MadMayHam | 合氣道
Regular
FF I have access but no mention of Brainchip of Akida, it's more of an algorthmic model called Random Neural Network. I don't want to run afoul of copyright laws so am not going to link the document here.
"
Our approach is based on Locality Sensitive Hashing (LSH) [58], an algorithmic technique which uses hash functions to map input data points to buckets. These functions are designed to map similar inputs to the same bucket. LSH is typically used for data clustering [59] and nearest neighbor search [60] but can also be used for anomaly detection [61]. Since anomalous data points differ substantially from normal inputs, they will be mapped to different buckets. An anomaly score is then obtained by counting how many normal training samples are allocated to the same bucket as the test sample. Different families of hash functions such as p-stable hashing [62] and randomized trees [63] have been proposed before while other, more advanced methods use properties of the training data to select suitable hash functions [64].
A major benefit of LSH-based approaches for anomaly detection is that they have a limited computational and memory footprint."
"
Our approach is based on Locality Sensitive Hashing (LSH) [58], an algorithmic technique which uses hash functions to map input data points to buckets. These functions are designed to map similar inputs to the same bucket. LSH is typically used for data clustering [59] and nearest neighbor search [60] but can also be used for anomaly detection [61]. Since anomalous data points differ substantially from normal inputs, they will be mapped to different buckets. An anomaly score is then obtained by counting how many normal training samples are allocated to the same bucket as the test sample. Different families of hash functions such as p-stable hashing [62] and randomized trees [63] have been proposed before while other, more advanced methods use properties of the training data to select suitable hash functions [64].
A major benefit of LSH-based approaches for anomaly detection is that they have a limited computational and memory footprint."
I found the following paper however I cannot access it fully. It may be of no interest but when you open the link you will find an intriguing NASA reference and one of the authors has a recent link to Carnegie Mellon.
Anyway if you have access or can access who knows it might be profitable:
https://www.sciencedirect.com/science/article/abs/pii/S0167739X22004344
My opinion only DYOR
FF
AKIDA BALLISTA