Let us first agree on what the term "semantics" means: An unorthodox approach to an age-old debate
نویسنده
چکیده
Traditionally, semantics has been seen as a feature of human language. The advent of the information era has led to its widespread redefinition as an information feature. Contrary to this praxis, I define semantics as a special kind of information. Revitalizing the ideas of Bar-Hillel and Carnap I have recreated and re-established (on totally new grounds) the notion of semantics as the notion of Semantic Information. I have proposed a new definition of information (as a description, a linguistic text, a piece of a story or a tale) and a clear segregation between two different types of information – physical and semantic information. I hope, I have clearly explained the (usually obscured and mysterious) interrelations between data and physical information as well as the relation between physical information and semantic information. Consequently, usually indefinable notions of “information”, “knowledge”, “memory”, “learning” and “semantics” have also received their suitable illumination and explanation.
منابع مشابه
An Analysis of the Salīm Heart Semantics: An Approach to Spiritual Health in Holly Quran
Spiritual health has great importance in human life to the extent that in recent years the World Health Organization (WHO) looked with favor on it. Holy Quran has introduced itself as a healing prescription for the human soul. Spiritual health is associated with the keyword of “Heart” in the Quran's literature, and the concepts of sick and healthy hearts have been mentioned in it. In this regar...
متن کاملA duality between LM-fuzzy possibility computations and their logical semantics
Let X be a dcpo and let L be a complete lattice. The family σL(X) of all Scott continuous mappings from X to L is a complete lattice under pointwise order, we call it the L-fuzzy Scott structure on X. Let E be a dcpo. A mapping g : σL(E) −> M is called an LM-fuzzy possibility valuation of E if it preserves arbitrary unions. Denote by πLM(E) the set of all LM-fuzzy possibility valuations of E. T...
متن کامل-
To be an entrepreneurial university nowadays seems to be an attractive, convincing, modern vision for many higher education institutions and their leaders. The article goes through reflections on who will say what to whom when using the expression “entrepreneurial university” and it will show that there are at least four debates about entrepreneurial challenges to universities. The first deb...
متن کاملUnorthodox Change in the Angulation of an Impacted Mandibular Third Molar: A rare Case Report
Background: Third molars are the most frequently impacted teeth, and extensive research has been carried out delineating their impaction prevalence, classification, and treatment approaches. We present a rare case of an impacted mandibular third molar which went through unprecedented changes in angulation over an eight-year time span with no particular pathologic, traumatic, or therapeutic inte...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1201.0328 شماره
صفحات -
تاریخ انتشار 2011