skip to main content
10.1145/3417313.3429379acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Towards Objection Detection Under IoT Resource Constraints: Combining Partitioning, Slicing and Compression

Published:16 November 2020Publication History

ABSTRACT

We consider deploying an object detection pipeline over a heterogeneous IoT network. We consider a setting where a camera-equipped IoT edge node communicates wirelessly with a cloud server. In many real-world domains, the bandwidth of this connection is constrained and variable, while the edge node may have insufficient compute resources to perform complex machine learning tasks such as object detection. Building on prior work in the image classification space, we propose an approach for detection that first partitions a deep neural network model at a given layer and then applies progressive transmission of intermediate convolutional filter maps. This capability can be exercised in response to dynamically varying network bandwidth. Further, we consider the application of lossy compression to the filter maps themselves, exposing a broader set of communication compression trade-offs that includes a choice for the representation size transmitted as well as the lossy compression level applied. The model is trained specifically to optimize distributed operation including the need for the cloud stage to decode and process a variable size representation. We investigate the performance of this approach in terms of a detection accuracy-communication cost trade-off. We compare to approaches that compress images and perform detection using cloud offload. Our results show that our approach achieves a significantly better detection accuracy-communication cost trade-off compared to cloud offload of JPEG compressed images.

References

  1. C. Bucilua, R. Caruana, and A. Niculescu-Mizil. Model compression. In SIGKDD, pages 535--541. ACM, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Bulić, G. Kojek, and A. Biasizzo. Data transmission efficiency in bluetooth low energy versions. Sensors, 19(17): 3746, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  3. M. Chen, A. Zheng, and K. Weinberger. Fast image tagging. In ICML, pages 1274--1282, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B.-G. Chun and P. Maniatis. Augmented smartphone applications through clone cloud execution. In Proceedings of the 12th conference on Hot topics in operating systems, HotOS'09, pages 8--8, Berkeley, CA, USA, 2009. USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova. Bert: Pre-training of deep bidirectional transformers for language understanding. In NAACL-HLT, 2019.Google ScholarGoogle Scholar
  6. D. Erhan, C. Szegedy, A. Toshev, and D. Anguelov. Scalable object detection using deep neural networks. In CVPR, pages 2147--2154, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, and A. Zisserman. The pascal visual object classes (voc) challenge. IJCV, 88(2): 303--338, June 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. X. Gao, Y. Zhao, L. Dudziak, R. Mullins, and X. Cheng-Zhong. Dynamic channel pruning: Feature boosting and suppression. In ICLR, 2019.Google ScholarGoogle Scholar
  9. R. Girshick. Fast r-cnn. In ICCV, pages 1440--1448, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In CVPR, pages 580--587, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Graves, N. Jaitly, and A.-r. Mohamed. Hybrid speech recognition with deep bidirectional lstm. In Automatic Speech Recognition and Understanding (ASRU), 2013 IEEE Workshop on, pages 273--278. IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  12. A. Graves, A.-r. Mohamed, and G. Hinton. Speech recognition with deep recurrent neural networks. In Acoustics, speech and signal processing (icassp), 2013 ieee international conference on, pages 6645--6649. IEEE, 2013.Google ScholarGoogle Scholar
  13. K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In CVPR, pages 770--778, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  14. Y. He, J. Lin, Z. Liu, H. Wang, L.-J. Li, and S. Han. Amc: Automl for model compression and acceleration on mobile devices. In ECCV, pages 784--800, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Huang, C. Samplawski, D. Ganesan, B. Marlin, and H. Kwon. Clio: Enabling automatic compilation of deep learning pipelines across iot and cloud. In MobiCom, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y. Kang, J. Hauswald, C. Gao, A. Rovinski, T. Mudge, J. Mars, and L. Tang. Neurosurgeon: Collaborative intelligence between the cloud and mobile edge. In ACM SIGARCH, pages 615--629. ACM, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Infocom, 2012 Proceedings IEEE, pages 945--953. IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  18. A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In NIPS, pages 1097--1105, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Lin, Y. Rao, J. Lu, and J. Zhou. Runtime Neural Pruning. In NIPS, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Liu, Y. Lin, Z. Zhou, K. Nan, H. Liu, and J. Du. On-demand deep model compression for mobile devices: A usage-driven model selection framework. In Conference on Mobile Systems, Applications, and Services, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C.-Y. Fu, and A. C. Berg. Ssd: Single shot multibox detector. In ECCV, pages 21--37, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. Redmon, S. Divvala, R. Girshick, and A. Farhadi. You only look once: Unified, real-time object detection. In CVPR, pages 779--788, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  23. M. Sandler, A. Howard, M. Zhu, A. Zhmoginov, and L.-C. Chen. Mobilenetv2: Inverted residuals and linear bottlenecks. In CVPR, pages 4510--4520, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  24. M. Satyanarayanan. A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets. GetMobile: Mobile Computing and Communications, 18(4): 19--23, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. Dropout: a simple way to prevent neural networks from overfitting. JMLR, pages 1929--1958, 2014.Google ScholarGoogle Scholar
  26. C. Szegedy, A. Toshev, and D. Erhan. Deep neural networks for object detection. In NIPS, pages 2553--2561, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. https://greenwaves-technologies.com/gap8-product/. GAP8: Ultra-low power, always-on processor for embedded artificial intelligence.Google ScholarGoogle Scholar
  28. P. Viola, M.Jones, et al. Robust real-time object detection. IJCV, 4(34--47): 4, 2001.Google ScholarGoogle Scholar

Index Terms

  1. Towards Objection Detection Under IoT Resource Constraints: Combining Partitioning, Slicing and Compression

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            AIChallengeIoT '20: Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things
            November 2020
            74 pages
            ISBN:9781450381345
            DOI:10.1145/3417313

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 November 2020

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader