Applications of Information Theory to Machine Learning Jeremy Bensadon

Total Page:16

File Type:pdf, Size:1020Kb

Applications of Information Theory to Machine Learning Jeremy Bensadon Applications of Information Theory to Machine Learning Jeremy Bensadon To cite this version: Jeremy Bensadon. Applications of Information Theory to Machine Learning. Metric Geometry [math.MG]. Université Paris Saclay (COmUE), 2016. English. NNT : 2016SACLS025. tel-01297163 HAL Id: tel-01297163 https://tel.archives-ouvertes.fr/tel-01297163 Submitted on 3 Apr 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. NNT: 2016SACLS025 These` de doctorat de L'Universit´eParis-Saclay pr´epar´ee`aL'Universit´eParis-Sud Ecole´ Doctorale n°580 Sciences et technologies de l'information et de la communication Sp´ecialit´e: Math´ematiqueset informatique par J´er´emy Bensadon Applications de la th´eoriede l'information `al'apprentissage statistique Th`esepr´esent´eeet soutenue `aOrsay, le 2 f´evrier2016 Composition du Jury : M. Sylvain Arlot Professeur, Universit´eParis-Sud Pr´esident du jury M. Aur´elienGarivier Professeur, Universit´ePaul Sabatier Rapporteur M. Tobias Glasmachers Junior Professor, Ruhr-Universit¨atBochum Rapporteur M. Yann Ollivier Charg´ede recherche, Universit´eParis-Sud Directeur de th`ese Remerciements Cette th`eseest le r´esultatde trois ans de travail, pendant lesquels j'ai c^otoy´e de nombreuses personnes qui m'ont aid´e,soit par leurs conseils ou leurs id´ees, soit simplement par leur pr´esence, `aproduire ce document. Je tiens tout d'abord `aremercier mon directeur de th`eseYann Ollivier. Nos nombreuses discussions m'ont beaucoup apport´e,et j'en suis toujours sorti avec les id´eesplus claires qu'au d´epart. Je remercie ´egalement mes rapporteurs Aur´elienGarivier et Tobias Glas- machers pour leur relecture attentive de ma th`eseet leurs commentaires, ainsi que Sylvain Arlot, qui m'a permis de ne pas me perdre dans la litt´erature sur la r´egressionet a accept´ede faire partie de mon jury. Fr´ed´ericBarbaresco a manifest´eun vif int´er^etpour la troisi`emepartie de cette th`ese,et a fourni de nombreuses r´ef´erences, parfois difficiles `atrouver. L'´equipe TAO a ´et´eun environnement de travail enrichissant et agr´eable, par la diversit´eet la bonne humeur de ses membres, en particulier mes ca- marades doctorants. Un remerciement tout particulier aux secr´etairesde l'´equipe et de l'´ecole doctorale Marie-Carol puis Olga, et St´ephanie, pour leur efficacit´e.Leur aide dans les diff´erentes proc´eduresde r´einscriptionet de soutenance a ´et´einestimable. Enfin, je voudrais surtout remercier ma famille et mes amis, en particulier mes parents et mes sœurs. Pour tout. Paris, le 27 janvier 2016 J´er´emy Bensadon 3 Contents Introduction8 1 Regression............................. 8 2 Black-Box optimization: Gradient descents .......... 10 3 Contributions........................... 11 4 Thesis outline........................... 12 Notation 14 I Information theoretic preliminaries 15 1 Kolmogorov complexity 16 1.1 Motivation for Kolmogorov complexity............. 16 1.2 Formal Definition......................... 17 1.3 Kolmogorov complexity is not computable........... 18 2 From Kolmogorov Complexity to Machine Learning 20 2.1 Prefix-free Complexity, Kraft's Inequality ........... 20 2.2 Classical lower bounds for Kolmogorov complexity . 21 2.2.1 Coding integers...................... 21 2.2.2 Generic bounds...................... 22 2.3 Probability distributions and coding: Shannon encoding the- orem................................ 23 2.3.1 Non integer codelengths do not matter: Arithmetic coding........................... 25 2.4 Model selection and Kolmogorov complexity.......... 28 2.5 Possible approximations of Kolmogorov complexity . 29 3 Universal probability distributions 31 3.1 Two-part codes.......................... 34 3.1.1 Optimal precision .................... 34 3.1.2 The i.i.d.case: confidence intervals and Fisher infor- mation........................... 35 3.1.3 Link with model selection................ 36 3.2 Bayesian models, Jeffreys’ prior................. 37 3.2.1 Motivation ........................ 37 4 3.2.2 Construction ....................... 38 3.2.3 Example: the Krichevsky{Trofimov estimator . 38 3.3 Context tree weighting...................... 41 3.3.1 Markov models and full binary trees.......... 41 3.3.2 Prediction for the family of visible Markov models . 42 3.3.3 Computing the prediction................ 42 3.3.3.1 Bounded depth................. 43 3.3.3.2 Generalization................. 45 3.3.4 Algorithm......................... 46 II Expert Trees 47 4 Expert trees: a formal context 50 4.1 Experts .............................. 51 4.1.1 General properties.................... 52 4.2 Operations with experts..................... 53 4.2.1 Fixed mixtures...................... 53 4.2.2 Bayesian combinations ................. 54 4.2.3 Switching......................... 55 4.2.3.1 Definition.................... 55 4.2.3.2 Computing some switch distributions: The forward algorithm............... 56 4.2.4 Restriction ........................ 61 4.2.5 Union........................... 61 4.2.5.1 Domain union ................. 61 4.2.5.2 Target union.................. 62 4.2.5.3 Properties ................... 63 4.3 Expert trees............................ 65 4.3.1 Context Tree Weighting................. 67 4.3.2 Context Tree Switching ................. 68 4.3.2.1 Properties ................... 69 4.3.3 Edgewise context tree algorithms............ 74 4.3.3.1 Edgewise Context Tree Weighting as a Bayesian combination .................. 75 4.3.3.2 General properties of ECTS ......... 76 4.3.4 Practical use ....................... 80 4.3.4.1 Infinite depth algorithms........... 80 4.3.4.1.1 Properties .............. 81 4.3.4.2 Density estimation............... 82 4.3.4.3 Text compression ............... 84 4.3.4.4 Regression ................... 84 5 Comparing CTS and CTW for regression 86 5 5.1 Local experts........................... 86 5.1.1 The fixed domain condition............... 86 5.1.2 Blind experts....................... 87 5.1.3 Gaussian experts..................... 87 5.1.4 Normal-Gamma experts................. 88 5.2 Regularization in expert trees.................. 89 5.2.1 Choosing the regularization............... 90 5.3 Regret bounds in the noiseless case............... 94 5.3.1 CTS............................ 94 5.3.2 ECTS........................... 96 5.3.3 CTW ...........................100 6 Numerical experiments 104 6.1 Regression.............................104 6.2 Text Compression ........................108 6.2.1 CTS in [VNHB11] ....................108 III Geodesic Information Geometric Optimization 110 7 The IGO framework 113 7.1 Invariance under Reparametrization of θ: Fisher Metric . 113 7.2 IGO Flow, IGO Algorithm ...................115 7.3 Geodesic IGO...........................116 7.4 Comparable pre-existing algorithms . 117 7.4.1 xNES ...........................117 7.4.2 Pure Rank-µ CMA-ES..................119 8 Using Noether's theorem to compute geodesics 121 8.1 Riemannian Geometry, Noether's Theorem . 121 ~ 8.2 GIGO in Gd ............................123 8.2.1 Preliminaries: Poincar´eHalf-Plane, Hyperbolic Space 124 ~ 8.2.2 Computing the GIGO Update in Gd . 125 8.3 GIGO in Gd ............................126 8.3.1 Obtaining a First Order Differential Equation for the Geodesics of Gd . 126 8.3.2 Explicit Form of the Geodesics of Gd (from [CO91]) . 130 8.4 Using a Square Root of the Covariance Matrix . 131 9 Blockwise GIGO, twisted GIGO 133 9.1 Decoupling the step size.....................133 9.1.1 Twisting the Metric ...................133 9.1.2 Blockwise GIGO, an almost intrinsic description of xNES ...........................135 6 9.2 Trajectories of Different IGO Steps . 137 10 Numerical experiments 142 10.1 Benchmarking...........................142 10.1.1 Failed Runs........................143 10.1.2 Discussion.........................144 10.2 Plotting Trajectories in G1 . 145 Conclusion 151 1 Summary .............................151 1.1 Expert Trees .......................151 1.2 GIGO...........................151 2 Future directions.........................151 A Expert Trees 153 A.1 Balanced sequences........................154 A.1.1 Specific sequence achieveing the bound in Section 5.3.1 155 A.2 Loss of Normal{Gamma experts . 156 A.3 Pseudocode for CTW ......................162 B Geodesic IGO 164 B.1 Generalization of the Twisted Fisher Metric . 165 B.2 Twisted Geodesics ........................166 B.3 Pseudocodes............................168 B.3.1 For All Algorithms....................168 B.3.2 Updates..........................169 Bibliography 172 Index 178 7 Introduction Information theory has a wide range of applications. In this thesis, we focus on two different machine learning problems, for which information theoretical insight was useful. The first one is regression of a function f : X 7! Y . We are given a sequence (xi) and we want to predict the f(xi) knowing the f(xj) for j < i. We use techniques inspired by the Minimum Description Length principle to obtain a quick and robust algorithm for online regression. The second one is black box optimization. Black-box optimization con- sists
Recommended publications
  • Information Theory Techniques for Multimedia Data Classification and Retrieval
    INFORMATION THEORY TECHNIQUES FOR MULTIMEDIA DATA CLASSIFICATION AND RETRIEVAL Marius Vila Duran Dipòsit legal: Gi. 1379-2015 http://hdl.handle.net/10803/302664 http://creativecommons.org/licenses/by-nc-sa/4.0/deed.ca Aquesta obra està subjecta a una llicència Creative Commons Reconeixement- NoComercial-CompartirIgual Esta obra está bajo una licencia Creative Commons Reconocimiento-NoComercial- CompartirIgual This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike licence DOCTORAL THESIS Information theory techniques for multimedia data classification and retrieval Marius VILA DURAN 2015 DOCTORAL THESIS Information theory techniques for multimedia data classification and retrieval Author: Marius VILA DURAN 2015 Doctoral Programme in Technology Advisors: Dr. Miquel FEIXAS FEIXAS Dr. Mateu SBERT CASASAYAS This manuscript has been presented to opt for the doctoral degree from the University of Girona List of publications Publications that support the contents of this thesis: "Tsallis Mutual Information for Document Classification", Marius Vila, Anton • Bardera, Miquel Feixas, Mateu Sbert. Entropy, vol. 13, no. 9, pages 1694-1707, 2011. "Tsallis entropy-based information measure for shot boundary detection and • keyframe selection", Marius Vila, Anton Bardera, Qing Xu, Miquel Feixas, Mateu Sbert. Signal, Image and Video Processing, vol. 7, no. 3, pages 507-520, 2013. "Analysis of image informativeness measures", Marius Vila, Anton Bardera, • Miquel Feixas, Philippe Bekaert, Mateu Sbert. IEEE International Conference on Image Processing pages 1086-1090, October 2014. "Image-based Similarity Measures for Invoice Classification", Marius Vila, Anton • Bardera, Miquel Feixas, Mateu Sbert. Submitted. List of figures 2.1 Plot of binary entropy..............................7 2.2 Venn diagram of Shannon’s information measures............ 10 3.1 Computation of the normalized compression distance using an image compressor....................................
    [Show full text]
  • Combinatorial Reasoning in Information Theory
    Combinatorial Reasoning in Information Theory Noga Alon, Tel Aviv U. ISIT 2009 1 Combinatorial Reasoning is crucial in Information Theory Google lists 245,000 sites with the words “Information Theory ” and “ Combinatorics ” 2 The Shannon Capacity of Graphs The (and) product G x H of two graphs G=(V,E) and H=(V’,E’) is the graph on V x V’, where (v,v’) = (u,u’) are adjacent iff (u=v or uv є E) and (u’=v’ or u’v’ є E’) The n-th power Gn of G is the product of n copies of G. 3 Shannon Capacity Let α ( G n ) denote the independence number of G n. The Shannon capacity of G is n 1/n n 1/n c(G) = lim [α(G )] ( = supn[α(G )] ) n →∞ 4 Motivation output input A channel has an input set X, an output set Y, and a fan-out set S Y for each x X. x ⊂ ∈ The graph of the channel is G=(X,E), where xx’ є E iff x,x’ can be confused , that is, iff S S = x ∩ x′ ∅ 5 α(G) = the maximum number of distinct messages the channel can communicate in a single use (with no errors) α(Gn)= the maximum number of distinct messages the channel can communicate in n uses. c(G) = the maximum number of messages per use the channel can communicate (with long messages) 6 There are several upper bounds for the Shannon Capacity: Combinatorial [ Shannon(56)] Geometric [ Lovász(79), Schrijver (80)] Algebraic [Haemers(79), A (98)] 7 Theorem (A-98): For every k there are graphs G and H so that c(G), c(H) ≤ k and yet c(G + H) kΩ(log k/ log log k) ≥ where G+H is the disjoint union of G and H.
    [Show full text]
  • 2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (Chair), Bobby Kleinberg September 14Th, 2020
    2020 SIGACT REPORT SIGACT EC – Eric Allender, Shuchi Chawla, Nicole Immorlica, Samir Khuller (chair), Bobby Kleinberg September 14th, 2020 SIGACT Mission Statement: The primary mission of ACM SIGACT (Association for Computing Machinery Special Interest Group on Algorithms and Computation Theory) is to foster and promote the discovery and dissemination of high quality research in the domain of theoretical computer science. The field of theoretical computer science is the rigorous study of all computational phenomena - natural, artificial or man-made. This includes the diverse areas of algorithms, data structures, complexity theory, distributed computation, parallel computation, VLSI, machine learning, computational biology, computational geometry, information theory, cryptography, quantum computation, computational number theory and algebra, program semantics and verification, automata theory, and the study of randomness. Work in this field is often distinguished by its emphasis on mathematical technique and rigor. 1. Awards ▪ 2020 Gödel Prize: This was awarded to Robin A. Moser and Gábor Tardos for their paper “A constructive proof of the general Lovász Local Lemma”, Journal of the ACM, Vol 57 (2), 2010. The Lovász Local Lemma (LLL) is a fundamental tool of the probabilistic method. It enables one to show the existence of certain objects even though they occur with exponentially small probability. The original proof was not algorithmic, and subsequent algorithmic versions had significant losses in parameters. This paper provides a simple, powerful algorithmic paradigm that converts almost all known applications of the LLL into randomized algorithms matching the bounds of the existence proof. The paper further gives a derandomized algorithm, a parallel algorithm, and an extension to the “lopsided” LLL.
    [Show full text]
  • Information Theory for Intelligent People
    Information Theory for Intelligent People Simon DeDeo∗ September 9, 2018 Contents 1 Twenty Questions 1 2 Sidebar: Information on Ice 4 3 Encoding and Memory 4 4 Coarse-graining 5 5 Alternatives to Entropy? 7 6 Coding Failure, Cognitive Surprise, and Kullback-Leibler Divergence 7 7 Einstein and Cromwell's Rule 10 8 Mutual Information 10 9 Jensen-Shannon Distance 11 10 A Note on Measuring Information 12 11 Minds and Information 13 1 Twenty Questions The story of information theory begins with the children's game usually known as \twenty ques- tions". The first player (the \adult") in this two-player game thinks of something, and by a series of yes-no questions, the other player (the \child") attempts to guess what it is. \Is it bigger than a breadbox?" No. \Does it have fur?" Yes. \Is it a mammal?" No. And so forth. If you play this game for a while, you learn that some questions work better than others. Children usually learn that it's a good idea to eliminate general categories first before becoming ∗Article modified from text for the Santa Fe Institute Complex Systems Summer School 2012, and updated for a meeting of the Indiana University Center for 18th Century Studies in 2015, a Colloquium at Tufts University Department of Cognitive Science on Play and String Theory in 2016, and a meeting of the SFI ACtioN Network in 2017. Please send corrections, comments and feedback to [email protected]; http://santafe.edu/~simon. 1 more specific, for example. If you ask on the first round \is it a carburetor?" you are likely wasting time|unless you're playing the game on Car Talk.
    [Show full text]
  • An Information-Theoretic Approach to Normal Forms for Relational and XML Data
    An Information-Theoretic Approach to Normal Forms for Relational and XML Data Marcelo Arenas Leonid Libkin University of Toronto University of Toronto [email protected] [email protected] ABSTRACT Several papers [13, 28, 18] attempted a more formal eval- uation of normal forms, by relating it to the elimination Normalization as a way of producing good database de- of update anomalies. Another criterion is the existence signs is a well-understood topic. However, the same prob- of algorithms that produce good designs: for example, we lem of distinguishing well-designed databases from poorly know that every database scheme can be losslessly decom- designed ones arises in other data models, in particular, posed into one in BCNF, but some constraints may be lost XML. While in the relational world the criteria for be- along the way. ing well-designed are usually very intuitive and clear to state, they become more obscure when one moves to more The previous work was specific for the relational model. complex data models. As new data formats such as XML are becoming critically important, classical database theory problems have to be Our goal is to provide a set of tools for testing when a revisited in the new context [26, 24]. However, there is condition on a database design, specified by a normal as yet no consensus on how to address the problem of form, corresponds to a good design. We use techniques well-designed data in the XML setting [10, 3]. of information theory, and define a measure of informa- tion content of elements in a database with respect to a set It is problematic to evaluate XML normal forms based of constraints.
    [Show full text]
  • 1 Applications of Information Theory to Biology Information Theory Offers A
    Pacific Symposium on Biocomputing 5:597-598 (2000) Applications of Information Theory to Biology T. Gregory Dewey Keck Graduate Institute of Applied Life Sciences 535 Watson Drive, Claremont CA 91711, USA Hanspeter Herzel Innovationskolleg Theoretische Biologie, HU Berlin, Invalidenstrasse 43, D-10115, Berlin, Germany Information theory offers a number of fertile applications to biology. These applications range from statistical inference to foundational issues. There are a number of statistical analysis tools that can be considered information theoretical techniques. Such techniques have been the topic of PSB session tracks in 1998 and 1999. The two main tools are algorithmic complexity (including both MML and MDL) and maximum entropy. Applications of MML include sequence searching and alignment, phylogenetic trees, structural classes in proteins, protein potentials, calcium and neural spike dynamics and DNA structure. Maximum entropy methods have appeared in nucleotide sequence analysis (Cosmi et al., 1990), protein dynamics (Steinbach, 1996), peptide structure (Zal et al., 1996) and drug absorption (Charter, 1991). Foundational aspects of information theory are particularly relevant in several areas of molecular biology. Well-studied applications are the recognition of DNA binding sites (Schneider 1986), multiple alignment (Altschul 1991) or gene-finding using a linguistic approach (Dong & Searls 1994). Calcium oscillations and genetic networks have also been studied with information-theoretic tools. In all these cases, the information content of the system or phenomena is of intrinsic interest in its own right. In the present symposium, we see three applications of information theory that involve some aspect of sequence analysis. In all three cases, fundamental information-theoretical properties of the problem of interest are used to develop analyses of practical importance.
    [Show full text]
  • Efficient Space-Time Sampling with Pixel-Wise Coded Exposure For
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 1 Efficient Space-Time Sampling with Pixel-wise Coded Exposure for High Speed Imaging Dengyu Liu, Jinwei Gu, Yasunobu Hitomi, Mohit Gupta, Tomoo Mitsunaga, Shree K. Nayar Abstract—Cameras face a fundamental tradeoff between spatial and temporal resolution. Digital still cameras can capture images with high spatial resolution, but most high-speed video cameras have relatively low spatial resolution. It is hard to overcome this tradeoff without incurring a significant increase in hardware costs. In this paper, we propose techniques for sampling, representing and reconstructing the space-time volume in order to overcome this tradeoff. Our approach has two important distinctions compared to previous works: (1) we achieve sparse representation of videos by learning an over-complete dictionary on video patches, and (2) we adhere to practical hardware constraints on sampling schemes imposed by architectures of current image sensors, which means that our sampling function can be implemented on CMOS image sensors with modified control units in the future. We evaluate components of our approach - sampling function and sparse representation by comparing them to several existing approaches. We also implement a prototype imaging system with pixel-wise coded exposure control using a Liquid Crystal on Silicon (LCoS) device. System characteristics such as field of view, Modulation Transfer Function (MTF) are evaluated for our imaging system. Both simulations and experiments on a wide range of
    [Show full text]
  • Combinatorial Foundations of Information Theory and the Calculus of Probabilities
    Home Search Collections Journals About Contact us My IOPscience Combinatorial foundations of information theory and the calculus of probabilities This article has been downloaded from IOPscience. Please scroll down to see the full text article. 1983 Russ. Math. Surv. 38 29 (http://iopscience.iop.org/0036-0279/38/4/R04) View the table of contents for this issue, or go to the journal homepage for more Download details: IP Address: 129.236.21.103 The article was downloaded on 13/01/2011 at 16:58 Please note that terms and conditions apply. Uspekhi Mat. Nauk 38:4 (1983), 27-36 Russian Math. Surveys 38:4 (1983), 29-40 Combinatorial foundations of information theory and the calculus of probabilities*1 ] A.N. Kolmogorov CONTENTS §1. The growing role of finite mathematics 29 §2. Information theory 31 §3. The definition of "complexity" 32 §4. Regularity and randomness 34 §5. The stability of frequencies 34 §6. Infinite random sequences 35 §7. Relative complexity and quantity of information 37 §8. Barzdin's theorem 38 §9. Conclusion 39 References 39 §1. The growing role of finite mathematics I wish to begin with some arguments that go beyond the framework of the basic subject of my talk. The formalization of mathematics according to Hilbert is nothing but the theory of operations on schemes of a special form consisting of finitely many signs arranged in some order or another and linked by some connections or other. For instance, according to Bourbaki's conception, the entire set theory investigates exclusively expressions composed of the signs D, τ, V, Ί, =, 6, => and of "letters" connected by "links" Π as, for instance, in the expression ΙΓ 1 ι—71 which is the "empty set".
    [Show full text]
  • Information Theory and Communication - Tibor Nemetz
    PROBABILITY AND STATISTICS – Vol. II - Information Theory and Communication - Tibor Nemetz INFORMATION THEORY AND COMMUNICATION Tibor Nemetz Rényi Mathematical Institute, Hungarian Academy of Sciences, Budapest, Hungary Keywords: Shannon theory, alphabet, capacity, (transmission) channel, channel coding, cryptology, data processing, data compression, digital signature, discrete memoryless source, entropy, error-correcting codes, error-detecting codes, fidelity criterion, hashing, Internet, measures of information, memoryless channel, modulation, multi-user communication, multi-port systems, networks, noise, public key cryptography, quantization, rate-distortion theory, redundancy, reliable communication, (information) source, source coding, (information) transmission, white Gaussian noise. Contents 1. Introduction 1.1. The Origins 1.2. Shannon Theory 1.3. Future in Present 2. Information source 3. Source coding 3.1. Uniquely Decodable Codes 3.2. Entropy 3.3. Source Coding with Small Decoding Error Probability 3.4. Universal Codes 3.5. Facsimile Coding 3.6. Electronic Correspondence 4. Measures of information 5. Transmission channel 5.1. Classification of Channels 5.2. The Noisy Channel Coding Problem 5.3. Error Detecting and Correcting Codes 6. The practice of classical telecommunication 6.1. Analog-to-Digital Conversion 6.2. Quantization 6.3 ModulationUNESCO – EOLSS 6.4. Multiplexing 6.5. Multiple Access 7. Mobile communicationSAMPLE CHAPTERS 8. Cryptology 8.1. Classical Cryptography 8.1.1 Simple Substitution 8.1.2. Transposition 8.1.3. Polyalphabetic Methods 8.1.4. One Time Pad 8.1.5. DES: Data Encryption Standard. AES: Advanced Encryption Standard 8.1.6. Vocoders 8.2. Public Key Cryptography ©Encyclopedia of Life Support Systems (EOLSS) PROBABILITY AND STATISTICS – Vol. II - Information Theory and Communication - Tibor Nemetz 8.2.1.
    [Show full text]
  • Wisdom - the Blurry Top of Human Cognition in the DIKW-Model? Anett Hoppe1 Rudolf Seising2 Andreas Nürnberger2 Constanze Wenzel3
    EUSFLAT-LFA 2011 July 2011 Aix-les-Bains, France Wisdom - the blurry top of human cognition in the DIKW-model? Anett Hoppe1 Rudolf Seising2 Andreas Nürnberger2 Constanze Wenzel3 1European Centre for Soft Computing, Email: fi[email protected] 2Otto-von-Guericke-University Magdeburg, Email: [email protected] 3Otto-von-Guericke-University Magdeburg, Email: [email protected] Abstract draws from a real integrational view throughout scientific communities. Therefore, in Section 3, we Wisdom is an ancient concept, that experiences a review definitions used in different domains in order renaissance since the last century throughout sev- to outline their common points and discrepancies. eral scientific communities. In each of them it is In Section 4, we finally try to apply the found interpreted in rather different ways - from a key definitions to the DIKW-model. We argue that ability to succesful aging to a human peak perfo- none of the definitions we found in several different mance transcending mere knowledge. As a result, domains suggest a positioning of wisdom in a chain miscellaneous definitions and models exist. There with data, information and knowledge except the is for instance the DIKW-hierarchy that tempts to one, Ackhoff proposed himself to justify his model. integrate the concept of wisdom into information Section 5 offers a closing reflection on how our science, still without providing a proper definition. conclusions might affect the view of computer The work at hand tries to sum up current ap- science, artificial and computational intelligence/ proaches (out of computer science as well as others) soft computing on wisdom and proposes directions with a focus on their usefulness for the positioning of further research.
    [Show full text]
  • The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on Iot Nodes in Smart Cities
    sensors Article The Deep Learning Solutions on Lossless Compression Methods for Alleviating Data Load on IoT Nodes in Smart Cities Ammar Nasif *, Zulaiha Ali Othman and Nor Samsiah Sani Center for Artificial Intelligence Technology (CAIT), Faculty of Information Science & Technology, University Kebangsaan Malaysia, Bangi 43600, Malaysia; [email protected] (Z.A.O.); [email protected] (N.S.S.) * Correspondence: [email protected] Abstract: Networking is crucial for smart city projects nowadays, as it offers an environment where people and things are connected. This paper presents a chronology of factors on the development of smart cities, including IoT technologies as network infrastructure. Increasing IoT nodes leads to increasing data flow, which is a potential source of failure for IoT networks. The biggest challenge of IoT networks is that the IoT may have insufficient memory to handle all transaction data within the IoT network. We aim in this paper to propose a potential compression method for reducing IoT network data traffic. Therefore, we investigate various lossless compression algorithms, such as entropy or dictionary-based algorithms, and general compression methods to determine which algorithm or method adheres to the IoT specifications. Furthermore, this study conducts compression experiments using entropy (Huffman, Adaptive Huffman) and Dictionary (LZ77, LZ78) as well as five different types of datasets of the IoT data traffic. Though the above algorithms can alleviate the IoT data traffic, adaptive Huffman gave the best compression algorithm. Therefore, in this paper, Citation: Nasif, A.; Othman, Z.A.; we aim to propose a conceptual compression method for IoT data traffic by improving an adaptive Sani, N.S.
    [Show full text]
  • Answers to Exercises
    Answers to Exercises A bird does not sing because he has an answer, he sings because he has a song. —Chinese Proverb Intro.1: abstemious, abstentious, adventitious, annelidous, arsenious, arterious, face- tious, sacrilegious. Intro.2: When a software house has a popular product they tend to come up with new versions. A user can update an old version to a new one, and the update usually comes as a compressed file on a floppy disk. Over time the updates get bigger and, at a certain point, an update may not fit on a single floppy. This is why good compression is important in the case of software updates. The time it takes to compress and decompress the update is unimportant since these operations are typically done just once. Recently, software makers have taken to providing updates over the Internet, but even in such cases it is important to have small files because of the download times involved. 1.1: (1) ask a question, (2) absolutely necessary, (3) advance warning, (4) boiling hot, (5) climb up, (6) close scrutiny, (7) exactly the same, (8) free gift, (9) hot water heater, (10) my personal opinion, (11) newborn baby, (12) postponed until later, (13) unexpected surprise, (14) unsolved mysteries. 1.2: A reasonable way to use them is to code the five most-common strings in the text. Because irreversible text compression is a special-purpose method, the user may know what strings are common in any particular text to be compressed. The user may specify five such strings to the encoder, and they should also be written at the start of the output stream, for the decoder’s use.
    [Show full text]