4,905 research outputs found
A spiking neural network for real-time Spanish vowel phonemes recognition
This paper explores neuromorphic approach capabilities applied to real-time speech processing. A spiking
recognition neural network composed of three types of neurons is proposed. These neurons are based on an
integrative and fire model and are capable of recognizing auditory frequency patterns, such as vowel phonemes;
words are recognized as sequences of vowel phonemes. For demonstrating real-time operation, a complete
spiking recognition neural network has been described in VHDL for detecting certain Spanish words, and it has
been tested in a FPGA platform. This is a stand-alone and fully hardware system that allows to embed it in a
mobile system. To stimulate the network, a spiking digital-filter-based cochlea has been implemented in VHDL.
In the implementation, an Address Event Representation (AER) is used for transmitting information between
neurons.Ministerio de Economía y Competitividad TEC2012-37868-C04-02/0
Modeling Fault Propagation Paths in Power Systems: A New Framework Based on Event SNP Systems With Neurotransmitter Concentration
To reveal fault propagation paths is one of the most critical studies for the analysis of
power system security; however, it is rather dif cult. This paper proposes a new framework for the fault
propagation path modeling method of power systems based on membrane computing.We rst model the fault
propagation paths by proposing the event spiking neural P systems (Ev-SNP systems) with neurotransmitter
concentration, which can intuitively reveal the fault propagation path due to the ability of its graphics models
and parallel knowledge reasoning. The neurotransmitter concentration is used to represent the probability
and gravity degree of fault propagation among synapses. Then, to reduce the dimension of the Ev-SNP
system and make them suitable for large-scale power systems, we propose a model reduction method
for the Ev-SNP system and devise its simpli ed model by constructing single-input and single-output
neurons, called reduction-SNP system (RSNP system). Moreover, we apply the RSNP system to the IEEE
14- and 118-bus systems to study their fault propagation paths. The proposed approach rst extends the
SNP systems to a large-scaled application in critical infrastructures from a single element to a system-wise
investigation as well as from the post-ante fault diagnosis to a new ex-ante fault propagation path prediction,
and the simulation results show a new success and promising approach to the engineering domain
Logic Negation with Spiking Neural P Systems
Nowadays, the success of neural networks as reasoning systems is doubtless.
Nonetheless, one of the drawbacks of such reasoning systems is that they work
as black-boxes and the acquired knowledge is not human readable. In this paper,
we present a new step in order to close the gap between connectionist and logic
based reasoning systems. We show that two of the most used inference rules for
obtaining negative information in rule based reasoning systems, the so-called
Closed World Assumption and Negation as Finite Failure can be characterized by
means of spiking neural P systems, a formal model of the third generation of
neural networks born in the framework of membrane computing.Comment: 25 pages, 1 figur
A Comprehensive Survey of Deep Learning in Remote Sensing: Theories, Tools and Challenges for the Community
In recent years, deep learning (DL), a re-branding of neural networks (NNs),
has risen to the top in numerous areas, namely computer vision (CV), speech
recognition, natural language processing, etc. Whereas remote sensing (RS)
possesses a number of unique challenges, primarily related to sensors and
applications, inevitably RS draws from many of the same theories as CV; e.g.,
statistics, fusion, and machine learning, to name a few. This means that the RS
community should be aware of, if not at the leading edge of, of advancements
like DL. Herein, we provide the most comprehensive survey of state-of-the-art
RS DL research. We also review recent new developments in the DL field that can
be used in DL for RS. Namely, we focus on theories, tools and challenges for
the RS community. Specifically, we focus on unsolved challenges and
opportunities as it relates to (i) inadequate data sets, (ii)
human-understandable solutions for modelling physical phenomena, (iii) Big
Data, (iv) non-traditional heterogeneous data sources, (v) DL architectures and
learning algorithms for spectral, spatial and temporal data, (vi) transfer
learning, (vii) an improved theoretical understanding of DL systems, (viii)
high barriers to entry, and (ix) training and optimizing the DL.Comment: 64 pages, 411 references. To appear in Journal of Applied Remote
Sensin
PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific Features
Designing an end-to-end deep learning network to match the biometric features
with limited training samples is an extremely challenging task. To address this
problem, we propose a new way to design an end-to-end deep CNN framework i.e.,
PVSNet that works in two major steps: first, an encoder-decoder network is used
to learn generative domain-specific features followed by a Siamese network in
which convolutional layers are pre-trained in an unsupervised fashion as an
autoencoder. The proposed model is trained via triplet loss function that is
adjusted for learning feature embeddings in a way that minimizes the distance
between embedding-pairs from the same subject and maximizes the distance with
those from different subjects, with a margin. In particular, a triplet Siamese
matching network using an adaptive margin based hard negative mining has been
suggested. The hyper-parameters associated with the training strategy, like the
adaptive margin, have been tuned to make the learning more effective on
biometric datasets. In extensive experimentation, the proposed network
outperforms most of the existing deep learning solutions on three type of
typical vein datasets which clearly demonstrates the effectiveness of our
proposed method.Comment: Accepted in 5th IEEE International Conference on Identity, Security
and Behavior Analysis (ISBA), 2019, Hyderabad, Indi
- …