Next Article in Journal
Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern
Next Article in Special Issue
Weakly Supervised Learning for Evaluating Road Surface Condition from Wheelchair Driving Data
Previous Article in Journal
Impact of Information Sharing and Forecast Combination on Fast-Moving-Consumer-Goods Demand Forecast Accuracy
Previous Article in Special Issue
Multi-Regional Online Car-Hailing Order Quantity Forecasting Based on the Convolutional Neural Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Semantic Information G Theory and Logical Bayesian Inference for Machine Learning

Institute of Intelligence Engineering and Mathematics, Liaoning Technical University, Fuxin 123000, China
Information 2019, 10(8), 261; https://doi.org/10.3390/info10080261
Submission received: 20 June 2019 / Revised: 13 August 2019 / Accepted: 13 August 2019 / Published: 16 August 2019
(This article belongs to the Special Issue Machine Learning on Scientific Data and Information)

Abstract

:
An important problem in machine learning is that, when using more than two labels, it is very difficult to construct and optimize a group of learning functions that are still useful when the prior distribution of instances is changed. To resolve this problem, semantic information G theory, Logical Bayesian Inference (LBI), and a group of Channel Matching (CM) algorithms are combined to form a systematic solution. A semantic channel in G theory consists of a group of truth functions or membership functions. In comparison with the likelihood functions, Bayesian posteriors, and Logistic functions that are typically used in popular methods, membership functions are more convenient to use, providing learning functions that do not suffer the above problem. In Logical Bayesian Inference (LBI), every label is independently learned. For multilabel learning, we can directly obtain a group of optimized membership functions from a large enough sample with labels, without preparing different samples for different labels. Furthermore, a group of Channel Matching (CM) algorithms are developed for machine learning. For the Maximum Mutual Information (MMI) classification of three classes with Gaussian distributions in a two-dimensional feature space, only 2–3 iterations are required for the mutual information between three classes and three labels to surpass 99% of the MMI for most initial partitions. For mixture models, the Expectation-Maximization (EM) algorithm is improved to form the CM-EM algorithm, which can outperform the EM algorithm when the mixture ratios are imbalanced, or when local convergence exists. The CM iteration algorithm needs to combine with neural networks for MMI classification in high-dimensional feature spaces. LBI needs further investigation for the unification of statistics and logic.

1. Introduction

Machine learning is based on learning functions and classifiers. In 1922, Fisher [1] proposed the Likelihood Inference (LI), which uses likelihood functions as learning functions and it uses the Maximum Likelihood (ML) criterion to optimize the learning functions and classifiers (see abbreviations in this paper). However, when the prior distribution, P(x) (where x is an instance), is changed, the optimized likelihood function will be invalid. As LI cannot make use of prior knowledge, Bayesians proposed Bayesian Inference (BI) during the 1950s [2,3], which uses Bayesian posteriors as learning functions. However, in many cases, we only have prior knowledge of instances, instead of labels or model parameters and, hence, BI is still not good in such cases. A pair of Logistic (or Sigmoid) functions are often used as the learning functions for binary classifications. With a Logistic function and Bayes’ Theorem, we can make use of a new prior P(x) to make new probability predictions for the ML classifier. However, when the number of labels is greater than two, we cannot find proper learning functions that are similar to Logistic functions for multilabel learning. We call the above problem the “Multilabel-Learning-for-New-P(x) Problem”.
Machine learning is used to acquire and convey information, and so the information criterion that is used should be a good criterion. In 1974, Akaike [4] proved that the ML criterion is equal to the minimum Kullback–Leibler (KL) divergence criterion, where the KL divergence [5] is also called “KL information”. Since then, information criteria, especially information criteria that are compatible with the likelihood criterion, have attracted the attention of researchers [6]. However, KL divergence decreases as the likelihood increases and, hence, the Least KL divergence is not ideal as an information criterion. Can we use Shannon’s mutual information or another information measure for the information criterion?
In 1948, Shannon [7] initiated classical information theory. In 1949, Weaver [8] proposed three levels of communication that are relevant to the technical problem that was resolved by Shannon, a semantic problem that relates to meaning and truth, and an effectiveness problem concerning information values. In 1952, Carnap and Bar-Hillel [9] proposed an outline of semantic information theory. Multiple different semantic information theories currently exist [10,11,12,13], as well as fuzzy information theories [14,15,16] and generalized information theories [17,18] that are related to semantic information theories. Recently, some researchers have used the Shannon mutual information measure with parameters to optimize neural networks [19,20].
However, Shannon’s Mutual Information (SHMI) formula has not yet been used to optimize a learning functions with parameters by the use of a sampling distribution. Therefore, the author introduced a learning function into the SHMI formula and developed semantic information G theory, or G theory. The author mainly developed this theory over the past three decades [21,22,23,24,25,26]. The G theory uses the membership functions of fuzzy sets, as proposed by Zadeh [27], as learning functions and treats a membership function as the truth function of a hypothesis. The truth function can represent the semantic meaning of a hypothesis, according to Tarski’s truth theory [28] and Davidson’s truth-conditional semantics [29].
“G theory” is used because, in this theory, Semantic Mutual Information (SMI) is a natural generalization of SHMI (“G” denoting “generalization”), so that SHMI is the upper limit of SMI. G also denotes SMI as D denotes average distortion in Shannon’s information rate distortion theory [30]. Replacing D with G, the author reformed the rate-distortion function R(D) into the rate-verisimilitude function R(G) [24,25], not only for data compression, but also for machine learning.
G theory has two headstreams: Shannon’s information theory and Popper’s hypothesis-testing theory (see [31], p. 96 and 269; and [32], p. 294), which emphasizes that a hypothesis with a smaller logical probability can convey more information if it can survive empirical tests and, hence, is more preferable.
Carnap and Bar-Hillel [9] used logical probability to define the semantic information measure, which contains Popper’s partial thought. However, this measure does not deal with whether the hypothesis can survive empirical tests. Therefore, G theory introduces the membership function into the semantic information measure.
Cross-entropy has become a popular tool in machine learning [33]. G theory uses not only cross-entropy, but also mutual cross-entropy [22,25]. The SMI in G theory is a mutual cross-entropy.
To resolve the “Multilabel-Learning-for-New-P(x)” problem, the author investigated a new inference method: Logical Bayesian Inference (LBI). The Bayesians include subjective Bayesians and logical Bayesians. BI was developed by subjective Bayesians, who use subjective probability for statistical inference. Logical Bayesians, such as Keynes and Carnap [34], use logical probability, including the truth function, for inductive logic. BI uses the Bayesian posterior as the inferential tool. Logical Bayesian Inference uses the truth function (e.g., the fuzzy truth function) instead of the Bayesian posterior as the inferential tool. In LBI, both statistical and logical probabilities are simultaneously used. BI fits cases with a given prior distribution of a predictive model θ, whereas LBI fits cases with a given prior distribution of an instance X.
Besides Shannon’s information theory and Poppers’ hypothesis-testing theory, G theory and LBI should inherit, absorb, or be compatible with:
  • Fisher’s likelihood method for hypothesis-testing [1];
  • Zadeh’s fuzzy set theory [27,35] for semantic meanings and logical probabilities of hypotheses;
  • Carnap and Bar-Hillel’s semantic information formula with logical probability [9];
  • Floridi’s semantic concepts of information [11,36];
  • Tarski’s truth theory for the definition of truth and logical probability [28];
  • Davidson’s truth-conditional semantics [29];
  • Kullback and Leibler’s KL divergence [5];
  • Akaike’s proof [4] that the ML criterion is equal to the minimum KL divergence criterion;
  • Theil’s generalized KL formula [37];
  • the Donsker–Varadhan representation as a generalized KL formula with Gibbs density [38];
  • Wittgenstein’s thought: meaning lies in uses (see [39], p. 80);
  • Bayes’ Theorem [40], which can be extended to link likelihood functions and membership functions [41]; and,
  • Logical Bayesian methods for inductive logic used by Carnap et al. [3,34]
Based on G theory and LBI, the author developed a group of algorithms, called Channel Matching (CM) algorithms [41,42,43,44], for machine learning. In the CM algorithms, the semantic channel and Shannon channel mutually match to achieve maximum information (for classification) or maximum information efficiency (G/R) (for mixture models).
These algorithms are used mainly for:
  • making use of the prior knowledge of instances for probability predictions;
  • multilabel learning, belonging to supervised learning;
  • the Maximum Mutual Information (MMI) classifications of unseen instances, belonging to semi-supervised learning; and,
  • mixture models, belonging to unsupervised learning.
Each of them is very difficult and not well resolved before.
This study aims to completely introduce G theory, LBI, and the CM algorithms, along with sufficient background knowledge and applications for readers to fully understand them, especially to understand how to use them to resolve the “Multilabel-Learning-for-New-P(x)” Problem.
Partial contents of this paper have been introduced in several short papers that were published in conference proceedings [41,42,43,44]. Some contents introduced before are improved in this paper, such as one-dimensional examples for MMI classification and mixture models, which are now two-dimensional examples, as well as the previous two formulae for the confirmation measure being consolidated into one formula.
According to the author’s knowledge, nowhere in the literature has a semantic information measure been used to optimize the membership functions or truth functions with parameters by sampling distributions; no has the statistical probability and the logical probability of a hypothesis been distinguished and simultaneously used in the same formula; nor has the semantic channel with its mathematical representation been proposed.

2. Methods I: Background

2.1. From Shannon Information Theory to Semantic Information G Theory

2.1.1. From Shannon’s Mutual Information to Semantic Mutual Information

Definition 1.
  • x: an instance or data point; X: a discrete random variable taking a value x∈U = {x1, x2, …, xm}.
  • y: a hypothesis or label; Y: a discrete random variable taking a value y∈V = {y1, y2, …, yn}.
  • P(yj|x) (with fixed yj and variable x): a Transition Probability Function (TPF) (named as such by Shannon [7]).
Shannon named P(X) the source, P(Y) the destination, and P(Y|X) the channel. A Shannon channel is a transition probability matrix or a group of transition probability functions:
P ( Y | X ) [ P ( y 1 | x 1 ) P ( y 1 | x 2 ) P ( y 1 | x m ) P ( y 2 | x 1 ) P ( y 2 | x 2 ) P ( y 2 | x m ) P ( y n | x 1 ) P ( y n | x 2 ) P ( y n | x m ) ] [ P ( y j | x ) P ( y j | x ) P ( y n | x ) ] ,
where ⇔ indicates equivalence. Note that the TPF P(yj|x) is not normalized, unlike the conditional probability function, P(y|xi), in which y is variable and xi is constant. We will discuss how the TPF can be used for the traditional Bayes prediction in Section 2.2.1.
The Shannon entropies of X and Y are
H ( X ) =   j P ( x i ) log P ( x i ) ,
H ( Y ) =   j P ( y j ) log P ( y j ) .
The Shannon posterior entropies of X and Y are
H ( X | Y ) =   j i P ( x i , y j ) log P ( x i | y j ) ,
H ( Y | X ) =   j i P ( x i , y j ) log P ( y j | x i ) .
The Shannon mutual information is
I ( X ; Y ) =   j i P ( x i , y j ) log P ( x i | y j ) P ( x i ) = H ( X ) H ( X | Y ) = j i P ( x i , y j ) log P ( y j | x i ) P ( y j ) = H ( Y ) H ( Y | X ) .
If Y = yj, the mutual information I(X; Y) will become the Kullback–Leibler (KL) divergence:
I ( X ; y j ) =   i P ( x i | y j ) log P ( x i | y j ) P ( x i ) =   i P ( x i | y j ) log P ( y j | x i ) P ( y j ) .
Some researchers have used the following formula to measure the information between xi and yj:
I ( x i ; y j ) =   log P ( x i | y j ) P ( x i ) = log P ( y j | x i ) P ( y j ) .
As I(xi; yj) may be negative, however Shannon did not use this formulation. Shannon explained that information is the reduced uncertainty or the saved average code word length. The author believes that the above formula is meaningful, because negative information indicates that a bad prediction may increase the uncertainty or the code word length.
As Shannon’s information theory cannot measure semantic information, Carnap and Bar-Hillel proposed a semantic information formula
I(p) = log[1/mp],
where p is a proposition and mp is its logical probability.
As I(p) is not relative to whether the prediction is correct or not, this formula is not practical.
Zhong [12] made use of the fuzzy entropy of DeLuca and Termini [14] to define the semantic information measure
I(yj) = log2 + [tj logtj + (1 − tj) log(1 − tj)],
where tj is “the logical truth” of yj. However, according to this formula, whenever tj = 1 or tj = 0, the information reaches its maximum of 1 bit. This result is not expected. Therefore, this formula is unreasonable. This problem is also found in other semantic or fuzzy information theories that use DeLuca and Termini’s fuzzy entropy [14].
Floridi’s semantic information formula [11,36] is a little complicated. It can ensure that the information that is conveyed by a tautology or a contradiction reaches its minimum 0. However, according to common sense, a wrong prediction or a lie is worse than a tautology. As to how the semantic information is related to the deviation and how the amount of semantic information of a correct prediction differs from that of a wrong prediction, we cannot obtain clear answers from his formula.
The author proposed an improved semantic information measure in 1990 [21] and developed G theory later.
According to Tarski’s truth theory [28], P(X ϵ θj) is equivalent to P(“X ϵ θ” is true) = P(yj is true). The truth function of yj ascertains the semantic meaning of yj, according to Davidson’s truth condition semantics [29]. Following Tarski and Davidson, we define, as follows:
Definition 2.
  • θj is a fuzzy subset of U which is used to explain the semantic meaning of a predicate yj(X) = “X ϵ θj”. If θj is non-fuzzy, we may replace it with Aj. The θj is also treated as a model or a group of model parameters.
  • A probability is defined with “=”, such that P(yj) = P(Y = yj), is a statistical probability; a probability is defined with “∈”, such as P(X∈θj), is a logical probability. To distinguish P(Y = yj) and P(X∈θj), we define T(θj) = P(X∈θj) as the logical probability of yj.
  • T(θj|x) = P(x∈θj) = P(X∈θj|X = x) is the conditional logical probability function of yj; this is also called the (fuzzy) truth function of yj or the membership function of θj.
A group of TPFs P(yj|x), j = 1,2,…,n, form a Shannon channel, whereas a group of membership functions T(θj|x), j = 1,2…n, form a semantic channel:
T ( θ | X ) [ T ( θ 1 | x 1 ) T ( θ 1 | x 2 ) T ( θ 1 | x m ) T ( θ 2 | x 1 ) T ( θ 2 | x 2 ) T ( θ 2 | x m ) T ( θ n | x 1 ) T ( θ n | x 2 ) T ( θ n | x m ) ] [ T ( θ 1 | x ) T ( θ 2 | x ) T ( θ n | x ) ] .
Figure 1 illustrates the Shannon channel P(Y|X) and the semantic channel T(θ|X).
The Shannon channel indicates the correlation between X and Y, whereas the semantic channel indicates the fuzzy denotations of a group of labels. The Shannon channel indicates the rule by which the observatory selects labels or forecasts for the weather forecasts between an observatory and its audience, whereas the semantic channel indicates the semantic meanings of these forecasts understood by the audience.
The expectation of the truth function is the logical probability:
T ( θ j ) = i P ( x i ) T ( θ j | x i ) ,
which was proposed earlier by Zadeh [35] as the probability of a fuzzy event. This logical probability is a little different from the mp that was defined by Carnap and Bar-Hillel [9]. The latter only rests with the denotation of a hypothesis. For example, y1 is a hypothesis (such as “X is infected by the Human Immunodeficiency Virus (HIV)”) or a label (such as “HIV-infected”). Its logical probability T(θ1) is very small for normal people, because HIV-infected people are rare. However, mp is irrelative to P(x); it may be 1/2.
Note that the statistical probability is normalized, whereas the logical probability is not, in general. When θ0, θ1, …, θn form a cover of U, we have that P(y0) + P(y1) + …+P(yn) = 1 and T(θ0) + T(θ1) + … + T(θn) ≥ 1.
For example, if U is a group of people of different ages with the subsets A1 = {adults} = {x|x ≥ 18}, A0 = {juveniles} = {x|x < 18}, and A2 = {young people} = {x|15 ≤ x ≤ 35}. The three sets form a cover of U, and T(A0) + T(A1) = 1. If T(A2) = 0.3; the sum of the three logical probabilities is 1.3 > 1. However, the sum of three statistical probabilities P(y0) + P(y1) + P(y2) must be less or equal to 1. If y2 is correctly used, P(y2) will change from 0 to 0.3. If A0, A1, and A2 become fuzzy sets, the conclusion is the same.
Consider the tautology “There will be rain or will not be rain tomorrow”. Its logical probability is 1, whereas its statistical probability is close to 0 because it is rarely selected.
We can put T(θj|x) and P(x) into Bayes’ formula to obtain a likelihood function [21]:
P ( x | θ j ) = T ( θ j | x ) P ( x ) T ( θ j ) ,   T ( θ j ) = i T ( θ j | x i ) P ( x i ) .
P(x|θj) can be called the semantic Bayes prediction or the semantic likelihood function. According to Dubois and Prade [45], Thomas [46] and others have proposed similar formulae.
Assume that the maximum of T(θj|x) is 1. From P(x) and P(x|θj), we can obtain
T ( θ j | x ) = T ( θ j ) P ( x | θ j ) P ( x ) ,   T ( θ j ) = 1 / max [ P ( x | θ j ) / P ( x ) ] .
The author [41] proposed the third type of Bayes’ theorem, which consists of the above two formulae. This theorem can convert the likelihood function and the membership function or the truth function from one to another when P(x) is given. Equation (14) is compatible with Wang’s fuzzy set falling shadow theory [41,47].
Figure 2 illustrates the relationship between P(x|θj) and T(θj|x) for a given P(x), where x is an age, the label yj = “Youth”, and θj is a non-fuzzy set and, hence, becomes Aj.
We use Global Positioning System (GPS) data as an example to demonstrate a semantic Bayes prediction.
Example 1.
A GPS device is used in a train, and hence P(x) is uniformly distributed on a line (see Figure 3). The GPS pointer has a deviation. Try to find the most probable position of the GPS device.
The semantic meaning of the GPS pointer can be expressed by
T(θj|x) = exp[− (xxj)2/(2σ2)],
where xj is the pointed position by yj and σ is the Root Mean Square (RMS). For simplicity, we assume that x is one-dimensional.
According to Equation (13), we can predict that the position indicated by the star in Figure 3 is the most probable position. Most people would make the same prediction without using any mathematical formula. It seems that human brains must automatically use a similar method: making predictions according to the fuzzy denotation of yj.
In semantic communication, we often see hypotheses or predictions, such as “the temperature is about 10 °C”, “the time is about seven o’clock”, or “the stock index will go up about 10% next month”. Each one of these may be represented by yj = “X is about xj”. We can also express their truth functions by Equation (15).
The author defines the (amount of) semantic information that is conveyed by yj about xi with the log-normalized-likelihood:
I ( x i ; θ j ) = log P ( x i | θ j ) P ( x i ) = log T ( θ j | x i ) T ( θ j ) .
Introducing Equation (15) into this formula, we have
I ( x i ; θ j ) = log [ 1 / T ( θ j ) ] ( x i x j ) 2 / ( 2 σ 2 ) ,
by which we can explain that this information is equal to the Carnap–Bar-Hillel information minus the squared relative deviation. Figure 4 illustrates this formula.
Figure 4 indicates that, the smaller the logical probability, the more information there is; and, the larger the deviation is, the less information there is. Thus, a wrong hypothesis will convey negative information. These conclusions accord with Popper’s thought (see [32], p. 294).
To average I(xi; θj), we have generalized KL information
I ( X ; θ j ) = i P ( x i | y j ) log P ( x i | θ j ) P ( x i ) = i P ( x i | y j ) log T ( θ j | x i ) T ( θ j ) .
In Equation (18), P(xi|yj) (i = 1,2…) is the sampling distribution, which may be unsmooth or discontinuous.
Theil proposed a generalized KL formula with three probability distributions [37]. However, in Equation (18), T(θj) is constant. If T(θj|x) is an exponential function with e as the base, and then Equation (18) will become the Donsker–Varadhan representation [19,38].
Akaike [4] proved that the Least KL divergence criterion is equivalent to the Maximum likelihood (ML) criterion. Following Akaike, we can prove that the Maximum Semantic Information (MSI) criterion (e.g., the maximum generalized KL information criterion) is also equivalent to the ML criterion.
Definition 3.
Dis a sample with labels {(x(t), y(t))|t = 1 to N; x(t)∈U; y(t)∈V}, which includes n different sub-samples or conditional samples Xj, j = 1,2,…,n. Every sub-sample includes data points x(1), x(2), …, x(Nj)∈U with label yj. If Xj is large enough, we can obtain the distribution P(x|yj) from Xj. If yj in Xj is unknown, we replace Xj with Xand P(x|yj)with P(x|.).
Assume that there are Nj data points in Xj, where the Nji data points are xi. When Nj data points in Xj come from Independent and Identically Distributed (IID) random variables, we have the likelihood
log P ( X j | θ j ) = log P ( x ( 1 ) , x ( 2 ) , , x ( N ) | θ j ) = log i P ( x i | θ j ) N j i = N j i P ( x i | y j ) log P ( x i | θ j ) =   - N j H ( X | θ j ) .
As
I ( X ; θ j ) = i P ( x i | y j ) log P ( x i | θ j ) P ( x i ) = H ( X | θ j ) + i P ( x i | y j ) log P ( x i ) ,
I(X; θj) and logP(Xjj) reach their maxima at the same time that θj changes and, hence, the two criteria are equivalent. It is easy to prove that, when P(x|θj) = P(x|yj), I(X; θj), and logP(Xjj) reach their maxima.
When the sample Xj is very large, letting P(x|θj) = P(x|yj), we can obtain the optimized truth function:
T*(θj|x) = [P*(x|θj)/P(x)]/max[P*(x|θj)/P(x)] = [P(x|yj)/P(x)]/max[P(x|yj)/P(x)].
We can also obtain
T*(θj|x) = P*(θj|x)/max[P*(θj|x)] = P(yj|x)/max[P(yj|x)].
This formula clearly indicates how the semantic channel matches the Shannon channel, which indicates the use rule of Y. It is also compatible with Wittgenstein’s thought: meaning lies in uses (see [39], p. 80).
To average I(X; θj) for different y, we use the Semantic Mutual Information (SMI) formula
I ( X ; θ ) = j P ( y j ) i P ( x i | y j ) log P ( x i | θ j ) P ( x i ) = i j P ( x i ) P ( y j | x i ) log T ( θ j | x i ) T ( θ j ) .
If P(x|θj) = P(x|yj) or T(θj|x)∝P(yj|x) for different yj, the SMI will be equal to the Shannon Mutual Information (SHMI).
Introducing Equation (15) into the above formula, we have
I ( X ; θ ) = H ( θ ) H ( θ | X )   =   j P ( y j ) log T ( θ j ) j i P ( x i , y j ) ( x i x j ) 2 / ( 2 σ j 2 ) .
It is clear that the maximum SMI criterion is a special Regularized Least Squares (RLS) criterion [33]. H(θ) is the regularization term and H(θ|X) is the relative error term. However, H(θ) only penalizes the deviations without penalizing the means. The importance of this is that the maximum SMI criterion is also compatible with the ML criterion.

2.1.2. From the Rate-Distortion Function R(D) to the Rate-Verisimilitude Function R(G)

The function R(G) will be used to explain the convergence of the CM algorithms for the MMI classification and mixture models.
Shannon proposed the rate-distortion function R(D) [30]. R(G) [25] is a new version of R(D). In R(D), R is the information rate and D is the upper limit of average distortion. R(D) means that, for given D, R(D) is the minimum of SHMI I(X; Y).
The rate distortion function with parameter s (see [48], p. 32) includes two formulae:
D ( s ) = i j d i j P ( x i ) P ( y j ) exp ( s d i j ) / λ i , R ( s ) = s D ( s ) i P ( x i ) ln λ i ,
where λ i = j P ( y i ) exp ( s d y i ) is the partition function.
Let dij be replaced with Iij = I(xi; θj) = log[T(θj|xi)/T(θj)] = log[P(xij)/P(xi)] and G be the lower limit of I(X; θ). The information rate for given G and source P(X) is defined as
R ( G ) = min P ( Y | X ) : I ( X ; θ ) G I ( X ; Y )
Popper [32] proposed using verisimilitude, instead of correctness, to evaluate a hypothesis. Verisimilitude includes both correctness and precision. Hence, I(xi; θj) can be a good measure for the verisimilitude of yj reflecting xi; therefore, we call R(G) the rate-verisimilitude function.
Following the derivation of R(D) ([48], p. 31), we obtain
G ( s ) = i j I i j P ( x i ) P ( y j ) 2 s I i j ) / λ i = i j I i j P ( x i ) P ( y j ) m i j s / λ i , R ( s ) = s G ( s ) i P ( x i ) log λ i , m i j = T ( θ j | x i ) / T ( θ j ) ,   λ i = j P ( y j ) m i j s ,
where mij = T(θj|xi)/T(θj) = P(xij)/P(xi) is the normalized likelihood and λi = ∑jP(yj)mijs. The shape of any R(G) function is a bowl-like curve with second derivative > 0, as shown in Figure 5.
In Figure 5, s = dR/dD. When s = 1, R is equal to G, which means that the semantic channel matches the Shannon channel. G/R indicates the efficiency of semantic communication. In Section 3.4, we will see that solving a mixture model is equivalent to finding a parameter set θ that maximizes G/R, such that G/R is close to 1 or GR.
When s→∞, R and G both reach their maxima Rmax and Gmax. As s increases, the TPFs P(yj|x), j = 1, 2, …, n, will become steeper and the Shannon channel will have less noise. Hence, R and G will increase. This property of R(G) can be used to prove the convergence of the CM iteration algorithm for the MMI classification of unseen instances.
The function R(G) is different from R(D). For a given R, there exists a maximum value G+ and a minimum value G; G is negative, which means that we also need certain objective information R to bring a certain information loss |G| to enemies. When R = 0, G is negative, which means that if we listen to someone who randomly predicts, the information that we already have will be reduced.
The function R(G) was mainly developed for image compression, according to visual discrimination [25]. However, it can also be used for convergence proofs of MMI classification and mixture models.

2.2. From Traditional Bayes Prediction to Logical Bayesian Inference

2.2.1. Traditional Bayes Prediction, Likelihood Inference (LI), and Bayesian Inference (BI)

To understand LBI better, we will first review Traditional Bayes Prediction (TBP), LI, and BI. Note that “Bayes prediction” means the prediction according to Bayes’ theorem, which is different from “Bayesian prediction” [3] that was made by Bayesians.
We call probability prediction with the TPF P(yj|x) TBP. For given P(x) and P(yj|x), we can make a probability prediction
P(x|yj) = P(x) P(yj|x)/P(yj).
When P(yj|x) is replaced with kP(yj|x), where k is a constant, P(x|yj) is the same, because
P ( x ) k P ( y j | x ) i P ( x i ) k P ( y j | x i ) = P ( x ) P ( y j | x ) i P ( x i ) P ( y j | x i ) = P ( x | y j ) .
Using this formula, we can easily explain that a truth function that is proportional to a TPF can be used for the same probability prediction.
For given P(yj), P(x|yj), and P(x), we can obtain the predictive model
P(yj|x) = P(yj) P(x|yj)/P(x).
After P(x) is changed, we can still use P(yj|x) to make a new probability prediction, in most cases where the Shannon channels are stable.
We use the medical test (or signal detection) as an example to explain how a TPF or a Shannon channel can be used as a predictive model.
Definition 4.
Let z be an observed feature for an unseen instance (see Figure 1) and Z be a random variable, taking a value z∈C = {z1, z2, …}. For unseen instance classification, x denotes a true class or true label.
Assume that we classify every unseen instance with an unseen true label x, according to its observed feature zC. That is, we provide a classifier y = f(z) to obtain a label y for z (see Figure 6).
We use the HIV test to explain that the TPF can be used for probability prediction, with different P(x). For an infected subject x1, the conditional probability P(y1|x1) of y1 = positive is called sensitivity, which means the true positive rate. For an uninfected subject x0, the conditional probability P(y0|x0) of y0 = negative is called specificity, which means the true negative rate [49]. The sensitivity and specificity ascertain a Shannon channel, as shown in Table 1.
Example 2.
Calculate P(x1|y1) using P(y1|x) in Table 1 for P(x1) = 0.0001, 0.002 (for normal people), and 0.1 (for high-risk crowd).
Solution. 
Using Equation (28), for P(x1) = 0.0001, 0.002, and 0.1, we have P(x1|y1) = 0.084, 0.65, and 0.99, respectively.
While using LI, it is not easy to solve Example 2. Nevertheless, when x is one of many different values and the sample size is not large enough, the TPFs cannot be smooth and, hence, we cannot use a TPF to obtain a smooth P(x|yj). This is why we use LI, which uses parameters to construct smooth likelihood functions. Using Maximum Likelihood Estimation (MLE), we can use a sample X to train a likelihood function to obtain the best θj:
θ j * = arg max θ j P ( X | θ j ) = arg max θ j [ i P ( x i | . ) log P ( x i | θ j ) ] ,
where P(xi|.) indicates that yj is unknown. The main defect of LI is that LI cannot make use of prior knowledge and that the optimized likelihood function will be invalid when P(x) is changed.
Subjective Bayesians developed Bayesian Inference (BI) to make use of prior knowledge [2,3]. They brought the prior distribution P(θ) of θ into Bayes’ Theorem to obtain the Bayesian posterior
P ( θ | X ) = P ( θ ) P ( X | θ ) P θ ( X )   ,   P θ ( X ) = j P ( θ j ) P ( X | θ j ) ,
where Pθ(X) is the normalized constant related to θ and P(θ|X) is the posterior distribution of θ or the Bayesian posterior. Using P(θ|X), we can derive the Maximum A Posterior estimation:
θ j * = arg max θ j P ( θ j | X j ) = arg max θ P ( θ j ) P ( X j | θ j )   = arg max θ j [ i P ( x i | . ) log P ( x i | θ j ) + log P ( θ j ) ] ,
where Pθ(X) is neglected.
BI has some advantages, such as
  • it is especially suitable to cases where Y is a random variable for a frequency generator, such as a dice;
  • as the sample size increases, the distribution P(θ|X) will gradually shrink to some θj* coming from the MLE; and,
  • BI can make use of prior knowledge better than LI.
However, BI also has some disadvantages:
  • the probability prediction from BI [3] is not compatible with traditional Bayes prediction;
  • P(θ) is subjectively selected; and,
  • BI cannot make use of the prior of X.
If we try to use BI to solve Examples 1 and 2, we will find that the Bayesian posterior is not as good as TPF P(yj|x). Therefore, to make use of the prior of X, we still want a parameterized TPF P(θj|x).

2.2.2. From Fisher’s Inverse Probability Function P(θj|x) to Logical Bayesian Inference (LBI)

De Morgan first called TPF P(yj|x) the “inverse probability”, with respect to Laplace’s method of probability [2]. The corresponding direct probability is P(x|yj). Later, Fisher called the likelihood function P(x|θj) the direct probability and the parameterized TPF P(θj|x) the inverse probability [2]. We use θj (instead of θ) and x (instead of xi) to emphasize that θj is a constant and x is a variable, and hence P(θj|x) should be a function. In the following, we call P(θj|x) the Inverse Probability Function (IPF). According to Bayes’ theorem,
P(θj|x ) = P(θj) P(x|θj)/P(x),
P(x|θj) = P(xi) P(θj|x)/P(θj).
The IPF P(θj|x) can make use of the prior knowledge P(x) well. When P(x) is changed into P’(x), we can still obtain P’(x|θj) from P’(x) and P(θj|x).
When n = 2, we can easily construct P(θj|x), j=1,2, with parameters. For instance, we can use a pair of Logistic (or Sigmoid) functions as the IPFs. Unfortunately, when n > 2, it is hard to construct P(θj|x), j=1,2,…,n, because there is a normalization limitation ∑j P(θj|x) = 1 for every x. This is why a multiclass or multilabel classification is often converted into several binary classifications [51,52].
It seems that we may use the Softmax function as the IPF P(θj|x) for n > 2. However, this function is not compatible with P(yj|x), especially when two or more classes are not exclusive, the Softmax function does not work.
Using P(θj|x) and P(yj|x) as predictive models also has another disadvantage: In many cases, we can only know P(x) and P(x|yj) without knowing P(θj) or P(yj), such that we cannot obtain P(yj|x) or P(θj|x). Nevertheless, we can obtain a truth function T(θj|x) in these cases. In LBI, there is no normalization limitation and, hence, it is easy to construct a group of truth functions and train them with P(x) and P(x|yj), j=1,2,…,n, without P(yj) or P(θj). This is an important reason why we use LBI.
When a sample Xj is very large, we can directly obtain T*(θj|x) from Equation (21). For a size-limited sample, we can use the generalized KL information formula to obtain
T * ( θ j | x ) = arg max T ( θ j | x ) I ( X ; θ j ) = arg max T ( θ j | x ) i P ( x i | y j ) log T ( θ j | x i ) T ( θ j ) = arg max T ( θ j | x ) i P ( x i | y j ) log P ( x i | θ j ) P ( x i ) .
This formula is the main formula that is used in LBI. LBI provides the Maximum Semantic Information Estimation (MSIE):
θ j * = arg max θ j I ( X ; θ j ) = arg max θ j [ i P ( x i | . ) log [ P ( x i | θ j ) / P ( x i ) ] = arg max [ θ j i P ( x i | . ) log T ( θ j | x i ) log T ( θ j ) ] ,
which is compatible with MLE. If the samples are large enough, the MSIE, MLE, and MAP are equivalent.
We suggest using the truth function as the predictive model or the inferential tool for LBI in some cases, as it has the following advantages:
  • we can use an optimized truth function T*(θj|x) to make probability predictions for different P(x) just as we would use P(yj|x) or P(θj|x);
  • we can train a truth function with parameters by a sample with small size, as we would train a likelihood function;
  • the truth function indicates the semantic meaning of a hypothesis and, hence, is easy for us to understand;
  • it is also the membership function, which indicates the denotation of a label or the range of a class and, hence, is suitable for classification;
  • to train a truth function, we only need P(x) and P(x|yj), without needing P(yj) or P(θj); and,
  • letting T(θj|x)∝P(yj|x), we construct a bridge between statistics and logic.
The CM algorithms further reveal these advantages.

3. Methods II: The Channel Matching (CM) Algorithms

3.1. CM1: To Resolve the Multilabel-Learning-for-New-P(x) Problem

3.1.1. Optimizing Truth Functions or Membership Functions

We use CM1 to denote the basic matching algorithm, in which the semantic channel matches the Shannon channel, and membership functions or truth functions are used as learning functions.
Assume that x is an age, yj is a label “Youth”, and θj is a fuzzy set {x|x is a youth}. From population statistics, we can obtain a population age distribution P(x) and a posterior distribution P(x|yj).
We can directly use Equation (21) to obtain the optimized membership function T*(θj|x) without parameters if the sample is very large and, hence, the distributions P(x) and P(x|yj) are smooth. If P(x) and P(x|yj) are not smooth, we can use Equation (36) to obtain T*(θj|x) with parameters. Without needing P(yj), in CM1, every label’s learning for T*(θj|x) is independent.
If the given sampling distribution is a TPF P(yj|x), we may assume that P(x) is flat. Subsequently, Equation (36) becomes
T * ( θ j | x ) = arg max T ( θ j | x ) i P ( y j | x i ) k P ( y j | x k ) log T ( θ j | x i ) k T ( θ j | x k ) .
If P(yj|x) is smooth, we can use Equation (22) to obtain T*(θj|x) without parameters. For multilabel learning, we can directly obtain a group of truth functions from a Shannon channel P(Y|X) or a sample with distribution P(x,y). However, while using popular multilabel learning methods, such as Binary Relevance, we have to prepare several samples for several Logistic functions.
When P(x) is changed, T*(θj|x) is still useful for making semantic Bayes predictions.

3.1.2. For the Confirmation Measure of Major Premises

We use “degree of confirmation” to denote “degree of belief” supported by evidence or samples.
Bayesians use “degree of belief” to explain the subjective probability of a hypothesis. This degree of belief is between 0 and 1. However, researchers of induction use “degree of belief” to evaluate if–then statements or major premises. This degree of belief should be between −1 and 1. In this paper, we take “degree of belief” between −1 and 1 for the subjective evaluation of if–then statements. We know that the correlation coefficient between the two random variables is also between −1 and 1. The difference is that if–then statements are asymmetric; there is more than one major premise and degree of belief between the instance X and the hypothesis Y.
Now, we take the medical test as an example to explain how to use truth functions to replace TPFs or how to use the semantic channel to replace the Shannon channel for probability predictions.
From the Shannon channel in Table 1, we can derive the semantic channel, as shown in Table 2. Assume that T(y1|x1) = T(y0|x0) = 1 and T(y1|x0) = T(y0|x1) = 0 for non-fuzzy hypotheses. Two truth functions for corresponding fuzzy hypotheses are
T(θ1|x) = b1′ +b1T(y1|x),
T(θ0|x) = b0′ +b0T(y1|x),
where b1 = b(y1x1), which is the degree of belief of major premise MP1 = y1x1 = “if Y = y1 then X = x1”, and b1 ’ = 1 − |b1| means the degree of disbelief of MP1 and the ratio of a tautology in y1. Likewise, b0 = b(y0x0) and b0′ = 1 − b0.
According to Equations (21) and (22), the two optimized degrees of disbelief are
b1’* = P(y1|x0)/ P(y1|x1) = [P(x0|y1)/P(x0)]/[P(x1|y1)/P(x1)],
b0’* = P(y0|x1)/P(y0|x0) = [P(x1|y0)/P(x1)]/[P(x0|y0)/P(x0)].
For given y1, we can use b1’* and different P(x) to make the semantic Bayes prediction:
P(x1|θ1) = P(x1)/[P(x1) + b1′*P(x0)],
P(x0|θ1) = b1′*P(x0) /[P(x1) + b1 ’*P(x0)].
This prediction is equivalent to the traditional Bayes prediction with the TPF P(yj|x). We can still make the prediction, even if we only know P(x|y1) and P(x) without knowing P(y1). It is easy to verify that, while using Equation (43) to solve Example 2, the results are the same as those that were obtained from the traditional Bayes prediction.
We will find it is not easy for the model to fit different P(x) if we try to use LI or BI to obtain a predictive model for medical tests.
In comparison with the Shannon channel in Table 1, the semantic channel in Table 2 is easier to understand and remember. To remember P(y1|x), we need to remember two numbers; whereas, to remember T*(θ1 |x), we only need to remember one number b1′*.
In [41], the author provided two formulae for positive and negative degrees of confirmation. These two formulae can be merged into a new formula:
b 1 * = b * ( y 1 x 1 ) = P ( y 1 | x 1 ) P ( y 1 | x 0 ) max ( P ( y 1 | x 1 ) , P ( y 1 | x 0 ) ) = sensitivity - ( 1 - specificity ) max ( sensitivity , 1 - specificity ) = True _   positive _   rate False _ positive _ rate max ( True _   positive _   rate ,   False _ positive _ rate ) = C L 1 C L 1 max ( C L 1 , C L 1 ) ,
where CL1 = P(y1|x1)/[P(y1 |x0) + P(y1 |x1 )] is the confidence level of MP1 and CL1 ’ = 1 − CL1. As CL1 changes from 0 to 1, b1* changes from −1 to 1, as shown in Figure 7.

3.1.3. Rectifying the Parameters of a GPS Device

If we do not know the real parameters of a GPS device or are suspicious of the parameters claimed by the producer, we can assume
T(θj|x) = exp[− |x − (xjx)|2/(2σ2)],
where x is a two-dimensional vector. Subsequently, we can use a sample to find the parameters Δx (the systematic deviation) and σ. We may obtain the sample by driving a car with the GPS device around a big square and recording the relative positions x’ = x − xj. From many relative deviations, we can obtain a sampling distribution P(x’|yj). As we are driving on a big square, P(x) should be flat. Afterwards, we can use the generalized KL information formula to obtain the optimized parameters Δx* and σ*. Subsequently, we replace yj with yk = ”X is about xk”, where xk = xj + Δx*.
Assuming that the GPS device is often faulty, we can also use
T(θj|x) = b exp[−|x − (xj + Δx)|2/(2σ2)] + 1 − b
as the learning function to obtain the degree of confirmation b* of the GPS device.
If one tries to use the inverse likelihood function P(θj|x) or the Bayesian posterior P(θ|X) for the above task and probability prediction (see Figure 3), they will find that it is difficult to do, because they only have prior knowledge P(x) from a GPS map, without prior knowledge P(y) or P(θ).

3.2. CM2: The Semantic Channel and the Shannon Channel Mutually Match for Multilabel Classifications

CM2 includes two steps:
  • Matching I: Let the semantic channel match the Shannon channel or use CM1 for multilabel learning; and,
  • Matching II: Let the Shannon channel match the semantic channel by using the Maximum Semantic Information (MSI) classifier.
Both steps use the MMI or ML criterion.
For multilabel learning, we may train every label by Equation (36) or Equation (38). We may also train a label yj with membership function T(θj|x) and its negative label yj’ with membership function 1 − T(θj|x), at the same time, as in the popular method of [51,52], by
T * ( θ j | x ) = arg max T ( θ j | X ) [ I ( X ; θ j ) + I ( X ; θ j c ) ]   = arg max T ( θ j | x ) i [ P ( x i | y j ) log T ( θ j | x i ) T ( θ j ) + P ( x i | y j ) log 1 T ( θ j | x i ) 1 T ( θ j ) ] ,
where θjc is the complementary set of θj. The obtained T*(θj|x) may be a Logistic function, which will cover a larger area of U, in comparison with T*(θj|x) from Equation (36) or Equation (38).
If there are examples with one instance and several labels, or with several instances and one label, we may split such an example into several single-instance and single-label examples, in the manner of the popular method in [51]. Subsequently, we can obtain the Shannon channel P(Y|X) for multilabel learning.
For classifications where instances are visible, x is given. In Matching II, the MSI classifier is
y j * = h ( x ) = arg max y j log I ( x ; θ j ) = arg max y j log [ T ( θ j | x ) / T ( θ j ) ]
While using T(θj), we can overcome the class-imbalance problem [50] and reduce the rate of failure to report smaller probability events. If T(θj|x) ∈ {0,1}, the semantic information measure becomes Carnap and Bar-Hillel’s semantic information measure, and the classifier becomes the minimum logical probability classifier:
y j * = h ( x ) = arg max y j   with   T ( A j | x ) = 1 log [ 1 / T ( A j ) ] = arg min y j   with   T ( A j | x ) = 1 log T ( θ j )
This criterion encourages us to select a compound label with smaller denotation.
For unseen instance classifications or uncertain x, we only have knowledge of P(x|z). Afterwards, the MSI classifier becomes
y j * = f ( z ) = arg max y j i P ( x i | z ) log T ( θ j | x i ) T ( θ j ) .
To simplify multilabel learning, we may train fewer atomic labels and use them and the fuzzy logic, which is compatible with Boolean algebra [22] to produce the membership function of a compound label for multilabel classifications [44].
In the popular method for multilabel classifications while using the Bayes classifier or the MPP criterion, for different x the classifier compares two IPFs P(θj|x) and P(θk|x), such as two Logistic functions, to select a label with greater IPF. This method is not compatible with the information criterion or the likelihood criterion.

3.3. CM3: the CM Iteration Algorithm for MMI Classification of Unseen Instances

We use CM3 to denote the CM iteration algorithm, which repeats the two matching steps (i.e., Matching I and Matching II). CM2 is not an iterative algorithm; nevertheless, CM3 is. This algorithm is used for MMI classification, for which the most popular method is Gradient Decent.
We use the medical test, as shown in Figure 6, as an example to explain the problem with the MMI classification of unseen instances.
We need to optimize z’ for the MMI. The problem is that, without the classifier f(z), we cannot express the mutual information I(X; Y); whereas, without the expression of mutual information, we cannot optimize the classifier f(z). This problem is also met by MLE for uncertain Shannon channels. To resolve this problem, researchers generally use parameters to construct partition boundaries and then use Gradient Descent or the Newton method to search for the best MMI parameters. The CM iteration algorithm for MMI classification is different. It uses numerical values to express boundaries and information gain functions (e.g., reward functions). It repeatedly updates information gain functions and boundaries to achieve MMI.
Let Cj be a subset of C and yj = f(z|zCj); hence, S = {C1, C2, …} is a partition of C. Our aim is, for given P(x, z) from D, to find the optimized S, as given by
S * = arg max S   I ( X ; θ | S ) = arg max S j i P ( C j ) P ( x i | C j ) log T ( θ j | x i ) T ( θ j ) .
Matching I: Let the semantic channel match the Shannon channel.
First, we obtain the Shannon channel for a given S:
P ( y j | x ) = z k C j P ( z k | x ) ,   j = 1 , 2 , , n
From this Shannon channel, we obtain the semantic channel T(θ|X) and the semantic information I(xi; θj). Subsequently, for given z, we obtain the information gain functions:
I ( X i ; θ j | z ) = i P ( x i | z ) I ( x i ; θ j ) ,   j = 0 , 1 , , n ,
which are some curved surfaces over a two-dimensional feature space, as U is two-dimensional. We may directly let I(xi; θj) = I(xi; yj) = log[P(yj|x)/P(yj)]. However, with the notion of the semantic channel, we can understand this algorithm and better prove its convergence.
Matching II: Let the Shannon channel match the semantic channel by the classifier
y j * = f ( z ) = arg max y j   I ( X i ; θ j | z ) ,   j = 0 , 1 , , n .
Repeat Matching I and II until S does not change. The convergent S is the S* we seek.
Using Matching II for the optimization of the Shannon channel can reduce noise. We can understand the two matching steps in this way: Matching I is for the reward function; Matching II is for the Bayes decision.
For a given source P(X), a semantic channel ascertains an R(G) function. An improved R(G) function has a higher matching point; that is, where R(G) = G. CM3 finds this matching point, which is also the point that attains Rmax and Gmax (see Figure 8).
We can prove that the iteration will converge. In the iterative process, the coordinate (G, R) changes, as follows:
Start Matching   I - 1 st a Matching   II - 1 st b Matching   I - 2 nd c Matching   II - 2 nd d Matching   I - 3 rd e Matching   II - 3 rd f
This process continues until Matching II cannot improve R and G.
The coordinate (G, R) can converge to (Gmax, Rmax), as every Matching I procedure increases G and every Matching II procedure increases G and R, and the maxima of G and R are finite.
Matching II can always find any best partition for given I(X; yj|z), j=1,2,…, because it checks every z to see which of the I(X; yj|z), j=1,2…, is the maximum.
We can understand the CM iteration algorithm in the following way: The function R(G) is like a ladder, and the coordinate (G, R) is like a climber. In Matching I, (G, R) creates a ladder and then moves on it. In Matching II, it climbs up to the top of the ladder. Afterwards, the process is repeated, creating new ladders until (Gmax, Rmax) is reached.

3.4. CM4: the CM-EM Algorithm for Mixture Models

We use CM4 to denote the CM-EM Algorithm: An Improved Expectation-Maximization (EM) Algorithm for mixture models.
In CM3, Matching II is used to find the maximum R, whereas, in CM4, Matching II is used to find the maximum information efficiency G/R or minimum R − G.
CM4 is based on a different convergence theory of the mixture models. The popular convergence theory of the EM algorithm explains that we can maximize the incomplete data log-likelihood LX(θ) by maximizing the complete data log-likelihood Q, whereas the convergence theory of the CM-EM algorithm explains that we can maximize LX(θ) by maximizing the information efficiency G/R.
The EM algorithm [53] for mixture models has been shown to often result in slow or invalid convergence [54,55]. We can improve the EM algorithm by letting the semantic channel and the Shannon channel mutually match. The difference is that Matching II is used to find the minimum of the Shannon mutual information R.
If a probability distribution Pθ(x) comes from the mixture of n likelihood functions, such as
P θ ( x ) = j = 1 n P ( y j ) P ( x | θ j ) ,
we call Pθ(x) a mixture model. If every predictive model P(x|θj) is a Gaussian function, then Pθ(x) is a Gaussian mixture. In the following, we use n = 2 to discuss the algorithms for mixture models.
Assume that P(x) comes from the mixture of two true model P(x|θ1 *) and P(x|θ2*) with ratios of P*(y1) and P*(y2) = 1 − P*(y1); that is,
P(x)=P*(y1)P(x|θ1*)+P*(y2)P(x|θ2*).
We only know P(x) and n = 2. We can use the guessed parameters and mixture ratios to obtain
Pθ(x) = P(y1)P(x|θ1) + P(y2)P(x|θ2).
Subsequently, we have the observed data log-likelihood
L X ( θ ) = N i P ( x i ) log P θ ( x i ) = N H θ ( X ) ,
and the relative entropy or KL divergence:
H ( P P θ ) = i P ( x i ) log P ( x i ) P θ ( x i ) = H θ ( X ) H ( X ) .
If the two distributions P(x) and Pθ(x) are close to each other, such that the relative entropy is close to 0, for example, less than 0.001 bit for a huge sample or 0.01 bit for a sample with size = 1000, then, we may say that our guess is right. Therefore, our task is to change θ and P(y) to maximize the likelihood LX(θ) = logP(X|θ) or to minimize the relative entropy H(P‖Pθ).
The main formula of the EM algorithm for mixture models can be described, as follows:
Q = N i j P ( x i ) P ( y i | x i ) log P ( x i , y j | θ ) = L X ( θ ) + N i j P ( x i ) P ( y j | x i ) log P ( y j | x i ) ,
where Q =NH(X, Y|θ) is called the complete data log-likelihood and P(yj|x) is from Equation (63). There exists
LX(θ) = Q + H,
where H = − NH(Y|X,θ) is a Shannon conditional entropy. A popular convergence theory of the EM algorithm explains that we can increase LX(θ) by increasing Q.
The steps in the EM algorithm are:
E-step: Write the conditional probability functions (e.g., the Shannon channel):
P ( y j | x ) = P ( y j ) P ( x | θ j ) / P θ ( x ) , P θ ( x ) = j P ( y j ) P ( x | θ j ) .
M-step: Improve P(y) and θ to maximize Q. If Q cannot be further improved, then end the iteration process; otherwise, go to the E-step.
Neal and Hinton [56] proposed an improved EM algorithm, the Maximization–Maximization (MM), in which Q is replaced with F = Q + H(Y) and F is maximized in both steps.
Almost all of the EM algorithm researchers believe that Q and logLX(θ) are positively correlated and that the E-step does not decrease Q; nevertheless, this is not true. The author found that Q may decrease in some E-steps; and, Q and F should decrease in some cases [42].
Using the CM algorithm to improve the EM algorithm, we have developed an algorithm, the CM-EM algorithm, for better convergence.
The CM-EM algorithm includes three steps:
E1-step: Construct the Shannon channel. This step is the same as the E-step of the EM algorithm.
E2-step: Repeat the following three equations until P+1(y) converges to P(y):
P + 1 ( y j ) = i P ( x i ) P ( y j | x i ) = i P ( x i ) P ( y j | x i ) ,   j = 1 , 2 , ; P ( y j ) = P + 1 ( y j ) ; P ( y j | x i ) = P ( x i | θ j ) P ( y j ) / k P ( y k ) P ( x i | θ k ) ,   i = 1 , 2 , ; j = 1 , 2 ,
If H(P‖Pθ) is less than a small value, then end the iteration.
MG-step: Optimize the parameters θj+1 of the likelihood function in log(.) to maximize G:
G = I ( X ; θ ) = i j P ( x i ) P ( x i | θ j ) P θ ( x i ) P ( y j ) log P ( x i | θ j + 1 ) P ( x i )
Then, go to the E1-step.
As G reaches a maximum when P(x|θj+1)/P(x) = P(x|θj)/Pθ(x), the new likelihood function is
P(x|θj+1) = P(x)P(x|θj)/Pθ(x).
Without the E2-step, P(x|θj+1) above is, in general, not normalized [57]. For Gaussian mixtures, we can easily obtain new parameters:
μ j + 1 = i P ( x i ) P ( x i | θ j ) / P θ ( x i ) ,   j = 1 ,   2 , , n ; σ j + 1 = { i P ( x i ) [ P ( x i | θ j + 1 ) μ j + 1 ] 2 } 0.5 ,   j = 1 ,   2 , n .
If the likelihood functions are not Gaussian distributions, we can find optimized parameters by searching the parameter space, using methods such as Gradient Descent.
To prove the convergence of the CM-EM algorithm, we may make use of the properties of the function R(G):
  • the function R(G) is concave and R(G) − G has the exclusive minimum 0 at R(G) = G [25]; and,
  • R(G) − G is close to the relative entropy H(P‖Pθ).
After the E1-step, the Shannon mutual information I(X; Y) becomes
R = i j P ( x i ) P ( x i | θ j ) P θ ( x i ) P ( y j ) log P ( y j | x i ) P + 1 ( y j )
We define
R = i j P ( x i ) P ( x i | θ j ) P θ ( x i ) P ( y j ) log P ( x i | θ j ) P θ ( x i )
It is easy to prove that R″ − G = H(P‖Pθ). Hence,
H ( P P θ ) = R G = R G + H ( Y Y + 1 )
where
H ( Y + 1 Y ) = j P + 1 ( y j ) log [ P + 1 ( y j ) / P ( y j ) ]
Proving that Pθ(X) converges to P(X) is equivalent to proving that H(P‖Pθ) converges to 0. As the E2-step forces R = R″ and H(Y+1Y) = 0, we only need to prove that every step minimizes R − G. It is evident that the MG-step minimizes R − G, because this step maximizes G without changing R. The remaining problem is how to prove that RG is minimized in the E1- and E2-steps. Learning from the variational and iterative methods that Shannon [30] and others [48] have used for analyzing the rate-distortion function R(D), we can optimize P(y|x) and P(y), respectively, to minimize R − G = I(X; Y) − I(X; θ). As P(Y|X) and P(Y) are interdependent, we can only fix one to optimize the other; the E2-step is for exactly this purpose. For the detailed convergence proof, see [57].

4. Results

4.1. The Results of CM2 for Multilabel Learning and Classification

We used a prior distribution P(x) and a posterior distribution P(x|yj) to optimize a truth function in order to obtain T*(θj|x), as shown in Figure 9.
For P(x) and P(x|yj), we first used a Gaussian random number generator to produce two samples, S1 and S2. Both sample sizes were 100,000. The data with distribution P(x) was a part of S1. We have
P ( x ) { k exp [ ( x / 40 ) 2 ] , 0 x 86 ; 0 , otherwise .
where k is a normalizing constant. S2 had distribution P2(x). P(x|yj) was produced from P2(x) and the following truth function:
T ( θ 2 | x ) = { exp [ ( x 18 ) 2 / ( 2 × 3 2 ) ] ,   x < 18 ; 1 ,   18 1 25 ; exp [ ( x 25 ) 2 / ( 2 × 4 2 ) ] ,   x > 25 .  
This meant that P(x|yj) = P2(x|θ2) = P2(x)T(θ2|x)/T(θ2).
Subsequently, we obtained T*(θj|x) from P(x) and P(x|yj). If we directly used the formula in Equation (21), T*(θj|x) would not be smooth. We set a truth function with parameters
T ( θ j | x ) = { exp [ ( x μ j 1 ) 2 / ( 2 σ j 1 2 ) ] ,   x < μ j 1 ; 1 ,   μ j 1 1 μ j 2 ; exp [ ( x μ j 2 ) 2 / ( 2 σ j 2 2 ) ] ,   x > μ j 2 .  
Afterwards, we used the Generalized KL information formula to optimize T(θj|x) to obtain smooth T*(θj|x). If S2 = S1, then T*(θj|x) = P(x|yj)/P(x)/max[P(x|yj)/P(x)] = T(θ2|x).
Figure 10 shows the MSI classification of ages for given prior distribution P(x) and the truth functions of five labels. The five labels were (y1, y2, y3, y4, y5)=(“Adult”, ”Child”, “Youth”, “Middle age”, “Old”). Figure 10a shows the truth functions of the five labels.
Among these truth functions, each of T(θ3|x) and T(θ4|x) were constructed by two logistic functions; each of others was a logistic function. The python 3.6 source file with parameters for Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15 can be found in Appendix A.
We could also treat these truth functions as the learning functions P(θj|x) that were obtained from the popular methods, and then use the Bayesian classifier or the Maximum Posterior Probability criterion to classify them.
In Figure 10a, P(x) was assumed: P(x) = k[1 − 1/exp[− 0.1(x − 70)] for x > 0, where k was a normalizing constant. From the five labels, we also had the compound labels y0 = y1′, y6 = y3y1′, and y7 = y3y1.
Figure 10b shows the effect of the MSI classifier.
Figure 10 indicates that the Maximum Posterior Probability (MPP) criterion and the MSI criterion resulted in different classifications. Using the MPP criterion, we only selected y0 = ”Non-adult” or y1 = “Adult”, for most ages. However, while using the MSI criterion, we selected y2, y6, y7, y4, and y5, in turn, as the age x increased. The MSI criterion encouraged us to use more labels with smaller logical probabilities. For example, if x was between 11.2–16.6, we should use the label y6 = y3y1′ = ”Youth” and “Non-adult”. However, for most x, CM2 did not use redundant labels, as Binary Relevance [52] does. For example, while using the MSI criterion, we did not add the label “Non-youth” to x = 60, with the label “Old” already.

4.2. The Results of CM3 for the MMI classifications of Unseen Instances

CM3 was tested by many examples.
Example 3.
The value of z changed from 0 to 100 with step length 1. Two Gaussian distributions P(z|x0) and P(z|x1) had parameters μ0 = 30, μ1 = 70, σ0 = 15, and σ1 = 10; P(x0) = 0.8 and P(x1) = 0.2. The initial partitioning point z’ was 50.
The iterative process: Matching II-1 obtained z’ = 53; Matching II-2 obtained z’ = 54; Matching II-3 obtained z* = 54.
The following is a two-dimensional example.
Example 4.
(See Figure 11) There were three classes. The left two classes were two Gaussian distributions—P(z|x0) and P(z|x1)—and the right one was a mixture of two Gaussian distributions—P(z|x21) and P(z|x22). The sample size was 1000. See Table 3 for the parameters of the four Gaussian distributions.
Two vertical lines made the initial partition. Figure 11 shows the iterative process.
After two iterations, the mutual information I(X; Y) was 1.0434 bits. The convergent MMI was 1.0435 bits. Only two iterations were required for the mutual information to reach 99.99% of the convergent MMI.
The author used a very bad initial partition to test the reliability of CM3. The convergence was also very fast in this case (see Figure 12).
The author used the above example with different parameters and different initial partitions to test CM3. All of the iterative processes were fast and valid. In most cases, only 2–3 iterations were required for the mutual information to surpass 99% of the MMI.

4.3. The Results of CM4 for Mixture Models

The following three examples show that the CM-EM algorithm can outperform both the EM and MM algorithms.
Ueda and Nakano [54] proposed an example to show that local or invalid convergence is inevitable in the EM algorithm because some initial parameters result in a local maximum of Q. This invalid convergence was also verified by Marin et al. [55]. Their example is as follows:
Example 5.
A mixture model has two Gaussian components. The true model parameters are (µ1*, µ2*, σ1*, σ2*, P*(y1)) = (100, 125, 10, 10, 0.7). The invalid convergence is centered on the µ1–µ2 plane at (µ1, µ2) = (115, 95), where Q reaches its local maximum.
We used this example with initial parameters (µ1, µ2, P(y1), σ1, σ2) = (115, 95, 0.5, 10, 10) to test the CM-EM algorithm, in order to see whether (µ1, µ2,) can converge to (µ1*, µ2*)=(100, 125). Figure 13 shows the result, which indicates that LX(θ) converged to its global maximum under the CM-EM algorithm.
The following example is to compare the iteration numbers of different algorithms. Neal and Hinton [56] used this example to compare their Maximization–Maximization (MM) algorithm with the EM algorithm. Now, we use the same example to compare the CM-EM algorithm with the EM and MM algorithms.
Example 6.
Table 4 shows the true and initial parameters, including mixture ratios. The transforming formula was x = 20(x’ − 50), where x’ is an original data point and x is a data point used in Table 4. It was assumed that P(x) comes from two Gaussian functions with real parameters. Using the CM-EM algorithm, we obtained H(P‖Pθ) = 0.00072 bit after nine E1- and E2-steps and eight MG-steps.
The iterative process is shown in Figure 14.
The author also used a sample whose size was 1000 to produce P(x) to test the CM-EM algorithm. Table 5 shows the iteration numbers and the final parameters for the three different algorithms.
These data show that iterations that the CM-EM needed was less than half of iterations that the EM or MM algorithm needed.
Example 7.
A mixture of six components in two-dimensional feature space, as shown in Figure 15, were tested. The sample size was 1000. The true and initial parameters can be found in Appendix A.
This example was to test whether CM4 could correctly converge for seriously overlapping components. The upper two pairs of components could quickly converge, whereas convergence was slow for the lower pair. The convergence condition was that the horizontal deviation was smaller than 1.

5. Discussion

5.1. Discussing Confirmation Measure b*

In modern times, the induction problem has become the confirmation problem [58]. Many confirmation measures have been proposed [59].
Most confirmation measures emphasize that larger P(y1|x1) (more positive examples) is important, whereas b1* = b *(y1x1) emphasizes that smaller P(y1|x0) (fewer negative examples) is important. For example, when the sensitivity P(y1|x1) is 0.1 and the specificity P(y0|x0) is 1, it follows that both b1 * and CL1 are 1, which is reasonable. However, while using the existing confirmation formulae [59], the degrees of confirmation of MP1 are very small.
When the sensitivity is 1, if the specificity is as small as 0.1, the degree of confirmation of MP1, b1 *, is also 0.1. However, while using the existing confirmation formulae, the degrees of confirmation are much bigger than 0.1. A bigger degree is unreasonable, as the ratio of negative examples is 0.9/1.9 ≈ 0.47 ≈ 0.5, which means that MP1 is almost unbelievable.
From the above two examples, we can find that the confirmation measure b* emphasizes that no negative examples (for non-fuzzy hypotheses) or fewer negative examples (for fuzzy hypotheses) are more important than more positive examples and, hence, it is compatible with Popper’s falsification thought [31,32]. This measure b* is compatible with the confidence level and, hence, is also supported by medical practices.
Eells and Fitelson [60] suggested that Hypothesis Symmetry can be used as a standard to evaluate various conformation measures. Hypothesis Symmetry means b *(y1x1) = − b *(y1→not x1) = −b*(y1x0). We can prove that the confirmation measure b* has Hypothesis Symmetry:
b * ( y 1 x 1 ) = P ( y 1 | x 1 ) P ( y 1 | x 0 ) max ( P ( y 1 | x 1 ) , P ( y 1 | x 0 ) ) = P ( y 1 | x 0 ) P ( y 1 | x 1 ) max ( P ( y 1 | x 0 ) , P ( y 1 | x 1 ) ) = b * ( y 1 x 0 ) .

5.2. Discussing CM2 for the Multilabel Classification

In comparision with popular methods (such as Binary Relevance [52]) for multilabel learning, CM3 does not need n samples for n pairs of labels. It can directly obtain the semantic channel that consists of a group of truth functions from the Shannon channel P(Y|X) or the sampling distribution P(x, y).
In comparison with the MPP criterion, the MSI criterion can reduce the rate of failure to report smaller probability events. The MSI criterion is better when information is more important than correctness.
Note that the boundary for “Old” in Figure 10b was not 60, but 58.1. This is because “Old” has smaller logical probability than “Middle age”. If the average lifespan becomes longer, the boundary for “Old” will move to the right. We can imagine that the new partitioning boundary will result in a new sampling distribution P(x|y5) and a new truth function T(θ5|x); the new truth function will cause the boundary to move further to the right. The truth function, or the semantic meaning of “Old”, should evolve with the human average lifespan, in this way.

5.3. Discussing CM3 for the MMI Classification of Unseen Instances

Solving MMI is a difficult problem, not only in machine learning [19,20], but also in the classical information theory. Shannon and many researchers [6,7] have used the least average distortion criterion, instead of the MMI criterion, to optimize the detection and estimation. If we use the MMI criterion, the residual error coding will need a smaller average code length. Why did not they use the MMI criterion? The reason for this is that it is hard to optimize partition boundaries for MMI. However, by using CM3, we can resolve this problem (at least for low-dimensional feature spaces).
The popular methods for MMI classification or estimation use parameters to construct transition probability functions or likelihood functions and, then, optimize these parameters by using the Gradient Descent or the Newton method. The optimized parameters ascertain partition boundaries. However, CM3 or the CM iteration algorithm separately construct n likelihood functions by parameters for n different classes and then optimize the labels for different z, providing numerical solutions for partition boundaries. We compare CM3 and the Gradient Descent in Table 6.
The CM iteration algorithm has two disadvantages: One is that it requires that every sub-sample for every class is big enough, so that we can construct n likelihood functions for n classes. The other is that, for high-dimensional feature spaces, it is not feasible to label every z. We need to combine the CM iteration algorithm with neural networks for the MMI classification of high-dimensional feature spaces.
A neural network is a classifier y = f(z). For a given neural network, Matching I is used to let the semantic channel match the Shannon channel to obtain reward functions I(X; θj|z) (j = 0, 1,…). For given reward functions, Matching II is used to let the Shannon channel match the semantic channel to obtain new neural network parameters. Repeating these two steps will cause I(X; θ) to converge to MMI. Matching I and Matching II are similar to the tasks of the generative and discriminative models in a Generative Adversarial Network. We should be able to improve the MMI classification in high-dimensional feature spaces by combining CM3 and popular deep learning methods [33].

5.4. Discussing CM4 for mixture models

The results of Section 4.3 indicate that the complete data log-likelihood Q and the incomplete data log-likelihood LX(θ) are not always positively correlated, as most researchers believe. In some cases, Q may (and should) decrease, as Q may be greater than Q* = Q(θ*), which is the true model’s Q. In Example 5, while assuming the true model’s parameters σ1* = σ2* = σ* and P*(y1) = P*(y2) = 0.5, we could prove that P(y1|x) and P(y2|x) were a pair of logistic functions and they became steeper as σ decreased. Hence, H increases as σ increases. We can prove that the partial derivative H/σ is greater than 0. Hence, when θ = θ*,
Q σ = L X ( θ ) σ H σ = 0 H σ < 0 .
Therefore, we can find a small positive number Δ and replace σ* with σ* − Δ, such that Q(σ* − Δ) > Q(σ*).
The new convergence theory, which CM4 is based on, explains that CM4 can converge, because the iteration will maximize G/R or minimize R − G. We have used some different examples to test the CM-EM algorithm. The experiments show that the CM-EM algorithm can reduce the slow and invalid convergence behaviors that the EM algorithm exhibits when mixture ratios are imbalanced, or local maxima of Q exist. The proposed algorithm has convergence speed that is faster than or similar to other improved EM algorithms, such as the MM algorithm [55] and the multiset EM algorithm [61].
The CM-EM algorithm can be used not only for Gaussian mixtures, but also for other mixtures. For other mixtures, the MG step is a little more difficult, but the convergence proof should be the same.
CM4 and CM3 can be used together for unsupervised learning. From CM4, we can obtain a group of model parameters from a sample with distribution P(x); while using CM3, we can find the MMI classification for the sample.
The CM-EM algorithm cannot avoid θ converging to the boundary of the parameter space, however. We need to incorporate some existing algorithms, such as the Split and Merge EM algorithm [62] or the Competitive EM algorithm [63], for better global convergence properties in the mixture models.

6. Conclusions

Semantic information G theory combines the thoughts of Shannon, Popper, Fisher, Zadeh, and Carnap et al. The semantic information measure—the G measure—increases as the logical probability decreases, as well as Carnap and Bar-Hillel’s semantic information measure; however, the G measure also decreases as the relative deviation increases and, hence, it can be used for the hypothesis tests.
Logical Bayesian Inference (LBI) uses the truth function or the membership function, instead of the Bayesian posterior, as the inferential tool. While using the truth function T(θj|x), we can make probability predictions with a different prior P(x), as we use the Transition Probability Function (TPF) P(yj|x) or the Inverse Probability Function (IPF) P(θj|x). However, it is much easier to obtain optimized truth functions from samples than to obtain the optimized IPF, as P(yj) or P(θj) are not necessary for optimizing the truth functions. Importantly, the truth function can represent the semantic meaning of a hypothesis or a label and connect statistics and logic better. A windfall is that the optimization of the truth function brings a seemly reasonable confirmation measure b* for induction.
A group of Channel Matching (CM) algorithms, CM1, CM2, CM3, and CM4, were proposed to improve machine learning, especially to resolve the Multilabel-Learning-for-New-P(x) problem. CM1 can be used to improve label learning and confirmation; CM2 can be used to improve multilabel classifications; CM3 can be used to improve maximum mutual information classification of unseen instances in low-dimensional feature spaces; and, CM4 can be used to improve the mixture models. G theory and LBI have been tested by their applications to machine learning.
For further applications of G theory and LBI to machine learning, we need to combine the CM algorithms with neural networks and other algorithms in future works. Logical Bayesian Inference may be further developed for the unification of logic and statistics.

Funding

This research received no external funding.

Acknowledgments

The author thanks Peizhuang Wang for his long-term support and encouragement. The author also thanks the anonymous reviewers for their comments and suggestions.

Conflicts of Interest

The author declares no conflict of interest.

Abbreviations

BIBayesian Inference
CMChannel Matching
CM-EMChannel Matching Expectation-Maximization
EMExpectation-Maximization
G theorySemantic information G theory
GPSGlobal Positioning System
HIVHuman Immunodeficiency Virus
IPFInverse Probability Function
KLKullback-Leibler
LBILogical Bayesian Inference
LILikelihood Inference
MLEMaximum Likelihood Estimation
MMMaximum Mutual Information
MMIMaximization-Maximization
MPPMaximum Posterior Probability
MSIMaximum Semantic Information
MSIEMaximum Semantic Information Estimation
SMISemantic Mutual Information
SHMIShannon’s Mutual Information
TBPTraditional Bayes Prediction
TPFTransition Probability Function

Appendix A

The supplemental materials with source codes can be downloaded from http://survivor99.com/lcg/cm/forGtheory.zip. Files *.py are python 3.6 files. Parameters used in Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15 can be found in source files as shown in Table A1.
Table A1. The list of files in Supplemental Materials.
Table A1. The list of files in Supplemental Materials.
Program NameTask
Bayes Theorem III 2.pyFor Figure 9. To show label learning.
Ages-MI-classification.pyFor Figure 10. To show people classification on ages using maximum semantic information criterion for given membership functions and P(x).
MMI-v.pyFor Figure 11. To show the Channels Matching (CM) algorithm for the maximum mutual information classifications of unseen instances. One can modify parameters or the initial partition in the program for different result.
MMI-H.pyFor Figure 12.
LocationTrap3lines.pyFor Figure 13. To show how the CM-EM algorithm for mixture models avoids local convergence because of the local maximum of Q.
Folder ForEx6 (with Excel file and Word readme file)For Figure 14. To show the effect of every step of the CM-EM algorithm for mixture models.
MixModels6-2valid.py For Figure 15. To show the CM-EM algorithm of for a two-dimensional mixture models with seriously overlapped components.

References

  1. Fisher, R.A. On the mathematical foundations of theoretical statistics. Philos. Trans. R. Soc. 1922, 222, 309–368. [Google Scholar] [CrossRef] [Green Version]
  2. Fienberg, S.E. When Did Bayesian Inference Become “Bayesian”? Bayesian Anal. 2006, 1, 1–40. [Google Scholar] [CrossRef]
  3. Bayesian Inference. In Wikipedia: The Free Encyclopedia. Available online: https://en.wikipedia.org/wiki/Bayesian_inference (accessed on 3 March 2019).
  4. Akaike, H. A new look at the statistical model identification. IEEE Trans. Autom. Control. 1974, 19, 716–723. [Google Scholar] [CrossRef]
  5. Kullback, S.; Leibler, R. On information and Sufficiency. Ann. Math. Stat. 1951, 22, 79–86. [Google Scholar] [CrossRef]
  6. Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons: New York, NY, USA, 2006. [Google Scholar]
  7. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–429, 623–656. [Google Scholar] [CrossRef]
  8. Weaver, W. Recent contributions to the mathematical theory of communication. In The Mathematical Theory of Communication, 1st ed.; Shannon, C.E., Weaver, W., Eds.; The University of Illinois Press: Urbana, IL, USA, 1963; pp. 93–117. [Google Scholar]
  9. Carnap, R.; Bar-Hillel, Y. An Outline of a Theory of Semantic Information; Tech. Rep. No. 247; Research Laboratory of Electronics, MIT: Cambridge, MA, USA, 1952. [Google Scholar]
  10. Bonnevie, E. Dretske’s semantic information theory and metatheories in library and information science. J. Doc. 2001, 57, 519–534. [Google Scholar] [CrossRef]
  11. Floridi, L. Outline of a theory of strongly semantic information. Minds Mach. 2004, 14, 197–221. [Google Scholar] [CrossRef]
  12. Zhong, Y.X. A theory of semantic information. China Commun. 2017, 14, 1–17. [Google Scholar] [CrossRef]
  13. D’Alfonso, S. On Quantifying Semantic Information. Information 2011, 2, 61–101. [Google Scholar] [CrossRef] [Green Version]
  14. De Luca, A.; Termini, S. A definition of a non-probabilistic entropy in setting of fuzzy sets. Inf. Control 1972, 20, 301–312. [Google Scholar] [CrossRef]
  15. Bhandari, D.; Pal, N.R. Some new information measures of fuzzy sets. Inf. Sci. 1993, 67, 209–228. [Google Scholar] [CrossRef]
  16. Kumar, T.; Bajaj, R.K.; Gupta, B. On some parametric generalized measures of fuzzy information, directed divergence and information Improvement. Int. J. Comput. Appl. 2011, 30, 5–10. [Google Scholar]
  17. Klir, G. Generalized information theory. Fuzzy Sets Syst. 1991, 40, 127–142. [Google Scholar] [CrossRef]
  18. Wang, Y. Generalized Information Theory: A Review and Outlook. Inf. Technol. J. 2011, 10, 461–469. [Google Scholar] [CrossRef] [Green Version]
  19. Belghazi, I.; Rajeswar, S.; Baratin, A.; Hjelm, R.D.; Courville, A. Mine: Mutual information neural estimation. In Proceedings of the International Conference on Machine Learning, Long Beach, CA, USA, 10–15 June 2018; Available online: https://arxiv.org/abs/1801.04062 (accessed on 1 January 2019).
  20. Hjelm, R.D.; Fedorov, A.; Lavoie-Marchildon, S.; Grewal, K.; Trischler, A.; Bengio, Y. Learning Deep Representations by Mutual Information Estimation and Maximization. Available online: https://arxiv.org/abs/1808.06670 (accessed on 22 February 2019).
  21. Lu, C. Shannon equations reform and applications. BUSEFAL 1990, 44, 45–52. Available online: https://www.listic.univ-smb.fr/production-scientifique/revue-busefal/version-electronique/ebusefal-44/ (accessed on 5 March 2019).
  22. Lu, C. B-fuzzy quasi-Boolean algebra and a generalize mutual entropy formula. Fuzzy Syst. Math. 1991, 5, 76–80. (in Chinese). [Google Scholar]
  23. Lu, C. A Generalized Information Theory; China Science and Technology University Press: Hefei, China, 1993; ISBN 7-312-00501-2. (in Chinese) [Google Scholar]
  24. Lu, C. Meanings of generalized entropy and generalized mutual information for coding. J. China Inst. Commun. 1994, 15, 37–44. (in Chinese). [Google Scholar]
  25. Lu, C. A generalization of Shannon’s information theory. Int. J. Gen. Syst. 1999, 28, 453–490. [Google Scholar] [CrossRef]
  26. Lu, C. GPS information and rate-tolerance and its relationships with rate distortion and complexity distortions. J. Chengdu Univ. Inf. Technol. 2012, 6, 27–32. (In Chinese) [Google Scholar]
  27. Zadeh, L.A. Fuzzy Sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  28. Tarski, A. The semantic conception of truth: and the foundations of semantics. Philos. Phenomenol. Res. 1994, 4, 341–376. [Google Scholar] [CrossRef]
  29. Davidson, D. Truth and meaning. Synthese 1967, 17, 304–323. [Google Scholar] [CrossRef]
  30. Shannon, C.E. Coding theorems for a discrete source with a fidelity criterion. IRE Nat. Conv. Rec. 1959, 4, 142–163. [Google Scholar]
  31. Popper, K. The Logic of Scientific Discovery, 1st ed.; Routledge: London, UK, 1959. [Google Scholar]
  32. Popper, K. Conjectures and Refutations, 1st ed.; Routledge: London, UK, 2002. [Google Scholar]
  33. Goodfellow, I.; Bengio, Y. Deep Learning, 1st ed.; The MIP Press: Cambridge, MA, USA, 2016. [Google Scholar]
  34. Carnap, R. Logical Foundations of Probability, 1st ed.; University of Chicago Press: Chicago, IL, USA, 1950. [Google Scholar]
  35. Zadeh, L.A. Probability measures of fuzzy events. J. Math. Anal. Appl. 1986, 23, 421–427. [Google Scholar] [CrossRef]
  36. Floridi, L. Semantic conceptions of information. In Stanford Encyclopedia of Philosophy; Stanford University: Stanford, CA, USA, 2005; Available online: http://seop.illc.uva.nl/entries/information-semantic/ (accessed on 1 July 2019).
  37. Theil, H. Economics and Information Theory; North-Holland Pub. Co.: Amsterdam, The Netherlands; Rand McNally: Chicago, IL, USA, 1967. [Google Scholar]
  38. Donsker, M.; Varadhan, S. Asymptotic evaluation of certain Markov process expectations for large time IV. Commun. Pure Appl. Math. 1983, 36, 183–212. [Google Scholar] [CrossRef]
  39. Wittgenstein, L. Philosophical Investigations; Basil Blackwell Ltd: Oxford, UK, 1958. [Google Scholar]
  40. Bayes, T.; Price, R. An essay towards solving a problem in the doctrine of chance. Philos. Trans. R. Soc. Lond. 1763, 53, 370–418. [Google Scholar] [CrossRef]
  41. Lu, C. From Bayesian inference to logical Bayesian inference: A new mathematical frame for semantic communication and machine learning. In Intelligence Science II, Proceedings of the ICIS2018, Beijing, China, 2 October 2018; Shi, Z.Z., Ed.; Springer International Publishing: Cham, Switzerland, 2018; pp. 11–23. [Google Scholar]
  42. Lu, C. Channels’ matching algorithm for mixture models. In Intelligence Science I, Proceedings of ICIS 2017, Beijing, China, 27 September 2017; Shi, Z.Z., Goertel, B., Feng, J.L., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 321–332. [Google Scholar]
  43. Lu, C. Semantic channel and Shannon channel mutually match and iterate for tests and estimations with maximum mutual information and maximum likelihood. In Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, Shanghai, China, 15 January 2018; IEEE Computer Society Press Room: Washington, DC, USA, 2018; pp. 15–18. [Google Scholar]
  44. Lu, C. Semantic channel and Shannon channel mutually match for multi-label classification. In Intelligence Science II, Proceedings of ICIS 2018, Beijing, China, 2 October 2018; Shi, Z.Z., Ed.; Springer International Publishing: Cham, Switzerland, 2018; pp. 37–48. [Google Scholar]
  45. Dubois, D.; Prade, H. Fuzzy sets and probability: Misunderstandings, bridges and gaps. In Proceedings of the 1993 Second IEEE International Conference on Fuzzy Systems, San Francisco, CA, USA, 28 March 1993. [Google Scholar]
  46. Thomas, S.F. Possibilistic uncertainty and statistical inference. In Proceedings of the ORSA/TIMS Meeting, Houston, TX, USA, 11–14 October 1981. [Google Scholar]
  47. Wang, P.Z. From the fuzzy statistics to the falling fandom subsets. In Advances in Fuzzy Sets, Possibility Theory and Applications; Wang, P.P., Ed.; Plenum Press: New York, NY, 1983; pp. 81–96. [Google Scholar]
  48. Berger, T. Rate Distortion Theory; Prentice-Hall: Enklewood Cliffs, NJ, USA, 1971. [Google Scholar]
  49. Thornbury, J.R.; Fryback, D.G.; Edwards, W. Likelihood ratios as a measure of the diagnostic usefulness of excretory urogram information. Radiology 1975, 114, 561–565. [Google Scholar] [CrossRef]
  50. OraQuick. Available online: http://www.oraquick.com/Home (accessed on 31 December 2016).
  51. Zhang, M.L.; Zhou, Z.H. A review on multi-label learning algorithm. IEEE Trans. Knowl. Data Eng. 2014, 26, 1819–1837. [Google Scholar] [CrossRef]
  52. Zhang, M.L.; Li, Y.K.; Liu, X.Y.; Geng, X. Binary relevance for multi-label learning: An overview. Front. Comput. Sci. 2018, 12, 191–202. [Google Scholar] [CrossRef]
  53. Dempster, A.P.; Laird, N.M.; Rubin, D.B. Maximum Likelihood from Incomplete Data via the EM Algorithm. J. R. Stat. Soc. Ser. B 1997, 39, 1–38. [Google Scholar] [CrossRef]
  54. Ueda, N.; Nakano, R. Deterministic annealing EM algorithm. Neural Netw. 1998, 11, 271–282. [Google Scholar] [CrossRef]
  55. Marin, J.-M.; Mengersen, K.; Robert, C.P. Bayesian modelling and inference on mixtures of distributions. In Handbook of Statistics: Bayesian Thinking, Modeling and Computation; Dey, D., Rao, C.R., Eds.; Elsevier: Amsterdam, The Netherlands, 2011; pp. 459–507. [Google Scholar]
  56. Neal, R.; Hinton, G. A view of the EM algorithm that justifies incremental, sparse, and other variants. In Learning in Graphical Models; Michael, I.J., Ed.; MIT Press: Cambridge, MA, USA, 1999; pp. 355–368. [Google Scholar]
  57. Lu, C. From the EM Algorithm to the CM-EM Algorithm for Global Convergence of Mixture Models. Available online: https://arxiv.org/abs/18 (accessed on 26 October 2018).
  58. James, H. Inductive logic. In The Stanford Encyclopedia of Philosophy; Edward, N.Z., Ed.; Stanford University Press: Palo Alto, CA, USA, 2018; Available online: https://plato.stanford.edu/archives/spr2018/entries/logic-inductive/ (accessed on 19 March 2018).
  59. Tentori, K.; Crupi, V.; Bonini, N.; Osherson, D. Comparison of confirmation measures. Cognition 2007, 103, 107–119. [Google Scholar] [CrossRef]
  60. Ellery, E.; Fitelson, B. Measuring confirmation and evidence. J. Philos. 2000, 97, 663–672. [Google Scholar]
  61. Huang, W.H.; Chen, Y.G. The multiset EM algorithm. Stat. Probab. Lett. 2017, 126, 41–48. [Google Scholar] [CrossRef] [Green Version]
  62. Ueda, N.; Nakano, R.; Ghahramani, Z.; Hinton, G.E. SMEM algorithm for mixture models. Neural Comput. 2000, 12, 2109–2128. [Google Scholar] [CrossRef]
  63. Zhang, B.; Zhang, C.; Yi, X. Competitive EM algorithm for finite mixture models. Pattern Recognit. 2004, 37, 131–144. [Google Scholar] [CrossRef]
Figure 1. The Shannon channel and the semantic channel. The semantic meaning of yj is ascertained by the membership relation between x and θj. A fuzzy set θj may be overlapped or included by another.
Figure 1. The Shannon channel and the semantic channel. The semantic meaning of yj is ascertained by the membership relation between x and θj. A fuzzy set θj may be overlapped or included by another.
Information 10 00261 g001
Figure 2. Relationship between T(Aj|x) and P(x|Aj) for given P(x).
Figure 2. Relationship between T(Aj|x) and P(x|Aj) for given P(x).
Information 10 00261 g002
Figure 3. Illustrating the positioning of a GPS device with deviation. The round point is the pointed position with a deviation, and the position with the star is the most probable position.
Figure 3. Illustrating the positioning of a GPS device with deviation. The round point is the pointed position with a deviation, and the position with the star is the most probable position.
Information 10 00261 g003
Figure 4. The semantic information conveyed by yj about xi.
Figure 4. The semantic information conveyed by yj about xi.
Information 10 00261 g004
Figure 5. The rate-verisimilitude function R(G) for binary communication. For any R(G) function, there is a point where R(G)=G.
Figure 5. The rate-verisimilitude function R(G) for binary communication. For any R(G) function, there is a point where R(G)=G.
Information 10 00261 g005
Figure 6. Illustrating the medical test and signal detection. We choose yj according to zCj. {C0, C1} is a partition of C.
Figure 6. Illustrating the medical test and signal detection. We choose yj according to zCj. {C0, C1} is a partition of C.
Information 10 00261 g006
Figure 7. Relationship between degree of conformation b* and confidence level CL. As CL changes from 0 to 1, b* changes from −1 to 1.
Figure 7. Relationship between degree of conformation b* and confidence level CL. As CL changes from 0 to 1, b* changes from −1 to 1.
Information 10 00261 g007
Figure 8. Illustrating the iterative convergence of the MMI classification of unseen instances. In the iterative process, (G, R) moves from the start point to a,b,c,d,e,…,f gradually.
Figure 8. Illustrating the iterative convergence of the MMI classification of unseen instances. In the iterative process, (G, R) moves from the start point to a,b,c,d,e,…,f gradually.
Information 10 00261 g008
Figure 9. Using prior and posterior distributions P(x) and P(x|yj) to obtain the optimized truth function T*(θj|x).
Figure 9. Using prior and posterior distributions P(x) and P(x|yj) to obtain the optimized truth function T*(θj|x).
Information 10 00261 g009
Figure 10. The maximum semantic information classification of ages.
Figure 10. The maximum semantic information classification of ages.
Information 10 00261 g010
Figure 11. The Maximum Mutual Information (MMI) classification of unseen instances. The classifier is y = f(z). The mutual information is I(X; Y). X is a true class and Y is a selected label.
Figure 11. The Maximum Mutual Information (MMI) classification of unseen instances. The classifier is y = f(z). The mutual information is I(X; Y). X is a true class and Y is a selected label.
Information 10 00261 g011
Figure 12. MMI classification with a very bad initial partition.
Figure 12. MMI classification with a very bad initial partition.
Information 10 00261 g012
Figure 13. The iterative process from the local maximum of Q to the global maximum of LX(θ). The stopping condition is when the deviation of every parameter is smaller than 1%.
Figure 13. The iterative process from the local maximum of Q to the global maximum of LX(θ). The stopping condition is when the deviation of every parameter is smaller than 1%.
Information 10 00261 g013
Figure 14. The iterative process of the CM-EM algorithm for Example 6. It can be seen that some E2-steps decrease Q. The relative entropy is smaller than 0.001 bit after nine iterations.
Figure 14. The iterative process of the CM-EM algorithm for Example 6. It can be seen that some E2-steps decrease Q. The relative entropy is smaller than 0.001 bit after nine iterations.
Information 10 00261 g014
Figure 15. CM4 for a two-dimensional mixture model. There are six components with Gaussian distributions.
Figure 15. CM4 for a two-dimensional mixture model. There are six components with Gaussian distributions.
Information 10 00261 g015
Table 1. The sensitivity and Specificity of a Medical Test ascertain a Shannon Channel P(Y|X).
Table 1. The sensitivity and Specificity of a Medical Test ascertain a Shannon Channel P(Y|X).
Infected Subject x1Uninfected Subject x0
Positive y1P(y1|x1) = sensitivity = 0.917P(y1|x0) = 1 − specificity = 0.001
Negative y0P(y0|x1) = 1 − sensitivity = 0.083 P(y0|x0) = specificity = 0.999
* Data are obtained from OREQuick HIV tests [50].
Table 2. The two degrees of disbelief of the medical test form a semantic channel T(θ|X).
Table 2. The two degrees of disbelief of the medical test form a semantic channel T(θ|X).
YInfected x1Uninfected x0
Positive y1T(θ1|x1) = 1T(θ1|x0) = b1
Negative y0T(θ0|x1) = b0T(θ0|x0) = 1
Table 3. The parameters of four Gaussian distributions.
Table 3. The parameters of four Gaussian distributions.
μz1μz2σz1σz2ρP(xi)
P(z|x0)505075200500.2
P(z|x1)759020075−500.5
P(z|x21)10050125125750.2
P(z|x22)120807512500.1
Table 4. True and guessed model parameters and iterative results of Example 6.
Table 4. True and guessed model parameters and iterative results of Example 6.
Real ParametersStarting Parameters
H(P‖Pθ) = 0.68 bit
Parameters after 9 E2-Steps
H(P‖Pθ) = 0.00072 bit
μ*σ*P*(Y)μσP(Y)μσP(Y)
y14620.730200.546.0012.0320.6990
y250200.370200.550.0819.170.3010
Table 5. The iteration numbers and final parameters for different algorithms.
Table 5. The iteration numbers and final parameters for different algorithms.
AlgorithmSample SizeIteration NumberConvergent Parameters
μ1μ2σ1σ2P(y1)
EM1000about 3646.1449.681.9019.180.731
MM1000about 1846.1449.681.9019.180.731
CM-EM1000846.0149.532.0821.130.705
Real parameters 46502200.7
Table 6. Comparison of the CM algorithm and Gradient Descent for low-dimensional feature spaces.
Table 6. Comparison of the CM algorithm and Gradient Descent for low-dimensional feature spaces.
AboutGradient DescentCM3
Models for different classesOptimized togetherOptimized separately
Boundaries is expressed byFunctions with parametersNumerical values
For complicated boundariesNot easyEasy
Consider gradient and searchNecessaryUnnecessary
Convergence Not easyEasy
ComputationComplicatedSimple
Iterations neededMany 2–3
Samples requiredNot necessarily bigBig enough

Share and Cite

MDPI and ACS Style

Lu, C. Semantic Information G Theory and Logical Bayesian Inference for Machine Learning. Information 2019, 10, 261. https://doi.org/10.3390/info10080261

AMA Style

Lu C. Semantic Information G Theory and Logical Bayesian Inference for Machine Learning. Information. 2019; 10(8):261. https://doi.org/10.3390/info10080261

Chicago/Turabian Style

Lu, Chenguang. 2019. "Semantic Information G Theory and Logical Bayesian Inference for Machine Learning" Information 10, no. 8: 261. https://doi.org/10.3390/info10080261

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop