. Jens Hagemeyer. 2nd Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2023, Toulouse, France, January 2023
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentationVEDLIoT Project
VEDLIoT – Accelerated AIoT. Kevin Mika and Piotr Zierhoffer. CPS&IoT’2023 Summer School on Cyber-Physical Systems and Internet-of-Things, Budva, Montenegro, June 2023
Hans Solomonsson presented "Challenges in developing cost and energy efficient deep learning systems in embedded system" on AI & Big Data summit at Stockholm Tech Live
02/2017 Santa Clara, California: Networks of autonomous devices and their imp...Frank Alexander Reusch
Direct communication between IoT devices works without central control. The use of expensive gateways is therefore not a prerequisite for IoT. Gateways are inflexible, limited in scaling and an ideal target for hacker attacks. Lemonbeat has reached with this presentation that direct device communication is taken into account in future standard "Web of Things (WoT)". WoT also needs to consider future developments. For example, the self-learning mechanism in the edge area, shown in this lecture.
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaromfrancis
OSGi Community Event 2015
A new world of applications emerges in the home from the growing variety of things – devices, sensors, actuators – potentially available. Several application domains are considered, e.g., security, energy efficiency, comfort, ambient assisted living, multimedia communication. The Smart Home is slowly taking off.</p>
Several actors exploit a new technical and economic opportunity to catalyze this market. This opportunity is based on the re-use of the infrastructure that telecom operators have deployed for today classic Internet and TV services. It raises technical and business challenges: Telecom operators have to open their home infrastructure to third-party applications while guaranteeing application security and consistency to all home business actors using this infrastructure.
Telecom operators have to open APIs at least two levels of their architecture: APIs in the cloud and APIs on an embedded device environment. This end-to-end infrastructure between the home network and service platforms has also to provide security at several levels, especially a consistent access right management.
The presentation will provide a vision of an open end-to-end architecture providing APIs in the cloud and in a home box to host any application and connect to any device in the Home. Among the standard organizations and industrial alliances, oneM2M standard specifications are making a reference architecture emerge. The implementation of oneM2M standard features in OSGi technology will be detailed, especially the end-to-end access right management discriminating both applications and users when accessing devices.
This infrastructure is currently prototyped thanks to the integration of open source software bricks provided by <a>Open the Box</a>, <a>Eclipse SmartHome</a> and <a>Eclipse OM2M</a> open initiatives.
Charith Perera, Arkady Zaslavsky, Peter Christen, Ali Salehi, Dimitrios Georgakopoulos, Capturing Sensor Data from Mobile Phones using Global Sensor Network Middleware, Proceedings of the IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), Sydney, Australia, September, 2012
Industrial IoT Mayhem? Java IoT Gateways to the RescueEurotech
Industrial IoT comes with great expectations for operational efficiency, promising improved asset utilization and productivity gains. IIoT challenges include reliability, security, low maintenance, long lifecycle, and integration into heterogeneous and fragmented systems. This session proposes some architectural patterns that can be leveraged to overcome these challenges. It introduces, at the center of the solution, Java-powered IoT gateways and modular IoT application frameworks such as the open source Eclipse Kura. Incorporating a live demonstration, the presentation highlights some of the latest Eclipse Kura features such as a pluggable device model for fieldbus protocols, visual data flow, and connectivity across various IoT cloud service providers.
JavaOne 2016 - Presentation by Dave Woodard and Walt Bowers
The Internet of Things (IoT) offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues. Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses.
Similar to Industrial Pioneers Days - Machine Learning (20)
IoT Tech Expo 2023_Micha vor dem Berge presentationVEDLIoT Project
VEDLIoT Next Generation AIoT Applications. Micha vor dem Berge. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
Next generation accelerated AIoT systems and applications. Pedro Trancoso. Special Session on EU Projects, co-located with Computing Frontiers 2023, Bologna, Italy, May 2023
Next Generation IoT Architectures_Hans SalomonssonVEDLIoT Project
VEDLIoT Toolchain for Efficient Deep Learning on heterogeneous hardware, Hans Salomonsson, EU-IoT Training Workshops Series – "Next Generation IoT Architectures”, November 2021
VEDLIoT Cognitive IoT Hardware Platform. René Griessl. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
Security for VEDLIoT Components, from Cloud through Edge to IoT. Marcelo Pasin. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
Security and Robustness for VEDLIoT Components, from Cloud through Edge. Marcelo Pasin. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
Reconfigurable ML Accelerators in VEDLIoT. Marco Tassemeier. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
HiPEAC2022-DL4IoT workshop_ Muhammad Waqar AzharVEDLIoT Project
Co-design of DL Accelerators in VEDLIoT. Muhammad Waqar Azhar. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022.
VEDLIoT at FPL'23_Accelerators for Heterogenous Computing in AIoTVEDLIoT Project
VEDLIoT took part in the 33rd International Conference on Field-Programmable Logic and Applications (FPL 2023), in Gothenburg, Sweden. René Griessl (UNIBI) presented VEDLIoT and our latest achievements in the Research Projects Event session, giving a presentation entitled "Accelerators for Heterogenous Computing in AIoT".
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationVEDLIoT Project
Project Summary
The ever increasing performance of computer systems in general and IoT systems, in particular, delivers the capability to solve increasingly challenging problems, pushing automation to improve the quality of our life. This triggers the need for a next-generation IoT architecture, satisfying the demand for key sectors like transportation (e.g. self-driving cars), industry (e.g. robotization or predictive maintenance), and our homes (e.g. assisted living). Such applications require building systems of enormous complexity, so that traditional approaches start to fail. The amount of data collected and processed is huge, the computational power required is very high, and the algorithms are too complex allowing for the computation of solutions within the tight time constraints. In addition, security, privacy, or robustness for such systems becomes a critical challenge.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
1. Jens Hagemeyer, Carola Haumann
Industrial Pioneers Days OWL –
Machine Learning
20. April 2021
VEDLIoT - Very Efficient Deep
Learning in IoT
Teaching the IoT to learn
2. 2
Platform
Hardware: Scalable, heterogeneous, distributed
Accelerators: Efficiency boost by FPGA and ASIC technology
Toolchain: Optimizing Deep Learning for IoT
Use cases
Industrial IoT
Automotive
Smart Home
Open call
At project mid-term
Early use and evaluation of VEDLIoT technology
Very Efficient Deep Learning IoT – VEDLIoT
Call: H2020-ICT2020-1
Topic: ICT-56-2020 Next Generation Internet of Things
Duration: 1. November 2020 – 31. Oktober 2023
Coordinator: Bielefeld University (Germany)
Overall budget: 7 996 646.25 €
Consortium: 12 partners from 4 EU countries (Germany,
Poland, Portugal and Sweden) and one associated
country (Switzerland).
More info:
https://www.vedliot.eu/
https://twitter.com/VEDLIoT
https://www.linkedin.com/company/vedliot/
3. 3
Bielefeld University (UNIBI) - Coordinator
Christmann (CHR)
University of Osnabrück (UOS)
Siemens (SIEMENS)
University of Neuchâtel (UNINE)
University of Lisbon (FC.ID)
Chalmers (CHALMERS)
University of Gothenburg (UGOT)
RISE (RISE)
EmbeDL (EMBEDL)
Veoneer (VEONEER)
Antmicro (ANT)
VEDLIOT partners
5. 5
VEDLIoT Hardware Platform
Heterogeneous, modular, scalable microserver system
Different technology concepts for improving: computing power density, cost-effectiveness,
maintainability, and reliability for the full spectrum of IoT, from embedded devices over the edge
towards the cloud
x86
GPU
ML-ASIC
ARM v8
GPU
SoC
FPGA
SoC
RISC-V
FPGA
VEDLIOT Cognitive
IoT Platform
6. 6
RECS Architecture (RECS|BOX, t.RECS)
RECS Server Backplane (up to 15 Carriers)
Carrier (PCIe Expansion)
Carrier (High Performance)
e.g. GPU-Accelerator
Carrier (Low Power)
#3
#2
Microserver
(High Performance)
#1
Microserver
(Low Power)
#16
#3
#2
Microserver
(Low Power)
#1
High-Speed Low-Latency Network (PCIe, High-Speed Serial)
Compute Network (up to 40 GbE)
Management Network (KVM, Monitoring, …)
HDMI/USB
iPass+ HD
QSFP+
RJ45
Ext. Connectors
GPU SoC
FPGA SoC ARM Soc
Low-Power Microserver (Apalis/Jetson)
x86 ARM v8
High-Performance Microserver (COM Express)
FPGA SoC
High-Performance
Carrier
(up to 3 microservers)
Low-Power Carrier
(up to 16 microservers)
7. 7
Embedded Device
Supports ML acceleration
FPGA
ASIC
Communication interfaces
Wired (CAN, Ethernet, CSI)
Wireless (WLAN, LoRa, 5G)
Sensors
Camera
Environment (Temp./Hum.)
Housekeeping
RECS Architecture (µ.RECS)
Processing Unit ML Accelerator
Wireless
Communication
Sensors
Wired Communication
Module (COM HPC; NVIDIA Jetson; …)
ML Accelerator
Carrier
Low-Power
Processing Unit
8. 8
End of Moore’s law & dark silicon – Domain Specific Architectures (DSA)
Efficient, flexible, scalable accelerators for the compute continuum
Algotecture – DL algorithm + computer architecture co-design
DL Accelerators
9. 9
Enabling the rapid convergence of the fast pace innovation on the hardware and
software
Deep Learning Toolchain
10. 10
Simulation platform for IoT
Open source framework for software/hardware co-development with CI-driven testing
capabilities, as well as metrics for measuring efficiency of ML workloads
Enables development and continuous testing of VEDLIoT’s security features and its robustness
Renode is available to all project members and future users of VEDLIoT and will include a
simulated model of the RISC-V-based FPGA SoC platform developed as part of the VEDLIoT
project
11. 11
End-to-end attestation, support for execution and communication
Support for
End-to-end trust (attestation)
Secrets distribution (keys)
Machine learning (federated, streaming, …)
Requirements
Support for edge applications
Decentralised, dynamic, loosely organised
Rely on
Trusted execution environments
BFT and peer-to-peer algorithms
Blockchain concepts
VEDLIoT
app
Attestation
Pool
12. 12
Safety and robustness
Define monitors for timeliness and data quality assessment
Develop safety argumentation for adaptive solutions,
exploiting architectural hybridization
Hybrid System architecture:
• Some system components implemented
with assured reliability (as needed)
• Remaining components subject to
uncertainties and prone to failures
Safety requirements:
• Defined at design time for each operational
mode
Monitoring data:
• Collected in run-time, to allow verifying if
safety requirements are being satisfied
and trigger reconfiguration if not
Timeliness (e.g., deadline
miss detection)
Sensor data quality (e.g.,
outlier, noise detection)
Accuracy of DL systems
(e.g., anomaly detection)
13. 13
Increase safety, health and well being of residents – acceleration of AI methods for
demand-oriented user-home interaction
Use case: Smart Home / Assisted Living
14. 14
Smart Mirror as central user interface
Own mirror image can be seen normally
Intuitive control over gesture and voice
Shows personalized information
Public transportation schedule
Cafeteria offering
Football scorings/leader board
Weather
News
…
Data Privacy as the highest priority
-> Edge computation of many neural networks
Smart Mirror – Central Demonstrator for Smart Home
15. 15
Face recognition
mobilenetSSD trained on WIDERFACE dataset
Object detection
YoloV3, Efficient-Net, yoloV4-tiny
Gesture detection
YoloV4-tiny with 3 Yolo layers (usually: 2 layers)
Speech recognition
Mozilla DeepSpeech
AI Art: Style-Gan trained on works of arts
Collect usage data in situation memory
Smart Mirror – Neural Networks
16. 16
Industrial IoT – drive condition classification
Control applications need DL-based condition classification
On the edge device for low power consumption
Suggestions for control and maintenance
DL methods on all communication layers
DL in a distributed architecture
Dynamically configured systems
Sensored testbench with 2 motors
Acceleration, Magnetic field, Temperature,
IR-Cam (temperature), Current-Sensors, Torque
On / Off detection without
motor current or voltage
Cooling fault detection
Bearing fault detection
17. 17
Industrial IoT – Arc detection for DC distributions
AI based pattern recognition for different local sensor data
current, magnetic field, vibration, temperature, low resolution infrared picture
Safety critical nature
response time should be <10ms
AI based or AI supported decision made by the sensor node itself or by a local part of the sensor
network
19. 19
The fun has just started!
Follow our work!
https://twitter.com/VEDLIoT
https://www.linkedin.com/company/vedliot/
https://vedliot.eu
Be part of it
Open call at project mid-term
Allow early use and evaluation of VEDLIoT
technology
20. 20
Thank you for your
attention.
Contact
Jens Hagemeyer, Carola Haumann
Bielefeld University, Germany
chaumann@cor-lab.uni-bielefeld.de
jhagemey@cit-ec.uni-bielefeld.de