-
Reasoning in Neurosymbolic AI
Authors:
Son Tran,
Edjard Mota,
Artur d'Avila Garcez
Abstract:
Knowledge representation and reasoning in neural networks have been a long-standing endeavor which has attracted much attention recently. The principled integration of reasoning and learning in neural networks is a main objective of the area of neurosymbolic Artificial Intelligence (AI). In this chapter, a simple energy-based neurosymbolic AI system is described that can represent and reason forma…
▽ More
Knowledge representation and reasoning in neural networks have been a long-standing endeavor which has attracted much attention recently. The principled integration of reasoning and learning in neural networks is a main objective of the area of neurosymbolic Artificial Intelligence (AI). In this chapter, a simple energy-based neurosymbolic AI system is described that can represent and reason formally about any propositional logic formula. This creates a powerful combination of learning from data and knowledge and logical reasoning. We start by positioning neurosymbolic AI in the context of the current AI landscape that is unsurprisingly dominated by Large Language Models (LLMs). We identify important challenges of data efficiency, fairness and safety of LLMs that might be addressed by neurosymbolic reasoning systems with formal reasoning capabilities. We then discuss the representation of logic by the specific energy-based system, including illustrative examples and empirical evaluation of the correspondence between logical reasoning and energy minimization using Restricted Boltzmann Machines (RBM). Learning from data and knowledge is also evaluated empirically and compared with a symbolic, neural and a neurosymbolic system. Results reported in this chapter in an accessible way are expected to reignite the research on the use of neural networks as massively-parallel models for logical reasoning and promote the principled integration of reasoning and learning in deep networks. We conclude the chapter with a discussion of the importance of positioning neurosymbolic AI within a broader framework of formal reasoning and accountability in AI, discussing the challenges for neurosynbolic AI to tackle the various known problems of reliability of deep learning.
△ Less
Submitted 22 May, 2025;
originally announced May 2025.
-
Localizacao em ambientes internos utilizando redes Wi-Fi
Authors:
David Alan de Oliveira Ferreira,
Celso Barbosa Carvalho,
Edjair de Souza Mota
Abstract:
This paper presents a localization method for indoor environments capable of improving the location accuracy that is hampered by instability in RSSI of the IEEE 802.11 networks. The method employs the k-Nearest Neighbors (kNN) algorithm and quartiles analysis in the data representation. The proposal had null error with only four APs and 10 readings per sample of each AP with just 0.69 second to lo…
▽ More
This paper presents a localization method for indoor environments capable of improving the location accuracy that is hampered by instability in RSSI of the IEEE 802.11 networks. The method employs the k-Nearest Neighbors (kNN) algorithm and quartiles analysis in the data representation. The proposal had null error with only four APs and 10 readings per sample of each AP with just 0.69 second to locate. These values are important contributions, confirming that the method is promising to locate objects in indoor environments.
△ Less
Submitted 29 December, 2020;
originally announced December 2020.
-
Incremental Bounded Model Checking of Artificial Neural Networks in CUDA
Authors:
Luiz H. Sena,
Iury V. Bessa,
Mikhail R. Gadelha,
Lucas C. Cordeiro,
Edjard Mota
Abstract:
Artificial Neural networks (ANNs) are powerful computing systems employed for various applications due to their versatility to generalize and to respond to unexpected inputs/patterns. However, implementations of ANNs for safety-critical systems might lead to failures, which are hardly predicted in the design phase since ANNs are highly parallel and their parameters are hardly interpretable. Here w…
▽ More
Artificial Neural networks (ANNs) are powerful computing systems employed for various applications due to their versatility to generalize and to respond to unexpected inputs/patterns. However, implementations of ANNs for safety-critical systems might lead to failures, which are hardly predicted in the design phase since ANNs are highly parallel and their parameters are hardly interpretable. Here we develop and evaluate a novel symbolic software verification framework based on incremental bounded model checking (BMC) to check for adversarial cases and coverage methods in multi-layer perceptron (MLP). In particular, we further develop the efficient SMT-based Context-Bounded Model Checker for Graphical Processing Units (ESBMC-GPU) in order to ensure the reliability of certain safety properties in which safety-critical systems can fail and make incorrect decisions, thereby leading to unwanted material damage or even put lives in danger. This paper marks the first symbolic verification framework to reason over ANNs implemented in CUDA. Our experimental results show that our approach implemented in ESBMC-GPU can successfully verify safety properties and covering methods in ANNs and correctly generate 28 adversarial cases in MLPs.
△ Less
Submitted 30 July, 2019;
originally announced July 2019.
-
Self-organized inductive reasoning with NeMuS
Authors:
Leonardo Barreto,
Edjard Mota
Abstract:
Neural Multi-Space (NeMuS) is a weighted multi-space representation for a portion of first-order logic designed for use with machine learning and neural network methods. It was demonstrated that it can be used to perform reasoning based on regions forming patterns of refutation and also in the process of inductive learning in ILP-like style. Initial experiments were carried out to investigate whet…
▽ More
Neural Multi-Space (NeMuS) is a weighted multi-space representation for a portion of first-order logic designed for use with machine learning and neural network methods. It was demonstrated that it can be used to perform reasoning based on regions forming patterns of refutation and also in the process of inductive learning in ILP-like style. Initial experiments were carried out to investigate whether a self-organizing the approach is suitable to generate similar concept regions according to the attributes that form such concepts. We present the results and make an analysis of the suitability of the method in the process of inductive learning with NeMuS.
△ Less
Submitted 16 June, 2019;
originally announced June 2019.
-
Efficient predicate invention using shared "NeMuS"
Authors:
Edjard Mota,
Jacob M. Howe,
Ana Schramm,
Artur d'Avila Garcez
Abstract:
Amao is a cognitive agent framework that tackles the invention of predicates with a different strategy as compared to recent advances in Inductive Logic Programming (ILP) approaches like Meta-Intepretive Learning (MIL) technique. It uses a Neural Multi-Space (NeMuS) graph structure to anti-unify atoms from the Herbrand base, which passes in the inductive momentum check. Inductive Clause Learning (…
▽ More
Amao is a cognitive agent framework that tackles the invention of predicates with a different strategy as compared to recent advances in Inductive Logic Programming (ILP) approaches like Meta-Intepretive Learning (MIL) technique. It uses a Neural Multi-Space (NeMuS) graph structure to anti-unify atoms from the Herbrand base, which passes in the inductive momentum check. Inductive Clause Learning (ICL), as it is called, is extended here by using the weights of logical components, already present in NeMuS, to support inductive learning by expanding clause candidates with anti-unified atoms. An efficient invention mechanism is achieved, including the learning of recursive hypotheses, while restricting the shape of the hypothesis by adding bias definitions or idiosyncrasies of the language.
△ Less
Submitted 14 June, 2019;
originally announced June 2019.
-
Connected greedy coloring $H$-free graphs
Authors:
Esdras Mota,
Ana Silva,
Leonardo Sampaio
Abstract:
A connected ordering $(v_1, v_2, \ldots, v_n)$ of $V(G)$ is an ordering of the vertices such that $v_i$ has at least one neighbour in $\{v_1, \ldots, v_{i - 1}\}$ for every $i \in \{2, \ldots, n\}$. A connected greedy coloring (CGC for short) is a coloring obtained by applying the greedy algorithm to a connected ordering. This has been first introduced in 1989 by Hertz and de Werra, but still very…
▽ More
A connected ordering $(v_1, v_2, \ldots, v_n)$ of $V(G)$ is an ordering of the vertices such that $v_i$ has at least one neighbour in $\{v_1, \ldots, v_{i - 1}\}$ for every $i \in \{2, \ldots, n\}$. A connected greedy coloring (CGC for short) is a coloring obtained by applying the greedy algorithm to a connected ordering. This has been first introduced in 1989 by Hertz and de Werra, but still very little is known about this problem. An interesting aspect is that, contrary to the traditional greedy coloring, it is not always true that a graph has a connected ordering that produces an optimal coloring; this motivates the definition of the connected chromatic number of $G$, which is the smallest value $χ_c(G)$ such that there exists a CGC of $G$ with $χ_c(G)$ colors. An even more interesting fact is that $χ_c(G) \le χ(G)+1$ for every graph $G$ (Benevides et. al. 2014).
In this paper, in the light of the dichotomy for the coloring problem restricted to $H$-free graphs given by Král et.al. in 2001, we are interested in investigating the problems of, given an $H$-free graph $G$: (1). deciding whether $χ_c(G)=χ(G)$; and (2). given also a positive integer $k$, deciding whether $χ_c(G)\le k$. We have proved that Problem (2) has the same dichotomy as the coloring problem (i.e., it is polynomial when $H$ is an induced subgraph of $P_4$ or of $P_3+K_1$, and it is NP-complete otherwise). As for Problem (1), we have proved that $χ_c(G) = χ(G)$ always hold when $G$ is an induced subgraph of $P_5$ or of $P_4+K_1$, and that it is NP-hard to decide whether $χ_c(G)=χ(G)$ when $H$ is not a linear forest or contains an induced $P_9$. We mention that some of the results actually involve fixed $k$ and fixed $χ(G)$.
△ Less
Submitted 24 July, 2018;
originally announced July 2018.
-
Disseminacao de mensagens DTN com base em grupos de interesses
Authors:
Eric V. das Neves,
Ronaldo N. Martins,
Celso B. Carvalho,
Edjair Mota
Abstract:
Recent works explore social characteristics of nodes to improve message delivery rate in Delay Tolerant Networks (DTN). This work uses machine learning techniques to create node groups organized by common interests. Messages are sent to target groups, and from there to the final destination. Simulation results using The ONE simulator show that the larger the group size the higher the message deliv…
▽ More
Recent works explore social characteristics of nodes to improve message delivery rate in Delay Tolerant Networks (DTN). This work uses machine learning techniques to create node groups organized by common interests. Messages are sent to target groups, and from there to the final destination. Simulation results using The ONE simulator show that the larger the group size the higher the message delivery rate, that reaches 100% in some cases. The paper also presents results related to the groups of interest such as message delivery rat, delivery delay and an average number of hops to deliver messages. The overall results indicate that group-based routing is a promising research filed.
△ Less
Submitted 10 January, 2018;
originally announced January 2018.
-
Compressão de dados sem perdas para dispositivos IoT
Authors:
Abraão Caldas,
Renato Degelo,
Edjair Mota,
Celso B. Carvalho
Abstract:
In environments with energy and processing constraints, such as sensor networks and embedded devices, sending raw information over wireless networks can be costly. In order to reduce the amount of transmitted data and ultimately save energy, we can compress data before transmission. In this paper, we tackle such problem in the IoT domain by deploying two widely used libraries to deliver asynchrono…
▽ More
In environments with energy and processing constraints, such as sensor networks and embedded devices, sending raw information over wireless networks can be costly. In order to reduce the amount of transmitted data and ultimately save energy, we can compress data before transmission. In this paper, we tackle such problem in the IoT domain by deploying two widely used libraries to deliver asynchronous messages and data compression/decompression. We evaluate both our methodology and the compression/decompression performance of the embedded library in a micro-controller for IoT.
△ Less
Submitted 28 September, 2017;
originally announced September 2017.
-
Friendship and Selfishness Forwarding: applying machine learning techniques to Opportunistic Networks data forwarding
Authors:
Camilo Souza,
Edjair Mota,
Leandro Galvao,
Diogo Soares,
Pietro Manzoni,
Juan Carlos Cano,
Carlos Calafate
Abstract:
Opportunistic networks could become the solution to provide communication support in both cities where the cellular network could be overloaded, and in scenarios where a fixed infrastructure is not available, like in remote and developing regions. A critical issue that still requires a satisfactory solution is the design of an efficient data delivery solution. Social characteristics are recently b…
▽ More
Opportunistic networks could become the solution to provide communication support in both cities where the cellular network could be overloaded, and in scenarios where a fixed infrastructure is not available, like in remote and developing regions. A critical issue that still requires a satisfactory solution is the design of an efficient data delivery solution. Social characteristics are recently being considered as a promising alternative. Most opportunistic network applications rely on the different mobile devices carried by users, and whose behavior affects the use of the device itself.
This work presents the "Friendship and Selfishness Forwarding" (FSF) algorithm. FSF analyses two aspects to make message forwarding decisions when a contact opportunity arises: First, it classifies the friendship strength among a pair of nodes by using a machine learning algorithm to quantify the friendship strength among pairs of nodes in the network. Next, FSF assesses the relay node selfishness to consider those cases in which, despite a strong friendship with the destination, the relay node may not accept to receive the message because it is behaving selfishly, or because its device has resource constraints in that moment.
By using trace-driven simulations through the ONE simulator, we show that the FSF algorithm outperforms previously proposed schemes in terms of delivery rate, average cost, and efficiency.
△ Less
Submitted 24 May, 2017;
originally announced May 2017.
-
HarborNet: A Real-World Testbed for Vehicular Networks
Authors:
Carlos Ameixieira,
André Cardote,
Filipe Neves,
Rui Meireles,
Susana Sargento,
Luís Coelho,
João Afonso,
Bruno Areias,
Eduardo Mota,
Rui Costa,
Ricardo Matos,
João Barros
Abstract:
We present a real-world testbed for research and development in vehicular networking that has been deployed successfully in the sea port of Leixões in Portugal. The testbed allows for cloud-based code deployment, remote network control and distributed data collection from moving container trucks, cranes, tow boats, patrol vessels and roadside units, thereby enabling a wide range of experiments and…
▽ More
We present a real-world testbed for research and development in vehicular networking that has been deployed successfully in the sea port of Leixões in Portugal. The testbed allows for cloud-based code deployment, remote network control and distributed data collection from moving container trucks, cranes, tow boats, patrol vessels and roadside units, thereby enabling a wide range of experiments and performance analyses. After describing the testbed architecture and its various modes of operation, we give concrete examples of its use and offer insights on how to build effective testbeds for wireless networking with moving vehicles.
△ Less
Submitted 6 December, 2013;
originally announced December 2013.