SlideShare a Scribd company logo
A Seminar Presentation for the degree of
Master of Technology
in
Computer Science and Engineering
PRESENTED BY:-
AKHIL UPADHYAY
M-TECH 3rd SEM CSE
ROLL NO.- 121140002
SUBMITED TO:-
MR. ROHIT MIRI
H.O.D. OF COMPUTER
SCIENCE DEPARTMENT
INTRODUCTION
 A Hopfield Networks is a form of recurrent artificial neural
Network popularized by John Hopfield in 1982, but described
earlier by Little in 1974
 Hopfield has developed a number of neural Networks based
on fixed weights and adaptive activations
 These Networks can serve as associative memory Networks
and can be used to solve constraint satisfaction problems such
as the "Travelling Salesman Problem
(Cont..)
Two types:
1. Discrete Hopfield Network.
2. Continuous Hopfield Network.
Discrete Hopfield Network
 Hopfield has proposed two basic models of associative
memories (Hopfield 1982, 1984).
(Cont..)
Discrete Hopfield Network
The first of these is a ‘DISCRETE MODEL’ while the
second is a ‘CONTINUOUS’ version of the same.
 The terms ‘DISCRETE’ or ‘CONTINUOUS’ refer to the
nature of the state variables and time, in these models.
 In the discrete Hopfield network, each neuron has a
binary state
𝑽𝒊 ∈{1,-1}
 The state of the network with N neurons is represented
by the vector
(Cont..)
Discrete Hopfield Network
V={ 𝑽 𝟏, … … . , 𝑽𝒊, … … . 𝑽 𝑵} 𝑻
 The network is fully-connected, i.e., each neuron
connected to all others.
 The weight from j’th neuron to i’th neuron is given by,
and weight matrix is given as
W={𝒘𝒊𝒋}
 Since the network has loops, computations are dynamic
and the network state evolves through time, which is a
discrete variable.
(Cont..)
Discrete Hopfield Network
 Hopfield net differ from iterative auto associative net in 2
things.
1. Only one unit updates its activation
at a time (based on the signal it receives from each other
unit)
2. Each unit continues to receive an
external signal in addition to the signal from the other units
in the net.
(Cont..)
Surprise
 The asynchronous updating of the units allows a function,
known as an energy function, to be found for the net.
 The existence of such a function enables us to prove that the
net will converge to a stable set of activations, rather than
oscillating.
 The original formulation of the discrete Hopfield net showed
the usefulness of the net as content-addressable memory.
(Cont..)
Discrete Hopfield Network
(Cont..)
Discrete Hopfield Network
Algorithm
There are several versions of the discrete Hopfield net.
 Binary Input Vectors
To store a set of binary patterns s ( p ) ,
p = 1 , . . . , P, where
))().....().....(()( 1 pspspsps ni
(Cont..)
Discrete Hopfield Network
 The weight matrix W = is given by}{ ijw
]12][12[ )()(   pj
p
piij ssw ji for
and
.0iiw
(Cont..)
Discrete Hopfield Network
 Bipolar Inputs
To store a set of binary patterns s ( p ) ,
p = 1 , . . . , P, where
))().....().....(()( 1 pspspsps ni
The weight matrix W = is given by,}{ ijw
)()( pj
p
piij ssw  ji for
and
0iiw
(Cont..)
PROPERTIES OF HOPFIELD NETWORK
A recurrent network with all nodes connected to all other
nodes.
Nodes have binary outputs (either 0,1 or -1,1).
Weights between the nodes are symmetric .
No connection from a node to itself is allowed.
Nodes are updated asynchronously ( i.e. nodes are selected at
random).
The network has no hidden nodes or layer.
(Cont..)
Discrete Hopfield Network
Applications:-
A binary Hopfield net can be used to determine whether an input
vector is a "known” or an "unknown" vector.
The net recognizes a "known" vector by producing a pattern of
activation on the units of the net that is the same as the vector
stored in the net.
If the input vector is an "unknown" vector, the activation vectors
produced as the net iterates will converge to an activation vector
that is not one of the stored patterns.
Thank You

More Related Content

What's hot

IoT with Arduino
IoT with ArduinoIoT with Arduino
IoT with Arduino
Arvind Singh
 
Deep Feed Forward Neural Networks and Regularization
Deep Feed Forward Neural Networks and RegularizationDeep Feed Forward Neural Networks and Regularization
Deep Feed Forward Neural Networks and Regularization
Yan Xu
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
Suvendu Kumar Dash
 
VLIW Processors
VLIW ProcessorsVLIW Processors
VLIW Processors
Sudhanshu Janwadkar
 
Embedded Systems Power Management
Embedded Systems Power ManagementEmbedded Systems Power Management
Embedded Systems Power Management
Patrick Bellasi
 
Iteration bound
Iteration boundIteration bound
Iteration bound
Anbuselvi Mathivanan
 
Neuro-fuzzy systems
Neuro-fuzzy systemsNeuro-fuzzy systems
Neuro-fuzzy systems
Sagar Ahire
 
Intel IA 64
Intel IA 64Intel IA 64
Intel IA 64
Nartana Shenbagaraj
 
Quantum neural network
Quantum neural networkQuantum neural network
Quantum neural network
surat murthy
 
Floating point arithmetic operations (1)
Floating point arithmetic operations (1)Floating point arithmetic operations (1)
Floating point arithmetic operations (1)
cs19club
 
Generic types and collections GUIs.pptx
Generic types and collections GUIs.pptxGeneric types and collections GUIs.pptx
Generic types and collections GUIs.pptx
Avirup Pal
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
NikitaRuhela
 
Autoencoders
AutoencodersAutoencoders
Autoencoders
CloudxLab
 
Superscalar Processor
Superscalar ProcessorSuperscalar Processor
Superscalar Processor
Manash Kumar Mondal
 
Forward Backward Chaining
Forward Backward ChainingForward Backward Chaining
Forward Backward Chaining
QAU ISLAMABAD,PAKISTAN
 
Multiplexers & Demultiplexers
Multiplexers & DemultiplexersMultiplexers & Demultiplexers
Multiplexers & Demultiplexers
Jayanshu Gundaniya
 
AI Greedy and A-STAR Search
AI Greedy and A-STAR SearchAI Greedy and A-STAR Search
AI Greedy and A-STAR Search
Andrew Ferlitsch
 
Neuro-Fuzzy Controller
Neuro-Fuzzy ControllerNeuro-Fuzzy Controller
Neuro-Fuzzy Controller
Ishwar Bhoge
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
Raj Endiran
 
Superscalar & superpipeline processor
Superscalar & superpipeline processorSuperscalar & superpipeline processor
Superscalar & superpipeline processor
Muhammad Ishaq
 

What's hot (20)

IoT with Arduino
IoT with ArduinoIoT with Arduino
IoT with Arduino
 
Deep Feed Forward Neural Networks and Regularization
Deep Feed Forward Neural Networks and RegularizationDeep Feed Forward Neural Networks and Regularization
Deep Feed Forward Neural Networks and Regularization
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
 
VLIW Processors
VLIW ProcessorsVLIW Processors
VLIW Processors
 
Embedded Systems Power Management
Embedded Systems Power ManagementEmbedded Systems Power Management
Embedded Systems Power Management
 
Iteration bound
Iteration boundIteration bound
Iteration bound
 
Neuro-fuzzy systems
Neuro-fuzzy systemsNeuro-fuzzy systems
Neuro-fuzzy systems
 
Intel IA 64
Intel IA 64Intel IA 64
Intel IA 64
 
Quantum neural network
Quantum neural networkQuantum neural network
Quantum neural network
 
Floating point arithmetic operations (1)
Floating point arithmetic operations (1)Floating point arithmetic operations (1)
Floating point arithmetic operations (1)
 
Generic types and collections GUIs.pptx
Generic types and collections GUIs.pptxGeneric types and collections GUIs.pptx
Generic types and collections GUIs.pptx
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Autoencoders
AutoencodersAutoencoders
Autoencoders
 
Superscalar Processor
Superscalar ProcessorSuperscalar Processor
Superscalar Processor
 
Forward Backward Chaining
Forward Backward ChainingForward Backward Chaining
Forward Backward Chaining
 
Multiplexers & Demultiplexers
Multiplexers & DemultiplexersMultiplexers & Demultiplexers
Multiplexers & Demultiplexers
 
AI Greedy and A-STAR Search
AI Greedy and A-STAR SearchAI Greedy and A-STAR Search
AI Greedy and A-STAR Search
 
Neuro-Fuzzy Controller
Neuro-Fuzzy ControllerNeuro-Fuzzy Controller
Neuro-Fuzzy Controller
 
Introduction to wavelet transform
Introduction to wavelet transformIntroduction to wavelet transform
Introduction to wavelet transform
 
Superscalar & superpipeline processor
Superscalar & superpipeline processorSuperscalar & superpipeline processor
Superscalar & superpipeline processor
 

Viewers also liked

Cloud by dev
Cloud by devCloud by dev
Cloud by dev
Devdutta Chakrabarti
 
HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...
HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...
HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...
Anthony Lai
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
qqlan
 
IIT,IPR Seminar
IIT,IPR  SeminarIIT,IPR  Seminar
IIT,IPR Seminar
Prof. (Dr.) Tabrez Ahmad
 
Seminar report on a statistical approach to machine
Seminar report on a statistical approach to machineSeminar report on a statistical approach to machine
Seminar report on a statistical approach to machine
Hrishikesh Nair
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
n|u - The Open Security Community
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web Applications
Aung Thu Rha Hein
 
Seminar On Scrum
Seminar On  ScrumSeminar On  Scrum
Seminar On Scrum
Abhishek Kumar Singh
 
Augmented Reality
Augmented RealityAugmented Reality
Augmented Reality
Shreeranga K G
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Shishupal Nagar
 
AI THROUGH THE EYES OF ORGANISE SOUND
AI THROUGH THE EYES OF ORGANISE SOUNDAI THROUGH THE EYES OF ORGANISE SOUND
AI THROUGH THE EYES OF ORGANISE SOUND
Jaideep Ghosh
 
Phone gap
Phone gapPhone gap
Phone gap
Madhura Keskar
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprinting
SWARUP GHOSH
 
Cluster computing
Cluster computingCluster computing
Cluster computing
Adarsh110
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
Sumaiya Arjumand
 
Seminar report on sailfish os
Seminar report on sailfish osSeminar report on sailfish os
Seminar report on sailfish os
Hiyadeep Bhattacharjee
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
Lee Toulouse
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
Darpan Dekivadiya
 
Intelligent Traffic light detection for individuals with CVD
Intelligent Traffic light detection for individuals with CVDIntelligent Traffic light detection for individuals with CVD
Intelligent Traffic light detection for individuals with CVD
Swaroop Aradhya M C
 
E-Ball Technology
E-Ball TechnologyE-Ball Technology
E-Ball Technology
Sumaiya Arjumand
 

Viewers also liked (20)

Cloud by dev
Cloud by devCloud by dev
Cloud by dev
 
HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...
HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...
HKUST Computer Science Festival 2013 - Seminar: Computer Science, Hacking and...
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
IIT,IPR Seminar
IIT,IPR  SeminarIIT,IPR  Seminar
IIT,IPR Seminar
 
Seminar report on a statistical approach to machine
Seminar report on a statistical approach to machineSeminar report on a statistical approach to machine
Seminar report on a statistical approach to machine
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web Applications
 
Seminar On Scrum
Seminar On  ScrumSeminar On  Scrum
Seminar On Scrum
 
Augmented Reality
Augmented RealityAugmented Reality
Augmented Reality
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
AI THROUGH THE EYES OF ORGANISE SOUND
AI THROUGH THE EYES OF ORGANISE SOUNDAI THROUGH THE EYES OF ORGANISE SOUND
AI THROUGH THE EYES OF ORGANISE SOUND
 
Phone gap
Phone gapPhone gap
Phone gap
 
Brain Fingerprinting
Brain FingerprintingBrain Fingerprinting
Brain Fingerprinting
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Sniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost MobilesSniffer For Detecting Lost Mobiles
Sniffer For Detecting Lost Mobiles
 
Seminar report on sailfish os
Seminar report on sailfish osSeminar report on sailfish os
Seminar report on sailfish os
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Intelligent Traffic light detection for individuals with CVD
Intelligent Traffic light detection for individuals with CVDIntelligent Traffic light detection for individuals with CVD
Intelligent Traffic light detection for individuals with CVD
 
E-Ball Technology
E-Ball TechnologyE-Ball Technology
E-Ball Technology
 

Similar to Mathematical Foundation of Discrete time Hopfield Networks

Hopfield Networks
Hopfield NetworksHopfield Networks
Hopfield Networks
Kanchana Rani G
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
 
Intro to Deep learning - Autoencoders
Intro to Deep learning - Autoencoders Intro to Deep learning - Autoencoders
Intro to Deep learning - Autoencoders
Akash Goel
 
lecture11_Artificial neural networks.ppt
lecture11_Artificial neural networks.pptlecture11_Artificial neural networks.ppt
lecture11_Artificial neural networks.ppt
j7757652020
 
MNN
MNNMNN
ANN.ppt
ANN.pptANN.ppt
Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...
ijsrd.com
 
Soft Computering Technics - Unit2
Soft Computering Technics - Unit2Soft Computering Technics - Unit2
Soft Computering Technics - Unit2
sravanthi computers
 
071bct537 lab4
071bct537 lab4071bct537 lab4
071bct537 lab4
shailesh kandel
 
Data Communications and Networks- OSI Reference Model
Data Communications and Networks- OSI Reference ModelData Communications and Networks- OSI Reference Model
Data Communications and Networks- OSI Reference Model
Chandrakant Divate
 
Neural networks
Neural networksNeural networks
Neural networks
Basil John
 
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logicApproximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Cemal Ardil
 
Artificial Neural Network Topology
Artificial Neural Network TopologyArtificial Neural Network Topology
Artificial Neural Network Topology
Harshana Madusanka Jayamaha
 
Perceptron
PerceptronPerceptron
Perceptron
Nagarajan
 
20120140503023
2012014050302320120140503023
20120140503023
IAEME Publication
 
ANN - UNIT 1.pptx
ANN - UNIT 1.pptxANN - UNIT 1.pptx
BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...
BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...
BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...
DurgadeviParamasivam
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Waqas Tariq
 
Unit iii update
Unit iii updateUnit iii update
Unit iii update
Indira Priyadarsini
 
Artificial Neural Network Implementation On FPGA Chip
Artificial Neural Network Implementation On FPGA ChipArtificial Neural Network Implementation On FPGA Chip
Artificial Neural Network Implementation On FPGA Chip
Maria Perkins
 

Similar to Mathematical Foundation of Discrete time Hopfield Networks (20)

Hopfield Networks
Hopfield NetworksHopfield Networks
Hopfield Networks
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Intro to Deep learning - Autoencoders
Intro to Deep learning - Autoencoders Intro to Deep learning - Autoencoders
Intro to Deep learning - Autoencoders
 
lecture11_Artificial neural networks.ppt
lecture11_Artificial neural networks.pptlecture11_Artificial neural networks.ppt
lecture11_Artificial neural networks.ppt
 
MNN
MNNMNN
MNN
 
ANN.ppt
ANN.pptANN.ppt
ANN.ppt
 
Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...
 
Soft Computering Technics - Unit2
Soft Computering Technics - Unit2Soft Computering Technics - Unit2
Soft Computering Technics - Unit2
 
071bct537 lab4
071bct537 lab4071bct537 lab4
071bct537 lab4
 
Data Communications and Networks- OSI Reference Model
Data Communications and Networks- OSI Reference ModelData Communications and Networks- OSI Reference Model
Data Communications and Networks- OSI Reference Model
 
Neural networks
Neural networksNeural networks
Neural networks
 
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logicApproximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
Approximate bounded-knowledge-extractionusing-type-i-fuzzy-logic
 
Artificial Neural Network Topology
Artificial Neural Network TopologyArtificial Neural Network Topology
Artificial Neural Network Topology
 
Perceptron
PerceptronPerceptron
Perceptron
 
20120140503023
2012014050302320120140503023
20120140503023
 
ANN - UNIT 1.pptx
ANN - UNIT 1.pptxANN - UNIT 1.pptx
ANN - UNIT 1.pptx
 
BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...
BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...
BACKPROPOGATION ALGO.pdfLECTURE NOTES WITH SOLVED EXAMPLE AND FEED FORWARD NE...
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
 
Unit iii update
Unit iii updateUnit iii update
Unit iii update
 
Artificial Neural Network Implementation On FPGA Chip
Artificial Neural Network Implementation On FPGA ChipArtificial Neural Network Implementation On FPGA Chip
Artificial Neural Network Implementation On FPGA Chip
 

Recently uploaded

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 

Recently uploaded (20)

Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 

Mathematical Foundation of Discrete time Hopfield Networks

  • 1. A Seminar Presentation for the degree of Master of Technology in Computer Science and Engineering PRESENTED BY:- AKHIL UPADHYAY M-TECH 3rd SEM CSE ROLL NO.- 121140002 SUBMITED TO:- MR. ROHIT MIRI H.O.D. OF COMPUTER SCIENCE DEPARTMENT
  • 2.
  • 3. INTRODUCTION  A Hopfield Networks is a form of recurrent artificial neural Network popularized by John Hopfield in 1982, but described earlier by Little in 1974  Hopfield has developed a number of neural Networks based on fixed weights and adaptive activations  These Networks can serve as associative memory Networks and can be used to solve constraint satisfaction problems such as the "Travelling Salesman Problem (Cont..)
  • 4. Two types: 1. Discrete Hopfield Network. 2. Continuous Hopfield Network. Discrete Hopfield Network  Hopfield has proposed two basic models of associative memories (Hopfield 1982, 1984). (Cont..)
  • 5. Discrete Hopfield Network The first of these is a ‘DISCRETE MODEL’ while the second is a ‘CONTINUOUS’ version of the same.  The terms ‘DISCRETE’ or ‘CONTINUOUS’ refer to the nature of the state variables and time, in these models.  In the discrete Hopfield network, each neuron has a binary state 𝑽𝒊 ∈{1,-1}  The state of the network with N neurons is represented by the vector (Cont..)
  • 6. Discrete Hopfield Network V={ 𝑽 𝟏, … … . , 𝑽𝒊, … … . 𝑽 𝑵} 𝑻  The network is fully-connected, i.e., each neuron connected to all others.  The weight from j’th neuron to i’th neuron is given by, and weight matrix is given as W={𝒘𝒊𝒋}  Since the network has loops, computations are dynamic and the network state evolves through time, which is a discrete variable. (Cont..)
  • 7. Discrete Hopfield Network  Hopfield net differ from iterative auto associative net in 2 things. 1. Only one unit updates its activation at a time (based on the signal it receives from each other unit) 2. Each unit continues to receive an external signal in addition to the signal from the other units in the net. (Cont..)
  • 8. Surprise  The asynchronous updating of the units allows a function, known as an energy function, to be found for the net.  The existence of such a function enables us to prove that the net will converge to a stable set of activations, rather than oscillating.  The original formulation of the discrete Hopfield net showed the usefulness of the net as content-addressable memory. (Cont..)
  • 10. Discrete Hopfield Network Algorithm There are several versions of the discrete Hopfield net.  Binary Input Vectors To store a set of binary patterns s ( p ) , p = 1 , . . . , P, where ))().....().....(()( 1 pspspsps ni (Cont..)
  • 11. Discrete Hopfield Network  The weight matrix W = is given by}{ ijw ]12][12[ )()(   pj p piij ssw ji for and .0iiw (Cont..)
  • 12. Discrete Hopfield Network  Bipolar Inputs To store a set of binary patterns s ( p ) , p = 1 , . . . , P, where ))().....().....(()( 1 pspspsps ni The weight matrix W = is given by,}{ ijw )()( pj p piij ssw  ji for and 0iiw (Cont..)
  • 13. PROPERTIES OF HOPFIELD NETWORK A recurrent network with all nodes connected to all other nodes. Nodes have binary outputs (either 0,1 or -1,1). Weights between the nodes are symmetric . No connection from a node to itself is allowed. Nodes are updated asynchronously ( i.e. nodes are selected at random). The network has no hidden nodes or layer. (Cont..)
  • 14. Discrete Hopfield Network Applications:- A binary Hopfield net can be used to determine whether an input vector is a "known” or an "unknown" vector. The net recognizes a "known" vector by producing a pattern of activation on the units of the net that is the same as the vector stored in the net. If the input vector is an "unknown" vector, the activation vectors produced as the net iterates will converge to an activation vector that is not one of the stored patterns.