As the need for efficient 3D data processing increases, particularly in autonomous driving applications, fast and resource-efficient methods for structuring and representing LiDAR data, such as range images (RIs), have become crucial. This letter presents a hardware-accelerated algorithm for generating RIs from 3D LiDAR point clouds, tailored for embedded platforms featuring Field-Programmable Gate Arrays (FPGA...
The increasing concerns regarding data privacy have triggered a paradigm shift in machine learning (ML) systems, moving the inference and part of the training process from the cloud, which continues to perform model updates, to the deep edge. This new approach, known as Federated Learning (FL), reduces the workloads on the remote servers and network infrastructure, while enhancing overall data privacy. Recent r...
The automotive industry is fully shifting towards autonomous connected vehicles. By advancing vehicles’ intelligence and connectivity, the industry has enabled innovative functions such as advanced driver assistance systems (ADAS) in the direction of driverless cars. Such functions are often referred to as cyber-physical features, since almost all of them require collecting data from the physical environment to...
Significant advances in Artificial Intelligence (AI) over the past decade have opened new aisles of exploration for industries such as automotive and industrial robotics, leading to the widespread adoption of AI. To meet the demands of modern applications, embedded platforms have evolved into highly heterogeneous designs, transitioning from simple microcontroller-based systems to intricate platforms with multip...
Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern com puting systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. One promising line of research has proposed leveraging FPGA technology to provide promising TEE solutions. Despite their potential, current implement...
Building accurate Machine Learning (ML) models requires substantial expertise and large-scale datasets typically only available in big data companies. These companies have been selling their models as Machine Learning as a Service. However, concerns about data privacy and the appliance of ML in mission-critical scenarios are forcing ML computation to move from the cloud to the deep edge, near sensor data. If ed...
Light detection and ranging (LiDAR) sensors play a critical role in enabling precise and reliable environmental perception for autonomous vehicles. However, handling the large amounts of data they generate presents a significant challenge. With the emergence of standards, such as the geometry based point cloud compression (G-PCC) standard, octrees have been used as a key data structure for compressing 3-D light...
Understanding and identifying the nature of learner confusion is important for online learning platforms. In this study, we address this problem by analyzing forum posts from large-scale online courses. However, due to the large volume of comments and frequent interactions, confusion posts are often overlooked. Existing methods and models, while capable of detecting confusion, typically rely on linguistic featu...
The number of Internet of Things (IoT) embedded devices is estimated to reach 30 billion by 2030, leading to a highly dynamic landscape where distinct devices have to coexist. The rapid proliferation of different architectures and platforms requires a unified solution that can be supported by different devices, while providing a wide range of services to cope with the ongoing challenges of connecting devices to...
Due to its very desirable properties, Chebyshev polynomials are often used in the design of public key cryptographic systems. This paper discretizes the Chebyshev mapping, generalizes the properties of Chebyshev polynomials, and proposes an improved public key encryption algorithm based on Chebyshev chaotic mapping and RSA, i.e., CRPKC −Ki. This algorithm introduces alternative multiplication coefficients Ki, t...