Cargando…

Listen to the Brain–Auditory Sound Source Localization in Neuromorphic Computing Architectures

Conventional processing of sensory input often relies on uniform sampling leading to redundant information and unnecessary resource consumption throughout the entire processing pipeline. Neuromorphic computing challenges these conventions by mimicking biology and employing distributed event-based ha...

Descripción completa

Detalles Bibliográficos
Autores principales: Schmid, Daniel, Oess, Timo, Neumann, Heiko
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181665/
https://www.ncbi.nlm.nih.gov/pubmed/37177655
http://dx.doi.org/10.3390/s23094451
Descripción
Sumario:Conventional processing of sensory input often relies on uniform sampling leading to redundant information and unnecessary resource consumption throughout the entire processing pipeline. Neuromorphic computing challenges these conventions by mimicking biology and employing distributed event-based hardware. Based on the task of lateral auditory sound source localization (SSL), we propose a generic approach to map biologically inspired neural networks to neuromorphic hardware. First, we model the neural mechanisms of SSL based on the interaural level difference (ILD). Afterward, we identify generic computational motifs within the model and transform them into spike-based components. A hardware-specific step then implements them on neuromorphic hardware. We exemplify our approach by mapping the neural SSL model onto two platforms, namely the IBM TrueNorth Neurosynaptic System and SpiNNaker. Both implementations have been tested on synthetic and real-world data in terms of neural tunings and readout characteristics. For synthetic stimuli, both implementations provide a perfect readout ([Formula: see text] accuracy). Preliminary real-world experiments yield accuracies of [Formula: see text] (TrueNorth) and [Formula: see text] (SpiNNaker), RMSEs of [Formula: see text] and [Formula: see text] , and MAEs of [Formula: see text] and [Formula: see text] , respectively. Overall, the proposed mapping approach allows for the successful implementation of the same SSL model on two different neuromorphic architectures paving the way toward more hardware-independent neural SSL.