The Computational Theory of Intelligence: Applications to Genetic Programming and Turing Machines
Daniel Kovach*
Kovach Technologies, San Jose, CA, USA.
DOI: 10.4236/ijmnta.2015.41002   PDF   HTML   XML   7,172 Downloads   8,121 Views  

Abstract

In this paper, we continue the efforts of the Computational Theory of Intelligence (CTI) by extending concepts to include computational processes in terms of Genetic Algorithms (GA’s) and Turing Machines (TM’s). Active, Passive, and Hybrid Computational Intelligence processes are also introduced and discussed. We consider the ramifications of the assumptions of CTI with regard to the qualities of reproduction and virility. Applications to Biology, Computer Science and Cyber Security are also discussed.

Share and Cite:

Kovach, D. (2015) The Computational Theory of Intelligence: Applications to Genetic Programming and Turing Machines. International Journal of Modern Nonlinear Theory and Application, 4, 10-20. doi: 10.4236/ijmnta.2015.41002.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Kovach Jr., D.J. (2013) The Computational Theory of Intelligence: Information Entropy. Proceedings of Internation Conference of Nonlinear Analysis and Applied Mathematics, Rodos.
[2] Kovach Jr., D.J. (2013) The Computational Theory of Intelligence: Data Aggreagation. Proceedings of Internation Conference of Nonlinear Analysis and Applied Mathematics, Rodos.
[3] Floreano, D. and Mattiussi, C. (2008) Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies. MIT, Print, Cambridge, MA.
[4] Strathern, P. (1999) Turing and the Computer. New York: Anchor.
[5] Jonoska, N. and Seeman. N.C. (2002) DNA Computing. Berlin: Springer.
[6] Hopcroft, J.E. and Ullman, J.D. (1979) Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Reading.
[7] Gusfield, D. (1997) Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology. Cambridge UP, Cambridge, England.
http://dx.doi.org/10.1017/CBO9780511574931
[8] Bard, G.V. (2006) Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric. Proceedings of Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, 69, 117-24.
[9] Hamming, R.W. Error Detecting and Error Correcting Codes. Bell System Technical Journal, 29, 147-160.
[10] Jaro, M.A. (1995) Probabilistic Linkage of Large Public Health Data Files. Statistics in Medicine, 14, 491-98.
[11] Dshalalow, J.H. (2006) Foundations of Real Analysis. Chapman & Hall, London.
[12] Srinivasan, R. (2007) Protecting Anti-Virus Software under Viral Attacks. Thesis, Arizona State University, Tempe.
[13] (2013) Payload Definition from PC Magazine Encyclopedia.
http://www.pcmag.com/encyclopedia/term/48909/payload
[14] Belshaw, R., Pereira, V., Katzourakis, A., Talbot, G., Paces, J., Burt, A. and Tristem, M. (2004) Long-Term Reinfection of the Human Genome by Endogenous Retroviruses. Proceedings of the National Academy of Sciences of the United States of America, 101, 4894-4899.
http://dx.doi.org/10.1073/pnas.0307800101?
[15] Snustad, D.P. and Simmons, M.J. (2012) Principles of Genetics. Wiley, Hoboken.
[16] Brenner, S., Stretton, A.O.W. and Kaplan, S. (1965) Genetic Code: The “Nonsense” Triplets for Chain Termination and Their Suppression. Nature, 206, 994-998.
[17] (2012) The American Heritage Dictionary. Dell, New York.
http://www.merriam-webster.com/help/citing.htm
[18] Koshland Jr., D.E. (2009) The Seven Pillars of Life. Science, 295, 2215-2216.
http://dx.doi.org/10.1126/science.1068489
[19] Neuhauss, S. (2005) Handbook for the Deep Ecologist. iUniverse, Bloomington.
[20] DARPA (2013) Cyber Grand Challenge (CGC). RSS. http://www.darpa.mil/cybergrandchallenge/
[21] (2013) Defense News & Career Advice Clearance Jobs Defense News & Career Advice. Defense News.
http://news.clearancejobs.com/2012/02/28/cybersecurity-spending-rises-across-agency-2013-budget-requests/

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.