Bandwidth-Efficient Deep Learning ——From Compression to Acceleration

Total Page:16

File Type:pdf, Size:1020Kb

Bandwidth-Efficient Deep Learning ——From Compression to Acceleration Bandwidth-Efficient Deep Learning ——from Compression to Acceleration Song Han Assistant Professor, EECS Massachusetts Institute of Technology 1 AI is Changing Our Lives Self-Driving Car Machine Translation 2 AlphaGo Smart Robots 2 Models are Getting Larger IMAGE RECOGNITION SPEECH RECOGNITION Important Property of Neural Networks 16X 10X Results get better with Model Training Ops 152 layers 465 GFLOP more data + 22.6 GFLOP 12,000 hrs of Data bigger models + ~3.5% error ~5% Error more computation 8 layers 80 GFLOP 1.4 GFLOP 7,000 hrs of Data (Better algorithms, new insights and ~16% Error ~8% Error improved techniques always help, too!) 2012 2015 2014 2015 AlexNet ResNet Deep Speech 1 Deep Speech 2 Dally, NIPS’2016 workshop on Efficient Methods for Deep Neural Networks 3 The first Challenge: Model Size Hard to distribute large models through over-the-air update 4 The Second Challenge: Speed Error rate Training time ResNet18: 10.76% 2.5 days ResNet50: 7.02% 5 days ResNet101: 6.21% 1 week ResNet152: 6.16% 1.5 weeks Such long training time limits ML researcher’s productivity Training time benchmarked with fb.resnet.torch using four M40 GPUs 5 The Third Challenge: Energy Efficiency AlphaGo: 1920 CPUs and 280 GPUs, $3000 electric bill per game on mobile: drains battery on data-center: increases TCO 6 Where is the Energy Consumed? larger model => more memory reference => more energy 7 Where is the Energy Consumed? larger model => more memory reference => more energy Relative Energy Cost Relative Energy Cost OperationOperation Energy [pJ] Relative Energy Cost [pJ] RelativeRelative Cost Energy Cost 32 bit int ADD32 bit int 0.1 ADD 1 0.1 1 32 bit float ADD32 bit float 0.9 ADD 9 0.9 9 32 bit Register File32 bit Register 1 File 10 1 10 32 bit int MULT32 bit int 3.1 MULT 31 3.1 31 32 bit float MULT32 bit float 3.7 MULT 37 3.7 37 32 bit SRAM Cache32 bit SRAM 5 Cache 50 5 50 32 bit DRAM Memory32 bit 640DRAM Memory 6400 640 6400 1 10 100 11000 1010000 100 1000 10000 Figure 1: Energy tableFigure for 45nm 1: Energy CMOS table process for 45nm [7]. MemoryCMOS process access [ is7]. 3 Memory orders of access magnitude is 3 orders more of magnitude more energy expensive thanenergy simple1 expensive arithmetic. than simple arithmetic.= 1000 To achieve this goal, weTo achievepresent athis method goal, we to prune present network a method connections to prune network in a manner connections that preserves in a manner the that preserves the original accuracy. Afteroriginal an initial accuracy. training After phase, an initial we remove training all phase, connections we remove whose all connections weight is lower whose weight is lower than a threshold. Thisthan pruning a threshold. converts This a dense, pruning fully-connected converts a dense, layer fully-connected to a sparse layer. layer This to a first sparse layer. This 8 first phase learns the topologyphase of learns the networks the topology — learning of the networks which connections — learning are which important connections and removing are important and removing the unimportant connections.the unimportant We then connections. retrain the sparse We then network retrain so the the sparse remaining network connections so the remaining can connections can compensate for the connectionscompensate that for the have connections been removed. that have The beenphases removed. of pruning The and phases retraining of pruning may and retraining may be repeated iterativelybe to repeated further iteratively reduce network to further complexity. reduce network In effect, complexity. this training In effect, process this learns training process learns the network connectivitythe network in addition connectivity to the weights in addition - much to as the in weights the mammalian - much as brain in the [8][9], mammalian where brain [8][9], where synapses are created insynapses the first are few created months in of the a first child’s few development, months of a child’s followed development, by gradual followed pruning byof gradual pruning of little-used connections,little-used falling to connections, typical adult falling values. to typical adult values. 2 Related Work2 Related Work Neural networks are typically over-parameterized, and there is significant redundancy for deep learn- Neural networks are typically over-parameterized, and there is significant redundancy for deep learn- ing models [10]. This results in a waste of both computation and memory. There have been various ing models [10]. This results in a waste of both computation and memory. There have been various proposals to remove the redundancy: Vanhoucke et al. [11] explored a fixed-point implementation proposals to remove the redundancy: Vanhoucke et al. [11] explored a fixed-point implementation with 8-bit integer (vs 32-bit floating point) activations. Denton et al. [12] exploited the linear with 8-bit integer (vs 32-bit floating point) activations. Denton et al. [12] exploited the linear structure of the neural network by finding an appropriate low-rank approximation of the parameters structure of the neural network by finding an appropriate low-rank approximation of the parameters and keeping the accuracy within 1% of the original model. With similar accuracy loss, Gong et al. and keeping the accuracy[13] compressed within 1% of deep the convnets original model. using vector With quantization.similar accuracy These loss, approximation Gong et al. and quantization [13] compressed deeptechniques convnets are using orthogonal vector quantization. to network pruning, These andapproximation they can be and used quantization together to obtain further gains techniques are orthogonal[14]. to network pruning, and they can be used together to obtain further gains [14]. There have been other attempts to reduce the number of parameters of neural networks by replacing There have been otherthe attempts fully connected to reduce layer the number with global of parameters average pooling. of neural The networks Network by in replacing Network architecture [15] the fully connected layerand GoogLenet with global [16 average] achieves pooling. state-of-the-art The Network results in Network on several architecture benchmarks [15 by] adopting this idea. and GoogLenet [16]However, achieves state-of-the-arttransfer learning, results i.e. reusing on several features benchmarks learned on by the adopting ImageNet this dataset idea. and applying them However, transfer learning,to new i.e. tasks reusing by only features fine-tuning learned the onfully the connected ImageNet layers, dataset is andmore applying difficult them with this approach. This to new tasks by onlyproblem fine-tuning is noted the fully by Szegedyconnectedet layers, al. [16 is] and more motivates difficult them with thisto add approach. a linear Thislayer on the top of their problem is noted by Szegedynetworkset to al. enable[16] transfer and motivates learning. them to add a linear layer on the top of their networks to enable transfer learning. Network pruning has been used both to reduce network complexity and to reduce over-fitting. An Network pruning hasearly been approach used both to to pruning reduce was network biased complexity weight decay and [17 to]. reduce Optimal over-fitting. Brain Damage An [18] and Optimal early approach to pruningBrain was Surgeon biased [19 weight] prune decay networks [17]. to Optimal reduce the Brain number Damage of connections [18] and Optimal based on the Hessian of the Brain Surgeon [19] pruneloss function networks and to reduce suggest the that number such pruning of connections is more accurate based on than the Hessian magnitude-based of the pruning such as loss function and suggestweight that decay. such However, pruning is second more accurate order derivative than magnitude-based needs additional pruning computation. such as weight decay. However, second order derivative needs additional computation. HashedNets [20] is a recent technique to reduce model sizes by using a hash function to randomly HashedNets [20] is agroup recent connection technique weightsto reduce into model hash sizes buckets, by using so that a hash all connections function to withinrandomly the same hash bucket group connection weightsshare a into single hash parameter buckets, value. so that This all technique connections may within benefit the from same pruning. hash Asbucket pointed out in Shi et al. share a single parameter[21] value. and Weinberger This techniqueet al. may[22], benefit sparsity from will pruning. minimize As hash pointed collision out in making Shi et al. feature hashing even [21] and Weinbergermoreet al. effective.[22], sparsity HashedNets will minimize may be hashused together collision with making pruning feature to give hashing even better even parameter savings. more effective. HashedNets may be used together with pruning to give even better parameter savings. 2 2 Where is the Energy Consumed? larger model => more memory reference => more energy Relative Energy Cost Relative Energy Cost OperationOperation Energy [pJ] Relative Energy Cost [pJ] RelativeRelative Cost Energy Cost 32 bit int ADD32 bit int 0.1 ADD 1 0.1 1 32 bit float ADD32 bit float 0.9 ADD 9 0.9 9 32 bit Register File32 bit Register 1 File 10 1 10 32 bit int MULT32 bit int 3.1 MULT 31 3.1 31 32 bit float MULT32 bit float 3.7 MULT 37 3.7 37 32 bit SRAM Cache32 bit SRAM 5 Cache 50 5 50 32 bit DRAM Memory32 bit 640DRAM Memory 6400 640 6400 1 10 100 11000 1010000 100 1000 10000 how to make deep learning more efficient? Figure 1: Energy tableFigure for 45nm 1: Energy CMOS table process for 45nm [7]. MemoryCMOS process access [ is7]. 3 Memory orders of access magnitude is 3 orders more of magnitude more energy expensive thanenergy simple expensive arithmetic. than simple arithmetic. To achieve this goal, weTo achievepresent athis method goal, we to prune present network a method connections to prune network in a manner connections that preserves in a manner the that preserves the original accuracy.
Recommended publications
  • Lecture 10: Recurrent Neural Networks
    Lecture 10: Recurrent Neural Networks Fei-Fei Li & Justin Johnson & Serena Yeung Lecture 10 - 1 May 4, 2017 Administrative A1 grades will go out soon A2 is due today (11:59pm) Midterm is in-class on Tuesday! We will send out details on where to go soon Fei-Fei Li & Justin Johnson & Serena Yeung Lecture 10 - 2 May 4, 2017 Extra Credit: Train Game More details on Piazza by early next week Fei-Fei Li & Justin Johnson & Serena Yeung Lecture 10 - 3 May 4, 2017 Last Time: CNN Architectures AlexNet Figure copyright Kaiming He, 2016. Reproduced with permission. Fei-Fei Li & Justin Johnson & Serena Yeung Lecture 10 - 4 May 4, 2017 Last Time: CNN Architectures Softmax FC 1000 Softmax FC 4096 FC 1000 FC 4096 FC 4096 Pool FC 4096 3x3 conv, 512 Pool 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 Pool Pool 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 3x3 conv, 512 Pool Pool 3x3 conv, 256 3x3 conv, 256 3x3 conv, 256 3x3 conv, 256 Pool Pool 3x3 conv, 128 3x3 conv, 128 3x3 conv, 128 3x3 conv, 128 Pool Pool 3x3 conv, 64 3x3 conv, 64 3x3 conv, 64 3x3 conv, 64 Input Input VGG16 VGG19 GoogLeNet Figure copyright Kaiming He, 2016. Reproduced with permission. Fei-Fei Li & Justin Johnson & Serena Yeung Lecture 10 - 5 May 4, 2017 Last Time: CNN Architectures Softmax FC 1000 Pool 3x3 conv, 64 3x3 conv, 64 3x3 conv, 64 relu 3x3 conv, 64 3x3 conv, 64 F(x) + x 3x3 conv, 64 ..
    [Show full text]
  • Image Retrieval Algorithm Based on Convolutional Neural Network
    Advances in Intelligent Systems Research, volume 133 2nd International Conference on Artificial Intelligence and Industrial Engineering (AIIE2016) Image Retrieval Algorithm Based on Convolutional Neural Network Hailong Liu 1, 2, Baoan Li 1, 2, *, Xueqiang Lv 1 and Yue Huang 3 1Beijing Key Laboratory of Internet Culture and Digital Dissemination Research, Beijing Information Science & Technology University, Beijing 100101, China 2Computer School, Beijing Information Science and Technology University, Beijing 100101, China 3Xuanwu Hospital Capital Medical University, 100053, China *Corresponding author Abstract—With the rapid development of computer technology low, can’t meet the needs of people. In order to overcome this and the increasing of multimedia data on the Internet, how to difficulty, the researchers from the image itself, and put quickly find the desired information in the massive data becomes forward the method of image retrieval based on content. The a hot issue. Image retrieval can be used to retrieve similar images, method is to extract the visual features of the image content: and the effect of image retrieval depends on the selection of image color, texture, shape etc., the image database to be detected features to a certain extent. Based on deep learning, through self- samples for similarity matching, retrieval and sample images learning ability of a convolutional neural network to extract more are similar to the image. The main process of the method is the conducive to the high-level semantic feature of image retrieval selection and extraction of features, but there are "semantic using convolutional neural network, and then use the distance gap" [2] between low-level features and high-level semantic metric function similar image.
    [Show full text]
  • LSTM-In-LSTM for Generating Long Descriptions of Images
    Computational Visual Media DOI 10.1007/s41095-016-0059-z Vol. 2, No. 4, December 2016, 379–388 Research Article LSTM-in-LSTM for generating long descriptions of images Jun Song1, Siliang Tang1, Jun Xiao1, Fei Wu1( ), and Zhongfei (Mark) Zhang2 c The Author(s) 2016. This article is published with open access at Springerlink.com Abstract In this paper, we propose an approach by means of text (description generation) is a for generating rich fine-grained textual descriptions of fundamental task in artificial intelligence, with many images. In particular, we use an LSTM-in-LSTM (long applications. For example, generating descriptions short-term memory) architecture, which consists of an of images may help visually impaired people better inner LSTM and an outer LSTM. The inner LSTM understand the content of images and retrieve images effectively encodes the long-range implicit contextual using descriptive texts. The challenge of description interaction between visual cues (i.e., the spatially- generation lies in appropriately developing a model concurrent visual objects), while the outer LSTM that can effectively represent the visual cues in generally captures the explicit multi-modal relationship images and describe them in the domain of natural between sentences and images (i.e., the correspondence language at the same time. of sentences and images). This architecture is capable There have been significant advances in of producing a long description by predicting one description generation recently. Some efforts word at every time step conditioned on the previously rely on manually-predefined visual concepts and generated word, a hidden vector (via the outer LSTM), and a context vector of fine-grained visual cues (via sentence templates [1–3].
    [Show full text]
  • The History Began from Alexnet: a Comprehensive Survey on Deep Learning Approaches
    > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 The History Began from AlexNet: A Comprehensive Survey on Deep Learning Approaches Md Zahangir Alom1, Tarek M. Taha1, Chris Yakopcic1, Stefan Westberg1, Paheding Sidike2, Mst Shamima Nasrin1, Brian C Van Essen3, Abdul A S. Awwal3, and Vijayan K. Asari1 Abstract—In recent years, deep learning has garnered I. INTRODUCTION tremendous success in a variety of application domains. This new ince the 1950s, a small subset of Artificial Intelligence (AI), field of machine learning has been growing rapidly, and has been applied to most traditional application domains, as well as some S often called Machine Learning (ML), has revolutionized new areas that present more opportunities. Different methods several fields in the last few decades. Neural Networks have been proposed based on different categories of learning, (NN) are a subfield of ML, and it was this subfield that spawned including supervised, semi-supervised, and un-supervised Deep Learning (DL). Since its inception DL has been creating learning. Experimental results show state-of-the-art performance ever larger disruptions, showing outstanding success in almost using deep learning when compared to traditional machine every application domain. Fig. 1 shows, the taxonomy of AI. learning approaches in the fields of image processing, computer DL (using either deep architecture of learning or hierarchical vision, speech recognition, machine translation, art, medical learning approaches) is a class of ML developed largely from imaging, medical information processing, robotics and control, 2006 onward. Learning is a procedure consisting of estimating bio-informatics, natural language processing (NLP), cybersecurity, and many others.
    [Show full text]
  • Active Authentication Using an Autoencoder Regularized CNN-Based One-Class Classifier
    Active Authentication Using an Autoencoder Regularized CNN-based One-Class Classifier Poojan Oza and Vishal M. Patel Department of Electrical and Computer Engineering, Johns Hopkins University, 3400 N. Charles St, Baltimore, MD 21218, USA email: fpoza2, [email protected] Access Abstract— Active authentication refers to the process in Enrolled User Denied which users are unobtrusively monitored and authenticated Training Images continuously throughout their interactions with mobile devices. AA Access Generally, an active authentication problem is modelled as a Module Granted one class classification problem due to the unavailability of Trained Access data from the impostor users. Normally, the enrolled user is Denied considered as the target class (genuine) and the unauthorized users are considered as unknown classes (impostor). We propose Training a convolutional neural network (CNN) based approach for one class classification in which a zero centered Gaussian noise AA and an autoencoder are used to model the pseudo-negative Module class and to regularize the network to learn meaningful feature Test Images representations for one class data, respectively. The overall network is trained using a combination of the cross-entropy and (a) (b) the reconstruction error losses. A key feature of the proposed approach is that any pre-trained CNN can be used as the Fig. 1: An overview of a typical AA system. (a) Data base network for one class classification. Effectiveness of the corresponding to the enrolled user are used to train an AA proposed framework is demonstrated using three publically system. (b) During testing, data corresponding to the enrolled available face-based active authentication datasets and it is user as well as unknown user may be presented to the system.
    [Show full text]
  • Key Ideas and Architectures in Deep Learning Applications That (Probably) Use DL
    Key Ideas and Architectures in Deep Learning Applications that (probably) use DL Autonomous Driving Scene understanding /Segmentation Applications that (probably) use DL WordLens Prisma Outline of today’s talk Image Recognition Fun application using CNNs ● LeNet - 1998 ● Image Style Transfer ● AlexNet - 2012 ● VGGNet - 2014 ● GoogLeNet - 2014 ● ResNet - 2015 Questions to ask about each architecture/ paper Special Layers Non-Linearity Loss function Weight-update rule Train faster? Reduce parameters Reduce Overfitting Help you visualize? LeNet5 - 1998 LeNet5 - Specs MNIST - 60,000 training, 10,000 testing Input is 32x32 image 8 layers 60,000 parameters Few hours to train on a laptop Modified LeNet Architecture - Assignment 3 Training Input Forward pass Maxp Max Conv ReLU Conv ReLU FC ReLU Softmax ool pool Backpropagation - Labels Loss update weights Modified LeNet Architecture - Assignment 3 Testing Input Forward pass Maxp Max Conv ReLU Conv ReLU FC ReLU Softmax ool pool Output Compare output with labels Modified LeNet - CONV Layer 1 Input - 28 x 28 Output - 6 feature maps - each 24 x 24 Convolution filter - 5 x 5 x 1 (convolution) + 1 (bias) How many parameters in this layer? Modified LeNet - CONV Layer 1 Input - 32 x 32 Output - 6 feature maps - each 28 x 28 Convolution filter - 5 x 5 x 1 (convolution) + 1 (bias) How many parameters in this layer? (5x5x1+1)*6 = 156 Modified LeNet - Max-pooling layer Decreases the spatial extent of the feature maps, makes it translation-invariant Input - 28 x 28 x 6 volume Maxpooling with filter size 2
    [Show full text]
  • Deep Learning in MATLAB
    Deep Learning in MATLAB 성 호 현 부장 [email protected] © 2015 The MathWorks, Inc.1 Deep Learning beats Go champion! 2 AI, Machine Learning, and Deep Learning Artificial Machine Deep Learning Intelligence Learning Neural networks with many layers that Any technique Statistical methods learn representations and tasks that enables enable machines to “directly” from data machines to “learn” tasks from data mimic human without explicitly intelligence programming 1950s 1980s 2015 FLOPS Thousand Million Quadrillion 3 What is can Deep Learning do for us? (An example) 4 Example 1: Object recognition using deep learning 5 Object recognition using deep learning Training Millions of images from 1000 (GPU) different categories Real-time object recognition using Prediction a webcam connected to a laptop 6 WhatWhat is isMachine Deep Learning? Learning? 7 Machine Learning vs Deep Learning We specify the nature of the features we want to extract… …and the type of model we want to build. Machine Learning 8 Machine Learning vs Deep Learning We need only specify the architecture of the model… Deep Learning 9 ▪ Deep learning is a type of machine learning in which a model learns to perform tasks like classification – directly from images, texts, or signals. ▪ Deep learning performs end-to-end learning, and is usually implemented using a neural network architecture. ▪ Deep learning algorithms also scale with data – traditional machine learning saturates. 10 Why is Deep Learning So Popular Now? AlexNet Human Accuracy Source: ILSVRC Top-5 Error on ImageNet 11 Two
    [Show full text]
  • Path Towards Better Deep Learning Models and Implications for Hardware
    Path towards better deep learning models and implications for hardware Natalia Vassilieva Product Manager, ML Cerebras Systems AI has massive potential, but is compute-limited today. Cerebras Systems © 2020 “Historically, progress in neural networks and deep learning research has been greatly influenced by the available hardware and software tools.” Yann LeCun, 1.1 Deep Learning Hardware: Past, Present and Future. 2019 IEEE International Solid-State Circuits Conference (ISSCC 2019), 12-19 “Historically, progress in neural networks and deep learning research has been greatly influenced by the available hardware and software tools.” “Hardware capabilities and software tools both motivate and limit the type of ideas that AI researchers will imagine and will allow themselves to pursue. The tools at our disposal fashion our thoughts more than we care to admit.” Yann LeCun, 1.1 Deep Learning Hardware: Past, Present and Future. 2019 IEEE International Solid-State Circuits Conference (ISSCC 2019), 12-19 “Historically, progress in neural networks and deep learning research has been greatly influenced by the available hardware and software tools.” “Hardware capabilities and software tools both motivate and limit the type of ideas that AI researchers will imagine and will allow themselves to pursue. The tools at our disposal fashion our thoughts more than we care to admit.” “Is DL-specific hardware really necessary? The answer is a resounding yes. One interesting property of DL systems is that the larger we make them, the better they seem to work.”
    [Show full text]
  • Model-Based Deep Convolutional Face Autoencoder for Unsupervised Monocular Reconstruction
    MoFA: Model-based Deep Convolutional Face Autoencoder for Unsupervised Monocular Reconstruction Ayush Tewari1 Michael Zollhofer¨ 1 Hyeongwoo Kim1 Pablo Garrido1 Florian Bernard1;2 Patrick Perez´ 3 Christian Theobalt1 1Max-Planck-Institute for Informatics 2 LCSB, University of Luxembourg 3Technicolor Our model-based deep convolutional face autoencoder enables unsupervised learning of semantic pose, shape, expression, reflectance and lighting parameters. The trained encoder predicts these parameters from a single monocular image, all at once. Abstract tailed three-dimensional face reconstruction from a single arbitrary in-the-wild image, e.g., downloaded from the Inter- In this work we propose a novel model-based deep convo- net, is still an open research problem due to the high degree lutional autoencoder that addresses the highly challenging of variability of uncalibrated photos in terms of resolution problem of reconstructing a 3D human face from a single and employed imaging device. In addition, in unconstrained in-the-wild color image. To this end, we combine a convolu- photos, faces show a high variability in global pose, facial tional encoder network with an expert-designed generative expression, and are captured under diverse and difficult light- model that serves as decoder. The core innovation is the ing. Detailed 3D face reconstruction is the foundation for a differentiable parametric decoder that encapsulates image broad scope of applications, which range from robust face formation analytically based on a generative model. Our recognition, over emotion estimation, to complex image ma- decoder takes as input a code vector with exactly defined nipulation tasks. In many applications, faces should ideally semantic meaning that encodes detailed face pose, shape, ex- be reconstructed in terms of meaningful low-dimensional pression, skin reflectance and scene illumination.
    [Show full text]
  • Data Movement Is All You Need: a Case Study on Optimizing Transformers
    Data Movement Is All You Need: A Case Study on Optimizing Transformers Andrei Ivanov∗, Nikoli Dryden∗, Tal Ben-Nun, Shigang Li, Torsten Hoefler ETH Zürich [email protected] ∗ Equal contribution Abstract—Transformers have become widely used for language challenges such as artificial general intelligence [27]. Thus, modeling and sequence learning tasks, and are one of the most improving transformer performance has been in the focus of important machine learning workloads today. Training one is a numerous research and industrial groups. very compute-intensive task, often taking days or weeks, and significant attention has been given to optimizing transformers. Significant attention has been given to optimizing transform- Despite this, existing implementations do not efficiently utilize ers: local and fixed-window attention [28]–[32], more general GPUs. We find that data movement is the key bottleneck when structured sparsity [33], learned sparsity [34]–[36], and other training. Due to Amdahl’s Law and massive improvements in algorithmic techniques [19], [37] improve the performance of compute performance, training has now become memory-bound. transformers. Major hardware efforts, such as Tensor Cores Further, existing frameworks use suboptimal data layouts. Using these insights, we present a recipe for globally optimizing data and TPUs [38] have accelerated tensor operations like matrix- movement in transformers. We reduce data movement by up matrix multiplication (MMM), a core transformer operation. to 22.91% and overall achieve a 1.30× performance improve- Despite this, existing implementations do not efficiently ment over state-of-the-art frameworks when training BERT. utilize GPUs. Even optimized implementations such as Mega- Our approach is applicable more broadly to optimizing deep tron [18] report achieving only 30% of peak GPU flop/s.
    [Show full text]
  • Optimizing Alexnet on Tiny Imagenet10
    Optimizing AlexNet on Tiny ImageNet10 Talal Alqadi Ella Lucas June 19, 2020 Abstract Image classification of Tiny ImageNet data by reproducing the state of the art convolutional neural network built by Alex Krizhevsky et al. called AlexNet [2]. Tiny ImageNet is a subset of ImageNet containing 200 classes, each with 500 images. After reproducing the model, we constricted the Tiny ImageNet dataset even further into the first 10 labels to speed up the model training and testing, to see how the model can perform with less labels but same amount of data. Our goal is for AlexNet to correctly classify even more test images with our new restricted dataset, as compared to its performances with Tiny ImageNet. Using Pytorch, a pipeline was built to train and validate different inputs into the AlexNet model to single out the best model parameters, and then finally create visualizations to compare accuracies between labels. 1 Introduction As machines get stronger and as more data is available every year, deep learning has been able to accomplish huge feats. It has been able to overcome extremely complicated problems with many of these deep learning models' accuracies continuously increasing the more time passes. One such problem that deep learning had a huge hand in solving is in computer vision. The main topic of computer vision in this case, object recognition, has become pivotal by replicating human intelligence with significant applications in research, politics, defense, and industry. Convolutional Neural Networks (CNNs) are the architecture traditionally optimized for image recognition. At a high level, these networks are fed an input image and return either an output class or a probability that the input belongs to a certain class.
    [Show full text]
  • What Is Reinforcement Learning?
    Deep Learning and Reinforcement Learning Workflows in AI Valerie Leung © 2015 The MathWorks, Inc.1 Why MATLAB for Artificial Intelligence? 2 Artificial Intelligence Development of computer programs to perform tasks that normally require human intelligence 3 AI Applications Object Classification Speech Recognition Predictive Maintenance Signal Classification Automated Driving Stock Market Prediction 4 Machine Learning and Deep Learning Machine Learning Unsupervised Supervised Learning Learning [Labeled Data] [No Labeled Data] Clustering Classification Regression 5 Machine Learning and Deep Learning Machine Learning Unsupervised Supervised Learning Learning [Labeled Data] Machine learning typically involves [No Labeled Data] feature extraction Clustering Classification Regression Deep Learning Deep learning typically does not involve feature extraction 6 Deep Learning Uses a Neural Network Architecture Input Layer Output Hidden Layers (n) Layer 7 Deep Learning Datatypes Image Signal Text Numeric 8 Deep Learning Workflow Prepare Data Train Model Deploy Data access and Model design, Multiplatform preprocessing hyperparameter code generation tuning (CPU, GPU) Model exchange Ground truth labeling Edge deployment across frameworks Hardware- Enterprise accelerated training deployment 9 Why MATLAB for AI Tasks? Increased productivity with interactive tools Generate simulation data for complex models and systems Ease of deployment and scaling to various platforms Full AI workflows that cannot be easily replicated by other toolchains 10 Why MATLAB
    [Show full text]