Neuromorphic Computing Changes Machine Learning

Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system. The term refers to the design of both hardware and software computing elements. Neuromorphic computing is sometimes referred to as neuromorphic engineering. 

Unlike some of the future computing technologies, numerous physical realisations of neuromorphic hardware are now currently under development or are even available for use to the research community. A number of research institutions have been working for the past few years to find new concepts of how computers can better process data in the future. 

One of these concepts is “neuromorphic computing”, a method of computer engineering in which aspects of a computer are modeled like human brain and nervous systems. Compared to traditional Artificial Intelligence (AI) algorithms that have to be trained on large amounts of data before they can be effective, neuromorphic computing systems can learn and adapt as they go.

With the machine learning world growing so quickly, German researchers have devised an efficient training method for neuromorphic computers. Florian Marquardt, a scientist at the Max Planck Institute for the Science of Light in Erlangen, Germany, explains: “We have developed the concept of a self-learning physical machine. The core idea is to carry out the training in the form of a physical process, in which the parameters of the machine are optimised by the process itself.”

The model will require external feedback to improve, as in training conventional artificial neural networks, but the self-learning physical machine the researchers propose makes the training much more efficient and saves energy.

“Our method works regardless of which physical process takes place in the self-learning machine, and we do not even need to know the exact process,” explains Marquardt. “However, the process must fulfill a few conditions. Most importantly, it must be reversible, meaning it must be able to run forwards or backward with a minimum of energy loss.”

Computer hardware today is based  on Von Neumann architecture, which is the opposite of a neuromorphic architecture.  The researchers state in their study that the von Neumann architecture currently used in electronic devices is highly inefficient for most machine-learning applications. 

“We hope to be able to present the first self-learning physical machine in three years.... We are therefore confident that self-learning physical machines have a strong chance of being used in the further development of AI.” said Marquardt.

Arxiv:     Intel:    Nature:    I-HLS:    TechTarget:    Frontiers:  Cambridge Consultants:   Interesting Engineering:

Image: Planet Volumes

You Might Also Read: 

Musk's Brain Chip Firm Gets US Approval for Human Analysis:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber War Crimes Will Be Prosecuted
The Battlefield Transformed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Blattner Technologies

Blattner Technologies

Blattner Technologies mission is to be the leading provider of predictive transformation services and tools in the Data Analytics, Artificial Intelligence and Machine Learning industry.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.