Multisender authentication codes allow a group of senders to construct an authenticated message for one receiver such that the receiver can verify authenticity of the received message. In this paper, we construct one ...
详细信息
Multisender authentication codes allow a group of senders to construct an authenticated message for one receiver such that the receiver can verify authenticity of the received message. In this paper, we construct one multisender authentication code from pseudosymplectic geometry over finite fields. The parameters and the probabilities of deceptions of this code are also computed.
Predictive coding posits that neural systems make forward-looking predictions about incoming information. Neural signals contain information not about the currently perceived stimulus, but about the difference between...
详细信息
Predictive coding posits that neural systems make forward-looking predictions about incoming information. Neural signals contain information not about the currently perceived stimulus, but about the difference between the observed and the predicted stimulus. We propose to extend the predictive coding framework from high-level sensory processing to the more abstract domain of theory of mind;that is, to inferences about others' goals, thoughts, and personalities. We review evidence that, across brain regions, neural responses to depictions of human behavior, from biological motion to trait descriptions, exhibit a key signature of predictive coding: reduced activity to predictable stimuli. We discuss how future experiments could distinguish predictive coding from alternative explanations of this response profile. This framework may provide an important new window on the neural computations underlying theory of mind.
Summary: Voices or faces that fall outside of the norm are the memorable ones. Recent human neuroimaging work, however, indicates that the average voice holds considerable currency for neuronal coding. The study also ...
详细信息
Summary: Voices or faces that fall outside of the norm are the memorable ones. Recent human neuroimaging work, however, indicates that the average voice holds considerable currency for neuronal coding. The study also forges a bridge with the face recognition literature. [ABSTRACT FROM AUTHOR]
In previous research, hands-crossed versions of a social variant of the Simon task were used to distinguish between effector-based coding of the Social Simon effect (SSE, analogously to the standard Simon effect) or b...
详细信息
In previous research, hands-crossed versions of a social variant of the Simon task were used to distinguish between effector-based coding of the Social Simon effect (SSE, analogously to the standard Simon effect) or body-based coding, in which the coding of stimulus location and seating position of the participants functions as a spatial reference frame. In the present study, the analysis of the SSE with respect to previous task requirements (i.e., Simon compatibility in N-1) in a hands-crossed variant of the Social Simon task shows that neither type of coding provides a sole explanation of the pattern of a SSE. Instead, the data pattern seems to be explained more parsimoniously by the assumption of a strengthening of low level feature integration mechanisms in a social setting, taking repetitions and alternations of both agents' stimulus and response features into account.
It is known that the set of all primitive words and the set of all -primitive words are disjunctive languages. In this paper we prove that the set of all -primitive words is disjunctive. We also prove that the set of ...
详细信息
It is known that the set of all primitive words and the set of all -primitive words are disjunctive languages. In this paper we prove that the set of all -primitive words is disjunctive. We also prove that the set of all primitive but not -primitive words, the set of all balanced but not -primitive words, and the set of all -primitive but not -primitive words are disjunctive languages.
A multiobjective optimization coverage control strategy is proposed for solving the contradictory problem among energy consumption, equilibrium of energy, and network coverage in wireless sensor networks. A new evolut...
详细信息
A multiobjective optimization coverage control strategy is proposed for solving the contradictory problem among energy consumption, equilibrium of energy, and network coverage in wireless sensor networks. A new evolutionary algorithm named Multiobjective free search algorithm (MOFS) is designed for WSN optimization problem based on fitness functions and binary coding schemes. The proposed strategy is used to estimate the number of active nodes because individual nodes cannot have their working state information readily. Simulation shows that MOFS is effective to solve the typical combinatorial optimization problem, and the coverage control strategy can obtain high network coverage and reduce energy consumption effectively by the reasonable selecting parameters, while equilibrium of energy consumption is also considered.
Experimentation of a wireless network protocol over the air is of significant interest. However, it is more rarely performed than simulation because of the difficulties in coding and debugging as well as lack of scala...
详细信息
Experimentation of a wireless network protocol over the air is of significant interest. However, it is more rarely performed than simulation because of the difficulties in coding and debugging as well as lack of scalability and repeatability. In this article, the concept of a code-reuse platform making use of a simulation code directly for real experiments is revisited as an efficient and easy means of experimentation. Furthermore, an architecture and key components of an idealistic code-reuse platform are suggested, and then CommonCode, the most advanced code-reuse platform, is proposed. Through extensive simulations and experiments using Common-Code for the same codes, we demonstrate that CommonCode is valid and accurate in terms of protocol performance, and simultaneously fast and easy in terms of protocol development.
This study investigates the effect of multiple sources using STS across a Time-Hopping-PPM Modulation that is over an UWB Saleh-Valenzuela channel with each source using two transmit antennas. We model and analyze thi...
详细信息
This study investigates the effect of multiple sources using STS across a Time-Hopping-PPM Modulation that is over an UWB Saleh-Valenzuela channel with each source using two transmit antennas. We model and analyze this system, showing that the presence of such MAI results in a significant degradation in BER performance. Simulation results show that for strong signal strength of interfering MAI signals degradation in BER performance is observed for the cases where we have five and 10 distinct MAI sources present when using Walsh-Hadamard thirty two chip spreading sequences. Using simulation, we investigate the use of other sets of orthogonal spreading sequences with improved cross correlation properties and find that for some sequences a significant improvement is seen compared to Walsh-Hadamard sequences when they are similarly misaligned. We show that MAI degrades the BER performance of such systems and that selection of improved cross correlation spreading code sequence sets improves BER. Crown Copyright (C) 2012 Published by Elsevier Ltd. All rights reserved.
暂无评论