Associative Pattern Memory (APM) Larry Werth July 14, 2007

Slides:



Advertisements
Similar presentations
FUNCTION FITTING Student’s name: Ruba Eyal Salman Supervisor:
Advertisements

MEMORY popo.
David Rosen Goals  Overview of some of the big ideas in autonomous systems  Theme: Dynamical and stochastic systems lie at the intersection of mathematics.
Perceptron Learning Rule
Topics covered: CPU Architecture CSE 243: Introduction to Computer Architecture and Hardware/Software Interface.
Change Detection C. Stauffer and W.E.L. Grimson, “Learning patterns of activity using real time tracking,” IEEE Trans. On PAMI, 22(8): , Aug 2000.
Introduction to Training and Learning in Neural Networks n CS/PY 399 Lab Presentation # 4 n February 1, 2001 n Mount Union College.
Brian Merrick CS498 Seminar.  Introduction to Neural Networks  Types of Neural Networks  Neural Networks with Pattern Recognition  Applications.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Real-time Computer Vision with Scanning N-Tuple Grids Simon Lucas Computer Science Dept.
SWE 423: Multimedia Systems Chapter 7: Data Compression (1)
Recognition of Human Gait From Video Rong Zhang, C. Vogler, and D. Metaxas Computational Biomedicine Imaging and Modeling Center Rutgers University.
1 Computer System Overview OS-1 Course AA
Chapter 6: Multilayer Neural Networks
IST Hard Real-time CORBA HRTC WP4 / M. Rodríguez / Lund 16 September 2003 WP4: Process Control Testbed Universidad Politécnica de Madrid.
Chapter 1 Program Design
COMPUTER ARCHITECTURE & OPERATIONS I Instructor: Hao Ji.
Segmentation and tracking of the upper body model from range data with applications in hand gesture recognition Navin Goel Intel Corporation Department.
Hub Queue Size Analyzer Implementing Neural Networks in practice.
Chapter 6 Memory and Programmable Logic Devices
1.3 Executing Programs. How is Computer Code Transformed into an Executable? Interpreters Compilers Hybrid systems.
Chapter 16 Stream Control Transmission Protocol (SCTP)
CHAPTER 12 ADVANCED INTELLIGENT SYSTEMS © 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang.
New Protocols for Remote File Synchronization Based on Erasure Codes Utku Irmak Svilen Mihaylov Torsten Suel Polytechnic University.
Session 05: C# Patterns Algorithm Patterns: Sweep Search FEN AK IT: Softwarekonstruktion.
Computer System Overview Chapter 1. Operating System Exploits the hardware resources of one or more processors Provides a set of services to system users.
ECE 371 Microprocessor Interfacing Unit 4 - Introduction to Memory Interfacing.
Motion Object Segmentation, Recognition and Tracking Huiqiong Chen; Yun Zhang; Derek Rivait Faculty of Computer Science Dalhousie University.
MICROPROCESSOR INPUT/OUTPUT
Chapter 7 Low-Level Protocols
 The most intelligent device - “Human Brain”.  The machine that revolutionized the whole world – “computer”.  Inefficiencies of the computer has lead.
GCSE Computing#BristolMet Session Objectives#11 MUST identify what program instructions consist of SHOULD describe how instructions are coded as bit patterns.
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John Wiley.
Conceptual Foundations © 2008 Pearson Education Australia Lecture slides for this course are based on teaching materials provided/referred by: (1) Statistics.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition LECTURE 16: NEURAL NETWORKS Objectives: Feedforward.
MACHINE VISION Machine Vision System Components ENT 273 Ms. HEMA C.R. Lecture 1.
Job scheduling algorithm based on Berger model in cloud environment Advances in Engineering Software (2011) Baomin Xu,Chunyan Zhao,Enzhao Hua,Bin Hu 2013/1/251.
NEURAL - FUZZY LOGIC FOR AUTOMATIC OBJECT RECOGNITION.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 12-1 Chapter 12 Advanced Intelligent Systems.
Chapter 10 Hashing. The search time of each algorithm depend on the number n of elements of the collection S of the data. A searching technique called.
Marwan Al-Namari 1 Digital Representations. Bits and Bytes Devices can only be in one of two states 0 or 1, yes or no, on or off, … Bit: a unit of data.
Machine Vision Introduction to Using Cognex DVT Intellect.
Implementation of a Relational Database as an Aid to Automatic Target Recognition Christopher C. Frost Computer Science Mentor: Steven Vanstone.
1 Lecture 6 Neural Network Training. 2 Neural Network Training Network training is basic to establishing the functional relationship between the inputs.
1 Machine Vision. 2 VISION the most powerful sense.
Objectives: Terminology Components The Design Cycle Resources: DHS Slides – Chapter 1 Glossary Java Applet URL:.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.../publications/courses/ece_8443/lectures/current/lecture_02.ppt.
COMP135/COMP535 Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 2 Lecture 2 – Digital Representations.
5. The Transport Layer 5.1 Role of Transport Layer It bridge the gab between applications and the network layer. Provides reliable cost-effective data.
Distributed Pattern Recognition System, Web-based by Nadeem Ahmed.
Interrupt driven I/O Computer Organization and Assembly Language: Module 12.
PLC ARCHITECTURE – Memory 2 by Dr. Amin Danial Asham.
C - IT Acumens. COMIT Acumens. COM. To demonstrate the use of Neural Networks in the field of Character and Pattern Recognition by simulating a neural.
Pattern Recognition NTUEE 高奕豪 2005/4/14. Outline Introduction Definition, Examples, Related Fields, System, and Design Approaches Bayesian, Hidden Markov.
Pattern Recognition. What is Pattern Recognition? Pattern recognition is a sub-topic of machine learning. PR is the science that concerns the description.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
SOFTWARE TESTING LECTURE 9. OBSERVATIONS ABOUT TESTING “ Testing is the process of executing a program with the intention of finding errors. ” – Myers.
A Presentation on Adaptive Neuro-Fuzzy Inference System using Particle Swarm Optimization and it’s Application By Sumanta Kundu (En.R.No.
HIERARCHICAL TEMPORAL MEMORY WHY CANT COMPUTERS BE MORE LIKE THE BRAIN?
Over the recent years, computer vision has started to play a significant role in the Human Computer Interaction (HCI). With efficient object tracking.
The Robot Revolution has been Postponed (until we can debug the sensors) Bill Smart Oregon State University
National Taiwan Normal A System to Detect Complex Motion of Nearby Vehicles on Freeways C. Y. Fang Department of Information.
Automatic License Plate Recognition for Electronic Payment system Chiu Wing Cheung d.
Introduction to Discrete-Time Control Systems fall
Unsupervised Learning of Video Representations using LSTMs
Chapter 12 Advanced Intelligent Systems
Rob Fergus Computer Vision
CSC 241: Introduction to Computer Science I
Outline Announcement Neural networks Perceptrons - continued
Presentation transcript:

Associative Pattern Memory (APM) Larry Werth July 14, 2007

Introduction and Background of APM Human Associative Pattern Memory Computer Implemented APM Basis for Two Successful Startup Companies Six Patents Granted and Others Pending Successful Implementation of NKS

Objective of My Presentation Describe the APM Concept & Implementation Describe its Advantages / Features Identify Types of Applications Describe its Current Status and Future Goals

Origin of Concept Randomly Connected Neural Network Models States Sequence Terminates in a Cycle Randomly Map Each State to an Input Pattern Sampled Pattern Value & Current State Determine Next State The Ultimate Cycle Represents the Input Pattern Cycles Form the Basis of the APM

Cycle Properties Randomly Connected DFA’s Expected# Expected# Expected# Fraction Terminal Number Transition Terminal Total States (N) States(S) Cycles(C) States(T) States(F) 100 12 3 7 .12 1,000 40 4 20 .040 10,000 125 5 63 .0125 100,000 396 6 198 .00396 1,000,000 1,253 8 627 .001253 10,000,000 3,963 9 1982 .000396 100,000,000 12,533 10 6267 .0001253 1,000,000,000 39,632 11 19817 .0000396

Conceptual Implementation of APM Train Pattern (Write to Cycle Addresses) Input Pattern Array State Array Pattern Address Current State Address Next State Address Response Array Next State Array (Value = 0) Respond to Pattern (Read From Cycle Addresses) Pattern Value Next State Array (Value = 1) State Array: Filled with Random Pattern Addresses Next State Arrays : Filled with Random State Addresses Response Array: Assigned Responses to Patterns

Solution to Multiple Cycles Introduce a Refractory Period A State Can Not Occur Again Until After a Specified Number of Steps Establishes a Minimum Cycle Length Assures One Cycle Per Input Pattern Independent of Initial State Input Pattern is Represented By a Single Sequence of Random Addresses in Memory

Minimum Cycle Length Example Number of States: 1,000,000 Minimum Cycle Length: 3,700 Probability of a Second Cycle of 3,700 in Length: 1 in 1,000,000 Based on the probability of not picking one of 3700 in 1,000,000 after 3700 tries.

Response/Recognition Capacity During Training Desired Responses are Written to Cycle Addresses in Response Memory Problem: Response Memory Fills UP Quickly Any Cycle Address has Memory of Previous Input Sample Values Do Not Need to Use All Cycle Addresses Solution: Vertical Sensors

Vertical Sensor Cycle Detection Upper Memory Plane forms New Input Pattern Based on Sensor Status Vertical Sensors Detect Presence Absence of Cycle State Addresses Plane With Cycle

Vertical Sensor Implementation Number of States: 1,000,000 Minimum Cycle Length: 3,700 One of 270 Addresses are in Cycles Vertical Sensor Field Size: 135 Probability Field Contains Cycle Address: .5 Vertical Sensor Determines Bit Status of Hash Values that Addresses Response Memory

Fuzzy Hash Similar Input Patterns Produce Similar Cycles Similar Input Patterns Generate the same or Similar Hash Codes Multiple Independent Hash Codes are Generated By One Cycle (One Input Pattern) A Voting Mode For Response Identification Contributes to Fuzzy Recognition

Advantages of Using Cycles Creates a Fuzzy Hash Simple and Fast Implementation Common Language for Different Pattern Types Spatial and Temporal Integration to Form New Higher Level Input Patterns Automatic Segmentation of Time Varying Patterns

Applications Actual Applications: Hand Printed Character Recognition, Machine Vision, Video Compression, Financial Pattern Forecasting Signal Processing – Vector Quantization Video Surveillance – Smart Cameras Video Object Tracking Stereo Vision

Current Status and Objectives Software Library Written in C/C++ Objective: General Purpose Tool for Pattern Recognition Development Looking for a Business Partner Software Will be Available on Our Web Site www.netwerth.net