Next generation accelerated AIoT systems and applications. Pedro Trancoso. Special Session on EU Projects, co-located with Computing Frontiers 2023, Bologna, Italy, May 2023
Report
Share
Report
Share
1 of 22
More Related Content
Similar to Computing Frontiers 2023_Pedro Trancoso presentation
SS-CPSIoT 2023_Kevin Mika and Piotr Zierhoffer presentationVEDLIoT Project
VEDLIoT – Accelerated AIoT. Kevin Mika and Piotr Zierhoffer. CPS&IoT’2023 Summer School on Cyber-Physical Systems and Internet-of-Things, Budva, Montenegro, June 2023
Summit 16: Deploying Virtualized Mobile Infrastructures on OpenstackOPNFV
Service Provider is evolving and competing with leaner Over the Top Providers (OTP) providers such as Google and Amazon to provide mobile services. Furture SP network has ot be agile, resilient and auto salable. SPs are leaning towards using COTS infra, open networking (OPNFV, ONOS) and VNF to run routers, switches, mobile gateways, firewall, NAT, DPI functions. Session covers design and deployment of virtualizing the mobile infra such as Virtual Evolved Packet Core, GiLAN and VoLTE as well as 5G core. We will also cover performance fine tuning using DPDK, SR-IOV etc. WE will present case study using Cisco (VNF Manager and NFVO), Redhat (NFVI), Openstack and block storage using CEPH technology. Participants will be able to understand complexities of mobile packet core, evolution NFV based solution and architecture framework for 5G mobile packet core.
intel Sync. & Edge Solution udpate xEng-v1.0.pptxAlex Wooram Kim
This document discusses network timing synchronization solutions and the Intel Ethernet 810 network interface card.
It compares GPS, SyncE, and PTP timing synchronization methods. It then describes the Intel Ethernet 810 NIC's hardware and software features for high accuracy timing, including an OCXO oscillator and GNSS support. Product codes and specifications are provided for the 810 series cards. The document also outlines the Intel edge computing strategy and software stack for edge applications.
This project aims to develop ubiquitous low-power image processing platforms. It has several objectives including defining a reference platform, instantiating it through use cases, and demonstrating performance improvements. Several partners from industry and academia are involved. Key tasks include selecting hardware components, developing interfaces and tools, and validating the platform using applications like medical imaging, automotive driver assistance, and unmanned aerial vehicles. An initial hardware instance was selected using the Sundance EMC2 board with an ARM CPU and FPGA. The UAV use case involves real-time stereo depth estimation for obstacle avoidance.
This document discusses NVIDIA's chips for automotive, HPC, and networking. For automotive, it describes the Tegra line of SOC chips used in cars like Tesla, and upcoming chips like Orin and Atlan. For HPC, it introduces the upcoming Grace CPU designed for giant AI models. For networking, it presents the BlueField line of data processing units (DPUs) including the new 400Gbps BlueField-3 chip and the DOCA software framework. The document emphasizes that NVIDIA's GPU, CPU, and DPU chips make yearly leaps while sharing a common architecture.
Supermicro AI Pod that’s Super Simple, Super Scalable, and Super AffordableRebekah Rodriguez
The worlds of HPC and AI are evolving at a tremendous rate. The demands of modern-day applications put immense pressure on local IT teams and resources. More often than not, this pressure can come from requiring an AI strategy to speed up mission-critical applications - but this can come at a cost which can hinder adoption. In this webinar, Supermicro, together with International Computer Concepts (ICC) and Define Tech, will demonstrate their AI Super Pod that delivers on AI strategy needs without breaking the bank.
Dell NVIDIA AI Powered Transformation WebinarBill Wong
This document provides an overview and summary of Dell Technologies' and NVIDIA's partnership to provide artificial intelligence solutions and infrastructure. Some key points:
- Dell and NVIDIA are working together to help customers address challenges of digital transformation and data analytics through AI-powered solutions.
- NVIDIA's new DGX A100 system provides unprecedented performance for AI workloads through its 8 A100 GPUs and high-speed networking.
- The DGX A100 allows for different workloads like training, inference and analytics to run simultaneously on a single system through its multi-instance GPU capability.
- Dell and NVIDIA's solutions aim to help customers address business trends like remote work
The document discusses hardware platforms and accelerators for VEDLIoT. It describes the VEDLIoT Hardware Platform as a heterogeneous, modular, and scalable microserver system that supports the IoT spectrum from embedded to edge to cloud. It then provides details on several platforms: the RECS|Box platform which uses Computer-on-Module standards to achieve flexibility and performance; the t.RECS platform optimized for local edge applications; and the uRECS embedded device platform that supports machine learning acceleration and communication interfaces. Diagrams and specifications are given for the architectures of these platforms.
VEDLIoT Cognitive IoT Hardware Platform. René Griessl. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
VEDLIoT – A heterogeneous hardware platform for next-gen AIoT applications, Jens Hagemeyer, EU-IoT Training Session on “Machine Learning at the Edge and the FarEdge”, IoT Week (online event), August 2021
Software development in ar mv8 m architecture - yiuArm
This document provides information on ARMv8-M architecture and TrustZone security for microcontrollers. It introduces the Cortex-M23 and Cortex-M33 processors that implement the ARMv8-M architecture. It describes the ARMv8-M sub-profiles and highlights key features of the Cortex-M23 and Cortex-M33 such as enhanced debug capabilities and support for TrustZone security. The document also discusses software development concepts for the ARMv8-M architecture such as separation of secure and non-secure worlds and debug authentication. Finally, it outlines how TrustZone can provide security for Internet of Things applications and endpoints.
Virtualization is all the rage today. But not all platforms are created equal when it comes to security, resilience and capacity management of the workloads being virtualized. On a mainframe, the same workloads that run on distributed can have a completely different operations model that can reduce cost and provide investment protection for the future.
How to Select Hardware for Internet of Things Systems?Hannes Tschofenig
With the increasing commercial interest in Internet of Things (IoT) the question about a reasonable hardware configuration surfaces again and again.
Peter Aldworth, a hardware engineer with more than 19 years of experience, discusses this topic in a presentation given to the IETF community.
Andes Technology Corporation provides a product selector guide and overview of its AndesCore CPU architecture and associated products for Internet of Things (IoT) applications. The AndesCore architecture was designed specifically for the power, performance, and security needs of IoT devices, unlike architectures for PCs and smartphones. Key features of AndesCore include frequency throttling, a patented memory architecture, and custom instructions. AndesCore CPU cores range from small 2-stage pipelines to larger 8-stage pipelines and include options for security, custom instructions, and digital signal processing. Andes also offers associated platform IP and software development tools to simplify IoT product development.
Aspire provides embedded product engineering design and manufacturing services. It has over 300 customers and has developed over 1000 products. It focuses on hardware design, embedded software development, and offers services across various industries like automotive, consumer electronics, and networking. It has capabilities in areas like board design, firmware development, testing, and certification.
Jetson AGX Xavier and the New Era of Autonomous MachinesDustin Franklin
Deep-dive on NVIDIA Jetson AGX Xavier, designed to help you deploy advanced AI onboard robots, drones, and other autonomous machines. View the webinar here: https://bit.ly/2BWVWv1
Similar to Computing Frontiers 2023_Pedro Trancoso presentation (20)
IoT Tech Expo 2023_Micha vor dem Berge presentationVEDLIoT Project
VEDLIoT Next Generation AIoT Applications. Micha vor dem Berge. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
The document outlines an agenda for a presentation on the VEDLIoT project. The agenda includes an introduction to VEDLIoT by Pedro Trancoso, a presentation on VEDLIoT Hardware Platforms by Kevin Mika, and a discussion of Performance Evaluation and Benchmarking in VEDLIoT by Mario Pormann. The VEDLIoT project aims to develop very efficient deep learning techniques for IoT applications through the use of heterogeneous hardware platforms and accelerators.
IoT Week 2022-NGIoT session_Micha vor dem Berge presentationVEDLIoT Project
This document discusses optimizing a smart home system using edge computing and machine learning. It describes using embedded accelerators like the Nvidia Jetson AGX and Xavier to distribute neural networks and machine learning models to devices around the home. These include a smart mirror, kitchen, door, and other devices. The goal is to optimize the models to increase energy efficiency and distribute the workloads across the edge devices. One focus is developing a smart mirror prototype that can recognize faces, objects and gestures using embedded accelerators like the t.RECS and u.RECS boards to analyze camera input and interact with users through voice and a virtual display.
Next Generation IoT Architectures_Hans SalomonssonVEDLIoT Project
VEDLIoT Toolchain for Efficient Deep Learning on heterogeneous hardware, Hans Salomonsson, EU-IoT Training Workshops Series – "Next Generation IoT Architectures”, November 2021
VEDLIOT – Accelerated AIoT. Jens Hagemeyer. 2nd Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2023, Toulouse, France, January 2023
Security for VEDLIoT Components, from Cloud through Edge to IoT. Marcelo Pasin. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
Security and Robustness for VEDLIoT Components, from Cloud through Edge. Marcelo Pasin. VEDLIoT Conference Track co-located with IoT Tech Expo, Amsterdam, Netherlands, September 2023
Reconfigurable ML Accelerators in VEDLIoT. Marco Tassemeier. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022
EU-IoT Training Workshops Series: AIoT and Edge Machine Learning 2021_Jens Ha...VEDLIoT Project
IoT - Accelerated Deep Learning for Cognitive Edge Computing, Jens Hagemeyer, EU-IoT Training Workshops Series – “AIoT and Edge Machine Learning”, May 2021
HiPEAC2022-DL4IoT workshop_ Muhammad Waqar AzharVEDLIoT Project
Co-design of DL Accelerators in VEDLIoT. Muhammad Waqar Azhar. Workshop on Deep Learning for IoT (DL4IoT), co-located with HiPEAC 2022, Budapest, Hungary, June 2022.
The document discusses VEDLIoT, a project that aims to develop very efficient deep learning for IoT applications. It focuses on developing a scalable and heterogeneous hardware platform using accelerators like FPGAs and ASICs. The project also aims to optimize deep learning toolchains for IoT use cases in industries like industrial IoT, automotive, and smart homes. An open call was announced to allow early use and evaluation of the VEDLIoT technology.
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationVEDLIoT Project
VEDLIoT is a project that aims to develop a framework for the next generation internet of things (IoT) based on IoT devices that collaboratively solve complex deep learning applications across distributed systems. The project will improve the performance and cost ratio of AI processing by distributing hardware across the entire chain from embedded devices to the cloud. It will also increase the safety, health and well-being of users through accelerating AI methods for user-home interaction. The project will develop a cognitive IoT platform, deep learning toolchain, and DL accelerators to enable this vision over its three year timeline starting in November 2020.
CULEX MOSQUITOES, SYSTEMATIC CLASSIFICATION, MORPHOLOGY, LIFE CYCLE , CLINICA...DhakeshworShougrakpa
showing Culex mosquitoes' systematic classification, a completed life cycle i.e. egg, larva, pupa and adult mosquitoes also known as imago, also this slide showed the morphology of culex mosquitoes including head, thorax, abdomen, wing, egg larval stage, resting position,etc. by comparing with anopheles' mosquitoes. it's also showed the transmission of wuchereria bancrofti transmitted by vector Culex quinquefasciatus. Host: W. bancrofti completes its life cycle in
two hosts.
1. Definitive host: Man
2. Intermediate host: Mosquito named
Culex quinquefasciatus is the principle
vector worldwide. Rarely Anopheles
(rural Africa) or Aedes (Pacific Island)
can serve as a vector.
Infective form: Third stage filariform larvae
are the infective form found in the proboscis
of the mosquito.
Mode of transmission: L3
filariform larvae get
deposited in skin by the insect bite. Residents living in the endemic areas are exposed to
about 50–300 L3
larvae every year.Human cycle
z Develop into adults: Larvae penetrate
the skin, enter into lymphatic vessels and
migrate to the local lymph nodes where they
molt twice to develop into adult worms in
few months (4–6 weeks for B. malayi)
z Adults lay L1
larvae (microfilariae): Adult
worms reside in the afferent lymphatics or
cortical sinuses of the lymph nodes where
they mate and start laying the first stage
larvae (microfilariae). Male worms die after
mating where as the female worms live for
5–10 years. A gravid female can discharge
50,000 microfilariae/day
z Prepatent period: It is the time period
between the infection (entry of L3
larvae)
and diagnosis (detection of microfilariae
in blood). This is variable ranging from 80
days to 150 days
Mosquito cycle
z Transmission: When the mosquito bites
an infected man, the microfilariae are
ingested. Culex bites in night where as Aedes
bites in daytime
z Exsheathing: Microfilariae come out of the
sheath within 1–2 hours of ingestion
z Migration to thoracic muscle: L1
larvae
penetrate the stomach wall and migrate to
thoracic muscle in 6–12 hours where they
become sausage shaped (short and thick)
z Develop to infective L3
larvae: L1
larvae
molt twice to develop L2
(long and thick
form) followed by L3
(long and thin form).
The highly active L3
larvae migrate to the
labella (distal part of proboscis) of the
mosquito and serve as the infective stage
to man
z Extrinsic incubation period: Under
optimum conditions, the mosquito cycle
takes around 10–14 days
Clinical symptoms:
The clinical symptoms and signs are mainly determined by the duration of the infection. The
adult worms, which live in the lymphatic vessels, can cause severe inflammation of the
lymphatic system and acute recurrent fever. Secondary bacterial infections are a major factor in
the progression towards lymphoedema and elephantiasis, the characteristic swelling of the limbs,
genitalia and breasts.
treatment like using larvicide like fenthion can spray on water
Towards Wearable Continuous Point-of-Care Monitoring for Deep Vein Thrombosis...ThrombUS+ Project
Kaldoudi E, Marozas M, Jurkonis R, Pousset N, Legros M, Kircher M, Novikov D, Sakalauskas A, Moustakidis P, Ayinde B, Moltani LA, Balling S, Vehkaoja A, Oksala N, Macas A, Balciuniene N, Bigaki M, Potoupnis M, Papadopoulou S-L, Grandone E, Gautier M, Bouda S, Schloetelburg C, Prinz T, Dionisio P, Anagnostopoulos S, Drougka I, Folkvord F, Drosatos G, Didaskalou S and the ThrombUS+ Consortium, Towards Wearable Continuous Point-of-Care Monitoring for Deep Vein Thrombosis of the Lower Limb. In: Jarm, T., Šmerc, R., Mahnič-Kalamiza, S. (eds) 9th European Medical and Biological Engineering Conference. EMBEC 2024. IFMBE Proceedings, vol 113. Springer, Cham. https://doi.org/10.1007/978-3-031-61628-0_36
Presented by Dr. Stelios Didaskalou, ThrombUS+ Project Manager
Ethical considerations play a crucial role in research, ensuring the protection of participants and the integrity of the study. Here are some subject-specific ethical issues that researchers need
TOPIC: INTRODUCTION TO FORENSIC SCIENCE.pptximansiipandeyy
This presentation, "Introduction to Forensic Science," offers a basic understanding of forensic science, including its history, why it's needed, and its main goals. It covers how forensic science helps solve crimes and its importance in the justice system. By the end, you'll have a clear idea of what forensic science is and why it's essential.
The X‐Pattern Merging of the Equatorial IonizationAnomaly Crests During Geoma...Sérgio Sacani
A unique phenomenon—A geomagnetically quiet time merging of Equatorial IonizationAnomaly (EIA) crests, leading to an X‐pattern (EIA‐X) around the magnetic equator—has been observed in thenight‐time ionospheric measurements by the Global‐scale Observations of the Limb and Disk mission. Thepattern is also reproduced in an ionospheric model that assimilates slant Total Electron Content from GlobalNavigation Satellite System and Constellation Observing System for Meteorology, Ionosphere, and Climate 2.A free‐running whole atmospheric general circulation model simulation reproduces a similar pattern. Due to thesimilarity between measurements and simulations, the latter is used to diagnose this heretofore unexplainedphenomenon. The simulation shows that the EIA‐X can occur during geomagnetically quiet conditions and inthe afternoon to evening sector at a longitude where the vertical drift is downward. The downward vertical driftis a necessary but not sufficient condition. The simulation was performed under constant low‐solar andquiescent‐geomagnetic forcing conditions, therefore we conclude that EIA‐X can be driven by lower‐atmospheric forcing.
History & overview of Bioprocess Technology.pptxberciyalgolda1
Bioprocess technology is a field that merges biology, chemistry, and engineering to develop processes that harness living cells or their components (like enzymes) for the production of pharmaceuticals, chemicals, food, and biofuels. This multidisciplinary field has evolved significantly over the past few decades, playing a crucial role in various industries.
Prototype Implementation of Non-Volatile Memory Support for RISC-V Keystone E...LenaYu2
Handling confidential information has become an increasingly important concern among many areas of society. However, current computing environments have been still vulnerable to various threats, and we should think they are untrusted.
Trusted Execution Environments (TEEs) have attracted attention because they can execute a program in a trusted environment constructed on an untrusted platform.
Particularly, the RISC-V Keystone is one of the interesting TEEs since it is a flexibly customizable and fully open-source platform. On the other hand, as same as other TEEs, it must also delegate I/O processing, such as file accesses, to a host OS, resulting in the expensive overhead. For this problem, we thought utilizing byte-addressable non-volatile memory (NVM) modules is a useful solution to handle persistent data objects for TEEs.
In this paper, we introduce a prototype implementation of NVM support for the Keystone. Additionally, we evaluate it on the Freedom U500 built on a VC707 FPGA dev kit.
https://ken.ieice.org/ken/paper/20210720TC4K/
1. K. Mika, R. Griessl, N. Kucza, F. Porrmann, M.
Kaiser, L. Tigges, J. Hagemeyer, P. Trancoso,
M.Waqar, F. Qararyah, S. Zouzoula, J. Ménétrey,
M. Pasin, V. Schiavoni, P. Felber, C. Marcus, O.
Brunnegard, O. Eriksson, H. Salomonsson, D.
Ödman, A. Ask, A. Casimiro, A. Bessani, T.
Carvalho, K. Gugala, P. Zierhoffer, G. Latosinski,
M. Tassemeier, M. Porrmann, H.-M. Heyn, E.
Knauss, Y. Mao, F. Meierhöfer
Next generation accelerated AIoT
systems and applications
10. May 2023
13. 13
Optimizing DL models
Harware-aware optimizations
Model compression without loss of accuracy
Optimizing Toolchain for Heterogenenous
Hardware
14. 14
Optimizing DL models
Harware-aware optimizations
Model compression without loss of accuracy
Hardware software co-design
Reconfigurable (FPGA) accelerators
Template-based description
Heterogenenous engines
Optimizing Toolchain for Heterogenenous
Hardware
Co-design
15. 15
Optimizing DL models
Harware-aware optimizations
Model compression without loss of accuracy
Hardware software co-design
Reconfigurable (FPGA) accelerators
Template-based description
Heterogenenous engines
Model verification
Load, optimize, deploy, and evaluate deep
neural networks on target hardware in a
traceable and reproducible manner.
Optimizing Toolchain for Heterogenenous
Hardware
Co-design
16. 16
Optimizing DL models
Harware-aware optimizations
Model compression without loss of accuracy
Hardware software co-design
Reconfigurable (FPGA) accelerators
Template-based description
Heterogenenous engines
Model verification
Load, optimize, deploy, and evaluate deep
neural networks on target hardware in a
traceable and reproducible manner
Simulation
Simulation framework for implementation,
testing, and debugging
Optimizing Toolchain for Heterogenenous
Hardware
Co-design
17. 17
Requirements concepts for AIoT
Conceptual model of the compositional architecture
Framework
Abstraction levels: Knowledge and Analytical, Conceptual,
Design, and Runtime level
Clusters of concerns for quality aspects of an AI system in the IoT
are Safety, Security, Privacy and Ethical Aspects
Safety aspects
Requirements Engineering facilitates constructive design of
safety critical systems
Trusted execution for AIoT
Trusted Execution Environments (TEEs): Intel SGX & ARM
TrustZone
Trusted runtimes: TWINE for SGX and WATZ for TrustZone
Inferring trust in AIoT
Remote Attestation (RA) integrated into trusted
WebAssembly runtimes
SIRE: a Byzantine fault-tolerant infrastructure supporting
remote attestation
Safety, Security and Requirements for Distributed AIoT
Systems
Group of
concerns
Cluster of
concern
Architecture
view
Architecture
viewpoint
Business Goal
or Use Case
Stakeholder
Relation /
Correspon-
dence
Level of
Abstraction
System-
of-interest
1..*
1..*
1..*
1..*
has
1..*
exists on
describes /
specifies
determines
addresses
governs
1..*
18. 18
Automotive
Pedestrian Automatic Emergency Breaking (P-AEB)
The main challenge is the limited processing power available
in the vehicle, the communication resource limits and the
possible processing power available in the edge (base
station)
Distributing the DL model over multiple processing nodes
VEDLIoT Applications
19. 19
Industrial IoT
Predictive maintenance: Motor Condition Classification
Anomaly detection: Series Arc Fault Detection (AFD) in low-voltage direct current (LVDC) systems
Challenges: limited data of fault condition under real scenarios due to finance and safety considerations,
and the lack of framework for software development with DL.
VEDLIoT Applications
20. 20
Smart home
Smart mirror - intuitive user interface, display of
personalized information and the status of the
smart home
Focus on data protection through local
processing
Tasks:
user identification by facial recognition and
tracking using depth imaging cameras
hand gestures recognized to control the mirror
voice assistant - natural language processing
(NLP) - to control key features through voice
commands
Currently deployed on one NVIDIA Orin AGX,
combined with an M.2-based Hailo-8 DL
accelerator for gesture detection
VEDLIoT Applications
RGB-D Camara
Background Removal
RetinaFace
for Face Detection
Gesture Detection
with YoloV7-tiny
Object Detection
with YoloV7
Siamese Network for
Identification
Speech to Text
with coqui
Intent Extraction
for Skill System
ROS2 Bridge
Webstream
Person Recognition Decision Maker
Hailo8
ROS2 Nodes
Text to Speech
with coqui
Micophone Input
Speaker
Trusted
Execution
Environment
MagicMirror²
Nvidia AGX Orin
21. 21
Integration of Deep Learning into IoT devices with restricted computing capabilities and
minimal power consumption requirements - energy-efficient computing
AIoT hardware platform with tailored hardware components and accelerators: from
embedded systems to edge computing and cloud platforms
Efficient middleware simplifies neural network programming, testing, and deployment to
this diverse hardware ecosystem
Innovative approaches for requirements engineering, combined with safety and security
principles
Concepts validated through use cases in vital industry sectors: automotive, automation,
and smart home
Summary