Neuronal oscillations in the theta frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi...
详细信息
Neuronal oscillations in the theta frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of this study was to examine the role of DHPG in the generation of oscillatory field activity at theta frequency in the medical septal diagonal band of Broca (MSDB) slice prepared from rat brain, and to determine the phase relationship between spikes and theta oscillations. The DHPG induced large amplitude field population spiking activity, which is correlated linearly with the field theta oscillations. The relationship between timing of spikes and the phase of theta oscillation was determined by an analysis of circular statistics. Further analysis with Rayleigh test revealed that the relationship of phase-locking between spikes and theta rhythm is of statistical significance. These data demonstrate that DHPG-sensitive neuronal networks within medial septum are able to generate theta oscillations which are modulated by large amplitude population spikes and phase-locking of spikes to the theta rhythm suggest the role of memory enhancement in the presence of mGluR1 activation.
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificia...
详细信息
ISBN:
(纸本)9781538684986;9781538684979
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificial intelligence, virtual reality, high-speed network and digital reading, the concept of "VR" has been applied to more and more industries. The introduction of VReading multi-sensory reading platform will bring new ideas to digital reading industry.
In this paper, two new methods of constructing ternary sequence pairs based on cyclotomy are presented. The ternary sequence pairs with three-level correlation are constructed based on cyclotomic numbers of order 4. A...
详细信息
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune ...
详细信息
ISBN:
(纸本)9781510803084
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database;it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which users are not interested in and shortens the running time. It adopts histogram statistic pattern to get the standardization description to item interval of the mining patterns, making the mining sequences include the item interval information which is valuable to user decision.
This paper discusses the simulated computation methods of remote sensing information model, and tries to put forward a more available solution. It presents our research works on the description and simulation methods ...
详细信息
With regard to the community mining in weighted signed networks and weighted social networks containing only positive links, the AGMA algorithm has some imperfections in the second clustering of vertices. So some impr...
详细信息
Under the influence of multipath effects and small scale fading, the robustness and reliability of the existing human detection methods based on radio frequency signals are easy to be impaired. In this paper, we propo...
详细信息
ISBN:
(纸本)9781509056972
Under the influence of multipath effects and small scale fading, the robustness and reliability of the existing human detection methods based on radio frequency signals are easy to be impaired. In this paper, we propose a novel design that using the multi-layer filtering of channel state information (CSI) to identify moving targets in dynamic environments and analyze the gait periodicity of human. We employ an efficient CSI subcarrier feature difference to the multi-layer filtering method leveraging principal component analysis (PCA) and discrete wavelet transform (DWT) to eliminate the noises. Furthermore, we propose a profile matching mechanism for human detection and a periodicity analysis mechanism for human gait taking advantage of the above design. We evaluated it with the commodity Wi-Fi infrastructures in different environments. Experimental results indicate that our approach performs identification of human with an average accuracy of 94%.
Synchronization decay of resting state EEG has shown that cognitive dysfunction in Alzheimer's disease (AD) was relevant to a loss of functional connectivity in intermediate frequency bands. The new S estimator (N...
详细信息
Synchronization decay of resting state EEG has shown that cognitive dysfunction in Alzheimer's disease (AD) was relevant to a loss of functional connectivity in intermediate frequency bands. The new S estimator (NSE) proposed recently by us quantifies synchronization between neuronal signals at multiple *** paper meant to explore the behavior of synchronization of multichannel EEG in AD and healthy normal controls at rest, and preliminarily make clear the clinical significance of the NSE in AD *** (EEG) were recorded from 10 AD patients and 12 age-matched healthy normal controls (NC). NSE values were computed both across the all frequency band and separately in the delta, theta, alpha, beta (including beta1, beta2 and beta3), and gamma bands. The Mini-Mental Status Examination (MMSE) was used to assess the symptom severity of AD patients and *** values in the beta1 and beta2 bands were significantly lower in AD patients than in NC. NSE values in the alpha and beta1 bands were positively correlated with the MMSE scores in all participants (AD and NC). In AD patients, NSE values in the alpha, beta1 and beta2 bands were also positively correlated with MMSE *** results suggest that NSE values are a useful correlate of EEG synchronization in AD patients.
The existing collaborative recommendation algorithms have lower robustness against shilling *** this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tuk...
详细信息
The existing collaborative recommendation algorithms have lower robustness against shilling *** this problem in mind,in this paper we propose a robust collaborative recommendation algorithm based on k-distance and Tukey ***,we propose a k-distancebased method to compute user suspicion degree(USD).The reliable neighbor model can be constructed through incorporating the user suspicion degree into user neighbor *** influence of attack profiles on the recommendation results is reduced through adjusting similarities among ***,Tukey M-estimator is introduced to construct robust matrix factorization model,which can realize the robust estimation of user feature matrix and item feature matrix and reduce the influence of attack profiles on item feature ***,a robust collaborative recommendation algorithm is devised by combining the reliable neighbor model and robust matrix factorization *** results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness.
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication alg...
详细信息
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication algorithm is proposed. First, the certificate authority may generate parameters of elliptic curve and its own public key and private key, and announce the parameters and its own public key, so that the registered users can inquire and use them. Second, the client registers at the certificate authority. The certificate authority will generate the public key of the client and the evidence of the client's private key which is signed by private key of the certificate authority. If the generated evidence of private key passes verification of the client, the client will generate its own private key. When a client sends a query request to an ONS server, the ONS server will authenticate identity of the client. If the client gets through the authentication, the ONS server will respond to the query request. The experimental result shows that this algorithm has high security and can avoid the ONS server providing query service for illegitimate client, so as to ensure the security of user privacy.
暂无评论