Find in Library
Search millions of books, articles, and more
Indexed Open Access Databases
Listen to the Brain–Auditory Sound Source Localization in Neuromorphic Computing Architectures
oleh: Daniel Schmid, Timo Oess, Heiko Neumann
| Format: | Article |
|---|---|
| Diterbitkan: | MDPI AG 2023-05-01 |
Deskripsi
Conventional processing of sensory input often relies on uniform sampling leading to redundant information and unnecessary resource consumption throughout the entire processing pipeline. Neuromorphic computing challenges these conventions by mimicking biology and employing distributed event-based hardware. Based on the task of lateral auditory sound source localization (SSL), we propose a generic approach to map biologically inspired neural networks to neuromorphic hardware. First, we model the neural mechanisms of SSL based on the interaural level difference (ILD). Afterward, we identify generic computational motifs within the model and transform them into spike-based components. A hardware-specific step then implements them on neuromorphic hardware. We exemplify our approach by mapping the neural SSL model onto two platforms, namely the IBM TrueNorth Neurosynaptic System and SpiNNaker. Both implementations have been tested on synthetic and real-world data in terms of neural tunings and readout characteristics. For synthetic stimuli, both implementations provide a perfect readout (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>100</mn><mo>%</mo></mrow></semantics></math></inline-formula> accuracy). Preliminary real-world experiments yield accuracies of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>78</mn><mo>%</mo></mrow></semantics></math></inline-formula> (TrueNorth) and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>13</mn><mo>%</mo></mrow></semantics></math></inline-formula> (SpiNNaker), RMSEs of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>41</mn><mo>∘</mo></msup></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>39</mn><mo>∘</mo></msup></semantics></math></inline-formula>, and MAEs of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>18</mn><mo>∘</mo></msup></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>29</mn><mo>∘</mo></msup></semantics></math></inline-formula>, respectively. Overall, the proposed mapping approach allows for the successful implementation of the same SSL model on two different neuromorphic architectures paving the way toward more hardware-independent neural SSL.