Deep Learning Technologies

Computer scientists have developed tiny computers in attempt to make smarter, smaller sensors for medical devices and the Internet of Things, sensors that can do more with less energy.

They used deep learning technologies for enhancing face and voice recognition capabilities. Many of the microphones, cameras, and other sensors that make up the eyes and ears of smart devices are always on alert, and frequently beam personal data into the cloud because they can’t analyse it themselves.

David Blaauw and his colleague Dennis Sylvester, both IEEE Fellows and computer scientists at the University of Michigan have developed the “micromote” computers. By developing tiny, energy-efficient computing sensors that can do analysis on board, they hope to make these devices more secure, while also saving energy.

The micromote designs use only a few Nano watts of power to perform tasks such as distinguishing the sound of a passing car and measuring temperature and light levels. They showed off at a conference a compact radio that can send data from the small computers to receivers 20 meters away.

They also described their work with TSMC (Taiwan Semiconductor Manufacturing Company) on embedding flash memory into the devices, and a project to bring on board dedicated, low-power hardware for running artificial intelligence algorithms called deep neural networks.

According to the IEEE website, the group worked with TSMC to bring flash memory on board because to record video and sound, the tiny computers need more memory. Now they can make tiny computers with 1 megabyte of storage.

Another micromote they presented at the conference incorporates a deep-learning processor that can operate a neural network while using just 288 microwatts.

Neural networks are Artificial Intelligence algorithms that perform well at tasks such as face and voice recognition. They typically demand both large memory banks and intense processing power. The Michigan group brought down the power requirements by redesigning the chip architecture.

The idea is to bring neural networks to the Internet of Things. “A lot of motion detection cameras take pictures of branches moving in the wind, that’s not very helpful,” says Blaauw.

Security cameras and other connected devices are not smart enough to tell the difference between a burglar and a tree, so they waste energy sending uninteresting footage to the cloud for analysis. Onboard deep-learning processors could make better decisions, but only if they don’t use too much power.

The Michigan group imagine that deep-learning processors could be integrated into many other Internet-connected things besides security systems. For example, an HVAC system could decide to turn the air-conditioning down if it sees multiple people putting on their coats.

The Michigan group hopes they will be ready for market in a few years. Blaauw and Sylvester say their startup company, CubeWorks, is currently prototyping devices and researching markets.

The company was quietly incorporated in late 2013. Last October, Intel Capital announced they had invested an undisclosed amount in the tiny computer company.

I-HLS

A Nano Generator To Power New Smart Cities:

Spying With Nano Robots Disguised As Insects:

Montreal’s Future In Smart Sensors And AI:

 

« Dubai Tests Autonomous Aerial Vehicle
Directors Report March 2017. Cloud Computing For Management (£) »

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Digital Forensics Inc (DFI)

Digital Forensics Inc (DFI)

Digital Forensics Inc. is a nationally recognized High Technology Forensic Investigations and Information System Security firm

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

BSIMM

BSIMM

The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives.

ICSA Labs

ICSA Labs

ICSA Labs provides third-party testing and certification of IT security software and products, as well as network-connected devices.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.