Award Abstract # 2107020
Collaborative Research: OAC Core: Advancing Low-Power Computer Vision at the Edge

NSF Org: OAC
Office of Advanced Cyberinfrastructure (OAC)
Recipient: LOYOLA UNIVERSITY OF CHICAGO
Initial Amendment Date: July 1, 2021
Latest Amendment Date: April 18, 2022
Award Number: 2107020
Award Instrument: Standard Grant
Program Manager: Juan Li
jjli@nsf.gov
 (703)292-2625
OAC
 Office of Advanced Cyberinfrastructure (OAC)
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: July 1, 2021
End Date: June 30, 2025 (Estimated)
Total Intended Award Amount: $250,000.00
Total Awarded Amount to Date: $258,000.00
Funds Obligated to Date: FY 2021 = $250,000.00
FY 2022 = $8,000.00
History of Investigator:
  • George Thiruvathukal (Principal Investigator)
    gkt@cs.luc.edu
  • Neil Klingensmith (Co-Principal Investigator)
Recipient Sponsored Research Office: Loyola University of Chicago
820 N MICHIGAN AVE
CHICAGO
IL  US  60611-2147
(773)508-2471
Sponsor Congressional District: 05
Primary Place of Performance: Loyola University of Chicago
1032 W Sheridan Rd
Chicago
IL  US  60660-1537
Primary Place of Performance
Congressional District:
09
Unique Entity Identifier (UEI): CVNBL4GDUKF3
Parent UEI:
NSF Program(s): OAC-Advanced Cyberinfrast Core
Primary Program Source: 01002223DB NSF RESEARCH & RELATED ACTIVIT
01002122DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 9251, 075Z, 7923
Program Element Code(s): 090Y00
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

This proposal enables low-power edge computers, such as mobile phones, drones, and Internet-of-Things devices, to benefit society. Computer vision is the technology to automatically analyze images and videos. Computer vision on these devices can keep humans safe, for example by spotting dangers in a factory or at a construction site. This project addresses two challenges that hamper practical adoption of computer vision on edge devices. The first challenge is that current computer vision approaches require powerful computers, but these computers are too far away and have long response time. This project brings the computers to the places where data is acquired. The project makes computer vision more efficient, so that visual data can be analyzed by small edge devices like phones and drones. The second challenge is that building complex software for computer vision is difficult. This project provides software engineering support for emerging computer vision technologies. As a result of addressing these two challenges, computer vision on the edge can become feasible.

Bringing computer vision (CV) to devices on the network edge is an essential component of realizing NSF's goal of distributed cyberinfrastructure. This project makes CV on the edge feasible and enables scientific and engineering innovation through improved response time, reduced need for network coverage, and decreased storage costs. This project solves two critical challenges that hinder the transition of edge-based CV into practice. (1) This project makes CV more efficient and edge-friendly. Current CV techniques (e.g., deep neural networks) assume server-class resources (such as graphics processing units, gigabytes of memory); these resources are not available at the edge. This project reduces the resource requirements needed for CV. The methods consider alternative neural network architectures and eliminate redundancies while processing visual data. This project also develops CV-specific distribution techniques to enable edge devices to collaborate on large vision tasks. (2) This project provides software engineering support for CV technologies. Solving real-world CV problems requires engineering new CV applications, often by re-implementing research model architectures as components in new designs. This project develops a library of exemplary CV model implementations for low-power platforms. These exemplars can be used as high-quality components in new CV applications. The project identifies factors that promote and inhibit the reproducibility of CV models. This project also identifies engineering best practices by surveying and interviewing experts in low-power CV and by studying their errors.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 14)
Ahlgren, Isaac and West, Jack and Lee, Kyuin and Thiruvathukal, George and Klingensmith, Neil "A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things" DESTION 2024 , 2024 https://doi.org/10.1109/DESTION62938.2024.00008 Citation Details
Lee, Kyuin and Yang, Yucheng and Prabhune, Omkar and Chithra, Aishwarya Lekshmi and West, Jack and Fawaz, Kassem and Klingensmith, Neil and Banerjee, Suman and Kim, Younghyun "AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication" Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies , v.6 , 2022 https://doi.org/10.1145/3517254 Citation Details
Jiang, Wenxin and Synovic, Nicholas and Sethi, Rohan and Indarapu, Aryan and Hyatt, Matt and Schorlemmer, Taylor R. and Thiruvathukal, George K. and Davis, James C. "An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain" Proceedings of the 1st ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED , 2022 https://doi.org/10.1145/3560835.3564547 Citation Details
Jiang, Wenxin and Synovic, Nicholas and Jajal, Purvish and Schorlemmer, Taylor R and Tewari, Arav and Pareek, Bhavesh and Thiruvathukal, George K and Davis, James C "PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages" , 2023 https://doi.org/10.1109/MSR59073.2023.00021 Citation Details
Jiang, Wenxin and Synovic, Nicholas and Hyatt, Matt and Schorlemmer, Taylor R and Sethi, Rohan and Lu, Yung-Hsiang and Thiruvathukal, George K and Davis, James C "An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry" , 2023 https://doi.org/10.1109/ICSE48619.2023.00206 Citation Details
Jiang, W and Yasmin, J and Jones, J and Synovic, N and Kuo, J and Bielanski, N and Tian, Y and Thiruvathukal, G K and Davis, J C "PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software" 2024 IEEE/ACM 21st International Conference on Mining Software Repositories (MSR) , 2024 Citation Details
Hu, Xiao and Jiao, Ziteng and Kocher, Ayden and Wu, Zhenyu and Liu, Junjie and Davis, James C and Thiruvathukal, George K and Lu, Yung-Hsiang "Evolution of Winning Solutions in the 2021 Low-Power Computer Vision Challenge" Computer , v.56 , 2023 https://doi.org/10.1109/MC.2023.3250246 Citation Details
Goel, Abhinav and Tung, Caleb and Hu, Xiao and Thiruvathukal, George K. and Davis, James C. and Lu, Yung-Hsiang "Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks" 2022 27th Asia and South Pacific Design Automation Conference (ASP-DAC) , 2022 https://doi.org/10.1109/ASP-DAC52403.2022.9712574 Citation Details
Davis, James C and Jajal, Purvish and Jiang, Wenxin and Schorlemmer, Taylor R and Synovic, Nicholas and Thiruvathukal, George K "Reusing Deep Learning Models: Challenges and Directions in Software Engineering" , 2023 https://doi.org/10.1109/JVA60410.2023.00015 Citation Details
Yucheng Yang, Jack West "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps" Proceedings on Privacy Enhancing Technologies , 2022 Citation Details
Veselsky, Jakob and West, Jack and Ahlgren, Isaac and Thiruvathukal, George K. and Klingensmith, Neil and Goel, Abhinav and Jiang, Wenxin and Davis, James C. and Lee, Kyuin and Kim, Younghyun "Establishing Trust in Vehicle-to-Vehicle Coordination: A Sensor Fusion Approach" 2022 2nd Workshop on Data-Driven and Intelligent Cyber-Physical Systems for Smart Cities Workshop (DI-CPS) , 2022 https://doi.org/10.1109/DI-CPS56137.2022.00008 Citation Details
(Showing: 1 - 10 of 14)

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page