Machine Learning

From laws to relationship: machines that read coincide

Communication programs have come from a simple transmission of smart information. Traditional programs focus on traveling green data from Point A to Point B as reliably as possible. Now, with a machine-on-mechanical explosion on IOT devices, independent systems, and Smart infrastructure, we hit a basic bottle.

Today networks are unnecessary data. But the equipment does not require all the other information for traditional Systems transmit.

Let's look at the following connections to security safety:

Security Camera: The man's spots on a banned area during hours banning and kidnapped the most prepared video frame 5 MB

Traditional Plan: Sends the entire 5MB frame with all the little

Medium Caution: Analyzes the framework and determines: “Unauthorized person found in Zone A”

In this encounter, the monitoring system cares for security is a security recorder than the details of a person, facial expressions, or background. However, traditional communication provides equal importance to all pixels, transmitted billions of fragments of fragments and few of the subject in the decision-making process.

Semantic connection appeared as paradigm shift forwarding rather than bits. Instead of sending the entire 5MB video frame, the Semantic Communication Program will only issue and transfer: “Zone_a, unauthorized, conservation of the data information, while keeping all the details of the decisions.

The Finding Program is exactly what you need to make the right decision by sending security personnel to enter unauthorized access.

The first programs rely on the semantic information systems (SKBS) to reduce the use of bandwidth without losing the true meaning of the message.

But Skb based systems have limitations. They work well in controlled areas but failed when they meet unknown situations. This limit stimulated the development of spaph-based information information that the communication prompts to resolve unknown situations for related consultation.

Why is SKBS-Based Connections on SKBS fail?

SKB programs have sensitive weaknesses. To understand, first we need to see how we process the details.

In our examples of safety testing, Camera Station and monitoring We store the foundation for shared information | {pkind ∈ Rrd}{m∈M} where each kkind represents Semantic attributes of paragraph m. When security camera boots video frame x, Semantic Encodic S_CY (·) issuing features sd.

Instead of transferring “S”, the system receives the closest match using COSLINY match:

Photo Source: SKB Page[1]

when d (s, pkind) represents cosline matches between S and Kkind.

In our example, the camera sees a person to a restricted area and issuing features such as “a human shape, no uniform, movement at night.” Compared to this against its knowledge information and receives the best “unauthorized_perison game” in Index V on the Foundation Foundation. Instead of sending all of the feature information, it just delivers “v.”

This simple methodology reduces the use of bandwidth while storing all the information The monitoring system needs to make decisions.

Where is this covered?

The program works well until something comes from unexpected. What happens when the camera lists something that is not in the foundation of its knowledge?

Let us look at the following example:

Security Camera: It sees employee of work clothing carrying tools at the time of closing.

SKB program: You only know “unauthorized_Person,” “Author Isorhorised_Person,” car, “” Animal “

System decision: Confidently separates the employee as “unauthorized_porson” to a higher threat

Result: False alarm – Team of Security is submitted to stop the official repair work

Maths after this can seem simple, but it is actually a very problem. The system always takes the “best” game, even if all the options are bad. It is like compulsory to choose the answer in a lot of selected tests where you are not available. You still have to choose something, and the program does not have a way to say they know.

These problems become worse in real administration. For example, if your training data does not include shadows, the system begins to call “participants.” Train except examples of winter clothing, and you think hard coats “suspicious gears.” The system will never agree with uncertainty. It always feels convinced, or completely wrong.

How do graphs of information prepare this?

Information graphs in Semantic communication resolves SKB limitations by entering a relationship between sisting areas rather than single categories. Instead of asking “What class is this game?” “How does this relate to what I know?”

Let's go by our example of repairs to see the difference:

Step 1: Determination and feature issuer
The camera receives the same features as in the earliest, such as “man's formation, work clothes, carries, for a period of banned hours”

Step 2: Relationship Map
Instead of enforcing these features into a single category, the information graph caurs it in many connected areas.

Personalization → causing “person”
Clothes + Tools → it causes “Work_tools” and “maintenance_equigation” and long
The hourly hourly hour → it causes “Unusual_angcess_Time” node

Step 3: Atheist relationship
Following the link between locations, the program uses the following formula:

Photo Source: Information graph [2]

When “Zv“It means updated Node V representation, and the amount includes information from all neighboring numbers.

Work_tools → shows → Configuration_a picture
Maintenance_Ancurring You → Done_a
Maintenance_worder → By_a
off_hour_access + authorized_Personel → requires → verification

Step 4: Content Content Reasoning
The information graph includes these relationships: “This seems to be maintenance work for staff of authorization, but time requires confirmation before deciding threats.”

The last classification is made using the following formula:

Photo Source: Information graph [2]

When ŷ The foretold section, Φ (y) It is a graph of information that promotes the Category Y, and ŝ The information received for SEMATIC. This leads to “Confirm before the Alarm” instead of compulsory Skb “unauthorized”.

Important Difference

Differences from the maintenance of maintenance is that the SKB system recognizes “man in a restricted area during the off” and is forced to select its existing categories. In our example, the program selected “unauthorized_pson” because it is a close game.

The information based program takes a completely different path. It sees the same person but begins to connect dots. The person in charge of employment tools that raise repairs, a valid purpose. But it occurred during the rear hours it means that it requires verification first. The program produces a wise answer – “Make sure before the alarm.” Or the program was not trained in this situation, able to reason on using the graphs.

To be able to be evaluated

Information graphics display significant improvements above SKB programs, showing better 70-80% accuracy in ordinary and unusual locations. The program works well even if the signal quality was not good, authenticators can actually work in real world conditions when communication is sound when communicating.

That means, Information graphs have their limitations. The graph structure requires the domain's technology and great computer power. Our test had been limited to certain data with the prescribed categories, so we are not sure how to happen to the real world's submission. These programs require a lot of exam before you completely change SKB systems.

Store

SkB systems are elegant when everything is predicted, but failed in an unknown area. Graphs of information storage this problem with genuine understanding that nodes are in touch to each other. This allows the program to consult with unusual environment are these links, rather than being clear training in all possible situations. They are difficult and most expensive to build, but they are ready for the real world conditions.

Progress

[1] https://arxiv.org/pdf/2405.05738
[2]

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button