We report on a visual programming environment designed to make and execute programs using already existing procedures written in some third generation language. The utilization of a client/server model combined with t...
详细信息
The authors present a model of coupled oscillating neural networks which can simultaneously perform segmentation and binding. The two networks have memory patterns which are independent of one another, yet the input c...
详细信息
The authors present a model of coupled oscillating neural networks which can simultaneously perform segmentation and binding. The two networks have memory patterns which are independent of one another, yet the input contains them in pairs as, for instance, objects and attributes. When presented with a mixture of such pairs in a constant input, the activities of the corresponding patterns oscillate in a staggered fashion, exhibiting segmentation. Moreover, the phases of the pairs lock with each other, demonstrating binding. The underlying networks are feedback systems which are composed of excitatory neurons grouped into cell-assemblies representing the memories and inhibitory interneurons to which they are connected. The oscillatory nature comes about by dynamic thresholds which implement a fatigue effect for the excitatory neurons.< >
作者:
David HornMarius UsherSchool of Physics and Astronomy
Raymond and Beverly Sackler Faculty of Exact Sciences Tel-Aviv University Tel Aviv Israel Caltech
Pasadena CA and Dept. of Applied Mathematics and Computer Science Weizmann Institute of Science Rehovot Israel
We investigate a model in which excitatory neurons have dynamical thresholds which display both fatigue and potentiation. The fatigue property leads to oscillatory behavior. It is responsible for the ability of the mo...
ISBN:
(纸本)9781558602229
We investigate a model in which excitatory neurons have dynamical thresholds which display both fatigue and potentiation. The fatigue property leads to oscillatory behavior. It is responsible for the ability of the model to perform segmentation, i.e., decompose a mixed input into staggered oscillations of the activities of the cell-assemblies (memories) affected by it. Potentiation is responsible for sustaining these staggered oscillations after the input is turned off, i.e. the system serves as a model for short term memory. It has a limited STM capacity, reminiscent of the magical number 7±2.
We describe an extended selection of switching target faults in the CONT algorithm. The main difficulty in test generation is the conflict that arises in the process of determining the signal values due to reconvergen...
详细信息
We describe an extended selection of switching target faults in the CONT algorithm. The main difficulty in test generation is the conflict that arises in the process of determining the signal values due to reconvergent fanouts. Conventional approaches for test generation change a signal value, which causes conflicts to another possible choice for backtracking. In the CONT algorithm, a strategy of switching target fault was proposed as a new backtracking mechanism. In this method, the target fault is switched to a new target fault instead of making an alternative assignment on the primary input value when a conflict occurs. A disadvantage of the CONT algorithm is that unjustified lines exist in the process of test generation. These unjustified lines make the procedure of switching targets complicated and restrict the possible choice in selecting the new target fault. In the new version of CONT, called CONT-2, we have removed the unjustified lines in the process of test generation and have extended to two target-fault types for switching targets. Implementing CONT-2 by a Fortran program, ISCAS85 benchmark circuits are examined. Experiments on a combined system with fault simulation followed by CONT-2 are also presented.
The cautious scheduler, recently proposed for the concurrency control of database systems, never resorts to abortions or rollbacks for the purpose of concurrency control. The comprehensive performance evaluation study...
详细信息
C-calculus is a method for combining less descriptive information for larger sets to obtain detailed descriptions about smaller sets. This is achieved by iteratively taking products of information in the form of C-set...
A rational, systematic means of allocating air pollutant monitoring stations in an urban area is proposed in order to estimate the overall spatial averaged concentration. An urban area is divided into a certain number...
详细信息
A rational, systematic means of allocating air pollutant monitoring stations in an urban area is proposed in order to estimate the overall spatial averaged concentration. An urban area is divided into a certain number of subareas having nearly equal fluctuation of the pollution level. This division is made by solving an optimization problem of the spatial sample stratification in the Monte-Carlo random sampling method. In each subarea a representative point is selected in some defined sense as the location of a monitoring station. The procedure is applied to the design of the nitrogen oxides monitoring network in Kyoto airshed. The comparison between the proposed configuration and the actual one is presented.
Surface magnetization reversal of Co-rich amorphous glass covered microwires in the presence of torsion stress has been studied by magneto-optical Kerr effect. The dependence of the angle of the helical anisotropy on ...
详细信息
This proceedings volume convenes selected, peer-reviewed papers presented at the 3rd International Conference on Mathematics and its Applications in science and Engineering – ICMASE 2022, which was held on July 4–7,...
详细信息
ISBN:
(数字)9783031217005
ISBN:
(纸本)9783031216992;9783031217029
This proceedings volume convenes selected, peer-reviewed papers presented at the 3rd International Conference on Mathematics and its Applications in science and Engineering – ICMASE 2022, which was held on July 4–7, 2022 by the Technical University of Civil Engineering of Bucharest, Romania.;Works in this volume cover new developments in applications of mathematics in science and engineering, with emphasis on mathematical and computational modeling of real-world problems. Topics range from the use of differential equations to model mechanical structures to the employ of number theory in the development of information security and cryptography. Educational issues specific to the acquisition of mathematical competencies by engineering and science students at all university levels are also touched on.;Researchers and university students are the natural audiences for this book, which can be equally appealing to practitioners seeking up-to-date techniques in mathematical applications to different contexts and disciplines.
暂无评论