Neuromorphic Computing Changes Machine Learning

Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system. The term refers to the design of both hardware and software computing elements. Neuromorphic computing is sometimes referred to as neuromorphic engineering. 

Unlike some of the future computing technologies, numerous physical realisations of neuromorphic hardware are now currently under development or are even available for use to the research community. A number of research institutions have been working for the past few years to find new concepts of how computers can better process data in the future. 

One of these concepts is “neuromorphic computing”, a method of computer engineering in which aspects of a computer are modeled like human brain and nervous systems. Compared to traditional Artificial Intelligence (AI) algorithms that have to be trained on large amounts of data before they can be effective, neuromorphic computing systems can learn and adapt as they go.

With the machine learning world growing so quickly, German researchers have devised an efficient training method for neuromorphic computers. Florian Marquardt, a scientist at the Max Planck Institute for the Science of Light in Erlangen, Germany, explains: “We have developed the concept of a self-learning physical machine. The core idea is to carry out the training in the form of a physical process, in which the parameters of the machine are optimised by the process itself.”

The model will require external feedback to improve, as in training conventional artificial neural networks, but the self-learning physical machine the researchers propose makes the training much more efficient and saves energy.

“Our method works regardless of which physical process takes place in the self-learning machine, and we do not even need to know the exact process,” explains Marquardt. “However, the process must fulfill a few conditions. Most importantly, it must be reversible, meaning it must be able to run forwards or backward with a minimum of energy loss.”

Computer hardware today is based  on Von Neumann architecture, which is the opposite of a neuromorphic architecture.  The researchers state in their study that the von Neumann architecture currently used in electronic devices is highly inefficient for most machine-learning applications. 

“We hope to be able to present the first self-learning physical machine in three years.... We are therefore confident that self-learning physical machines have a strong chance of being used in the further development of AI.” said Marquardt.

Arxiv:     Intel:    Nature:    I-HLS:    TechTarget:    Frontiers:  Cambridge Consultants:   Interesting Engineering:

Image: Planet Volumes

You Might Also Read: 

Musk's Brain Chip Firm Gets US Approval for Human Analysis:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber War Crimes Will Be Prosecuted
The Battlefield Transformed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Agio

Agio

Agio is a hybrid managed IT and cybersecurity provider servicing the financial services, health care and payments industries.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Quartz Network

Quartz Network

Quartz Network is a curated community for change-makers, up-and-comers, and professionals who are ready to grow, adapt, and thrive.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Sec3

Sec3

Sec3 is a security and research firm providing bespoke audits and cutting edge tools to Web3 projects.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

Metrodata Group

Metrodata Group

PT. Metrodata Electronics, known as Metrodata Group, is the leading information communication technology company in Indonesia.