SlideShare une entreprise Scribd logo
1  sur  14
1
Autocorrelators
Dept. of Computer Science & Engineering
2013-2014
Presented By:
Ranjit R. Banshpal
Mtech 1st sem (CSE)
Roll NO.18
1
A
seminar on
G.H. Raisoni College of Engineering Nagpur
1
Autocorrelators
 Autocorrelators easily recognized by the title of Hopfield
Associative Memory (HAM).
 First order autocorrelators obtain their connection matrix by
multiplying a pattern’s element with every other pattern’s elements.
 A first order autocorrelator stores M bipolar pattern
A1,A2,………,Am by summing together m outer product as
Here,
is a (p × p) connection matrix and
p
 The autocorrelator’s recall equation is vector-matrix
multiplication,
 The recall equation is given by,
=f ( )
Where Ai=(a1,a2,…..,ap) and two parameter
bipolar threshold function is,
1, if α > 0
f(α , β )= β, if α = 0
-1, if α < 0
Working of an autocorrelator
Consider the following pattern,
A1=(-1,1,-1,1)
A2=(1,1,1,-1)
A3=(-1,-1,-1,1)
The connection matrix,
3 1 3 -3
4×1 1×4 1 3 1 -1
3 1 3 -3
-3 -1 -3 3
Recognition of stored patterns
 The autocorrelator is presented stored pattern
A2=(1,1,1,-1)
With the help of recall equation
= f ( 3 + 1 + 3 + 3, 1 ) = 1
= f ( 6, 1 ) = 1
= f ( 10, 1 ) = 1
= f ( -10, 1 ) = -1
Recognition of noisy patterns
 Consider a vector A’=(1,1,1,1) which is a
distorted presentation of one among the store pattern
 With the help of Hamming Distance measure we
can find noisy vector pattern
 The Hamming distance (HD) of vector X from Y,
given X=(x1,x2,….,xn) and Y=(y1,y2,….,yn) is given
by,
HD( x, y ) =
Heterocorrelators : Kosko’s discrete BAM
 Bidirectional associative memory (BAM) is two level
nonlinear neural network
 Kosko extended the unidirectional to bidirectional
processes.
 Noise does not affect performance
 There are N training pairs
{(A1,B1),(A2,B2),….,(Ai,Bi),……,(An, Bn)} where
Ai=(ai1,ai2,…….,ain)
Bi =(bi1,bi2,……,bip)
Here, aij or bij is either ON or OFF state
In binary mode, ON = 1 and OFF = 0 and
In bipolar mode, ON = 1 and OFF = -1
 Formula for correlation matrix is,
 Recall equations,
Starting with (α, β) as the initial condition, we determine the
finite sequence (α’, β’ ),(α’’, β’’),…….., until equilibrium
point (αF, β F ) is reached.
Here ,
β’ = ϕ (αM)
α’ = ϕ (β’ MT)
Φ(F) = G = g1, g2, …., gn
F = ( f1,f2,….,f n)
1 if fi > 0
0 (binary)
gi = , fi < 0
-1 (bipolar)
previous gi, fi = 0
Addition and Deletion of Pattern Pairs
If given set of pattern pairs (Xi, Yi) for i=1,2,….,n
 Then we can be added (X’,Y’) or can be deleted (Xj,Yj)
from the memory model.
 In the case of addition,
 In the case of deletion,
Energy function for BAM
 The value of the energy function for
particular pattern has to occupy a minimum
point in energy landscape,
 Adding new patterns do not destroy
previously stored patterns.
 Hopfield propose an energy function as,
E(A) = -AMAT
 Kosko propose an energy function as,
E(A,B)= - AMBT
 If energy function for any point (α, β) is given by
E = - αMβT
 If energy E evaluate using the coordinates of the pair
(Ai,Bi),
 Working of Kosko’s BAM
Step 1:
converting to bipolar forms
 Step 2:
The matrix M is calculated as,
 Step 3:
Retrieve the associative pair
β’ = ϕ (αM)
α’ = ϕ (β’ MT)
THANK YOU…!!!

Contenu connexe

Tendances

Les symboles des portes logiques
Les symboles des portes logiquesLes symboles des portes logiques
Les symboles des portes logiquesmorin moli
 
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...Hemantha Kulathilake
 
Analysis sequential circuits
Analysis sequential circuitsAnalysis sequential circuits
Analysis sequential circuitsG Subramaniamg
 
Magnitude comparator
Magnitude comparatorMagnitude comparator
Magnitude comparatorSyed Saeed
 
Chapter 2 amplitude_modulation
Chapter 2 amplitude_modulationChapter 2 amplitude_modulation
Chapter 2 amplitude_modulationHattori Sidek
 
Application of DSP in Biomedical science
Application of DSP in Biomedical scienceApplication of DSP in Biomedical science
Application of DSP in Biomedical scienceTaslima Yasmin Tarin
 

Tendances (7)

Les symboles des portes logiques
Les symboles des portes logiquesLes symboles des portes logiques
Les symboles des portes logiques
 
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
COM2304: Intensity Transformation and Spatial Filtering – I (Intensity Transf...
 
Analysis sequential circuits
Analysis sequential circuitsAnalysis sequential circuits
Analysis sequential circuits
 
Magnitude comparator
Magnitude comparatorMagnitude comparator
Magnitude comparator
 
Chapter 2 amplitude_modulation
Chapter 2 amplitude_modulationChapter 2 amplitude_modulation
Chapter 2 amplitude_modulation
 
Adder and subtrctor DLD
Adder and subtrctor  DLDAdder and subtrctor  DLD
Adder and subtrctor DLD
 
Application of DSP in Biomedical science
Application of DSP in Biomedical scienceApplication of DSP in Biomedical science
Application of DSP in Biomedical science
 

Similaire à Autocorrelators1

AUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATORAUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATORsowfi
 
02-Basic Structures .ppt
02-Basic Structures .ppt02-Basic Structures .ppt
02-Basic Structures .pptAcct4
 
Multilinear Twisted Paraproducts
Multilinear Twisted ParaproductsMultilinear Twisted Paraproducts
Multilinear Twisted ParaproductsVjekoslavKovac1
 
Declare Your Language: Constraint Resolution 2
Declare Your Language: Constraint Resolution 2Declare Your Language: Constraint Resolution 2
Declare Your Language: Constraint Resolution 2Eelco Visser
 
Problem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docxProblem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docxelishaoatway
 
A Dimension Abstraction Approach to Vectorization in Matlab
A Dimension Abstraction Approach to Vectorization in MatlabA Dimension Abstraction Approach to Vectorization in Matlab
A Dimension Abstraction Approach to Vectorization in MatlabaiQUANT
 
Cgo2007 P3 3 Birkbeck
Cgo2007 P3 3 BirkbeckCgo2007 P3 3 Birkbeck
Cgo2007 P3 3 BirkbeckaiQUANT
 
Auto Regressive Process (1) with Change Point: Bayesian Approch
Auto Regressive Process (1) with Change Point: Bayesian ApprochAuto Regressive Process (1) with Change Point: Bayesian Approch
Auto Regressive Process (1) with Change Point: Bayesian ApprochIJRESJOURNAL
 

Similaire à Autocorrelators1 (13)

AUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATORAUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATOR
 
02-Basic Structures .ppt
02-Basic Structures .ppt02-Basic Structures .ppt
02-Basic Structures .ppt
 
Multilinear Twisted Paraproducts
Multilinear Twisted ParaproductsMultilinear Twisted Paraproducts
Multilinear Twisted Paraproducts
 
My MSc. Project
My MSc. ProjectMy MSc. Project
My MSc. Project
 
Declare Your Language: Constraint Resolution 2
Declare Your Language: Constraint Resolution 2Declare Your Language: Constraint Resolution 2
Declare Your Language: Constraint Resolution 2
 
Problem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docxProblem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docx
 
Madrid easy
Madrid easyMadrid easy
Madrid easy
 
A Dimension Abstraction Approach to Vectorization in Matlab
A Dimension Abstraction Approach to Vectorization in MatlabA Dimension Abstraction Approach to Vectorization in Matlab
A Dimension Abstraction Approach to Vectorization in Matlab
 
Cgo2007 P3 3 Birkbeck
Cgo2007 P3 3 BirkbeckCgo2007 P3 3 Birkbeck
Cgo2007 P3 3 Birkbeck
 
Mtk3013 chapter 2-3
Mtk3013   chapter 2-3Mtk3013   chapter 2-3
Mtk3013 chapter 2-3
 
Auto Regressive Process (1) with Change Point: Bayesian Approch
Auto Regressive Process (1) with Change Point: Bayesian ApprochAuto Regressive Process (1) with Change Point: Bayesian Approch
Auto Regressive Process (1) with Change Point: Bayesian Approch
 
Chap05alg
Chap05algChap05alg
Chap05alg
 
Chap05alg
Chap05algChap05alg
Chap05alg
 

Plus de ranjit banshpal

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...ranjit banshpal
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESranjit banshpal
 
Secure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and HashesSecure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and Hashesranjit banshpal
 
Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...ranjit banshpal
 
Parallelization using open mp
Parallelization using open mpParallelization using open mp
Parallelization using open mpranjit banshpal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviationranjit banshpal
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 

Plus de ranjit banshpal (15)

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
 
Secure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and HashesSecure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and Hashes
 
LCT in day2 day life
LCT in day2 day lifeLCT in day2 day life
LCT in day2 day life
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
“Web crawler”
“Web crawler”“Web crawler”
“Web crawler”
 
Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...
 
Parallelization using open mp
Parallelization using open mpParallelization using open mp
Parallelization using open mp
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviation
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Static Networks
Static NetworksStatic Networks
Static Networks
 
Ranjitbanshpal
RanjitbanshpalRanjitbanshpal
Ranjitbanshpal
 
Ranjitbanshpal1
Ranjitbanshpal1Ranjitbanshpal1
Ranjitbanshpal1
 

Dernier

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Dernier (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Autocorrelators1

  • 1. 1 Autocorrelators Dept. of Computer Science & Engineering 2013-2014 Presented By: Ranjit R. Banshpal Mtech 1st sem (CSE) Roll NO.18 1 A seminar on G.H. Raisoni College of Engineering Nagpur 1
  • 2. Autocorrelators  Autocorrelators easily recognized by the title of Hopfield Associative Memory (HAM).  First order autocorrelators obtain their connection matrix by multiplying a pattern’s element with every other pattern’s elements.  A first order autocorrelator stores M bipolar pattern A1,A2,………,Am by summing together m outer product as
  • 3. Here, is a (p × p) connection matrix and p  The autocorrelator’s recall equation is vector-matrix multiplication,  The recall equation is given by, =f ( ) Where Ai=(a1,a2,…..,ap) and two parameter bipolar threshold function is, 1, if α > 0 f(α , β )= β, if α = 0 -1, if α < 0
  • 4. Working of an autocorrelator Consider the following pattern, A1=(-1,1,-1,1) A2=(1,1,1,-1) A3=(-1,-1,-1,1) The connection matrix, 3 1 3 -3 4×1 1×4 1 3 1 -1 3 1 3 -3 -3 -1 -3 3
  • 5. Recognition of stored patterns  The autocorrelator is presented stored pattern A2=(1,1,1,-1) With the help of recall equation = f ( 3 + 1 + 3 + 3, 1 ) = 1 = f ( 6, 1 ) = 1 = f ( 10, 1 ) = 1 = f ( -10, 1 ) = -1
  • 6. Recognition of noisy patterns  Consider a vector A’=(1,1,1,1) which is a distorted presentation of one among the store pattern  With the help of Hamming Distance measure we can find noisy vector pattern  The Hamming distance (HD) of vector X from Y, given X=(x1,x2,….,xn) and Y=(y1,y2,….,yn) is given by, HD( x, y ) =
  • 7. Heterocorrelators : Kosko’s discrete BAM  Bidirectional associative memory (BAM) is two level nonlinear neural network  Kosko extended the unidirectional to bidirectional processes.  Noise does not affect performance  There are N training pairs {(A1,B1),(A2,B2),….,(Ai,Bi),……,(An, Bn)} where Ai=(ai1,ai2,…….,ain) Bi =(bi1,bi2,……,bip)
  • 8. Here, aij or bij is either ON or OFF state In binary mode, ON = 1 and OFF = 0 and In bipolar mode, ON = 1 and OFF = -1  Formula for correlation matrix is,  Recall equations, Starting with (α, β) as the initial condition, we determine the finite sequence (α’, β’ ),(α’’, β’’),…….., until equilibrium point (αF, β F ) is reached. Here , β’ = ϕ (αM) α’ = ϕ (β’ MT)
  • 9. Φ(F) = G = g1, g2, …., gn F = ( f1,f2,….,f n) 1 if fi > 0 0 (binary) gi = , fi < 0 -1 (bipolar) previous gi, fi = 0
  • 10. Addition and Deletion of Pattern Pairs If given set of pattern pairs (Xi, Yi) for i=1,2,….,n  Then we can be added (X’,Y’) or can be deleted (Xj,Yj) from the memory model.  In the case of addition,  In the case of deletion,
  • 11. Energy function for BAM  The value of the energy function for particular pattern has to occupy a minimum point in energy landscape,  Adding new patterns do not destroy previously stored patterns.
  • 12.  Hopfield propose an energy function as, E(A) = -AMAT  Kosko propose an energy function as, E(A,B)= - AMBT  If energy function for any point (α, β) is given by E = - αMβT  If energy E evaluate using the coordinates of the pair (Ai,Bi),
  • 13.  Working of Kosko’s BAM Step 1: converting to bipolar forms  Step 2: The matrix M is calculated as,  Step 3: Retrieve the associative pair β’ = ϕ (αM) α’ = ϕ (β’ MT)