scholarly journals Triadic Automata and Machines as Information Transformers

Information ◽  
2020 ◽  
Vol 11 (2) ◽  
pp. 102
Author(s):  
Mark Burgin

Algorithms and abstract automata (abstract machines) are used to describe, model, explore and improve computers, cell phones, computer networks, such as the Internet, and processes in them. Traditional models of information processing systems—abstract automata—are aimed at performing transformations of data. These transformations are performed by their hardware (abstract devices) and controlled by their software (programs)—both of which stay unchanged during the whole computational process. However, in physical computers, their software is also changing by special tools such as interpreters, compilers, optimizers and translators. In addition, people change the hardware of their computers by extending the external memory. Moreover, the hardware of computer networks is incessantly altering—new computers and other devices are added while other computers and other devices are disconnected. To better represent these peculiarities of computers and computer networks, we introduce and study a more complete model of computations, which is called a triadic automaton or machine. In contrast to traditional models of computations, triadic automata (machine) perform computational processes transforming not only data but also hardware and programs, which control data transformation. In addition, we further develop taxonomy of classes of automata and machines as well as of individual automata and machines according to information they produce.

2012 ◽  
Vol 55 (1) ◽  
pp. 161-190 ◽  
Author(s):  
Dillon Mahoney

Abstract:This article explores recent changes in Kenya's curio or handicrafts industry. In addition to a crisis in access to raw materials and a diversifying tourist market, the rise in the use of cell phones and the Internet during the early 2000s present unique challenges. Nonetheless, innovative Kenyan entrepreneurs are using these challenges to market and brand products in new ways—by representing modern global interconnectedness as “fair trade” or creatively promoting the authenticity of their products in other ways. Kenya's artisans and traders have also adapted to diverse and complex tastes beyond the desire for an invented tradition of ethnic and “tribal” art.


2007 ◽  
Vol 16 (2) ◽  
Author(s):  
D. Martinovic ◽  
J. Magliaro

Communication and information computer networks connect the world in ways that make globalization more natural and inequity more subtle. As educators, we look at these phenomena holistically analyzing them from the realist’s view, thus exploring tensions, (in) equity and (in)justice, and from the idealist’s view, thus embracing connectivity, convergence and development of a collective consciousness. In an increasingly market- driven world we find examples of openness and human generosity that are based on networks, specifically the Internet. After addressing open movements in publishing, software industry and education, we describe the possibility of a dialectic equilibrium between globalization and indigenousness in view of ecologically designed future smart networks


Author(s):  
Ya-Wen Lei

This introductory chapter reveals that a nationwide contentious public sphere has emerged in China. It is an unruly sphere capable of generating issues and agendas not set by the Chinese state, as opposed to a sphere mostly orchestrated and constrained by said state. Over time, China's contentious public sphere has been increasingly recognized by the Chinese state as a force to be reckoned and negotiated with. Starting around 2010, official media of the Chinese Communist Party (CCP), such as the People's Daily, began to warn of a threatening public sphere mediated by cell phones, the Internet, and even some unruly voices within state-controlled media. The state's awareness of these developments, however, means that one must not overstate the stability or permanence of the newly emerged contentious public sphere. Indeed, this provocative public arena has encountered serious opposition and setbacks, particularly since 2013. Seeing the rise of such a sphere as a threat to national security and an indication of ideological struggle between the West and China, the Chinese state has taken comprehensive and combative measures to contain it.


2012 ◽  
pp. 911-917 ◽  
Author(s):  
Adam M. Bossler ◽  
Thomas J. Holt

The development of computers, cell phones, and the Internet allows individuals to connect with one another with ease in a variety of ways in near real time. The beneficial impact of these resources, however, has been adulterated by some to engage in abusive communications while online. Specifically, individuals now use email, text messaging, and social networking sites to spread hurtful or malicious information about others. This entry summarizes the problem of online abuse via cyberbullying, online harassment, and stalking by discussing the prevalence of these phenomena as well as the prospective predictors of victimization.


2011 ◽  
pp. 1393-1399
Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of information technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructures and technologies provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as of summer 2004, 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet, because it would be a waste of resource. However, the Internet is an open environment; therefore, protecting data flowing on the Internet from attacks is a pressing e-government issue. All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO’04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang, Feng, Lai, & Yu, 2004). From the last decade, steganology—the technique for digitally hiding and detecting information – is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security.


Author(s):  
Jerry Pournelle

There are two basic categories of Internet lies: frauds, where the object is to get your money, and hoaxes, where the primary object is just to pull your chain, but there can be far-reaching consequences as well. Hoaxes give the perpetrators ego gratification as they watch their creation spread throughout the Internet. Frauds may give the perpetrators your life savings, and give you months—maybe years—of hassle as you try to repair your credit record and retrieve your very identity. Hoaxes—Hoaxes are spread by e-mail and come in an endless variety of guises. There are, for example, fake virus warnings, chain letters promising riches if you follow their instructions (or threatening dire consequences if you don’t); urban myths about women in peril, dogs in microwaves, and hypodermic needles on theater seats; letters that tug at your heart strings or appeal to your greedy side; Internet petitions (often based on false information); and letters claiming that Bill Gates wants to give you money. Yeah, right. Even the most “innocent” hoaxes are harmful. At the very least, they take up your time, and they try to get you to forward them to other people as well. If you forward a letter to just 40 people, and each of them does the same, and so on, then after just four steps, more than two and a half million copies will have been sent out. That’s a lot of wasted time and wasted bandwidth. These letters can also contain dangerous misinformation and bad advice. One example is a common letter advising women not to stop when pulled over by the highway patrol, but instead to dial #77 on their cell phones to talk to the police—a wrong number in 48 of the 50 states! Perhaps the most common example is the virus hoax—typically a letter forwarded by someone you know warning you that if you find a certain file on your computer it means you are infected with a virus.


2002 ◽  
Vol 96 (3) ◽  
pp. 684-686
Author(s):  
Bernard I. Finel

For many people, the Internet is simply a mass of information that arrives on their desktop through the miracle of e-mail or web browsers. The existence of reasonably efficient and intuitive interfaces, however, serves to mask the incredible complexity inherent in the establishment, growth, and maintenance of a global tangle of computer networks administered by a variety of universities, private corporations, governments, and individuals.


Sign in / Sign up

Export Citation Format

Share Document