[Fis] A new discussion session
Karl Javorszky
karl.javorszky at gmail.com
Fri Dec 2 13:22:13 CET 2022
Another new session within same frames of reference
Dear Friends,
There was an interesting one-day conference online just a few days ago on
Zoom re Information and Philosophy.
There are many noteworthy efforts to gain a deep understanding of the
meaning of the word ‘information’. Yet, they all remain – alas! – within
the same system of references. The cultural taboos and their positive form,
cultural agreements give us a standard frame of references which is not
easy to discard, leave behind as world views of a naïve person.
In clinial psychology, one is routinely used to discarding the common
framework of what is correct and reasonable, while one tries to understand
one specific client’s perspectives of the world. One has to reframe the
context so that it makes sense (at least for the client).
Two main points:
1. Discard the unified, seamlessly fitting concept of the whole (which
is imagined to be made up of identical elementary units)
2. Assume the existence of a crack along the whole, which crack is
serrated and can locally be overcome, but will not cease to exist, because
the two parts that one wants to fit together are by their nature different.
One cannot fit a lid on a cup if the diameters are slightly deviant,
whichever method one tries to trick one into fit with the other.
Doing the same but in stereo
One needs agreement that (while using *one *linear enumeration the problem
appears not to exist) using *two *enumerations reveals inbuilt
controversies among the relations that underly *a+b=c. *We can put to use
the diverse variants of the slight overall discongruence which exists as a
logical fact, to be read out of the properties of natural numbers.
We need to agree that the world consists of two parts. The parts *a, b *do
not fit seamlessly into an entity *c. *The extent of the non-fit can be
made visible by means of planar geometry. While *a+b=c *is true in a linear
context, *pos(a) + pos(b) {<,=,>} pos(c)* shows many, diverse variants of
being not true, which variants each have a definite numeric extent.
Treating the logical primitives in the context of planar geometry, their
interrelations give rise to many concepts the meaning of which we have
created by relating measurements of Nature. We find mathematical pictures
of natural constants.
Information is the extent of being otherwise than expected
Sorting and ordering a grand dozen of tin soldiers one will observe typical
patterns of movements while the exchanges of places take place. These
patterns are assemblies of numeric values. They can be brought into a web
of mutual expectations. This is a conceptually complicated but technically
simple data base management problem.
Change the Frame (coulisses, conceptual landscape, system of what is normal)
Imagine a generally dualistic world. The two parts coexist and transcend
each other. The diameter of the proton is the result of numeric
interdependencies in a system of values which is the proton’s own system of
references. The diameter of the neutron is the result of numeric
interdependencies in a system of values which is the neutron’s own system
of references. For our perception we can establish two interacting systems
of references when observing movement patterns of realizations of
*(a,b). *Having
*two *counting systems in use, we can exactly point out those snippets that
are generated when our brain assembles *one *picture out of the *two *sets
of data coming from the eyes. The discongruences that come as an artefact
of the counting system are in their essence the information.
Looking forward your comments
Karl
Am Do., 1. Dez. 2022 um 14:03 Uhr schrieb Pedro C. Marijuán <
pedroc.marijuan en gmail.com>:
> Dear Sheri, Lou, and all discussants,
>
> It is a pity that this excellent discussion has taken place in complicated
> academic weeks, as it has been caught in a sort of "punctuated equilibrium"
> of longer stasis than activities in our evolutionary list. Well, I have a
> couple of very brief comments:
>
> First, emphasizing that one of the references in Youri's last messages
> should be obligated reading for biologically interested parties: "Sensing
> the world and its dangers: An evolutionary perspective in
> neuroimmunology." By Aurora Krauset al. In, eLife 2021;10:e66706. DOI:
> https://urldefense.com/v3/__https://doi.org/10.7554/eLife.66706__;!!D9dNQwwGXtA!R2YvFU9Pmca59A8Nw9DqjCP-_cGLRohRNGk42iZVFkfb3Dsrnw_lD2Fx4wDQgKd7odG4GRn-SsRKwjS7LwweEoO622A$
> <https://urldefense.com/v3/__https://doi.org/10.7554/eLife.66706__;!!D9dNQwwGXtA!SqizL3x3CcntbhLaIdrhBHmGMi7btD5ZwhfvU15L4xIxjE3QCOJv6ua8XvelEf-PtASzBqEnHi_-s40a8WSen8bu1LAR$>
> . In this vein, I will follow with the argument that the multicellular
> self is a composite, an association with a microbial consortium that
> probably was the big evolutionary cause to create a defense system of such
> a great complexity. The innate immune system would represent the
> evolutionary learning about those dangers, with scores of different
> components and pattern recognition strategies...
>
> And second, about the adaptive immune system, it is where the ongoing
> mostly formal discussion would apply (can we agree with that?). Then, it
> seems that the core of this adaptive immune branch is the Major
> Histocompatibility Complex molecule (MHC). This MHC molecules of two major
> classes are highly complex (polygenic and polymorphic) and they are in
> charge of presenting to lymphocyte T cells the protein fragments churned
> out from the proteosomes inside cells (fragments of variable lenght: 8-10
> amino acids residues for Class 1, mostly "self", and 13-18 amino acids
> residues for Class 2, mostly "non self"). Then, the thymus is in charge of
> deactivating the T cells loaded with self stuff. My point is that the
> defense in front of the non-self is based on *indirect products of
> protein translation*. This causes me some uneasiness, as protein
> translation (see Youri's presentation months ago) introduces a layer of
> extra complexity, not to speak the processing via proteosomes. Further,
> with just 10 or 12 amino acids can we faithfully ascertain algorithmic
> non-self provenance??
>
> Well, Sheri is far more acknowledged with all this stuff. And perhaps Lou
> can say something about the formal distinguishability of 10-12 aa.
> Best--Pedro
>
> El 15/11/2022 a las 21:19, Markose, Sheri escribió:
>
> Dear Louis, dear Colleagues -
>
>
>
> Louis has given an excellent exposition of Gödel Numbering (g.n) (your
> point number 2 on coding and semantics is giving me food for thought) ,
> giving example of prime factorization and also of Gödel Sentence as one
> that states its own unprovability. Unlike statements like "this is
> false", GS is not paradoxical and in a consistent system it is a theorem
> with a constructive g.n. The latter in terms of the prime factorization
> format, it is indeed a Hilbert 10 Diophantine equation with no integer
> solutions. A remarkable achievement in maths, considering Gödel was only
> 23 years of age .... But what has this got to do with Biology and novelty
> production, the objectives of the my FIS discussion ?
>
>
>
> In view of brevity and also urged by Pedro, I dropped a couple of
> paragraphs in my FIS kick off submission as to why we need to exceed Gödel
> (1931) and couch the Gödel Incompleteness Results and the Gödel Sentence
> with a fuller understanding of algorithms as encoded instructions and as
> machine executable codes, of the notion of recursive enumeration (re) and
> re sets that was developed in the Emil Post (1944). I hope Louis Kauffman
> can comment on the the application of the fuller Gödel-Turing -Post-Rogers
> framework mentioned in my FIS note and in my papers cited there.
>
>
>
> 1. I have found the following statement by Joel Hamkins ( :
> https://urldefense.com/v3/__http://jdh.hamkins.org/wp-content/uploads/A-review-of-several-fixed-point-theorems-1.pdf__;!!D9dNQwwGXtA!R2YvFU9Pmca59A8Nw9DqjCP-_cGLRohRNGk42iZVFkfb3Dsrnw_lD2Fx4wDQgKd7odG4GRn-SsRKwjS7LwweKRrr2EY$
> <https://urldefense.com/v3/__http://jdh.hamkins.org/wp-content/uploads/A-review-of-several-fixed-point-theorems-1.pdf__;!!D9dNQwwGXtA!SqizL3x3CcntbhLaIdrhBHmGMi7btD5ZwhfvU15L4xIxjE3QCOJv6ua8XvelEf-PtASzBqEnHi_-s40a8WSenw8_avhB$>
> ) useful as it makes an important observation that the original Gödel
> (1931) framework permits an encodable proposition to make statements about
> itself while Second Recursion Theorems (SRT) also called Fixed Point
> Theorems are needed “to construct programs/algorithms that refer to
> themselves”. The terms programs and algorithms will be used
> interchangeably.
>
>
>
> I choose Rogers Fixed Point Theorem of (total) computable functions
> starting with the staple I have already indicated Diag (g) (RHS of (8)
> below) is what Neil Gerschenfeld calls ribosomal self-assembly machines in
> gene expression where the program *g builds the *machine that runs g.
>
>
>
>
>
> II. The first requirement of a system to identify Fixed Points viz.
> self-referential constructions of algorithms/programs is (8) viz to
> identify what function/algorithm has altered the Diag (g).
>
>
>
>
>
>
>
> When online gene expression takes place on RHS of (8), viz. these programs
> have halt commands and builds the somatic and phenotype identity of
> vertebrates online, the offline record of this is made in the Thymus that
> can not only represent the Thymic/immune self but also concatenate changes
> thereof.
>
>
>
> I have suggested that the Adaptive Immune System and the Mirror Neuron
> System have these structures in (8). And the domain of self-halting
> machines as in (8) are the Theorems of the system and a subset of Post
> (1944) Creative Set. The non-Theorems have codes say g¬ which cannot
> halt in a formal system that is consistent. To my mind, the embodiment via
> the physical self being self-assembled and an offline record of this on LHS
> of (8) is what fuses syntax and semantics.
>
>
>
> II. Once, (8) is in place, the Adaptive immune system has to identify
> novel negation software function *f¬! * of non-self antigens which is an
> uncountable infinite possibilities. Hence the close to astronomic search
> with V(D) J of 10 20 – 10 30 ) of non-self antigens that can hijack the
> self- assembly machines as recorded on RHS of (8). Only from knowledge of
> self can the hostile other, in the case of the AIS, be identified.
>
>
>
>
>
> III. Roger Fixed Point assures us that the indexes of the fixed point for *f¬!
> * be generated. I have cced Guillame Bonfante who I think was among the
> first (with coauthors, 2006) to suggest how SRT can be used to identify
> computer viruses. But they do not use the full force of Self-Ref and Self
> -Rep and only implicitly use Post Creative and Productive Sets. The index
> of the Godel Sentence for the fixed point will endogenously lie outside of
> Post listable or recusively enumerable set for Theorems and known
> non-Theorems.
>
>
>
> IV. From these Gödel Sentences produced in the immune-cognitive systems,
> the explicit use of Post (1944) Theorems indicates how novel antibodies
> cannot be produced in the absence of the Gödel Sentence which allows a
> biotic element to self-report it is under attack.
>
>
>
> V. In conclusion, while it has become fashionable for some like Jurgen
> Schmidhuber to claim that there can be endogenous self improving recursive
> novelty (he calls them Gödel machines) , the Gödel Logic says that the
> original theorems and self-codes are kept unchanged/hack free and novelty
> is produced only in response to adversarial attacks of self codes. So the
> AIS story is somatic hypermutation so that nothing in the genome changes.
> As to how the germline itself changes, needs more investigation, in
> Biosystems paper, I suggest something very briefly.
>
>
>
> So thankyou all again for your in depth comments and interest.
>
>
>
> Best Regards
>
>
>
> Sheri
>
>
>
> -----Original Message-----
>
> From: Fis <fis-bounces en listas.unizar.es> On Behalf Of Louis Kauffman
>
> Sent: 08 November 2022 00:13
>
> To: "Pedro C. Marijuán" <pedroc.marijuan en gmail.com>
>
> Cc: fis <fis en listas.unizar.es>
>
> Subject: Re: [Fis] A new discussion session
>
>
>
> CAUTION: This email was sent from outside the University of Essex. Please
> do not click any links or open any attachments unless you recognise and
> trust the sender. If you are unsure whether the content of the email is
> safe or have any other queries, please contact the IT Helpdesk.
>
>
>
> Dear Pedro,
>
> Here are some comments about Goedel numbering and coding.
>
>
>
> It is interesting to think about Goedel numbering in a biological context.
>
> Actually we are talking about how a given entity has semantics that can
> vary from context to context.
>
> It is not simply a matter of assigning a code number. If g —> F is the
> relation of a Goedel number g to a statement F, then we have two contexts
> for F.
>
> 1. F as a well formed formula in a formal system S.
>
> 2. g as a number in either a number system for an observer of S or g as a
> number in S, but g, as a representative for F can be regarded in the system
> S with the meanings so assigned.
>
> Thus we have produced by the assignment of Goedel numbers a way for a
> statement F to exist in the semantics of more than one context.
>
> This is the key to the references and self-references of the Goedelian
> situations.
>
>
>
> Lets look at this more carefully. Recall that there is a formal system S
> and that to every well formed formula in S, there is a code number g =
> g(S). The code number can be produced in many ways.
>
> For example, one can assign different index numbers n(X) to each distinct
> generating symbol in S. Then with an expression F regarded as an ordered
> string of symbols, one can assign to F the product of the prime numbers, in
> their standard order, with exponents the indices of the sequence of
> characters that compose F. For example, g(~ x^2 = 2) = 2^{n(~)}
> 3^{n(x)}5^{n(^)}7^{n(2)}11^{n(=)}13^{n(2)}. From such a code, one can
> retrieve the original formula in a unique way.
>
> The system S is a logical system that is assumed to be able to handle
> logic and basic number theory. Thus it is assumed that S can encode the
> function g: WFFS(S) —> N where N denotes the natural numbers.
>
> And S can decode a number to find the corresponding expression as well. It
> is assumed that S as a logical system, is consistent.
>
>
>
> With this backgound, let g —> F denote the condition that g = g(F). Thus I
> write a reference g —> F for a mathematical discussion of S, to indicate
> that g is the Goedel number of F.
>
>
>
> Now suppose that F(x) is a formula in S with a free variable x. Free
> variables refer to numbers. Thus if I write x^2 = 4 then this statement can
> be specialized to 2^2 = 4 with x =2 and the specialization is true.
>
> Or I can write 3^2 = 4 and this is a false statement. Given F(x) and some
> number n, I can make a new sentence F(n).
>
> Now suppose that
>
> g —> F(x).
>
> Then we can form F(g) and this new statement has a Goedel number. Let #g
> denote the Goedel number of F(g).
>
> #g —> F(g).
>
> This # is a new function on Goedel numbers and also can be encoded in the
> system S. I will abbreviate the encoding into S by writing #n for
> appropriate numbers n handled by S.
>
> Then we can consider
>
> F(#x) and it has a Goedel number
>
> h —> F(#x)
>
> And we can shift that to
>
> #h —> F(#h).
>
> This is the key point.
>
> Now we have constructed a number #h so that F(#h) discusses its own Goedel
> number.
>
>
>
> This construction allows the proof of the Goedel Incompleteness Theorem
> via the sentence B(x) that states
>
> B(x) = “The statement with Goedel number x is provable in S.” (This can
> also be encoded in S.)
>
>
>
> We then construct
>
> h—> ~B(#x)
>
> and
>
> #h —> ~B(#h)
>
> and obtain the statement
>
> G= ~B(#h).
>
> G states the unprovability of the Goedel decoding of #h.
>
> But the Goedel decoding of #h is the statement G itself.
>
> Thus G states its own unprovability.
>
> Therefore, S being consistent, cannot prove G.
>
>
>
> By making these arguments we have have proved that G cannot be proved by S.
>
> Thus we have shown that G is in fact true.
>
> We have shown that there are true statements in number theory unprovable
> by system S..
>
> ##########################
>
>
>
> The above is a very concise summary of the proof of Goedel’s
> Incompleteness Theorem, using Goedel number encoding.
>
>
>
> It is a very interesting question whether such encoding or such multiple
> relationships to context occur in biology. Here are some remarks.
>
>
>
> 1. In biology is is NORMALLY the case that certain key structures have
> multiple interpretations and uses in various contexts.
>
> The understanding of such multiple uses and the naming of them requires an
> observer of the biology. Thus we see the action of a cell membrane and we
> see the action of mitosis, and so on.
>
>
>
> 2. There are implicit encodings in biology such as the sequence codes in
> DNA and RNA and their unfoldment. To what extent do they partake of the
> properties of Goedel coding?
>
>
>
> 3. The use of the Goedel coding in the Incompleteness theorem depends
> crucially on the relationship of syntax and semantic in the formal system
> and in the mathematician’s interpretation of the workings of that system.
> The Goedel argument depends upon the formal system S being seen as a
> mathematical object that itself can be studied for its properties and
> behavior.
>
> When we speak of the truth of G, we are speaking of our assessment of the
> possible behaviour of S, given its consistency. We are reasoning about S
> just as Euclid reasons about the structure of right triangle.
>
>
>
> 4. In examining biological structures we take a similar position and
> reason about what we know about them. Sufficiently complex biological
> structures can be seen as modeled by certain logical formal systems.
>
> And then Goedelian reasoning can be applied to them. This can even be
> extended to ourselves. Suppose that I am modeled correctly in my
> mathematical reasoning by a SINGLE CONSISTENT FORMAL SYSTEM S.
>
> Then “I” can apply the above proof of Goedel’s Therem to S and deduce that
> G cannot be proven by S. Thus “I” have exceeded the capabilities of S.
> Therefore it is erroneous to assume that my mathematical reasoning is
> encapsulated by a single formal system S. If I am a formal system, that
> system must be allowed to grow in time. Such reasoning as this is subtle,
> but the semantics of the relationship of mathematicians and the formal
> systems that they study is subtle and when biology is brought in the whole
> matter becomes exceedingly interesting.
>
>
>
> 5. We man not need numbers to have these kinds of relationships. And
> example is the Smullyan Machine that prints sequences of symbols from the
> alphabet {~,P,R} on a tape. Sequences that begin with P,~P,PR and ~PR are
> regarded as meaningful, with the meanings:
>
> PX: X can be printed.
>
> ~PX: X cannot be printed.
>
> PRX: XX can be printed.
>
> ~PRX: XX cannot be printed.
>
> Here X is any string of the symbols {~,P,R}.
>
> Thus PR~~P means that XX can be printed where X = ~~P. Thus PR~~P means
> that ~~P~~P can be printed.
>
> By printed we mean on one press of the button on the Machine, a string of
> characters is printed.
>
> IT IS ASSUMED THAT THE SMULLYAN MACHINE ALWAYS TELLS THE TRUTH WHEN IT
> PRINTS A MEANINGFUL STATEMENT.
>
> Then we have the
>
>
>
> Theorem. There are meaningful true strings that the Smullyan Machine
> cannot print.
>
>
>
> This is a non-numerical analog of the Goedel Theorem. And the string that
> cannot be printed is G = ~PR~PR.
>
> For you see that G is meaningful and since G = ~PRX, G says that XX cannot
> be printed. But X = ~PR and XX = ~PR~PR = G. So G says that G cannot be
> printed.
>
> If the machine were to print G, it would lie. And the machine does not lie.
>
> Therefore G is unprintable.
>
> But this is what G says.
>
> So we have established the truth of G and proved the Theorem.
>
>
>
> 6. Examine this last paragraph 5. The Machine is like an organism with a
> limitation. This limitation goes through the semantics of reference. ~PRX
> refers to XX and so can refer to itself if we take X = ~PR. ~PX refers to X
> and cannot refer to itself since it is longer than X. In biological coding
> the DNA code is fundamentally smaller or equal to the structure to which it
> refers.
>
> Thus the self-reproduction of the DNA is possible since DNA = W+C the
> convention of the Watson and Crick strand and each of W and C can by
> themselves engage in an action to encode, refer to, the other strand. W can
> produce a copy of C in the form W+C and C can produce a copy of W in the
> form W+C each by using the larger environment. Thus W+C refers to itself,
> reproduces itself by a method of encoding quite similar to the self
> reference of the Smullyan Machine.
>
>
>
> 7. Von Neuman devised a machine that can build itself. B is the von Neuman
> machine and B.x —> X,x where x is the plan or blueprint or code for and
> entity X. B builds X with given the blueprint x.
>
> Then we have B,b —> B,b where b is the blueprint for B. B builds itself
> from its own blueprint. I hope you see the analogy with the Goedel code.
>
>
>
> 8. I will stop here. The relationships with biology are very worth
> discussing.
>
> Before stopping it is worth remarking that the Maturana Uribe Varela
> autopoeisis is an example of a system arising into a form of self-reference
> that has a lifetime due to the probabilisitic dynamics of its process.
>
>
>
> Very best,
>
> Lou Kauffman
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
>
> Fis mailing list
>
> Fis en listas.unizar.es
>
>
> https://urldefense.com/v3/__https://linkprotect.cudasvc.com/url?a=http*3a*2f*2flistas.unizar.es*2fcgi-bin*2fmailman*2flistinfo*2ffis&c=E,1,1A1lgz03IPLQ2hs74kfiKoMaeMUB45427CkA4or9aZPmd25ZxHPE88KK0k9wHh7-Un8A9g25n5WMXHIu8yhAyMhiouezvcso3GGs3inouA,,&typo=1__;JSUlJSUlJQ!!D9dNQwwGXtA!R2YvFU9Pmca59A8Nw9DqjCP-_cGLRohRNGk42iZVFkfb3Dsrnw_lD2Fx4wDQgKd7odG4GRn-SsRKwjS7LwweCfRfzTY$
> <https://urldefense.com/v3/__https://linkprotect.cudasvc.com/url?a=http*3a*2f*2flistas.unizar.es*2fcgi-bin*2fmailman*2flistinfo*2ffis&c=E,1,1A1lgz03IPLQ2hs74kfiKoMaeMUB45427CkA4or9aZPmd25ZxHPE88KK0k9wHh7-Un8A9g25n5WMXHIu8yhAyMhiouezvcso3GGs3inouA,,&typo=1__;JSUlJSUlJQ!!D9dNQwwGXtA!SqizL3x3CcntbhLaIdrhBHmGMi7btD5ZwhfvU15L4xIxjE3QCOJv6ua8XvelEf-PtASzBqEnHi_-s40a8WSen48jEgBp$>
>
> ----------
>
> INFORMACIN SOBRE PROTECCIN DE DATOS DE CARCTER PERSONAL
>
>
>
> Ud. recibe este correo por pertenecer a una lista de correo gestionada por
> la Universidad de Zaragoza.
>
> Puede encontrar toda la informacin sobre como tratamos sus datos en el
> siguiente enlace:
> https://urldefense.com/v3/__https://linkprotect.cudasvc.com/url?a=https*3a*2f*2fsicuz.unizar.es*2finformacion-sobre-proteccion-de-datos-de-caracter-personal-en-listas&c=E,1,fozeJ_L1c5tT22-_XAnl69C5WGhrrENGO-y2mO0uH3X4Bbm3EnwS5CaEussDHCR05GDKiVPAM9G4jQaY0kVhqsc4vdv55TdLJ2956rnsNTuETjVx&typo=1__;JSUlJQ!!D9dNQwwGXtA!R2YvFU9Pmca59A8Nw9DqjCP-_cGLRohRNGk42iZVFkfb3Dsrnw_lD2Fx4wDQgKd7odG4GRn-SsRKwjS7LwweZzdxbL0$
> <https://urldefense.com/v3/__https://linkprotect.cudasvc.com/url?a=https*3a*2f*2fsicuz.unizar.es*2finformacion-sobre-proteccion-de-datos-de-caracter-personal-en-listas&c=E,1,fozeJ_L1c5tT22-_XAnl69C5WGhrrENGO-y2mO0uH3X4Bbm3EnwS5CaEussDHCR05GDKiVPAM9G4jQaY0kVhqsc4vdv55TdLJ2956rnsNTuETjVx&typo=1__;JSUlJQ!!D9dNQwwGXtA!SqizL3x3CcntbhLaIdrhBHmGMi7btD5ZwhfvU15L4xIxjE3QCOJv6ua8XvelEf-PtASzBqEnHi_-s40a8WSen3lIIt8F$>
>
> Recuerde que si est suscrito a una lista voluntaria Ud. puede darse de
> baja desde la propia aplicacin en el momento en que lo desee.
>
>
> https://urldefense.com/v3/__https://linkprotect.cudasvc.com/url?a=http*3a*2f*2flistas.unizar.es&c=E,1,3TvXH92hrTfzt-a8xmVthnhgYDIEoQe6-G0P6rC6QRkjfvtNsCmkhdLTIB3yp7fRPc9B_8iQu5fWOkBGz-j3blB0p3sUtmf6XMK2hwJsC8gB1kGLD5vipYwnBGfi&typo=1__;JSUl!!D9dNQwwGXtA!R2YvFU9Pmca59A8Nw9DqjCP-_cGLRohRNGk42iZVFkfb3Dsrnw_lD2Fx4wDQgKd7odG4GRn-SsRKwjS7Lwwef2i2luI$
> <https://urldefense.com/v3/__https://linkprotect.cudasvc.com/url?a=http*3a*2f*2flistas.unizar.es&c=E,1,3TvXH92hrTfzt-a8xmVthnhgYDIEoQe6-G0P6rC6QRkjfvtNsCmkhdLTIB3yp7fRPc9B_8iQu5fWOkBGz-j3blB0p3sUtmf6XMK2hwJsC8gB1kGLD5vipYwnBGfi&typo=1__;JSUl!!D9dNQwwGXtA!SqizL3x3CcntbhLaIdrhBHmGMi7btD5ZwhfvU15L4xIxjE3QCOJv6ua8XvelEf-PtASzBqEnHi_-s40a8WSenzoKdr5E$>
>
> ----------
>
>
>
>
> <https://urldefense.com/v3/__https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient__;!!D9dNQwwGXtA!SqizL3x3CcntbhLaIdrhBHmGMi7btD5ZwhfvU15L4xIxjE3QCOJv6ua8XvelEf-PtASzBqEnHi_-s40a8WSen4qkMqQA$> Libre
> de virus.https://urldefense.com/v3/__http://www.avast.com__;!!D9dNQwwGXtA!R2YvFU9Pmca59A8Nw9DqjCP-_cGLRohRNGk42iZVFkfb3Dsrnw_lD2Fx4wDQgKd7odG4GRn-SsRKwjS7Lwwexx9cfCQ$
> <https://urldefense.com/v3/__https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient__;!!D9dNQwwGXtA!SqizL3x3CcntbhLaIdrhBHmGMi7btD5ZwhfvU15L4xIxjE3QCOJv6ua8XvelEf-PtASzBqEnHi_-s40a8WSen4qkMqQA$>
> <#m_6698188255541615770_DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>
> _______________________________________________
> Fis mailing list
> Fis en listas.unizar.es
> http://listas.unizar.es/cgi-bin/mailman/listinfo/fis
> ----------
> INFORMACIÓN SOBRE PROTECCIÓN DE DATOS DE CARÁCTER PERSONAL
>
> Ud. recibe este correo por pertenecer a una lista de correo gestionada por
> la Universidad de Zaragoza.
> Puede encontrar toda la información sobre como tratamos sus datos en el
> siguiente enlace:
> https://sicuz.unizar.es/informacion-sobre-proteccion-de-datos-de-caracter-personal-en-listas
> Recuerde que si está suscrito a una lista voluntaria Ud. puede darse de
> baja desde la propia aplicación en el momento en que lo desee.
> http://listas.unizar.es
> ----------
>
------------ pr�xima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <http://listas.unizar.es/pipermail/fis/attachments/20221202/54ab3119/attachment-0001.html>
------------ pr�xima parte ------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 60079 bytes
Desc: no disponible
URL: <http://listas.unizar.es/pipermail/fis/attachments/20221202/54ab3119/attachment-0001.png>
More information about the Fis
mailing list