1,268 research outputs found

    Neurophysiology

    Get PDF
    Contains reports on four research projects.National Institutes of Health (Grant B-1865-(C3), Grant MH-04737-02)United States Air Force, Aeronautical Systems Division (Contract AF33(616)-7783)Teagle Foundation, IncorporatedBell Telephone Laboratories, Incorporate

    Properties of continuous Fourier extension of the discrete cosine transform and its multidimensional generalization

    Full text link
    A versatile method is described for the practical computation of the discrete Fourier transforms (DFT) of a continuous function g(t)g(t) given by its values gjg_{j} at the points of a uniform grid FNF_{N} generated by conjugacy classes of elements of finite adjoint order NN in the fundamental region FF of compact semisimple Lie groups. The present implementation of the method is for the groups SU(2), when FF is reduced to a one-dimensional segment, and for SU(2)×...×SU(2)SU(2)\times ... \times SU(2) in multidimensional cases. This simplest case turns out to result in a transform known as discrete cosine transform (DCT), which is often considered to be simply a specific type of the standard DFT. Here we show that the DCT is very different from the standard DFT when the properties of the continuous extensions of these two discrete transforms from the discrete grid points tj;j=0,1,...Nt_j; j=0,1, ... N to all points t∈Ft \in F are considered. (A) Unlike the continuous extension of the DFT, the continuous extension of (the inverse) DCT, called CEDCT, closely approximates g(t)g(t) between the grid points tjt_j. (B) For increasing NN, the derivative of CEDCT converges to the derivative of g(t)g(t). And (C), for CEDCT the principle of locality is valid. Finally, we use the continuous extension of 2-dimensional DCT to illustrate its potential for interpolation, as well as for the data compression of 2D images.Comment: submitted to JMP on April 3, 2003; still waiting for the referee's Repor

    The complex process of scaling the integration of technology enhanced learning in mainstream classrooms

    Get PDF
    The early optimism for how technology might transform teaching and learning practices in mainstream school classrooms has long faded in many countries around the world. Whilst early research findings suggested that this was due to obvious barriers such as access to the technology itself, more recent attempts to scale student-access have illuminated other factors and provided a more sound theoretical foundation for us to understanding the processes and products of scaling educational technology innovations. This keynote will use findings from key projects and initiatives to highlight what is being learned – and how this might inform future endeavours to realise a more 21st century curriculum

    Measuring readiness-to-hand through differences in attention to the task vs. attention to the tool

    Get PDF
    New interaction techniques, like multi-touch, tangible inter-action, and mid-air gestures often promise to be more intuitive and natural; however, there is little work on how to measure these constructs. One way is to leverage the phenomenon of tool embodiment—when a tool becomes an extension of one’s body, attention shifts to the task at hand, rather than the tool itself. In this work, we constructed a framework to measure tool embodiment by incorporating philosophical and psychological concepts. We applied this framework to design and conduct a study that uses attention to measure readiness-to-hand with both a physical tool and a virtual tool. We introduce a novel task where participants use a tool to rotate an object, while simultaneously responding to visual stimuli both near their hand and near the task. Our results showed that participants paid more attention to the task than to both kinds of tool. We also discuss how this evaluation framework can be used to investigate whether novel interaction techniques allow for this kind of tool embodiment.Postprin

    Pseudonymization risk analysis in distributed systems

    Get PDF
    In an era of big data, online services are becoming increasingly data-centric; they collect, process, analyze and anonymously disclose growing amounts of personal data in the form of pseudonymized data sets. It is crucial that such systems are engineered to both protect individual user (data subject) privacy and give back control of personal data to the user. In terms of pseudonymized data this means that unwanted individuals should not be able to deduce sensitive information about the user. However, the plethora of pseudonymization algorithms and tuneable parameters that currently exist make it difficult for a non expert developer (data controller) to understand and realise strong privacy guarantees. In this paper we propose a principled Model-Driven Engineering (MDE) framework to model data services in terms of their pseudonymization strategies and identify the risks to breaches of user privacy. A developer can explore alternative pseudonymization strategies to determine the effectiveness of their pseudonymization strategy in terms of quantifiable metrics: i) violations of privacy requirements for every user in the current data set; ii) the trade-off between conforming to these requirements and the usefulness of the data for its intended purposes. We demonstrate through an experimental evaluation that the information provided by the framework is useful, particularly in complex situations where privacy requirements are different for different users, and can inform decisions to optimize a chosen strategy in comparison to applying an off-the-shelf algorithm

    Networking - A Statistical Physics Perspective

    Get PDF
    Efficient networking has a substantial economic and societal impact in a broad range of areas including transportation systems, wired and wireless communications and a range of Internet applications. As transportation and communication networks become increasingly more complex, the ever increasing demand for congestion control, higher traffic capacity, quality of service, robustness and reduced energy consumption require new tools and methods to meet these conflicting requirements. The new methodology should serve for gaining better understanding of the properties of networking systems at the macroscopic level, as well as for the development of new principled optimization and management algorithms at the microscopic level. Methods of statistical physics seem best placed to provide new approaches as they have been developed specifically to deal with non-linear large scale systems. This paper aims at presenting an overview of tools and methods that have been developed within the statistical physics community and that can be readily applied to address the emerging problems in networking. These include diffusion processes, methods from disordered systems and polymer physics, probabilistic inference, which have direct relevance to network routing, file and frequency distribution, the exploration of network structures and vulnerability, and various other practical networking applications.Comment: (Review article) 71 pages, 14 figure

    Digital Quantum Simulation of the Statistical Mechanics of a Frustrated Magnet

    Full text link
    Many interesting problems in physics, chemistry, and computer science are equivalent to problems of interacting spins. However, most of these problems require computational resources that are out of reach by classical computers. A promising solution to overcome this challenge is to exploit the laws of quantum mechanics to perform simulation. Several "analog" quantum simulations of interacting spin systems have been realized experimentally. However, relying on adiabatic techniques, these simulations are limited to preparing ground states only. Here we report the first experimental results on a "digital" quantum simulation on thermal states; we simulated a three-spin frustrated magnet, a building block of spin ice, with an NMR quantum information processor, and we are able to explore the phase diagram of the system at any simulated temperature and external field. These results serve as a guide for identifying the challenges for performing quantum simulation on physical systems at finite temperatures, and pave the way towards large scale experimental simulations of open quantum systems in condensed matter physics and chemistry.Comment: 7 pages for the main text plus 6 pages for the supplementary material
    • …
    corecore