scholarly journals Memristors for the Curious Outsiders

Technologies ◽  
2018 ◽  
Vol 6 (4) ◽  
pp. 118 ◽  
Author(s):  
Francesco Caravelli ◽  
Juan Carbajal

We present both an overview and a perspective of recent experimental advances and proposed new approaches to performing computation using memristors. A memristor is a 2-terminal passive component with a dynamic resistance depending on an internal parameter. We provide an brief historical introduction, as well as an overview over the physical mechanism that lead to memristive behavior. This review is meant to guide nonpractitioners in the field of memristive circuits and their connection to machine learning and neural computation.

2018 ◽  
Author(s):  
Juan Pablo Carbajal ◽  
Francesco Caravelli

We present both an overview and a perspective of recent experimental advances and proposed new approaches to performing computation using memristors. A memristor is a 2-terminal passive component with a dynamic resistance depending on an internal parameter. We provide an brief historical introduction, as well as an overview over the physical mechanism that lead to memristive behavior. This review is meant to guide nonpractitioners in the field of memristive circuits and their connection to machine learning and neural computation.


1969 ◽  
pp. 304-324 ◽  
Author(s):  
Nicholas V. Findler

2019 ◽  
Vol 21 (3) ◽  
pp. 1078-1088 ◽  
Author(s):  
Heesoo Park ◽  
Raghvendra Mall ◽  
Fahhad H. Alharbi ◽  
Stefano Sanvito ◽  
Nouar Tabet ◽  
...  

Recent years have witnessed a growing effort in engineering and tuning the properties of hybrid halide perovskites as light absorbers.


2016 ◽  
Vol 12 (S325) ◽  
pp. 205-208
Author(s):  
Fernando Caro ◽  
Marc Huertas-Company ◽  
Guillermo Cabrera

AbstractIn order to understand how galaxies form and evolve, the measurement of the parameters related to their morphologies and also to the way they interact is one of the most relevant requirements. Due to the huge amount of data that is generated by surveys, the morphological and interaction analysis of galaxies can no longer rely on visual inspection. For dealing with such issue, new approaches based on machine learning techniques have been proposed in the last years with the aim of automating the classification process. We tested Deep Learning using images of galaxies obtained from CANDELS to study the accuracy achieved by this tool considering two different frameworks. In the first, galaxies were classified in terms of their shapes considering five morphological categories, while in the second, the way in which galaxies interact was employed for defining other five categories. The results achieved in both cases are compared and discussed.


Author(s):  
Arthur Kaliev ◽  
Alexandr Marenkov

The article considers the low efficiency of existing methods of ransomware fighting. The importance of developing new approaches to the ransomware identification in computer systems (CS) is substantiated. Heuristic analysis methods are considered as new approaches to ransomware detecting. A new technique for ransomware detecting is based on the analysis of changes in CS parameters. Using machine-learning methods there have been constructed models, which allow detecting ransomware attacks on the computer system. The aim of the experiment was to obtain a model that has the highest percentage of ransomware attacks detection and the least number of false triggering. The machine learning lgorithms used for research are the following: naive Bayes classifier, multilayer neural network, support vector machine, CatBoost gradient boosting algorithm. To build the models training datasets written in Python programming language were used. The raining datasets were collected as a result of experiments with the most popular virus-encoders. The following typical metrics were selected as key metrics for the effectiveness of machine learning models: precision, recall, F1-metric, accuracy, AUC. In the course of experiments, the values of the error matrices were formed and the main indicators of the model quality metrics were obtained. In addition to the classification efficiency metrics, the average time for performing classification operations for each of the models is given. During the process of model training and testing it was revealed that the best model for detecting ransomware is that built on the CatBoost algorithm. The conclusions were drawn about the possibility of applying the approach to detect the ransomware attacks on various computer systems.


2021 ◽  
pp. 1-18
Author(s):  
Ilenna Simone Jones ◽  
Konrad Paul Kording

Abstract Physiological experiments have highlighted how the dendrites of biological neurons can nonlinearly process distributed synaptic inputs. However, it is unclear how aspects of a dendritic tree, such as its branched morphology or its repetition of presynaptic inputs, determine neural computation beyond this apparent nonlinearity. Here we use a simple model where the dendrite is implemented as a sequence of thresholded linear units. We manipulate the architecture of this model to investigate the impacts of binary branching constraints and repetition of synaptic inputs on neural computation. We find that models with such manipulations can perform well on machine learning tasks, such as Fashion MNIST or Extended MNIST. We find that model performance on these tasks is limited by binary tree branching and dendritic asymmetry and is improved by the repetition of synaptic inputs to different dendritic branches. These computational experiments further neuroscience theory on how different dendritic properties might determine neural computation of clearly defined tasks.


Author(s):  
Alexander Andreev ◽  
Eugenia Ahremenko ◽  
Danila Apushkin ◽  
Ilya Kuznetsov ◽  
Ilya Kovalenko ◽  
...  

1969 ◽  
Vol 5 (3) ◽  
pp. 173-182 ◽  
Author(s):  
Nicholas Findler

Sign in / Sign up

Export Citation Format

Share Document