memory constraints
Recently Published Documents


TOTAL DOCUMENTS

136
(FIVE YEARS 36)

H-INDEX

20
(FIVE YEARS 1)

2022 ◽  
Vol 12 (2) ◽  
pp. 591
Author(s):  
Ahmed Yahia Kallel ◽  
Zheng Hu ◽  
Olfa Kanoun

For embedded impedance spectroscopy, a suitable method for analyzing AC signals needs to be carefully chosen to overcome limited processing capability and memory availability. This paper compares various methods, including the fast Fourier transform (FFT), the FFT with barycenter correction, the FFT with windowing, the Goertzel filter, the discrete-time Fourier transform (DTFT), and sine fitting using linear or nonlinear least squares, and cross-correlation, for analyzing AC signals in terms of speed, memory requirements, amplitude measurement accuracy, and phase measurement accuracy. These methods are implemented in reference systems with and without hardware acceleration for validation. The investigation results show that the Goertzel algorithm has the best overall performance when hardware acceleration is excluded or in the case of memory constraints. In implementations with hardware acceleration, the FFT with barycentre correction stands out. The linear sine fitting method provides the most accurate amplitude and phase determinations at the expense of speed and memory requirements.


Author(s):  
João Fellipe Uller ◽  
João Vicente Souto ◽  
Pedro Henrique Penna ◽  
Márcio Castro ◽  
Henrique Freitas ◽  
...  

2021 ◽  
Vol 10 (3) ◽  
pp. 59
Author(s):  
Sangeeth Kumar ◽  
Subhasri Duttagupta ◽  
Venkat P. Rangan

A wide-scale outdoor remote deployment involves a large number of low-cost nodes that are powered by green energy, such as solar. We deal with such a system for landslide monitoring where the tiny nodes with ultra-low memory as little as 2 KB are directly connected to the Internet using cellular networks, thereby constituting Cellular IoT’s (C-IoT). This makes them vulnerable to a wide range of Denial of Service (DoS) attacks during their collaborative communications. Further, due to memory constraints, the nodes are not able to run resource-hungry security algorithms. Existing IoT protocols also cannot offer resiliency to DoS attacks for these memory-constrained devices. This paper proposes the Voice Response Internet of Things (VRITHI), which addresses the above issues by using the voice channel between the nodes. To the best of our knowledge, this is the first solution in the IoT domain where both the voice and data channels are being used for collaborative communications. Evaluation results demonstrate that VRITHI is able to reduce external DoS attacks from 82–65% to less than 28% and improves real-time communications in such a memory-constrained environment. In addition, it also contributes to green IoT energy saving by more than 50% in comparison with other IoT protocols.


Author(s):  
Khumbelo Difference Muthavhine ◽  
Mbuyu Sumbwanyambe

2021 ◽  
Author(s):  
Artur Jordão Lima Correia ◽  
William Robson Schwartz

Modern visual pattern recognition models are based on deep convolutional networks. Such models are computationally expensive, hindering applicability on resource-constrained devices. To handle this problem, we propose three strategies. The first removes unimportant structures (neurons or layers) of convolutional networks, reducing their computational cost. The second inserts structures to design architectures automatically, enabling us to build high-performance networks. The third combines multiple layers of convolutional networks, enhancing data representation at negligible additional cost. These strategies are based on Partial Least Squares (PLS) which, despite promising results, is infeasible on large datasets due to memory constraints. To address this issue, we also propose a discriminative and low-complexity incremental PLS that learns a compact representation of the data using a single sample at a time, thus enabling applicability on large datasets.


2021 ◽  
Author(s):  
Shivani Bathla ◽  
Vinita Vasudevan

<div>The complexity of inference using the belief propagation algorithms increases exponentially with the maximum clique size. We describe an approximate inference approach when there are clique size limitations due to memory constraints using incremental construction of clique trees.<br></div>


2021 ◽  
Author(s):  
Shivani Bathla ◽  
Vinita Vasudevan

<div>The complexity of inference using the belief propagation algorithms increases exponentially with the maximum clique size. We describe an approximate inference approach when there are clique size limitations due to memory constraints using incremental construction of clique trees.<br></div>


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4507
Author(s):  
Zhujun Xu ◽  
Damien Vivet

Existing methods for video instance segmentation (VIS) mostly rely on two strategies: (1) building a sophisticated post-processing to associate frame level segmentation results and (2) modeling a video clip as a 3D spatial-temporal volume with a limit of resolution and length due to memory constraints. In this work, we propose a frame-to-frame method built upon transformers. We use a set of queries, called instance sequence queries (ISQs), to drive the transformer decoder and produce results at each frame. Each query represents one instance in a video clip. By extending the bipartite matching loss to two frames, our training procedure enables the decoder to adjust the ISQs during inference. The consistency of instances is preserved by the corresponding order between query slots and network outputs. As a result, there is no need for complex data association. On TITAN Xp GPU, our method achieves a competitive 34.4% mAP at 33.5 FPS with ResNet-50 and 35.5% mAP at 26.6 FPS with ResNet-101 on the Youtube-VIS dataset.


2021 ◽  
Author(s):  
Christine Soh ◽  
Charles Yang

A simple memory component is amended to local (“Pursuit”; Stevens, Gleitman, Trueswell, and Yang (2017)) and globa l(e.g., Yu and Smith (2007); Fazly, Alishahi, and Stevenson (2010)) models of cross-situational word learning. Only a finite (and small) number of words can be concurrently learned; successfully learned words are removed from the memory buffer and stored in the lexicon. The memory buffer improves the empirical coverage for both local and global learn-ing models. However, the complex task of homophone learning (Yurovsky &amp; Yu, 2008) proves a more decisive advantage for the local model (dubbed Memory Bound Pursuit; MBP). Implications and limitations of these results are discussed.


Sign in / Sign up

Export Citation Format

Share Document