It has been suggested that humans discriminate different frequency sounds with greater selectivity than other mammals. However, mechanisms that could underlie higher frequency selectivity in humans are unclear. Recent...
It has been suggested that humans discriminate different frequency sounds with greater selectivity than other mammals. However, mechanisms that could underlie higher frequency selectivity in humans are unclear. Recent studies show that the tectorial membrane (TM) supports longitudinally propagating waves, and the spread of excitation of these TM waves has been implicated in controlling the tuning properties in a mutant mouse model of hearing. Here we compare TM morphology and waves in humans and mice and show that despite some differences in morphology, the spread of excitation of TM waves is similar in spatial extent. However, the cochlear maps of humans and mice differ significantly, with similar cochlear distances mapping to a narrower range of best frequencies in humans than in mice. By coupling different frequency ranges, TM waves could contribute to differences in frequency tuning in mammals, with the smaller human range of frequencies corresponding to sharper frequency tuning.
High-performance materials rely on small reorganization energies to facilitate both charge separation and charge transport. Here, we performed DFT calculations to predict small reorganization energies of rectangular s...
详细信息
High-performance materials rely on small reorganization energies to facilitate both charge separation and charge transport. Here, we performed DFT calculations to predict small reorganization energies of rectangular s...
详细信息
A fully homomorphic encryption system hides data from unauthorized parties, while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate...
详细信息
All-optical ferroelectric domain inversion is realized by using tightly focused infrared femtosecond pulses. Quasi-phase matching structures are fabricated for efficient second harmonic generations in lithium niobate ...
详细信息
Errors in data transmission cannot be known directly when the data transmission process is fulfilled, but error is often prevalent in data transmission. Faulty or missing frames or bits are standard errors and to cont...
Errors in data transmission cannot be known directly when the data transmission process is fulfilled, but error is often prevalent in data transmission. Faulty or missing frames or bits are standard errors and to control or check errors requires a unique method, in this case, the Stop-and-wait method, Go-Back-N and Selective Reject are methods that can be used to do so, comparison of time of error checking process with Stop-and-wait method, Go-Back-N and Selective Reject is very important to get the right method to check the ignorance, from testing performed that the method of Go-Back-N is much faster than the other methods.
We present an end-to-end image-processing pipeline that is accelerated using coupled spin-torque oscillator (STO) arrays for its key computational kernels. Coupled oscillator arrays are used throughout the pipeline, i...
详细信息
We present an end-to-end image-processing pipeline that is accelerated using coupled spin-torque oscillator (STO) arrays for its key computational kernels. Coupled oscillator arrays are used throughout the pipeline, including the computation of spectral and spatial transforms in the saliency stages and convolution in the CNN-based classifiers in the back end. We present results for two types of oscillator models, a generic, parameterized, model that captures variations in coupling asymmetry, locking range, and noise, and a hardware calibrated spice model of a coupled STO array with data curve fitted to a closed-form C++ model. The pipeline was run over three benchmark datasets, the Neovision2 Tower and Helicopter datasets [1] and the DARPA Vivid dataset [2]. We show the sensitivity of the output to parameter variations in the generic model and show equivalent performance for the STO model.
This paper aims to facilitate the owner to control water pump machine from the vacuum, and the condition of the water is it full or not in house or apartment. The current control system still has many limitations in c...
This paper aims to facilitate the owner to control water pump machine from the vacuum, and the condition of the water is it full or not in house or apartment. The current control system still has many limitations in controlling the water pump machine at home or apartment. The water machine control system was designed with device that has a smart surveillance system that can be accessed with Android smartphone and all information from or to machine control system will command by using SMS, this device create a development of Arduino UNO microcontroller technology that allows the reading of the GSM Module and connected with SMS Gateway. Experiment results facilitate real-time water control and much easy for the owner to control water tank.
The use of an individual's neural response to stimuli (the event-related potential or ERP) has potential as a biometric because it is highly resistant to fraud relative to other conventional authentication systems...
详细信息
The use of an individual's neural response to stimuli (the event-related potential or ERP) has potential as a biometric because it is highly resistant to fraud relative to other conventional authentication systems. P300 is an ERP in human electroencephalography (EEG) that occurs in response to an oddball stimulus when an individual is actively engaged in a target detection task. Because P300 is consistently detectable from almost every subject, it is considered a potential signal for biometric applications. This paper presents a feasibility study of using topological plots of P300 as a biometric in subject authentication. The variation in latency and location of P300 response of 24 participants performing the P300Speller task were studied. Data sets from four participants were used for algorithm training; data from the other 20 participants were used as imposters for algorithm validation. The result showed that the algorithm was able to correctly identify three out of these four participants. Validation test also proved that the algorithm was able to reject 95% of the imposters for those three authenticated participants.
暂无评论