{"id":1632,"date":"2019-04-12T02:43:10","date_gmt":"2019-04-12T02:43:10","guid":{"rendered":"http:\/\/kusuaks7\/?p=1237"},"modified":"2023-08-11T09:12:34","modified_gmt":"2023-08-11T09:12:34","slug":"symbolic-vs-connectionist-ai","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/ai-ml\/symbolic-vs-connectionist-ai\/","title":{"rendered":"Symbolic vs Connectionist A.I."},"content":{"rendered":"<h4 id=\"4809\" name=\"4809\"><em>As Connectionist techniques such as Neural Networks are enjoying a wave of popularity, arch-rival Symbolic A.I. is proving to be the right strategic complement for mission critical applications that require dynamic adaptation, verifiability, and explainability.<\/em><\/h4>\n<figure id=\"825d\" name=\"825d\">\n<h4><canvas height=\"50\" width=\"75\"><\/canvas><img decoding=\"async\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*3eTdq5gO0HF0TRhP\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*3eTdq5gO0HF0TRhP\" style=\"width: 700px; height: 466px;\" \/><\/h4>\n<\/figure>\n<p name=\"c21e\" style=\"text-align: center;\">Photo by&nbsp;<a data-href=\"https:\/\/unsplash.com\/@prvelasco89?utm_source=medium&amp;utm_medium=referral\" href=\"https:\/\/unsplash.com\/@prvelasco89?utm_source=medium&amp;utm_medium=referral\" rel=\"photo-creator noopener noreferrer\" target=\"_blank\">Pablo Rebolledo<\/a>&nbsp;on&nbsp;<a data-href=\"https:\/\/unsplash.com?utm_source=medium&amp;utm_medium=referral\" href=\"https:\/\/unsplash.com\/?utm_source=medium&amp;utm_medium=referral\" rel=\"photo-source noopener noreferrer\" target=\"_blank\">Unsplash<\/a><\/p>\n<p id=\"c21e\" name=\"c21e\">It seems that wherever there are two categories of some sort, people are very quick to take one side or the other, to then pit both against each other.&nbsp;<em>Artificial Intelligence<\/em>&nbsp;techniques have traditionally been divided into two categories; Symbolic A.I. and Connectionist A.I. The latter kind have gained significant popularity with&nbsp;<a data-href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2017\/08\/08\/the-amazing-ways-how-google-uses-deep-learning-ai\/#7e23d5b83204\" href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2017\/08\/08\/the-amazing-ways-how-google-uses-deep-learning-ai\/#7e23d5b83204\" rel=\"noopener noreferrer\" target=\"_blank\">recent success stories<\/a>&nbsp;and media hype, and no one could be blamed for thinking that they are what A.I. is all about. There have even been cases of people&nbsp;<a data-href=\"https:\/\/twitter.com\/jackclarkSF\/status\/1070732718357528577\" href=\"https:\/\/twitter.com\/jackclarkSF\/status\/1070732718357528577\" rel=\"noopener noreferrer\" target=\"_blank\">spreading false information<\/a>&nbsp;to diverge attention and funding from more classic A.I. research and development.<\/p>\n<p id=\"1e1a\" name=\"1e1a\">The truth of the matter is that each set of techniques has its place. There is no silver bullet A.I. algorithm yet, and trying to use the same algorithm for all problems is just plain stupid. Each has its own strengths and weaknesses, and choosing the right tools for the job is key.<\/p>\n<h3 id=\"9753\" name=\"9753\">What is Symbolic&nbsp;A.I.?<\/h3>\n<p id=\"1192\" name=\"1192\">This category of techniques is sometimes referred to as GOFAI (Good Old Fashioned A.I.) This does not, by any means, imply that the techniques are old or stagnant. It is the more classical approach of&nbsp;<strong>encoding a model<\/strong>&nbsp;of the problem and expecting the system to process the input data according to this model to provide a solution.<\/p>\n<p id=\"fc15\" name=\"fc15\">The need for&nbsp;<em>symbolic&nbsp;<\/em>techniques is getting a fresh wave of interest of late, with the recognition that for A.I. based systems to be accepted in certain high-risk domains, their behaviour needs to be verifiable and&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Explainable_Artificial_Intelligence\" href=\"https:\/\/en.wikipedia.org\/wiki\/Explainable_Artificial_Intelligence\" rel=\"noopener noreferrer\" target=\"_blank\">explainable<\/a>. This is often very difficult to achieve by&nbsp;<em>connectionist&nbsp;<\/em>algorithms.<\/p>\n<p id=\"635c\" name=\"635c\">The systems that fall into this category often involve deductive reasoning, logical inference, and some flavour of search algorithm that finds a solution within the constraints of the specified model. These include&nbsp;<em>expert systems<\/em>, which use rules and&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Decision_tree\" href=\"https:\/\/en.wikipedia.org\/wiki\/Decision_tree\" rel=\"noopener noreferrer\" target=\"_blank\">decision trees<\/a>&nbsp;to deduce conclusions from the input data,&nbsp;<em>constraint solvers<\/em>, which search for a solution within a space of possibilities, and&nbsp;<em>planning systems<\/em>, which try to find a sequence of actions to achieve a well defined goal from some initial state. They often also have variants that are capable of handling&nbsp;<a data-href=\"https:\/\/www.cs.bgu.ac.il\/~pdm122\/wiki.files\/Conformant.pdf\" href=\"https:\/\/www.cs.bgu.ac.il\/~pdm122\/wiki.files\/Conformant.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">uncertainty<\/a>&nbsp;and risk.<\/p>\n<figure id=\"3a3f\" name=\"3a3f\">\n<p><canvas height=\"45\" width=\"75\"><\/canvas><img decoding=\"async\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*oeMEUAn7chzlXVzG.png\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*oeMEUAn7chzlXVzG.png\" style=\"width: 700px; height: 433px;\" \/><\/p>\n<\/figure>\n<p name=\"e969\" style=\"text-align: center;\">A MiniMax Game Tree for Tic-Tac-Toe. (<a data-href=\"https:\/\/www.researchgate.net\/figure\/Game-tree-for-Tic-Tac-Toe-game-using-MiniMax-algorithm_fig1_262672371\" href=\"https:\/\/www.researchgate.net\/figure\/Game-tree-for-Tic-Tac-Toe-game-using-MiniMax-algorithm_fig1_262672371\" rel=\"noopener noreferrer\" target=\"_blank\">Image&nbsp;Source<\/a>)<\/p>\n<p id=\"e969\" name=\"e969\">Such algorithms typically have an algorithmic complexity which is&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/NP-hardness\" href=\"https:\/\/en.wikipedia.org\/wiki\/NP-hardness\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>NP-hard<\/strong><\/a><strong>or&nbsp;<\/strong><a data-href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_PSPACE-complete_problems\" href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_PSPACE-complete_problems\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>worse<\/strong><\/a><strong>,&nbsp;<\/strong>facing super-massive search spaces when trying to solve real-world problems. This means that classical exhaustive blind search algorithms will not work, apart from small artificially restricted cases. Instead, the paths that are least likely to lead to a solution are pruned out of the search space or left unexplored for as long as possible.<\/p>\n<p id=\"06c3\" name=\"06c3\">There is a plethora of techniques in this category.&nbsp;<a data-href=\"https:\/\/web.stanford.edu\/class\/ee364b\/lectures\/bb_slides.pdf\" href=\"https:\/\/web.stanford.edu\/class\/ee364b\/lectures\/bb_slides.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">Branch and bound<\/a>algorithms work on optimisation or constraint satisfaction problems where a heuristic is not available, partitioning the solution space by an upper and lower bound, and searching for a solution within that partition.&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Local_search_(optimization)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Local_search_%28optimization%29\" rel=\"noopener noreferrer\" target=\"_blank\">Local search<\/a>looks at close variants of a solution and tries to improve it incrementally, occasionally performing&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Simulated_annealing\" href=\"https:\/\/en.wikipedia.org\/wiki\/Simulated_annealing\" rel=\"noopener noreferrer\" target=\"_blank\">random jumps in an attempt to escape local optima<\/a>.&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Metaheuristic\" href=\"https:\/\/en.wikipedia.org\/wiki\/Metaheuristic\" rel=\"noopener noreferrer\" target=\"_blank\">Meta-heuristics<\/a>&nbsp;encompass the broader landscape of such techniques, with&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Evolutionary_algorithm\" href=\"https:\/\/en.wikipedia.org\/wiki\/Evolutionary_algorithm\" rel=\"noopener noreferrer\" target=\"_blank\">evolutionary algorithms<\/a>&nbsp;imitating distributed or collaborative mechanisms found in nature, such as&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Genetic_algorithm\" href=\"https:\/\/en.wikipedia.org\/wiki\/Genetic_algorithm\" rel=\"noopener noreferrer\" target=\"_blank\">natural selection<\/a>&nbsp;and&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Swarm_intelligence\" href=\"https:\/\/en.wikipedia.org\/wiki\/Swarm_intelligence\" rel=\"noopener noreferrer\" target=\"_blank\">swarm-inspired behaviour<\/a>.<\/p>\n<p id=\"864a\" name=\"864a\"><a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Heuristic_(computer_science)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Heuristic_%28computer_science%29\" rel=\"noopener noreferrer\" target=\"_blank\">Heuristic search<\/a>&nbsp;uses an evaluation function to determine the&nbsp;<em>closeness<\/em>&nbsp;of a state to the goal, using estimates that are cheaper to compute than trying to find the full solution. One noteworthy domain-independent heuristic is&nbsp;<a data-href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.686.9250&amp;rep=rep1&amp;type=pdf\" href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.686.9250&amp;rep=rep1&amp;type=pdf\" rel=\"noopener noreferrer\" target=\"_blank\"><em>relaxation<\/em><\/a><em>,&nbsp;<\/em>where the algorithm ignores some of the constraints or possible real-world&nbsp;<em>setbacks<\/em>&nbsp;to find a faster solution in a more&nbsp;<em>relaxed<\/em>&nbsp;world. This is used as guidance to make more informed choices at each decision point of the search. A good heuristic which is both&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Admissible_heuristic\" href=\"https:\/\/en.wikipedia.org\/wiki\/Admissible_heuristic\" rel=\"noopener noreferrer\" target=\"_blank\"><em>admissible<\/em><\/a>&nbsp;(never overestimates the cost) and&nbsp;<em>informative&nbsp;<\/em>can lead to algorithms such as&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/A*_search_algorithm\" href=\"https:\/\/en.wikipedia.org\/wiki\/A*_search_algorithm\" rel=\"noopener noreferrer\" target=\"_blank\">A*<\/a>&nbsp;to find optimal solutions, but unfortunately such heuristics are often not available easily. For complex problems, finding a&nbsp;<em>feasible&nbsp;<\/em>solution that satisfies all constraints, albeit not optimal, is already a big feat.<\/p>\n<p name=\"864a\" style=\"text-align: center;\"><img decoding=\"async\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/1*HppvOLfDxXqQRFn0Cv2dHQ.gif\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/1*HppvOLfDxXqQRFn0Cv2dHQ.gif\" \/><\/p>\n<p name=\"864a\" style=\"text-align: center;\"><span style=\"text-align: center;\">A* Heuristic Search for finding Shortest Path (Image Source:&nbsp;<\/span><a data-href=\"https:\/\/en.wikipedia.org\/wiki\/A*_search_algorithm\" href=\"https:\/\/en.wikipedia.org\/wiki\/A*_search_algorithm\" rel=\"noopener noreferrer\" style=\"text-align: center;\" target=\"_blank\">Wikipedia<\/a><span style=\"text-align: center;\">)&nbsp;<\/span><\/p>\n<p id=\"1f17\" name=\"1f17\">While some techniques can also handle&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Partially_observable_Markov_decision_process\" href=\"https:\/\/en.wikipedia.org\/wiki\/Partially_observable_Markov_decision_process\" rel=\"noopener noreferrer\" target=\"_blank\">partial observability and probabilistic models<\/a>, they are typically not appropriate for noisy input data, or scenarios where the model is not well defined. They are more effective in scenarios where it is well-established that taking specific actions in certain situations could be beneficial or disastrous, and the system needs to provide the right mechanism to&nbsp;<em>explictly encode<\/em>&nbsp;and&nbsp;<em>enforce&nbsp;<\/em>such rules.<\/p>\n<p id=\"d460\" name=\"d460\">Symbolic algorithms eliminate options that violate the specified model, and can be&nbsp;<em>verified&nbsp;<\/em>to always produce a solution that satisfies all the constraints much more easily than their connectionist counterparts. Since typically there is barely or no algorithmic&nbsp;<em>training&nbsp;<\/em>involved, the model can be dynamic, and change as rapidly as needed.<\/p>\n<h3 id=\"4a7f\" name=\"4a7f\"><strong>What is Connectionist A.I.?<\/strong><\/h3>\n<p id=\"c0fd\" name=\"c0fd\">Connectionist A.I. gets its name from the typical network topology that most of the algorithms in this class employ. The most popular technique in this category is the Artificial Neural Network (ANN). This consists of multiple layers of nodes, called&nbsp;<em>neurons<\/em>, that process some input signals, combine them together with some weight coefficients, and&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Sigmoid_function\" href=\"https:\/\/en.wikipedia.org\/wiki\/Sigmoid_function\" rel=\"noopener noreferrer\" target=\"_blank\">squash them<\/a>&nbsp;to be fed to the next layer. Support Vector Machines (SVMs) also fall under the Connectionist category.<\/p>\n<p id=\"1150\" name=\"1150\">ANNs come in various shapes and sizes, including Convolution Neural Networks (successful for image recognition and bitmap classification), and Long Short-term Memory Networks (typically applied for time series analysis or problems where time is an important feature).&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Deep_learning\" href=\"https:\/\/en.wikipedia.org\/wiki\/Deep_learning\" rel=\"noopener noreferrer\" target=\"_blank\">Deep learning<\/a>&nbsp;is also essentially synonymous with Artificial Neural Networks.<\/p>\n<p name=\"1150\" style=\"text-align: center;\"><img decoding=\"async\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*r-d1t5izwgAmNcFz.png\" \/><canvas height=\"35\" width=\"75\"><img decoding=\"async\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*r-d1t5izwgAmNcFz.png\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*r-d1t5izwgAmNcFz.png\" \/><img decoding=\"async\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*r-d1t5izwgAmNcFz.png\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*r-d1t5izwgAmNcFz.png\" \/><\/canvas><\/p>\n<p name=\"57d2\" style=\"text-align: center;\">A neuron of an Artificial Neural Network. (Image source:&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Backpropagation\" href=\"https:\/\/en.wikipedia.org\/wiki\/Backpropagation\" rel=\"noopener noreferrer\" target=\"_blank\">Wikipedia<\/a>)<\/p>\n<p id=\"57d2\" name=\"57d2\">The key aspect of this category of techniques is that the user does not specify the rules of the domain being modelled. The network&nbsp;<em>discovers&nbsp;<\/em>the rules from training data. The user provides input data and sample output data (the larger and more diverse the data set, the better). Connectionist algorithms then apply statistical regression models to adjust the weight coefficients of their intermediate variables, until the best fitting model is found. The weights are adjusted in the direction that minimises the cumulative error from all the training data points, using techniques such as&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Gradient_descent\" href=\"https:\/\/en.wikipedia.org\/wiki\/Gradient_descent\" rel=\"noopener noreferrer\" target=\"_blank\">gradient descent<\/a>.<\/p>\n<p id=\"0196\" name=\"0196\">Since these techniques are effectively error minimisation algorithms, they are inherently resilient to noise. They will smoothen out outliers and converge to a solution that classifies the data within some margin of error.<\/p>\n<p id=\"9f79\" name=\"9f79\">These algorithms&nbsp;<em>do not need a model of the world<\/em>. They just need enough sample data from which the model of the world can be&nbsp;<em>inferred statistically<\/em>. This is a very powerful characteristic, but also a weakness. The input features have to be very carefully selected. They also have to be normalised or&nbsp;<a data-href=\"https:\/\/en.wikipedia.org\/wiki\/Feature_scaling\" href=\"https:\/\/en.wikipedia.org\/wiki\/Feature_scaling\" rel=\"noopener noreferrer\" target=\"_blank\">scaled<\/a>, to avoid that one feature overpowers the others, and pre-processed to be more meaningful for classification.<\/p>\n<p id=\"0a31\" name=\"0a31\"><em>Feature engineering<\/em>&nbsp;is an occult craft in its own right, and can often be the key determining success factor of a machine learning project. Having too many features, or not having a representative data set that covers most of the permutations of those features, can lead to&nbsp;<a data-href=\"https:\/\/machinelearningmastery.com\/overfitting-and-underfitting-with-machine-learning-algorithms\/\" href=\"https:\/\/machinelearningmastery.com\/overfitting-and-underfitting-with-machine-learning-algorithms\/\" rel=\"noopener noreferrer\" target=\"_blank\">overfitting or underfitting<\/a>. Even with the help of the most skilled data scientist, you are still at the mercy of the quality of the data you have available. These techniques are not immune to the&nbsp;<a data-href=\"https:\/\/towardsdatascience.com\/curse-of-dimensionality-2092410f3d27\" href=\"https:\/\/builtin.com\/data-science\/curse-dimensionality\" rel=\"noopener noreferrer\" target=\"_blank\">curse of dimensionality<\/a>&nbsp;either, and as the number of input features increases, the higher the risk of an invalid solution.<\/p>\n<figure id=\"6cd9\" name=\"6cd9\">\n<p><canvas height=\"50\" width=\"75\"><\/canvas><img decoding=\"async\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*3DtFG59Nuenx140V\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*3DtFG59Nuenx140V\" style=\"width: 700px; height: 467px;\" \/><\/p>\n<\/figure>\n<p name=\"3e36\" style=\"text-align: center;\">A Data Scientist sifting for Features\u200a&mdash;\u200aPhoto by&nbsp;<a data-href=\"https:\/\/unsplash.com\/@art_maltsev?utm_source=medium&amp;utm_medium=referral\" href=\"https:\/\/unsplash.com\/@art_maltsev?utm_source=medium&amp;utm_medium=referral\" rel=\"photo-creator noopener noreferrer\" target=\"_blank\">Artem Maltsev<\/a>&nbsp;on&nbsp;<a data-href=\"https:\/\/unsplash.com?utm_source=medium&amp;utm_medium=referral\" href=\"https:\/\/unsplash.com\/?utm_source=medium&amp;utm_medium=referral\" rel=\"photo-source noopener noreferrer\" target=\"_blank\">Unsplash<\/a><\/p>\n<p id=\"3e36\" name=\"3e36\">Data driven algorithms implicitly assume that the model of the world they are capturing is relatively stable. This makes them very effective for problems where the rules of the game are not changing significantly, or changing at a rate that is slow enough to allow sufficient new data samples to be collected for retraining and adaptation to the new reality. Image recognition is the textbook success story, because&nbsp;<a data-href=\"https:\/\/itunes.apple.com\/us\/app\/not-hotdog\/id1212457521?mt=8\" href=\"https:\/\/itunes.apple.com\/us\/app\/not-hotdog\/id1212457521?mt=8\" rel=\"noopener noreferrer\" target=\"_blank\">hot dogs will most likely still look the same<\/a>&nbsp;a year from now.<\/p>\n<figure id=\"bf47\" name=\"bf47\">\n<p><canvas height=\"50\" width=\"75\"><\/canvas><img decoding=\"async\" data-src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*2dH1TyTs8_YLnoha.png\" src=\"https:\/\/cdn-images-1.medium.com\/max\/800\/0*2dH1TyTs8_YLnoha.png\" style=\"width: 700px; height: 466px;\" \/><\/p>\n<\/figure>\n<p name=\"cb01\" style=\"text-align: center;\">Photo by HBO \/ Twitter.com\/TechatBloomberg<\/p>\n<h3 id=\"cb01\" name=\"cb01\">So what should you&nbsp;choose?<\/h3>\n<p id=\"2abb\" name=\"2abb\">Choosing the right algorithm is very dependent on the problem you are trying to solve. It is becoming very commonplace that a technique is chosen for the wrong reasons, often due to hype surrounding that technique, or the lack of awareness of the broader landscape of A.I. algorithms.&nbsp;<em>When the tool you have is a hammer, everything starts to look like a nail.<\/em><\/p>\n<p id=\"6b67\" name=\"6b67\">As A.I. proliferates into every aspect of our lives, and requirements become more sophisticated, it is also highly probable that an application will need more than one of these techniques. Noisy data that is gathered through sensors might be processed through an ANN to infer the discrete information about the environment, while a symbolic algorithm uses that information to search the space of possible actions that can lead to some goal at a more abstract logical level.<\/p>\n<p id=\"5d15\" name=\"5d15\">A machine learning algorithm could be very effective at inferring the surroundings of an autonomous vehicle within a certain level of probability, but that chance of error is not acceptable if it could make it drive off a cliff, just because that scenario was never captured properly in the sample training data. Furthermore, bringing deep learning to mission critical applications is proving to be challenging, especially when&nbsp;<a data-href=\"https:\/\/arxiv.org\/pdf\/1811.11553.pdf\" href=\"https:\/\/arxiv.org\/pdf\/1811.11553.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">a motor scooter gets confused for a parachute<\/a>&nbsp;just because it was toppled over.<\/p>\n<p id=\"4049\" name=\"4049\">Overlaying a symbolic constraint system ensures that what is logically obvious is still enforced, even if the underlying deep learning layer says otherwise due to some statistical bias or&nbsp;<a data-href=\"https:\/\/www.heraldnet.com\/nation-world\/not-just-the-737-angle-of-attack-sensors-have-had-problems\/\" href=\"https:\/\/www.heraldnet.com\/nation-world\/not-just-the-737-angle-of-attack-sensors-have-had-problems\/\" rel=\"noopener noreferrer\" target=\"_blank\">noisy sensor readings<\/a>. This is becoming increasingly important for high risk applications, like managing power stations, dispatching trains, autopilot systems, and space applications. The implications of misclassification in such systems are much more serious than&nbsp;<a data-href=\"https:\/\/medium.com\/@Hector_27685\/netflix-recommendations-are-broken-theres-an-alternative-58d2ab435488\" href=\"https:\/\/medium.com\/@Hector_27685\/netflix-recommendations-are-broken-theres-an-alternative-58d2ab435488\" target=\"_blank\" rel=\"noopener noreferrer\">recommending the wrong movie<\/a>.<\/p>\n<p id=\"5786\" name=\"5786\">A hybrid system that makes use of both&nbsp;<em>connectionist<\/em>&nbsp;and&nbsp;<em>symbolic<\/em>&nbsp;algorithms will capitalise on the strengths of both while counteracting the weaknesses of each other. The limits of using one technique in isolation&nbsp;<a data-href=\"https:\/\/arxiv.org\/abs\/1801.00631\" href=\"https:\/\/arxiv.org\/abs\/1801.00631\" rel=\"noopener noreferrer\" target=\"_blank\">are already being identified<\/a>, and latest research has started to show that&nbsp;<a data-href=\"https:\/\/www.technologyreview.com\/s\/613270\/two-rival-ai-approaches-combine-to-let-machines-learn-about-the-world-like-a-child\/\" href=\"https:\/\/www.technologyreview.com\/s\/613270\/two-rival-ai-approaches-combine-to-let-machines-learn-about-the-world-like-a-child\/\" rel=\"noopener noreferrer\" target=\"_blank\">combining both approaches can lead to a more&nbsp;<em>intelligent&nbsp;<\/em>solution<\/a>.<\/p>\n<p name=\"5786\">originally published on <a href=\"https:\/\/towardsdatascience.com\/symbolic-vs-connectionist-a-i-8cf6b656927\" rel=\"noopener\">Medium<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial Intelligence&nbsp;techniques have traditionally been divided into two categories; Symbolic A.I. and Connectionist A.I. The latter kind have gained significant popularity with&nbsp;recent success stories&nbsp;and media hype, and no one could be blamed for thinking that they are what A.I. is all about. There have even been cases of people&nbsp;spreading false information&nbsp;to diverge attention and funding from more classic A.I. research and development. The truth of the matter is that each set of techniques has its place. Each has its own strengths and weaknesses, and choosing the right tools for the job is key.<\/p>\n","protected":false},"author":533,"featured_media":4386,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[183],"tags":[97],"ppma_author":[3184],"class_list":["post-1632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-ml","tag-artificial-intelligence"],"authors":[{"term_id":3184,"user_id":533,"is_guest":0,"slug":"josef-bajada","display_name":"Josef Bajada","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Bajada","first_name":"Josef","job_title":"","description":"Josef Bajada has a Ph.D. in Computer Science specialising in A.I. techniques for planning and scheduling and an MBA majoring in Innovation Management and Knowledge Management. He works as a technology consultant developing A.I. solutions for logistics and oilfield technology applications, and as a software architect for high performance and mission critical systems. He also published several academic papers related to Computer Science and A.I."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/533"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=1632"}],"version-history":[{"count":1,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1632\/revisions"}],"predecessor-version":[{"id":5797,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/1632\/revisions\/5797"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/4386"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=1632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=1632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=1632"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=1632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}