Common Analogy Patterns for Domains in the
Inactive State
1- On the First Layer: Isolated Domains and
Invisibility for External Environment:
A-Structural Mechanism, Functional Processes, and Threading Module
between Subsystems and Enterprise eliminate. An Interruption turns on
invisibility in Subsystems and disables Instance Parameters. Subsystems become
isolated from external environments. (Fig 4)
B- Social Contexts become Isolated from the external environment due to
a deadlock. Minimum Threads Constraint causes a deadlock situation in Social
Environments. (Fig 4)
2- On the Second Layer: An inactive
Connection Mechanism between Layer one and Layer two:
A- Invisible transactions between Enterprise and Subsystems due to
Communication Deadlock and Resource Deadlock. (Fig 4)
B- The death status causes a deadlock
between Human and Social Environments. (Fig 4)
3- On the Third Layer, Manifest Death
Domains and data values disappear:
External Forces can modify Biological and Non-Biological Systems.
Modification causes death and disappearances.
A- Death Domain in Non-Biological System implies Enterprise and physical
devices in the Real World. An Enterprise goes bankrupt, and the most
fundamental configuration data becomes invisible to External Environments.
Physical parts of an Enterprise can convert into hidden environments and
disappear in Social Contexts. (Fig 4)
B- Death Domain in the Biological System refers to death in the Brain
Framework and data disappearance. Information within the Brain becomes
invisible to External Environments. The physical part of humans can convert to
concealed environments through waste disposal systems and disappear in Social
Contexts. (Fig 4)
4- On the Fourth Layer can Obstacle Course
of Data and an Inactive Connection Mechanism:
A- Internet disconnection prevents Data Transactions within Enterprise
to Cloud Networking. Cloud Computing Service Provider keeps and protects
Enterprise Data Transaction in Storage under the business contract. (Fig 4)
B- The death receptor within the Brain sends a Signal to the Conscious
Component for uploading Data from the Brain when the oxygen disappears in the
Brain Framework. After uploading Data from the Brain to the Conscious
Component, the Data Transactions block between the Brain and the Conscious
Component. (Fig 4)
5- On the Fifth Layer: Data Availability,
Reliability, and Consistency within Global Storage:
A- Part of Enterprise Data Storage can be
transparent to the public under the business contract. Whole Data Storage in an
Enterprise can be stored, maintained, and assessed through a Cloud Computing
Service Provider under a business contract. (Fig 4)
B- The Supernatural Forces can access Data
Storage stored and maintained in the Conscious Component/ the Brain Framework.
(Fig 4)
6- On the Sixth Layer: Active Access
Control Mechanism
A- Cloud Computing Service Provider keeps
and protects Enterprise Data Storage through an Active Access Control
Mechanism. The Cloud Network under the business contract can preserve encrypted
data on the local Database. (Fig4)
B- God/ Supernatural Forces maintain and
protect Encrypted Data and Algorithmic Patterns within the Conscious Component
through Active Access Control Mechanism. (Fig 4)
7- On the Seventh Layer: Control of
Aggregated Data and guidance Functions:
A- Cloud Computing Service Provider can monitor Aggregated Data and guidance
Functions within a Cloud Network (Global Storage). (Fig 4)
B- God/ Supernatural Forces Control Aggregated Data and guidance Functions
within the Conscious Component (Global Storage). (Fig 4)
Conclusion
According to the observational study, analogical inferences between
Non-Biological and Biological Systems justify the similarity of Layer 5, Layer
6, and Layer 7 due to a Model of Harmony Perception. The Target Domain can suggest
approximate values of Control Functions, which share pattern regularity as The
Source Domain.
Observation:
General insights into Functional Mechanisms within the Conscious
Component are discussed and reviewed in Previous Research.
Observation:
Analogical Reasoning is a mapping between two diverse systems that
belong to similar or divergent domains.
Observation:
According to previous research, Logical Inference Algorithms within the
Conscious Component and Harmonic Balance in Iceberg Cells can determine the
validity of decision-making patterns.