RISC-V Based TinyML Accelerator for Depthwise Separable Convolutions in Edge AI

arXiv — cs.LGThursday, November 27, 2025 at 5:00:00 AM
  • A novel hardware accelerator architecture has been introduced that utilizes a fused pixel-wise dataflow for Depthwise Separable Convolutions (DSC) in Edge AI applications. This architecture, implemented as a Custom Function Unit (CFU) for a RISC-V processor, significantly reduces data movement by up to 87% compared to traditional layer-by-layer execution methods.
  • The development is crucial as it addresses the performance bottleneck associated with transferring intermediate feature maps in lightweight architectures like MobileNetV2, thereby enhancing the efficiency of on-device intelligence in TinyML applications.
  • This advancement aligns with ongoing efforts in the AI community to optimize model performance through innovative techniques such as model compression and pruning, highlighting a growing trend towards more efficient computational methods in machine learning.
— via World Pulse Now AI Editorial System

Was this article worth reading? Share it

Recommended apps based on your readingExplore all apps
Continue Readings
Animal Re-Identification on Microcontrollers
PositiveArtificial Intelligence
A new framework for camera-based animal re-identification (Animal Re-ID) has been proposed, enabling wildlife monitoring and precision livestock management on microcontrollers (MCUs) in environments with limited connectivity. This framework addresses the challenges of running complex models on low-power devices by designing a high-accuracy architecture based on a scaled MobileNetV2 backbone for low-resolution inputs.
Edge AI is advancing rapidly. So are the ways in which it’s being secured.
NeutralArtificial Intelligence
Edge AI is rapidly advancing as intelligence transitions from centralized data centers to decentralized devices, offering benefits such as increased speed, autonomy, and enhanced privacy. However, this shift also introduces a complex array of security challenges that must be addressed to ensure safe deployment.