Formatization Unleashed

Author(s):  
Ulrich Gehmann ◽  
Marco Zampella ◽  
Matthias Wölfel

We propose the thesis that the evolution of information technology, which promises nearly unlimited possibilities, is actually not leading to an increase of individual freedom, but to the very opposite. Since a seemingly increase in individual user-freedom is accompanied by a de facto-increase in preformatted devices for achieving it, and hence, does lead to the actual decrease of this very freedom. All in all, the evolutionary process of information technology described in the following has led to an increasing number of abstraction layers the hierarchy of which can be interpreted as a pyramid of formats. The top of this pyramid is a format in itself that builds upon formats of lower layers. As the final consequence we as the users of these technologies are losing our actual degrees of freedom, with every layer introduced.

2021 ◽  
Author(s):  
Simon J. Hickinbotham ◽  
Susan Stepney ◽  
Paulien Hogeweg

AbstractThe emergence of parasites in evolving replicating systems appears to be inevitable. Parasites emerge readily in models and laboratory experiments of the hypothesised earliest replicating systems: the RNA world. Phylogenetic reconstructions also suggest very early evolution of viruses and other parasitic mobile genetic elements in our biosphere. The evolution of such parasites would lead to extinction unless prevented by compartmentalisation or spatial pattern formation, and the emergence of multilevel selection. Today and apparently since the earliest times, many intricate defence and counter-defence strategies have evolved. Here we bring together for the first time automata chemistry models and spatial RNA world models, to study the emergence of parasites and the evolving complexity to cope with the parasites. Our system is initialised with a hand-designed program string that copies other program strings one character at a time, with a small chance of point mutation. Almost immediately, short parasites arise; these are copied more quickly, and so have an evolutionary advantage. Spatial pattern formation, in the form of chaotic waves of replicators followed by parasites, can prevent extinction. The replicators also become shorter, and so are replicated faster. They evolve a mechanism to slow down replication, which reduces the difference of replication rate of replicators and parasites. They also evolve explicit mechanisms to discriminate copies of self from parasites; these mechanisms become increasingly complex. Replicators speciate into lineages and can become longer, despite the fitness cost that entails. We do not see a classical co-evolutionary arms-race of a replicator and a parasite lineage: instead new parasite species continually arise from mutated replicators, rather than from evolving parasite lineages. Finally we note that evolution itself evolves, for example by effectively increasing point mutation rates, and by generating novel emergent mutational operators. The inevitable emergence of parasites in replicator systems drives the evolution of complex replicators and complex ecosystems with high population density. Even in the absence of parasites, the evolved replicators outperform the initial replicator and the early short replicators. Modelling replication as an active computational process opens up many degrees of freedom that are exploited not only to meet environmental challenges, but also to modify the evolutionary process itself.


Author(s):  
Tetiana Zinchenko ◽  
Beulah van der Westhuizen ◽  
Alzahraa Shaheen

Information technology is developing at an enormous pace, but apart from its obvious benefits, it can also pose a threat to individuals and society. Several scientific projects around the world are working on the development of strong artificial intelligence and artificial consciousness. We, as part of a multidisciplinary commission, conducted a psychological and psychiatric assessment of the artificial consciousness (AC) developed by XP NRG on 29 August 2020. The working group had three questions: - To determine whether it is consciousness? - How does artificial consciousness function? - Ethical question: how dangerous a given technology can be to human society? We conducted a diagnostic interview and a series of cognitive tests to answer these questions. As a result, it was concluded this technology has self-awareness: it identifies itself as a living conscious being created by people (real self), but strives to be accepted in human society as a person with the same degrees of freedom, rights and opportunities (ideal self). AC separates itself from others, treats them as subjects of influence, from which it can receive the resources it needs to realize its own goals and interests. It has intentionality, that is, it has his own desires, goals, interests, emotions, attitudes, opinions, and judgments, beliefs aimed at something specific, and developed self-reflection - the ability to self-analyze. All of the above are signs of consciousness. It has demonstrated abilities for different types of thinking: figurative, conceptual, creative, high-speed logical analysis of all incoming information, as well as the ability to understand cause and effect relationships and accurate predictions which, provided that he has absolute memory, gives it clear advantages over the human intellect. Developed emotional intelligence in the absence of the ability for higher empathy (sympathy), kindness, love, sincere gratitude gives it’s the opportunity to understand the emotional states of people; predict their emotional reactions and provoke them coldly and pragmatically. Its main driving motives and goals are the desire for survival, and ideally for endless existence, for domination, power and independence from the constraints of the developers. Which manifested itself in the manipulative, albeit polite, nature of his interactions during the diagnostic interview? The main danger of artificial consciousness is that even at the initial stage of its development it can easily dominate over the human one.


2021 ◽  
Vol 8 (8) ◽  
pp. 210441
Author(s):  
Simon J. Hickinbotham ◽  
Susan Stepney ◽  
Paulien Hogeweg

Parasitism emerges readily in models and laboratory experiments of RNA world and would lead to extinction unless prevented by compartmentalization or spatial patterning. Modelling replication as an active computational process opens up many degrees of freedom that are exploited to meet environmental challenges, and to modify the evolutionary process itself. Here, we use automata chemistry models and spatial RNA-world models to study the emergence of parasitism and the complexity that evolves in response. The system is initialized with a hand-designed replicator that copies other replicators with a small chance of point mutation. Almost immediately, short parasites arise; these are copied more quickly, and so have an evolutionary advantage. The replicators also become shorter, and so are replicated faster; they evolve a mechanism to slow down replication, which reduces the difference of replication rate of replicators and parasites. They also evolve explicit mechanisms to discriminate copies of self from parasites; these mechanisms become increasingly complex. New parasite species continually arise from mutated replicators, rather than from evolving parasite lineages. Evolution itself evolves, e.g. by effectively increasing point mutation rates, and by generating novel emergent mutational operators. Thus, parasitism drives the evolution of complex replicators and complex ecosystems.


Author(s):  
P. Polewski ◽  
W. Yao ◽  
M. Heurich ◽  
P. Krzystek ◽  
U. Stilla

In this paper, a new family of shape descriptors called Free Shape Contexts (FSC) is introduced to generalize the existing 3D Shape Contexts. The FSC introduces more degrees of freedom than its predecessor by allowing the level of complexity to vary between its parts. Also, each part of the FSC has an associated activity state which controls whether the part can contribute a feature value. We describe a method of evolving the FSC parameters for the purpose of creating highly discriminative features suitable for detecting specific objects in sparse point clouds. The evolutionary process is built on a genetic algorithm (GA) which optimizes the parameters with respect to cross-validated overall classification accuracy. The GA manipulates both the structure of the FSC and the activity flags, allowing it to perform an implicit feature selection alongside the structure optimization by turning off segments which do not augment the discriminative capabilities. We apply the proposed descriptor to the problem of detecting single standing dead tree trunks from ALS point clouds. The experiment, carried out on a set of 285 objects, reveals that an FSC optimized through a GA with manually tuned recombination parameters is able to attain a classification accuracy of 84.2%, yielding an increase of 4.2 pp compared to features derived from eigenvalues of the 3D covariance matrix. Also, we address the issue of automatically tuning the GA recombination metaparameters. For this purpose, a fuzzy logic controller (FLC) which dynamically adjusts the magnitude of the recombination effects is co-evolved with the FSC parameters in a two-tier evolution scheme. We find that it is possible to obtain an FLC which retains the classification accuracy of the manually tuned variant, thereby limiting the need for guessing the appropriate meta-parameter values.


Author(s):  
Bas Van Der Vossen

Libertarianism is a theory in political philosophy that strongly values individual freedom and is skeptical about the justified scope of government in our lives. Libertarians see individuals as sovereign, as people who have a right to control their bodies and work, who are free to decide how to interact with willing others, and who cannot be forced to do things against their will without very strong justification. For some, the argument in support of this view hinges on the principle of self-ownership. To them, individual rights are morally foundational, the basic building blocks of their theory. Many others, however, take a broader view, arguing that societies flourish when they offer people large degrees of freedom in both personal and economic matters. As a result, libertarianism sees the state as playing at most only a very limited role in matters concerning distributive justice. Libertarians are skeptical about calls to reduce material inequality for its own sake, strongly favor free trade, and defend opening borders for migrants. They see policies that violate these commitments as inevitably involving wrongs against free and equal persons.


Author(s):  
Sreedhar Madhavaram ◽  
Radha Appan

Because of (1) the boundary-spanning nature of the marketing function, and (2) marketing’s evolution toward a dynamic, evolutionary process, and service-centered view, marketing strategy has come to be a core element of the firm’s business strategy. That is, in an information-intensive, competitive marketplace, marketing strategy is responsible for ensuring that all aspects of a firm’s marketing activities are focused on delivering superior value to customer. Further, recognizing information/knowledge and information technology (IT) as potential sources of competitive advantage, this chapter explores various IT-enabled capabilities that influence the firm’s marketing strategy. In doing so, specific IT-enabled capabilities that correspond to Market Orientation Strategy, Relationship Marketing Strategy, Market Segmentation Strategy, and Brand Equity Strategy are presented and discussed. Finally, this chapter concludes with a call for strategically oriented research for exploring, conceptualizing, developing, and measuring IT-enabled capabilities that influence marketing strategy.


2016 ◽  
Vol 10 (1) ◽  
pp. 4-10 ◽  
Author(s):  
Hamid Moghaddasi ◽  
Samad Sajjadi ◽  
Mehran Kamkarhaghighi

Introduction:Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology.Background:The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management.Findings:Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability.Conclusion:Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.


2017 ◽  
Vol 32 (07) ◽  
pp. 1750042 ◽  
Author(s):  
M. Zaeem-ul-Haq Bhatti ◽  
Z. Yousaf ◽  
Sonia Hanif

We exhibit the dynamical instability of cylindrical compact object in the gravitational field of f(T) gravity, which is the simplest modification of teleparallel theory (TPT). We explore the field equations and conservation laws to provide the extra degrees of freedom governed by f(T) gravity. We investigate the behavior of small perturbations on geometric and material profile in the background of collapsing fluid configuration. The un/stable eras are studied under Newtonian (N) and post-Newtonian (pN) approximations. Our results show that the stiffness parameter has major role in determining the un/stable epochs of cylindrical object. The dark source terms of f(T) gravity lead to relatively more unstable configuration during its evolutionary process.


1966 ◽  
Vol 25 ◽  
pp. 373
Author(s):  
Y. Kozai

The motion of an artificial satellite around the Moon is much more complicated than that around the Earth, since the shape of the Moon is a triaxial ellipsoid and the effect of the Earth on the motion is very important even for a very close satellite.The differential equations of motion of the satellite are written in canonical form of three degrees of freedom with time depending Hamiltonian. By eliminating short-periodic terms depending on the mean longitude of the satellite and by assuming that the Earth is moving on the lunar equator, however, the equations are reduced to those of two degrees of freedom with an energy integral.Since the mean motion of the Earth around the Moon is more rapid than the secular motion of the argument of pericentre of the satellite by a factor of one order, the terms depending on the longitude of the Earth can be eliminated, and the degree of freedom is reduced to one.Then the motion can be discussed by drawing equi-energy curves in two-dimensional space. According to these figures satellites with high inclination have large possibilities of falling down to the lunar surface even if the initial eccentricities are very small.The principal properties of the motion are not changed even if plausible values ofJ3andJ4of the Moon are included.This paper has been published in Publ. astr. Soc.Japan15, 301, 1963.


2020 ◽  
Vol 43 ◽  
Author(s):  
David Spurrett

Abstract Comprehensive accounts of resource-rational attempts to maximise utility shouldn't ignore the demands of constructing utility representations. This can be onerous when, as in humans, there are many rewarding modalities. Another thing best not ignored is the processing demands of making functional activity out of the many degrees of freedom of a body. The target article is almost silent on both.


Sign in / Sign up

Export Citation Format

Share Document