The present invention generally relates to signal processing using a spiking neural network. More specifically, but not exclusively, the present invention is concerned with a system and method for converting an input signal into a sequence of spikes in the spiking neural network. The system and method can be used advantageously, for example, for pattern recognition.
Pattern recognition is an aspect of the field of artificial intelligence aiming at providing perceptions to “intelligent” systems, such as robots, programmable controllers, speech recognition systems, artificial vision systems, etc.
In pattern recognition, objects are classified according to some chosen criteria so as to allow these objects to be compared with each other, for example by computing a distance between the objects as a function of the chosen criteria. Accordingly, it is possible, for example, to quantify the similarity or dissimilarity between two objects, to remember an object and to recognize this object later on.
An object, as referred to hereinabove, is not restricted to a physical shape or a visual representation; it has to be understood that an object means any entity that can be represented by a signal.
In general, but not restrictively, the term “distance” can be construed as a mathematical function for measuring a degree of dissimilarity between two objects. For example, if the two objects are assimilated to two respective vectors, this distance can be the Euclidian norm of the difference between the two vectors. The distance could also be, for example, a probability, an error, a score, etc.
Those of ordinary skill in the art of rule-based expert systems, statistical Markovian systems or second generation (formal) neural network systems are familiar with such a concept of “distance”.
Unfortunately, the evaluation of this “distance” is often an important burden. Furthermore, object comparison is usually obtained by first comparing segments of the objects, which involves distance comparison. It has been found desirable to achieve such comparison with a more global approach. For example, comparing N signals would require:
Third generation neural networks, including spiking neural networks and pulsed neural networks, allow to alleviate this distance burden. Indeed, a properly designed spiking neural network allows pattern comparisons and similarity evaluation between different patterns without explicit score or distance computation. This is made by using spiking events that are temporally-organized, as shown in FIG. 1A.
Various schemes are possible for coding temporally-organized spiking neural networks. Two possible schemes are listed below.
This transfer between conventional digital coding and spike sequences coding is efficient in terms of both distance criteria creation and comparison.
To summarize, a distance between two objects can be represented, for example, by:
Synchronization coding occurs when two groups of neurons appear spontaneously because of plasticity of interconnections of neurons. Thus, two neurons having similar inputs present a growth of their mutual synaptic connections, causing their outputs to be synchronous. Otherwise, when inputs of neurons are not similar, their mutual synaptic connections decrease, causing them to be desynchronized. In fact, the inputs of two neurons spiking simultaneously are relatively correlated.
Source Separation
Separation of mixed signals is an important problem with many applications in the context of audio processing. It can be used, for example, to assist a robot in segregating multiple speakers, to ease an automatic transcription of video via audio tracks, to separate musical instruments before automatic transcription, to clean a signal before performing speech recognition, etc. The ideal instrumental setup is based on the use of an array of microphones during recording to obtain many audio channels. In fact, in that situation, very good separation can be obtained between noise and signal of interest [1] [2] [3] and experiments with great improvements have been reported in speech recognition [4] [5]. Further applications have been ported on mobile robots [6] [7] [7] and have also been developed to track multi-speakers [51].
A source separation process implies segregation and/or fusion (integration), usually based on methods such as correlation, statistical estimation and binding applied on features extracted by an analysis module.
Conventional approaches require training, explicit estimation, supervision, entropy estimation, huge signals databases [7], AURORA database [10] [34], etc. Therefore, design and training of such systems are tedious, time consuming and, therefore, costly.
Moreover, in many situations, only one channel is available to an audio engineer who, nevertheless, has to solve the separation problem. In this case, automatic separation and segregation of the sources is particularly difficult.
Although some known monophonic systems perform reasonably well on specific signals (generally voiced speech), they fail to efficiently segregate a broad range of signals. These disappointing results could potentially be overcome by combining and exchanging expertise and knowledge between engineering, psychoacoustic, physiology and computer science.
Monophonic source separation systems can be seen as performing two main operations: analyzing a signal for yielding a representation suitable for the second operation which is clustering with segregation.
With at least two interfering speakers each generating voiced speech, it is observed that when there is a difference in their respective pitch, separation is relatively easy since spectral representations or auditory images exhibit different regions with structures dominated by a respective pitch. Then, amplitude modulation of cochlear filter outputs (or modulation spectrograms) is discriminative.
In situations where speakers have similar pitches, separation is more difficult to perform. Features, such as phase, have to be preserved when they undergo an analysis. Glottal opening time should be taken into account otherwise long term information such as intonation would be required. However, in the latter case, real-time treatment becomes problematic.
Using Bregman's terminology, bottom-up processing corresponds to primitive processing, and top-down processing means schema-based processing [10]. Auditory cues proposed by Bregman [10] for simple tones are not applicable directly to complex sounds. More sophisticated cues based on different auditory maps are thus desirable. For example, Ellis [11] uses sinusoidal tracks created by an interpolation of spectral picks of the output of a cochlear filter bank, while Mellinger's model [50] uses partials. A partial is formed if an activity on the onset maps (the beginning of an energy burst) coincides with an energy local minimum of the spectral maps. Using these assumptions, Mellinger proposed a CASA (Competitional Auditory Scene Analysis) system in order to separate musical instruments. Cooke [12] introduced harmony strands, which is a counterpart of Mellinger's cues in speech. The integration and segregation of streams is done using Gestalt and Bregman's heuristics. Berthommier and Meyer use Amplitude Modulation maps [4] [13] [14]. Gaillard [16] uses a more conventional approach by using the first zero crossing for the detection of pitch and harmonic structures in the frequency-time map. Brown proposes an algorithm [17] based on the mutual exclusivity Gestalt principle. Hu and Wang use a pitch tracking technique [18]. Wang and Brown [19] use correlograms in combination with bio-inspired neural networks. Grossberg [20] proposes a neural architecture that implements Bregman's rules for simple sounds. Sameti [9] uses HMMs (Hidden Markov Models), while Roweis [21] and Reyes-Gomez [22] use Factorial HMMs. Jang and Lee [22] use a technique based on Maximum a posteriori (MAP) criterion. Another probability-based CASA system is proposed by Cooke [23]. Irino and Patterson [24] propose an auditory representation that is synchronous to glottis and preserves fine temporal information, which makes possible the synchronous segregation of speech. Harding and Meyer [23] use a model of multi-resolution with parallel high-resolution and low-resolution representations of the auditory signal. They propose an implementation for speech recognition. Nix [25] performs a binaural statistical estimation of two speech sources by an approach that integrates temporal and frequency-specific features of speech. This approach tracks magnitude spectra and direction on a frame-by-frame basis.
A major drawback of the above-mentioned systems is that they require training and supervision.
An alternative to supervised systems are autonomous bio-inspired and spiking neural networks.
Dynamic, non linear space and time filtering of spikes in neural networks combined with neurotransmitters diffusion along with the topographic organization of neurones yields simultaneous signal processing and recognition. Moreover, spiking allows the encoding of information into a second time scale that is different from usual time. This second time scale encodes the relative timing of spiking neurones. Synchronization or generation of specific spiking temporal sequences becomes an auto-organization criteria (Abeles [A1]). This is a feature that allows unsupervised training and has a strong impact on the pattern recognition aptitudes of spiking neural networks (Wang [A2]). Furthermore, neural networks with dynamic synapses and varying delays offer a greater computing capacity than those where only weights are changed (Schmitt [A3] and Maass [A4]). Autonomous bio-inspired and spiking neural networks therefore constitute an alternative to supervised systems (NN handbook [A5], Maass [A6]).
A well known amazing characteristic of human perception is that recognition of stimuli is quasi-instantaneous, even if the information propagation speed in living neurons is slow [18] [26] [27]. This implies that neural responses are conditioned by previous events and states of a neural sub-network [7]. Understanding of the underlying mechanisms of perception in combination with that of the peripheral auditory system [28] [17] [29] [30] allows designing of an analysis module.
In a context of a mathematical formalism of spiking neurons, it has been shown that networks of spiking neurons are computationally more powerful than models based on McCulloch Pitts neurons [9]. Information about the result of a computation is already present in a current neural network state long before the complete spatiotemporal input patterns have been received by the neural network [7]. This suggests that neural networks use a temporal order of first spikes for yielding ultra-rapid computation [31]. Thus, neural networks and dynamic synapses (including facilitation and depression) are equivalent to a given quadratic filter that can be approximated by a small neural system [32] [33]. It has been shown that any filter that can be characterized by Volterra series can be approximated with a single layer of neurons. Also, spike coding in neurons is close to optimal, and plasticity in Hebbian learning rule increases mutual information close to optimal [34] [35] [36].
For unsupervised systems, novelty detection allows facilitating autonomy. For example, it can allow robots to detect whether a stimulus is new or has already been encountered. When associated with conditioning, novelty detection can create autonomy of the system [10] [37].
Sequence classification is particularly interesting for speech. Panchev and Wermter [46] have shown that synaptic plasticity can be used to perform recognition of sequences. Perrinet [?] and Thorpe [?] discuss the importance of sparse coding and rank order coding for classification of sequences.
Assemblies, or groups of spiking neurons can be used to implement segregation and fusion, i.e. integration of objects in an auditory image, in other words signal representation. Usually, in signal processing, correlations or distances between signals are implemented with delay lines, products and summations. Similarly, comparison between signals can be made with spiking neurons without implementation of delay lines. This is achieved by presenting images, i.e. signals, to spiking neurons with dynamic synapses. Then, a spontaneous organization appears in the network with sets of neurons firing in synchrony. Neurons with the same firing phase belong to the same auditory objects. Milner [38] and Malsburg [39] [40] propose a temporal correlation to perform binding. Milner and Malsburg have observed that synchrony is a crucial feature to bind neurons associated to similar characteristics. Objects belonging to the same entity are bound together in time. In other words, synchronization between different neurons and desynchronization among different regions perform the binding. To a certain extent, such property has been exploited to perform unsupervised clustering for recognition on images [41], for vowel processing with spike synchrony between cochlear channels [42], to propose pattern recognition with spiking neurons [43], and to perform cell assembly of spiking neurons using Hebbian learning with depression [44]. Furthermore, Wang and Terman [45] have proposed an efficient and robust technique for image segmentation and study the potential in CASA [19].
Pattern Recognition
Pattern recognition robust to noise, symmetry, homothety (size change with angle preservation), etc. has long been a challenging problem in artificial intelligence. Many solutions or partial solutions to this problem have been proposed using expert systems or neural networks. In general, three different approaches are used to perform invariant pattern recognition.
Normalization
In this approach the analyzed object is normalized to a standard position and size by an internal transformation. Advantages of this approach include i) coordinate information (the “where” information) is retrievable at any stage of the processing and ii) there is a minimum loss of information. The disadvantage of this approach is that a network must find an object in a scene and then normalize it. This task is not as obvious as it can appear [46], [47].
Invariant Features
In this approach, some features that are invariant to the location and size of an object are extracted. A disadvantage of this approach are that the position of the object may be difficult to access because of a possibility of loosing information, such as recognition, during the extraction process. The advantage is that this approach does not require knowledge of the position of the object and, unlike normalization that must be followed by an operation of pattern recognition, the invariant features approach already does some pattern recognition by finding important features [48].
Invariance Learning from Temporal Input Sequences
The assumption is that primary sensory signals, in general code for local properties, vary quickly while the perceived environment changes slowly. Succeeding in extracting slow features from a quickly varying sensory signal is likely to result in obtaining an invariant representation of the environment [6] [8].
Based on the normalization approach, a dynamic link matching (DLM) approach has been first proposed by Konen et al [46]. This approach consists of connecting two layers of neurons through synaptic connections that are constrained by a normalization. A known pattern is applied to one of the two layers, and the pattern to be recognized to the other layer. Dynamics of the neurons are chosen in such a way that “blobs” are formed randomly in the layers. If features of the blobs respectively in the two layers are similar enough, a weight strengthening and an activity similarity will be detected between the two layers, for example by correlation computation [49] [46]. These blobs may or may not correspond to a segmented region of a visual scene, since their size is fixed in the whole simulation period and is chosen by some parameters in the dynamics of the network [46]. The apparition of blobs in the network has been linked to the attention process present in the brain by the developers of the architecture.
The dynamics of the neurons used in the original DLM network are not dynamics of a spiking neuron. In fact, the behavior of neurons from a DLM network is based on rate coding, i.e. average neuron activity over time, and can be shown to be equivalent to an enhanced dynamic Kohonen Map in its Fast Dynamic Link Matching (FDLM) [46].
In summary, the systems described hereinabove are supervised and non-autonomous, or include two operating modes which are learning and recognition.
Other systems such as those described in U.S. Pat. No. 6,242,988 B1 (Sarpeshkar) issued on Jun. 5, 2001 and entitled “Spiking Neural Circuit”, and U.S. Pat. No. 4,518,866 issued to Clymer on May 21, 1985 and entitled “Method of and Circuit for Simulating Neurons”, make use of bio-inspired neural networks (or spiking neurons) including electronic circuitry to implement neurons, but do not provide any solution to spatio-temporal pattern.
The other following United States patent documents describe solutions to spatio-temporal pattern recognition that do not use bio-inspired neural networks (spiking neurons). They either use conventional (non-spiking) neural networks or expert systems:
No. | Title | Issued | Inventor |
5,664,065 | Pulse-coupled | Sep. 02, 1997 | Johnson |
automatic object | |||
recognition system | |||
dedicatory clause | |||
5,255,348 | Neural network for | Oct. 19, 1993 | Nenov |
learning, recognition | |||
and recall of pattern | |||
sequences | |||
6,067,536 | Neural network for | May 23, 2000 | Maruyama |
voice and pattern | et al. | ||
recognition | |||
2003/0228054 | Neurodynamic | Dec. 11, 2003 | Deco |
model of the | |||
processing of visual | |||
information | |||
To overcome the above discussed drawbacks of the prior realizations, there is provided, in accordance with the present invention, a system for characterizing a pattern, the system comprising: a spiking neural network having at least one layer of neurons, the spiking neural network defining a plurality of connections between neurons for transmitting signals between the connected neurons; a model for inducing spiking in the neurons; a global regulating unit; connections between each neuron and the global regulating unit for transmitting signals between the neuron and the global regulating unit; and connections between each neuron and at least one other neuron for transmitting signals between this neuron and the at least one other neuron, this neuron and the at least one other neuron being on the same layer. Spiking of each neuron is synchronized according to a number of active neurons connected to this neuron. The system comprises a supplier of at least one pattern to the spiking neural network for generating sequences of spikes in the spiking neural network, the sequences of spikes (i) being modulated over time by the synchronization of the spiking and (ii) being regulated by the global regulating unit. The system finally comprises a characterizer of the at least one pattern according to the sequences of spikes generated in the spiking neural network.
The present invention also relates to a method for characterizing a pattern, the method comprising: providing a spiking neural network having at least one layer of neurons, the spiking neural network having a plurality of connected neurons for transmitting signals between the connected neurons; specifying a model for inducing spiking in the neurons; connecting each neuron to a global regulating unit for transmitting signals between the neuron and the global regulating unit; connecting each neuron to at least one other neuron for transmitting signals from this neuron to the at least one other neuron, the neuron and the at least one other neuron being on the same layer; synchronizing spiking of each neuron according to a number of active neurons connected to this neuron; submitting at least one pattern to the spiking neural network for generating sequences of spikes in the spiking neural network, the sequences of spikes (i) being modulated over time by the synchronization of the spiking and (ii) being regulated by the global regulating unit; and characterizing the at least one pattern according to the sequences of spikes generated in the spiking neural network.
The foregoing and other objects, advantages and features of the present invention will become more apparent upon reading of the following non restrictive description of illustrative embodiments thereof, given by way of example only with reference to the accompanying drawing.
In the appended drawings:
FIG. 1A is a graph showing spiking events that are temporally-organized;
FIGS. 1B and 1C are graphs showing non synchronized discharge of neurons;
FIG. 2 illustrates a RN-Spikes neural network comprising two layers of neurons;
FIG. 3 is a graph showing the output x of Terman-Wang oscillator;
FIG. 4 is a graph showing the output x of an IaF model;
FIG. 5 is a graph showing global activity, measured in CPU time, for three types of images: i) same image of the same individual, ii) different images of the same individual and iii) images of different individuals, wherein front images of men and women from the FERET database, reduced to 50×75 pixels were used and wherein around 30 tests on 30 individuals were conducted to build the graph;
FIG. 6 is a graph showing the evolution (through iterations) of the kurtosis for the extraction of the NMF basis for a dataset of 20 different signals, wherein each signal is 100 sample long and the constraint used in the algorithm consists of keeping the kurtosis between 2 and 3;
FIG. 7 is a graph showing the evolution (through iterations) of the mean-squared error for the extraction of the NMF basis for a dataset of 20 different signals, wherein each signal is 100 sample long;
FIG. 8 illustrates part-based coding of a swimmer database by the sparse NMF simulated annealing, wherein the number of bases is set to 17;
FIG. 9 is a block diagram of a training part of a sparse NMF;
FIG. 10 is a block diagram of a recognition part of the sparse NMF;
FIG. 11 is a toy face image database developed for this project;
FIG. 12 represents the 12 best-matching bases found for the initial 15 faces of FIG. 11;
FIG. 13 represents the 6 best-matching bases found for the initial 15 faces of FIG. 11;
FIG. 14 represents 40 photos of the 90 photos from the CBCL database used for the training;
FIG. 15 represents 100 bases generated by a simulated annealing sparse NMF;
FIG. 16 is a block diagram of a RN-Spikes matrix audio oscillator model on a discrete time simulator;
FIG. 17 is a block diagram of an oscillator model on a discrete time simulator;
FIG. 18 is a graph showing the output x of a Terman-Wang oscillator;
FIG. 19 is a block diagram of a RN-Spikes matrix audio IaF model on a discrete time simulator;
FIG. 20 is an IaF model on a discrete time simulator;
FIG. 21 is a graph showing the output x of an IaF model;
FIG. 22 is a flow chart of the operations in an event driven model;
FIG. 23 is a schematic diagram showing spike propagation;
FIG. 24 is a flow chart illustrating an example of normalized weigthing yielding a non stable frequency in the network, comprising verification if the discharge threshold is exceeded and, if exceeded, sending contributions to all neighbors and then go to the next neuron;
FIG. 25 is a flow chart illustrating an example of normalized weigthing yielding a constant frequency after stabilization of the neural network, starting with verifying if the discharge threshold is exceeded, but wherein contributions to neighbors is not distributed but stocked in memory and the number of contributions on these neighbors is incremented, and wherein the contributions are sent only when all neurons have been verified and after they have been normalized;
FIG. 26 is an example of two segments considered as identical, wherein these segments are obtained after presentation of face Face00013_b to both layers of neurons after a segmentation phase.
In the following description, non-restrictive illustrative embodiments of the system and method according to the present invention will be described with reference to the appended drawings. More specifically, the non-restrictive, illustrative embodiments are concerned with characterizing sequences of spikes generated by neurons of a spiking neural network when a pattern is submitted to the spiking neural network after the latter is stabilized. The system and method according to the present invention can perform, for example, clustering or segmentation through synaptic weight values. Shape identification and recognition is embedded into local excitatory and global inhibitory connections and spiking synchronization.
In the following description, “pattern” is to be construed in a broad sense. For example, a pattern can be an audio signal, a video signal, a signal representing an image, including 3D images, or any entity that can be represented by a signal.
The spiking neural network used in the non-restrictive, illustrative embodiments described herein is a RN-Spikes neural network. FIG. 2 shows such a RN-Spikes neural network 2. The RN-Spikes neural network 2 is a multilayer neural network made of spiking neurons such as 4. In the present illustrative embodiments, the RN-Spikes neural network 2 has two layers 6 and 8 of spiking neurons 4. Of course, the RN-Spikes neural network such as 2 can have an arbitrary number of layers such as 6 and 8. Each neuron 4 of the RN-Spikes neural network 2 has a bidirectional connection such as 12 with a global regulating unit 10 for transmission of excitatory signals and/or inhibitory signals between the neurons 4 and the global regulating unit 10.
Also, each neuron 4 of both layers 6 and 8 receives local excitatory connections and/or global excitatory connections from neurons of the same layer. Each neuron 4 from the same layer 6 or 8 also receives an inhibitory signal from the global processing unit 10.
The layers 6 and 8 communicate with each other since at least one neuron 4 of the layer 6 can receive excitatory and/or inhibitory signals from neurons of the layer 8 (see connections 14), and at least one neuron 4 of the layer 8 can receive excitatory and/or inhibitory signals from neurons of the layer 6 (see connections 16).
In general, the number of layers of a RN-Spikes neural network is chosen depending on the application. For example, a RN-Spikes neural network having N layers is advantageously used for simultaneously finding a common object in N images.
The types of connections, i.e. inhibitory connections and/or excitatory connections, between the neurons 4 are chosen according to the application. For example, an audio application advantageously uses a one layer RN-Spikes neural network 2 having full bidirectional excitatory and inhibitory connections between the neurons 4. In other applications, it is possible to use local connections on each layer but global connections between the layers.
The RN-Spikes neural network 2 can use different neuron models, or combinations and adaptations thereof, for inducing spiking in the neurons 4. Example of such models are the Wang and Terman model, integrate-and-fire model, resonate-and-fire model, quadratic integrate-and-fire model, Izhikevich model, FitzHugh-Nagamo model, Moris-Lecar model, Wilson Polynomial Neurons, Hodgkin-Huxley model. FIGS. 3 and 4 give examples of the Wang and Terman model and the integrate-and-fire model, respectively, wherein H(x(i,j;t)) defines a spiking output of neuron neuron(i,j), H(x) being the Heaviside function.
Synaptic weights w_{i,j,k,m}(t) between neurons (i,j) and (k,m) are dynamic and can vary over time t depending on the input signals received by neurons (i,j) and (k,m), RN-Spikes activity, the functioning mode of RN-Spikes, and the synchronization of RN-Spikes. Therefore, the synaptic weights can be adapted and need not be constant.
More specifically, the synaptic weight w_{i,j,k,m}(t) between neuron(i,j) and neuron(k,m) can be computed using the following formula:
wherein:
The external input values p(i, j;t) and p(k,m;t) are normalized. O(.) can be an exponential function, a cubic function, a square function or any other linear or nonlinear function of the external inputs p(i,j) and p(k,m) at time t.
Depending on the functioning mode, connections between neurons can be suppressed or established during processing. For example, in a segmentation mode, connections between the layers 6 and 8 of FIG. 2 are not established while, during a matching mode, connections between layers 6 and 8 which are to be compared are established. In the RN-Spikes neural network 2, the layers 6 and 8 can independently be in a segmentation mode, a matching mode or a comparison mode.
Local connections whether inside the same layer or between different layers are excitatory connections, while inhibitory connections are made with the global regulating unit 10.
In situations where the weights w_{i,j,k,m}(t) are not adapted and for a specific situation, equation (1) can be reduced, in a non limitative example, to the following equation (2):
where w_{max}^{ext}(t) and Card{N^{ext}(i;j)∪N^{int}(i;j)} are normalization factors, with Card{N(i;j)}=Card{Nex^{ext}(i;j)∪N^{int}(i;j)} while e^{λ|p(i,j;t)−p(k,m;t)}| characterizes the distance between the inputs of neurons (i,j) and (k,m), with f(i,j,k,m;t) being any non-linear function of the neural network activity evaluated at time t for neurons (i,j) and (k,m). In the remaining part of the present specification and when not otherwise stated, it is assumed that the weights follow the form of equation (2).
The function f is used to guide, constraint and focus the neural network response depending on its past and actual activity. Furthermore, f depends on the application to be developed. The subsequent sections illustrate two examples of expressions f(i,j,k,m;t), one that takes into consideration the average color of segments and the other that considers the shape of the segments. Of course, the present invention is not limited to these two examples.
is a normalization factor that depends on the neural network activity and that can be implemented in many ways. It can be updated every time a neuron fires or after many spikes of the same neuron or after completion of a full oscillatory period (after the firing of each active neurons). Although the present specification presents various ways of updating that normalization factor, the present invention is not limited to these particular examples.
For ease of implementation, the term
from equation (2) can be split into a first expression that is static (that does not depend on the network activity) and a second expression that changes depending on the network activity and behavior.
Let us come back to equation (1). The sums
can be evaluated from a static point of view or dynamically, depending on the activity of the neural network. Different implementations are presented in this specification. One solution considers that the sets
are constants while another solution considers only the active neurons at a specific instant t or on a short time interval.
Two patterns (not shown) can be submitted to the RN-Spikes neural network 2 for comparison with each other. The two patterns can be submitted to the layers 6 and 8, respectively. Depending on the characteristics of the two patterns, the response of the RN-Spikes neural network 2 can be categorized roughly in the three following classes:
When the two patterns are substantially similar, the activity of the neurons of the RN-Spikes neural network 2 tends to stabilize, while this may not be the case with dissimilar patterns. More specifically, the number of spikes in a time interval, or during one comparison iteration, depends on the similarity of the two patterns submitted. For example, the RN-Spikes neural network 2 presents a greater activity and a faster stabilization of synchronous activity for two similar images than for two dissimilar images.
Accordingly, it is desirable to define a similarity criterion depending on the activity in the RN-Spikes neural network 2 so that the greater is the similarity between the two patterns submitted, the greater is the activity in the RN-Spikes neural network. One possible similarity criterion is the number of computations being made during one comparison iteration. Another possible similarity criterion is the average number of spiking neurons during one or many comparison iterations. The latter similarity criterion provides an estimate of the similarity between the two patterns without having to wait for a complete stabilization of the RN-Spikes neural network 2.
FIG. 5 is a graph showing simulation times for a fixed number (3000) of segmentation and matching iterations in three different situations. The same image is used twice, two different images of the same individual and two images of different individuals are used. During the transition phase from initialization to stabilization, similar images bring higher values of simulation times, since a greater number of neurons fire at each iteration. On the contrary, different images yield short simulation times, since a smaller number of neurons fire during each iteration. Indeed, if matching regions emerges (more frequent in similar images), more neurons will occupy each given region, and more neurons will fire at each iteration. This yields more operations. On a very slow computer, different images of the same individual give an average of high values (between 164 and 217 seconds) while images of different individuals yield low to average values (between 122 and 178 seconds).
In accordance with the theory of neural network, all neurons 4 tend to have a same discharge frequency, however with different phases. This fact can be used for enhancing the reliability of decisions made according to the present invention and also for defining a condition as to when to stop the neuronal network.
In order to compute all spiking frequencies of neurons 4 in the RN-Spikes network 2, it is required to keep track of a last discharge time and also of a last discharge period. Period is used instead of frequency for simplifying mathematical operations. As all neurons 4 are unitary objects in the RN-Spikes neural network 2, for each of them three new parameters are added to their class definition in the simulator: a moment of last spiking, a period of last spiking sequence and a variation of the spiking period.
In the simulator, the three parameters mentioned hereinabove can be defined as below.
Values of the three (3) above-mentioned parameters are acquired when methods of discharge of the neurons are called in the simulator. The variation of the spiking period is the variation of period between the current and the previous spikings. FirePeriod is set after the previous calculation to reflect the current period of firing and LastFire is updated with the current discharge time.
With these parameters, it is possible to define a stabilization coefficient C_{stabilization}. In this non restrictive illustrative embodiment, C_{stabilization }is defined as an average of all computed DeltaPeriod of the simulation iteration. More specifically:
Graphs of period variation show different reactions of the RN-Spikes neural network 2 for a segmentation or a matching phase of a simulation based on images submitted to each layer 6 and 8.
The same behavior is observed during the matching stage. There is a relation between stabilization times and similarities of images assigned to neuronal network layers. There are some exceptions, but all neurons start to be synchronized sooner when images are the same or with minor differences than with different images. As the DeltaPeriod parameter Δ_{period}_{n }presents fluctuations between cycles, it is possible to average this parameter Δ_{period}_{n }on a fixed number of iterations.
After stabilization of the RN-Spikes neural network, the distribution of phases can be used to characterize the inputs. The distributions of the various parameters are estimated as a function of the phases. The following illustrates the estimation of two types of histograms.
Histogram vectors are evaluated from regions (segments) in each layer. In a given layer (for example layer L_{1}), for a specific region (R_{i }with a specific phase φ_{i}) the number of neurons is counted and is reported in vector H_{1 }in the same coordinate as the one that is used for histogram H_{2 }for the same phase φ_{i}. In other words, after matching, a list is made of all the phases present in the network. Then an index is associated to each phase. That index is a pointer on the coordinates of the vectors H_{1 }and H_{2}. The example below clarifies the way H_{1 }and H_{2 }are obtained.
Let us suppose that after matching, layer L_{1 }has three regions (segments) R_{1}, R_{2 }and R_{3}, with phases φ_{1}, φ_{2 }and φ_{3}, respectively, and that layer L_{2 }has three regions (segments) R_{4}, R_{5 }and R_{6}, with phases φ_{4}, φ_{5 }and φ_{6}, respectively. If, for example, there are only two regions: R_{2 }in the first layer and R_{5 }in the second layer that have the same phase φ_{2}=φ_{5}, therefore, the two vectors H_{1 }and H_{2 }will have a dimension of five (5) phases and will be indexed by a sequence of phases φ_{1}, φ_{2}, φ_{3}, φ_{4}, φ_{5}.
That is:
H_{1}=[Card(R_{1}), Card(R_{2}), Card(R_{3}), 0, 0] (4)
and
H_{2}=[0, Card(R_{5}), 0, Card(R_{4}), Card(R_{6})] (5)
wherein Card(R_{i}) is the number of neurons from region R_{i}.
In another embodiment, instead of using the number of neurons in a segment (region), the value of the parameter P^{2}/S is used for the segment, wherein P is a perimeter and S is a surface of the segment. Histograms that are a combination of the previous ones are also generated.
The following illustrates the use of histograms on an implementation that was made based on a correlation coefficient, as defined hereinbelow.
After running the RN-Spikes neural network 2, the result is encoded in the phases of the impulse time. In order to evaluate the similarity between two images, a normalized correlation between histograms is used:
where H_{1 }and H_{2 }are histograms, and the operator E represents the mathematical expectation.
The following equivalent formulation has been implemented:
Table 1 illustrates the use of the correlation on histograms of segment's size in relation with the phase. The same image gives the best matching and the greatest coefficient (Var13b-13b).
Image Processing Applications
RN-Spikes can be used to process images, when it is used in a segmentation mode, and then to compare the latter during a matching mode. As already stated hereinabove, the number of layers of the RN-Spikes neural network, or any other spiking neural network, is not limited to two. In fact, some layers can segment different images while others perform a comparison between the segmented images. After segmentation, objects inside an image are multiplexed in time and can be filtered out of the image when looking at the activity of the network during a short time slice window (specific to that object to be extracted). These objects can be compared with those of other layers, which are also multiplexed in time.
Sound Processing Applications
RN-Spikes can also be used to process sound. For example, in the context of the sound source separation problem and with the RN-Spikes network, auditory objects can be multiplexed in time intervals, such as TDM (Time-Division Multiplex) in telecommunications, from a period of oscillatory neurons (instead of being encoded into vector coordinates). Auditory objects coming from a same source can be retrieved from a same time interval of a multiplexing time frame, i.e. a frame length being the period T of the oscillatory neurones). In this context, source separation is reduced to a simultaneous segmentation and fusion of auditory objects. Analysis and recognition are realized simultaneously without any training of the RN-Spikes neural network
Video Processing Applications
In video and sound processing, representations based on objects are used. Once they are found in a video or in a sound signal, objects can be tracked and localized. Nowadays, video or sound coders, for example, are parametric and do not take into consideration the representation of the information in terms of scenes where objects are present. The RN-Spikes neural network is able to find objects in images (also in auditory images) and is plastic. From the previous equation, it can be seen that connections can change depending on the external input values p(i,j;t) (objects in the image) and on the neural activity (respective spiking time between neurons). It is therefore possible to track the objects in a sequence of images and therefore, to encode their position at each time frame.
RN-Spikes Using a Sparse Non-Negative Matrix Factorization
Olshausen [A8] has shown that sparse representation can be used to obtain overcomplete mathematical bases, in a vectorial space. An overcomplete base is a set that has more bases than the dimensionality of data. Overcompleteness in the representation is important because it allows for the joint space of position, orientation, and spatial-frequency to be tiled smoothly without artifacts. In other words, overcomplete bases are shift invariant [A9]. More generally though, it allows also for a greater degree of flexibility in the representation, as there is no reason to believe a priori that the number of causes for images is less than or equal to the number of pixels [A10].
Overcompleteness and sparseness do not guaranty by themselves that the representation is part-based. Part-based representations are important in signal processing and artificial intelligence, since they allow us to extract the constituent objects of a scene. One way of achieving part-based analysis is the use of non-negative kernels in a linear model. Since each signal is generated by adding up the positive (non-negative) kernels no part of the kernel can be cancelled out by addition. Therefore, the basis must be parts of the underlying data. Combining sparseness and non-negativity gives a suitable representation for sensory signals (audio, image, etc.).
There are two main approaches to get sparse (and if necessary non-negative) representations. In the first approach, it is assumed that the overcomplete kernels are known and the signal is projected on the bases to get a sparse representation. This approach has been used for speech processing [A9]. In [xx], Gabor Jets are used to generate sparse representations for image. The second approach used in this work is to assume that the kernels are unknown and to find the kernels by optimizing a cost function comprising an error function with additional constraints for sparseness and/or non-negativity. The advantage of the second approach is that it does not need any a priori assumption on the shape of the kernels and the kernels are adapted to the underlying training signal resulting in more flexible kernels, while the advantage of the first approach is a faster convergence rate.
Shift and size invariance are the key points in the sparse coding parameter considered in this report. In [A14], Simoncelli et al have shown that although sparse representations with wavelets can be obtained, the aforementioned representations are not shift and size invariant. The reason why shift invariance is achieved in our paradigm is the overcompleteness of the bases.
The following non-restrictive illustrative embodiments describe various techniques to find solutions for the second paradigm used to extract fiducial regions in ID photos.
In one embodiment a deterministic approach based on constrained steepest gradient is used. As explained hereinbelow, a cost function for sparse non-negative matrix factorization is non-convex. Therefore, a deterministic approach gets stuck in local minima. In another embodiment, a probabilistic simulated annealing is used to find an optimal global solution.
Sparse Non-Negative Matrix Factorization Based on Gradient Projection Optimization
This embodiment is a deterministic approach for finding a sub-optimal solution by steepest descent.
The optimization problem in hand is the following:
minimize f=∥v−wh∥+Συ (8)
such that
where kurt(x) is the kurtosis of x. x can either contain both w and h or one of them.
is a regularization term. Direct optimization of this constrained problem can become ill-posed and time consuming. Therefore, a gradient projection method is used for this embodiment. The pertaining method is based on projecting a search direction into a subspace tangent to the active constraints. More specifically the method proposed by Haug and Arora [A15] is used, this method being more suitable for nonlinear gradient projection optimization. The algorithm consists of two phases. In the first phase (projection move), optimization is done along the tangent linearized cost function with constraints. In the second phase, the restoration move is done by bringing the parameters back to the constraints boundaries. The approach of this embodiment is different from the geometrical gradient approach proposed by [xx]. The method proposed by [xx] is limited to the L1-norm/L2-norm ratio proposed therein and cannot be extended to other sparseness measures such as population kurtosis used in [A12]. In the method of this embodiment, a sparseness constraint can be replaced without altering undertaken steps. In addition, the method according to the present embodiment can impose sparseness constraint on both w and h. This is not the case for the method proposed in [xx] in which either w or h must be chosen sparse but not both. The LNMF method proposed by Li et al. [A16] uses the sum of the square of coefficients as a sparseness measure. This approach performs better than the original NMF (Normalized Matrix Normalization) but extracts cheeks, forehead, and jaw that are not discriminant features for recognition.
The method according to the present embodiment is as follows:
x_{i+1}=x_{i}+αs−N(N^{T}N)^{−1}g_{α} (12)
FIG. 6 shows the evolution of the kurtosis for extracting of a NMF basis for a dataset of 20 different signals. Each signal is contains 100 samples.
Similarly, FIG. 7 shows the evolution of the mean-squared error for extracting an NMF basis for a dataset of 20 different signals. Each signal is contains 100 samples.
The method of gradients is not very effective for finding a global minimum of a cost function associated with sparse non-negative matrix factorization. Therefore, simulated annealing is used.
Simulated annealing (SA) is a generic probabilistic for the global optimization problem, namely locating a good approximation to the global optimum of a given function in a large search space.
The name and inspiration come from annealing in metallurgy, a technique involving heating and controlled cooling of a material to increase the size of its crystals and reduce their defects. The heat causes the atoms to become unstuck from their initial positions (a local minimum of the internal energy) and wander randomly through states of higher energy; the slow cooling gives them more chances of finding configurations with lower internal energy than the initial one.
By analogy with this physical process, each step of the SA algorithm replaces the current solution by a random “nearby” solution, chosen with a probability that depends on a difference between corresponding function values and on a global parameter T, called the temperature, that is gradually decreased during the process. The dependency is such that the current solution changes almost randomly when T is large, but increasingly “downhill” as T goes to zero. The allowance for “uphill” moves saves the method from becoming stuck at local minima—which are the bane of greedier methods.
The basic steps are as follows:
One essential requirement for the transition probability P is that it must be nonzero when e′>e, meaning that the system may move to the new state even when it is worse (has a higher energy) than the current one. It is this feature that prevents the method from becoming stuck in a local minimum—a state whose energy is far from being minimum, but is still less than that of any neighbor.
On the other hand, when T goes to zero, the probability P must tend to zero if e′>e, and to a positive value if e′<e. That way, for sufficiently small values of T, the system will increasingly favor moves that go “downhill” (to lower energy values), and avoid those that go “uphill”. In particular, when T becomes 0, the procedure will reduce to the greedy algorithm—which makes the move if and only if it goes downhill.
The P function is usually chosen so that the probability of accepting a move decreases when the difference e′−e increases—that is, small uphill moves are more likely than large ones. However, this requirement is not strictly necessary, provided that the above requirements are met.
Given these properties, the evolution of the state s depends crucially on the temperature T. Roughly speaking, the evolution of s is sensitive only to coarser energy variations when T is large, and to finer variations when T is small.
Sometimes a problem may arise when one approaches what is known as a local minimum, in this case, a set of numbers that is the “most optimized” for its current “region”. In an attempt to find a better optimization, this technique may use various methods to “jump out of” the current “pit”, such as searching for better optimizations randomly by a factor of the inverse amount of the previous adjustment. Keep in mind that implementations of this method are strictly problem specific, and so the way in which one finds an optimization will vary from problem to problem.
In constrained simulated annealing, the search space is constrained to some geometrical configuration. For instance, in non-negative matrix factorization the search space cannot contain negative values. It is simple to implement constrained simulated annealing. For each iteration, the new values are checked to see whether they meet the constraints or not. If they do, the algorithm keeps the values as a potential solution to the problem, if they do not it will discard them. More specifically, in the non-negative matrix factorization problem, all solutions with negative values are discarded.
The Cost Function for the Sparse NMF in Conjunction with Simulated Annealing
The cost function must meet the following two requirements:
The above-mentioned values are the L_{1 }norm of w and h. It has been shown in [A17] that the aforementioned criterion is equivalent to using a Laplacian prior p(w)=(1/2)e^{−w }and p(h)=(1/2)e^{−w }for w and h respectively in the generative model for sparse coding (see also [A8]). In general using the L□ norm enhances sparsity (with 0<□<1).
Note that if w and h are whitened and □=4, the previous criterion becomes equivalent to the population kurtosis used in [xx].
Using the L□ norm as a sparsity criterion gives the following cost function to optimize for the application in hand:
q_{1 }and q_{2 }are the target sparseness for the basis and the weights respectively. As soon as the targets are reached, these constraints are set to zero. Note that there is no guaranty that f is unimodal for □<1. That is why simulated annealing is used to circumvent local minima. The cost function imposes that each basis (h(i,:)) be sparse (note that the sparseness is not imposed on the whole vector h but on each basis separately). Note that the kurtosis is not used as a sparsity measure in contrast with sparse NMF with gradient descent. In fact, simulation results have shown that using kurtosis with simulated annealing is very slow and does not converge in a reasonable computational time.
One other important issue is that the cost function f is optimized over the product wh. Therefore, w can become very large and h very small, and still the product wh remains unchanged. Large values result in large L□ norm, and slow or no convergence. This normalization is implicity implemented in the update formula of the original non-negative matrix factorization [xx] or in the modified version of the sparse basis generation in [A10]. However, this normalization is not implicitly included in our cost function. Therefore, at each iteration each row of h is normalized as follows:
h_{j}=h_{j}/∥h_{j}∥_{2} (19)
Where h_{j }stands for the row j of h. This is a very crucial step, because without normalization no convergence is reached. The code of the whole process is in the file “loss_one.m” which is called by the “anneal.m” function in the following manner:
[minimum, fval]=anneal((@loss_one,0.1*rand(1, number), options, faces, k) (20)
number is the number of elements in w and h. k is the number of basis. options is a structure used by “anneal” for the simulation annealing parameters. The options used for our simulation is saved in “options.m”. faces are the training images.
The swimmer database consists of toy objects used to test the effectiveness of sparse NMF algorithms. It consists of 256 different configurations of torso, legs, etc.
FIG. 8 shows some of the 256 swimmer database configurations.
Using the sparse NMF simulated annealing approach, we obtain a part-based coding as depicted in FIG. 8.
In some simulations a constraint is only imposed either on w or on h, but not on both of them. In this case, it is not necessary to perform a simulated annealing parameter search on both h and w.
Without loss of generality, one can suppose that we want to find sparse bases (h) and non-sparse (w) (the opposite case is also treated in the same way). The following modified algorithm will accelerate the process. The cost function to optimize is the following:
f=|V−WH|+sparse(H) (21)
sparse(H) is the constraint imposed on H (it can be the kurtosis, the L2/L1, or any other criterion). H and W are matrices and h and w are their vectorized version. The algorithm is as follows:
W=VH^{+}=VH^{T}(HH^{T})^{−1} (22)
If the problem is ill posed, use the Tikhonov regularization:
W=(H^{T}H+α^{2}I)^{−1}H^{T}V (23)
To see the advantage of this method. Suppose it is desired to extract 60 bases from a database of 1000 images. Each image is a 50*50 pixel image. Therefore, the vector v has 100*2500 elements, the matrix H will have 60*2500=150000 elements and the matrix W will have 30*1000=30000 elements. In this case, the computational complexity is reduced by 30000/150000=20%, because the parameter search by simulated annealing is done only on H and not on both H and W.
FIGS. 9 and 10 show a block diagram for a training and recognition paths of the proposed algorithm.
A toy face recognition database was developed, as depicted in FIG. 11.
The same sparse NMF simulated annealing approach was applied to this database to extract 12 (FIG. 12) and 6 (FIG. 13) bases. In each case, the approach tries to find the best combinations from which all images in the initial database can be reproduced.
The CBCL+MIT database is used to test the system. Ninety (90) different photos of this database is used for this purpose, 40 of which are shown in FIG. 14.
Just by using ten bases, the cost function described above decreased from 1139 to 3 in 200 iterations. The original temperature of the simulated annealing was 1.0 and the final reached temperature was 0.00002. At each iteration, the system has been cooled down by an amount of 5% from the previous temperature. As seen in FIG. 15, the bases are part-based representations that characterize some fiducial points.
The following table gives the parameters used for the simulated annealing:
Applications of NMF coding comprise the following:
A RN-Spikes model was also created specifically for an audio application (source separation). FIG. 17 illustrate a RN-Spikes matrix audio oscillator model on a discrete time simulator, and FIG. 17 shows an oscillator model on a discrete time simulator.
The neuron block models a Terman-Wang oscillator characterized by the following equations and whose output (x) is illustrated in FIG. 18.
{dot over (x)}=f(x)−y+I (24)
{dot over (y)}=ε(g(x)−y) (25)
f(x)=3x−x^{3}+2 (26)
g(x)=α(1+tan h(x/β)) (27)
However, the architecture is different. Only one layer is used and the neurons are fully connected (each neuron is connected to all neurons). It is then possible to store the connections in only one matrix. Each column of this matrix represents the connection weights of a neuron with all others (the connection for a neuron with itself is 0). As for the weights, they are computed with equation (28). These weights are constant throughout the simulation and they are determined by the difference between neuron i input value and neuron j input value (pi and pj).
For example, with maxweight equals to 0.2 and difcoef equals to 0.5, if neuron i input is 20 and neuron j input is 10, the connection weight would be 0.0013.
The inputs/outputs list for the network is simple and given in Table 2:
TABLE 2 | |
Inputs/Outputs list | |
Inputs | |
neuronw | neuron connections activated at the preceding time step |
Global | connection to the Global Controller |
Reset | oscillator reset value |
randx | oscillator parameter x initial condition |
randy | oscillator parameter y initial condition |
Outputs | |
Spikes | neurons output (1 if a spike is produced, else 0) |
At each time step, an output vector is generated (output Spikes that contains the presence or absence of a spike for each neuron), delayed, multiplied with the weight matrix and returned as the neurons input for the next time step (input vector neuronw).
As an example, with the following neuron input values 20, 10, 10, 10, 20 and 10, the computed weight matrix would be:
TABLE 3 | |||||
Example of weight matrix for six neurons | |||||
with the input values [20 10 10 10 20 10] | |||||
0 | 0.0013 | 0.0013 | 0.0013 | 0.2 | 0.0013 |
0.0013 | 0 | 0.2 | 0.2 | 0.0013 | 0.2 |
0.0013 | 0.2 | 0 | 0.2 | 0.0013 | 0.2 |
0.0013 | 0.2 | 0.2 | 0 | 0.0013 | 0.2 |
0.2 | 0.0013 | 0.0013 | 0.0013 | 0 | 0.0013 |
0.0013 | 0.2 | 0.2 | 0.2 | 0.0013 | 0 |
Furthermore, a normalization is applied to the weight matrix. We divide each column by the number of weights greater than a defined value in this column plus 1 (to avoid a division by zero produced by the diagonal alone).
To simulate the RN-Spikes audio model with the Wang and Terman neurons:
An integrate and fire (IaF) RN-Spikes audio model has also been created. Only the neuron model block has been replaced. FIG. 19 illustrates a RN-Spikes matrix audio IaF model on a discrete time simulator while FIG. 20 illustrates an IaF model on a discrete time simulator.
The IaF inputs/outputs list is given in Table 4:
TABLE 4 | ||
Inputs/Outputs list | ||
Inputs | ||
neuronw | neuron connections activated at the preceding time | |
step | ||
Global | connection to the Global Controller | |
randx | neuron initial condition | |
Outputs | ||
Spikes | neurons output (1 if a spike is produced, else 0) | |
The neuron block breaks down to an adder and a Discrete-Time Integrator. At each time step, the block adds the signals from its neighbors (neuronw), the effect of the Global Controller (Global) and a constant that defines the spiking frequency (iext). It also subtracts the value computed by the Discrete-Time Integrator.
If the sum crosses the threshold, a spike is generated (the output equals 1 for one time step) and the sum is put to zero (through a feedback loop connected to the Discrete-Time Integrator Reset). FIG. 21 shows the IaF model's output (x).
Event driven Implementation in C/C++
FIG. 22 represent an event driven model. Following the event driven approach, at each iteration, the goal is to find the instant where the state changes and to update the model at this instant. The algorithm can be represented by a BFS (Breadth First Search). During an iteration (FIG. 23), the earliest neuron to fire is named 1. Neurons around neuron 1, should then fire because of neuron's 1 spike (designed as neurons 2). Then neurons 2's neighbors receive in turn a spike which can lead them to fire (neurons 3). The iteration ends when no more neuron have their potential exceeding the threshold.
Referring back to FIG. 22, during an iteration, step 4 is useful to optimize the performance. Indeed, through the simulation an exhaustive search is performed on the entire layer (or network) to find the neurons ready to fire. However, a local search limited to the immediate neighborhood of the first neuron to discharge could be done. This strategy is interesting if we use conventional serial computers. On the other hand, limited gain is offered for a hardware implementation.
This section presents various strategies to enhance the neural network features and ease the implementation for real time integration.
The system has two modes of initialization which can be chosen by the user. The first mode consists in randomly setting the internal potentials of each neuron independently of the inputs. A second mode consists in setting up the initial internal potentials in relation to the inputs. The inputs can be any signals. We illustrate here one implementation of the second mode in the context of images, the procedure can be used with anything else.
Since connection weights rely mainly on input (pixel) values, we opted for a normalization of input (pixel) values from the range 0-255 to 0-1. Indeed, each grey level is attributed a corresponding initial potential NeuronInitPotential:
where inputRange is the range of the input values. Depending on the application in hand FireTime is a constant (equals to 1) or the estimated instant of discharge of the neuron. α is constant (smaller than 1) and constraints the initial neuron potential to be less than 1.
For example, in the context of face recognition we have
This modification helps the segmentation phase of ODLM, diminishing the quantity of segmentation's iterations needed before stabilization. It also gives us the flexibility to use any image for neurons' potentials initialization.
It is possible to modify the behavior of the neural network with different strategies in the normalization of weights and contributions of neurons. In this section we illustrate some of them based on the following equations.
The normalization of contributions when there are discharges plays a crucial role in the synchronization of neurons. For example, when it is necessary to guaranty a constant period of discharges (especially when using simplified models of spiking neurons—like the integrate and fire model) the weights in the networks have to be normalized. That is, each neuron needs to receive the same sum of activities for a given iteration, or there could arise unwanted frequencies distinctions between regions.
Two solutions are presented and compared here. The first strategy does a local normalization while the second strategy takes into consideration all activities.
Example of implementation for a network with different firing periods after stabilization Otherwise, bypass ‘send weights to neighbors’ and go to next neuron without sending contributions. Next, if all neurons of the image were verified, an indicator tells if there were any discharges. If not, the iteration is completed, otherwise go back to the first neuron and starts all over the verification process for all neurons of the image.
FIG. 24 represents the flow of information for one type of implementation.
Examples of an Implementation Yielding a Common Firing Frequency after Stabilization
The second strategy is summarized in equation 34 and in FIG. 25.
Potential is the sum of the current potential with the normalized contributions. These normalized contributions correspond to the term S_{i,j}(t) of equation 31.
ContributionsSum is the full sum of all contributions a given neuron receives from other discharging neurons during the discharge checking process of all neurons—that is at the time corresponding to stage Last neuron checked? with a positive answer (yes). ContributionsSum corresponds to the term w_{i,j,k,m}^{. . . }(t) of equation 31. The NumberOfContributions is the number of neurons who contribute to ContributionSum—that is the number of discharging neurons who give some potential to the considered neuron. It corresponds to the term Card of equation 32.
Where
corresponds to the term e^{λ|p(i;j;t)−p(k;m;t)|} of equation 32 and MaxWeight_{i }to the term w_{max}^{. . . }(t) of equation 32. PossibleNumberOfNeighbors_{i }is a static normalization, hence Weight_{ij }is a static value for each neuron in the context of static images. We define ActiveNeighbors as the dynamic state of the equation 33.
The global coupling
with equation 35 is not constant yielding a change in the oscillation frequencies. However, if we remove the normalization based on the number of possible neighbors, the global coupling
is constant.
When the current i in the neuron (from one iteration to another one) can be assumed to be constant (or almost constant), it is possible to increase the speed of the system.
On each simulation events, we need to evaluate time before spiking and actual internal potential of neurons. Depending on the model in use, several translations between time and potential occurs requesting many evaluations of equations. However, in many scenarios, both parameters are related or function of the other. It is then possible to only keep one value in memory and only proceed with translation when required. For performance reasons, one should keep the parameter involved in most of processing inside the simulation.
In our model, we define u as the internal potential of a neuron, t the time before the next spiking and delta the delay between actual and the next spiking (delta is also the increment of time for the next iteration). u and t are related as shown by the following equations:
As both translations require logarithm and exponential, and one iteration can request thousands, processing time is greatly improved if we can eliminate some. u is used to accumulate contributions from connected neurons. During an iteration, each spiking neuron generates potential and all connected neurons add this potential to its internal. This parameter if frequently used during iteration.
The t parameter is generally used to find the next firing neuron by scanning each one to find the smallest t or preferably delta. As per the equation (37) finding the smallest t is the same as finding the greatest u. With this u, we can evaluate “delta” for the next iteration (time step) using equation (38).
To be able to use only u for all operations of ODLM, one need to express all internal equations using only u and delta. Equation (39) shows the next potential (u) of a neuron after the delay of one iteration (after delta). Developing this equation using equation (38), one get equation (40) which expresses the internal potential of a neuron after elapsed time.
u′=i−ie^{−(}t+Δ) (39)
u′−i−(i−u)e^{−Δ} (40)
Some differences were noted on some simulations when number of iterations is small (less then 500), but with larger simulations, results are identical. These differences may be due to quantizations during multiple translations between t and u not present in the optimized version.
Finally, an other optimization is possible from equation (40). Since delta is constant for one iteration, e^{−delta }is also constant, meaning that we only have one exponential by cycle. Simulation results showed 50% improvement in processing time for the same files provided as input.
Adding segmentation's effects in matching stage: labelling each segment with an averaged color
It is possible to adapt the segmentation so that it has a greater contribution to the matching and increases the power of the neural network.
A process is being added to evaluate and associate an average of pixel's color to each candidate segment (or region). Connection weights between layers are modified to take into consideration the averaged segment color.
Description of the Algorithm
ExtraWeightsForLayer[(r1 * col) + c1][(r2 * col) + c2] = connect_weight | |
(wmax_extra,( | |
fabs(valeurPixel(matrix[r1][c1].region, /* reference to the region | |
of this pixel */ | |
n, | /* number of different regions on both layers */ |
hist, | /* histogram (table)of number of pixels by region */ |
val, | /* index of regionID(table) */ |
MeanPixel) | /* sum of pixel values(table) by region */ |
valeurPixel(matrixOther[r2][c2].region, /* reference to the region | |
of the connected */ | |
/* neuron on the other layer */ | |
n, | /* number of different regions on both layers */ |
hist, | /* histogram (table)of number of pixels by region */ |
val, | /* index of regionID(table) */ |
MeanPixel) | /* sum of pixel values(table) by region */ |
) * _contrib_seg + | /* Contribution factor of segmentation average */ |
/* value comme from simulation parameters */ | |
fabs(matrix[r1][c1].pixel − matrixOther[r2][c2].pixel) * | |
(1 − _contrib_seg)), | |
/* contribution from pixel's value differences */ | |
/* from connected neurons */ | |
matrix[r1][c1].neighbour_match, /* number of connections to this | |
neuron */ | |
alpha_extra); /* alpha for extra layer connection */ | |
First, “connect_weight” performs the calculation of the coefficient, or weight, to be used for the considered connection. This function has 4 parameters: weight max, pixel values differences, number of connections for the originating neuron, alpha constant for extra layer.
The second function “valeurPixel” only finds the neuron's regions and return the averaged colors for this region.
Altering extra layer connection weights using P^{2}/S ratios for the matching stage.
It is assumed here that the segmentation has been completed and we alter the weights W_{i,j,k,m}^{ext}(t) between neurons (i,j) from one layer and neurons (k,m) from another layer. During matching, this alteration forces the system to take into account the shape of the segments.
Let us define P_{i,j }as being the perimeter of the segment associated to neuron (i,j) and P_{k,m }the perimeter associated to the segment of neuron (k,m).
Let us define S_{i,j }as being the surface of the segment associated to neuron (i,j) and S_{k,m }the surface associated to the segment of neuron (k,m).
A ratio parameter
that characterizes the shape of the segment associated to neuron (i,j) is derived. That parameter is known to be independent of translations, rotations and homotheties for a given shape. This ratio is used as a comparison factor to ease the matching between segments with similar shapes. In general when shapes are similar, these ratios tend to be equal. We recall that
is independent from sizes of shapes.
In RN-Spikes, surfaces S_{ij }are defined as the number of synchronous neurons with the same phase belonging to the same segment. Perimeters P_{ij }are the number of neurons that have at least one neighbor on a different region (in a different segment).
There are many strategies to alter the external weights (weights between layers) w_{i;j;k;m}^{ext}(t). We illustrate on two examples.
as an argument of the connection weights
Starting from equation 4:
One can state that:
Note that R_{i,j;t }can be any other expression that characterizes the shape of a segment. By doing so and finding the suitable ε, it is possible to guide and focus the neural network on the segment's shapes. It it important to note that another function than the exponential can be used in the expression of the function f(i,j,k,m;t).
as a weighting factor of the connection weights
This time f is a kind of discrete function that is equal to 1 or to a constant (WMAX_POND) depending on the network activity and on the segment shapes.
When generating the connection weights table for extra layer connections, we multiply the maximum value W_{max }of w_{i;j;k;m}^{ext}(t) by WMAX_POND if the shapes of the 2 segments are comparable (that is: if
are close). This is detailed below.
CORR_TEST is a constant. Both CORR_TEST and WMAX_POND are parameters to be provided to the network. It is also possible to recursively adapt CORR_TEST and WMAX_POND depending on the convergence of the network.
To prevent small surfaces (like isolated neurons) to influence the results, we only implement this modification for regions presenting more than 0.5% of the image (this value can be modified depending on the application in hand).
Although the present invention has been disclosed in the foregoing non-restrictive description in relation to illustrative embodiments thereof, these embodiments can be modified at will within the scope of the appended claims without departing from the spirit and nature of the subject invention.