-
Approaches to Artificial General Intelligence: An Analysis
Authors:
Soumil Rathi
Abstract:
This paper is an analysis of the different methods proposed to achieve AGI, including Human Brain Emulation, AIXI and Integrated Cognitive Architecture. First, the definition of AGI as used in this paper has been defined, and its requirements have been stated. For each proposed method mentioned, the method in question was summarized and its key processes were detailed, showcasing how it functioned…
▽ More
This paper is an analysis of the different methods proposed to achieve AGI, including Human Brain Emulation, AIXI and Integrated Cognitive Architecture. First, the definition of AGI as used in this paper has been defined, and its requirements have been stated. For each proposed method mentioned, the method in question was summarized and its key processes were detailed, showcasing how it functioned. Then, each method listed was analyzed, taking various factors into consideration, such as technological requirements, computational ability, and adequacy to the requirements. It was concluded that while there are various methods to achieve AGI that could work, such as Human Brain Emulation and Integrated Cognitive Architectures, the most promising method to achieve AGI is Integrated Cognitive Architectures. This is because Human Brain Emulation was found to require scanning technologies that will most likely not be available until the 2030s, making it unlikely to be created before then. Moreover, Integrated Cognitive Architectures has reduced computational requirements and a suitable functionality for General Intelligence, making it the most likely way to achieve AGI.
△ Less
Submitted 29 January, 2022;
originally announced February 2022.
-
Coded Relaying in LoRa Sensor Networks
Authors:
Siddhartha S. Borkotoky,
Pavan Datta Abbineni,
Vatsalya Chaubey,
Sonu Rathi
Abstract:
To enhance the reliability of LoRa sensor networks, we propose two opportunistic forwarding protocols in which relays overhear sensor-to-gateway messages and periodically forward them to a gateway. To reduce the number of transmissions, the relays forward XOR sums of the overheard messages. One protocol employs a single relay node, while two relays cooperate in the other. With a single relay, our…
▽ More
To enhance the reliability of LoRa sensor networks, we propose two opportunistic forwarding protocols in which relays overhear sensor-to-gateway messages and periodically forward them to a gateway. To reduce the number of transmissions, the relays forward XOR sums of the overheard messages. One protocol employs a single relay node, while two relays cooperate in the other. With a single relay, our proposed protocol requires fewer relay transmissions to achieve similar loss rates as conventional uncoded forwarding in which every received message is immediately forwarded. We demonstrate up to 55% reduction in relay transmission time relative to uncoded forwarding. The cooperative protocol provides better loss and delay performance than the single-relay protocol, and we demonstrate up to 16% reduction in the message-loss rate along with 33% reduction in relay transmission times compared to conventional forwarding.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
Temporal Knowledge Base Completion: New Algorithms and Evaluation Protocols
Authors:
Prachi Jain,
Sushant Rathi,
Mausam,
Soumen Chakrabarti
Abstract:
Temporal knowledge bases associate relational (s,r,o) triples with a set of times (or a single time instant) when the relation is valid. While time-agnostic KB completion (KBC) has witnessed significant research, temporal KB completion (TKBC) is in its early days. In this paper, we consider predicting missing entities (link prediction) and missing time intervals (time prediction) as joint TKBC tas…
▽ More
Temporal knowledge bases associate relational (s,r,o) triples with a set of times (or a single time instant) when the relation is valid. While time-agnostic KB completion (KBC) has witnessed significant research, temporal KB completion (TKBC) is in its early days. In this paper, we consider predicting missing entities (link prediction) and missing time intervals (time prediction) as joint TKBC tasks where entities, relations, and time are all embedded in a uniform, compatible space. We present TIMEPLEX, a novel time-aware KBC method, that also automatically exploits the recurrent nature of some relations and temporal interactions between pairs of relations. TIMEPLEX achieves state-of-the-art performance on both prediction tasks.
We also find that existing TKBC models heavily overestimate link prediction performance due to imperfect evaluation mechanisms. In response, we propose improved TKBC evaluation protocols for both link and time prediction tasks, dealing with subtle issues that arise from the partial overlap of time intervals in gold instances and system predictions.
△ Less
Submitted 11 October, 2020; v1 submitted 2 May, 2020;
originally announced May 2020.
-
Knowledge Base Completion: Baseline strikes back (Again)
Authors:
Prachi Jain,
Sushant Rathi,
Mausam,
Soumen Chakrabarti
Abstract:
Knowledge Base Completion (KBC) has been a very active area lately. Several recent KBCpapers propose architectural changes, new training methods, or even new formulations. KBC systems are usually evaluated on standard benchmark datasets: FB15k, FB15k-237, WN18, WN18RR, and Yago3-10. Most existing methods train with a small number of negative samples for each positive instance in these datasets to…
▽ More
Knowledge Base Completion (KBC) has been a very active area lately. Several recent KBCpapers propose architectural changes, new training methods, or even new formulations. KBC systems are usually evaluated on standard benchmark datasets: FB15k, FB15k-237, WN18, WN18RR, and Yago3-10. Most existing methods train with a small number of negative samples for each positive instance in these datasets to save computational costs. This paper discusses how recent developments allow us to use all available negative samples for training. We show that Complex, when trained using all available negative samples, gives near state-of-the-art performance on all the datasets. We call this approach COMPLEX-V2. We also highlight how various multiplicative KBC methods, recently proposed in the literature, benefit from this train-ing regime and become indistinguishable in terms of performance on most datasets. Our work calls for a reassessment of their individual value, in light of these findings.
△ Less
Submitted 25 July, 2022; v1 submitted 2 May, 2020;
originally announced May 2020.
-
Generating Counterfactual and Contrastive Explanations using SHAP
Authors:
Shubham Rathi
Abstract:
With the advent of GDPR, the domain of explainable AI and model interpretability has gained added impetus. Methods to extract and communicate visibility into decision-making models have become legal requirement. Two specific types of explanations, contrastive and counterfactual have been identified as suitable for human understanding. In this paper, we propose a model agnostic method and its syste…
▽ More
With the advent of GDPR, the domain of explainable AI and model interpretability has gained added impetus. Methods to extract and communicate visibility into decision-making models have become legal requirement. Two specific types of explanations, contrastive and counterfactual have been identified as suitable for human understanding. In this paper, we propose a model agnostic method and its systemic implementation to generate these explanations using shapely additive explanations (SHAP). We discuss a generative pipeline to create contrastive explanations and use it to further to generate counterfactual datapoints. This pipeline is tested and discussed on the IRIS, Wine Quality & Mobile Features dataset. Analysis of the results obtained follows.
△ Less
Submitted 21 June, 2019;
originally announced June 2019.
-
Services in Android can Share Your Personal Information in Background
Authors:
Manoj Kumar,
Sheshendra Rathi
Abstract:
Mobile phones have traveled a very long journey in a very short span of time since its inception in 1973.This wonderful toy of 20th century has started playing significant role in daily life.More than 5 billion mobile users are there around the world and almost 90 percent of the entire earth is under the mobile coverage now.These days smart phones are equipped with numerous features,faster process…
▽ More
Mobile phones have traveled a very long journey in a very short span of time since its inception in 1973.This wonderful toy of 20th century has started playing significant role in daily life.More than 5 billion mobile users are there around the world and almost 90 percent of the entire earth is under the mobile coverage now.These days smart phones are equipped with numerous features,faster processors and high storage capacity.Android is a latest trend in this series whose popularity is growing by leaps and bounds.Android has a number of components which helps Application developers to embed distinguish features in applications.This paper explains how the Service component of Android can share your personal information to others without users interaction.
△ Less
Submitted 21 August, 2013;
originally announced August 2013.
-
A Secure and Fault tolerant framework for Mobile IPv6 based networks
Authors:
S. Rathi,
K. Thanuskodi
Abstract:
Mobile IPv6 will be an integral part of the next generation Internet protocol. The importance of mobility in the Internet gets keep on increasing. Current specification of Mobile IPv6 does not provide proper support for reliability in the mobile network and there are other problems associated with it. In this paper, we propose Virtual Private Network (VPN) based Home Agent Reliability Protocol (…
▽ More
Mobile IPv6 will be an integral part of the next generation Internet protocol. The importance of mobility in the Internet gets keep on increasing. Current specification of Mobile IPv6 does not provide proper support for reliability in the mobile network and there are other problems associated with it. In this paper, we propose Virtual Private Network (VPN) based Home Agent Reliability Protocol (VHAHA) as a complete system architecture and extension to Mobile IPv6 that supports reliability and offers solutions to the security problems that are found in Mobile IP registration part. The key features of this protocol over other protocols are: better survivability, transparent failure detection and recovery, reduced complexity of the system and workload, secure data transfer and improved overall performance.
△ Less
Submitted 26 September, 2009;
originally announced September 2009.