[ Pobierz całość w formacie PDF ]
.25[32] Rheingold, H.(1988).Computer viruses.Whole Earth Review Fall (1988): 106.[33] Spafford, E.H., Heaphy, K.A.& Ferbrache, D.J.Computer viruses, dealing withelectronic vandalism and programmed threats.ADAPSO, 1300 N.17th Street, Suite300, Arlington, VA 22209, 1989.[34] Stanley, S.M. An ecological theory for the sudden origin of multicellular life in thelate precambrian. Proc.Nat.Acad.Sci.70 (1973): 1486 1489.[35] Volterra, V. Variations and fluctuations of the number of individuals in animal speciesliving together. In: Animal Ecology, edited by R.N.Chapman.New York: McGraw-Hill, 1926, 409 448.[36] Wilson, E.O.& Bossert, W.H.A primer of population biology.Stamford, Conn: SinauerAssociates, 1971.26Figure 1.Metabolic flow chart for the ancestor, parasite, hyper-parasite, andtheir interactions: ax, bx and cx refer to CPU registers where location and size informationare stored.[ax] and [bx] refer to locations in the soup indicated by the values in the axand bx registers.Patterns such as 1101 are complementary templates used for addressing.Arrows outside of boxes indicate jumps in the flow of execution of the programs.Thedotted-line arrows indicate flow of execution between creatures.The parasite lacks thecopy procedure, however, if it is within the search limit of the copy procedure of a host, itcan locate, call and execute that procedure, thereby obtaining the information needed tocomplete its replication.The host is not adversely affected by this informational parasitism,except through competition with the parasite, which is a superior competitor.Note that theparasite calls the copy procedure of its host with the expectation that control will returnto the parasite when the copy procedure returns.However, the hyper-parasite jumps outof the copy procedure rather than returning, thereby seizing control from the parasite.Itthen proceeds to reset the CPU registers of the parasite with the location and size of thehyper-parasite, causing the parasite to replicate the hyper-parasite genome thereafter.27Figure 2.Metabolic flow chart for social hyper-parasites, their associated hyper-hyper-parasite cheaters, and their interactions.Symbols are as described for Fig.1.Horizontal dashed lines indicate the boundaries between individual creatures.On both theleft and right, above the dashed line at the top of the figure is the lowermost fragment of asocial-hyper-parasite.Note (on the left) that neighboring social hyper-parasites cooperatein returning the flow of execution to the beginning of the creature for self-re-examination.Execution jumps back to the end of the creature above, but then falls off the end of thecreature without executing any instructions of consequence, and enters the top of the creaturebelow.On the right, a cheater is inserted between the two social-hyper-parasites.The cheatercaptures control of execution when it passes between the social individuals.It sets the CPUregisters with its own location and size, and then skips over the self-examination step whenit returns control of execution to the social creature below.29Figure 3.Metabolic flow chart for obligate symbionts and their interactions.Symbols are as described for Fig.1.Neither creature is able to self-replicate in isolation.However, when cultured together, each is able to replicate by using information provided bythe other.31Figure 4.Evolutionary optimization at eight sets of mutation rates.In each run,the three mutation rates: move mutations (copy error), flaws and background mutations(cosmic rays) are set relative to the generation time.In each case, the background mutationrate is the lowest, affecting a cell once in twice as many generations as the move mutationrate.The flaw rate is intermediate, affecting a cell once in 1.5 times as many generationsas the move mutation rate.For example in one run, the move mutation will affect a cellline on the average once every 4 generations, the flaw will occur once every 6 generations,and the background mutation once every 8 generations.The horizontal axis shows elapsedtime in hundreds of millions of instructions executed by the system.The vertical axis showsgenome size in instructions.Each point indicates the first appearance of a new genotypewhich crossed the abundance thresholds of either 2% of the population of cells in the soup, oroccupation of 2% of the memory.The number of generations per move mutation is indicatedby a number in the upper right hand corner of each graph.33Figure 5.Variation in evolutionary optimization under constant conditions.Based on a mutation rate of four generations per move mutation, all other parameters as inFig.4.The plots are otherwise as described for Fig.4.37Table 1: Genebank.Table of numbers of size classes in the genebank.Left column is sizeclass, right column is number of self-replicating genotypes of that size class.305 sizes, 29,275genotypes [ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl trzylatki.xlx.pl
.25[32] Rheingold, H.(1988).Computer viruses.Whole Earth Review Fall (1988): 106.[33] Spafford, E.H., Heaphy, K.A.& Ferbrache, D.J.Computer viruses, dealing withelectronic vandalism and programmed threats.ADAPSO, 1300 N.17th Street, Suite300, Arlington, VA 22209, 1989.[34] Stanley, S.M. An ecological theory for the sudden origin of multicellular life in thelate precambrian. Proc.Nat.Acad.Sci.70 (1973): 1486 1489.[35] Volterra, V. Variations and fluctuations of the number of individuals in animal speciesliving together. In: Animal Ecology, edited by R.N.Chapman.New York: McGraw-Hill, 1926, 409 448.[36] Wilson, E.O.& Bossert, W.H.A primer of population biology.Stamford, Conn: SinauerAssociates, 1971.26Figure 1.Metabolic flow chart for the ancestor, parasite, hyper-parasite, andtheir interactions: ax, bx and cx refer to CPU registers where location and size informationare stored.[ax] and [bx] refer to locations in the soup indicated by the values in the axand bx registers.Patterns such as 1101 are complementary templates used for addressing.Arrows outside of boxes indicate jumps in the flow of execution of the programs.Thedotted-line arrows indicate flow of execution between creatures.The parasite lacks thecopy procedure, however, if it is within the search limit of the copy procedure of a host, itcan locate, call and execute that procedure, thereby obtaining the information needed tocomplete its replication.The host is not adversely affected by this informational parasitism,except through competition with the parasite, which is a superior competitor.Note that theparasite calls the copy procedure of its host with the expectation that control will returnto the parasite when the copy procedure returns.However, the hyper-parasite jumps outof the copy procedure rather than returning, thereby seizing control from the parasite.Itthen proceeds to reset the CPU registers of the parasite with the location and size of thehyper-parasite, causing the parasite to replicate the hyper-parasite genome thereafter.27Figure 2.Metabolic flow chart for social hyper-parasites, their associated hyper-hyper-parasite cheaters, and their interactions.Symbols are as described for Fig.1.Horizontal dashed lines indicate the boundaries between individual creatures.On both theleft and right, above the dashed line at the top of the figure is the lowermost fragment of asocial-hyper-parasite.Note (on the left) that neighboring social hyper-parasites cooperatein returning the flow of execution to the beginning of the creature for self-re-examination.Execution jumps back to the end of the creature above, but then falls off the end of thecreature without executing any instructions of consequence, and enters the top of the creaturebelow.On the right, a cheater is inserted between the two social-hyper-parasites.The cheatercaptures control of execution when it passes between the social individuals.It sets the CPUregisters with its own location and size, and then skips over the self-examination step whenit returns control of execution to the social creature below.29Figure 3.Metabolic flow chart for obligate symbionts and their interactions.Symbols are as described for Fig.1.Neither creature is able to self-replicate in isolation.However, when cultured together, each is able to replicate by using information provided bythe other.31Figure 4.Evolutionary optimization at eight sets of mutation rates.In each run,the three mutation rates: move mutations (copy error), flaws and background mutations(cosmic rays) are set relative to the generation time.In each case, the background mutationrate is the lowest, affecting a cell once in twice as many generations as the move mutationrate.The flaw rate is intermediate, affecting a cell once in 1.5 times as many generationsas the move mutation rate.For example in one run, the move mutation will affect a cellline on the average once every 4 generations, the flaw will occur once every 6 generations,and the background mutation once every 8 generations.The horizontal axis shows elapsedtime in hundreds of millions of instructions executed by the system.The vertical axis showsgenome size in instructions.Each point indicates the first appearance of a new genotypewhich crossed the abundance thresholds of either 2% of the population of cells in the soup, oroccupation of 2% of the memory.The number of generations per move mutation is indicatedby a number in the upper right hand corner of each graph.33Figure 5.Variation in evolutionary optimization under constant conditions.Based on a mutation rate of four generations per move mutation, all other parameters as inFig.4.The plots are otherwise as described for Fig.4.37Table 1: Genebank.Table of numbers of size classes in the genebank.Left column is sizeclass, right column is number of self-replicating genotypes of that size class.305 sizes, 29,275genotypes [ Pobierz całość w formacie PDF ]