Submitted:
18 June 2025
Posted:
19 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Computational Characterization of Speech Algorithm for Intelligent Terminal
2.1. Speech Algorithm Stage Division and Arithmetic Power Distribution
2.2. Energy Consumption Assessment Methods and Tools
3. Optimization Technique Model of Speech Algorithm for Low Power Consumption
3.1. Lightweight Neural Network Architecture
3.2. Edge Computing Optimization Strategies
3.3. Model Trusted Execution Environment
4. Energy Consumption Optimization Algorithm for Smart Terminal Deployment and Evaluation
4.1. Experimental Platform and Dataset
4.2. Comparative Analysis of Energy Consumption
4.3. Algorithm Engineering Implementation
5. Building a Secure Deployment System for Green AI
5.1. Secure and Trusted Deployment Mechanisms for Edge Speech Models
5.2. Energy Synergy Trade-Offs in Security Deployment
5.3. Promote Synergistic Development of Localized Green AI Chips and Algorithms
6. Conclusion
References
- Fan X, Zhao Y, Dong J, et al. APP sensitive behavior surveillance method for smart terminals based on time series classification[J]. Journal of Computational Methods in Sciences and Engineering, 2025, 25(2): 1854-1865.
- Zeng L, Zhang C, Qin P, et al. One Method for Predicting Satellite Communication Terminal Service Demands Based on Artificial Intelligence Algorithms[J J]. Applied Sciences, 2024, 14(14): 6019.
- Tan L, Sun L, Cao B, et al. Research on weighted energy consumption and delay optimization algorithm based on dual-queue model[J]. IET Communications, 2024, 18(1): 81-95.
- Gong L, Huang Z, Xiang X, et al. Real-time AGV scheduling optimization method with deep reinforcement learning for energy-efficiency in the container terminal yard[J]. International Journal of Production Research, 2024, 62(21): 7722-7742.
- Sun T, Feng B, Huo J, et al. Artificial intelligence meets flexible sensors: emerging smart flexible sensing systems driven by machine learning and artificial synapses[J]. Nano-Micro Letters, 2024, 16(1): 14.
- Qu D. Intelligent Cockpit Application Based on Artificial Intelligence Voice Interaction System[J]. Computing and Informatics, 2024, 43(4): 1012-1028-1012-1028.
- Obeas Z K, Alhade B A, Hamed E A, et al. Optimization of the voice signal to estimate human gender using (BA) algorithm and decision stump classifier[C]// AIP Conference Proceedings. aip Publishing LLC, 2025, 3264(1): 040005.
- Wu L, Liu M, Li J, et al. An intelligent vehicle alarm user terminal system based on emotional identification technology[J]. Scientific Programming, 2022, 2022(1): 6315063.
- Hu M. Analysis of accuracy rate of distributed virtual reality face recognition based on personal intelligent terminal[J]. Mobile Information Systems, 2022, 2022(1): 1131452.
- Liu B, Ding X, Cai H, et al. Precision adaptive MFCC based on R2SDF-FFT and approximate computing for low-power speech keywords recognition[J]. IEEE Circuits and Systems Magazine, 2021, 21(4): 24-39.





| Stage name | Average power share (%) | Core computing type | Main sources of energy consumption |
| feature extraction | 21.3 | FFT+Mel filter | Frequency domain transformation + memory access |
| acoustical modeling | 57.6 | Convolutional/fully connected layers | MAC operation + tensor move |
| language modeling | 5.3 | RNN/Attention | Recursive structure + cache conflicts |
| decoding stage | 15.8 | Beam Search | Stack management + path selection overhead |
| stage | Core operator type | Static power (mW) | Dynamic power (mW) | Peak Power Consumption (mW) | Sampling period (ms) |
| feature extraction | FFT+Mel filter | 42.3 | 87.6 | 105.2 | 5 |
| acoustical modeling | Conv2D+Dense layer | 61.8 | 134.7 | 172.5 | 5 |
| decoding stage | Beam Search Stack Operation | 29.1 | 66.4 | 91.7 | 5 |
| model structure | Total number of parameters (M) | MACs (G MACs) | Channel redundancy (%) | Hierarchical compression factor |
| baseline model | 12.4 | 1.83 | 0 | 1× |
| Lightweight Optimization Model | 4.5 | 0.66 | 18.2 | 0.36× |
| Parameter name | physical meaning | Numerical range | clarification |
| Initialization power | 45~62 mW | Affected by the complexity of security protocols | |
| activation time | 1.2~2.5 s | Includes model loading and authentication phases | |
| Core energy efficiency factor | 0.63~0.88 | Correlates with architecture power consumption ratio | |
| Secure Bus Bandwidth | 512~2048 KBps | Encryption and decryption process channel bandwidth | |
| Energy consumption deviation determination threshold | ≤3.2% | Above this value is considered abnormal behavior | |
| Minimum threshold for credible computational quality | 0.85 | Below this value tasks are not scheduled |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).