Tiny Machine Learning for Resource-Constrained Microcontrollers
Immonen, R., & Hämäläinen, T. (2022). Tiny Machine Learning for Resource-Constrained Microcontrollers. Journal of Sensors, 2022, Article 7437023. https://doi.org/10.1155/2022/7437023
Published in
Journal of SensorsDate
2022Discipline
Secure Communications Engineering and Signal ProcessingTekniikkaTietotekniikkaSecure Communications Engineering and Signal ProcessingEngineeringMathematical Information TechnologyCopyright
© 2022 Riku Immonen and Timo Hämäläinen.
We use 250 billion microcontrollers daily in electronic devices that are capable of running machine learning models inside them. Unfortunately, most of these microcontrollers are highly constrained in terms of computational resources, such as memory usage or clock speed. These are exactly the same resources that play a key role in teaching and running a machine learning model with a basic computer. However, in a microcontroller environment, constrained resources make a critical difference. Therefore, a new paradigm known as tiny machine learning had to be created to meet the constrained requirements of the embedded devices. In this review, we discuss the resource optimization challenges of tiny machine learning and different methods, such as quantization, pruning, and clustering, that can be used to overcome these resource difficulties. Furthermore, we summarize the present state of tiny machine learning frameworks, libraries, development environments, and tools. The benchmarking of tiny machine learning devices is another thing to be concerned about; these same constraints of the microcontrollers and diversity of hardware and software turn to benchmark challenges that must be resolved before it is possible to measure performance differences reliably between embedded devices. We also discuss emerging techniques and approaches to boost and expand the tiny machine learning process and improve data privacy and security. In the end, we form a conclusion about tiny machine learning and its future development.
...


Publisher
Hindawi LimitedISSN Search the Publication Forum
1687-725XPublication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/159524299
Metadata
Show full item recordCollections
Related funder(s)
Council of Tampere RegionFunding program(s)
ERDF European Regional Development Fund, React-EUAdditional information about funding
This work has been done under the eÄlytelli and coADDVA funded by the European Regional Development Fund and the Regional Council of Central Finland.License
Related items
Showing items with similar title or keywords.
-
Towards Seamless IoT Device-Edge-Cloud Continuum : Software Architecture Options of IoT Devices Revisited
Taivalsaari, Antero; Mikkonen, Tommi; Pautasso, Cesare (Springer, 2022)In this paper we revisit a taxonomy of client-side IoT software architectures that we presented a few years ago. We note that the emergence of inexpensive AI/ML hardware and new communication technologies are broadening ... -
Reunalaskennan hyödyntäminen liukkaiden olosuhteiden havaitsemisessa
Leikari, Aaro (2022)IoT on mullistanut maailman jossa nykyään elämme ja se tuo valtavasti uusia mahdollisuuksia ja tapoja kanssakäydä ympäristömme kanssa. Ympäristöstä kerättävä datan määrä on kasvanut valtavasti, sillä sensoreita voidaan ... -
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
Costin, Andrei; Zarras, Apostolis; Francillon, Aurélien (Springer, 2017)Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full ... -
IoT/Embedded vs. Security : Learn from the Past, Apply to the Present, Prepare for the Future
Costin, Andrei (FRUCT Oy, 2018)It is expected there will be 50 billion IoT/embedded connected devices by 2020. At the same time, multiple recent studies revealed that IoT/embedded devices and their software/firmware is plagued with weaknesses and ... -
Sulautettujen tietoturvakomponenttien käyttö pilviympäristössä
Kuokkanen, Ville (2021)Sulautetut järjestelmät ovat usein hyvin vähäresurssisia, jonka takia tavallisesti käytettyjä salausmenetelmiä ei ole mielekästä käyttää. Erilliset tietoturvakomponentit mahdollistavat salauksen käytön myös prosessointiteholtaan ...