The Neurobiological Infrastructure of Natural Computing: Intentionality Birthday and 50 Years' Research
نویسنده
چکیده
Brains and computers are both dynamical systems that manipulate symbols, but they differ fundamentally in their architectures and operations. Human brains do mathematics; computers do not. Computers manipulate symbols that humans put into them without grounding them in what they represent. Human brains intentionally direct the body to make symbols, and they use the symbols to represent internal states. The symbols are outside the brain. Inside brains the construction is effected by spatiotemporal patterns of neural activity that are operators, not symbols. The operations include formation of sequences of neural activity patterns that we observe by their electrical signs. The process is by neurodynamics, not by logical rule-driven symbol manipulation. The aim of simulating human natural computing should be to simulate the operators. In its simplest form natural computing serves for communication of meaning. Neural operators implement non-symbolic communication of internal states by all mammals, including humans, through intentional actions. The neural operators that implement symbol formation must differ, but how is unknown, so we cannot yet simulate human natural computing. Here I propose that symbol-making operators evolved from neural mechanisms of intentional action by modification of non-symbolic operators. Both kinds of operators can be investigated by their signs of neuroelectric activity. I propose that the postulated differences should be sought by classification of the spatial textures of the signs in EEG recorded from the scalp overlying those cortical structures unique to humans in the brain that I designate as koniocortex, while the subjects are engaged in elementary arithmetic operations.
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملA Clustering Approach to Scientific Workflow Scheduling on the Cloud with Deadline and Cost Constraints
One of the main features of High Throughput Computing systems is the availability of high power processing resources. Cloud Computing systems can offer these features through concepts like Pay-Per-Use and Quality of Service (QoS) over the Internet. Many applications in Cloud computing are represented by workflows. Quality of Service is one of the most important challenges in the context of sche...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009