We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables&...We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables'complementarity and the complementarity of uncertainty whilst the upper bound includes the complementarity of the observables,quantum discord,and quantum condition entropy.In quantum measurement processing,there exists a relationship between the complementarity of uncertainty and the complementarity of information.In addition,based on the information exclusion principle the complementarity of uncertainty and the shareability of quantum discord can exist as an essential factor to enhance the bounds of each other in the presence of quantum memory.展开更多
There is a long-standing conflict between intellectual property rights and public freedom of information.The continuous development of the“anti-circumvention clause”has caused the conflict to intensify.As a basic hu...There is a long-standing conflict between intellectual property rights and public freedom of information.The continuous development of the“anti-circumvention clause”has caused the conflict to intensify.As a basic human right,freedom of information is being gradually eroded by the expansion of intellectual property rights.The existing research mainly carries on the right balance from the negative protection path,but the positive protection path is more advantageous to realizing the public freedom of information and alleviates the conflict between the two kinds of rights.In practice,there are some problems in the application of the anti-circumvention clause,such as the legality of the aim,the division of the protected part,and the determination of the circumvention.This is mainly due to the lack of restrictions on technical measures,the failure to distinguish between“copyright protection”and“contact control”,and the offside and absence of administrative bodies in practice.We should protect public freedom of information by distinguishing the two measures of copyright protection and contact control and the two torts of access and use,increasing the restrictive conditions for the use of technical protection measures,and changing the functions of administrative supervision agencies.展开更多
With the rapid development of network technology, the human production mode, life style, and thinking mode have had the great change, meanwhile human values and morality are new changes. Network technology has created...With the rapid development of network technology, the human production mode, life style, and thinking mode have had the great change, meanwhile human values and morality are new changes. Network technology has created a brand of new social form and social network, which is an extension of the real social life. The purpose of this paper is to clarify the concept of a freedom of information analyzed by the principle of free network information. In this paper, theoretical and empirical combination is based on using multidisciplinary theory study from the perspective of moral cognition of this analysis. The problems of the network ethics which try to find out the method to solve the problem, standardize and strengthen the construction of the new good network ethics, purify network environment, and improve people's spiritual world and moral accomplishment, have important theoretical and empirical significance.展开更多
This essay is centred on Nigeria's Freedom of Information Act, with special interest in its relevance in the country's anti-corruption war. The paper reiterates that the law was passed to enable the public to access...This essay is centred on Nigeria's Freedom of Information Act, with special interest in its relevance in the country's anti-corruption war. The paper reiterates that the law was passed to enable the public to access certain government information, in order to ensure transparency and accountability. The FOI Act aims to make public records and information more freely available and to protect public records and information, in accordance with the public interest and protection of personal privacy. It enables citizens to hold the government accountable in the event of the misappropriation of public funds or failure to deliver public services. It also seeks to protect serving public officers against any adverse consequences from the unauthorized disclosure of certain kinds of official information, and to establish procedures for the achievement of these purposes. The Act further regulates conflicts between its provisions and those of other legislations. The paper contends that Freedom of Information is a fundamental indicator of economic development and progress, civic engagement and a properly functional democracy in every economy, describing it as a promising start in ensuring good governance and rule of law in Nigeria. The paper stresses the need for vigorous implementation of the FOI Act if the country is to make any significant breakthrough in the enthronement of good governance, transparency and accountability, adding that a strengthened FOI regime will enhance citizens' demand for accountability and check corruption in Nigeria.展开更多
By means of a representation of the elementary objects by the Lagrange density and by the commutators of the communication relations, correlations can be formed using the Fourier transform, which under the conditions ...By means of a representation of the elementary objects by the Lagrange density and by the commutators of the communication relations, correlations can be formed using the Fourier transform, which under the conditions of the Hamilton principle, describes correlation structures of the elementary objects with oscillator properties. The correlation structures obtained in this way are characterized by physical information, the essential component of which is the action. The correlation structures describe the physical properties and their interactions under the sole condition of the Hamilton’s principle. The structure, the properties and the interactions of elementary objects can be led back in this way to a fundamental four dimensional structure, which is therefore in their different modifications the building block of nature. With the presented method, an alternative interpretation of elementary physical effects to quantum mechanics is obtained. This report provides an overview of the fundamentals and statements of physical information theory and its consequences for understanding the nature of elementary objects.展开更多
In physical information theory elementary objects are represented as correlation structures with oscillator properties and characterized by action. The procedure makes it possible to describe the photons of positive a...In physical information theory elementary objects are represented as correlation structures with oscillator properties and characterized by action. The procedure makes it possible to describe the photons of positive and negative charges by positive and negative real action;gravitons are represented in equal amounts by positive and negative real, i.e., virtual action, and the components of the vacuum are characterized by deactivated virtual action. An analysis of the currents in the correlation structures of photons of static Maxwell fields with wave and particle properties, of the Maxwell vacuum and of the gravitons leads to a uniform three-dimensional representation of the structure of the action. Based on these results, a basic structure consisting of a system of oscillators is proposed, which describe the properties of charges and masses and interact with the photons of static Maxwell fields and with gravitons. All properties of the elemental components of nature can thus be traced back to a basic structure of action. It follows that nature can be derived from a uniform structure and this structure of action must therefore also be the basis of the origin of the cosmos.展开更多
This paper focuses on how to process the information in a discourse and studies the process principles of information.They are Deletion Principle,Generalization Principle,Construction Principle,Fuzzy Parsing Principle...This paper focuses on how to process the information in a discourse and studies the process principles of information.They are Deletion Principle,Generalization Principle,Construction Principle,Fuzzy Parsing Principle.They can be used in the reading comprehension.展开更多
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ...The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.展开更多
Along with the continuous development and application of information technology, the information management system of the modem enterprises plays a crucial role in achieving efficient enterprise development. In this p...Along with the continuous development and application of information technology, the information management system of the modem enterprises plays a crucial role in achieving efficient enterprise development. In this paper, the current problems in the information management system of modem enterprises are analyzed, the demand analysis of the information management system design is introduced, and also a feasible enterprise information management system is designed based on B/S mode.展开更多
This paper discussed theory and methodologies of debris-flow risk assessment and established an implementation process according to indicators of debris-flow hazard degree, vulnerability, risk degree, etc. Among these...This paper discussed theory and methodologies of debris-flow risk assessment and established an implementation process according to indicators of debris-flow hazard degree, vulnerability, risk degree, etc. Among these methodologies, historical and potential hazard degree was comprehensively considered into hazard assessment and hazard index was presented to indicate the debris-flow hazard degree. Regarding debris-flow vulnerability assessment, its statistical data and calculating procedure were based on the hazard-degree regionalization instead of administrative divisions, which improved the assessing scientificity and precision. These quantitative methodologies integrated with Geography Information System (GIS) were applied to the risk assessment of debris flows in the upper reach of Yangtze River. Its results were in substantial agreement on investigation data and the actual distribution of debris flows, which showed that these principles and methodologies were reasonable and feasible and can provide basis or reference for debris-flow risk assessment and disaster management.展开更多
Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage ...Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are: (i) information leakage in imperative program, (ii) imperative multi- threaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.展开更多
This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we ex...This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we explore the implications for black hole thermodynamics, astrophysics, astronomy, information theory, and the search for new laws of nature. The result includes an estimation of the number of bits stored in a black hole (less than 1.4 × 10<sup>30</sup> bits/m<sup>3</sup>), enhancing our understanding of information storage in extreme gravitational environments. This integration offers valuable insights into the fundamental nature of information and energy, impacting scientific advancements in multiple disciplines.展开更多
This paper considers a mean-field type stochastic control problem where the dynamics is governed by a forward and backward stochastic differential equation (SDE) driven by Lévy processes and the information avail...This paper considers a mean-field type stochastic control problem where the dynamics is governed by a forward and backward stochastic differential equation (SDE) driven by Lévy processes and the information available to the controller is possibly less than the overall information. All the system coefficients and the objective performance functional are allowed to be random, possibly non-Markovian. Malliavin calculus is employed to derive a maximum principle for the optimal control of such a system where the adjoint process is explicitly expressed.展开更多
Evaluating government openness is important in monitoring government performance and promoting government transparency. Therefore, it is necessary to develop an evaluation system for information openness of local gove...Evaluating government openness is important in monitoring government performance and promoting government transparency. Therefore, it is necessary to develop an evaluation system for information openness of local governments. In order to select evaluation indicators, we conducted a content analysis on current evaluation systems constructed by researchers and local governments and the materials of a case study on a local government. This evaluation system is composed of 5 first-tier indicators, 30 secondtier indicators and 69 third-tier indicators. Then Delphi Method and Analytic Hierarchy Process(AHP) Method are adopted to determine the weight of each indicator. At last, the practicability of the system is tested by an evaluation of the local government of Tianjin Binhai New Area, which has been undergoing administrative reform and attempting to reinvent itself in the past 5 years.展开更多
A nonlinear infectious disease model with information-influenced vaccination behavior and contact patterns is proposed in this paper,and the impact of information related to disease prevalence on increasing vaccinatio...A nonlinear infectious disease model with information-influenced vaccination behavior and contact patterns is proposed in this paper,and the impact of information related to disease prevalence on increasing vaccination coverage and reducing disease incidence during the outbreak is considered.First,we perform the analysis for the existence of equilibria and the stability properties of the proposed model.In particular,the geometric approach is used to obtain the sufficient condition which guarantees the global asymptotic stability of the unique endemic equilibrium Ee when the basic reproduction number Ro>1.Second,mathematical derivation combined with numerical simulation shows the existence of the double Hopf bifurcation around Ee.Third,based on the numerical results,it is shown that the information coverage and the average information delay may lead to more complex dynamical behaviors.Finally,the optimal control problem is established with information-infuenced vaccination and treatment as control variables.The corresponding optimal paths are obtained analytically by using Pontryagin's maximum principle,and the applicability and validity of virous intervention strategies for the proposed controls are presented by numerical experiments.展开更多
A quantum time-dependent spectrum analysis, or simply, quantum spectral analysis (QSA) is presented in this work, and it’s based on Schrödinger’s equation. In the classical world, it is named frequency in t...A quantum time-dependent spectrum analysis, or simply, quantum spectral analysis (QSA) is presented in this work, and it’s based on Schrödinger’s equation. In the classical world, it is named frequency in time (FIT), which is used here as a complement of the traditional frequency-dependent spectral analysis based on Fourier theory. Besides, FIT is a metric which assesses the impact of the flanks of a signal on its frequency spectrum, not taken into account by Fourier theory and lets alone in real time. Even more, and unlike all derived tools from Fourier Theory (i.e., continuous, discrete, fast, short-time, fractional and quantum Fourier Transform, as well as, Gabor) FIT has the following advantages, among others: 1) compact support with excellent energy output treatment, 2) low computational cost, O(N) for signals and O(N2) for images, 3) it does not have phase uncertainties (i.e., indeterminate phase for a magnitude = 0) as in the case of Discrete and Fast Fourier Transform (DFT, FFT, respectively). Finally, we can apply QSA to a quantum signal, that is, to a qubit stream in order to analyze it spectrally.展开更多
Zero-energy state is investigated by taking infinitesimal energy and observing its uncertainty in space-time, adopting quantum mechanics. In this paper, the uncertainty in conventional quantum mechanics is found to be...Zero-energy state is investigated by taking infinitesimal energy and observing its uncertainty in space-time, adopting quantum mechanics. In this paper, the uncertainty in conventional quantum mechanics is found to be interpreted as freedom in space-time, which results in possibility of time travel and space transition of the zero-energy state, which could be information or mind. The wave function of a physical system composed of multiple particles or wave-packets is examined and found that it can be arbitrarily changed by grouping by observers. It leads to an idea that even infinitesimal energy or wave-packets in a heavy physical system may separately exist and it has the infinite freedom of space-time.展开更多
In the plethora of conceptual and algorithmic developments supporting data analytics and system modeling,humancentric pursuits assume a particular position owing to ways they emphasize and realize interaction between ...In the plethora of conceptual and algorithmic developments supporting data analytics and system modeling,humancentric pursuits assume a particular position owing to ways they emphasize and realize interaction between users and the data.We advocate that the level of abstraction,which can be flexibly adjusted,is conveniently realized through Granular Computing.Granular Computing is concerned with the development and processing information granules–formal entities which facilitate a way of organizing knowledge about the available data and relationships existing there.This study identifies the principles of Granular Computing,shows how information granules are constructed and subsequently used in describing relationships present among the data.展开更多
With the explosion of services in grid environment, it's necessary to develop a mechanism which has the ability of discovering suitable grid services efficiently. This paper attempts to establish a layered resource m...With the explosion of services in grid environment, it's necessary to develop a mechanism which has the ability of discovering suitable grid services efficiently. This paper attempts to establish a layered resource management model based on the locality principle which classifies services into different domains and virtual organizations (VOs) according to their shared purposes. We propose an ontologybased search method applying the ontology theory for characterizing semantic information. In addition, we extend the UD- D1 in querying, storing, and so on. Simulation experiments have shown that our mechanism achieves higher performance in precision, recall and query response time.展开更多
基金the National Natural Science Foundation of China(Grant Nos.12271394,11775040,12011530014)the Natural Science Foundation of Shanxi Province+3 种基金China(Grant Nos.201801D221032 and 201801D121016)the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi(Grant No.2019L0178)the Key Research and Development Program of Shanxi Province(Grant No.202102010101004)the China Scholarship Council。
文摘We investigate the information exclusion principle for multiple measurements with assistance of multiple quantum memories that are well bounded by the upper and lower bounds.The lower bound depends on the observables'complementarity and the complementarity of uncertainty whilst the upper bound includes the complementarity of the observables,quantum discord,and quantum condition entropy.In quantum measurement processing,there exists a relationship between the complementarity of uncertainty and the complementarity of information.In addition,based on the information exclusion principle the complementarity of uncertainty and the shareability of quantum discord can exist as an essential factor to enhance the bounds of each other in the presence of quantum memory.
基金a phased result of the general project of the National Social Science Fund of China“Research on the Boundary and System Construction of Criminal Liability of Internet Service Providers”(Project No.18BFX104)。
文摘There is a long-standing conflict between intellectual property rights and public freedom of information.The continuous development of the“anti-circumvention clause”has caused the conflict to intensify.As a basic human right,freedom of information is being gradually eroded by the expansion of intellectual property rights.The existing research mainly carries on the right balance from the negative protection path,but the positive protection path is more advantageous to realizing the public freedom of information and alleviates the conflict between the two kinds of rights.In practice,there are some problems in the application of the anti-circumvention clause,such as the legality of the aim,the division of the protected part,and the determination of the circumvention.This is mainly due to the lack of restrictions on technical measures,the failure to distinguish between“copyright protection”and“contact control”,and the offside and absence of administrative bodies in practice.We should protect public freedom of information by distinguishing the two measures of copyright protection and contact control and the two torts of access and use,increasing the restrictive conditions for the use of technical protection measures,and changing the functions of administrative supervision agencies.
文摘With the rapid development of network technology, the human production mode, life style, and thinking mode have had the great change, meanwhile human values and morality are new changes. Network technology has created a brand of new social form and social network, which is an extension of the real social life. The purpose of this paper is to clarify the concept of a freedom of information analyzed by the principle of free network information. In this paper, theoretical and empirical combination is based on using multidisciplinary theory study from the perspective of moral cognition of this analysis. The problems of the network ethics which try to find out the method to solve the problem, standardize and strengthen the construction of the new good network ethics, purify network environment, and improve people's spiritual world and moral accomplishment, have important theoretical and empirical significance.
文摘This essay is centred on Nigeria's Freedom of Information Act, with special interest in its relevance in the country's anti-corruption war. The paper reiterates that the law was passed to enable the public to access certain government information, in order to ensure transparency and accountability. The FOI Act aims to make public records and information more freely available and to protect public records and information, in accordance with the public interest and protection of personal privacy. It enables citizens to hold the government accountable in the event of the misappropriation of public funds or failure to deliver public services. It also seeks to protect serving public officers against any adverse consequences from the unauthorized disclosure of certain kinds of official information, and to establish procedures for the achievement of these purposes. The Act further regulates conflicts between its provisions and those of other legislations. The paper contends that Freedom of Information is a fundamental indicator of economic development and progress, civic engagement and a properly functional democracy in every economy, describing it as a promising start in ensuring good governance and rule of law in Nigeria. The paper stresses the need for vigorous implementation of the FOI Act if the country is to make any significant breakthrough in the enthronement of good governance, transparency and accountability, adding that a strengthened FOI regime will enhance citizens' demand for accountability and check corruption in Nigeria.
文摘By means of a representation of the elementary objects by the Lagrange density and by the commutators of the communication relations, correlations can be formed using the Fourier transform, which under the conditions of the Hamilton principle, describes correlation structures of the elementary objects with oscillator properties. The correlation structures obtained in this way are characterized by physical information, the essential component of which is the action. The correlation structures describe the physical properties and their interactions under the sole condition of the Hamilton’s principle. The structure, the properties and the interactions of elementary objects can be led back in this way to a fundamental four dimensional structure, which is therefore in their different modifications the building block of nature. With the presented method, an alternative interpretation of elementary physical effects to quantum mechanics is obtained. This report provides an overview of the fundamentals and statements of physical information theory and its consequences for understanding the nature of elementary objects.
文摘In physical information theory elementary objects are represented as correlation structures with oscillator properties and characterized by action. The procedure makes it possible to describe the photons of positive and negative charges by positive and negative real action;gravitons are represented in equal amounts by positive and negative real, i.e., virtual action, and the components of the vacuum are characterized by deactivated virtual action. An analysis of the currents in the correlation structures of photons of static Maxwell fields with wave and particle properties, of the Maxwell vacuum and of the gravitons leads to a uniform three-dimensional representation of the structure of the action. Based on these results, a basic structure consisting of a system of oscillators is proposed, which describe the properties of charges and masses and interact with the photons of static Maxwell fields and with gravitons. All properties of the elemental components of nature can thus be traced back to a basic structure of action. It follows that nature can be derived from a uniform structure and this structure of action must therefore also be the basis of the origin of the cosmos.
文摘This paper focuses on how to process the information in a discourse and studies the process principles of information.They are Deletion Principle,Generalization Principle,Construction Principle,Fuzzy Parsing Principle.They can be used in the reading comprehension.
文摘The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.
文摘Along with the continuous development and application of information technology, the information management system of the modem enterprises plays a crucial role in achieving efficient enterprise development. In this paper, the current problems in the information management system of modem enterprises are analyzed, the demand analysis of the information management system design is introduced, and also a feasible enterprise information management system is designed based on B/S mode.
基金the National Natural Science Foundation of China (40671153)the Scientific Research Fund of Hunan Provincial Education Department (05C175) the Knowledge Innovation Program of Chinese Academy Sciences (KZCX2- YW-302)
文摘This paper discussed theory and methodologies of debris-flow risk assessment and established an implementation process according to indicators of debris-flow hazard degree, vulnerability, risk degree, etc. Among these methodologies, historical and potential hazard degree was comprehensively considered into hazard assessment and hazard index was presented to indicate the debris-flow hazard degree. Regarding debris-flow vulnerability assessment, its statistical data and calculating procedure were based on the hazard-degree regionalization instead of administrative divisions, which improved the assessing scientificity and precision. These quantitative methodologies integrated with Geography Information System (GIS) were applied to the risk assessment of debris flows in the upper reach of Yangtze River. Its results were in substantial agreement on investigation data and the actual distribution of debris flows, which showed that these principles and methodologies were reasonable and feasible and can provide basis or reference for debris-flow risk assessment and disaster management.
文摘Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are: (i) information leakage in imperative program, (ii) imperative multi- threaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.
文摘This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we explore the implications for black hole thermodynamics, astrophysics, astronomy, information theory, and the search for new laws of nature. The result includes an estimation of the number of bits stored in a black hole (less than 1.4 × 10<sup>30</sup> bits/m<sup>3</sup>), enhancing our understanding of information storage in extreme gravitational environments. This integration offers valuable insights into the fundamental nature of information and energy, impacting scientific advancements in multiple disciplines.
文摘This paper considers a mean-field type stochastic control problem where the dynamics is governed by a forward and backward stochastic differential equation (SDE) driven by Lévy processes and the information available to the controller is possibly less than the overall information. All the system coefficients and the objective performance functional are allowed to be random, possibly non-Markovian. Malliavin calculus is employed to derive a maximum principle for the optimal control of such a system where the adjoint process is explicitly expressed.
基金jointly supported by the Foundation for Humanities and Social Sciences of the Chinese Ministry of Education(Grant No.10YJA870021)Center for Asia Research of Nankai University(Grant No.AS0917)
文摘Evaluating government openness is important in monitoring government performance and promoting government transparency. Therefore, it is necessary to develop an evaluation system for information openness of local governments. In order to select evaluation indicators, we conducted a content analysis on current evaluation systems constructed by researchers and local governments and the materials of a case study on a local government. This evaluation system is composed of 5 first-tier indicators, 30 secondtier indicators and 69 third-tier indicators. Then Delphi Method and Analytic Hierarchy Process(AHP) Method are adopted to determine the weight of each indicator. At last, the practicability of the system is tested by an evaluation of the local government of Tianjin Binhai New Area, which has been undergoing administrative reform and attempting to reinvent itself in the past 5 years.
文摘A nonlinear infectious disease model with information-influenced vaccination behavior and contact patterns is proposed in this paper,and the impact of information related to disease prevalence on increasing vaccination coverage and reducing disease incidence during the outbreak is considered.First,we perform the analysis for the existence of equilibria and the stability properties of the proposed model.In particular,the geometric approach is used to obtain the sufficient condition which guarantees the global asymptotic stability of the unique endemic equilibrium Ee when the basic reproduction number Ro>1.Second,mathematical derivation combined with numerical simulation shows the existence of the double Hopf bifurcation around Ee.Third,based on the numerical results,it is shown that the information coverage and the average information delay may lead to more complex dynamical behaviors.Finally,the optimal control problem is established with information-infuenced vaccination and treatment as control variables.The corresponding optimal paths are obtained analytically by using Pontryagin's maximum principle,and the applicability and validity of virous intervention strategies for the proposed controls are presented by numerical experiments.
文摘A quantum time-dependent spectrum analysis, or simply, quantum spectral analysis (QSA) is presented in this work, and it’s based on Schrödinger’s equation. In the classical world, it is named frequency in time (FIT), which is used here as a complement of the traditional frequency-dependent spectral analysis based on Fourier theory. Besides, FIT is a metric which assesses the impact of the flanks of a signal on its frequency spectrum, not taken into account by Fourier theory and lets alone in real time. Even more, and unlike all derived tools from Fourier Theory (i.e., continuous, discrete, fast, short-time, fractional and quantum Fourier Transform, as well as, Gabor) FIT has the following advantages, among others: 1) compact support with excellent energy output treatment, 2) low computational cost, O(N) for signals and O(N2) for images, 3) it does not have phase uncertainties (i.e., indeterminate phase for a magnitude = 0) as in the case of Discrete and Fast Fourier Transform (DFT, FFT, respectively). Finally, we can apply QSA to a quantum signal, that is, to a qubit stream in order to analyze it spectrally.
文摘Zero-energy state is investigated by taking infinitesimal energy and observing its uncertainty in space-time, adopting quantum mechanics. In this paper, the uncertainty in conventional quantum mechanics is found to be interpreted as freedom in space-time, which results in possibility of time travel and space transition of the zero-energy state, which could be information or mind. The wave function of a physical system composed of multiple particles or wave-packets is examined and found that it can be arbitrarily changed by grouping by observers. It leads to an idea that even infinitesimal energy or wave-packets in a heavy physical system may separately exist and it has the infinite freedom of space-time.
文摘In the plethora of conceptual and algorithmic developments supporting data analytics and system modeling,humancentric pursuits assume a particular position owing to ways they emphasize and realize interaction between users and the data.We advocate that the level of abstraction,which can be flexibly adjusted,is conveniently realized through Granular Computing.Granular Computing is concerned with the development and processing information granules–formal entities which facilitate a way of organizing knowledge about the available data and relationships existing there.This study identifies the principles of Granular Computing,shows how information granules are constructed and subsequently used in describing relationships present among the data.
基金Supported by the High Technology Research andDevelopment Program of China (2003AA414210) and the NationalNatural Science Foundation of China (60173051)
文摘With the explosion of services in grid environment, it's necessary to develop a mechanism which has the ability of discovering suitable grid services efficiently. This paper attempts to establish a layered resource management model based on the locality principle which classifies services into different domains and virtual organizations (VOs) according to their shared purposes. We propose an ontologybased search method applying the ontology theory for characterizing semantic information. In addition, we extend the UD- D1 in querying, storing, and so on. Simulation experiments have shown that our mechanism achieves higher performance in precision, recall and query response time.