SlideShare a Scribd company logo
Information Processing by Complex
Thermodynamic Systems: A Search
for a New Computing Feasibility
Doy Sundarasaradula, Ph.D.
TOT Innovation Institute
TOT Public Company Limited, Thailand
IEEE-ICITIS 2011
Presentation Outline
• Limitations of traditional digital computing
systems
• Levels of information
• Information processing & thermal energy
conversion
• Equivalence between energy & information
• Dissipative structures
• Information processing by a dissipative structure
Limitations of traditional digital
computing systems
• Traditional digital systems (e.g., digital
computers)
– Highly constrained
– Precisely laid out
– Not very fault tolerant
– Largely serial
– Centralised
– Deterministic
– Minimally adaptive
Limitations of traditional digital
computing systems
• Biological computing systems (e.g., brains)
– Massively parallel
– Densely connected with leaky transmission paths
– Fault tolerant
– Self repairing
– Adaptive
– Noisy and stochastic
Levels of information
• Syntactic (e.g., signs, symbols, etc.)
• Semantic (e.g., mutual understanding
between senders and receivers)
• Pragmatic (e.g., mutual understanding
between senders and receivers + mutual
interactions)
Information processing & thermal
energy conversion
Heat reservoir at high
temperature Th
Heat reservoir at
low temperature Tc
Heat engine
Qh
Qc
W = Qh - Qc
Figure 3. Working principle of heat engine based on Carnot theory
Non-Adaptive/
Rigid Structures
Information processing & thermal
energy conversion
Less organised data
(in electrical energy
input or signaling
format, etc.)
Low quality
thermal
energy/entropy
dissipation
Microprocessor/
Microcontroller
Figure 4. Working principle of microprocessor-based information processing
systems
More useful and
organised information
(electrical signaling,
etc.)
Non-Adaptive/
Rigid Structures
Equivalence between energy &
information
“According to the Shannon’s and
Weaver’s information theory, a bit of
information is equal to kln2 or approx.
10-23 joules per degree Kelvin, where k
is Boltzmann’s Constant (Tribus and
McIrvine, 1971).”
Dissipative Structures (Brusselators)
X Y
Figure 1. The cyclical organization of the Brusselator with an autocatalytic step of X.
A
B
E D
Adaptive/Interactive
Structures
.
32
EX
DYXB
XYX
XA




XBXYXA
dt
dX
 2
YXBX
dt
dY 2

Information processing by a
dissipative structure
Figure 2. The dynamic of pragmatic information within a dissipative structure
BA
Novelty Confirmation
Autopoiesis
LevelofPragmaticinformation
Complete
Chaos
Complete
Stagnation
Output signals generated by a
Brusselator
10:50 30 Aug 2008
Figure 10.86 A test result - Flow Constant 5 is set at 0.00472
Page 1
0.00 4000.00 8000.00 12000.00 16000.00
Time
1:
1:
1:
0
10
20
1: X1
1 1
1
1
Output signals generated by a
Brusselator
10:50 30 Aug 2008
Figure 10.87 A test result - Flow Constant 5 is set at 0.00472
Page 1
0.00 4000.00 8000.00 12000.00 16000.00
Time
1:
1:
1:
0
10
20
1: Y1
1
1
1
1
Influx affected by system’s activity
10:50 30 Aug 2008
Figure 10.88 A test result - Flow Constant 5 is set at 0.00472
Page 1
0.00 4000.00 8000.00 12000.00 16000.00
Time
1:
1:
1:
0
10
20
1: Source1
1 1 1 1
Influx affected by system’s activity
Dissipative
systems
Energy fluxes
from the
environment
Questions?
Xie xie nin men!

More Related Content

Similar to Information Processing by Complex Thermodynamic Systems: A Search for a New Computing Feasibility

Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
ijceronline
 
Energy packet networks with energy harvesting
Energy packet networks with energy harvestingEnergy packet networks with energy harvesting
Energy packet networks with energy harvesting
redpel dot com
 
Energy packet networks with energy harvesting
Energy packet networks with energy harvestingEnergy packet networks with energy harvesting
Energy packet networks with energy harvesting
redpel dot com
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyIAEME Publication
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyprjpublications
 
eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...
eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...
eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...
George Vanecek
 
Quantum information technology
Quantum information technologyQuantum information technology
Quantum information technology
mitchellwalls1
 
Implementation of Effective Code Converters using Reversible Logic Gates
Implementation of Effective Code Converters using Reversible Logic Gates Implementation of Effective Code Converters using Reversible Logic Gates
Implementation of Effective Code Converters using Reversible Logic Gates
IJERA Editor
 
Energy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksEnergy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless Nanonetworks
Michele Weigle
 
Alternative Computing
Alternative ComputingAlternative Computing
Alternative Computing
Shayshab Azad
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
SainadhDuppalapudi
 
brain.pdf
brain.pdfbrain.pdf
brain.pdf
kirti617012
 
03j_nov18_n2.pptClassification of Parallel Computers.pptx
03j_nov18_n2.pptClassification of Parallel Computers.pptx03j_nov18_n2.pptClassification of Parallel Computers.pptx
03j_nov18_n2.pptClassification of Parallel Computers.pptx
Neeraj Singh
 
Quantum Blockchains
Quantum BlockchainsQuantum Blockchains
Quantum Blockchains
Melanie Swan
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Alexander Decker
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
IJECEIAES
 
Event triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsEvent triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizations
ISA Interchange
 
De31486489
De31486489De31486489
De31486489IJMER
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
Rachitdas2
 

Similar to Information Processing by Complex Thermodynamic Systems: A Search for a New Computing Feasibility (20)

Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
 
Energy packet networks with energy harvesting
Energy packet networks with energy harvestingEnergy packet networks with energy harvesting
Energy packet networks with energy harvesting
 
Energy packet networks with energy harvesting
Energy packet networks with energy harvestingEnergy packet networks with energy harvesting
Energy packet networks with energy harvesting
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...
eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...
eCeNS Hybrid Knowledge-Base and SCN-Engine Framework for building Intelligent...
 
Quantum information technology
Quantum information technologyQuantum information technology
Quantum information technology
 
Implementation of Effective Code Converters using Reversible Logic Gates
Implementation of Effective Code Converters using Reversible Logic Gates Implementation of Effective Code Converters using Reversible Logic Gates
Implementation of Effective Code Converters using Reversible Logic Gates
 
Energy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless NanonetworksEnergy Harvesting-aware Design for Wireless Nanonetworks
Energy Harvesting-aware Design for Wireless Nanonetworks
 
Alternative Computing
Alternative ComputingAlternative Computing
Alternative Computing
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
 
brain.pdf
brain.pdfbrain.pdf
brain.pdf
 
03j_nov18_n2.pptClassification of Parallel Computers.pptx
03j_nov18_n2.pptClassification of Parallel Computers.pptx03j_nov18_n2.pptClassification of Parallel Computers.pptx
03j_nov18_n2.pptClassification of Parallel Computers.pptx
 
Quantum Blockchains
Quantum BlockchainsQuantum Blockchains
Quantum Blockchains
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
 
Event triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsEvent triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizations
 
De31486489
De31486489De31486489
De31486489
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Information Processing by Complex Thermodynamic Systems: A Search for a New Computing Feasibility

  • 1. Information Processing by Complex Thermodynamic Systems: A Search for a New Computing Feasibility Doy Sundarasaradula, Ph.D. TOT Innovation Institute TOT Public Company Limited, Thailand IEEE-ICITIS 2011
  • 2. Presentation Outline • Limitations of traditional digital computing systems • Levels of information • Information processing & thermal energy conversion • Equivalence between energy & information • Dissipative structures • Information processing by a dissipative structure
  • 3. Limitations of traditional digital computing systems • Traditional digital systems (e.g., digital computers) – Highly constrained – Precisely laid out – Not very fault tolerant – Largely serial – Centralised – Deterministic – Minimally adaptive
  • 4. Limitations of traditional digital computing systems • Biological computing systems (e.g., brains) – Massively parallel – Densely connected with leaky transmission paths – Fault tolerant – Self repairing – Adaptive – Noisy and stochastic
  • 5. Levels of information • Syntactic (e.g., signs, symbols, etc.) • Semantic (e.g., mutual understanding between senders and receivers) • Pragmatic (e.g., mutual understanding between senders and receivers + mutual interactions)
  • 6. Information processing & thermal energy conversion Heat reservoir at high temperature Th Heat reservoir at low temperature Tc Heat engine Qh Qc W = Qh - Qc Figure 3. Working principle of heat engine based on Carnot theory Non-Adaptive/ Rigid Structures
  • 7. Information processing & thermal energy conversion Less organised data (in electrical energy input or signaling format, etc.) Low quality thermal energy/entropy dissipation Microprocessor/ Microcontroller Figure 4. Working principle of microprocessor-based information processing systems More useful and organised information (electrical signaling, etc.) Non-Adaptive/ Rigid Structures
  • 8. Equivalence between energy & information “According to the Shannon’s and Weaver’s information theory, a bit of information is equal to kln2 or approx. 10-23 joules per degree Kelvin, where k is Boltzmann’s Constant (Tribus and McIrvine, 1971).”
  • 9. Dissipative Structures (Brusselators) X Y Figure 1. The cyclical organization of the Brusselator with an autocatalytic step of X. A B E D Adaptive/Interactive Structures . 32 EX DYXB XYX XA     XBXYXA dt dX  2 YXBX dt dY 2 
  • 10. Information processing by a dissipative structure Figure 2. The dynamic of pragmatic information within a dissipative structure BA Novelty Confirmation Autopoiesis LevelofPragmaticinformation Complete Chaos Complete Stagnation
  • 11. Output signals generated by a Brusselator 10:50 30 Aug 2008 Figure 10.86 A test result - Flow Constant 5 is set at 0.00472 Page 1 0.00 4000.00 8000.00 12000.00 16000.00 Time 1: 1: 1: 0 10 20 1: X1 1 1 1 1
  • 12. Output signals generated by a Brusselator 10:50 30 Aug 2008 Figure 10.87 A test result - Flow Constant 5 is set at 0.00472 Page 1 0.00 4000.00 8000.00 12000.00 16000.00 Time 1: 1: 1: 0 10 20 1: Y1 1 1 1 1
  • 13. Influx affected by system’s activity 10:50 30 Aug 2008 Figure 10.88 A test result - Flow Constant 5 is set at 0.00472 Page 1 0.00 4000.00 8000.00 12000.00 16000.00 Time 1: 1: 1: 0 10 20 1: Source1 1 1 1 1
  • 14. Influx affected by system’s activity Dissipative systems Energy fluxes from the environment