-
Binding in hippocampal-entorhinal circuits enables compositionality in cognitive maps
Authors:
Christopher J. Kymn,
Sonia Mazelet,
Anthony Thomas,
Denis Kleyko,
E. Paxon Frady,
Friedrich T. Sommer,
Bruno A. Olshausen
Abstract:
We propose a normative model for spatial representation in the hippocampal formation that combines optimality principles, such as maximizing coding range and spatial information per neuron, with an algebraic framework for computing in distributed representation. Spatial position is encoded in a residue number system, with individual residues represented by high-dimensional, complex-valued vectors.…
▽ More
We propose a normative model for spatial representation in the hippocampal formation that combines optimality principles, such as maximizing coding range and spatial information per neuron, with an algebraic framework for computing in distributed representation. Spatial position is encoded in a residue number system, with individual residues represented by high-dimensional, complex-valued vectors. These are composed into a single vector representing position by a similarity-preserving, conjunctive vector-binding operation. Self-consistency between the representations of the overall position and of the individual residues is enforced by a modular attractor network whose modules correspond to the grid cell modules in entorhinal cortex. The vector binding operation can also associate different contexts to spatial representations, yielding a model for entorhinal cortex and hippocampus. We show that the model achieves normative desiderata including superlinear scaling of patterns with dimension, robust error correction, and hexagonal, carry-free encoding of spatial position. These properties in turn enable robust path integration and association with sensory inputs. More generally, the model formalizes how compositional computations could occur in the hippocampal formation and leads to testable experimental predictions.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
On the Complexity of Community-aware Network Sparsification
Authors:
Emanuel Herrendorf,
Christian Komusiewicz,
Nils Morawietz,
Frank Sommer
Abstract:
Network sparsification is the task of reducing the number of edges of a given graph while preserving some crucial graph property. In community-aware network sparsification, the preserved property concerns the subgraphs that are induced by the communities of the graph which are given as vertex subsets. This is formalized in the $Π$-Network Sparsification problem: given an edge-weighted graph $G$, a…
▽ More
Network sparsification is the task of reducing the number of edges of a given graph while preserving some crucial graph property. In community-aware network sparsification, the preserved property concerns the subgraphs that are induced by the communities of the graph which are given as vertex subsets. This is formalized in the $Π$-Network Sparsification problem: given an edge-weighted graph $G$, a collection $Z$ of $c$ subsets of $V(G)$ (communities), and two numbers $\ell, b$, the question is whether there exists a spanning subgraph $G'$ of $G$ with at most $\ell$ edges of total weight at most $b$ such that $G'[C]$ fulfills $Π$ for each community $C$. Here, we consider two graph properties $Π$: the connectivity property (Connectivity NWS) and the property of having a spanning star (Stars NWS). Since both problems are NP-hard, we study their parameterized and fine-grained complexity.
We provide a tight $2^{Ω(n^2+c)} poly(n+|Z|)$-time running time lower bound based on the ETH for both problems, where $n$ is the number of vertices in $G$. The lower bound holds even in the restricted case when all communities have size at most 4, $G$ is a clique, and every edge has unit weight. For the connectivity property, the unit weight case with $G$ being a clique is the well-studied problem of computing a hypergraph support with a minimum number of edges. We then study the complexity of both problems parameterized by the feedback edge number $t$ of the solution graph $G'$. For Stars NWS, we present an XP-algorithm for $t$. This answers an open question by Korach and Stern [Disc. Appl. Math. '08] who asked for the existence of polynomial-time algorithms for $t=0$. In contrast, we show for Connectivity NWS that known polynomial-time algorithms for $t=0$ [Korach and Stern, Math. Program. '03; Klemz et al., SWAT '14] cannot be extended by showing that Connectivity NWS is NP-hard for $t=1$.
△ Less
Submitted 23 February, 2024;
originally announced February 2024.
-
Complexity of Local Search for Euclidean Clustering Problems
Authors:
Bodo Manthey,
Nils Morawietz,
Jesse van Rhijn,
Frank Sommer
Abstract:
We show that the simplest local search heuristics for two natural Euclidean clustering problems are PLS-complete. First, we show that the Hartigan--Wong method for $k$-Means clustering is PLS-complete, even when $k = 2$. Second, we show the same result for the Flip heuristic for Max Cut, even when the edge weights are given by the (squared) Euclidean distances between the points in some set…
▽ More
We show that the simplest local search heuristics for two natural Euclidean clustering problems are PLS-complete. First, we show that the Hartigan--Wong method for $k$-Means clustering is PLS-complete, even when $k = 2$. Second, we show the same result for the Flip heuristic for Max Cut, even when the edge weights are given by the (squared) Euclidean distances between the points in some set $\mathcal{X} \subseteq \mathbb{R}^d$; a problem which is equivalent to Min Sum 2-Clustering.
△ Less
Submitted 13 February, 2024; v1 submitted 22 December, 2023;
originally announced December 2023.
-
Computing with Residue Numbers in High-Dimensional Representation
Authors:
Christopher J. Kymn,
Denis Kleyko,
E. Paxon Frady,
Connor Bybee,
Pentti Kanerva,
Friedrich T. Sommer,
Bruno A. Olshausen
Abstract:
We introduce Residue Hyperdimensional Computing, a computing framework that unifies residue number systems with an algebra defined over random, high-dimensional vectors. We show how residue numbers can be represented as high-dimensional vectors in a manner that allows algebraic operations to be performed with component-wise, parallelizable operations on the vector elements. The resulting framework…
▽ More
We introduce Residue Hyperdimensional Computing, a computing framework that unifies residue number systems with an algebra defined over random, high-dimensional vectors. We show how residue numbers can be represented as high-dimensional vectors in a manner that allows algebraic operations to be performed with component-wise, parallelizable operations on the vector elements. The resulting framework, when combined with an efficient method for factorizing high-dimensional vectors, can represent and operate on numerical values over a large dynamic range using vastly fewer resources than previous methods, and it exhibits impressive robustness to noise. We demonstrate the potential for this framework to solve computationally difficult problems in visual perception and combinatorial optimization, showing improvement over baseline methods. More broadly, the framework provides a possible account for the computational operations of grid cells in the brain, and it suggests new machine learning architectures for representing and manipulating numerical data.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Nuclear charge radius of $^{26m}$Al and its implication for V$_{ud}$ in the quark-mixing matrix
Authors:
P. Plattner,
E. Wood,
L. Al Ayoubi,
O. Beliuskina,
M. L. Bissell,
K. Blaum,
P. Campbell,
B. Cheal,
R. P. de Groote,
C. S. Devlin,
T. Eronen,
L. Filippin,
R. F. García Ruíz,
Z. Ge,
S. Geldhof,
W. Gins,
M. Godefroid,
H. Heylen,
M. Hukkanen,
P. Imgram,
A. Jaries,
A. Jokinen,
A. Kanellakopoulos,
A. Kankainen,
S. Kaufmann
, et al. (28 additional authors not shown)
Abstract:
Collinear laser spectroscopy was performed on the isomer of the aluminium isotope $^{26m}$Al. The measured isotope shift to $^{27}$Al in the $3s^{2}3p\;^{2}\!P^\circ_{3/2} \rightarrow 3s^{2}4s\;^{2}\!S_{1/2}$ atomic transition enabled the first experimental determination of the nuclear charge radius of $^{26m}$Al, resulting in $R_c$=\qty{3.130\pm.015}{\femto\meter}. This differs by 4.5 standard de…
▽ More
Collinear laser spectroscopy was performed on the isomer of the aluminium isotope $^{26m}$Al. The measured isotope shift to $^{27}$Al in the $3s^{2}3p\;^{2}\!P^\circ_{3/2} \rightarrow 3s^{2}4s\;^{2}\!S_{1/2}$ atomic transition enabled the first experimental determination of the nuclear charge radius of $^{26m}$Al, resulting in $R_c$=\qty{3.130\pm.015}{\femto\meter}. This differs by 4.5 standard deviations from the extrapolated value used to calculate the isospin-symmetry breaking corrections in the superallowed $β$ decay of $^{26m}$Al. Its corrected $\mathcal{F}t$ value, important for the estimation of $V_{ud}$ in the CKM matrix, is thus shifted by one standard deviation to \qty{3071.4\pm1.0}{\second}.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Finding a Sparse Connected Spanning Subgraph in a non-Uniform Failure Model
Authors:
Matthias Bentert,
Jannik Schestag,
Frank Sommer
Abstract:
We study a generalization of the classic Spanning Tree problem that allows for a non-uniform failure model. More precisely, edges are either \emph{safe} or \emph{unsafe} and we assume that failures only affect unsafe edges. In Unweighted Flexible Graph Connectivity we are given an undirected graph $G = (V,E)$ in which the edge set $E$ is partitioned into a set $S$ of safe edges and a set $U$ of un…
▽ More
We study a generalization of the classic Spanning Tree problem that allows for a non-uniform failure model. More precisely, edges are either \emph{safe} or \emph{unsafe} and we assume that failures only affect unsafe edges. In Unweighted Flexible Graph Connectivity we are given an undirected graph $G = (V,E)$ in which the edge set $E$ is partitioned into a set $S$ of safe edges and a set $U$ of unsafe edges and the task is to find a set $T$ of at most $k$ edges such that $T - \{u\}$ is connected and spans $V$ for any unsafe edge $u \in T$. Unweighted Flexible Graph Connectivity generalizes both Spanning Tree and Hamiltonian Cycle. We study Unweighted Flexible Graph Connectivity in terms of fixed-parameter tractability (FPT). We show an almost complete dichotomy on which parameters lead to fixed-parameter tractability and which lead to hardness. To this end, we obtain FPT-time algorithms with respect to the vertex deletion distance to cluster graphs and with respect to the treewidth. By exploiting the close relationship to Hamiltonian Cycle, we show that FPT-time algorithms for many smaller parameters are unlikely under standard parameterized complexity assumptions. Regarding problem-specific parameters, we observe that Unweighted Flexible Graph Connectivity} admits an FPT-time algorithm when parameterized by the number of unsafe edges. Furthermore, we investigate a below-upper-bound parameter for the number of edges of a solution. We show that this parameter also leads to an FPT-time algorithm.
△ Less
Submitted 27 February, 2024; v1 submitted 8 August, 2023;
originally announced August 2023.
-
On Computing Optimal Tree Ensembles
Authors:
Christian Komusiewicz,
Pascal Kunz,
Frank Sommer,
Manuel Sorge
Abstract:
Random forests and, more generally, (decision\nobreakdash-)tree ensembles are widely used methods for classification and regression. Recent algorithmic advances allow to compute decision trees that are optimal for various measures such as their size or depth. We are not aware of such research for tree ensembles and aim to contribute to this area. Mainly, we provide two novel algorithms and corresp…
▽ More
Random forests and, more generally, (decision\nobreakdash-)tree ensembles are widely used methods for classification and regression. Recent algorithmic advances allow to compute decision trees that are optimal for various measures such as their size or depth. We are not aware of such research for tree ensembles and aim to contribute to this area. Mainly, we provide two novel algorithms and corresponding lower bounds. First, we are able to carry over and substantially improve on tractability results for decision trees, obtaining a $(6δD S)^S \cdot poly$-time algorithm, where $S$ is the number of cuts in the tree ensemble, $D$ the largest domain size, and $δ$ is the largest number of features in which two examples differ. To achieve this, we introduce the witness-tree technique which also seems promising for practice. Second, we show that dynamic programming, which has been successful for decision trees, may also be viable for tree ensembles, providing an $\ell^n \cdot poly$-time algorithm, where $\ell$ is the number of trees and $n$ the number of examples. Finally, we compare the number of cuts necessary to classify training data sets for decision trees and tree ensembles, showing that ensembles may need exponentially fewer cuts for increasing number of trees.
△ Less
Submitted 7 June, 2023;
originally announced June 2023.
-
Efficient Decoding of Compositional Structure in Holistic Representations
Authors:
Denis Kleyko,
Connor Bybee,
**-Chen Huang,
Christopher J. Kymn,
Bruno A. Olshausen,
E. Paxon Frady,
Friedrich T. Sommer
Abstract:
We investigate the task of retrieving information from compositional distributed representations formed by Hyperdimensional Computing/Vector Symbolic Architectures and present novel techniques which achieve new information rate bounds. First, we provide an overview of the decoding techniques that can be used to approach the retrieval task. The techniques are categorized into four groups. We then e…
▽ More
We investigate the task of retrieving information from compositional distributed representations formed by Hyperdimensional Computing/Vector Symbolic Architectures and present novel techniques which achieve new information rate bounds. First, we provide an overview of the decoding techniques that can be used to approach the retrieval task. The techniques are categorized into four groups. We then evaluate the considered techniques in several settings that involve, e.g., inclusion of external noise and storage elements with reduced precision. In particular, we find that the decoding techniques from the sparse coding and compressed sensing literature (rarely used for Hyperdimensional Computing/Vector Symbolic Architectures) are also well-suited for decoding information from the compositional distributed representations. Combining these decoding techniques with interference cancellation ideas from communications improves previously reported bounds (Hersche et al., 2021) of the information rate of the distributed representations from 1.20 to 1.40 bits per dimension for smaller codebooks and from 0.60 to 1.26 bits per dimension for larger codebooks.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
Learning and generalization of compositional representations of visual scenes
Authors:
E. Paxon Frady,
Spencer Kent,
Quinn Tran,
Pentti Kanerva,
Bruno A. Olshausen,
Friedrich T. Sommer
Abstract:
Complex visual scenes that are composed of multiple objects, each with attributes, such as object name, location, pose, color, etc., are challenging to describe in order to train neural networks. Usually,deep learning networks are trained supervised by categorical scene descriptions. The common categorical description of a scene contains the names of individual objects but lacks information about…
▽ More
Complex visual scenes that are composed of multiple objects, each with attributes, such as object name, location, pose, color, etc., are challenging to describe in order to train neural networks. Usually,deep learning networks are trained supervised by categorical scene descriptions. The common categorical description of a scene contains the names of individual objects but lacks information about other attributes. Here, we use distributed representations of object attributes and vector operations in a vector symbolic architecture to create a full compositional description of a scene in a high-dimensional vector. To control the scene composition, we use artificial images composed of multiple, translated and colored MNIST digits. In contrast to learning category labels, here we train deep neural networks to output the full compositional vector description of an input image. The output of the deep network can then be interpreted by a VSA resonator network, to extract object identity or other properties of indiviual objects. We evaluate the performance and generalization properties of the system on randomly generated scenes. Specifically, we show that the network is able to learn the task and generalize to unseen seen digit shapes and scene configurations. Further, the generalisation ability of the trained model is limited. For example, with a gap in the training data, like an object not shown in a particular image location during training, the learning does not automatically fill this gap.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Efficient Optimization with Higher-Order Ising Machines
Authors:
Connor Bybee,
Denis Kleyko,
Dmitri E. Nikonov,
Amir Khosrowshahi,
Bruno A. Olshausen,
Friedrich T. Sommer
Abstract:
A prominent approach to solving combinatorial optimization problems on parallel hardware is Ising machines, i.e., hardware implementations of networks of interacting binary spin variables. Most Ising machines leverage second-order interactions although important classes of optimization problems, such as satisfiability problems, map more seamlessly to Ising networks with higher-order interactions.…
▽ More
A prominent approach to solving combinatorial optimization problems on parallel hardware is Ising machines, i.e., hardware implementations of networks of interacting binary spin variables. Most Ising machines leverage second-order interactions although important classes of optimization problems, such as satisfiability problems, map more seamlessly to Ising networks with higher-order interactions. Here, we demonstrate that higher-order Ising machines can solve satisfiability problems more resource-efficiently in terms of the number of spin variables and their connections when compared to traditional second-order Ising machines. Further, our results show on a benchmark dataset of Boolean \textit{k}-satisfiability problems that higher-order Ising machines implemented with coupled oscillators rapidly find solutions that are better than second-order Ising machines, thus, improving the current state-of-the-art for Ising machines.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
Efficient Branch-and-Bound Algorithms for Finding Triangle-Constrained 2-Clubs
Authors:
Niels Grüttemeier,
Philipp Heinrich Keßler,
Christian Komusiewicz,
Frank Sommer
Abstract:
In the Vertex Triangle 2-Club problem, we are given an undirected graph $G$ and aim to find a maximum-vertex subgraph of $G$ that has diameter at most 2 and in which every vertex is contained in at least $\ell$ triangles in the subgraph. So far, the only algorithm for solving Vertex Triangle 2-Club relies on an ILP formulation [Almeida and Brás, Comput. Oper. Res. 2019]. In this work, we develop a…
▽ More
In the Vertex Triangle 2-Club problem, we are given an undirected graph $G$ and aim to find a maximum-vertex subgraph of $G$ that has diameter at most 2 and in which every vertex is contained in at least $\ell$ triangles in the subgraph. So far, the only algorithm for solving Vertex Triangle 2-Club relies on an ILP formulation [Almeida and Brás, Comput. Oper. Res. 2019]. In this work, we develop a combinatorial branch-and-bound algorithm that, coupled with a set of data reduction rules, outperforms the existing implementation and is able to find optimal solutions on sparse real-world graphs with more than 100,000 vertices in a few minutes. We also extend our algorithm to the Edge Triangle 2-Club problem where the triangle constraint is imposed on all edges of the subgraph.
△ Less
Submitted 7 November, 2022; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Charge radii of $^{55,56}$Ni reveal a surprisingly similar behavior at $N=28$ in Ca and Ni isotopes
Authors:
F. Sommer,
K. König,
D. M. Rossi,
N. Everett,
D. Garand,
R. P. de Groote,
J. D. Holt,
P. Imgram,
A. Incorvati,
C. Kalman,
A. Klose,
J. Lantis,
Y. Liu,
A. J. Miller,
K. Minamisono,
T. Miyagi,
W. Nazarewicz,
W. Nörtershäuser,
S. V. Pineda,
R. Powel,
P. -G. Reinhard,
L. Renth,
E. Romero-Romero,
R. Roth,
A. Schwenk
, et al. (2 additional authors not shown)
Abstract:
Nuclear charge radii of $^{55,56}$Ni were measured by collinear laser spectroscopy. The obtained information completes the behavior of the charge radii at the shell closure of the doubly magic nucleus $^{56}$Ni. The trend of charge radii across the shell closures in calcium and nickel is surprisingly similar despite the fact that the $^{56}$Ni core is supposed to be much softer than the $^{48}$Ca…
▽ More
Nuclear charge radii of $^{55,56}$Ni were measured by collinear laser spectroscopy. The obtained information completes the behavior of the charge radii at the shell closure of the doubly magic nucleus $^{56}$Ni. The trend of charge radii across the shell closures in calcium and nickel is surprisingly similar despite the fact that the $^{56}$Ni core is supposed to be much softer than the $^{48}$Ca core. The very low magnetic moment $μ(^{55}\mathrm{Ni})=-1.108(20)\,μ_N$ indicates the impact of M1 excitations between spin-orbit partners across the $N,Z=28$ shell gaps. Our charge-radii results are compared to \textit{ab initio} and nuclear density functional theory calculations, showing good agreement within theoretical uncertainties.
△ Less
Submitted 4 October, 2022;
originally announced October 2022.
-
Visual Odometry with Neuromorphic Resonator Networks
Authors:
Alpha Renner,
Lazar Supic,
Andreea Danielescu,
Giacomo Indiveri,
E. Paxon Frady,
Friedrich T. Sommer,
Yulia Sandamirskaya
Abstract:
Visual Odometry (VO) is a method to estimate self-motion of a mobile robot using visual sensors. Unlike odometry based on integrating differential measurements that can accumulate errors, such as inertial sensors or wheel encoders, visual odometry is not compromised by drift. However, image-based VO is computationally demanding, limiting its application in use cases with low-latency, -memory, and…
▽ More
Visual Odometry (VO) is a method to estimate self-motion of a mobile robot using visual sensors. Unlike odometry based on integrating differential measurements that can accumulate errors, such as inertial sensors or wheel encoders, visual odometry is not compromised by drift. However, image-based VO is computationally demanding, limiting its application in use cases with low-latency, -memory, and -energy requirements. Neuromorphic hardware offers low-power solutions to many vision and AI problems, but designing such solutions is complicated and often has to be assembled from scratch. Here we propose to use Vector Symbolic Architecture (VSA) as an abstraction layer to design algorithms compatible with neuromorphic hardware. Building from a VSA model for scene analysis, described in our companion paper, we present a modular neuromorphic algorithm that achieves state-of-the-art performance on two-dimensional VO tasks. Specifically, the proposed algorithm stores and updates a working memory of the presented visual environment. Based on this working memory, a resonator network estimates the changing location and orientation of the camera. We experimentally validate the neuromorphic VSA-based approach to VO with two benchmarks: one based on an event camera dataset and the other in a dynamic scene with a robotic task.
△ Less
Submitted 26 June, 2024; v1 submitted 5 September, 2022;
originally announced September 2022.
-
Neuromorphic Visual Scene Understanding with Resonator Networks
Authors:
Alpha Renner,
Lazar Supic,
Andreea Danielescu,
Giacomo Indiveri,
Bruno A. Olshausen,
Yulia Sandamirskaya,
Friedrich T. Sommer,
E. Paxon Frady
Abstract:
Analyzing a visual scene by inferring the configuration of a generative model is widely considered the most flexible and generalizable approach to scene understanding. Yet, one major problem is the computational challenge of the inference procedure, involving a combinatorial search across object identities and poses. Here we propose a neuromorphic solution exploiting three key concepts: (1) a comp…
▽ More
Analyzing a visual scene by inferring the configuration of a generative model is widely considered the most flexible and generalizable approach to scene understanding. Yet, one major problem is the computational challenge of the inference procedure, involving a combinatorial search across object identities and poses. Here we propose a neuromorphic solution exploiting three key concepts: (1) a computational framework based on Vector Symbolic Architectures (VSA) with complex-valued vectors; (2) the design of Hierarchical Resonator Networks (HRN) to factorize the non-commutative transforms translation and rotation in visual scenes; (3) the design of a multi-compartment spiking phasor neuron model for implementing complex-valued resonator networks on neuromorphic hardware. The VSA framework uses vector binding operations to form a generative image model in which binding acts as the equivariant operation for geometric transformations. A scene can, therefore, be described as a sum of vector products, which can then be efficiently factorized by a resonator network to infer objects and their poses. The HRN features a partitioned architecture in which vector binding is equivariant for horizontal and vertical translation within one partition and for rotation and scaling within the other partition. The spiking neuron model allows map** the resonator network onto efficient and low-power neuromorphic hardware. Our approach is demonstrated on synthetic scenes composed of simple 2D shapes undergoing rigid geometric transformations and color changes. A companion paper demonstrates the same approach in real-world application scenarios for machine vision and robotics.
△ Less
Submitted 26 June, 2024; v1 submitted 26 August, 2022;
originally announced August 2022.
-
Cross-Frequency Coupling Increases Memory Capacity in Oscillatory Neural Networks
Authors:
Connor Bybee,
Alexander Belsten,
Friedrich T. Sommer
Abstract:
An open problem in neuroscience is to explain the functional role of oscillations in neural networks, contributing, for example, to perception, attention, and memory. Cross-frequency coupling (CFC) is associated with information integration across populations of neurons. Impaired CFC is linked to neurological disease. It is unclear what role CFC has in information processing and brain functional c…
▽ More
An open problem in neuroscience is to explain the functional role of oscillations in neural networks, contributing, for example, to perception, attention, and memory. Cross-frequency coupling (CFC) is associated with information integration across populations of neurons. Impaired CFC is linked to neurological disease. It is unclear what role CFC has in information processing and brain functional connectivity. We construct a model of CFC which predicts a computational role for observed $θ- γ$ oscillatory circuits in the hippocampus and cortex. Our model predicts that the complex dynamics in recurrent and feedforward networks of coupled oscillators performs robust information storage and pattern retrieval. Based on phasor associative memories (PAM), we present a novel oscillator neural network (ONN) model that includes subharmonic injection locking (SHIL) and which reproduces experimental observations of CFC. We show that the presence of CFC increases the memory capacity of a population of neurons connected by plastic synapses. CFC enables error-free pattern retrieval whereas pattern retrieval fails without CFC. In addition, the trade-offs between sparse connectivity, capacity, and information per connection are identified. The associative memory is based on a complex-valued neural network, or phasor neural network (PNN). We show that for values of $Q$ which are the same as the ratio of $γ$ to $θ$ oscillations observed in the hippocampus and the cortex, the associative memory achieves greater capacity and information storage than previous models. The novel contributions of this work are providing a computational framework based on oscillator dynamics which predicts the functional role of neural oscillations and connecting concepts in neural network theory and dynamical system theory.
△ Less
Submitted 5 April, 2022;
originally announced April 2022.
-
Deep Learning in Spiking Phasor Neural Networks
Authors:
Connor Bybee,
E. Paxon Frady,
Friedrich T. Sommer
Abstract:
Spiking Neural Networks (SNNs) have attracted the attention of the deep learning community for use in low-latency, low-power neuromorphic hardware, as well as models for understanding neuroscience. In this paper, we introduce Spiking Phasor Neural Networks (SPNNs). SPNNs are based on complex-valued Deep Neural Networks (DNNs), representing phases by spike times. Our model computes robustly employi…
▽ More
Spiking Neural Networks (SNNs) have attracted the attention of the deep learning community for use in low-latency, low-power neuromorphic hardware, as well as models for understanding neuroscience. In this paper, we introduce Spiking Phasor Neural Networks (SPNNs). SPNNs are based on complex-valued Deep Neural Networks (DNNs), representing phases by spike times. Our model computes robustly employing a spike timing code and gradients can be formed using the complex domain. We train SPNNs on CIFAR-10, and demonstrate that the performance exceeds that of other timing coded SNNs, approaching results with comparable real-valued DNNs.
△ Less
Submitted 1 April, 2022;
originally announced April 2022.
-
Electromagnetic moments of scandium isotopes and $N=28$ isotones in the distinctive $0f_{7/2}$ orbit
Authors:
S. W. Bai,
Á. Koszorús,
B. S. Hu,
X. F. Yang,
J. Billowes,
C. L. Binnersley,
M. L. Bissell,
K. Blaum,
P. Campbell,
B. Cheal,
T. E. Cocolios,
R. P. de Groote,
C. S. Devlin,
K. T. Flanagan,
R. F. Garcia Ruiz,
H. Heylen,
J. D. Holt,
A. Kanellakopoulos,
J. Krämer,
V. Lagaki,
B. Maaß,
S. Malbrunot-Ettenauer,
T. Miyagi,
R. Neugart,
G. Neyens
, et al. (9 additional authors not shown)
Abstract:
The electric quadrupole moment of $^{49}$Sc was measured by collinear laser spectroscopy at CERN-ISOLDE to be $Q_{\rm s}=-0.159(8)$ $e$b, and a nearly tenfold improvement in precision was reached for the electromagnetic moments of $^{47,49}$Sc. The single-particle behavior and nucleon-nucleon correlations are investigated with the electromagnetic moments of $Z=21$ isotopes and $N=28$ isotones as v…
▽ More
The electric quadrupole moment of $^{49}$Sc was measured by collinear laser spectroscopy at CERN-ISOLDE to be $Q_{\rm s}=-0.159(8)$ $e$b, and a nearly tenfold improvement in precision was reached for the electromagnetic moments of $^{47,49}$Sc. The single-particle behavior and nucleon-nucleon correlations are investigated with the electromagnetic moments of $Z=21$ isotopes and $N=28$ isotones as valence neutrons and protons fill the distinctive $0f_{7/2}$ orbit, respectively, located between magic numbers, 20 and 28. The experimental data are interpreted with shell-model calculations using an effective interaction, and ab-initio valence-space in-medium similarity renormalization group calculations based on chiral interactions. These results highlight the sensitivity of nuclear electromagnetic moments to different types of nucleon-nucleon correlations, and establish an important benchmark for further developments of theoretical calculations.
△ Less
Submitted 22 March, 2022; v1 submitted 17 March, 2022;
originally announced March 2022.
-
Multi-Parameter Analysis of Finding Minors and Subgraphs in Edge Periodic Temporal Graphs
Authors:
Emmanuel Arrighi,
Niels Grüttemeier,
Nils Morawietz,
Frank Sommer,
Petra Wolf
Abstract:
We study the computational complexity of determining structural properties of edge periodic temporal graphs (EPGs). EPGs are time-varying graphs that compactly represent periodic behavior of components of a dynamic network, for example, train schedules on a rail network. In EPGs, for each edge $e$ of the graph, a binary string $s_e$ determines in which time steps the edge is present, namely $e$ is…
▽ More
We study the computational complexity of determining structural properties of edge periodic temporal graphs (EPGs). EPGs are time-varying graphs that compactly represent periodic behavior of components of a dynamic network, for example, train schedules on a rail network. In EPGs, for each edge $e$ of the graph, a binary string $s_e$ determines in which time steps the edge is present, namely $e$ is present in time step $t$ if and only if $s_e$ contains a $1$ at position $t \mod |s_e|$. Due to this periodicity, EPGs serve as very compact representations of complex periodic systems and can even be exponentially smaller than classic temporal graphs representing one period of the same system, as the latter contain the whole sequence of graphs explicitly. In this paper, we study the computational complexity of fundamental questions of the new concept of EPGs such as what is the shortest traversal time between two vertices; is there a time step in which the graph (1) is minor-free; (2) contains a minor; (3) is subgraph-free; (4) contains a subgraph; with respect to a given minor or subgraph. We give a detailed parameterized analysis for multiple combinations of parameters for the problems stated above including several parameterized algorithms.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
Integer Factorization with Compositional Distributed Representations
Authors:
Denis Kleyko,
Connor Bybee,
Christopher J. Kymn,
Bruno A. Olshausen,
Amir Khosrowshahi,
Dmitri E. Nikonov,
Friedrich T. Sommer,
E. Paxon Frady
Abstract:
In this paper, we present an approach to integer factorization using distributed representations formed with Vector Symbolic Architectures. The approach formulates integer factorization in a manner such that it can be solved using neural networks and potentially implemented on parallel neuromorphic hardware. We introduce a method for encoding numbers in distributed vector spaces and explain how th…
▽ More
In this paper, we present an approach to integer factorization using distributed representations formed with Vector Symbolic Architectures. The approach formulates integer factorization in a manner such that it can be solved using neural networks and potentially implemented on parallel neuromorphic hardware. We introduce a method for encoding numbers in distributed vector spaces and explain how the resonator network can solve the integer factorization problem. We evaluate the approach on factorization of semiprimes by measuring the factorization accuracy versus the scale of the problem. We also demonstrate how the proposed approach generalizes beyond the factorization of semiprimes; in principle, it can be used for factorization of any composite number. This work demonstrates how a well-known combinatorial search problem may be formulated and solved within the framework of Vector Symbolic Architectures, and it opens the door to solving similarly difficult problems in other domains.
△ Less
Submitted 2 March, 2022;
originally announced March 2022.
-
A probabilistic latent variable model for detecting structure in binary data
Authors:
Christopher Warner,
Kiersten Ruda,
Friedrich T. Sommer
Abstract:
We introduce a novel, probabilistic binary latent variable model to detect noisy or approximate repeats of patterns in sparse binary data. The model is based on the "Noisy-OR model" (Heckerman, 1990), used previously for disease and topic modelling. The model's capability is demonstrated by extracting structure in recordings from retinal neurons, but it can be widely applied to discover and model…
▽ More
We introduce a novel, probabilistic binary latent variable model to detect noisy or approximate repeats of patterns in sparse binary data. The model is based on the "Noisy-OR model" (Heckerman, 1990), used previously for disease and topic modelling. The model's capability is demonstrated by extracting structure in recordings from retinal neurons, but it can be widely applied to discover and model latent structure in noisy binary data. In the context of spiking neural data, the task is to "explain" spikes of individual neurons in terms of groups of neurons, "Cell Assemblies" (CAs), that often fire together, due to mutual interactions or other causes. The model infers sparse activity in a set of binary latent variables, each describing the activity of a cell assembly. When the latent variable of a cell assembly is active, it reduces the probabilities of neurons belonging to this assembly to be inactive. The conditional probability kernels of the latent components are learned from the data in an expectation maximization scheme, involving inference of latent states and parameter adjustments to the model. We thoroughly validate the model on synthesized spike trains constructed to statistically resemble recorded retinal responses to white noise stimulus and natural movie stimulus in data. We also apply our model to spiking responses recorded in retinal ganglion cells (RGCs) during stimulation with a movie and discuss the found structure.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Neural Manifold Clustering and Embedding
Authors:
Zengyi Li,
Yubei Chen,
Yann LeCun,
Friedrich T. Sommer
Abstract:
Given a union of non-linear manifolds, non-linear subspace clustering or manifold clustering aims to cluster data points based on manifold structures and also learn to parameterize each manifold as a linear subspace in a feature space. Deep neural networks have the potential to achieve this goal under highly non-linear settings given their large capacity and flexibility. We argue that achieving ma…
▽ More
Given a union of non-linear manifolds, non-linear subspace clustering or manifold clustering aims to cluster data points based on manifold structures and also learn to parameterize each manifold as a linear subspace in a feature space. Deep neural networks have the potential to achieve this goal under highly non-linear settings given their large capacity and flexibility. We argue that achieving manifold clustering with neural networks requires two essential ingredients: a domain-specific constraint that ensures the identification of the manifolds, and a learning algorithm for embedding each manifold to a linear subspace in the feature space. This work shows that many constraints can be implemented by data augmentation. For subspace feature learning, Maximum Coding Rate Reduction (MCR$^2$) objective can be used. Putting them together yields {\em Neural Manifold Clustering and Embedding} (NMCE), a novel method for general purpose manifold clustering, which significantly outperforms autoencoder-based deep subspace clustering. Further, on more challenging natural image datasets, NMCE can also outperform other algorithms specifically designed for clustering. Qualitatively, we demonstrate that NMCE learns a meaningful and interpretable feature space. As the formulation of NMCE is closely related to several important Self-supervised learning (SSL) methods, we believe this work can help us build a deeper understanding on SSL representation learning.
△ Less
Submitted 24 January, 2022;
originally announced January 2022.
-
The Parameterized Complexity of s-Club with Triangle and Seed Constraints
Authors:
Jaroslav Garvardt,
Christian Komusiewicz,
Frank Sommer
Abstract:
The s-Club problem asks, for a given undirected graph $G$, whether $G$ contains a vertex set $S$ of size at least $k$ such that $G[S]$, the subgraph of $G$ induced by $S$, has diameter at most $s$. We consider variants of $s$-Club where one additionally demands that each vertex of $G[S]$ is contained in at least $\ell$ triangles in $G[S]$, that each edge of $G[S]$ is contained in at least $\ell$~t…
▽ More
The s-Club problem asks, for a given undirected graph $G$, whether $G$ contains a vertex set $S$ of size at least $k$ such that $G[S]$, the subgraph of $G$ induced by $S$, has diameter at most $s$. We consider variants of $s$-Club where one additionally demands that each vertex of $G[S]$ is contained in at least $\ell$ triangles in $G[S]$, that each edge of $G[S]$ is contained in at least $\ell$~triangles in $G[S]$, or that $S$ contains a given set $W$ of seed vertices. We show that in general these variants are W[1]-hard when parameterized by the solution size $k$, making them significantly harder than the unconstrained $s$-Club problem. On the positive side, we obtain some FPT algorithms for the case when $\ell=1$ and for the case when $G[W]$, the graph induced by the set of seed vertices, is a clique.
△ Less
Submitted 20 June, 2022; v1 submitted 14 January, 2022;
originally announced January 2022.
-
Covering Many (or Few) Edges with k Vertices in Sparse Graphs
Authors:
Tomohiro Koana,
Christian Komusiewicz,
André Nichterlein,
Frank Sommer
Abstract:
We study the following two fixed-cardinality optimization problems (a maximization and a minimization variant). For a fixed $α$ between zero and one we are given a graph and two numbers $k \in \mathbb{N}$ and $t \in \mathbb{Q}$. The task is to find a vertex subset $S$ of exactly $k$ vertices that has value at least (resp. at most for minimization) $t$. Here, the value of a vertex set computes as…
▽ More
We study the following two fixed-cardinality optimization problems (a maximization and a minimization variant). For a fixed $α$ between zero and one we are given a graph and two numbers $k \in \mathbb{N}$ and $t \in \mathbb{Q}$. The task is to find a vertex subset $S$ of exactly $k$ vertices that has value at least (resp. at most for minimization) $t$. Here, the value of a vertex set computes as $α$ times the number of edges with exactly one endpoint in $S$ plus $1-α$ times the number of edges with both endpoints in $S$. These two problems generalize many prominent graph problems, such as Densest $k$-Subgraph, Sparsest $k$-Subgraph, Partial Vertex Cover, and Max ($k$,$n-k$)-Cut.
In this work, we complete the picture of their parameterized complexity on several types of sparse graphs that are described by structural parameters. In particular, we provide kernelization algorithms and kernel lower bounds for these problems. A somewhat surprising consequence of our kernelizations is that Partial Vertex Cover and Max $(k,n-k)$-Cut not only behave in the same way but that the kernels for both problems can be obtained by the same algorithms.
△ Less
Submitted 18 October, 2022; v1 submitted 14 January, 2022;
originally announced January 2022.
-
Efficient Neuromorphic Signal Processing with Loihi 2
Authors:
Garrick Orchard,
E. Paxon Frady,
Daniel Ben Dayan Rubin,
Sophia Sanborn,
Sumit Bam Shrestha,
Friedrich T. Sommer,
Mike Davies
Abstract:
The biologically inspired spiking neurons used in neuromorphic computing are nonlinear filters with dynamic state variables -- very different from the stateless neuron models used in deep learning. The next version of Intel's neuromorphic research processor, Loihi 2, supports a wide range of stateful spiking neuron models with fully programmable dynamics. Here we showcase advanced spiking neuron m…
▽ More
The biologically inspired spiking neurons used in neuromorphic computing are nonlinear filters with dynamic state variables -- very different from the stateless neuron models used in deep learning. The next version of Intel's neuromorphic research processor, Loihi 2, supports a wide range of stateful spiking neuron models with fully programmable dynamics. Here we showcase advanced spiking neuron models that can be used to efficiently process streaming data in simulation experiments on emulated Loihi 2 hardware. In one example, Resonate-and-Fire (RF) neurons are used to compute the Short Time Fourier Transform (STFT) with similar computational complexity but 47x less output bandwidth than the conventional STFT. In another example, we describe an algorithm for optical flow estimation using spatiotemporal RF neurons that requires over 90x fewer operations than a conventional DNN-based solution. We also demonstrate promising preliminary results using backpropagation to train RF neurons for audio classification tasks. Finally, we show that a cascade of Hopf resonators - a variant of the RF neuron - replicates novel properties of the cochlea and motivates an efficient spike-based spectrogram encoder.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Computing on Functions Using Randomized Vector Representations
Authors:
E. Paxon Frady,
Denis Kleyko,
Christopher J. Kymn,
Bruno A. Olshausen,
Friedrich T. Sommer
Abstract:
Vector space models for symbolic processing that encode symbols by random vectors have been proposed in cognitive science and connectionist communities under the names Vector Symbolic Architecture (VSA), and, synonymously, Hyperdimensional (HD) computing. In this paper, we generalize VSAs to function spaces by map** continuous-valued data into a vector space such that the inner product between t…
▽ More
Vector space models for symbolic processing that encode symbols by random vectors have been proposed in cognitive science and connectionist communities under the names Vector Symbolic Architecture (VSA), and, synonymously, Hyperdimensional (HD) computing. In this paper, we generalize VSAs to function spaces by map** continuous-valued data into a vector space such that the inner product between the representations of any two data points represents a similarity kernel. By analogy to VSA, we call this new function encoding and computing framework Vector Function Architecture (VFA). In VFAs, vectors can represent individual data points as well as elements of a function space (a reproducing kernel Hilbert space). The algebraic vector operations, inherited from VSA, correspond to well-defined operations in function space. Furthermore, we study a previously proposed method for encoding continuous data, fractional power encoding (FPE), which uses exponentiation of a random base vector to produce randomized representations of data points and fulfills the kernel properties for inducing a VFA. We show that the distribution from which elements of the base vector are sampled determines the shape of the FPE kernel, which in turn induces a VFA for computing with band-limited functions. In particular, VFAs provide an algebraic framework for implementing large-scale kernel machines with random features, extending Rahimi and Recht, 2007. Finally, we demonstrate several applications of VFA models to problems in image recognition, density estimation and nonlinear regression. Our analyses and results suggest that VFAs constitute a powerful new framework for representing and manipulating functions in distributed neural systems, with myriad applications in artificial intelligence.
△ Less
Submitted 8 September, 2021;
originally announced September 2021.
-
Preventing Small $\mathbf{(s,t)}$-Cuts by Protecting Edges
Authors:
Niels Grüttemeier,
Christian Komusiewicz,
Nils Morawietz,
Frank Sommer
Abstract:
We introduce and study Weighted Min $(s,t)$-Cut Prevention, where we are given a graph $G=(V,E)$ with vertices $s$ and $t$ and an edge cost function and the aim is to choose an edge set $D$ of total cost at most $d$ such that $G$ has no $(s,t)$-edge cut of capacity at most $a$ that is disjoint from $D$. We show that Weighted Min $(s,t)$-Cut Prevention is NP-hard even on subcubcic graphs when all e…
▽ More
We introduce and study Weighted Min $(s,t)$-Cut Prevention, where we are given a graph $G=(V,E)$ with vertices $s$ and $t$ and an edge cost function and the aim is to choose an edge set $D$ of total cost at most $d$ such that $G$ has no $(s,t)$-edge cut of capacity at most $a$ that is disjoint from $D$. We show that Weighted Min $(s,t)$-Cut Prevention is NP-hard even on subcubcic graphs when all edges have capacity and cost one and provide a comprehensive study of the parameterized complexity of the problem. We show, for example W[1]-hardness with respect to $d$ and an FPT algorithm for $a$.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
Charge Radius of Neutron-deficient $^{54}$Ni and Symmetry Energy Constraints Using the Difference in Mirror Pair Charge Radii
Authors:
Skyy V. Pineda,
Kristian König,
Dominic M. Rossi,
B. Alex Brown,
Anthony Incorvati,
Jeremy Lantis,
Kei Minamisono,
Wilfried Nörtershäuser,
Jorge Piekarewicz,
Robert Powel,
Felix Sommer
Abstract:
The nuclear root-mean-square charge radius of $^{54}$Ni was determined with collinear laser spectroscopy to be $R(^{54}$Ni) = 3.737\,(3)~fm. In conjunction with the known radius of the mirror nucleus $^{54}$Fe, the difference of the charge radii was extracted as $ΔR_{\rm ch}$ = 0.049\,(4)~fm. Based on the correlation between $ΔR_{\rm ch}$ and the slope of the symmetry energy at nuclear saturation…
▽ More
The nuclear root-mean-square charge radius of $^{54}$Ni was determined with collinear laser spectroscopy to be $R(^{54}$Ni) = 3.737\,(3)~fm. In conjunction with the known radius of the mirror nucleus $^{54}$Fe, the difference of the charge radii was extracted as $ΔR_{\rm ch}$ = 0.049\,(4)~fm. Based on the correlation between $ΔR_{\rm ch}$ and the slope of the symmetry energy at nuclear saturation density ($L$), we deduced $20 \le L \le 70$\,MeV. The present result is consistent with the $L$ from the binary neutron star merger GW170817, favoring a soft neutron matter EOS, and barely consistent with the PREX-2 result within 1$σ$ error bands. Our result indicates the neutron-skin thickness of $^{48}$Ca as 0.15\,-\,0.19\,fm.
△ Less
Submitted 18 June, 2021;
originally announced June 2021.
-
Vector Symbolic Architectures as a Computing Framework for Emerging Hardware
Authors:
Denis Kleyko,
Mike Davies,
E. Paxon Frady,
Pentti Kanerva,
Spencer J. Kent,
Bruno A. Olshausen,
Evgeny Osipov,
Jan M. Rabaey,
Dmitri A. Rachkovskij,
Abbas Rahimi,
Friedrich T. Sommer
Abstract:
This article reviews recent progress in the development of the computing framework vector symbolic architectures (VSA) (also known as hyperdimensional computing). This framework is well suited for implementation in stochastic, emerging hardware, and it naturally expresses the types of cognitive operations required for artificial intelligence (AI). We demonstrate in this article that the field-like…
▽ More
This article reviews recent progress in the development of the computing framework vector symbolic architectures (VSA) (also known as hyperdimensional computing). This framework is well suited for implementation in stochastic, emerging hardware, and it naturally expresses the types of cognitive operations required for artificial intelligence (AI). We demonstrate in this article that the field-like algebraic structure of VSA offers simple but powerful operations on high-dimensional vectors that can support all data structures and manipulations relevant to modern computing. In addition, we illustrate the distinguishing feature of VSA, "computing in superposition," which sets it apart from conventional computing. It also opens the door to efficient solutions to the difficult combinatorial search problems inherent in AI applications. We sketch ways of demonstrating that VSA are computationally universal. We see them acting as a framework for computing with distributed representations that can play a role of an abstraction layer for emerging computing hardware. This article serves as a reference for computer architects by illustrating the philosophy behind VSA, techniques of distributed computing with them, and their relevance to emerging computing hardware, such as neuromorphic computing.
△ Less
Submitted 20 July, 2023; v1 submitted 9 June, 2021;
originally announced June 2021.
-
Destroying Multicolored Paths and Cycles in Edge-Colored Graphs
Authors:
Nils Jakob Eckstein,
Niels Grüttemeier,
Christian Komusiewicz,
Frank Sommer
Abstract:
We study the computational complexity of $c$-Colored $P_\ell$ Deletion and $c$-Colored $C_\ell$ Deletion. In these problems, one is given a $c$-edge-colored graph and wants to destroy all induced $c$-colored paths or cycles, respectively, on $\ell$ vertices by deleting at most $k$ edges. Herein, a path or cycle is $c$-colored if it contains edges of $c$ distinct colors. We show that $c$-Colored…
▽ More
We study the computational complexity of $c$-Colored $P_\ell$ Deletion and $c$-Colored $C_\ell$ Deletion. In these problems, one is given a $c$-edge-colored graph and wants to destroy all induced $c$-colored paths or cycles, respectively, on $\ell$ vertices by deleting at most $k$ edges. Herein, a path or cycle is $c$-colored if it contains edges of $c$ distinct colors. We show that $c$-Colored $P_\ell$ Deletion and $c$-Colored $C_\ell$ Deletion are NP-hard for each non-trivial combination of $c$ and $\ell$. We then analyze the parameterized complexity of these problems. We extend the notion of neighborhood diversity to edge-colored graphs and show that both problems are fixed-parameter tractable with respect to the colored neighborhood diversity of the input graph. We also provide hardness results to outline the limits of parameterization by the standard parameter solution size $k$. Finally, we consider bicolored input graphs and show a special case of $2$-Colored $P_4$ Deletion that can be solved in polynomial time.
△ Less
Submitted 1 March, 2023; v1 submitted 7 April, 2021;
originally announced April 2021.
-
Essentially Tight Kernels for (Weakly) Closed Graphs
Authors:
Tomohiro Koana,
Christian Komusiewicz,
Frank Sommer
Abstract:
We study kernelization of classic hard graph problems when the input graphs fulfill triadic closure properties. More precisely, we consider the recently introduced parameters closure number $c$ and the weak closure number $γ$ [Fox et al., SICOMP 2020] in addition to the standard parameter solution size $k$. For Capacitated Vertex Cover, Connected Vertex Cover, and Induced Matching we obtain the fi…
▽ More
We study kernelization of classic hard graph problems when the input graphs fulfill triadic closure properties. More precisely, we consider the recently introduced parameters closure number $c$ and the weak closure number $γ$ [Fox et al., SICOMP 2020] in addition to the standard parameter solution size $k$. For Capacitated Vertex Cover, Connected Vertex Cover, and Induced Matching we obtain the first kernels of size $k^{\mathcal{O}(γ)}$ and $(γk)^{\mathcal{O}(γ)}$, respectively, thus extending previous kernelization results on degenerate graphs. The kernels are essentially tight, since these problems are unlikely to admit kernels of size $k^{o(γ)}$ by previous results on their kernelization complexity in degenerate graphs [Cygan et al., ACM TALG 2017]. In addition, we provide lower bounds for the kernelization of Independent Set on graphs with constant closure number~$c$ and kernels for Dominating Set on weakly closed split graphs and weakly closed bipartite graphs.
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
Perceptron Theory Can Predict the Accuracy of Neural Networks
Authors:
Denis Kleyko,
Antonello Rosato,
E. Paxon Frady,
Massimo Panella,
Friedrich T. Sommer
Abstract:
Multilayer neural networks set the current state of the art for many technical classification problems. But, these networks are still, essentially, black boxes in terms of analyzing them and predicting their performance. Here, we develop a statistical theory for the one-layer perceptron and show that it can predict performances of a surprisingly large variety of neural networks with different arch…
▽ More
Multilayer neural networks set the current state of the art for many technical classification problems. But, these networks are still, essentially, black boxes in terms of analyzing them and predicting their performance. Here, we develop a statistical theory for the one-layer perceptron and show that it can predict performances of a surprisingly large variety of neural networks with different architectures. A general theory of classification with perceptrons is developed by generalizing an existing theory for analyzing reservoir computing models and connectionist models for symbolic reasoning known as vector symbolic architectures. Our statistical theory offers three formulas leveraging the signal statistics with increasing detail. The formulas are analytically intractable, but can be evaluated numerically. The description level that captures maximum details requires stochastic sampling methods. Depending on the network model, the simpler formulas already yield high prediction accuracy. The quality of the theory predictions is assessed in three experimental settings, a memorization task for echo state networks (ESNs) from reservoir computing literature, a collection of classification datasets for shallow randomly connected networks, and the ImageNet dataset for deep convolutional neural networks. We find that the second description level of the perceptron theory can predict the performance of types of ESNs, which could not be described previously. The theory can predict deep multilayer neural networks by being applied to their output layer. While other methods for prediction of neural networks performance commonly require to train an estimator model, the proposed theory requires only the first two moments of the distribution of the postsynaptic sums in the output neurons. The perceptron theory compares favorably to other methods that do not rely on training an estimator model.
△ Less
Submitted 20 July, 2023; v1 submitted 14 December, 2020;
originally announced December 2020.
-
High-resolution laser spectroscopy of $^{27-32}$Al
Authors:
H. Heylen,
C. S. Devlin,
W. Gins,
M. L. Bissell,
K. Blaum,
B. Cheal,
L. Filippin,
R. F. Garcia Ruiz,
M. Godefroid,
C. Gorges,
J. D. Holt,
A. Kanellakopoulos,
S. Kaufmann,
Á. Koszorús,
K. König,
S. Malbrunot-Ettanauer,
T. Miyagi,
R. Neugart,
G. Neyens,
W. Nörtershäuser,
R. Sánchez,
F. Sommer,
L. V. Rodríguez,
L. Xie,
Z. Y. Xu
, et al. (2 additional authors not shown)
Abstract:
Hyperfine spectra of $^\text{27-32}$Al ($Z=13$) have been measured at the ISOLDE-CERN facility via collinear laser spectroscopy using the $3s^23p\ ^2\text{P}^\text{o} _{3/2}\rightarrow 3s^24s\ ^2\text{S}_{1/2}$ atomic transition. For the first time, mean-square charge radii of radioactive aluminum isotopes have been determined alongside the previously unknown magnetic dipole moment of $^{29}$Al an…
▽ More
Hyperfine spectra of $^\text{27-32}$Al ($Z=13$) have been measured at the ISOLDE-CERN facility via collinear laser spectroscopy using the $3s^23p\ ^2\text{P}^\text{o} _{3/2}\rightarrow 3s^24s\ ^2\text{S}_{1/2}$ atomic transition. For the first time, mean-square charge radii of radioactive aluminum isotopes have been determined alongside the previously unknown magnetic dipole moment of $^{29}$Al and electric quadrupole moments of $^{29,30}$Al. A potentially reduced charge radius at $N=19$ may suggest an effect of the $N=20$ shell closure, which is visible in the Al chain, contrary to other isotopic chains in the $sd$ shell. The experimental results are compared to theoretical calculations in the framework of the valence-space in-medium similarity renormalization group using multiple sets of two and three-nucleon forces from chiral effective field theory. While the trend of experimental magnetic dipole and electric quadrupole moments is well reproduced, the absolute values are underestimated by theory, consistent with earlier studies. Moreover, both the scale and trend of the charge radii appear to be very sensitive to the chosen interaction.
△ Less
Submitted 14 October, 2020;
originally announced October 2020.
-
A Neural Network MCMC sampler that maximizes Proposal Entropy
Authors:
Zengyi Li,
Yubei Chen,
Friedrich T. Sommer
Abstract:
Markov Chain Monte Carlo (MCMC) methods sample from unnormalized probability distributions and offer guarantees of exact sampling. However, in the continuous case, unfavorable geometry of the target distribution can greatly limit the efficiency of MCMC methods. Augmenting samplers with neural networks can potentially improve their efficiency. Previous neural network based samplers were trained wit…
▽ More
Markov Chain Monte Carlo (MCMC) methods sample from unnormalized probability distributions and offer guarantees of exact sampling. However, in the continuous case, unfavorable geometry of the target distribution can greatly limit the efficiency of MCMC methods. Augmenting samplers with neural networks can potentially improve their efficiency. Previous neural network based samplers were trained with objectives that either did not explicitly encourage exploration, or used a L2 jump objective which could only be applied to well structured distributions. Thus it seems promising to instead maximize the proposal entropy for adapting the proposal to distributions of any shape. To allow direct optimization of the proposal entropy, we propose a neural network MCMC sampler that has a flexible and tractable proposal distribution. Specifically, our network architecture utilizes the gradient of the target distribution for generating proposals. Our model achieves significantly higher efficiency than previous neural network MCMC techniques in a variety of sampling tasks. Further, the sampler is applied on training of a convergent energy-based model of natural images. The adaptive sampler achieves unbiased sampling with significantly higher proposal entropy than Langevin dynamics sampler.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Cellular Automata Can Reduce Memory Requirements of Collective-State Computing
Authors:
Denis Kleyko,
E. Paxon Frady,
Friedrich T. Sommer
Abstract:
Various non-classical approaches of distributed information processing, such as neural networks, computation with Ising models, reservoir computing, vector symbolic architectures, and others, employ the principle of collective-state computing. In this type of computing, the variables relevant in a computation are superimposed into a single high-dimensional state vector, the collective-state. The v…
▽ More
Various non-classical approaches of distributed information processing, such as neural networks, computation with Ising models, reservoir computing, vector symbolic architectures, and others, employ the principle of collective-state computing. In this type of computing, the variables relevant in a computation are superimposed into a single high-dimensional state vector, the collective-state. The variable encoding uses a fixed set of random patterns, which has to be stored and kept available during the computation. Here we show that an elementary cellular automaton with rule 90 (CA90) enables space-time tradeoff for collective-state computing models that use random dense binary representations, i.e., memory requirements can be traded off with computation running CA90. We investigate the randomization behavior of CA90, in particular, the relation between the length of the randomization period and the size of the grid, and how CA90 preserves similarity in the presence of the initialization noise. Based on these analyses we discuss how to optimize a collective-state computing model, in which CA90 expands representations on the fly from short seed patterns - rather than storing the full set of random patterns. The CA90 expansion is applied and tested in concrete scenarios using reservoir computing and vector symbolic architectures. Our experimental results show that collective-state computing with CA90 expansion performs similarly compared to traditional collective-state models, in which random patterns are generated initially by a pseudo-random number generator and then stored in a large memory.
△ Less
Submitted 7 October, 2020;
originally announced October 2020.
-
Variable Binding for Sparse Distributed Representations: Theory and Applications
Authors:
E. Paxon Frady,
Denis Kleyko,
Friedrich T. Sommer
Abstract:
Symbolic reasoning and neural networks are often considered incompatible approaches. Connectionist models known as Vector Symbolic Architectures (VSAs) can potentially bridge this gap. However, classical VSAs and neural networks are still considered incompatible. VSAs encode symbols by dense pseudo-random vectors, where information is distributed throughout the entire neuron population. Neural net…
▽ More
Symbolic reasoning and neural networks are often considered incompatible approaches. Connectionist models known as Vector Symbolic Architectures (VSAs) can potentially bridge this gap. However, classical VSAs and neural networks are still considered incompatible. VSAs encode symbols by dense pseudo-random vectors, where information is distributed throughout the entire neuron population. Neural networks encode features locally, often forming sparse vectors of neural activation. Following Rachkovskij (2001); Laiho et al. (2015), we explore symbolic reasoning with sparse distributed representations. The core operations in VSAs are dyadic operations between vectors to express variable binding and the representation of sets. Thus, algebraic manipulations enable VSAs to represent and process data structures in a vector space of fixed dimensionality. Using techniques from compressed sensing, we first show that variable binding between dense vectors in VSAs is mathematically equivalent to tensor product binding between sparse vectors, an operation which increases dimensionality. This result implies that dimensionality-preserving binding for general sparse vectors must include a reduction of the tensor matrix into a single sparse vector. Two options for sparsity-preserving variable binding are investigated. One binding method for general sparse vectors extends earlier proposals to reduce the tensor product into a vector, such as circular convolution. The other method is only defined for sparse block-codes, block-wise circular convolution. Our experiments reveal that variable binding for block-codes has ideal properties, whereas binding for general sparse vectors also works, but is lossy, similar to previous proposals. We demonstrate a VSA with sparse block-codes in example applications, cognitive reasoning and classification, and discuss its relevance for neuroscience and neural networks.
△ Less
Submitted 14 September, 2020;
originally announced September 2020.
-
Computing Dense and Sparse Subgraphs of Weakly Closed Graphs
Authors:
Tomohiro Koana,
Christian Komusiewicz,
Frank Sommer
Abstract:
A graph $G$ is weakly $γ$-closed if every induced subgraph of $G$ contains one vertex $v$ such that for each non-neighbor $u$ of $v$ it holds that $|N(u)\cap N(v)|<γ$. The weak closure $γ(G)$ of a graph, recently introduced by Fox et al. [SIAM J. Comp. 2020], is the smallest number such that $G$ is weakly $γ$-closed. This graph parameter is never larger than the degeneracy (plus one) and can be si…
▽ More
A graph $G$ is weakly $γ$-closed if every induced subgraph of $G$ contains one vertex $v$ such that for each non-neighbor $u$ of $v$ it holds that $|N(u)\cap N(v)|<γ$. The weak closure $γ(G)$ of a graph, recently introduced by Fox et al. [SIAM J. Comp. 2020], is the smallest number such that $G$ is weakly $γ$-closed. This graph parameter is never larger than the degeneracy (plus one) and can be significantly smaller. Extending the work of Fox et al. [SIAM J. Comp. 2020] on clique enumeration, we show that several problems related to finding dense subgraphs, such as the enumeration of bicliques and $s$-plexes, are fixed-parameter tractable with respect to $γ(G)$. Moreover, we show that the problem of determining whether a weakly $γ$-closed graph $G$ has a subgraph on at least $k$ vertices that belongs to a graph class $\mathcal{G}$ which is closed under taking subgraphs admits a kernel with at most $γk^2$ vertices. Finally, we provide fixed-parameter algorithms for Independent Dominating Set and Dominating Clique when parameterized by $γ+k$ where $k$ is the solution size.
△ Less
Submitted 3 November, 2022; v1 submitted 10 July, 2020;
originally announced July 2020.
-
Resonator networks for factoring distributed representations of data structures
Authors:
E. Paxon Frady,
Spencer Kent,
Bruno A. Olshausen,
Friedrich T. Sommer
Abstract:
The ability to encode and manipulate data structures with distributed neural representations could qualitatively enhance the capabilities of traditional neural networks by supporting rule-based symbolic reasoning, a central property of cognition. Here we show how this may be accomplished within the framework of Vector Symbolic Architectures (VSA) (Plate, 1991; Gayler, 1998; Kanerva, 1996), whereby…
▽ More
The ability to encode and manipulate data structures with distributed neural representations could qualitatively enhance the capabilities of traditional neural networks by supporting rule-based symbolic reasoning, a central property of cognition. Here we show how this may be accomplished within the framework of Vector Symbolic Architectures (VSA) (Plate, 1991; Gayler, 1998; Kanerva, 1996), whereby data structures are encoded by combining high-dimensional vectors with operations that together form an algebra on the space of distributed representations. In particular, we propose an efficient solution to a hard combinatorial search problem that arises when decoding elements of a VSA data structure: the factorization of products of multiple code vectors. Our proposed algorithm, called a resonator network, is a new type of recurrent neural network that interleaves VSA multiplication operations and pattern completion. We show in two examples -- parsing of a tree-like data structure and parsing of a visual scene -- how the factorization problem arises and how the resonator network can solve it. More broadly, resonator networks open the possibility to apply VSAs to myriad artificial intelligence problems in real-world domains. A companion paper (Kent et al., 2020) presents a rigorous analysis and evaluation of the performance of resonator networks, showing it out-performs alternative approaches.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
A $4π$ Fluorescence Detection Region for Collinear Laser Spectroscopy
Authors:
Bernhard Maaß,
Kristian König,
Jörg Krämer,
Andrew J. Miller,
Kei Minamisono,
Wilfried Nörtershäuser,
Felix Sommer
Abstract:
We report on a novel detection system for collinear laser spectroscopy which provides an almost $4π$ solid angle for fluorescence photon detection by employing curved surface mirrors. Additional parabolic angular filters offer passive stray light suppression and can be configured to match the experimental conditions. The mirror surfaces have an excellent reflectivity over a broad band of wavelengt…
▽ More
We report on a novel detection system for collinear laser spectroscopy which provides an almost $4π$ solid angle for fluorescence photon detection by employing curved surface mirrors. Additional parabolic angular filters offer passive stray light suppression and can be configured to match the experimental conditions. The mirror surfaces have an excellent reflectivity over a broad band of wavelengths in the optical spectrum and can be substituted to expand the wavelength acceptance range even further. Experiments with this system were performed at two collinear laser spectroscopy setups, including the laser spectroscopic investigation of $^{36}$Ca using rates of 25/s at NSCL, MSU.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Exploiting $\mathbf{c}$-Closure in Kernelization Algorithms for Graph Problems
Authors:
Tomohiro Koana,
Christian Komusiewicz,
Frank Sommer
Abstract:
A graph is c-closed if every pair of vertices with at least c common neighbors is adjacent. The c-closure of a graph G is the smallest number such that G is c-closed. Fox et al. [ICALP '18] defined c-closure and investigated it in the context of clique enumeration. We show that c-closure can be applied in kernelization algorithms for several classic graph problems. We show that Dominating Set admi…
▽ More
A graph is c-closed if every pair of vertices with at least c common neighbors is adjacent. The c-closure of a graph G is the smallest number such that G is c-closed. Fox et al. [ICALP '18] defined c-closure and investigated it in the context of clique enumeration. We show that c-closure can be applied in kernelization algorithms for several classic graph problems. We show that Dominating Set admits a kernel of size k^O(c), that Induced Matching admits a kernel with O(c^7*k^8) vertices, and that Irredundant Set admits a kernel with O(c^(5/2)*k^3) vertices. Our kernelization exploits the fact that c-closed graphs have polynomially-bounded Ramsey numbers, as we show.
△ Less
Submitted 20 June, 2022; v1 submitted 8 May, 2020;
originally announced May 2020.
-
A Model for Image Segmentation in Retina
Authors:
Christopher Warner,
Friedrich T. Sommer
Abstract:
While traditional feed-forward filter models can reproduce the rate responses of retinal ganglion neurons to simple stimuli, they cannot explain why synchrony between spikes is much higher than expected by Poisson firing [6], and can be sometimes rhythmic [25, 16]. Here we investigate the hypothesis that synchrony in periodic retinal spike trains could convey contextual information of the visual i…
▽ More
While traditional feed-forward filter models can reproduce the rate responses of retinal ganglion neurons to simple stimuli, they cannot explain why synchrony between spikes is much higher than expected by Poisson firing [6], and can be sometimes rhythmic [25, 16]. Here we investigate the hypothesis that synchrony in periodic retinal spike trains could convey contextual information of the visual input, which is extracted by computations in the retinal network. We propose a computational model for image segmentation consisting of a Kuramoto model of coupled oscillators whose phases model the timing of individual retinal spikes. The phase couplings between oscillators are shaped by the stimulus structure, causing cells to synchronize if the local contrast in their receptive fields is similar. In essence, relaxation in the oscillator network solves a graph clustering problem with the graph representing feature similarity between different points in the image. We tested different model versions on the Berkeley Image Segmentation Data Set (BSDS). Networks with phase interactions set by standard representations of the feature graph (adjacency matrix, Graph Laplacian or modularity) failed to exhibit segmentation performance significantly over the baseline, a model of independent sensors. In contrast, a network with phase interactions that takes into account not only feature similarities but also geometric distances between receptive fields exhibited segmentation performance significantly above baseline.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Complex Amplitude-Phase Boltzmann Machines
Authors:
Zengyi Li,
Friedrich T. Sommer
Abstract:
We extend the framework of Boltzmann machines to a network of complex-valued neurons with variable amplitudes, referred to as Complex Amplitude-Phase Boltzmann machine (CAP-BM). The model is capable of performing unsupervised learning on the amplitude and relative phase distribution in complex data. The sampling rule of the Gibbs distribution and the learning rules of the model are presented. Lear…
▽ More
We extend the framework of Boltzmann machines to a network of complex-valued neurons with variable amplitudes, referred to as Complex Amplitude-Phase Boltzmann machine (CAP-BM). The model is capable of performing unsupervised learning on the amplitude and relative phase distribution in complex data. The sampling rule of the Gibbs distribution and the learning rules of the model are presented. Learning in a Complex Amplitude-Phase restricted Boltzmann machine (CAP-RBM) is demonstrated on synthetic complex-valued images, and handwritten MNIST digits transformed by a complex wavelet transform. Specifically, we show the necessity of a new amplitude-amplitude coupling term in our model. The proposed model is potentially valuable for machine learning tasks involving complex-valued data with amplitude variation, and for develo** algorithms for novel computation hardware, such as coupled oscillators and neuromorphic hardware, on which Boltzmann sampling can be executed in the complex domain.
△ Less
Submitted 4 May, 2020;
originally announced May 2020.
-
Neuromorphic Nearest-Neighbor Search Using Intel's Pohoiki Springs
Authors:
E. Paxon Frady,
Garrick Orchard,
David Florey,
Nabil Imam,
Ruokun Liu,
Joyesh Mishra,
Jonathan Tse,
Andreas Wild,
Friedrich T. Sommer,
Mike Davies
Abstract:
Neuromorphic computing applies insights from neuroscience to uncover innovations in computing technology. In the brain, billions of interconnected neurons perform rapid computations at extremely low energy levels by leveraging properties that are foreign to conventional computing systems, such as temporal spiking codes and finely parallelized processing units integrating both memory and computatio…
▽ More
Neuromorphic computing applies insights from neuroscience to uncover innovations in computing technology. In the brain, billions of interconnected neurons perform rapid computations at extremely low energy levels by leveraging properties that are foreign to conventional computing systems, such as temporal spiking codes and finely parallelized processing units integrating both memory and computation. Here, we showcase the Pohoiki Springs neuromorphic system, a mesh of 768 interconnected Loihi chips that collectively implement 100 million spiking neurons in silicon. We demonstrate a scalable approximate k-nearest neighbor (k-NN) algorithm for searching large databases that exploits neuromorphic principles. Compared to state-of-the-art conventional CPU-based implementations, we achieve superior latency, index build time, and energy efficiency when evaluated on several standard datasets containing over 1 million high-dimensional patterns. Further, the system supports adding new data points to the indexed database online in O(1) time unlike all but brute force conventional k-NN implementations.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Learning Energy-Based Models in High-Dimensional Spaces with Multi-scale Denoising Score Matching
Authors:
Zengyi Li,
Yubei Chen,
Friedrich T. Sommer
Abstract:
Energy-Based Models (EBMs) assign unnormalized log-probability to data samples. This functionality has a variety of applications, such as sample synthesis, data denoising, sample restoration, outlier detection, Bayesian reasoning, and many more. But training of EBMs using standard maximum likelihood is extremely slow because it requires sampling from the model distribution. Score matching potentia…
▽ More
Energy-Based Models (EBMs) assign unnormalized log-probability to data samples. This functionality has a variety of applications, such as sample synthesis, data denoising, sample restoration, outlier detection, Bayesian reasoning, and many more. But training of EBMs using standard maximum likelihood is extremely slow because it requires sampling from the model distribution. Score matching potentially alleviates this problem. In particular, denoising score matching \citep{vincent2011connection} has been successfully used to train EBMs. Using noisy data samples with one fixed noise level, these models learn fast and yield good results in data denoising \citep{saremi2019neural}. However, demonstrations of such models in high quality sample synthesis of high dimensional data were lacking. Recently, \citet{song2019generative} have shown that a generative model trained by denoising score matching accomplishes excellent sample synthesis, when trained with data samples corrupted with multiple levels of noise. Here we provide analysis and empirical evidence showing that training with multiple noise levels is necessary when the data dimension is high. Leveraging this insight, we propose a novel EBM trained with multi-scale denoising score matching. Our model exhibits data generation performance comparable to state-of-the-art techniques such as GANs, and sets a new baseline for EBMs. The proposed model also provides density information and performs well in an image inpainting task.
△ Less
Submitted 19 December, 2019; v1 submitted 17 October, 2019;
originally announced October 2019.
-
Convergence and Hardness of Strategic Schelling Segregation
Authors:
Hagen Echzell,
Tobias Friedrich,
Pascal Lenzner,
Louise Molitor,
Marcus Pappik,
Friedrich Schöne,
Fabian Sommer,
David Stangl
Abstract:
The phenomenon of residential segregation was captured by Schelling's famous segregation model where two types of agents are placed on a grid and an agent is content with her location if the fraction of her neighbors which have the same type as her is at least $τ$, for some $0<τ<1$. Discontent agents simply swap their location with a randomly chosen other discontent agent or jump to a random empty…
▽ More
The phenomenon of residential segregation was captured by Schelling's famous segregation model where two types of agents are placed on a grid and an agent is content with her location if the fraction of her neighbors which have the same type as her is at least $τ$, for some $0<τ<1$. Discontent agents simply swap their location with a randomly chosen other discontent agent or jump to a random empty cell.
We analyze a generalized game-theoretic model of Schelling segregation which allows more than two agent types and more general underlying graphs modeling the residential area. For this we show that both aspects heavily influence the dynamic properties and the tractability of finding an optimal placement. We map the boundary of when improving response dynamics (IRD), i.e., the natural approach for finding equilibrium states, are guaranteed to converge. For this we prove several sharp threshold results where guaranteed IRD convergence suddenly turns into the strongest possible non-convergence result: a violation of weak acyclicity. In particular, we show such threshold results also for Schelling's original model, which is in contrast to the standard assumption in many empirical papers. Furthermore, we show that in case of convergence, IRD find an equilibrium in $\mathcal{O}(m)$ steps, where $m$ is the number of edges in the underlying graph and show that this bound is met in empirical simulations starting from random initial agent placements.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Resonator Networks outperform optimization methods at solving high-dimensional vector factorization
Authors:
Spencer J. Kent,
E. Paxon Frady,
Friedrich T. Sommer,
Bruno A. Olshausen
Abstract:
We develop theoretical foundations of Resonator Networks, a new type of recurrent neural network introduced in Frady et al. (2020) to solve a high-dimensional vector factorization problem arising in Vector Symbolic Architectures. Given a composite vector formed by the Hadamard product between a discrete set of high-dimensional vectors, a Resonator Network can efficiently decompose the composite in…
▽ More
We develop theoretical foundations of Resonator Networks, a new type of recurrent neural network introduced in Frady et al. (2020) to solve a high-dimensional vector factorization problem arising in Vector Symbolic Architectures. Given a composite vector formed by the Hadamard product between a discrete set of high-dimensional vectors, a Resonator Network can efficiently decompose the composite into these factors. We compare the performance of Resonator Networks against optimization-based methods, including Alternating Least Squares and several gradient-based algorithms, showing that Resonator Networks are superior in several important ways. This advantage is achieved by leveraging a combination of nonlinear dynamics and "searching in superposition," by which estimates of the correct solution are formed from a weighted superposition of all possible solutions. While the alternative methods also search in superposition, the dynamics of Resonator Networks allow them to strike a more effective balance between exploring the solution space and exploiting local information to drive the network toward probable solutions. Resonator Networks are not guaranteed to converge, but within a particular regime they almost always do. In exchange for relaxing this guarantee of global convergence, Resonator Networks are dramatically more effective at finding factorizations than all alternative approaches considered.
△ Less
Submitted 14 July, 2020; v1 submitted 19 June, 2019;
originally announced June 2019.
-
Ground State Electromagnetic Moments of $^{37}$Ca
Authors:
A. Klose,
K. Minamisono,
A. J. Miller,
B. A. Brown,
D. Garand,
J. D. Holt,
J. D. Lantis,
Y. Liu,
B. Maaß,
W. Nörtershäuser,
S. V. Pineda,
D. M. Rossi,
A. Schwenk,
F. Sommer,
C. Sumithrarachchi,
A. Teigelhöfer,
J. Watkins
Abstract:
The hyperfine coupling constants of neutron deficient $^{37}$Ca were deduced from the atomic hyperfine spectrum of the $4s~^2S_{1/2}$ $\leftrightarrow$ $4p~^2P_{3/2}$ transition in Ca II, measured using the collinear laser spectroscopy technique. The ground-state magnetic-dipole and spectroscopic electric-quadrupole moments were determined for the first time as $μ= +0.7453(72) μ_N$ and…
▽ More
The hyperfine coupling constants of neutron deficient $^{37}$Ca were deduced from the atomic hyperfine spectrum of the $4s~^2S_{1/2}$ $\leftrightarrow$ $4p~^2P_{3/2}$ transition in Ca II, measured using the collinear laser spectroscopy technique. The ground-state magnetic-dipole and spectroscopic electric-quadrupole moments were determined for the first time as $μ= +0.7453(72) μ_N$ and $Q = -15(11)$ $e^2$fm$^2$, respectively. The experimental values agree well with nuclear shell model calculations using the universal sd model-space Hamiltonians versions A and B (USDA/B) in the $sd$-model space with a 95\% probability of the canonical nucleon configuration. It is shown that the magnetic moment of $^{39}$Ca requires a larger non-$sd$-shell component than that of $^{37}$Ca for good agreement with the shell-model calculation, indicating a more robust closed sub-shell structure of $^{36}$Ca at the neutron number $N$ = 16 than $^{40}$Ca. The results are also compared to valence-space in-medium similarity renormalization group calculations based on chiral two- and three-nucleon interactions.
△ Less
Submitted 5 June, 2019;
originally announced June 2019.
-
A simple method for detecting chaos in nature
Authors:
Daniel Toker,
Friedrich T. Sommer,
Mark D'Esposito
Abstract:
Chaos, or exponential sensitivity to small perturbations, appears everywhere in nature. Moreover, chaos is predicted to play diverse functional roles in living systems. A method for detecting chaos from empirical measurements should therefore be a key component of the biologist's toolkit. But, classic chaos-detection tools are highly sensitive to measurement noise and break down for common edge ca…
▽ More
Chaos, or exponential sensitivity to small perturbations, appears everywhere in nature. Moreover, chaos is predicted to play diverse functional roles in living systems. A method for detecting chaos from empirical measurements should therefore be a key component of the biologist's toolkit. But, classic chaos-detection tools are highly sensitive to measurement noise and break down for common edge cases, making it difficult to detect chaos in domains, like biology, where measurements are noisy. However, newer tools promise to overcome these limitations. Here, we combine several such tools into an automated processing pipeline, and show that our pipeline can detect the presence (or absence) of chaos in noisy recordings, even for difficult edge cases. As a first-pass application of our pipeline, we show that heart rate variability is not chaotic as some have proposed, and instead reflects a stochastic process in both health and disease. Our tool is easy-to-use and freely available.
△ Less
Submitted 9 January, 2020; v1 submitted 26 March, 2019;
originally announced April 2019.
-
Robust computation with rhythmic spike patterns
Authors:
E. Paxon Frady,
Friedrich T. Sommer
Abstract:
Information coding by precise timing of spikes can be faster and more energy-efficient than traditional rate coding. However, spike-timing codes are often brittle, which has limited their use in theoretical neuroscience and computing applications. Here, we propose a novel type of attractor neural network in complex state space, and show how it can be leveraged to construct spiking neural networks…
▽ More
Information coding by precise timing of spikes can be faster and more energy-efficient than traditional rate coding. However, spike-timing codes are often brittle, which has limited their use in theoretical neuroscience and computing applications. Here, we propose a novel type of attractor neural network in complex state space, and show how it can be leveraged to construct spiking neural networks with robust computational properties through a phase-to-timing map**. Building on Hebbian neural associative memories, like Hopfield networks, we first propose threshold phasor associative memory (TPAM) networks. Complex phasor patterns whose components can assume continuous-valued phase angles and binary magnitudes can be stored and retrieved as stable fixed points in the network dynamics. TPAM achieves high memory capacity when storing sparse phasor patterns, and we derive the energy function that governs its fixed point attractor dynamics. Second, through simulation experiments we show how the complex algebraic computations in TPAM can be approximated by a biologically plausible network of integrate-and-fire neurons with synaptic delays and recurrently connected inhibitory interneurons. The fixed points of TPAM in the complex domain are commensurate with stable periodic states of precisely timed spiking activity that are robust to perturbation. The link established between rhythmic firing patterns and complex attractor dynamics has implications for the interpretation of spike patterns seen in neuroscience, and can serve as a framework for computation in emerging neuromorphic devices.
△ Less
Submitted 22 January, 2019;
originally announced January 2019.
-
Nuclear Charge Radii of $^{10,11}$B
Authors:
Bernhard Maaß,
Thomas Hüther,
Jan Krause,
Jörg Krämer,
Kristian König,
Alessandro Lovato,
Peter Müller,
Mariusz Puchalski,
Krzysztof Pachucki,
Robert Roth,
Rodolfo Sánchez,
Felix Sommer,
R. B. Wiringa,
Wilfried Nörtershäuser
Abstract:
The first determination of the nuclear charge radius by laser spectroscopy for a five-electron system is reported. This is achieved by combining high-accuracy ab initio mass-shift calculations and a high-resolution measurement of the isotope shift in the $2s^2 2p\, ^2\mathrm{P}_{1/2} \rightarrow 2s^2 3s\, ^2\mathrm{S}_{1/2}$ ground state transition in boron atoms. Accuracy is increased by orders o…
▽ More
The first determination of the nuclear charge radius by laser spectroscopy for a five-electron system is reported. This is achieved by combining high-accuracy ab initio mass-shift calculations and a high-resolution measurement of the isotope shift in the $2s^2 2p\, ^2\mathrm{P}_{1/2} \rightarrow 2s^2 3s\, ^2\mathrm{S}_{1/2}$ ground state transition in boron atoms. Accuracy is increased by orders of magnitude for the stable isotopes $^{10,11}$B and the results are used to extract their difference in the mean-square charge radius $\langle r^2_\mathrm{c}\rangle^{11} - \langle r^2_\mathrm{c}\rangle^{10} = -0.49\,(12)\,\mathrm{fm}^2$. The result is qualitatively explained by a possible cluster structure of the boron nuclei and quantitatively used as a benchmark for new ab initio nuclear structure calculations using the no-core shell model and Green's function Monte Carlo approaches.
△ Less
Submitted 18 January, 2019;
originally announced January 2019.
-
Destroying Bicolored $P_3$s by Deleting Few Edges
Authors:
Niels Grüttemeier,
Christian Komusiewicz,
Jannik Schestag,
Frank Sommer
Abstract:
We introduce and study the Bicolored $P_3$ Deletion problem defined as follows. The input is a graph $G=(V,E)$ where the edge set $E$ is partitioned into a set $E_r$ of red edges and a set $E_b$ of blue edges. The question is whether we can delete at most $k$ edges such that $G$ does not contain a bicolored $P_3$ as an induced subgraph. Here, a bicolored $P_3$ is a path on three vertices with one…
▽ More
We introduce and study the Bicolored $P_3$ Deletion problem defined as follows. The input is a graph $G=(V,E)$ where the edge set $E$ is partitioned into a set $E_r$ of red edges and a set $E_b$ of blue edges. The question is whether we can delete at most $k$ edges such that $G$ does not contain a bicolored $P_3$ as an induced subgraph. Here, a bicolored $P_3$ is a path on three vertices with one blue and one red edge. We show that Bicolored $P_3$ Deletion is NP-hard and cannot be solved in $2^{o(|V|+|E|)}$ time on bounded-degree graphs if the ETH is true. Then, we show that Bicolored $P_3$ Deletion is polynomial-time solvable when $G$ does not contain a bicolored $K_3$, that is, a triangle with edges of both colors. Moreover, we provide a polynomial-time algorithm for the case that $G$ contains no blue $P_3$, red $P_3$, blue $K_3$, and red $K_3$. Finally, we show that Bicolored $P_3$ Deletion can be solved in $ O(1.84^k\cdot |V| \cdot |E|)$ time and that it admits a kernel with $ O(kΔ\min(k,Δ))$ vertices, where $Δ$ is the maximum degree of $G$.
△ Less
Submitted 4 June, 2021; v1 submitted 11 January, 2019;
originally announced January 2019.