2,044 research outputs found

    A Quest for Meaning in Spontaneous Brain Activity - From fMRI to Electrophysiology to Complexity Science

    Get PDF
    The brain is not a silent, complex input/output system waiting to be driven by external stimuli; instead, it is a closed, self-referential system operating on its own with sensory information modulating rather than determining its activity. Ongoing spontaneous brain activity costs the majority of the brain\u27s energy budget, maintains the brain\u27s functional architecture, and makes predictions about the environment and the future. I have completed three separate studies on the functional significance and the organization of spontaneous brain activity. The first study showed that strokes disrupt large-scale network coherence in the spontaneous functional magnetic resonance imaging: fMRI) signals, and that the degree of such disruption predicts the behavioral impairment of the patient. This study established the functional significance of coherent patterns in the spontaneous fMRI signals. In the second study, by combining fMRI and electrophysiology in neurosurgical patients, I identified the neurophysiological signal underlying the coherent patterns in the spontaneous fMRI signal, the slow cortical potential: SCP). The SCP is a novel neural correlate of the fMRI signal, most likely underlying both spontaneous fMRI signal fluctuations and task-evoked fMRI responses. Some theoretical considerations have led me to propose a hypothesis on the involvement of the neural activity indexed by the SCP in the emergence of consciousness. In the last study I investigated the temporal organization across a wide range of frequencies in the spontaneous electrical field potentials recorded from the human brain. This study demonstrated that the arrhythmic, scale-free brain activity often discarded in human and animal electrophysiology studies in fact contains rich, complex structures, and further provided evidence supporting the functional significance of such activity

    Electronic Dance Music in Narrative Film

    Get PDF
    As a growing number of filmmakers are moving away from the traditional model of orchestral underscoring in favor of a more contemporary approach to film sound, electronic dance music (EDM) is playing an increasingly important role in current soundtrack practice. With a focus on two specific examples, Tom Tykwer’s Run Lola Run (1998) and Darren Aronofsky’s Pi (1998), this essay discusses the possibilities that such a distinctive aesthetics brings to filmmaking, especially with regard to audiovisual rhythm and sonic integration

    Advances in Electrocardiograms

    Get PDF
    Electrocardiograms have become one of the most important, and widely used medical tools for diagnosing diseases such as cardiac arrhythmias, conduction disorders, electrolyte imbalances, hypertension, coronary artery disease and myocardial infarction. This book reviews recent advancements in electrocardiography. The four sections of this volume, Cardiac Arrhythmias, Myocardial Infarction, Autonomic Dysregulation and Cardiotoxicology, provide comprehensive reviews of advancements in the clinical applications of electrocardiograms. This book is replete with diagrams, recordings, flow diagrams and algorithms which demonstrate the possible future direction for applying electrocardiography to evaluating the development and progression of cardiac diseases. The chapters in this book describe a number of unique features of electrocardiograms in adult and pediatric patient populations with predilections for cardiac arrhythmias and other electrical abnormalities associated with hypertension, coronary artery disease, myocardial infarction, sleep apnea syndromes, pericarditides, cardiomyopathies and cardiotoxicities, as well as innovative interpretations of electrocardiograms during exercise testing and electrical pacing

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies

    Deep Learning -Powered Computational Intelligence for Cyber-Attacks Detection and Mitigation in 5G-Enabled Electric Vehicle Charging Station

    Get PDF
    An electric vehicle charging station (EVCS) infrastructure is the backbone of transportation electrification. However, the EVCS has various cyber-attack vulnerabilities in software, hardware, supply chain, and incumbent legacy technologies such as network, communication, and control. Therefore, proactively monitoring, detecting, and defending against these attacks is very important. The state-of-the-art approaches are not agile and intelligent enough to detect, mitigate, and defend against various cyber-physical attacks in the EVCS system. To overcome these limitations, this dissertation primarily designs, develops, implements, and tests the data-driven deep learning-powered computational intelligence to detect and mitigate cyber-physical attacks at the network and physical layers of 5G-enabled EVCS infrastructure. Also, the 5G slicing application to ensure the security and service level agreement (SLA) in the EVCS ecosystem has been studied. Various cyber-attacks such as distributed denial of services (DDoS), False data injection (FDI), advanced persistent threats (APT), and ransomware attacks on the network in a standalone 5G-enabled EVCS environment have been considered. Mathematical models for the mentioned cyber-attacks have been developed. The impact of cyber-attacks on the EVCS operation has been analyzed. Various deep learning-powered intrusion detection systems have been proposed to detect attacks using local electrical and network fingerprints. Furthermore, a novel detection framework has been designed and developed to deal with ransomware threats in high-speed, high-dimensional, multimodal data and assets from eccentric stakeholders of the connected automated vehicle (CAV) ecosystem. To mitigate the adverse effects of cyber-attacks on EVCS controllers, novel data-driven digital clones based on Twin Delayed Deep Deterministic Policy Gradient (TD3) Deep Reinforcement Learning (DRL) has been developed. Also, various Bruteforce, Controller clones-based methods have been devised and tested to aid the defense and mitigation of the impact of the attacks of the EVCS operation. The performance of the proposed mitigation method has been compared with that of a benchmark Deep Deterministic Policy Gradient (DDPG)-based digital clones approach. Simulation results obtained from the Python, Matlab/Simulink, and NetSim software demonstrate that the cyber-attacks are disruptive and detrimental to the operation of EVCS. The proposed detection and mitigation methods are effective and perform better than the conventional and benchmark techniques for the 5G-enabled EVCS

    Treatment-Based Classi?cation in Residential Wireless Access Points

    Get PDF
    IEEE 802.11 wireless access points (APs) act as the central communication hub inside homes, connecting all networked devices to the Internet. Home users run a variety of network applications with diverse Quality-of-Service requirements (QoS) through their APs. However, wireless APs are often the bottleneck in residential networks as broadband connection speeds keep increasing. Because of the lack of QoS support and complicated configuration procedures in most off-the-shelf APs, users can experience QoS degradation with their wireless networks, especially when multiple applications are running concurrently. This dissertation presents CATNAP, Classification And Treatment iN an AP , to provide better QoS support for various applications over residential wireless networks, especially timely delivery for real-time applications and high throughput for download-based applications. CATNAP consists of three major components: supporting functions, classifiers, and treatment modules. The supporting functions collect necessary flow level statistics and feed it into the CATNAP classifiers. Then, the CATNAP classifiers categorize flows along three-dimensions: response-based/non-response-based, interactive/non-interactive, and greedy/non-greedy. Each CATNAP traffic category can be directly mapped to one of the following treatments: push/delay, limited advertised window size/drop, and reserve bandwidth. Based on the classification results, the CATNAP treatment module automatically applies the treatment policy to provide better QoS support. CATNAP is implemented with the NS network simulator, and evaluated against DropTail and Strict Priority Queue (SPQ) under various network and traffic conditions. In most simulation cases, CATNAP provides better QoS supports than DropTail: it lowers queuing delay for multimedia applications such as VoIP, games and video, fairly treats FTP flows with various round trip times, and is even functional when misbehaving UDP traffic is present. Unlike current QoS methods, CATNAP is a plug-and-play solution, automatically classifying and treating flows without any user configuration, or any modification to end hosts or applications
    • …
    corecore