Push-button generation of deep neural networks
The term "deep learning" refers to using deep (multi-layer) artificial neural networks to make sense out of complex data such as images, sounds, and text. Until recently, this technology has been largely relegated to academia. Over the past couple of years, however, increased computing performance coupled with reduced power consumption and augmented by major strides in neural network frameworks and algorithms has thrust deep learning into the mainstream.
When I attended the Embedded Vision Summit recently, for example, I saw an amazing demonstration of machine vision in which a deep neural network (DNN) running on an FPGA was identifying randomly presented images in real time (check out this column to see a video). As an aside, one of the best lines I heard at the summit was "You can't swing a dead cat in here without some deep learning system saying 'Hey, that's a dead cat!'" But we digress...
As another example, take a look at this column describing how researchers at MIT used a deep learning algorithm to analyze videos showing tens of thousands of different objects and materials being prodded, scraped, and hit with a drumstick. The trained algorithm could subsequently watch silent videos and generate accompanying sounds sufficiently convincing to fool human observers.
To read the full article, click here
Related Semiconductor IP
- Process/Voltage/Temperature Sensor with Self-calibration (Supply voltage 1.2V) - TSMC 3nm N3P
- USB 20Gbps Device Controller
- SM4 Cipher Engine
- Ultra-High-Speed Time-Interleaved 7-bit 64GSPS ADC on 3nm
- Fault Tolerant DDR2/DDR3/DDR4 Memory controller
Related Blogs
- Embedded Vision: The Road Ahead for Neural Networks and Five Likely Surprises
- Hierarchical Neural Networks
- Deployable Artificial Neural Networks Will Change Everything
- Neural Networks and the Future
Latest Blogs
- Shaping the Future of Semiconductor Design Through Collaboration: Synopsys Wins Multiple TSMC OIP Partner of the Year Awards
- Pushing the Boundaries of Memory: What’s New with Weebit and AI
- Root of Trust: A Security Essential for Cyber Defense
- Evolution of AMBA AXI Protocol: An Introduction to the Issue L Update
- An Introduction to AMBA CHI Chip-to-Chip (C2C) Protocol