scholarly journals Pre-Wiring and Pre-Training: What Does a Neural Network Need to Learn Truly General Identity Rules?

2018 ◽  
Vol 61 ◽  
pp. 927-946 ◽  
Author(s):  
Raquel G. Alhama ◽  
Willem Zuidema

In an influential paper (“Rule Learning by Seven-Month-Old Infants”), Marcus, Vijayan, Rao and Vishton claimed that connectionist models cannot account for human success at learning tasks that involved generalization of abstract knowledge such as grammatical rules. This claim triggered a heated debate, centered mostly around variants of the Simple Recurrent Network model. In our work, we revisit this unresolved debate and analyze the underlying issues from a different perspective. We argue that, in order to simulate human-like learning of grammatical rules, a neural network model should not be used as a tabula rasa, but rather, the initial wiring of the neural connections and the experience acquired prior to the actual task should be incorporated into the model. We present two methods that aim to provide such initial state: a manipulation of the initial connections of the network in a cognitively plausible manner (concretely, by implementing a “delay-line” memory), and a pre-training algorithm that incrementally challenges the network with novel stimuli. We implement such techniques in an Echo State Network (ESN), and we show that only when combining both techniques the ESN is able to learn truly general identity rules. Finally, we discuss the relation between these cognitively motivated techniques and recent advances in Deep Learning.

2018 ◽  
Vol 3 (01) ◽  
Author(s):  
Sandeep Kumar ◽  
Manu Pratap Singh

Neural network is the most important model which has been studied in past decades by several researchers. Hopfield model is one of the network model proposed by J.J. Hopfield that describes the organization of neurons in such a way that they function as associative memory or also called content addressable memory. This is a recurrent network similar to recurrent layer of the hamming network but which can effectively perform the operation of both layer hamming network. The design of recurrent network has always been interesting problems to research and a lot of work is going on present application. In present paper we will discuss about the design of Hopfield Neural Network (HNNs), bidirectional associative memory (BAMs) and multidirectional associative memory (MAMs) for handwritten characters recognition. Recognized characters are Hindi alphabets.


2009 ◽  
Vol 05 (01) ◽  
pp. 307-334 ◽  
Author(s):  
HIROAKI ARIE ◽  
TETSURO ENDO ◽  
TAKAFUMI ARAKAKI ◽  
SHIGEKI SUGANO ◽  
JUN TANI

The present study examines the possible roles of cortical chaos in generating novel actions for achieving specified goals. The proposed neural network model consists of a sensory-forward model responsible for parietal lobe functions, a chaotic network model for premotor functions and prefrontal cortex model responsible for manipulating the initial state of the chaotic network. Experiments using humanoid robot were performed with the model and showed that the action plans for satisfying specific novel goals can be generated by diversely modulating and combining prior-learned behavioral patterns at critical dynamical states. Although this criticality resulted in fragile goal achievements in the physical environment of the robot, the reinforcement of the successful trials was able to provide a substantial gain with respect to the robustness. The discussion leads to the hypothesis that the consolidation of numerous sensory-motor experiences into the memory, meditating diverse imagery in the memory by cortical chaos, and repeated enaction and reinforcement of newly generated effective trials are indispensable for realizing an open-ended development of cognitive behaviors.


Author(s):  
Seetharam .K ◽  
Sharana Basava Gowda ◽  
. Varadaraj

In Software engineering software metrics play wide and deeper scope. Many projects fail because of risks in software engineering development[1]t. Among various risk factors creeping is also one factor. The paper discusses approximate volume of creeping requirements that occur after the completion of the nominal requirements phase. This is using software size measured in function points at four different levels. The major risk factors are depending both directly and indirectly associated with software size of development. Hence It is possible to predict risk due to creeping cause using size.


Sign in / Sign up

Export Citation Format

Share Document