Transfer learning of network traffic prediction model among cellular base stations
11696153 · 2023-07-04
Assignee
Inventors
- Xi Chen (Montreal, CA)
- Ju Wang (Montreal, CA)
- Hang Li (Montreal, CA)
- Yi Tian Xu (Montreal, CA)
- Di Wu (Montreal, CA)
- Xue Liu (Montreal, CA)
- Gregory Lewis Dudek (Westmount, CA)
- Taeseop Lee (Seoul, KR)
- Intaik Park (Seoul, KR)
Cpc classification
International classification
Abstract
Transfer learning based on prediction determines a similarity between a source base station and a target base station. Importance of parameters is determined and training is adjusted to respect the importance of parameters. A lack of historical data is compensated by selecting a base station as source base station which has a larger amount of historical data.
Claims
1. A server configured to manage traffic prediction model transfer learning among 5G base stations, the server comprising: one or more processors; and one or more memories, the one or more memories storing a program, wherein execution of the program by the one or more processors is configured to cause the server to at least: receive a first plurality of base station statistics, wherein the first plurality of base station statistics includes a first data set of a first size from a first base station; receive a second plurality of base station statistics, wherein the second plurality of base station statistics includes a second data set of a second size corresponding to a second base station; select the first base station as a source base station; train a similarity network; receive a source prediction model from the first base station and an importance score matrix; receive a prediction model request from a target base station, wherein the target base station is the second base station; compute a first similarity using the similarity network; obtain a first scaled importance score matrix based on the importance score matrix and based on the first similarity; and send the source prediction model and the first scaled importance score matrix to the second base station, whereby the second base station is configured to use the source prediction model, and the first scaled importance score matrix to generate a target prediction model and predict radio system parameters relevant to the second base station, wherein the radio system parameters include a future value of user data traffic passing through the second base station.
2. The server of claim 1, wherein execution of the program by the one or more processors is further configured to cause the server to: receive a third data set of a third size from a third base station; determine a second similarity using the similarity network and the third data set; compute a second scaled importance score matrix based on the second similarity and the importance score matrix; and send the source prediction model and the second scaled importance score matrix to the third base station.
3. The server of claim 1, wherein the first data set includes a histogram of a traffic history of the source base station, wherein an abscissa of the histogram is proportional to bits per second, the first data set further includes a first indication of frequency bands supported by the source base station, a second indication of radio access types supported by the source base station, a third indication of 5G class types supported by the source base station and a fourth indication of user density currently supported by the source base station, and wherein a first node vector is formed based on the first data set.
4. The server of claim 3, wherein the importance score matrix is a second order derivative of a Fisher information matrix with respect to weights of the source prediction model, and the first scaled importance score matrix is a product of the importance score matrix and the first similarity.
5. The server of claim 1, wherein execution of the program by the one or more processors is further configured to cause the server to select a candidate base station with a largest data set as the source base station.
6. The server of claim 3, wherein the similarity network comprises an autoencoder, and execution of the program by the one or more processors is further configured to cause the server to train the similarity network by using gradient descent to update parameters of the autoencoder based on an autoencoder loss, wherein the autoencoder loss is a distance between the first node vector and an estimated node vector, wherein the estimated node vector is an output of the similarity network.
7. The server of claim 6, wherein execution of the program by the one or more processors is further configured to cause the server to compute the first similarity by: obtaining a second node vector from the target base station; obtaining a first latent vector as a first output of the autoencoder when the first node vector is input to the autoencoder; obtaining a second latent vector as a second output of the autoencoder when the second node vector is input to the autoencoder; and computing the first similarity as a cosine similarity between the first latent vector and the second latent vector.
8. A method for managing traffic prediction model transfer learning among 5G base stations, the method comprising: receiving a first plurality of base station statistics, wherein the first plurality of base station statistics includes a first data set of a first size from a first base station; receiving a second plurality of base station statistics, wherein the second plurality of base station statistics includes a second data set of a second size corresponding to a second base station; selecting the first base station as a source base station; training a similarity network; receiving a source prediction model from the first base station and an importance score matrix; receiving a prediction model request from a target base station, wherein the target base station is the second base station; computing a first similarity using the similarity network; obtaining a first scaled importance score matrix based on the importance score matrix and based on the first similarity; and sending the source prediction model and the first scaled importance score matrix to the second base station.
9. The method of claim 8, further comprising: receiving a third data set of a third size from a third base station; determining a second similarity using the similarity network and the third data set; computing a second scaled importance score matrix based on the second similarity and the importance score matrix; and sending the source prediction model and the second scaled importance score matrix to the third base station.
10. The method of claim 8, wherein the first data set includes a histogram of a traffic history of the source base station, wherein an abscissa of the histogram is proportional to bits per second, the first data set further includes a first indication of frequency bands supported by the source base station, a second indication of radio access types supported by the source base station, a third indication of 5G class types supported by the source base station and a fourth indication of user density currently supported by the source base station, and wherein a first node vector is formed based on the first data set.
11. The method of claim 10, wherein the similarity network comprises an autoencoder, and the training the similarity network comprises using gradient descent to update parameters of the autoencoder based on an autoencoder loss, wherein the autoencoder loss is a distance between the first node vector and an estimated node vector, wherein the estimated node vector is an output of the similarity network.
12. The method of claim 11, wherein the computing the first similarity comprises: obtaining a second node vector from the target base station; obtaining a first latent vector as a first output of the autoencoder when the first node vector is input to the autoencoder; obtaining a second latent vector as a second output of the autoencoder when the second node vector is input to the autoencoder; and computing the first similarity as a cosine similarity between the first latent vector and the second latent vector.
13. The method of claim 8, further comprising selecting a candidate base station with a largest data set as the source base station.
14. The method of claim 8, wherein the importance score matrix is a second order derivative of a Fisher information matrix with respect to weights of the source prediction model, and the first scaled importance score matrix is a product of the importance score matrix and the first similarity.
15. A non-transitory computer readable medium configured to store a program, wherein execution of the program by one or more processors of a server is configured to cause the server to at least: receive a first plurality of base station statistics, wherein the first plurality of base station statistics includes a first data set of a first size from a first base station; receive a second plurality of base station statistics, wherein the second plurality of base station statistics includes a second data set of a second size corresponding to a second base station; select the first base station as a source base station; train a similarity network; receive a source prediction model from the first base station and an importance score matrix; receive a prediction model request from a target base station, wherein the target base station is the second base station; compute a first similarity using the similarity network; obtain a first scaled importance score matrix based on the importance score matrix and based on the first similarity; and send the source prediction model and the first scaled importance score matrix to the second base station, whereby the second base station is configured to use the source prediction model, and the first scaled importance score matrix to generate a target prediction model and predict radio system parameters relevant to the second base station, wherein the radio system parameters include a future value of user data traffic passing through the second base station.
16. The non-transitory computer readable medium of claim 15, wherein execution of the program by the one or more processors is further configured to cause the server to: receive a third data set of a third size from a third base station; determine a second similarity using the similarity network and the third data set; compute a second scaled importance score matrix based on the second similarity and the importance score matrix; and send the source prediction model and the second scaled importance score matrix to the third base station.
17. The non-transitory computer readable medium of claim 15, wherein the first data set includes a histogram of a traffic history of the source base station, wherein an abscissa of the histogram is proportional to bits per second, the first data set further includes a first indication of frequency bands supported by the source base station, a second indication of radio access types supported by the source base station, a third indication of 5G class types supported by the source base station and a fourth indication of user density currently supported by the source base station, and wherein a first node vector is formed based on the first data set.
18. The non-transitory computer readable medium of claim 17, wherein the similarity network comprises an autoencoder, and execution of the program by the one or more processors is further configured to cause the server to train the similarity network by using gradient descent to update parameters of the autoencoder based on an autoencoder loss, wherein the autoencoder loss is a distance between the first node vector and an estimated node vector, wherein the estimated node vector is an output of the similarity network.
19. The non-transitory computer readable medium of claim 18, wherein execution of the program by the one or more processors is further configured to cause the server to compute the first similarity by: obtaining a second node vector from the target base station; obtaining a first latent vector as a first output of the autoencoder when the first node vector is input to the autoencoder; obtaining a second latent vector as a second output of the autoencoder when the second node vector is input to the autoencoder; and computing the first similarity as a cosine similarity between the first latent vector and the second latent vector.
20. The non-transitory computer readable medium of claim 15, wherein execution of the program by the one or more processors is further configured to cause the server to select a candidate base station with a largest data set as the source base station.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The text and figures are provided solely as examples to aid the reader in understanding the invention. They are not intended and are not to be construed as limiting the scope of this invention in any manner. Although certain embodiments and examples have been provided, it will be apparent to those skilled in the art based on the disclosures herein that changes in the embodiments and examples shown may be made without departing from the scope of embodiments provided herein.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
DETAILED DESCRIPTION
(17) Embodiments provide TLP, a Transfer Learning based Prediction framework. Embodiments achieve high accuracy on the traffic prediction task with limited and imbalanced data. Embodiments provide data and bandwidth efficiency. Embodiments use available data from both data-abundant reference nodes (base stations) and datalimited regular nodes (base stations) without migration of traffic history logs.
(18) Embodiments use relatively large amount of data from a reference edge node (also referred to as a source base station) to train a base Neural Network (NN) model (called a source model, or source prediction model), which not only extracts node-specific features but also (to some extent) summarizes general features.
(19) Embodiments fine-tune the weights of source model to serve another node (target base station), using the limited amount of data maintained by the target base station.
(20) A major challenge in transferring prediction models between edge nodes is that it is hard to maintain the general features while updating the node-specific features with a small amount of data at the edge (target base station). Embodiments use Layer Freezing (LF), Elastic Weight Consolidation (EWC) and Similarity-based EWC (SEWC).
(21) Embodiments are more fine-grained and node-customized than previous approaches. Embodiments provide weight-level importance scores to balance between 1) keeping an NN weight learned for generality and 2) updating this weight to serve the specific target. Embodiments also customizes the model transfer for each individual edge node by adjusting the importance scores according to the similarity between the source and the target.
(22)
(23)
(24)
(25) At the top of
(26) At the bottom of
(27)
(28)
(29) BS 2-1 experiences traffic 2-15 and BS 2-2 experiences traffic 2-16. A history of traffic may be referred to herein using the symbol Q.
(30)
(31) At operation 3-30, a source base station 3-1 is selected. At operation 3-32, a similarity network 3-3 is trained based on first base station statistics 3-5 of the source base station 3-1 and based on second base station statistics 3-7 of a target base station 3-9. At operation 3-34, the similarity network 3-3 is used to determine the similarity 1-1 between the source base station 3-1 and the target base station 3-9. At operation 3-36, a scaled importance score matrix 3-13 is determined based on an importance score matrix 3-11 of the source base station 3-1 and based on the similarity 1-1.
(32) Then, at operation 3-38, the scaled importance score matrix 3-13 and source model 1-2 are sent to the target base station 3-9. The target base station 3-9 determines the target model 1-3 at 3-40. The target base station 3-9 then uses the target model 1-3 to form a prediction 3-16 of local traffic 2-16 at a future time 3-19. The target base station 3-9 is then configured, at the appropriate time, with an allocation 1-71 to support traffic 2-16 at the time 3-19.
(33)
(34) In
(35) At operation 4-14, the server 2-20 trains the similarity network 3-3 including training of a similarity network 4-40. At 4-15, the server 2-20 determines a similarity 1-1 between the source base station 3-1 and the target base station 3-9.
(36) At 4-16, the source base station 3-1 determines the source model 1-2 and the importance score matrix 3-11. This may be caused by a command from the server 2-20 (command not shown). In a message 4-17 (this may be several messages), the source base station 3-1 sends the importance score matrix 3-11 and the source model 3-15 to the server 2-20.
(37) The server 2-20 then determines a scaled importance score matrix 3-13 at operation 4-18 and sends this along with the source model 1-2 to the target base station 3-9 in message 4-20.
(38) The target base station 3-9 generates the target model 1-3 using the scaled importance score matrix 3-13, the source model 1-2 and statistics 2-22 (the statistics local to the target base station 3-9).
(39) At operations 4-24 and 4-25 the target base station 3-9 and source base station 3-1 form respective predictions 3-16 and 4-34 of respective traffic 2-16 and 2-15. The target base station 3-9 then is configured based on prediction 3-16 at operation 4-16. The source base station 3-1 is configured based on prediction 4-34 at operation 4-27.
(40) At a time 3-19, actual traffic 4-30 occurs (marked 4-28). Performance 3-20 is improved and expenses 3-21 are reduced (marked 4-32).
(41)
(42) The server 2-20 determines which base stations are sources, which are targets, and a source base station for each target base station.
(43) At operation 5-30, the server 2-20 collects the statistics of BS 2-1, BS 2-2 and other base stations.
(44) At operation 5-32, the server selects a base station as a source base station 3-1 based in part on the base station having a high number of data points stored. The number of data points may correspond to, for example, several (3-12) months of log files of traffic history. A small number of data points would correspond to, for example a few weeks (2-6 weeks) of log files of traffic history.
(45) Two logic flows occur after operation 5-32, one starting with operation 5-34 and one starting with operation 5-46. These may be done in parallel or serial fashion.
(46) At operation 5-34, the server 2-20 trains a similarity network 4-40 based on statistics 3-5 of the source base station 3-1. At operation 5-36, the server 2-20 receives a model request 4-4 from the target base station 3-9. The server 2-20 calculates source latent features 5-3 and target latent features 5-5 using the similarity network 4-4 at operation 5-38.
(47) At operation 5-40, the server 2-20 calculates the similarity 1-1 of the target base station 3-9 to the source base station 3-1.
(48) Turning to operation 5-46, the server 2-20 sends a request 5-5 to the source base station 3-1 asking it to train the source model 1-2. At operation 5-48, the server 2-20 receives the source model 1-2 and the importance score matrix 3-11 from the source base station 3-1.
(49) The parallel logic flows come together at operation 5-42 and the server 2-20 calculates the scaled importance matrix 3-13 as a product of the similarity 1-1 (a scalar) and the importance score matrix 3-11 (for example, Kronecker product). The server 2-20 at operation 5-44 then transmits the source model 1-2 and the scaled importance score matrix 3-13 to the target base station 3-9.
(50)
(51) At operation 6-30, the base station collects history 6-1 of traffic 6-3 and determines a histogram 6-5. At operation 6-32, the base station forms a data set 6-7 including base station statistics 6-8. The base station then uploads the data set 6-7 to the server 2-20 at operation 6-34.
(52) At operation 6-36, the base station determines whether a model request 5-1 has been received from the server 2-20. This determination may be made on a periodic basis or via some other predetermined schedule. If yes, the base station is a target base station and performs the logic of operation 6-38 next, which is to train the source model 1-2. If no, the base station is a source base station and performs the logic of operation 6-50 next.
(53) Please refer to operation 6-50. The base station is a target base station, for example, target base station 3-9. The target base station 3-9 sends a model request 4-4 to the server 2-20. At operation 6-52, the target base station 3-9 downloads the source model 1-2 and the scaled importance score matrix 3-13 from the server 2-20. At operation 6-54, the target base station 3-9 determines the target model 1-3. At operation 6-56, the target base station 3-9 forms the prediction 3-16 of traffic 2-16. At 6-58, the target base station 3-9 is configured based on the prediction 3-16. Spectrum allocation of BSs are configured when deployed. The spectrum allocation is fixed at that time. If later, the spectrum allocation is changed by some dynamic algorithms, embodiments trigger the similarity calculation and similar operations as described herein. At operation 6-60, the target base station 3-9 supports traffic 2-16.
(54) Please refer to operation 6-36. If a source model request 5-1 is received, the logic flows to operation 6-38 and the base station is a source base station, for example, source base station 3-1. The source base station 3-1 performs two actions, these can be in parallel. At operation 6-40, the source base station 3-1 calculates the importance score matrix 3-11. At operation 6-42, the source base station 3-1 uploads the source model 1-2 and the importance score matrix 3-11 to the server 2-20. The server 2-20 may then provide the source model 1-2 to another base station, see operation 6-52.
(55) Again, referring to operation 6-38, the source base station 3-1 also acts to support traffic local to the source base station 3-1. At operation 6-46, the source base station 3-1 forms prediction 4-34 of traffic 2-15 using the source model 1-2. At operation 6-48, the source base station 3-1 is configured based on the prediction 4-34. At 6-49, the source base station 3-1 supports traffic 2-15.
(56)
(57)
(58)
(59)
(60)
(61)
(62) Example approaches for performing the logic of
(63) Each base station records traffic data samples. The data set from the source base station is denoted S.sub.S.
(64) A traffic sample s[t] may be written as in Eq. (1). a[t] is the traffic amount.
s[t]=[a[t];t] Eq. (1)
(65) A window c of traffic samples may be formed for time series analysis as in Eq. (2).
x[t]=[a[t],a[t+1], . . . ,a[t+c−1];t,t+1, . . . ,t+c−1] Eq. (2)
and
y[t]=a[t+c] Eq. (3)
(66) A transformed data sample is u[t]={x[t]; y[t]}. The window is moved forward one sample to generate u[t+1]. A transformed data set is Ω.sub.S={X.sub.S,Y.sub.S}, where X.sub.S={x[t]} and Y.sub.S={y[t]} denote all the input and output vectors transformed from S.sub.S. The data set of the k.sup.th target base station is denoted Ω.sub.T(k). The source model 1-2 is denoted θ.sub.B below. The target model 1-3 for the k.sup.th base station is denoted θ.sub.T(k) below.
(67) The prediction loss for a new data sample x[t] at the target base station 3-9 can be defined as in Eq. (4).
(68)
(69) where the summation (“Σ”) is over y[t]∈Ω.sub.T. |Ω| is the size of the data set, ŷ is the prediction of the ground truth y, and d(.,.) is an error metric (e.g., absolute error, square error, root square error).
(70) Embodiments provide a target model 1-3 (θ.sub.B) for a small Ω.sub.T from a big data set Ω.sub.S. while minimizing the loss L of Eq. (4) for the target base station 3-9.
(71) One technique for model transfer is weight initiation. Weights are initiated from a source with values w.sub.i,j[0], and then updated using stochastic gradient descent (SGD).
w.sub.i,j[t+1]=w.sub.i,j[t]−η∇L Eq. (5)
(72) where t denotes the epoch number.
(73) When the training is complete, the model θ.sub.T has been learned.
(74) Another technique for transfer is layer freezing as shown in the following two lines, which form Eq. (6).
w.sub.i,j[t+1]=w.sub.i,j[t] if j≤β
for other j, update using w.sub.i,j[t+1]=w.sub.i,j[t]−η∇L Eq. (6)
(75) Another technique for transfer is elastic weight consolidation uses the fisher information matrix (FIM). Let F.sub.i,j be the diagonal value of w.sub.i,j's FIM. F.sub.i,j can be computed using the first-order derivative as shown in Eq. (7).
(76)
(77) Where the expectation (“E”) is over those (x,y) in Ω.sub.S.
(78) F.sub.i,j is now a constant score that measures the importance of w.sub.i,j.
(79) Given this importance score, the loss function to transfer and/or fine tune the neural network (NN) at the target is now updated as in Eq. (8).
L.sub.EWC=L+λL.sub.R=L+λΣ0.5F.sub.i,j(w.sub.i,j−w.sub.i,j[0]).sup.2 Eq. (8)
(80) where the sum is over i,j, w.sub.i,j at t=0 is the initial value of w.sub.i,j before transferring, the initial weight in the duplicated model (called here θ.sub.D) and λ controls a balance between the prediction loss and the regularization term related to F.sub.i,j.
(81) The weights of the transferred model θ.sub.T (target model 1-3) are updated as in Eq. (9).
w.sub.i,j[t+1]=w.sub.i,j[t]−η∇L.sub.EWC Eq. (9)
(82) where, at a given epoch t, ∇L.sub.EWC≅∂L.sub.EWC/∂w.sub.i,j.
(83) Embodiments customize the importance scores to each individual target. Ideally, if a target is quite similar to the source, we prefer to keep the importance scores high to maintain the common features learned from the source. Otherwise, we lower the importance scores, so that the transfer model would not be overly constrained by the base model.
(84) Embodiments provide a similarity-based EWC (SEWC) technique. SEWC describes the similarity between the source node and a target node on a high-level latent space with the help of an autoencoder (AE) (e.g., similarity network 4-40 of
(85) In some embodiments, to describe a base station (also called a node herein), the following information is concatenated (also referred to as indications herein): 1) the traffic distribution, 2) the supported 3GPP frequency bands (including 3G, LTE/4G, and 5G bands), 3) the supported Radio Access Technology (RAT) types (including GSM, UMTS, FDD-LTE, TDD-LTE and 5G NR), 4) the class of 5G New Radio (NR) if applicable (i.e., wide area, medium range or local area node), and/or 5) the user density level around the node. The collection of the indications may be referred to as a data set herein, and as statistics. These statistics/indications are further described below.
(86) The traffic distribution H: is represented by a 100-bin normalized histogram of a node's historical traffic as shown in Eq. (10).
H=histo(Ω) Eq. (10)
(87) where histo is the calculation of normalized histogram.
(88) Supported 3GPP frequency bands, F.sub.B, are represented by a binary vector F.sub.B=f.sub.b(1), f.sub.b(2), . . . , f.sub.b(N.sub.b) where f.sub.b(k)=1 indicates that the k.sup.th frequency band is supported by the base station being described, and N.sub.B is the total number of bands defined in 3GPP standards. The frequency bands are concatenated in the order of 3G bands, LTE/4G bands, and 5G bands.
(89) A supported Radio Access Technology (RAT) types F.sub.RAT is represented by a binary 5-dimensional vector F.sub.RAT=[f.sub.RAT(1), . . . , f.sub.RAT(5)], where f.sub.RAT(k)=1 indicates that the k.sup.th RAT type is supported by the base station being described. RAT types are organized in the order of GSM, UMTS, FDD-LTE, TDD-LTE and 5G NR). For example, F.sub.RAT=[0; 0; 1; 0; 1] means that FDD-LTE and 5G NR are supported by the current node.
(90) A class of 5G NR F5G is denoted by a binary 5-dimensional vector F.sub.5G=[f.sub.5G(1), . . . , f.sub.5G(4)], where f.sub.5G(k)=1 indicates that the current node is a k.sup.th class 5G node. The classes are organized in the order of wide area, medium range and local area. For instance, F.sub.5G=[1; 0; 0] means that the current node is a wide area 5G NR node. For further description of classes, see TS 138104-V15.3.0-5G; NR; Base Station (BS) radio transmission and reception (3GPP TS 38.104 version 15.3.0 Release 15).
(91) A user density level, ρ, around the BS being described. ρ is a binary 3-dimensional vector ρ=[ρ(1), ρ(2), ρ(3)]. The density level are organized in the order of high, medium and low. For example, ρ=[1; 0; 0] indicates that the user density around the current node is high. Some examples of user density thresholds are as follows: Th_low: 1,000 people per km.sup.2, Th_high: 10,000 people per km.sup.2. If Density>Th_high, density is high; else if, Density<Th_low, density is low; else, density is middle
(92) The indications or vectors described above are concatenated as in Eq. (11).
G=[H,F.sub.B,F.sub.RAT,F.sub.5G,ρ] Eq. (11)
(93) This vector G, item 6-7 of
L.sub.RECON=d(G.sub.S,Ĝ.sub.S) Eq. (12)
(94) After this AE is trained, the encoder 8-1 is used to generate latent features (called Z 8-3) from both the source node description G.sub.S of the source base station 3-1 and the target node description G.sub.T of the target base station 3-9. The corresponding latent features are z.sub.S 5-5 and z.sub.T 5-3 (see
(95)
(96) This similarity score (μ, also referred to as similarity 1-1) is then multiplied by EWC's importance scores, thus generating node-similarity-aware importance scores as in Eq. (14).
FSIM.sub.i,j=μF.sub.i,j Eq. (14)
(97) The loss function to transfer the base model is given in Eq. (15).
L.sub.SEWC=L+λΣ0.5μF.sub.i,j(w.sub.i,j−w.sub.i,j[0]).sup.2 Eq. (15)
(98) where the sum is over i,j.
(99) The weights are updated at every epoch as in Eq. (16).
w.sub.i,j[t+1]=w.sub.i,j[t]−η∇L.sub.SEWC Eq. (16)
(100) The techniques described above go from the entire model level (for WI), the separated layer level (for LF) to the individual weight level (for EWC and SEWC). WI treats all the weights in the model indifferently; LF differentiates the layers based on how general the extracted features are; EWC and SEWC places different importance scores on individual weights.
(101) To integrate all of them into a single transfer learning based prediction (TLP) framework, embodiments provide a uniform formulation. Embodiments achieve this by reformulating the weight update rules of these techniques.
(102) Let η.sub.i,j be the learning rate of the weight w.sub.i,j during the model transfer process. At each training epoch, the weight w.sub.i,j follows a uniform updating rule given by Eq. (17).
w.sub.i,j[t+1]=w.sub.i,j[t]−η∇L Eq. (17)
(103) If the WI technique is applied for the model transfer, then the learning rate remains the same for all the weights, as in Eq. (18).
∀(i,j)η.sub.i,j=η* Eq. (18)
(104) where η* can be either a constant or a variable that changes according to the training epochs (but remains the same for all the weights within an epoch).
(105) If the LF technique is chosen, then different learning rates are used for the front layers and the rear layers, as in Eq. (19) in the following two lines.
∀i,η.sub.i,j=0 if j≤β
∀i,η.sub.i,j=η* if j>β Eq. (19)
(106) With respect to the learning rate for EWC, a first step is to take the partial derivative of Eq. (8) with respect to the weight w.sub.i,j. Combining the result with Eq. (17), the learning rate for all i,j is given by Eq. (20).
(107)
(108) For SEWC, the learning rate is similar to Eq. (20) and is given in Eq. (21).
(109)
(110) If the base model is applied directly at the target without any training, then for all i,j, the learning rate is zero as shown in Eq. (22).
η.sub.i,j=0 Eq. (22)
(111) Considering Eq. (17), the nature of transfer learning can be explained.
(112) As provided by embodiments, SEWC balances between preserving general features and learning new features, by adding a similarity-based regularization term to the updating process of every weight in the model. Increasing the regularization term helps preserve the general features more. Decreasing the regularization term gives the model more freedom to adapt to the new target data.
(113) Substituting Eq. (21) into Eq. (17) provides Eq. (23).
w.sub.i,j[t+1]=w.sub.i,j[t]−η*γμF.sub.i,j(w.sub.i,j−w.sub.i,j[0]) Eq. (23)
(114) In Eq. (23), the second term on the right side is the regular weight increment caused by prediction error gradients, and the third term is the extra weight increment brought by SEWC. Let this SEWC weight increment be δ.sub.i,j as in Eq. (25).
δ.sub.i,j=−η*λμF.sub.i,j(w.sub.i,j−w.sub.i,j[0]) Eq. (24)
(115) If w.sub.i,j=w.sub.i,j[0] then δ.sub.i,j=0. In this case, the weight stays the same as its original value. Hence, SEWC does nothing.
(116) If w.sub.i,j>w.sub.i,j[0] then δ.sub.i,j<0. In this case, the weight is larger than its original value. SEWC poses a negative δ.sub.i,j to drag the weight down. A higher similarity score μ, or a bigger importance score F.sub.i,j, brings a larger decrease, and thus assigns w.sub.i,j a stronger pushback towards w.sub.i,j[0].
(117) If w.sub.i,j<w.sub.i,j[0] then δ.sub.i,j>0. In this case, the weight is smaller than its original value. SEWC poses a positive δ.sub.i,j to bring the weight up to its original value faster, if the similarity score μ is high or the weight is important (big F.sub.i,j).
(118) From another perspective, F.sub.i,j also controls the sensitivity of w.sub.i,j towards the target data. If μ or Fi,j is large, it poses a high penalty, when w.sub.i,j is being updated by new data.
(119) Example quantitative benefits are as follows.
(120) Using the similarity 1-1 in the logic of
(121) Hardware for performing embodiments provided herein is now described with respect to
(122)