The author focuses on the retraction of the article 'In Sickness and in Health? Physical Illness as a Risk Factor for Marital Dissolution in Later Life' which is being republished with corrected data in the sa...
详细信息
The author focuses on the retraction of the article 'In Sickness and in Health? Physical Illness as a Risk Factor for Marital Dissolution in Later Life' which is being republished with corrected data in the same issue. He comments on scientific errors and misconduct and the growing complexity of research with big data, transdisciplinary collaboration, and increasingly sophisticated research methods. He suggests coding errors like the one in the above paper might be fairly common.
In previous research, hands-crossed versions of a social variant of the Simon task were used to distinguish between effector-based coding of the Social Simon effect (SSE, analogously to the standard Simon effect) or b...
详细信息
In previous research, hands-crossed versions of a social variant of the Simon task were used to distinguish between effector-based coding of the Social Simon effect (SSE, analogously to the standard Simon effect) or body-based coding, in which the coding of stimulus location and seating position of the participants functions as a spatial reference frame. In the present study, the analysis of the SSE with respect to previous task requirements (i.e., Simon compatibility in N-1) in a hands-crossed variant of the Social Simon task shows that neither type of coding provides a sole explanation of the pattern of a SSE. Instead, the data pattern seems to be explained more parsimoniously by the assumption of a strengthening of low level feature integration mechanisms in a social setting, taking repetitions and alternations of both agents' stimulus and response features into account.
To evaluate and calculate the capacity of information hiding system is a crucial topic of the field. From the point of view of the coding theory and set theory, this paper suggests a methodology for calculating the ca...
详细信息
To evaluate and calculate the capacity of information hiding system is a crucial topic of the field. From the point of view of the coding theory and set theory, this paper suggests a methodology for calculating the capacity of information hiding system on still images in a discrete case, meantime, some definitions are given and a conclusion that the capacity in the condition of no attackers is only related to the distortion function and the PMF (Probability Mass Function) of the source data is drawn out. Furthermore, the results of the capacity of information hiding in the case with attackers are given also.
In this work, we study the problem of synchronizing two sets of data where the size of the symmetric difference between the sets is small and, in addition, the elements in the symmetric difference are related through ...
详细信息
In this work, we study the problem of synchronizing two sets of data where the size of the symmetric difference between the sets is small and, in addition, the elements in the symmetric difference are related through the Hamming distance metric. In our initial work [16], we provided communication-efficient methods for this problem when the elements in the symmetric difference were within a given Hamming distance. We now extend that work by considering sets whose symmetric difference consists of many blocks, each composed of elements that are within a given Hamming distance. We develop new encoding and decoding algorithms to address the complexities arising from allowing multiple difference blocks.
It is known that electroencephalograph (EEG) signals show specific responses with a event;e.g., visual stimulus, cognition or motor imagery. Especially users can control an electronic device by classifying and interpr...
详细信息
ISBN:
(纸本)9784907764388
It is known that electroencephalograph (EEG) signals show specific responses with a event;e.g., visual stimulus, cognition or motor imagery. Especially users can control an electronic device by classifying and interpreting the EEG signals;such a system is called brain-computer interface (BCI). In this study, we tried to construct the BCI system, based on transient visual evoked potentials (VEPs) and its visual stimuli flash in conformity with the sequence of binary Bose-Chaudhuri-Hocquenghem (BCH) codes.
We consider the constrained optimization of excitatory synaptic input patterns to maximize spike generation in leaky integrate-and-fire (LIF) and theta model neurons. In the case of discrete input kicks with a fixed t...
详细信息
We consider the constrained optimization of excitatory synaptic input patterns to maximize spike generation in leaky integrate-and-fire (LIF) and theta model neurons. In the case of discrete input kicks with a fixed total magnitude, optimal input timings and strengths are identified for each model using phase plane arguments. In both cases, optimal features relate to finding an input level at which the drop in input between successive spikes is minimized. A bounded minimizing level always exists in the theta model and may or may not exist in the LIF model, depending on parameter tuning. We also provide analytical formulas to estimate the number of spikes resulting from a given input train. In a second case of continuous inputs of fixed total magnitude, we analyze the tuning of an input shape parameter to maximize the number of spikes occurring in a fixed time interval. Results are obtained using numerical solution of a variational boundary value problem that we derive, as well as analysis, for the theta model and using a combination of simulation and analysis for the LIF model. In particular, consistent with the discrete case, the number of spikes in the theta model rises and then falls again as the input becomes more tightly peaked. Under a similar variation in the LIF case, we numerically show that the number of spikes increases monotonically up to some bound and we analytically constrain the times at which spikes can occur and estimate the bound on the number of spikes fired.
We are presenting in this volume the collection of extended abstracts of 66 talks that were presented at Combinatorics 2012 in Perugia, Italy. Combinatorics 2012 is the 17th in the series of combinatorics conferences ...
详细信息
This issue of Electronic Notes in Discrete Mathematics includes a selection of 33 extended abstracts that were presented at Fifth Conference on Algebraic Combinatorics and Graph theory in Kashan, Iran. This is the 5th...
详细信息
暂无评论