Cross-layer CNN approximations for hardware implementation

Karim M. A. Ali*, Ihsen Alouani, Abdessamad Ait El Cadi, Hamza Ouarnoughi, Smail Niar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
79 Downloads (Pure)

Abstract

Convolution Neural Networks (CNNs) are widely used for image classification and object detection applications. The deployment of these architectures in embedded applications is a great challenge. This challenge arises from CNNs’ high computation complexity that is required to be implemented on platforms with limited hardware resources like FPGA. Since these applications are inherently error-resilient, approximate computing (AC) offers an interesting trade-off between resource utilization and accuracy. In this paper, we study the impact on CNN performances when several approximation techniques are applied simultaneously. We focus on two of the widely used approximation techniques, namely quantization and pruning. Our experimental results showed that for CNN networks of different parameter sizes and 3% loss in accuracy, we can obtain up to 27.9%–47.2% reduction in computation complexity in terms of FLOPs for CIFAR-10 and MNIST datasets.
Original languageEnglish
Title of host publicationApplied Reconfigurable Computing. Architectures, Tools, and Applications 16th International Symposium, ARC 2020: proceedings
Editors Fernando Rincón, Jesús Barba, Hayden K. H. So, Pedro Diniz, Julián Caba
PublisherSpringer
ISBN (Print)9783030445331, 9783030445348
DOIs
Publication statusPublished - 25 Mar 2020
Event16th International Symposium, ARC 2020 - Toledo, Spain
Duration: 01 Apr 202004 Apr 2020

Publication series

NameLecture Notes in Computer Science
Volume12083
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International Symposium, ARC 2020
Country/TerritorySpain
CityToledo
Period01/04/202004/04/2020

Fingerprint

Dive into the research topics of 'Cross-layer CNN approximations for hardware implementation'. Together they form a unique fingerprint.

Cite this