Search Results

1 - 7 of 7 items :

  • "conservation" x
  • Artificial Intelligence x
Clear All
Reasoning with Computer Code: a new Mathematical Logic


A logic is a mathematical model of knowledge used to study how we reason, how we describe the world, and how we infer the conclusions that determine our behavior. The logic presented here is natural. It has been experimentally observed, not designed. It represents knowledge as a causal set, includes a new type of inference based on the minimization of an action functional, and generates its own semantics, making it unnecessary to prescribe one. This logic is suitable for high-level reasoning with computer code, including tasks such as self-programming, objectoriented analysis, refactoring, systems integration, code reuse, and automated programming from sensor-acquired data.

A strong theoretical foundation exists for the new logic. The inference derives laws of conservation from the permutation symmetry of the causal set, and calculates the corresponding conserved quantities. The association between symmetries and conservation laws is a fundamental and well-known law of nature and a general principle in modern theoretical Physics. The conserved quantities take the form of a nested hierarchy of invariant partitions of the given set. The logic associates elements of the set and binds them together to form the levels of the hierarchy. It is conjectured that the hierarchy corresponds to the invariant representations that the brain is known to generate. The hierarchies also represent fully object-oriented, self-generated code, that can be directly compiled and executed (when a compiler becomes available), or translated to a suitable programming language.

The approach is constructivist because all entities are constructed bottom-up, with the fundamental principles of nature being at the bottom, and their existence is proved by construction.

The new logic is mathematically introduced and later discussed in the context of transformations of algorithms and computer programs. We discuss what a full self-programming capability would really mean. We argue that self-programming and the fundamental question about the origin of algorithms are inextricably linked. We discuss previously published, fully automated applications to self-programming, and present a virtual machine that supports the logic, an algorithm that allows for the virtual machine to be simulated on a digital computer, and a fully explained neural network implementation of the algorithm.

Open access
Black-box Brain Experiments, Causal Mathematical Logic, and the Thermodynamics of Intelligence

:// Pissanetzky, S. 2012h. The theory of Detailed Dynamics and the Combinatorial Explosion. Available electronically at Pissanetzky, S. 2013. The unification of symmetry and conservation. Bulletin of the American Physical Society 58(3):N2.0001. Available electronically from Wallace, D. 2013. Thermodynamics as control theory. Available electronically at Wissner

Open access
Data Mining Approach to Image Feature Extraction in Old Painting Restoration

., Martinez K. (2002) ARTISTE image retrieval system puts European galleries in the picture, Cultivate Interactive,7, http://www.cultivateint. org/issue7/artiste [5] Barni M., Bartolini F., Cappellini V. (2000) Image processing for virtual restoration of artworks. IEEE Multimedia, 7,2:34{37 [6] Barni M., Pelagotti A., Piva A. (2005) Image processing for the analysis and conservation of paintings: opportunities and challenges, IEEE Sig Proc Mag, 141 [7] Berns R. S., Byrns S., Casadio F., Fiedler I., Gallagher C., Imai F. H

Open access
Coordinator Role Mobility Method for Increasing the Life Expectancy of Wireless Sensor Networks

References [1] S. Basagni, A. Carosi, and C. Petrioli, “Controlled Vs. Uncontrolled Mobility in Wireless Sensor Networks: Some Performance Insights,” in 2007 IEEE 66th Vehicular Technology Conference, Sep. 2007. pp. 269-273. [2] D. M. Blough and P. Santi, “Investigating upper bounds on network lifetime extension for cell-based energy conservation techniques in stationary ad hoc networks,” in Proceedings of the 8th annual international conference on Mobile computing and networking - MobiCom

Open access
Developing the Reconfiguration Method to Increase Life Expectancy of Dynamic Wireless Sensor Network in Container Terminal

R eferences [1] S. Basagni, A. Carosi and C. Petrioli, “Controlled vs. uncontrolled mobility in wireless sensor networks: Some performance insights,” in IEEE 66th Vehicular Technology Conference , Baltimore, MD, 2007, pp. 269–273. [2] D. M. Blough and P. Santi, “Investigating upper bounds on network lifetime extension for cell-based energy conservation techniques in stationary ad hoc networks,” in Proceedings of the 8th annual international conference on Mobile computing and networking. (MobiCom ’02), New

Open access
An Overview of the Use of GML in Modern Spatial Data Infrastructures

Geospatial Consortium, Inc., 2010. [Online]. Available: I. Rinne , "Introducing OCG Web Services at FMI", 19 th EGOWS 2008, 9-12 June, Ljubljana, Slovenia, ARSO, 2008. [Online]. Available: T. Hamre, H. Krasemann, S. Groom, D. Dunne , G. Breitbach, B. Hackett, K. Sørensen and S. Sandven, "Interoperable web GIS services for marine pollution monitoring and forecasting", Journal of Coastal Conservation, vol

Open access
Social Transformation of Gender Role in the Area of Sebangau National Park

REFERENCES Agustina, L. (2009). ImplementasiKampanye “Sebangau Conservation Project” World Wide Fund for Nature” (WWF) Indonesia Kalimantan Tengah dalam Cleves, J. M. (2002). Gender dan Pembangunan, Yogyakarta: Rifka Anisa and PustakaPelajar. Davey, G. A. (1998). National System Planning for Protected Areas , Cambridge: IUCN Publications Services Unit1 dim. Djamal, Z. I. (2009). BesarnyaEksploitasiPerempuan dan Lingkungan di Indonesia: SiapadapatMengendalikanPenyulutnya? Jakarta: PT

Open access