Arllecta: A Decentralized Sense-To-Sense Network

Arllecta: A Decentralized Sense-To-Sense Network

A purely decentralized Internet would allow its users to create or get access to a public or private informational worldwide network with a guarantee not to be spammed, interrupted or attacked by a third party at all.

Semantic Normalizer (SN) would improve the user's Internet search experience and diminish search time greatly. SN eliminates double answering and double meaning problems. It is a part of the architectural solution of ArLLecta and requires no additional pre-installations.

We propose a solution to the nontransparent and domain-centered Internet problem using a decentralized sense-to-sense network. S2S network allows creating public or private zones for business or personal needs. The data of each user, individual or corporate, is decoded and published only by direct permission. The architecture of S2S network prevents the centralization of its data by a single user.

However, each user can create or join or leave any zone.

The main task of the S2S network is to give each user a possibility for a quick sense -focused search and save its data from unauthorized third parties.

1.Introduction

We are pretty much confident that there is no perspective practical possibility for achieving a sense-focused result as soon as the man is required to fill some tag-based website field. The introduction and usage of meta-tags of the HTML webpage prove this statement.

The structure of a digital document is usually updated on a regular basis.

With updating, the sense of a single phrase or sentence can be changed significantly. Therefore, the mechanism of sense searching and associations between network content must exist and be turned on dynamically.

2.Problem

In an attempt to create artificial intelligence, humankind face with tons of problems that look unfeasible. Many worldwide engineers and IT specialists focus primarily on standardization of the presentation of digital data. However, the core principles of forming human knowledge do not follow a predetermined pattern or mental template.

In the context of the World Wide Web, there are three key technologies (standards) that might be the main barrier for creating a Truly Intellectual and Self-Learning Internet for humans and machines as well. Here are URI, HTTP, and HTML.

PDF-format file >>>

要查看或添加评论,请登录

Egger Mielberg的更多文章

  • Longevity or Cancer: what's first?

    Longevity or Cancer: what's first?

    Core understanding The human body has a temporary limitation on productive work throughout life. And this limitation…

  • Medllecta: Hematological preventive method (HPM). Part 2.

    Medllecta: Hematological preventive method (HPM). Part 2.

    Abstract. A complete dynamic model of the protein and, in particular, the enzymatic process of synthesis and…

  • Sense Diagrams

    Sense Diagrams

    Simple and readable diagrams of a complex set of any kind would allow a million connections between elements of that…

  • Sense Series

    Sense Series

    Any complex mathematical or physical problem can be solved easier if it is broken down into several less complex…

  • Neuro-Amorphic Function

    Neuro-Amorphic Function

    As a good try, we took liberty for formula derivation that would allow describing many physical phenomena. In Nature…

  • Sense Theory

    Sense Theory

    Cognitive processes of the human brain are strongly tied to such a well-known part of the brain like the cortex. All…

  • Proof of Participation (PoP) Protocol

    Proof of Participation (PoP) Protocol

    Abstract. We present an innovative approach to the design of a decentralized asynchronous protocol that will, first…

  • Decentralized Chain of Transactions

    Decentralized Chain of Transactions

    Abstract. In a system where there are tons of information of different types it is always hard and frequently…

  • NACA: Publicly Secured

    NACA: Publicly Secured

    Abstract. Under certain circumstances, determinism of a block cipher can lead to a disclosure of sensitive information…

  • Amorphic Encryption

    Amorphic Encryption

    Abstract. As a symmetric as an asymmetric scheme requires a key (session or private) to be hidden.

社区洞察

其他会员也浏览了