The Computational Theory of Intelligence: Information Entropy ()

Daniel Kovach^{1*}

^{1}Kovach Technologies, San Jose, CA, USA.

**DOI: **10.4236/ijmnta.2014.34020
PDF
HTML
5,328
Downloads
7,116
Views
Citations

This paper presents an information theoretic approach to the concept of intelligence in the computational sense. We introduce a probabilistic framework from which computation alintelligence is shown to be an entropy minimizing process at the local level. Using this new scheme, we develop a simple data driven clustering example and discuss its applications.

Share and Cite:

Kovach, D. (2014) The Computational Theory of Intelligence: Information Entropy. *International Journal of Modern Nonlinear Theory and Application*, **3**, 182-190. doi: 10.4236/ijmnta.2014.34020.

1. Introduction

This paper attempts to introduce a computational approach to the study of intelligence that the researcher has accumulated for many years. This approach takes into account data from Psychology, Neurology, Artificial Intelligence, Machine Learning, and Mathematics.

Central to this framework is the fact that the goal of any intelligent agent is to reduce the randomness in its environment in some meaningful ways. Of course, formal definitions in the context of this paper for terms like “intelligence”, “environment”, and “agent” will follow.

The approach draws from multidisciplinary research and has many applications. We will utilize the construct in discussions at the end of the paper. Other applications will follow in future works. Implementations of this framework can apply to many fields of study including General Artificial Intelligence (GAI), Machine Learning, Optimization, Information Gathering, Clustering, and Big Data, and extend outside of the applied mathematics and computer science realm to even more areas including Sociology, Psychology, and Neurology, and even Philosophy.

1.1. Definitions

One cannot begin a discussion about the philosophy of artificial intelligence without a definition of the word “intelligence” in the first place. With the panoply of definitions available, it is understandable that there may be some disagreement, but typically each school of thought generally shares a common thread. The following are three different definitions of intelligence from respectable sources:

1) “The aggregate or global capacity of the individual to act purposefully, to think rationally, and to deal effectively with his environment.”[1] .

2) “A process that entails a set of skills of problem solving enabling the individual to resolve genuine problems or difficulties that he or she encounters and, when appropriate, to create an effective product and must also entail the potential for finding or creating problems and thereby providing the foundation for the acquisition of new knowledge.” [2] .

3) “Goal-directed adaptive behavior.” [3] .

Vernon’s hierarchical model of intelligence from the 1950’s [1] , and Hawkins’ On Intelligence from g 2004 [4] are some other great resources on this topic. Consider the following working definition of this paper, with regard to information theory and computation: Computational Intelligence (CI) is an information processing algorithm that

1) Records data or events into some type of store, or memory.

2) Draws from the events recorded in memory, to make assertions, or predictions about future events.

3) Using the disparity between the predicted and events and the new incoming events, the memory structure in step 1 can be updated such that the predictions of step 2 are optimized.

The mapping in 3 is called learning, and is endemic to CI. Any entity that is facilitating the CI process we will refer to as an agent, in particular when the connotation is that the entity is autonomous. The surrounding infrastructure that encapsulates the agent together with the ensuing events is called the environment.

1.2. Structure

The paper is organized as follows. In Section 2 we provide a brief summary of the concept of information entropy as it is used for our purposes. In Section 3, we provide a mathematical framework for intelligence and show discuss its relation to entropy. Section 4 discusses the global ramifications of local entropy minimization. In Section 5 we present a simple application of the framework to data analytics, which is available for free download. Sections 6 and 7 discuss relevant related research, and future work.

2. Entropy

A key concept of information theory is that of entropy, which amounts to the uncertainty in a given random variable, [5] . It is essentially, a measure of unpredictability (among other interpretations). The concept of entropy is a much deeper principal of nature that penetrates to the deepest core of physical reality and is central to physics and cosmological models [6] -[8] .

2.1. Mathematical Representation

Although terms like Shannon entropy are pervasive in the field of information theory, it will be insightful to review the formulation in our context. To arrive at the definition of entropy, we must first recall what is meant by information content. The information content of a random variable, denoted, is given by

(1)

where is the probability of. The entropy of, denoted, is then defined as the expectation value of the information content.

(2)

Expanding using the definition of the expectation value, we have

(3)

2.1.1. Relationship of Shannon Entropy to Thermodynamics

The concept of entropy is deeply rooted at the heart of physical reality. It is a central concept in thermodynamics, governing everything from chemical reactions to engines and refrigerators. The relationship of entropy as it is known in information theory, however, is not mapped so straightforwardly to its use in thermodynamics.

In statistical thermodynamics, the entropy, of a system is given by

(4)

where p_{i} denote the probability of each microstate, or configuration of the system, and is the Boltzmann constant which serves to map the value of the summation to physical reality in terms of quantity and units.

The connection between the thermodynamic and information theoretic versions of entropy relate to the information needed to detail the exact state of the system, specifically, the amount of further Shannon information needed to define the microscopic state of the system that remains ambiguous when given its macroscopic definition in terms of the variables of Classical Thermodynamics. The Boltzmann constant serves as a constant of proportionality.

2.1.2. Renyi Entropy

We can extend the logic of the beginning of this section to a more general formulation called the Renyi entropy of order, where and defined as

. (5)

Under this convention we can apply the concept of entropy more generally to extend the utility of the concept to a variety of applications. It is important to note that this formulation approaches 1 in the limit as. Although the discussions of this paper were inspired by Shannon entropy, we wish to present a much more general definition and a bolder proposition.

3. Intelligence: Definition and Assumptions

. The function represents the intelligence process, a member of ℐ, the set of all such functions. It maps input from set to output in. First, let

(6)

reflect the fact that is mapping one element from to one element in, each tagged by the identifier, which is bounded by the cardinality of the input set. The cardinality of these two sets need not match, nor does the mapping between need to be bijective, or even surjective. This is an iterative process, as denoted by the index,. Finally, let represent the collection of.

Over time, the mapping should converge to the intended element, , as is reflected in notation by

. (7)

Introduce the function

. (8)

which in practice is usually some type of error or fitness measuring function. Assuming that is continuous and differentiable, let the updating mechanism at some particular for be

(9)

In other words, iteratively updates itself with respect to the gradient of some function,. Additionally, must satisfy the following partial differential equation

, (10)

where the function is some measure of the distance between and, assuming such a function exists, and is called the learning rate. A generalization of this process to abstract topological spaces where such a distance function is a commodity is an open question.

Finally, for this to qualify as an intelligence process, we must have

(11)

3.1. Unsupervised and Supervised Learning

Some consideration should be given to the sets and. If where is the power set of, then we will say that the mapping is an unsupervised mapping. Otherwise, the mapping is supervised. The ramifications of this distinction are as follows. In supervised learning, the agent is given two distinct sets and trained to form a mapping between them explicitly. With unsupervised learning, the agent is tasked with learning subtle relationships in a single data set or, put more succinctly, to develop the mapping between and its power set discussed above [9] [10] .

3.2. Overtraining

Further, we should note that just because we have some function satisfying the definitions and assumptions of this section does not mean that this mapping be necessarily meaningful. After all, we could make a completely arbitrary but consistent mapping via the prescription above, and although this would satisfy all the definitions and assumptions, it would be complete memorization on the part of the agent. But this, in fact is exactly the definition of overtraining a common pitfall in the training stage of machine learning and about which one must be very diligent to avoid.

3.3. Entropy Minimization

One final part of the framework remains, and that is to show that entropy is minimized, as was stated at the beginning of this section. To show that, we consider as a probabilistic mapping, with

, (12)

indicating the probability that maps to some particular. From this, we can calculate the entropy in the mapping from to, at each iteration. If the projection has possible outcomes, then the Shannon entropy of each is given by

(13)

The total entropy is simply the sum of over. Let, then for the purposes of standardization across varying cardinalities, it may be insightful to speak of the normalized entropy,

. (14)

As, the mapping from each to its corresponding converges, andwe have

. (15)

Therefore

(16)

Further, using the definition for Renyi entropy in 5 for each and

. (17)

To show that the Renyi entropy is also minimized, we can use an identity involving the -norm

, (18)

and show that the log function is maximized for, and minimized for. The case was shown above with the definition of Shannon entropy. To continue, note that

(19)

since the summation is taken over all possible states. But from 15, we have

, (20)

forfinite and thus the log function is minimized only as. To show that the Renyi entropy is also mi-

nimized for, we repeat the abovelogic but note that the with the sign reversal of, the quantity

is minimized as.

Finally, we can take a normalized sum over all to obtain the total Renyi entropy of,. By this definition, then the total entropy is minimized along with its components.

3.4. Entropic Self Organization

In section 3 we talked about the definitions of intelligence via the mapping. Here, we seek to apply the entropy minimization concept to itself, rather than a mapping. Explicitly, , where

(21)

and for every, there is aunique such that. That is, every element of has one and only one element of containing it. The term entropic self-organization refers to finding the such that is minimized over all satisfying 21

. (22)

4. Global Effects

In nature, whenever a system is taken from a state of higher entropy to a state of lower entropy, there is always some amount of energy involved in this transition, and an increase in the entropy of the rest of the environment greater than or equal to that of the entropy loss [6] . In other words, consider a system composed of two subsystems, and, then

(23)

Now, consider that system in equilibrium at times, and and denote the state at each and, respectively. Then due to the second law of thermodynamics,

. (24)

Therefore

. (25)

Now, suppose one of the subsystems, say, decreases in entropy by some amount, between, and, i.e.. Then to preserve the inequality, the entropy of the rest of the system must be such that

. (26)

So the entropy of the rest of the system has to increase by an amount greater than or equal to the loss of entropy in. This will require some amount of energy,.

Observe that all we have done thus far is follow the natural consequences of the Second Law of Thermodynamics with respect to our considerations with intelligence. While the second law of thermodynamics has been verified time and again in virtually all areas of physics, few have extended it as a more general principal in the context of information theory. In fact, we will conclude this section with a postulate about intelligence:

Computational intelligence is a process that locally minimizes and globally maximizes Renyi entropy.

It should be stressed that although the above is necessary of intelligence, it is not sufficient in the justification of an algorithm or process as being intelligent.

5. Applications

Here, we implement the discussions of this paper to practical examples. First, we consider a simple example of unsupervised learning; a clustering algorithm based on Shannon entropy minimization. Next we look at some simple behavior of an intelligent agent as it acts to maximize global entropy in its environment.

5.1. Clustering by Entropy Minimization

Consider a data set consisting of a number of elements organized into rows. The experiment that follows, we consider 300 samples, each a vector from. In this simple proof of concept we will group the data into like neighborhoods by minimizing the entropy across all elements at each respective index in the data set. This is a data driven example, so essentially we use a genetic algorithm to perturb the juxtaposition of members of each neighborhood until the global entropy reaches a minimum (entropic self organization), while at the same time avoiding trivial cases such as a neighborhood with only one element.

We leverage the Python framework heavily for this example, which is freely available for many operating systems at [11] .

Please note that this is a simple prototype, a proof of concept used to exemplify the material in this paper. It is not optimized for latency, memory utilization, and it has not been optimized or performance tested against other algorithms in its comparative class, although dramatic improvements could be easily achieved by integrating the information content of the elements into the algorithm. Specifically, we would move elements with high information content to clusters where that element would otherwise have low information content. Furthermore, observe that for further efficacy, a preprocessing layer may be beneficial, especially with topological data set. Nevertheless, applications of this concept applied to clustering on small and large scales will be discussed in a future work.

We can visualize the progression of the algorithm and the final results, respectively, in Figure 1. For simplicity, only the first two (non-noise) dimensions are plotted. The accuracy of the clustering algorithm was 8.3% error rate in 10,000 iterations, with an average simulation time: 480.1 seconds.

Observe that although there are a few “blemishes” in the final clustering results, with a proper choice of parameters including the maximum computational epochs the clustering algorithm will eventually succeed with 100% accuracy.

Also pictured in Figure 2 are the results of the clustering algorithm applied to a data set containing four additional fields of pseudo-randomly generated noise, each in the interval. The performance of this trial was worse than the last in terms of speed, but was had about the same classification accuracy. The accuracy of the clustering algorithm was 6.0% error rate in 10,000 iterations, with an average simulation time: 1013.1 seconds.

5.2. Entropy Maximization

In our next set of examples consider a virtual agent confined to move about a “terrain”, represented by a three- dimensional surface, given by one of the two following equations, each of which are plotted visually in Figure 3, and defined by the following functions, respectively:

, (27)

and

(28)

Figure 1. Entropic clustering algorithm results over time.

We will confine and such that and note that the range of each respective surface is. The algorithm proceeds as follows. First, the agent is initialized with a starting position,. It updates the coordinates of the agent’s position by incrementing or decrementing by some small value,. As the agent meanders about the surface, data is collected as to its position on the z-axis.

If we partition the range of each surface into equally spaced intervals, we can form a histogram of the agent’s positional information. From this we can construct a discrete probability function, and thus calculate the Renyi entropy. The agent can then use feedback from the entropy determined using to calculate an appropriate from which it upates its position, and the cycle continues. The overall goal is to maximize its entropy, or timeout after a predetermined number of iterations.

In this particular simulation, the agent is initialized using a “random walk”, in which is is chosen at random. Next, it is updated using feedback from the entropy function.

From the simple set of rules, we see emergent desire for parsimony with respect to position on the surface, even in the less probable partitions of, as. As our simulation continues to run, so tends to a uniform distribution.

The Figure 3 depict a random walk on surface 1 and surface 2 respectively, where the top and bottom right figures show surface traversal using an entropic search algorithm.

6. Related Works

Although there are many approaches to intelligence from the angle of cognitive science, few have been proposed from the computational side. However, as of late, some great work in this area is underway.

Figure 2. Entropic clustering algorithm results over time.

Surface 1 Surface 2

Figure 3. Surfaces for hill climbing agent simulation.

Many sources claim to have computational theories of intelligence, but for the most part these “theories” merely act to describe certain aspects of intelligence [12] [13] . For example, Meyer in [12] suggests that performance on multiple tasks is dependent on adaptive executive control, but makes no claim on the emergence of such characteristics. Others discuss how data is aggregated. This type of analysis is especially relevant in computer vision and image recognition [13] .

The efforts in this paper seek to introduce a much broader theory of emergence of autonomous goal directed behavior. Similar efforts are currently under way.

Inspired by physics and cosmology, Wissner-Gross asserts autonomous agents act to maximize the entropy in their environment [14] . Specifically he proposes a path integral formulation from which he derives a gradient

that can be analogized as a causal force propelling a system along a gradient of maximum entropy over time. Using this idea, he created a startup called Entropica [15] that applies this principal in ingenious ways in a variety of different applications, ranging from anything to teaching a robot to walk upright, to maximizing profit potential in the stock market.

Essentially, what Wissner-Gross did was start with a global principal and worked backwards. What we did in this paper was to arrive at a similar result from a different perspective, namely entropy minimization.

7. Conclusions

The purpose of this paper was to lay the groundwork for a generalization of the concept of intelligence in the computational sense. We discussed how entropy minimization can be utilized to facilitate the intelligence process, and how the disparities between the agent’s prediction and the reality of the training set can be used to optimize the agent’s performance. We also showed how such a concept could be used to produce a meaningful, albeit simplified, practical demonstration.

Some future work includes applying the principals of this paper to data analysis, specifically in the presence of noise or sparse data. We will discuss some of these applications in the next paper.

More future work includes discussing the underlying principals under which data can be collected hierarchically, discussing how computational processes can implement the discussions in this paper to evolve and work together to form processes of greater complexity, and discussing the relevance of these contributions to abstract concepts like consciousness and self awareness.

In the following paper we will examine how information can aggregate together to form more complicated structures, the roles these structures can play.

More concepts, examples, and applications will follow in future works.

Conflicts of Interest

The authors declare no conflicts of interest.

[1] | Wechsler, D. and Matarazzo, J.D. (1972) Wechsler’s Measurement and Appraisal of Adult Intelligence. Oxford UP, New York. |

[2] | Gardner, H. (1993) Frames of the Mind: The Theory of Multiple Intelligences. Basic, New York. |

[3] | Sternberg, R.J. (1982) Handbook of Human Intelligence. Cambridge UP, Cambridge Cambridgeshire. |

[4] | Hawkins, J. and Sandra, B. (2004) On Intelligence. Times, New York. |

[5] | Ihara, S. (1993) Information Theory for Continuous Systems. World Scientific, Singapore. |

[6] | Schroeder, D.V. (2000) An Introduction to Thermal Physics. Addison Wesley, San Francisco. |

[7] | Penrose, R. (2011) Cycles of Time: An Extraordinary New View of the Universe. Alfred A. Knopf, New York. |

[8] | Hawking, S.W. (1998) A Brief History of Time. Bantam, New York. |

[9] | Jones, M.T. (2008) Artificial Intelligence: A Systems Approach. Infinity Science, Hingham. |

[10] | Russell, S.J. and Peter, No. (2003) Artificial Intelligence: A Modern Approach. Prentice Hall/Pearson Education, Upper Saddle River. |

[11] | (2013) Download Python. N.p., n.d. Web. 17 August 2013. http://www.python.org/getit |

[12] | Marr, D. and Poggio, T. (1979) A Computational Theory of Human Stereo Vision. Proceedings of the Royal Society B: Biological Sciences, 204, 301-328. http://dx.doi.org/10.1098/rspb.1979.0029 |

[13] |
Meyer, D.E. and Kieras, D.E. (1997) A Computational Theory of Executive Cognitive Processes and Multiple-Task Performance: Part I. Basic Mechanisms. Psychological Review, 104, 3-65. http://dx.doi.org/10.1098/rspb.1979.0029 |

[14] |
Wissner-Gross, A. and Freer, C. (2013) Causal Entropic Forces. Physical Review Letters, 110, Article ID: 168702. http://dx.doi.org/10.1103/PhysRevLett.110.168702 |

[15] | (2013) Entropica. N.p., n.d. Web. 17 August 2013. http://www.entropica.com |

Journals Menu

Contact us

+1 323-425-8868 | |

customer@scirp.org | |

+86 18163351462(WhatsApp) | |

1655362766 | |

Paper Publishing WeChat |

Copyright © 2024 by authors and Scientific Research Publishing Inc.

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.