Close Menu
    Trending
    • Dispatch: Partying at one of Africa’s largest AI gatherings
    • Topp 10 AI-filmer genom tiderna
    • OpenAIs nya webbläsare ChatGPT Atlas
    • Creating AI that matters | MIT News
    • Scaling Recommender Transformers to a Billion Parameters
    • Hidden Gems in NumPy: 7 Functions Every Data Scientist Should Know
    • Is RAG Dead? The Rise of Context Engineering and Semantic Layers for Agentic AI
    • ChatGPT Gets More Personal. Is Society Ready for It?
    ProfitlyAI
    • Home
    • Latest News
    • AI Technology
    • Latest AI Innovations
    • AI Tools & Technologies
    • Artificial Intelligence
    ProfitlyAI
    Home » From Rules to Relationships: How Machines Are Learning to Understand Each Other
    Artificial Intelligence

    From Rules to Relationships: How Machines Are Learning to Understand Each Other

    ProfitlyAIBy ProfitlyAIJuly 23, 2025No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Communication methods have developed from easy bit transmission to clever info sharing. Conventional methods deal with transferring uncooked information from level A to level B as reliably as potential. Now, with the explosion of machine-to-machine communication in IoT units, autonomous methods, and sensible infrastructure, we’re hitting a basic bottleneck.

    Trendy networks are drowning in pointless information. However machines don’t want each bit of data that conventional methods transmit. 

    Let’s check out the next safety monitoring interplay:

    Safety Digital camera: Spots somebody strolling round in a restricted space throughout off-hours and captures a high-resolution video body of measurement 5 MB

    Conventional System: Sends all the 5MB body with each single bit

    Central Monitoring: Analyzes body and determines: “Unauthorized particular person detected in Zone A”

    On this interplay, the monitoring system primarily cares concerning the safety alert reasonably than the particular person’s clothes particulars, facial options, or background. However conventional communication offers equal significance to each pixel, transmitting tens of millions of irrelevant bits together with the few that matter for decision-making.

    Semantic communication emerged as a paradigm shift that transmits that means reasonably than bits. As a substitute of sending all the 5MB video body, a semantic communication system would extract and transmit solely: “zone_A, unauthorized_person, threat_level_high” whereas requiring only a tiny fraction of information, whereas preserving all decision-relevant info.

    The receiving system will get precisely what it must make the fitting determination by deploying safety personnel to Zone A for an unauthorized intrusion.

    Early methods relied on Semantic Information Bases (SKBs) to cut back bandwidth utilization with out shedding the precise that means of the message.

    However SKB-based methods have limitations. They work effectively in managed environments however fail when encountering unknown situations. This limitation sparked the event of data graph-based semantic communication that guarantees to unravel unknown conditions by means of relational reasoning.

    Why does SKBs-based semantic communication fail?

    SKB methods have a important weak point. To know it, we first must see how they course of info.

    In our safety monitoring instance, each the digicam and monitoring station preserve a shared information base Ok = {okm ∈ Rd}{m∈M} the place every okm represents semantic attributes for class m. When a safety digicam captures a video body x, the semantic encoder S_α(·) extracts options s ∈ Rd.

    As a substitute of transmitting “s” immediately, the system finds the closest match utilizing cosine similarity:

    Picture Supply: SKB Paper[1]

    the place D(s, okm) represents the cosine similarity between s and okm.

    In our instance, the digicam sees somebody in a restricted space and extracts options like “human form, no uniform, nighttime motion.” It compares these towards its information base and finds the perfect match is “unauthorized_person” at index v within the information base. As a substitute of sending all of the function particulars, it simply transmits “v.”

    This easy method considerably reduces bandwidth utilization whereas preserving all the data the monitoring system must make choices.

    The place does this break down?

    The system works nice till one thing sudden exhibits up. What occurs when the digicam spots one thing that’s not in its information base?

    Let’s take a look at the next instance:

    Safety Digital camera: Spots a upkeep employee in work garments carrying instruments throughout off-hours.

    SKB System: Solely is aware of “unauthorized_person,” “authorized_person,” “car,” “animal”

    System Resolution: Confidently classifies employee as “unauthorized_person” with excessive risk degree

    Consequence: False alarm — safety workforce will get dispatched to cease professional upkeep work

    The maths behind this might sound easy, but it surely’s truly fairly problematic. The system all the time picks the “finest” match, even when all of the choices are horrible. It’s like being compelled to decide on a solution on a multiple-choice check when not one of the selections make sense. You continue to have to choose one thing, and the system has no option to say it doesn’t know.

    These issues worsen in actual deployments. For instance, in case your coaching information didn’t embrace shadows, the system begins calling them “intruders.” Prepare with out winter clothes examples, and it thinks heavy coats are “suspicious gear.” The system by no means admits uncertainty. It all the time sounds assured, even when it’s fully improper.

    How do Information Graphs Repair this?

    Information graph primarily based semantic communication solves SKB limitations by encoding relationships between nodes reasonably than simply remoted classes. As a substitute of asking “which class does this match?” it asks “how does this relate to what I already know?”

    Let’s stroll by means of our upkeep employee instance to see the distinction:

    Step 1: Detection and Characteristic Extraction
    The digicam detects the identical options as earlier than, resembling “human form, work garments, carrying instruments, off-hours timing”

    Step 2: Relationship Mapping
    As a substitute of forcing these options right into a single class, the information graph maps them to a number of linked nodes.

    Human form → triggers “human” node
    Work garments + instruments → triggers “work_tools” and “maintenance_equipment” nodes
    Off-hours timing → triggers “unusual_access_time” node

    Step 3: Relationship Traversal 
    To trace connections between nodes, the system makes use of following system:

    Picture supply: Information Graph Paper [2]

    the place “zv” denotes the up to date illustration of node v, and the sum aggregates info from all neighboring nodes u. Every node picks up its that means from the neighbors it’s linked to.

    work_tools → signifies → maintenance_activity
    maintenance_activity → performed_by → maintenance_worker
    maintenance_worker → is_a → authorized_personnel (conditional)
    off_hours_access + authorized_personnel → requires → verification

    Step 4: Contextual Reasoning 
    The information graph combines these relationship paths: “This seems to be a upkeep exercise by probably licensed personnel, however the timing requires verification earlier than figuring out risk degree.”

    Closing classification is made utilizing the next system:

    Picture supply: Information Graph Paper [2]

    the place ŷ is the expected class, φ(y) is the information graph embedding for class y, and ŝ is the acquired semantic info. This results in “confirm earlier than alarm” as an alternative of SKB’s compelled “unauthorized particular person” classification.

    The Key Distinction

    The distinction from the upkeep employee instance is that the SKB system sees “human in restricted space throughout off-hours” and is compelled to choose from its current classes. In our instance, the system selected “unauthorized_person” as a result of it’s the closest match.

    A information graph-based system takes a totally completely different method. It sees the identical particular person however begins connecting the dots. An individual carrying work instruments suggests a upkeep exercise, which generally serves a professional objective. However taking place throughout off-hours means it wants verification first. The system generates a sensible response — “confirm earlier than alarm.” Though the system was not educated for this situation, it was in a position to purpose utilizing relation graphs.

    Analysis

    Information graph methods confirmed vital enhancements over SKB-based methods, displaying 70–80% higher accuracy in each acquainted and unfamiliar environments. The system labored effectively even when the sign high quality wasn’t nice, which proved it may truly perform in real-world conditions the place communication is noisy.

    That stated, information graph methods have their very own limitations. Graph constructing requires area experience and vital computing energy. Our testing was restricted to a selected dataset with predetermined classes, so we’re unsure how it might it carry out in a large-scale real-world deployment. These methods want extra testing earlier than they’ll fully change the SKB-based methods.

    Conclusion

    SKB methods had been nice when every part was predictable, however failed in an unfamiliar atmosphere. Information graphs clear up this downside by actually understanding how nodes join to one another. This enables the system to purpose by means of unfamiliar atmosphere by these connections, reasonably than needing express coaching for each potential scenario. They’re tougher and costlier to construct, however they’re appropriate for real-world situations.

    References

    [1] https://arxiv.org/pdf/2405.05738
    [2] https://arxiv.org/pdf/2507.02291 



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhat Optimization Terminologies for Linear Programming Really Mean
    Next Article A Well-Designed Experiment Can Teach You More Than a Time Machine!
    ProfitlyAI
    • Website

    Related Posts

    Artificial Intelligence

    Creating AI that matters | MIT News

    October 21, 2025
    Artificial Intelligence

    Scaling Recommender Transformers to a Billion Parameters

    October 21, 2025
    Artificial Intelligence

    Hidden Gems in NumPy: 7 Functions Every Data Scientist Should Know

    October 21, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    What If I Had AI in 2020: Rent The Runway Dynamic Pricing Model

    August 22, 2025

    The End-to-End Data Scientist’s Prompt Playbook

    September 8, 2025

    How to Build Guardrails for Effective Agents

    October 19, 2025

    Rethinking the Environmental Costs of Training AI — Why We Should Look Beyond Hardware

    May 13, 2025

    Why your AI investments aren’t paying off

    April 5, 2025
    Categories
    • AI Technology
    • AI Tools & Technologies
    • Artificial Intelligence
    • Latest AI Innovations
    • Latest News
    Most Popular

    Synthetic Data in AI: Benefits, Use Cases, Challenges, and Applications

    April 3, 2025

    Strength in Numbers: Ensembling Models with Bagging and Boosting

    May 15, 2025

    Google släpper Computer Use – AI:n som kan klicka och surfa åt dig

    October 9, 2025
    Our Picks

    Dispatch: Partying at one of Africa’s largest AI gatherings

    October 22, 2025

    Topp 10 AI-filmer genom tiderna

    October 22, 2025

    OpenAIs nya webbläsare ChatGPT Atlas

    October 22, 2025
    Categories
    • AI Technology
    • AI Tools & Technologies
    • Artificial Intelligence
    • Latest AI Innovations
    • Latest News
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2025 ProfitlyAI All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.