On the Concept of Information
高考英语名词深度理解单选题30题

高考英语名词深度理解单选题30题1.The information he gave us is very useful.rmationB.pieces of informationC.a piece of informationD.an information答案:C。
本题考查不可数名词的用法。
information 是不可数名词,不能用an 修饰,也没有复数形式,所以A、D 选项错误。
B 选项pieces of information 表示很多条信息,题干中只是说他给我们的一条信息很有用,所以C 选项正确。
2.There is little water in the bottle.A.littleB.a littleC.fewD.a few答案:B。
本题考查不可数名词的修饰词。
water 是不可数名词,few 和a few 修饰可数名词,所以C、D 选项错误。
little 表示几乎没有,a little 表示有一点,题干中说瓶子里有一点水,所以B 选项正确。
3.Can you give me some advice on how to learn English?A.advicesB.a adviceC.an adviceD.advice答案:D。
本题考查不可数名词的用法。
advice 是不可数名词,没有复数形式,也不能用a 或an 修饰,所以A、B、C 选项错误,D 选项正确。
4.We need some furniture for our new house.A.furnituresB.a furnitureC.an furnitureD.furniture答案:D。
本题考查不可数名词的用法。
furniture 是不可数名词,没有复数形式,也不能用a 或an 修饰,所以A、B、C 选项错误,D 选项正确。
5.There is much bread on the table.A.manyB.a lot ofC.lots ofD.much答案:D。
Information as Property

Information as PropertyMathias Klangklang@informatik.gu.seIT&OrganizationViktoria InstituteBox 620 GöteborgSwedenAbstractInformation is quickly becoming one of the main assets in corporate life. This paperattempts to study the relationship between the law and information. The questionsposed are (1) can information be considered as property (2) How does this answereffect the legal practitioners and business (3) Is the legal point of view compatiblewith the everyday actions of business today?Keywords: Intellectual property, Information, Knowledge,BRT Keywords: AD, AM, BBIntroductionWhat is information?…Information is somehow related to knowledge. More loosely,information is related to teaching, briefing, decision making, persuasion, manipulation, and even hearsay. (Dahlbom & Mathiassen, 1993)We have entered the information age and we are the information society. The progression of society has been followed by the progression of law. Each level of civilisation or new economic system has required a parallel development in the field of law. The reason for this is that the law is developed to protect the interests of the present society. So when a society moves from an agrarian to an industrial phase the law must change to award increased protection for the industrialist at the expense of the land owning farmer.If we apply this chain of thought and evaluate the next step of society from the industrial to the information society the law must develop to protect the new economic base. In this case the law must develop to protect the information society maybe at the expense of the industrial reality.The types of protection the law awards vary widely but the industrial and mercantile age brought with it developments in the fields of property law, contract law, and also saw the creation of a specialized field of law which has come to be known as intellectual property law. The basis of this law is to award monopolies as a reward to those members of society who increase the total sum of knowledge by innovation and invention.With the advance of information technology and the dawn of the information society intellectual property law has first been adapted to fit the new products. An example of this is software which only with great difficult can be fitted into the classicalintellectual property legislation. Another effect of the shift in the economic base towards information is the call be several groups to do away with intellectual property law altogether. The feeling is that these laws are outdated and unsuitable for the age. The origins of unix and late linux show the value of open source economy and the fact that many products need not be based upon the industrial method of economic protection.The intellectual property laws have also been criticized by other groups such as the developing nations who feel that the whole system of law is a subtle form of imperialism where the industrial nations set the technological standards and price their products in such a manner as to keep the less developed nations dependent on the industrialized world.There is also another group which are attempting to define information as property. This attempt to legally define information in such a way would award the owner of the property with certain exclusive rights and this paper is an investigation into the validity, effect and usefulness of such a classification.There have been previous attempts to define information as a sui generis form of property but this is an area of law which is neglected and when the issue has been discussed the results have been unsystematic and ad hoc. The question still remains to be answered if information can be seen as property. While the discussion continues on an academic level the question must be asked and answered in all countries for an adequate system of information protection can be developed.The first stage is to identify the components of the concepts of information as property. First, what is property? Second, What is information? Can Information be property? What will the results of this answer be if the question is answered affirmatively?The particular quality for information is that it is in itself a non-tangible item which is in most cases stored and transferred in tangible form. Most legal efforts surrounding information have been aimed at either strengthening the position of the tangible receptacles or punishing those who would attempt to take the information, by copying the receptacle, without permission. This leads to an interesting problem where a information stored on a piece of paper may not be copied and transferred to others without breaking copyright legislation but the same information may be memorized and retold to unlimited audiences.What has been done?Information has always been a valuable commodity worth protecting. The problem is not that the law does not recognize this fact but rather that the law has not been able to adequately define and consequently protect information. The law has more often worked on protecting the physical or tangible representation of information. Prior to the digital age the difference between protecting information or the tangible representation was not practical and left to philosophical discussion. This was because the task of copying and transferring information was in itself a hinder to the spread of the illegitimate use of information.To be able to consider information as a specific good we must first consider whether information users can have exclusive rights over the information since the concept of exclusive right to use a good is one of the hallmarks of property. There have been areas where the law has considered information to be valuable enough to be protected from being used by others than authorized users.The whole concept of original and copy is a clear example of this. In many legal situations the law will accept no substitute for an original document, which more often than not must be signed and witnessed by Notary Public, the point in this case was to make sure that the correct information was available to the courts should this be necessary at a later date. Prior to the digital revolution copies where by definition inferior in both legal effect and quality. The problem with the quality of copies was also compounded by the fact that each subsequent copy made from another copy further degraded the quality. This technological barrier made copies less useable and easily identifiable.These facts made information protection less important since any copies made where inferior to the original and easily identifiable should the law wish to punish the copy maker. This led to the development of the concept of information protection through protecting the tangible representation. A good example of this is the fact that it took much longer for copyright legislation to protect authors against those who translated their work rather than those who reprinted of the same.There have been important exceptions to this principle of protecting the container rather than the content and some examples of these are:EspionageIn the case of espionage the law is very protective of the information which is stolen rather than the manner in which it is recorded. In the Swedish penal code anyone who without proper authorization collects, transfers, leaves or exposes data/information of military significance, places this information in the hands of a foreign power and the information is seen as damaging national security can be sentenced to life imprisonment (BrB 19:5§).In the commercial sphere there has also been a need to protect information from competitors. This information is usually defined as a trade secret and protected in many of the industrialized nations. Ståhlros (1986) defines the trade secret is a corporate immaterial asset composed of technical or commercial information. He defines it further as valuable practical knowledge which is not protected by intellectual property law. The information is particularly valuable to the company which basis certain competitive advantages upon its use.The fact that he makes a difference between information which is protected by intellectual property legislation is interesting but not really relevant to this article. The important point is whether information can be protected and if so does this imply that information is property? The most important part of corporate know-how is that the secrets themselves can be used within the company and they do not loose any value. Should the secret become known then the value of the information to the company is radically reduced.The Intellectual Property SystemThere have been areas where the law has seen a need to protect information from being freely distributed. The largest such area in the commercial sector is intellectual property law The two most common methods for protecting information today are those parts of the intellectual property law known as patent or copyright. The method used depends on the type of information, which the author wants to protect.Legislators around the world have long discussed the need for protecting the fruitsof intellectual work. The most common method has always been to reward a person by granting a monopoly. This monopoly may have been on a process or a product and is the basis of the worlds intellectual property system. The general motivation today for granting an inventor or an author a monopoly on his idea or text is that this promotes the spread of ideas by rewarding the inventor. While the inventor is free to exploit his monopoly during the early years and reap his rewards, society is rewarded by the fact that the knowledge the inventor creates is dispersed into society. This knowledge can be used in additional research, which will hopefully result in new patentable ideas or processes. After the monopoly period is over society reaps its second reward since then the idea is free to be used by anyone. The thought behind this is that the inventor has by then had the time to create a substantial machinery for sales and marketing that he will be able to maintain his competitive edge.Before we continue we must first see which types of ideas may be protected. The law has chosen to divide intellectual property into several groups but this paper is only concerned with two different categories of legally recognised protectable ideas.The first such category is the patent. This form of intellectual property and can be traced back to the fifteenth century (Lloyd, 1997). The roman historian Atheneus wrote that the creators of great culinary dishes received a monopoly on the dish for one year (Koktvedgaard, 1965). The history of the patent has had a chequered past and at times it has been used shamelessly as a method of rewarding any person for doing service to the King and had nothing to do with intellectual effort on the part of the monopoly holder.The modern patent is governed by similar laws in most industrial countries and there have been several attempts to implement international conventions but none have been particularly successful. There are common factors among patents and these are the criteria for obtaining a patent in most legal jurisdictions.1.The object of the patent must concern a new invention or process2.This must involve an inventive step3.The result must be capable of industrial exploitationThe first point is not very controversial, but what this point implicitly explains is that only an object or a process may be patented. This effectively concludes unexpressed ideas, texts, music etc. The second point is probably more controversial since it is an attempt to try to define what an invention is. The inventive step is the leap of reasoning the inventor has made and it is for this creative leap which he must be rewarded. An example of this could be the combination of computer, cell phone, key finder and camera in one small portable unit. This gadget could be called an invention and is unquestionably as useful as any Swiss army knife but is not an inventive step since it is not difficult to foresee the combination of these artefacts into one portable device.The last requirement for a patent is that the invention or process be capable of industrial exploitation. This requirement can usually be widely interpreted since the definition of industrial development does not mean that the invention has to be used within industry.The second category is Copyright. This is an area where legislators have managed to a much further scale in their efforts to introduce international conventions which make copyright legislation much more uniform and enforceable around the globe. There have been a number of unilateral and multilateral agreements but the most important one is the Berne Convention which was first signed in 1886 and has been revised many times since. The fundamental thoughts behind the Berne convention are still the basis of copyrightlaw today. Under the Berne convention and most national legislation copyright protection is used to protect literary and artistic works which is described as:The expression "literary and artistic works" shall include every production in the literary, scientific and artistic domain, whatever may be the mode or form of its expression, such as books, pamphlets and other writings; lectures, addresses, sermons and other works of the same nature; dramatic or dramatico-musical works; choreographic works andentertainments in dumb show; musical compositions with or without words;cinematographic works to which are assimilated works expressed by a process analogous to cinematography; works of drawing, painting, architecture, sculpture, engraving andlithography; photographic works to which are assimilated works expressed by a process analogous to photography; works of applied art; illustrations, maps, plans, sketches andthree-dimensional works relative to geography, topography, architecture or science. (Berne Convention, Article 2 (1))From this list we can see that copyright is a very flexible instrument which may be used to protect artistic expression in almost any form. The term artistic reflects the origins of copyright, it was designed to protect literary writers since they were considered a valuable asset to the national heritage. This has since been expanded upon and copyright now is independent of its artistic background since. One of the main motives for this rule is that the courts would rather leave the discussions on the definition of art to the philosophers.The advantage of copyright is that the protection enters into force directly at the moment the idea is recorded in a tangible form. Therefore a piece of music is protected as soon as it is written down or recorded whichever comes first. The effect of copyright protection is that the artistic expression may not be reproduced in any form without the express permission of the author.Information TheftIn many cases when information has been stolen it has been so common that the law has not concerned itself with attempting to punish the actions. An example of this is when a person who purchases a book and then lends the book to his friend. The authors receives no compensation from the new reader. This situation typically falls under copyright law but adequately exemplifies peoples' behavior towards information as such. In many cases information is considered as something that is free to be shared. Most copyright violations occur when the tangible containers of information are copied.Books are photocopied, films are recorded and compact disks are burned. In most cases the people carrying out these violations are totally unaware of the illegality of their deeds. If they are aware of the serious nature of their actions they do not feel that the actions should be punishable since the common opinion is that they do not cause harm. The digital technology today allows the digital products to be easily copied at no loss of quality and at almost no expense to the manufacturer. These facts, which were amongst the most important for the development of online trade have now become the reasons for which most people do not feel that their actions are wrong in any way.Traditional criminal law would not punish an information thief unless that person also took the tangible vessel the information was contained in. The reasoning behind this is that when the thief only steals information the original owner still retains the same information in his possession. He can still remember and still use the information. Whenthe same thief steals the papers or disks the information is recorded on he deprives the owner of the use of certain property and therefore the law can react and punish the theft. The Swedish law defines an act of theft as taking without permission which causes damage to the owner of the property which has been taken. The legislator has also expanded upon the description of property which may be stolen by explaining only tangible goods may be stolen (Rekke, 1997) which effectively excludes the possibility of information theft in Swedish law. The situation in the England, Australia, USA and Canada is similar where only the widest interpretation of the law can information as such be stolen. The situation can best be summed up by the Australian courts who said in The Federal Commissioner of Taxation v United Aircraft Corporation:Knowledge is valuable, but knowledge is neither real personal property…It is only a loose metaphorical sense that any knowledge as such can be said to be property.The English case of Oxford v Moss is a very interesting case which focuses on the problem between information and the tangible form in which the information is stored. The case involved a student whom had got hold of the questions in a coming university exam. Since he did not keep the paper he could not be charged with theft. The law was incapable of punishing the unfavorable action.There are some states that are moving towards a better definition to the theft of property. This is being done as a reaction to the importance of protecting information stored in databases and computers. Information is no longer dependent upon the tangible form but rather the content.DiscussionAs we have seen the law has been unable to systematically declare the position of information under the law. This means that any situation where people deal with information is fraught with a greater amount of uncertainty since the law has been unable to formalize the position of information.In some ways the law has a tendency to be blind to the real world. This is because it seldom acknowledges any problems that are not already known. So while the law still cannot fully accept that information can be a form of property this does not mean that information is not treated as property. Information is often bought, sold, leased and used as collateral. Often information is stolen, destroyed, vandalized.The fact that the law has not been quick enough to follow the developments of society cannot hinder the reality that information is being used in many of the ways previously described. The insecurity of the situation must be alleviated in some way. The legal alternative to legislation is creating a secure regulated environment by using contracts. This method is widely used in several areas such as employment law, non-disclosure clauses and secrecy agreements. There are two main problems with the contractual approach, the first is that the contractual approach can only bind those who are party to the contract. This is a severe limitation to the efficiency of contractual approach. The second serious flaw with the contractual approach is that it involves a large amount of preparatory work on the part of those who are to be involved in handling the information. The trouble with attempting to control future situations in this way is that the is no such thing as a perfect contract since the more details included in the contract the more complex and harder to interpret they become while if less information is included in the contract they become much to vague and of little use when attemptingto settle future disputes.What does ownership imply?One method of defining anything is by attempting to describe what functions the thing has. If we take this functional approach when attempting to define what property is we look to its functions. The concept of property has developed along with man over the centuries and has developed in most societies. In some primitive agrarian societies the concept of individual ownership are less developed than in more complex societies. There have even been attempts to regulate ownership by removing some property rights and placing them in the hands of the state for the benefit of all society. Common for all stages of society and all attempts to replace property with alternative forms of ownership is the fact that there has always been some form of property and ownership rights.To define this phenomena of property we must first attempt to analyze what property is. Looking at the function of property we see that the ownership of a certain good grants certain rights upon the owner. These rights are usually exclusive and allow the owner alone to buy, sell, lease the good. The owner is also protected from others attempts to steal or vandalize the goods.The case for information as propertyThe law is supposed to promote acts which are beneficial to society while at the same time act as a prevention and punisher of unfavourable actions. The lack of a coherent system surrounding the status of information in the eyes of the law is unsatisfactory since information is becoming one of the main staples of economy today. The backbone of the present legal system concerning ideas is intellectual property law. This system which is based upon the economy of the 17th and 18th centuries and is not an adequate protection for the information society despite all changes and reinforcements. This is because:1.Copyright allows the author to protect the expression of an idea by protecting theorder of the words written down. Copyright in this manner only protects ideas in a second hand manner.2.Patents must be inventions, inventive steps and capable of industrial exploitationthis excludes too many areas, especially in the information society.The idea of intellectual property law has been criticized as a method of enforcing imperialism and retaining status quo between developing and industrial nations. The programming community has a long tradition of anti intellectual property law work as can be seen in the whole open source programming movement.If we look at the other examples shown in this paper which only work in restricted scenarios and only between parties which have previously agreed to the rules sourrounding information.The case against information as propertyOne of the earliest writers against the concept of information as property must be Thomas Jefferson who wrote:If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called and idea, which an individual may exclusivelypossess as long as he keeps it to himself but the moment it is divulged, it forces itself into the possession of everyone, and the receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possess the less, because every other possess the whole of it.He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me. That ideas shouldfreely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, withoutlessening their density at any point, and like air in which we breathe, move, and have our physical being, incapable of confinement or exclusive appropriation. Inventions thencannot, in nature, be a subject of property.Jefferson was one of the main forces behind American copyright legislation his ideas were to give limited rights to the author while making the content or idea free to be used in society (Samuelson, 1991). This is one of the two main critiques against the idea arranging a legal system for information. The basic idea is that information in itself cannot or should not be contained or restricted in any manner. This line of thought has developed since Jefferson and has today come to be the main source arguments for those who wish to remove intellectual property law. Most of the authors who advocate this movement have not attempted to formulate an alternative but rather maintain that the control of ideas and information should be removed.The other strong line of thought calls for a radical reform of intellectual property law. Those calling for such reform often have different motives for doing so and are not always in agreement as to whether the system should be scrapped completely or merely reconstructed.ConclusionThe legal situation today promotes a situation which does not view information as property. This is despite the fact that many companies value information as their main asset and the loss of this asset would seriously affect the value of the company.The need for a coherent system of classification would aid the information owner and user to be able to better determine and defend his obligations and rights. Most countries today have laws concerning secrecy and confidentiality and these can be enforced by the companies who have the possibility of claiming damages if they were to suffer losses as a direct result of, for example, information theft. These situations are still inadequate because they are based on an incoherent and complex system which does not allow any legal security for the information user. It is just this type of security that the law is supposed to offer.Another problem arises when the end user is unsatisfied with the law. If the society does not feel that the laws are just or valid then they will not feel inclined to follow them. The less chance that their actions will lead to punishment the less people whom will follow the law. The internet allows people to act on a whim and end users feel that their is little or no chance of getting caught so they do no feel that they are acting contrary to the laws. There cannot be a crime if there is no victim and Internet information crime is seen as a victimless crime.The complexity of the market and products today are leading to a shift in the sale of products. There has always been knowledge surrounding products but this has not been seen as a marketing advantage. Manuals, support and additional information have beengiven away free in the aid of making a sale. Today the importance of the information surrounding the goods is valued much higher and the goods themselves are given away at little or no profit while the main profits are derived from after sale service. Since the information surrounding the goods has risen in importance there is a legitimate call for a system that makes this information capable of being owned. Can this be done and if so how?BibliographyBoyle, J. (1996) Shamans, Software and Spleens Harvard University Press, London. Dahlbom, B. & Mathiassen, L. (1993) Computers in Context. Blackwell, London.Feldman, M. S. & March, J. M. (1981) Information in Organizations as Signals and Symbol.Administrative Science Quarterly, 26, no. 2, 171-186.Jefferson, T. Writings of Thomas Jefferson, vol. 6, Ed. H. Washington 1854.Koktvedgaard (1965) Immaterialretspositioner, Köpenhamn.Macpherson, L. Theft of Information (on file with author)Ministry of Justice (1983) Företagshemligheter SOU 1983:52 Stockholm.Palmer, N ed. (1998) Interests in Goods Ewan Mckendrick.Rekke, N. (1997) in Karnov 1997/8, Fakta Informationsförlag, Stockholm.Samuelson, P. Is Information Property? Communications of the ACM, March 1991 v34 n3.Ståhlros, L. (1986) Företagshemligheter – Know how, Juristförlaget, Stockholm.CasesAustralia - The Federal Commissioner of Taxation v United Aircraft Corporation (10943-44) 68 CLR 525, 534-535.England - Oxford v Moss (1978) 68 Cr App Rep 183.。
2014年大学英语六级考试试题及答案解析(六十七)

大学英语六级考试试题及答案解析(六十七)一、Writing (本大题1小题.每题106.0分,共106.0分。
For this part, you are allowed thirty minutes to write a composition . You should write at least 100 words, and base your composition on the outline (given in Chinese) below: )第1题Directions: For this part, you are allowed 30 minutes to write a short essay entitled The Importance of Creating a Healthy Internet. You should write at least 150 words following the outline given below.1.随着社会和经济发展.网络成为了每个人必不可少的获取信息的工具2.但是,在网络上也出现了一些不健康的因素,如垃圾信息、黄色网站、虚假新闻、网络炒作等3.我们应采取措施制止这些,并建立—个健康的网络环境The Importance of Creating a Healthy Internet____________________________________________________________________________________________________________________________________________________________________【正确答案】:答案:The Importance of Creating a Healthy Internet[范文与解析][1] With the development of our society and economy, the Internet becomesa necessary tool for everyone to obtain information. [2] However, there are also some unhealthy contents in the Internet, such as trash information, pornographic pictures and video clips, fabled news, and annoying online drumbeatings.[3] I think it is high time that we made efforts to create a healthy Internet. [4] First, creating a healthy Internet helps to eliminate online crimes. [5] Second, creating a healthy Internet helps to protect children. Nowadays many children have access to computers and the Internet, so they might be exposed to unhealthy contents and might be misled. [6] Third, a healthy Internet brings great convenience to our lives, while an unhealthy one does great harm to us. When trash information and online drumbeating jam the network, we will certainly spend much more time to search for the information we really need.[7] In one word, creating a healthy Internet should be Netizens' common responsibility, and let's all contribute to a clean and harmonious virtual environment.[本题分数]: 106.0 分【答案解析】[写作指南]作文标题是“创建健康网络环境的重要性”,这已经表明,写作的重点是说明“为什么要创建健康的网络环境”。
如何看待信息茧房作文

如何看待信息茧房作文英文回答:The concept of an information cocoon is bothfascinating and concerning to me. On one hand, it is undeniable that technology has made it easier for us to access information and connect with people from all over the world. We can now customize our news feeds, follow social media accounts that align with our interests, and even use algorithms that predict our preferences. This has created a comfortable bubble where we are constantly surrounded by information that confirms our beliefs and opinions.However, this information cocoon can also be dangerous. It can create echo chambers where we only hear and see what we want to hear and see. This can lead to a distorted view of reality and hinder our ability to think critically and engage in meaningful discussions. We become less exposed to different perspectives and alternative viewpoints, whichcan limit our growth as individuals and as a society.To illustrate this, let me share a personal experience.I used to follow a particular political commentator on social media who shared views that aligned with my own. I enjoyed reading his posts and engaging in discussions with like-minded individuals. However, I soon realized that I was only getting one side of the story. I was not being exposed to different perspectives and was missing out on important nuances of the issues at hand. It was only when I intentionally started following accounts with opposing views that I was able to broaden my understanding and engage in more balanced discussions.中文回答:对于信息茧房这个概念,我既着迷又担忧。
物联网中英文对照外文翻译文献

中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. To have the CPU;5.To have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks .Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "Technology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International TelecommunicationUnion released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S. business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet"strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.Today, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention.The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensoris the small size, large-scale mass production cost reduction, mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In theera of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature. 8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the application of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design andresearch and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the datacollection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one ofthe dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymericintegrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection, government, public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care, personal health, floriculture, water monitoring, food traceability, enemy detection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot something; clothes will "tell" washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field, for example, a logistics company, application of Things truck, when loading overweight, the car will automatically tell you overloaded and overload how many, but the space remaining , the severity of goods with how to tell you; when handling staff unloading a cargo packaging may be shouting "throw you hurt me", or "My dear, you do not get too barbaric, you can?"; when the driver and others gossip, trucks will pretend boss's voice roaring "stupid, the grid!Internet of things to make full use of a new generation of IT technology in all walks of life among, specifically, is embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water systems, dams, oil and gas pipelines, etc.kinds of objects, and then "Internet of Things" with the existing Internet to integrate and realize the integration of human society and the physical system, which in this integrated network, there is the ability to super-powerful central computer cluster, integrated network staff implementation of real-time management and control of the machinery, equipment and infrastructure, on this basis, the human can be more refined and dynamic management of production and life, to achieve the status of the "wisdom", to improve resource utilization and productivity levels, and improve human the relationship between the natural.。
信息安全英语术语

信息安全英语术语Information Security English TerminologyInformation security is a critical aspect of modern life, as our reliance on digital technology has increased exponentially. With the growing threat of cyber attacks, it is essential to understand the terminology associated with this field. This essay will explore some of the key English terms related to information security and their importance in safeguarding our digital assets.One of the most fundamental concepts in information security is "confidentiality." This term refers to the protection of sensitive information from unauthorized access or disclosure. It is crucial to ensure that only authorized individuals or entities can access and view confidential data, whether it is personal, financial, or related to an organization's operations. Breaches of confidentiality can have severe consequences, such as identity theft, financial fraud, or the disclosure of sensitive business information.Another crucial term is "integrity," which is the assurance that data has not been tampered with or altered in an unauthorized manner. Maintaining the integrity of information is essential for ensuring thereliability and trustworthiness of data. This is particularly important in areas such as financial transactions, medical records, and legal documents, where the integrity of the data is of utmost importance.The concept of "availability" is also critical in information security. Availability refers to the accessibility of information or systems when needed. Disruptions to availability, such as denial-of-service attacks or system failures, can have significant impacts on individuals and organizations, preventing them from accessing critical information or services.The term "authentication" is closely linked to information security, as it refers to the process of verifying the identity of an individual or entity. Proper authentication mechanisms, such as usernames and passwords, biometric identifiers, or multi-factor authentication, are essential for controlling access to sensitive information and systems.Another important term in the field of information security is "encryption." Encryption is the process of transforming readable data into a coded format that can only be accessed by authorized individuals with the appropriate decryption keys. Encryption is a crucial tool for protecting data during transmission or storage, mitigating the risk of unauthorized access or interception.The concept of "risk management" is also central to informationsecurity. Risk management involves identifying, analyzing, and addressing potential threats and vulnerabilities in an organization's information systems. Effective risk management strategies can help organizations minimize the impact of security incidents and ensure the resilience of their digital assets.The term "firewall" refers to a security mechanism that monitors and controls incoming and outgoing network traffic based on predefined security rules. Firewalls are essential for protecting computer networks from unauthorized access and malicious activities, such as network-based attacks.Another key term in information security is "malware," which stands for "malicious software." Malware encompasses a wide range of threats, including viruses, worms, Trojans, and ransomware, that are designed to cause harm to computer systems, steal sensitive information, or disrupt normal operations.The concept of "incident response" is crucial in information security, as it refers to the coordinated efforts to identify, contain, and mitigate the impact of security incidents. Effective incident response plans and procedures can help organizations minimize the damage caused by security breaches and restore normal operations as quickly as possible.Finally, the term "cybersecurity" is a broad term that encompasses the protection of digital systems, networks, and data from unauthorized access, misuse, and disruption. Cybersecurity involves a range of strategies, technologies, and best practices aimed at safeguarding digital assets and ensuring the resilience of digital infrastructure.In conclusion, understanding the key English terminology associated with information security is essential for individuals and organizations seeking to protect their digital assets. By familiarizing themselves with these terms and their underlying concepts, they can develop and implement effective security measures, mitigate the risks of cyber threats, and ensure the confidentiality, integrity, and availability of their critical information.。
(完整版)人工智能原理MOOC习题集及答案北京大学王文敏课件

(完整版)人工智能原理MOOC习题集及答案北京大学王文敏课件正确答案:A、B 你选对了Quizzes for Chapter 11 单选(1 分)图灵测试旨在给予哪一种令人满意的操作定义得分/ 5 多选(1 分)选择下列计算机系统中属于人工智能的实例得分/总分总分A. W eb搜索引擎A. 人类思考B.超市条形码扫描器B. 人工智能C.声控电话菜单该题无法得分/1.00C.机器智能 1.00/1.00D.智能个人助理该题无法得分/1.00正确答案:A、D 你错选为C、DD.机器动作正确答案: C 你选对了6 多选(1 分)选择下列哪些是人工智能的研究领域得分/总分2 多选(1 分)选择以下关于人工智能概念的正确表述得分/总分A.人脸识别0.33/1.00A. 人工智能旨在创造智能机器该题无法得分/1.00B.专家系统0.33/1.00B. 人工智能是研究和构建在给定环境下表现良好的智能体程序该题无法得分/1.00C.图像理解C.人工智能将其定义为人类智能体的研究该题无法D.分布式计算得分/1.00正确答案:A、B、C 你错选为A、BD.人工智能是为了开发一类计算机使之能够完成通7 多选(1 分)考察人工智能(AI) 的一些应用,去发现目前下列哪些任务可以通过AI 来解决得分/总分常由人类所能做的事该题无法得分/1.00正确答案:A、B、D 你错选为A、B、C、DA.以竞技水平玩德州扑克游戏0.33/1.003 多选(1 分)如下学科哪些是人工智能的基础?得分/总分B.打一场像样的乒乓球比赛A. 经济学0.25/1.00C.在Web 上购买一周的食品杂货0.33/1.00B. 哲学0.25/1.00D.在市场上购买一周的食品杂货C.心理学0.25/1.00正确答案:A、B、C 你错选为A、CD.数学0.25/1.008 填空(1 分)理性指的是一个系统的属性,即在_________的环境下正确答案:A、B、C、D 你选对了做正确的事。
2001年考研英语阅读

2001 Passage 1Specialisation can be seen as a response to the problem of an increasing accumulation of scientific knowledge. By splitting up the subject matter into smaller units, one man could continue to handle the information and use it as the basis for further research. But specialisation was only one of a series of related developments in science affecting the process of communication. Another was the growing professionalisation of scientific activity.No clear-cut distinction can be drawn between professionals and amateurs in science: exceptions can be found to any rule. Nevertheless, the word "amateur" does carry a connotation that the person concerned is not fully integrate d into the scientific community and, in particular, may not fully share its values. The growth of specialisation in the nineteenth century, with its consequent requirement of a longer, more complex training, implied greater problems for amateur participation in science. The trend was naturally most obvious in those areas of science based especially on a mathematical or laboratory training, and can be illustrated in terms of the development of geology in the United Kingdom.A comparison of British geological publications over the last century and a half reveal s not simply an increasing emphasis on the primacy of research, but also a changing definition of what constitutes an acceptable research paper. Thus, in the nineteenth century, local geological studies represent ed worthwhile research in their own right; but, in the twentieth century, local studies have increasingly become acceptable to professionals only if they incorporate, and reflect on, the wider geological picture. Amateurs, on the other hand, have continued to pursue local studies in the old way. The overall result has been to make entrance to professional geological journals harder for amateurs, a result that has been reinforced by the widespread introduction of referee ing, first by national journals in the nineteenth century and then by several local geological journals in the twentieth century. As a logical consequence of this development, separate journals have now appeared aimed mainly towards either professional or amateur readership. A rather similar process of differentiation has led to professional geologists coming together nationally within one or two specific societies, where as the amateurs have tended either to remain in local societies or to come together nationally in a different way.Although the process of professionalisation and specialisation was already well under way in British geology during the nineteenth century, its full consequences were thus delay ed until the twentieth century. In science generally, however, the nineteenth century must be reckon ed as the crucial period for this change in the structure of science.51. The growth of specialisation in the 19th century might be more clearly seen in sciences such as ________.[A] sociology and chemistry[B] physics and psychology[C] sociology and psychology[D] physics and chemistry52. We can infer from the passage that ________.[A] there is little distinction between specialisation and professionalisation[B] amateurs can compete with professionals in some areas of science[C] professionals tend to welcome amateurs into the scientific community[D] amateurs have national academic societies but no local ones53. The author writes of the development of geology to demonstrate ________.[A] the process of specialisation and professionalisation[B] the hardship of amateurs in scientific study[C] the change of policies in scientific publications[D] the discrimination of professionals against amateurs54. The direct reason for specialisation is ________.[A] the development in communication[B] the growth of professionalisation[C] the expansion of scientific knowledge[D] the splitting up of academic societies重点词汇:specialisation ♦☐♏☞☜●♋♓♏♓☞☜⏹(专业化)即special+is(e)+ation,special(特别的;额外的),-ise 动词后缀(specialise即v.专业化),-ation名词后缀;specialist (专家;专科医生)←special+ist后缀表“人”。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Entropy2003, 5, 3-33entropyISSN 1099-4300/entropy/ On the Concept of Information and Its Role in NatureJuan G. Roederer1,2,*1. Geophysical Institute, University of Alaska-Fairbanks, Fairbanks AK 99775-7320, USA. E-mail:jgr@2. The Abdus Salam Centre for Theoretical Physics, Trieste, Italy* Permanent address Geophysical Institute, University of Alaska-Fairbanks, Fairbanks AK 99775-7320, USA. jgr@.Received: 12 December 2002 / Accepted: 27 January 2003 / Published: 5 February 2003Abstract:In t his article we address some fundamental questions concerning information:Can the existing laws of physics adequately deal with the most striking property ofinformation, namely to cause specific changes in the structure and energy flows of acomplex system, without the information in itself representing fields, forces or energy inany of their characteristic forms? Or is information irreducible to the laws of physics andchemistry? Are information and complexity related concepts? Does the Universe, in itsevolution, constantly generate new information? Or are information and information-processing exclusive attributes of living systems, related to the very definition of life? If thatwere the case, what happens with the physical meanings of entropy in statistical mechanicsor wave function in quantum mechanics? How many distinct classes of information andinformation processing do exist in the biological world? How does information appear inDarwinian evolution? Does the human brain have unique properties or capabilities in termsof information processing? In what ways does information processing bring about humanself-consciousness? We shall introduce the meaning of “information” in a way that isdetached from human technological systems and related algorithms and semantics, and thatis not based on any mathematical formula. To accomplish this we turn to the concept ofinteraction as the basic departing point, and identify two fundamentally different classes,with information and information-processing appearing as the key discriminator: force-fielddriven interactions between elementary particles and ensembles of particles in themacroscopic physical domain, and information-based interactions between certain kinds ofcomplex systems that form the biological domain. We shall show that in an abiotic world,information plays no role; physical interactions just happen, they are driven by energyexchange between the interacting parts and do not require any operations of informationprocessing. Information only enters the non-living physical world when a living thinginteracts with it—and when a scientist extracts information through observation andmeasurement. But for living organisms, information is the very essence of their existence: tomaintain a long-term state of unstable thermodynamic equilibrium with its surroundings,consistently increase its organization and reproduce, an organism has to rely oninformation-based interactions in which form or pattern, not energy, is the controllingfactor. This latter class comprises biomolecular information processes controlling themetabolism, growth, multiplication and differentiation of cells, and neural informationprocesses controlling animal behavior and intelligence. The only way new information canappear is through the process of biological evolution and, in the short term, through sensoryacquisition and the manipulation of images in the nervous system. Non-living informationalsystems such as books, computers, AI systems and other artifacts, as well as livingorganisms that are the result of breeding or cloning, are planned by human beings and willnot be considered here.Keywords: Physical and Biological Interactions, Life, Memory, Biomolecular Information,Neural Information, Memory, Cognition, Consciousness and Self-ConsciousnessIntroductionIf we want to understand the role of information in Nature, particularly in the biological world, we must find an appropriate definition of this ubiquitous and seemingly trivial concept—a definition that is objective and independent of human actions and human-generated devices. Conventional information theory works mainly with computers and technological communications systems; it is not so much interested in an independent formal definition of “information” as it is in the precise mathematical expression for the information content of a given message and its degradation during transmission, processing and storage. In general two classes of information are considered: “statistical” or “semantic” information describing the outcome of expected alternatives for the behavior of a system, and “algorithmic” information, defined as the minimum-bit statement that describes a given thing [1]. The content of information in the former is related to the probability of occurrence of a given alternative; in the latter it is given by the actual number of bits of the minimum-bit statement. In this article we are interested in the existence and meaning of information as a concept that is unrelated to human communication and technological systems, and that is not based on any formula. This is no trivial matter: one cannot tell by examining a complex organic molecule or a slice of brain tissue whether or not it has information (beyond that generated in our senses by its own composition and structure)—as yet there is no “information dynamics” comparable to the dynamics of matter [2]. In the natural world information requires complexity and organization but complexity and organization alone do not represent information.At the present time, some of the most fundamental questions under discussion are: Can the rigorous methods of physics adequately describe and explain that strange but well-recognized property of information, namely that the mere form, shape or pattern of something—not its field, energy or forces—may lead to dramatic and specific change in a system? Or is information irreducible to thelaws of physics and chemistry? Are information and complexity related concepts? Does the Universe, in its evolution, constantly generate new information? Or are information and information-processing exclusive attributes of living systems, related to the very definition of life? If that were the case, what happens with the physical meanings of entropy in statistical mechanics or wave function in quantum mechanics? How many distinct classes of information and information processing do exist in the biological world? How does information appear in Darwinian evolution? Is information inextricably linked to purpose and intentionality? Does the human brain have unique properties or capabilities in terms of information processing? In what ways does information processing bring about human self-consciousness?We shall try to accomplish our task by starting with the process of “interaction” as the underlying basic, primordial concept. We shall identify two fundamentally different classes of interactions between the bodies that make up the universe as we know it, with the concepts of information and information processing appearing as the key discriminators between the two. As much as possible, we shall follow an objective line of reasoning without appealing to “made things” such as computers, artificial communications systems, Turing machines or robots.The main objective of this article is to stimulate interest among physicists and biologists, especially those who teach, in a strongly multidisciplinary subject which has not yet gained the broad attention it deserves. I will not address philosophical issues or any social aspects. References are mostly limited to articles in journals or books of more general access. Unfortunately, many topics are still rather speculative and controversial—but to be fair to all points of view would require writing a whole book! Thus, I must apologize to the researchers working in the different disciplinary areas discussed below for taking sides in issues where there is no consensus yet, or for occasionally sacrificing parochial detail to improve ecumenical understanding.1. Physical and Biological InteractionsAs we look around us we realize that much of the environment appears to be made up of discrete “things”: clumps of matter—complex bodies which in general have clearly defined boundaries. When we explore the environment with scientific instruments, we realize that also at the microscopic level, the cells of living matter, molecules, atoms and elementary particles can all be considered “clumps of matter”, although for the latter we may not be able to define a “clearly defined boundary”. In the macroscopic domain, even fluids appear organized in such a way: the ocean, the atmosphere and the ionized plasmas that make up stars, stellar winds and magnetospheres tend to arrange themselves into discrete regions separated by boundary layers or interfaces with transverse dimensions small compared to the size of the regions in question. The late Nobel Laureate Hannes Alfvén called it “the cellular Universe”. As the Universe evolved after the Big Bang, the gradual condensation and stratification of materials led to increasing inhomogeneities of the regions [3] and an increasing complexity of their structure and the interfaces separating them.Our senses of vision and touch are geared toward the perception of borders, shapes and patterns of the boundary surfaces of every-day clumps of matter or objects, and our brain is endowed with the cognitive machinery to restitute the three-dimensional nature of objects from the perceived 2-Dboundaries, to identify their position and orientation, appraise their relative motion and, ultimately, determine their identity and purpose. In addition to these “objects in space” there are also “objects in time”: the discrete trains of acoustical waves to which our sense of hearing responds. Although we do hear continuous sounds (just as our eyes perceive continuous things like the blue sky), relevant acoustical information is extracted from temporal changes in the wave field. Of course, in vision the information is carried by waves, too, but the most relevant aspect for perception is their two-dimensional angular distribution in space and related changes.It is our experience from daily life (and from precise observations in the laboratory) that the presence of one object may alter the state of other objects in some well-defined ways. We call this process an interaction—without attempting any formal definition (a “metaphysical primitive”). We just note that in an interaction a correspondence is established between certain properties of one object (its position, speed, form, etc.) and specific changes of the other, and maybe vice versa. Quite generally, we may consider “science” as the systematic and quantitative study of interactions between objects or ensembles of objects. Each scientific discipline studies the interactions affecting objects belonging to some common class (e.g., elementary particles, stars, molecules, cells, people, plants, etc.). The interactions observed in the natural environment (i.e., leaving out all human-made artifacts) can be divided into two broad classes.The first class comprises the physical interactions between two bodies, in which we observe that the presence of one modifies the properties of the other (its motion, structure, temperature) in a definite way that depends on the relative configuration of both components of the system (their relative positions, velocities, etc.). Primary physical interactions between elementary particles are two-way (true inter-actions) and reversible, but in the macroscopic domain the observable and measurable interactions usually appear as chains of irreversible cause-and-effect relationships. They are irreversible because to unfold exactly in reverse order without external intervention, too many conditions concerning all intervening interactions must be fulfilled exactly, making the natural occurrence of the reverse process extremely unlikely. In a non-thermal physical interaction between two bodies isolated from the rest, the concept of force is introduced as the agent responsible for the change (acceleration or deformation) that occurs during the interaction [4]. For fundamental interactions such as gravity and electromagnetism, the concept of a force field is introduced as a property of the space surrounding the interacting bodies. The end effect of a physical interaction will always depend on some “initial conditions”, such as the initial configuration (positions, velocities) of the interacting bodies. A most fundamental characteristic is the fact that during the interaction, there is a direct transfer of energy from one body to the other, or to and from the interaction mechanism itself (in the case of fundamental interactions, the force field; in more complex cases, some process linking the two bodies). In other words, the changes that occur in the two interacting bodies are coupled energy-wise; the energy is provided by the interaction mechanism itself. For macroscopic chains of interaction processes, the more complex and irreversible the system, the weaker the energy coupling will be between one end and the other of the chain.At the microscopic, subatomic level, everything can be reduced to four basic interactions between elementary particles. The environment with which humans and other living beings interact, however, pertains to the macroscopic domain in which objects consist of the order of 1020 or more molecules,and in which all physical quantities of relevance are averages over enormously large ensembles of particles. Indeed, our senses in general respond to signals that are ensemble-averages over myriads of signals from the individual atomic constituents of macroscopic bodies. We should point out that at the macroscopic level all bodies are extraordinarily complex, but it is the high degree of order and organization of this complexity that makes them amenable to cognition and mathematically describable with continuous functions representing ensemble averages of the microscopic variables. For that very reason, in physics we can describe the behavior of interacting complex bodies in terms of simple models (mass points, rigid bodies, ideal gas, etc.) and use linear mathematical relationships as a first approximation. In the macroscopic domain, all physical interactions can be reduced to two elementary ones, namely gravitation and electromagnetism; the relevant objects are in general complex, consisting of many physically linked parts, and their interactions often involve complex chains of individual cause-and-effect mechanisms. The more complex and irreversible, the weaker the energy coupling will be between one end and the other of a chain. We shall call the physical inter-actions between inanimate objects force-field driven interactions.To turn to the other broad class of interactions, consider the two examples shown in Fig. 1: several satellites orbiting a central massive body on the left, and some insects “in orbit” around a light bulb, on the right. Both have in common motions along some well-defined paths followed at a regular, well-defined pace. The motion of a satellite is governed by the force of gravitational interaction f, which is a function of position and masses—and of nothing else. The motion of an insect is governed by the force of propulsion imparted by the wings (which also balances gravity and air friction), and controlled by a sensory system with a complex mechanism of light detection and pattern recognition—a process that involves information acquisition and processing. In other words, we have the chain: light emission →pattern detection → pattern analysis → muscle activation; the energy required at the insect’s end is not provided by the incoming light waves. No such set of algorithms appears in the case of the satellites: the concept of information is totally alien to gravitational interactions—and to all purely physical interactions between inanimate objects. The latter just happen and don't require intermediate operations of information detection and processing. The configuration of satellite orbits may vary greatly depending entirely (and exclusively) on the initial conditions, whereas in the case of the insects the final orbital configuration may depend very little on the actual “injection point” of each insect. And, most importantly, there is strict energy coupling between each satellite and the gravitational potential of the central body, whereas the energy required for the physiological processes in the insects is totally unrelated to that of the bulb’s light.We call this second class of interactions information-based [5]. Of course, the intervening processes always involve physical mechanisms; the key aspect, however, is their control by information and information-processing operations. There is no energy coupling between the interacting bodies (although energy must be supplied locally for the intervening processes). In the example of Fig. 1 involving the insects, the electromagnetic waves (light) themselves do not drive the interactions—it is the information in the patterns of the wave trains, not their energy, which plays the controlling role; the energy needed for change must be provided locally. Quite generally, in all information-based inter-action mechanisms the information is the trigger of physical/chemical processes, but has norelationship with the energy or energy flows needed by the latter to unfold. Physical and chemical processes provide a medium for information, but do not represent the information per se.Figure 1. Examples of the two main types of interactions: force-field driven (satellites in orbit around a central body, left), and information-based (insects “in orbit” around a light source, right). Information and information-processing play no role in the former, whereas in the latter we have the chain light emission → pattern detection → pattern analysis → muscle activation, in which neither force nor energy but information is the controlling agent throughout.2. Prototype ExamplesThe following question, already formulated in the preceding section, arises again: Can the existing laws of physics adequately deal with the most striking property of information, namely to cause specific changes in the structure and energy flows of a complex system, without the information in itself representing fields, forces or energy in any of their characteristic forms? The answer hinges on finding an objective definition of information. To that effect, let us analyze a few examples to elucidate more clearly the characteristics of force-field driven and information-based interactions, identify different prototypes, and compare them with each other.1.An electron interacting electrostatically with a proton at rest. From the point of view of quantum electrodynamics, the interaction mechanism consists of the emission and absorption of virtual photons by the interacting particles. In a first-order Feynman diagram the electron (or the proton) emits a photon which is then absorbed by the proton (or electron); the energy and momentum balance at each node (emission/absorption process) accounts for a change in the motion of each particle. The end result, strictly reversible, is the sum total of all possible photon exchange processes; the total energy (and momentum) of the pair of particles is conserved. We are tempted to say (and often do so) that in this interaction, a virtual photon “carries information” from one particle to the other; however, this is purely subjective parlance: no information, information-processing and purpose are at work at either end of the emission/absorption process.2.A small body orbiting an irregularly shaped massive asteroid (e.g., asteroid Ida with its tiny satellite Dactyl). This is a macroscopic physical interaction. The satellite’s orbit, viewed from a system fixed to the asteroid, is very complicated due to the latter’s irregular mass distribution; the resulting motion is governed by the sum total of the gravitational actions (forces) of each element of mass of the asteroid [6], in each of which information and information-processing do not play any role. There is strict to-and-fro energy coupling (and functional continuity) between the orbital characteristics and the irregular features of the asteroid’s gravitational potential. In view of the correspondence between the detailed features of a particular orbit and the irregularities of mass distribution, we are again tempted to say that the orbital characteristics “carry information on the pattern of mass distribution in the asteroid” (indeed, this is how the mass distribution is determined). However, no information is actually at work in this natural system; each element of the pattern at the “source” (the asteroid) contributes with a direct dynamic effect on the “recipient” (the satellite) and there is no need to invoke the concepts of information and information processing. A similar case is represented by the footprint of a rock that has been lying on the soil for a long time. Here we have a complex pattern on the ground carved by the elastic interaction with the rock’s irregular surface—an interaction in which a fixed pattern has led to specific change in another “body”. However, the change was produced in point-by-point physical interactions in which there was a direct coupling (force- and energy-wise) between the “source” and the “recipient”. Again, no information, information-processing or purpose can be identified in the process of the formation of the imprint.In both above examples we have a physical interaction between two objects mediated by a “field”, with energy coupling and continuity. There is no information, signals, messages, codes, decisions or purpose involved—unless we, humans, put them there by making a mental model of the interaction process in which analogies are drawn from subjective experience. The following are prototypes of information-based interactions.3.A dog walking around an obstacle. The dog responds to the visual perception of the obstacle, a complex process that involves information-processing and decision-making at the “receiver’s” end with a definite purpose. At the obstacle’s (the sender’s) side, we have scattering and/or reflection of incident light waves; no information and no purpose are involved—only physical processes are at work here. There is no energy coupling between sender and receiver; like in the example of the insects of Fig. 1, what counts is not the energy of the electromagnetic waves but the pattern of their spatial distribution. This is the prototype of information-based interactions that involves information extraction: it is a fundamental element in the interaction of any organism with the environment. The electromagnetic waves emitted by the obstacle and detected by the dog’s sensors are signals [7]. Note that the mechanism for this class of interactions must evolve; it cannot arise spontaneously. As a matter of fact, Darwinian evolution itself embodies a gradual, species-specific information extraction from the environment (see section 4). Other examples would be that of a geologist’s brain processing the visual image of the rock’s footprint from example 2 above, and, at the cellular/molecular level, a cell that has sensed the lack of a given nutrient, and has responded by starting up the synthesis of enzymes necessary to utilize other nutrients. The signal (e.g., glucose concentration) has neither purpose nor information, but becomes information when detected by the metabolic machinery in the bacterium.4.An ant leaving a scent mark along its path. This is the reverse process of the preceding example, in which information is deposited in the environment for later use. The sender has a specific purpose and information is involved. At the other end of the interaction (the path) only physical (chemical) processes are at work (but later, another ant can extract information from these physical signals). This is an example of deliberate environmental modification with a purpose; writing an article is another. At the cellular or molecular level we can refer to the methylation process, which changes the cell’s ability to transcribe certain portions of its DNA into RNA, without changing the information content of the DNA. This alters the program of the genes that they can express, thereby rendering these cells different from the others. Methylation is heritable, so this lets the change persist across multiple cell divisions.5.A person talking to another. Here clearly we have information processes and purpose at both ends of the interactive link. The corresponding acoustical waves carry a message; again, what counts in this interaction is not the energy but the acoustical patterns. To function, a common code must exist at both ends (see next section). This interactive process is a prototype of communication. In principle, we can think of this prototype as a succession of types 4 and 3, in that order. An example at the molecular/intracellular level is the genome-regulated manufacture of proteins (DNA-guided synthesis of RNA by an enzyme at one end, manufacture of the protein in a ribosome at the other).3. Information and Life: DefinitionsLet us now formalize our description of information-based interactions and related definitions, and point out again both analogies and differences with the case of physical interactions between inanimate bodies. First of all, we note that information-based interactions occur only between bodies or, rather, between systems the complexity of which exceeds a certain minimum degree. We say that a (complex) system A is in information-based interaction with a (complex) system B if the configuration of A, or, more precisely, the presence of a certain spatial or temporal feature or pattern in system A causes a specific alteration in the structure or the dynamics of system B, with a final state that depends only on whether that particular pattern was present in A. Moreover, it is a condition that (a) both A and B be decoupled energy-wise (meaning that the energy needed to effect the changes in system B must come from sources other than energy reservoirs or flows in A or the physical mechanism linking A with B), and (b) no lasting changes occur as a result of this interaction in system A (which thus plays a catalytic role in the interaction process). In other words, in an information-based interaction a one-to-one correspondence is established between a spatial or temporal feature or pattern in system A and a specific change triggered in B; this correspondence depends only on the pattern in question, being independent of other circumstances.We should emphasize that to keep man-made artifacts and technological systems (and also clones and artificially bred organisms) out of the picture, both A and B must be “natural” bodies or systems, i.e., not deliberately manufactured or planned by an intelligent being. We further note that primary information-based interactions are unidirectional (i.e., they are really “actions”, despite of which I shall continue calling them inter actions), going from one of the bodies (the “source” or “sender”) to the other (the “recipient” or “receiver”). There is a true cause-and-effect relationship in which thecause remains unchanged (the pattern in A) and the effect is represented by a specific change elsewhere (in B). While in basic physical interactions there is an energy flow between the interacting bodies or to and from the interaction mechanism, in information-based interactions any energy required for the participating (but not controlling) physical processes must be provided (or absorbed) by reservoirs external to the interaction process. Energy distribution and flow play a defining role in complex systems [3]; however, they have no direct bearing on the information-based interactions between them. In physical interactions the end effect always depends on the initial conditions of the combined system AB; in information-based interactions in general it does not. Finally, information-based interactions are usually “discontinuous”, in the sense that if the original pattern at the source is modified in a steady, continuous way, the response in the recipient may not vary at all in a continuous way.Although we have been talking about information all the time, we must now provide a more formal definition: information is the agent that mediates the above described correspondence: it is what links the particular features or pattern in the source system A with the specific changes caused in the structure of the recipient B. In other words, information represents and defines the uniqueness of this correspondence; as such, it is an irreducible entity [8]. We say that “B has received information from A” in the interaction process. Note that in a natural system we cannot have “information alone”, detached from any interaction process past, present or future: information is always there for a purpose[9]. Given a complex system, structural order alone does not represent information—information appears only when structural order leads to specific change elsewhere, without involving any specific transfer or interchange of energy. We can only speak of information when it has both a sender and a recipient which exhibits specific changes when the interaction occurs; this indeed is what Küppers has called “pragmatic information” [10]. It is important to note that the pattern at the sender’s site (system A) in itself does not represent information; indeed, the same pattern can elicit quite different responses in different recipients (think of a Rorschach test!).Concerning the interaction mechanism per se, i.e., the physical and chemical processes that intervene between the sender’s pattern and the corresponding change in the recipient, note that it does not enter in the above definition of information. What counts for the latter is the uniqueness of the correspondence—indeed, many different mechanisms could exist that establish the same correspondence. In the transmission from A to B information has to “ride” on something that is part of the interaction mechanism, but that something is not the information. Note that there can be information processing at the sender’s end (example 4, section 1), at the recipient’s end (example 3 of section 1) or at both ends (example 5). In all cases (excuse for a moment the anthropomorphic language!) an “accord” or common code must exist between sender and recipient so that an interaction can take place (more on this in section 5). Indeed, example 3 requires the evolution of a sensory apparatus able to detect and interpret the presence of an obstacle; example 4 requires the existence of other ants that will respond to the scent marks, and example 5 requires a common language. While the interaction mechanism does not intervene in the definition of information, the accord or common code is integral part of the concept of information—and that of purpose. Information, information-processing and purpose are thus tied together in one package: the process of information-based interaction (Fig. 2). We never should talk about information alone without referring to, or at least。