Neuromorphic Computing Changes Machine Learning

Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system. The term refers to the design of both hardware and software computing elements. Neuromorphic computing is sometimes referred to as neuromorphic engineering. 

Unlike some of the future computing technologies, numerous physical realisations of neuromorphic hardware are now currently under development or are even available for use to the research community. A number of research institutions have been working for the past few years to find new concepts of how computers can better process data in the future. 

One of these concepts is “neuromorphic computing”, a method of computer engineering in which aspects of a computer are modeled like human brain and nervous systems. Compared to traditional Artificial Intelligence (AI) algorithms that have to be trained on large amounts of data before they can be effective, neuromorphic computing systems can learn and adapt as they go.

With the machine learning world growing so quickly, German researchers have devised an efficient training method for neuromorphic computers. Florian Marquardt, a scientist at the Max Planck Institute for the Science of Light in Erlangen, Germany, explains: “We have developed the concept of a self-learning physical machine. The core idea is to carry out the training in the form of a physical process, in which the parameters of the machine are optimised by the process itself.”

The model will require external feedback to improve, as in training conventional artificial neural networks, but the self-learning physical machine the researchers propose makes the training much more efficient and saves energy.

“Our method works regardless of which physical process takes place in the self-learning machine, and we do not even need to know the exact process,” explains Marquardt. “However, the process must fulfill a few conditions. Most importantly, it must be reversible, meaning it must be able to run forwards or backward with a minimum of energy loss.”

Computer hardware today is based  on Von Neumann architecture, which is the opposite of a neuromorphic architecture.  The researchers state in their study that the von Neumann architecture currently used in electronic devices is highly inefficient for most machine-learning applications. 

“We hope to be able to present the first self-learning physical machine in three years.... We are therefore confident that self-learning physical machines have a strong chance of being used in the further development of AI.” said Marquardt.

Arxiv:     Intel:    Nature:    I-HLS:    TechTarget:    Frontiers:  Cambridge Consultants:   Interesting Engineering:

Image: Planet Volumes

You Might Also Read: 

Musk's Brain Chip Firm Gets US Approval for Human Analysis:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Cyber War Crimes Will Be Prosecuted
The Battlefield Transformed »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.