Deploying Machine Learning in Resource-Constrained Devices for Human Activity Recognition

被引:0
|
作者
Reusch, Rafael Schild [1 ]
Juracy, Leonardo Rezende [1 ]
Moraes, Fernando Gehm [1 ]
机构
[1] Pontificia Univ Catolica Rio Grande do Sul, Sch Technol, Porto Alegre, RS, Brazil
关键词
Machine Learning; 1D CNN; Human Activity Recognition; Embedded Systems; Constrained Devices; COST;
D O I
10.1109/SBESC60926.2023.10324073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine Learning (ML) has proven to be highly effective in solving complex tasks such as human activity and speech recognition. However, the introduction of accuracy-driven ML models has brought new challenges in terms of their applicability in resource-constrained systems. In Human Activity Recognition (HAR), current state-of-the-art approaches often rely on complex multilayer LSTM (Long Short Term Memory) networks once they are well suited to handle temporal series data, a crucial aspect of HAR, but presenting a high computational cost associated with running the inference phase. In HAR, low-power IoT devices, such as wearable sensor arrays, are frequently used as data-gathering devices. However, we observed a limited effort to deploy ML technology directly on these devices, most commonly using edge or cloud computing services, which can be unavailable in some situations. This work aims to provide a Convolutional Neural Network (CNN) tuned for resource-constrained embedded systems. After tuning the CNN model in the Pytorch framework, we present an equivalent C model and employ optimization techniques. The results show that, compared to the reference CNN, the optimized model reduced the CNN model 2.34 times, does not require floating-point units (FPUs), and improved accuracy from 74.9% to 85.2%. These results show the feasibility of running the proposed CNN on resource-constrained devices.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] MacLeR: Machine Learning-Based Runtime Hardware Trojan Detection in Resource-Constrained IoT Edge Devices
    Khalid, Faiq
    Hasan, Syed Rafay
    Zia, Sara
    Hasan, Osman
    Awwad, Falah
    Shafique, Muhammad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (11) : 3748 - 3761
  • [32] Encoding semantic awareness in resource-constrained devices
    Preuveneers, Davy
    Berbers, Yolande
    IEEE INTELLIGENT SYSTEMS, 2008, 23 (02) : 26 - 33
  • [33] SmartDedup: Optimizing Deduplication for Resource-constrained Devices
    Yang, Qirui
    Jin, Runyu
    Zhao, Ming
    PROCEEDINGS OF THE 2019 USENIX ANNUAL TECHNICAL CONFERENCE, 2019, : 633 - 646
  • [34] An Affordance Detection Pipeline for Resource-Constrained Devices
    Apicella, Tommaso
    Cavallaro, Andrea
    Berta, Riccardo
    Gastaldo, Paolo
    Bellotti, Francesco
    Ragusa, Edoardo
    2021 28TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (IEEE ICECS 2021), 2021,
  • [35] Code protection for resource-constrained embedded devices
    Saputra, H
    Chen, G
    Brooks, R
    Vijaykrishnan, N
    Kandemir, M
    Irwin, MJ
    ACM SIGPLAN NOTICES, 2004, 39 (07) : 240 - 248
  • [36] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [37] Lightweight Strong PUF for Resource-Constrained Devices
    Korona, Mateusz
    Giermakowski, Radoslaw
    Biernacki, Mateusz
    Rawski, Mariusz
    ELECTRONICS, 2024, 13 (02)
  • [38] Energy Consumption Awareness for Resource-Constrained Devices
    Silva, Edgar M.
    Malo, Pedro
    Albano, Michele
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 74 - 78
  • [39] Improving the Efficiency of Transformers for Resource-Constrained Devices
    Tabani, Hamid
    Balasubramaniam, Ajay
    Marzban, Shabbir
    Arani, Elahe
    Zonooz, Bahram
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 449 - 456
  • [40] A JiniTM Lookup service for resource-constrained devices
    Smith, L
    Roe, C
    Knudsen, KS
    2002 IEEE 4TH INTERNATIONAL WORKSHOP ON NETWORKED APPLIANCES, PROCEEDINGS, 2002, : 135 - 144