Supervised learning is an area of the machine learning field directed to construction of a function that maps an input to an output based on example input-output pairs. The function of interest may be inferred from labeled training data consisting of a set of training examples. An artificial neural network (ANN) is a computing system architecture loosely modeled after biological neural networks (e.g., the human brain). The neural network itself is not an algorithm, but rather a framework through which certain machine-learning algorithms may cooperate to process complex data inputs. Much of the work on neural networks (NNs) concerns training a neural network with a training set to compute some function of interest.
A Spiking Neural Network (SNN) is a network of artificial neurons and synapses that computes using as values the times at which neurons fire their spikes. The model of a neuron determines that time. In operation, an SNN is a function that maps input spike times to output spike times. The training set is a subset of the function that has been encoded in spike times. In typical SNN implementations, the output spike times in the training set are chosen from estimates that consider the architecture proposed for the SNN. Error backpropagation algorithms are then used to adjust the weights of the synapses, which entails making repeated passes through the entire network until the errors with respect to the outputs of the training set become acceptably small. Common error backpropagation algorithms frequently employ a large number of sum and sigmoid calculations, which may result in low efficiency and/or high computing overhead when dealing with a large volume of data.
The accompanying drawings provide visual representations which will be used to more fully describe various representative embodiments and can be used by those skilled in the art to better understand the representative embodiments disclosed and their inherent advantages. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the devices, systems, and methods described herein. In these drawings, like reference numerals may identify corresponding elements.
Specific embodiments of the disclosure will now be described in detail with reference to the accompanying figures. While this disclosure is susceptible of being embodied in many different forms, there is shown in the drawings and will herein be described in detail specific embodiments, with the understanding that the present disclosure is to be considered as an example of the principles and not intended to be limited to the to the specific embodiments shown and described. In the description below, like reference numerals may be used to describe the same, similar or corresponding parts in the several views of the drawings.
Generally, the systems and methods disclosed herein may be characterized as a supervised learning solution, because the disclosed designs may utilize an input training set. As described above, traditional supervised learning approaches typically involve a) choosing an architecture of the neural network, b) providing the entire training set to the chosen architecture, and c) repeatedly adjusting parameters until errors become acceptably small. The disclosed method first partitions an input training set and then constructs neural networks for these smaller subfunctions (i.e. subsets of the training set). The component neural networks may then be combined into larger neural networks.
More specifically, the present disclosure relates to systems and associated methods of employing compositional construction of a neural network to yield a parametric network model architecture. The design systems and methods described herein advantageously exploit properties of the Spike-Response Model, taking as a guiding principle the property that defines the notion of a function, single-valued. NNs that compute larger functions are constructed from NNs that compute smaller functions, yielding parametric architectures. As such, the disclosed design supports transformations of an NN that preserve the function it computes: certain transformations may map to different output spike times, while others may preserve the output spike times. The present design method is scalable.
For example, and without limitation, embodiments of present disclosure may comprise a software-implemented process, stored on a computer-readable medium, such as a tangible computer-readable medium and executed by one or more computing devices, or processors. Referring to
The computerized instructions of the neural network design system 200 may be configured to implement a Modeling Subsystem 220 that may be stored in the data store 213 and accessed and/or retrieved by the processor 212 for execution. The Modeling Subsystem 220 may be operable to access or receive and/or partition a training set, and then construct neural networks for these smaller subfunctions (i.e. subsets of the training set) as described in more detail hereinafter.
Those skilled in the art will appreciate that the present disclosure contemplates the use of computer instructions and/or systems configurations that may perform any or all of the operations involved in neural network design. The disclosure of computer instructions that include Modeling Subsystem 220 instructions is not meant to be limiting in any way. Those skilled in the art will readily appreciate that stored computer instructions and/or systems configurations may be configured in any suitable manner. Those skilled in the art also will understand that the principles of the present disclosure may be implemented on or in data communication with any type of suitably arranged device or system configured to perform neural network construction operations, in any combination.
Neural network composition may exploit certain features of the Spike-Response Model class of supervised learning solutions. For example, and without limitation, an SNN is a function that maps input spike times to output spike times, as described above. The concept of a function or map is defined by the single-valued property. A function is a single-valued relation.
Referring now to
To implement a function ƒ: A→B as an SNN the elements of set A and set B must be encoded as spike times. Thus, an SNN S that implements fencodes the distinct v, v′∈B with different spike times. In certain embodiments of the present design, this encoding is determined during the construction of S.
Referring now to
As described generally above, spiking neural networks (SNN) consist of neurons that fire spikes, and of synapses that connect neurons and transmit spikes. More specifically, a neuron has a membrane potential that may be affected by the spikes it receives from neighboring neurons. A neuron is also characterized by a threshold, which may be tunable. A neuron fires a spike when its membrane potential crosses the threshold from below. Each synapse may also be characterized by a weight w and/or a delay d. Parameters of a neuron and its incoming synapses, the threshold of the neuron and the weights and delays of the synapses, may be chosen either to ensure that the neuron will spike or to prevent it from spiking.
As described generally above, the times at which neurons fire spikes are the values that SNNs use in computations. For example, a neuron may be defined as having a membrane potential x, which varies over time, and a threshold θ. When the membrane potential crosses the threshold from below, the neuron fires a spike.
As spikes are transmitted through synapses, these spikes affect the membrane potential of the postsynaptic neuron 115. For example, and without limitation, in the Spike-Response Model, a spike-response function E captures the basic effect that a spike fired by a presynaptic neuron 112 causes on the membrane potential of the postsynaptic neuron 115. This model defines the membrane potential of a neuron as follows:
Presynaptic neuron ni fires a spike at time ti, and its Ki synapses transmit it to neuron n, each according to its weight wik and delay dik.
The membrane potential x and the spike-response E functions have as domain the set of nonnegative real numbers ≥0, which is used to represent time, and as codomain the set of real numbers, used to represent the membrane potential of the neuron:
x: ≥0→
, ε:
≥0→
Simulations of real-time systems often discretize time and examine the model of the system at times determined by the length of a step A, the time step. Thus, the membrane potential also can be expressed as a function of discretized time, where the time at step n∈ is tn=nΔ, and delay dik=
.
The membrane potential of a neuron as a function of discretized time is defined as follows:
The Shift Law may contribute substantively to the compositional method of constructing SNNs described herein and may be stated as follows: Shifting all inputs by nI time steps, shifts the membrane potential by nI time steps, also. Mathematically, the Shift Law may be described as follows:
A condition in ensuring the properties necessary for composition of SNNs is that a neuron spike at most once. The SNNs described hereinbelow possess this and other properties that describe how spikes propagate through an SNN.
A unary basic spiking neural network (bSNN) consists of one input neuron, one output neuron, and one synapse between them. The synapse may be characterized by a weight w and a delay d. As described generally above, choice of the synaptic parameters w, d, and threshold θ may make it possible to ensure that an input spike i will trigger a spike in the output neuron at some time o. When the transmission of a spike through a synapse is not immediate, a delay d≥1. Given a spike-response function ε, a time step of length Δ, a synaptic delay d, and a synaptic weight w, the SNN just described is denoted by wε,Δ,d
; when ε and Δ are known, by
wd
; and when d=1, simply by
w
.
For a unary bSNN, only one presynaptic neuron is present for purposes of the membrane potential defined above. Some weight values might not produce a spike on the output neuron. For example, if the maximum value in the range of E is 1.0 and θ=1.0, any weight w<1.0 would prevent a spike in the output neuron. Thus, in this case w
is not a total function. For weights that allow spikes, such as w≥1.0 for the example above, bSNN
w
maps 0 to the time step at which the membrane potential of the output neuron crosses the threshold θ. This time step is denoted by s
w
and called the spike time of
w
. Thus, for a unary bSNN
w
that is total:
w
)=θ.
The spike time swd
of a unary bSNN
wd
is the time step at which the postsynaptic neuron fires when the presynaptic neuron fires at time step 0. For non-total bSNN
wd
, s
wd
↑.
ε(t)=t/δe1-t/δ, Δ=0.03, d=1, and approximation error 0.05.
From the definition of membrane potential, and the Shift Law, it follows that the time at which the output neuron of a unary bSNN fires a spike may be delayed in several ways (as illustrated in
For a unary bSNN w
the input value for a complete description of the graph of the bSNN is 0. For any other input, the output may be obtained by the Shift Law. For a pair of inputs (x, y), the Shift Law suggests that it be reduced to one of the two forms below:
c(x,y)=(0,y−x)[x] if x≤y
c(x,y)=(x−y,0)[y] if y≤x
If an SNN maps (0, y−x) to n, then it maps (x, y) to n+x, and if it maps (x−y, 0) to n, then it maps (x, y) to n+y. The pair in the canonical representation of (x, y) may be referred to as its base, and the natural number in square brackets, its shift.
A binary basic spiking neural network (bSNN) consists of two input neurons and one output neuron, with each input neuron connected by a respective, or associated, single synapse to the output neuron. Similar to the unary bSNN described above, choices of synaptic parameters cause input spikes to trigger an output spike. For example, a binary bSNN consists of two input neurons n1 and n2; one output neuron n; and a single synapse of weight wi connecting ni to n, for i=1, 2. A binary bSNN w1d
maps the pair of time steps at which the input neurons fire their spikes to the time step at which the output neuron fires its spike. The delays are omitted below, unless these delays are needed for some result. Thus, bSNN
w1, w2
has the following type:
w1,w2
:
×
→
.
To determine the behavior of w1, w2
(i.e., its graph), a simulation need only consider bases of the canonical representations of pairs of natural numbers. A pair (0, n) indicates that n1 fires its spike at (time step) 0, and n2 fires its spike later at (time step) n. This representation may be written as (0, n)∈[0]×
, where [0] is the singleton set containing 0. A pair (n, 0)∈
×[0], in turn, indicates that n2 fires its spike at 0, and n1 fires its spike at n. The graph of a binary bSNN
w1, w2
is represented canonically by two functions, which have the following types:
w1,w2
0′: [0]×
→
w1,w2
′0:
×[0]→
3.5, 4.5
. The earliest spiking time occurs when both n1 and n2 fire their spikes at 0. When one fires its spike at 0 and the other is delayed, the output spike time is generally later. If the delay is long enough it allows the earlier input spike to be the sole cause of the output spike. The synaptic connection of n1 has weight 3.5, and s
3.5
=23. If n2 fires its spike at 23 or later, the output neuron either will be firing its spike concurrently or will have fired it already, and the spike from n2 will have no effect on the output spike time. So, the output spike time remains constant when n2 fires its spike at s
3.5
or later. For the same reason, if n2 fires its spike at 0, and n1 at s(4.5)=17 or later, n will fire at 17, and n1 has no effect on the spike time of the output neuron.
Letting sw1, w2
denote the output spike time for inputs (0, 0), and [n, m], the interval of naturals between n and m, inclusive, the pattern of graph of total binary bSNNs is as follows:
Let Δ be sufficiently small not to miss spikes, and unary bSNNs w1
and
w2
be total. The graph of binary bSNN
w1, w2
has the following pattern:
Referring now to
(i1, . . . ,in)∈I, for some n≥1
(o1, . . . ,om)∈O, for some m≥1
A first element in this kind of training, a training set, is a finite subfunction of ƒ: ƒT. A finite function may be expressed as a set of pairs, each mapping an input to its corresponding output. The training set, it follows, is a finite function:
ƒT: IT→O
IT⊆I
ƒT(i1, . . . ,in)=f(i1, . . . ,in) for (i1, . . . ,in)∈IT
If |IT|=N, then ƒT may be written as a set of input-output pairs of size N as follows:
(i1(o1
(i1(o1
(i1(o1
As exemplified in
(i1(u1
(i1(u1
(i1(u1
From the discrepancies between the target outputs to be learned, the o's, and the actual outputs 105 of the neural network, the u's, some error measure is defined. A common error measure is
To reduce this error, adjustments may be made to parameters of the neural network being trained. For example, error backpropagation is commonly used to modify parameters of the neural network that determine the outputs that the network produces. In this error-correction method, certain input neurons receive some inputs 102 which may be modified by some parameters according to some activation function. The u's 105 that the neural network produces are a complex function that combines the activation functions of the constituents of the network. Backpropagation involves derivatives and activation functions are differentiable. The term backpropagation refers to the order in which this technique adjusts the parameters; beginning from the output neurons and propagating the adjustments through the entire network until they reach the input neurons.
An initial benchmark when evaluating learning algorithms is the Boolean XOR function, denoted herein with the symbol ⊕, such that
⊕: {T,F}→{T,F}
A neural network may represent the values T and F in some way. For example, to represent input Boolean values, T may be represented by 0 milliseconds (ms) and F by 6 ms; and to represent output Boolean values, T may be represented by 10 ms and F by 16 ms. One may apply the notation above: ƒ: I→O as follows:
I={0;6}
O={10;16}
To distinguish between the function eventually implemented in (i.e., learned by) the neural network versus the machine-independent function, different fonts may be applied herein, as follows:
The Boolean XOR function, with binary operator ⊕, is used herein to illustrate an approach for training and constructing SNNs by operating upon input and variable output, referred to herein as a construction training set. The spike times that encode Boolean values as inputs are chosen arbitrarily at the beginning of the process. The encoding of the Boolean values as outputs is determined by the construction of the SNN. The domain of XOR is of size four.
One way of designing an SNN that computes the XOR function is to compose four SNNs that compute constant functions: two that evaluate to T, and two that evaluate F, according to the definition of XOR (see
For example, and without limitation, let an input T be encoded by spike time 0, and input F, by spike time 20. 1.0, 5.5
implements function ⊕F1, and encodes output F by spike time 33; while
1.5, 3.5
implements ⊕F2, and encodes output F by spike time 36. Constant functions ⊕T1, and ⊕T2, in turn, are implemented by
2.0, 2.5
and
1.5, 3.5
and encode output T by 29 and 22, respectively.
Building larger neural nets from smaller ones will now be described in more detail. For example, and without limitation, presume a training set of input-output pairs of size N is defined as described above (repeated as follows):
(i1(o1
(i1(o1
(i1(o1
This training set is partitioned into two training sets, thereby leading to construction of two neural networks that implement these training sets: NN1 and NN2. NN1 may produce the correct result from the inputs in its training set, and similarly for NN2. However, if these two networks are together in some fashion, it may be possible for an input to progress through both smaller neural networks, resulting in one having a correct output and the other (potentially) not. Consequently, restricted forms of composition are needed that guarantee a correct output.
Continuing as described above, consider the following function:
ƒ: I→O,
and also some subfunction off that may serve as the abstract function from which the training set may be obtained:
ƒT: IT→O.
In same-constant composition, the given SNNs implement functions that evaluate to the same constant, which each SNN may be encoding differently. For example, and without limitation, consider the bSNNs that implement XOR functions ⊕T1 and ⊕T2. These functions evaluate to the same constant, T Let C1=2.0, 2.5
, and C2=
1.5, 3.5
. The conditions to construct the composition SNN C1∥C2 are as follows:
Component C1 evaluates input pair {(0, 20)}. The only outcome expected of C1 concerns this designated domain, {(0, 20)}. Whether outputs for other inputs are defined or what values they have is not critical. Similarly, for component C2, the designated domain is {(20, 0)}. The composition C1∥C2 has the set {(0, 20), (20, 0)} as its designated domain.
These sample components are considered total functions. Each one triggers an output spike for the designated input of the other, its interfering output, as well as for its own designated input, its designated output.
In the composition of two SNNs C1 and C2 that implement constant functions, each component may get inputs outside its designated domain, and produce interfering outputs which may be recognized and blocked by the neuron components of the modeling system 200 (as shown in
Referring now to
Under the assumption that Ci* spikes only for designated outputs, and the disjointness of the designated domains of C1* and C2*, only one these components may spike for a given designated input of the composition. This ensures that for all designated inputs the designated output is s.
Different-constants composition takes component SNNs that implement different constant functions, ƒc
For example, and without limitation, different-constants composition may be characterized as follows:
C2. Given an input from its designated domain, only one of its components will fire a spike. If C1 spikes at s1 then C1
C2 spikes at s1+s
w
, and if C2 spikes at s2 then C1
C2 spikes at s2+s
w
. If the components are single-valued, and their output spike times are different, this composition is single-valued.
Referring now to
⊕: {T,F}×{T,F}→{T,F}
From the beginning at Block 1001, the present method may partition (Block 1002) the set of inputs of I={T, F}×{T, F} of ⊕ such that I=I1∪ . . . ∪Ip. These sets in the partition, by definition, are mutually disjoint (e.g., this representation 1004 may be a one-to-one function r: I→I). The representation may obtain a partition of I corresponding to that of I, as follows:
I=I1∪ . . . ∪Ip
Each set Ik, for k>{1, . . . , p} may be used by the present method to obtain (at Block 1006) the restriction of ⊕ to Ik, written ⊕|Ik, and defined as follows:
⊕|Ik: Ik→O where O={T,F}
⊕|Ik(i)def=⊕(i) for i∈k
At Block 1008, for each k∈{1, . . . , p}, the present method may construct an SNN k to compute function ⊕|Ik.
k may take inputs in Ik. The set Ok of outputs produced may be determined during the construction of
k.
At Block 1010, the present method may construct an SNN from
1, . . . ,
p to compute the function of interest (e.g., the function ⊕), at which point the present method may end at Block 1099.
Taking certain of these process tasks in more detail in the context of the XOR benchmark, Block 1002 may comprise methods to partition |={T, F}×{T, F}, for example, and without limitation, as follows:
{T,F}×{T,F}={(T,T)}∪{(T,F)}∪{(F,T)}∪{(F,F)}
At Block 1004, the present method may choose a representation for |={T, F}×{T, F}. For example, and without limitation, the present method may choose to represent each Boolean value the same regardless of whether it occurs in the first or the second element of an input pair, as follows:
The partition of the representation of inputs is as follows:
{0,20}×{0,20}={(0,0)}∪{(0,20)}∪{(20,0)}∪{(20,20)}
At Block 1006, the present method may obtain the restrictions of ⊕ to the sets in the partition of |, as follows:
⊕|{(T,T)}=⊕1/F={(T,T)F}
⊕|{(T,F)}=⊕1/T={(T,F)T}
⊕|{(F,T)}=⊕2/T={(F,T)T}
⊕|{(F,F)}=⊕2/F={(F,F)F}
At Block 1008, the present method may construct SNNs for ⊕|{(T, T)}; ⊕|{(T, F)}; ⊕|{(F, T)}; ⊕|{(F, F)}.
A binary SNN (bSNN) has two input neurons, one output neuron, and one synaptic connection between each input neuron and the output neuron (see, for example,
x(t)=w1ε(t−i1−d1)+w2ε(t−i2−d2)
where w1 and d1 are the weight and delay parameters of the synapse connecting ni1 to the output neuron no. The basic spike response or effect caused by a spike received by a neuron is given by some function ε. Inputs i1 and i2 are the spike times of ni1 and ni2, respectively. Neuron no fires a spike at o when θ=x(o)=w1ε(o−i1−d1)+w2 ε(o−i2−d2).
As described above, in some neural network design approaches, the outputs are chosen first and then the arbitrarily chosen original parameters of the network are readjusted by backpropagation until the network produces an output sufficiently close to the one chosen in advance. In the disclosed method, the output neuron fires a spike (that is, merely that there be an o that satisfies the above equation). Parameters θ, w1, w2, d1, d2 and even the function ε may be chosen so as to obtain this equation. Different choices may lead to different values of o, which means that these choices may yield different SNNs that compute the same abstract function. Exemplary choices yielding such SNNs will now be discussed in detail.
An SNN to compute ⊕|{(T, T)}: Consider the simple abstract function ⊕|{(T, T)}. After having chosen 0 to represent an input T, and instantiating the parameters as follows,
yields an output spike time of o=35.
Since the output of the abstract function ⊕|{(T, T)} is F, the choice of parameters has determined that this SNN represents output F by 35. Without loss of generality, in constructing the other subfunctions below, the same instantiations of parameters, except the weights, are kept (the constant parameters are omitted in the diagrams below). For example, and without limitation, function ⊕|{(T, T)} is computed by the binary bSNN 1200 illustrated in 1.0, 1.5
maps (0, 0)→35 (that is, it represents output F by 35. At this stage implementation of ⊕|{(T, T)}, whose input is (0, 0), is of primary significance. Using the notation for restriction of function used above, this result may be written as follows:
An SNN to compute ⊕|{(T, F)}: This abstract function may be defined as ⊕|{(T, F)}: {(T, F)}→{T}. Some pair of weights that allows the output neuron to fire a spike may be found: pair w1=1.5, w2=1.5 does so (see, for example, SNN 1300 at 1.5, 1.5
maps (0, 20)→39 (that is, it represents T by 39). Expressed in notation for restriction, this result is as follows:
1.5,1.5
|{(0,20)}: {(0,20)}→{39} computes ⊕|{(T,F)}: {(T,F)}→{T}
An SNN to compute ⊕|{(F, T)}: This abstract function may be defined as ⊕|{(F, T)}: {(F, T)}→{T}. One possible SNN 1400 that may compute this function is shown at 2.0, 2.5
maps (20, 0)→27 (that is, it represents output T by 27), which may be expressed in the following notation for restriction:
An SNN to compute ⊕|{(F, F)}: This abstraction function may be defined as ⊕|{(F, F)}: {(F, F)}→{F}. One possible SNN 1500 that may compute this function is shown at 1.5, 3.5
maps (20, 20)→36 (that is, it represents output F by 36, which may be expressed in the following notation for restriction:
The abstract functions determined above comprise the following component SNNs:
{35}
{F}
{39}
{T}
{27}
{T}
{36}
{F}
As described above, one building block for neural network composition is a unary basic SNN (bSNN) 1600 (see wd
, when the input (spike) is (at) 0, for synaptic parameters weight w and delay d, and threshold θ is known. More generally and explicitly, the time between the input spike time i and the output spike time o, may be denoted s
wθd
such that o=i+s
wθd
.
Referring now to unary bSNN 1700 at wd
for the following choice of parameters: θ=1.0; d=1; Δ=0.03; and the spike response function S
1.01
=143 and s
3.01
=27. Table 1800 at
A filter fc|d|th
may be an instance of a unary bSNN. For example, and without limitation a filter may allow input c to trigger a spike on the output of the neuron. That is, for any other input the output neuron will not spike. Parameters of a filter may include a synaptic weight w=1.0, a delay d, and an output neuron having a threshold th. One way of defining a filter is using the following spike-response function:
Thus, at t=c+d:
x(c+d)=w*ε(c+d)=1.0*th=th
and the output neuron of the filter fires a spike.
Components may be employed with or without filters. Exemplary results of component bSNNs for XOR without filters is illustrated in table 1900 at
Returning to an SNN that is constructed to compute XOR (from the method 1000 of
Compose f39[C2] and f27[C3] to compute ⊕|{(T, F), (F, T)}:
Compose f35[C1] and f36[C4] to compute ⊕|{(T, T), (F, F)}:
Compose the two resulting SNNs: f39[C2]∥f27[C3] and f35[C1]∥f36[C4]
Subsequent (same-constant) construction of f39[C2]∥f27[C3], may be summarized as follows:
The structure of the composition of these two components, which implements ⊕|{(T, F), (F, T)} is as follows (see graphic 2300 at
The inputs this structure may accept are
A single value o may represent the output T
For inputs (0, 0) and (20, 20) it produces no output, since neither component produces an output.
Consider input (0, 20) (see component 2400 at
Since only the first component fires a spike, the output spike time o satisfies the equation
o=40+s[wd11]
Consider input (20, 0) (see component 2500 at
Since only the second component fires a spike, the output spike time o satisfies the equation
o=28+s[wd22]
Output o may satisfy the two constraints above.
40+s[w1d
40−28=12=s[w2d
Two possible instantiations: (see the spike times for unary bSNNs described above)
12=47−35=(46+1)−35=(s[2.01]+1)−s[2.51]=s[2.02]=s[2.51] 1.
This composition of f39[C2] and f27[C3] is denoted by2.51|f39[C2]∥f27[C3]|2.02
12=35−23=35−(20+3)=s[2.51]−(s[4.01]÷3)=s[2.51]−s[4.04] 2.
This other composition of f39[C2] and f27[C3] with different parameters is denoted by4.04Sf39[C2]∥f27[C3]S2.51
For the ongoing example scenario, assume the second composition is chosen.
Subsequent (same-constant) construction of f35[C1]∥f36[C4] may be summarized as follows:
The structure of the composition of these two components, which implements ⊕|{(T, T), (F, F)} is as shown in graphic 2600 at
For inputs (0, 20) and (20, 0) it produces no output, since neither component produces an output
Consider input (0, 0) (see component 2700 at
Consider input (20, 20) (see component 2800 at
Output o may satisfy the two constraints above.
36+s[w1d
37−36=1=s[w1d
One possible instantiation: (See the spike times for unary bSNNs as described above):
1=28−27=28−(24+3)=s[3.01]−(s[3.51]+3)=s[3.01]=s[3.51] 1.
Construction of an SNN to compute ⊕, the XOR function, may be summarized as follows (more specifically, (composition of 4.04|f39[C2]∥f27[C3]|2.51
and
3.01|f35[C1]∥f36[C4]|3.54
):
4.04|f39[C2]∥f27[C3]|2.51
Let CT=4.04|f39[C2]∥f27[C3]|2.51
SNN CT represents output T by 633.01|f35[C1]∥f36[C4]|3.54
Let CF=3.01|f35[C1]∥f36[C4]|3.54
SNN CF represents output F by 64
Each component may produce extraneous outputs when given inputs for which it was not designed
Different-constant composition of f63[CT] and f64[CF] may be summarized as follows (see also component 3000 at
It will be appreciated that the systems and methods described above are set forth by way of example and not of limitation. Absent an explicit indication to the contrary, the disclosed steps may be modified, supplemented, omitted, and/or re-ordered without departing from the scope of this disclosure. Numerous variations, additions, omissions, and other modifications will be apparent to one of ordinary skill in the art. In addition, the order or presentation of method steps in the description and drawings above is not intended to require this order of performing the recited steps unless a particular order is expressly required or otherwise clear from the context.
Embodiments disclosed herein may include computer program products comprising computer-executable code or computer-usable code that, when executing on one or more computing devices, performs any and/or all of the steps thereof. The code may be stored in a non-transitory fashion in a computer memory, which may be a memory from which the program executes (such as random-access memory associated with a processor), or a storage device such as a disk drive, flash memory or any other optical, electromagnetic, magnetic, infrared or other device or combination of devices. In another implementation, any of the systems and methods described above may be embodied in any suitable transmission or propagation medium carrying computer-executable code and/or any inputs or outputs from same.
This non-provisional patent application claims the benefit of U.S. Provisional Application No. 62/633,644 filed on Feb. 22, 2018 and titled “Compositional Construction of Spiking Neural Networks”, the entire content of which is incorporated herein by reference.
The invention described herein may be manufactured, used, and licensed by or for the Government of the United States for all governmental purposes without the payment of any royalty.
Number | Name | Date | Kind |
---|---|---|---|
10824940 | Rybakov | Nov 2020 | B1 |
11232016 | Huynh | Jan 2022 | B1 |
20110119467 | Cadambi | May 2011 | A1 |
20150171868 | Rodriguez | Jun 2015 | A1 |
20180174042 | Srinivasa | Jun 2018 | A1 |
20190026078 | Bannon | Jan 2019 | A1 |
20190132591 | Zhang | May 2019 | A1 |
20190205741 | Gupta | Jul 2019 | A1 |
20190294980 | Laukien | Sep 2019 | A1 |
20200117993 | Martinez-Canales | Apr 2020 | A1 |
Entry |
---|
Lin JH, Vitter JS. Complexity results on learning by neural nets. Machine Learning. May 1991;6(3):211-30. (Year: 1991). |
Aydogan D. CNNEDGEPOT: CNN based edge detection of 2D near surface potential field data. Computers & geosciences. Sep. 1, 2012;46:1-8. (Year: 2012). |
Chien JT, Bao YT. Tensor-factorized neural networks. IEEE transactions on neural networks and learning systems. Apr. 17, 2017;29(5):1998-2011. (Year: 2017). |
S. M. Bohte, J. N. Kok, and H. La Poutre. Error-backpropagation in temporally encoded networks of spiking neurons. Neurocomputing, 48:17-37, 2002. |
W. Gerstner. Time structure of the activity in neural network models. Physical Review E, 51:738-758, 1995. |
S. Ghosh-Dastidar, and H. Adeli. Improved spiking neural networks for EEG classification and epilepsi and seizure detection. Integrated Computer-Aided Engineering, 14(3), 187-212, 2007. |
W. M. Kistler, W. Gerstner, and J. L van Hemmen. Reduction of hodgkin-huxley equations to a single-variable threshold model. Neural Computation, 9:1015-1045, 1997. |
Number | Date | Country | |
---|---|---|---|
62633644 | Feb 2018 | US |