6,640 research outputs found

    Dynamics of Neural Networks with Continuous Attractors

    Full text link
    We investigate the dynamics of continuous attractor neural networks (CANNs). Due to the translational invariance of their neuronal interactions, CANNs can hold a continuous family of stationary states. We systematically explore how their neutral stability facilitates the tracking performance of a CANN, which is believed to have wide applications in brain functions. We develop a perturbative approach that utilizes the dominant movement of the network stationary states in the state space. We quantify the distortions of the bump shape during tracking, and study their effects on the tracking performance. Results are obtained on the maximum speed for a moving stimulus to be trackable, and the reaction time to catch up an abrupt change in stimulus.Comment: 6 pages, 7 figures with 4 caption

    Smart TV face monitoring for children privacy

    Get PDF
    © 2018 Taiwan Academic Network Management Committee. All Rights Reserved. Many of the modern Television (TV) sets and digital TV set-top boxes are endowed with Smart TV capabilities. Those include computing and connectivity to online services such as video on demand, online games and even sports and healthcare. A lot of Smart TV devices also have built-in cameras, microphones and other sensors that provide for environmental monitoring and consequent context dependent feedback. Such Smart TV capabilities, however, can lead to privacy violations through unwanted tracking and user profiling by broadcasters and other service providers. There is a concern when underage users such as children who may not fully understand the concept of privacy are involved in using the Smart TV services. To address this issue, face recognition experiments were conducted with the IBM\u27s Watson and the Microsoft\u27s Face Application Programming Interface to reveal the potential of integrating facial recognition in future privacy aware Smart TV services

    Implementation of two-party protocols in the noisy-storage model

    Get PDF
    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down conversion sources. In addition, we analyze a modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030 considering practical aspects, v2: published version, title changed in accordance with PRA guideline

    Instability and `Sausage-String' Appearance in Blood Vessels during High Blood Pressure

    Get PDF
    A new Rayleigh-type instability is proposed to explain the `sausage-string' pattern of alternating constrictions and dilatations formed in blood vessels under influence of a vasoconstricting agent. Our theory involves the nonlinear elasticity characteristics of the vessel wall, and provides predictions for the conditions under which the cylindrical form of a blood vessel becomes unstable.Comment: 4 pages, 4 figures submitted to Physical Review Letter

    Exploring Consumer and Patient Knowledge, Behavior, and Attitude Toward Medicinal and Lifestyle Products Purchased From the Internet: A Web-Based Survey.

    Get PDF
    BACKGROUND: In recent years, lifestyle products have emerged to help improve people's physical and mental performance. The Internet plays a major role in the spread of these products. However, the literature has reported issues regarding the authenticity of medicines purchased from the Internet and the impact of counterfeit medicines on public health. Little or no data are available on the authenticity of lifestyle products and actual toxicity associated with their use and misuse. OBJECTIVE: Our aim was to investigate consumer and patient attitudes toward the purchase of lifestyle products from the Internet, their knowledge of product authenticity and toxicity, and their experiences with counterfeit lifestyle products. METHODS: A Web-based study was performed between May 2014 and May 2015. Uniform collection of data was performed through an anonymous online questionnaire. Participants were invited worldwide via email, social media, or personal communication to complete the online questionnaire. A total of 320 participants completed the questionnaire. RESULTS: The results of the questionnaire showed that 208 (65.0%) participants purchased lifestyle products from the Internet mainly due to convenience and reduced cost. More than half (55.6%, 178/320) of participants purchased cosmetic products, whereas only a minority purchased medicinal products. Yet, 62.8% (201/320) of participants were aware of the presence of counterfeit lifestyle products from the Internet, and 11.9% (38/320) experienced counterfeit products. In only 0.9% (3/320) of those cases were counterfeit lifestyle products reported to authorities. Moreover, 7.2% (23/320) of the participants experienced adverse effects due to counterfeit lifestyle products. CONCLUSIONS: In summary, patients experienced counterfeit lifestyle products that resulted in adverse effects on their health. Although certain adverse effects were reported in this study, counterfeit products were underreported to authorities. Further public awareness campaigns and patient education are needed

    Capacitive Spring Softening in Single-Walled Carbon Nanotube Nanoelectromechanical Resonators

    Full text link
    We report the capacitive spring softening effect observed in single-walled carbon nanotube (SWNT) nanoelectromechanical (NEM) resonators. The nanotube resonators adopt dual-gate configuration with both bottom-gate and side-gate capable of tuning the resonance frequency through capacitive coupling. Interestingly, downward resonance frequency shifting is observed with increasing side-gate voltage, which can be attributed to the capacitive softening of spring constant. Furthermore, in-plane vibrational modes exhibit much stronger spring softening effect than out-of-plan modes. Our dual-gate design should enable the differentiation between these two types of vibrational modes, and open up new possibility for nonlinear operation of nanotube resonators.Comment: 12 pages/ 3 figure

    Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

    Full text link
    Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we experimentally demonstrate a technically feasible "intercept-and-resend" attack that exploits such a security loophole in a commercial "plug & play" QKD system. The resulting quantum bit error rate is 19.7%, which is below the proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314, 2007) proposed by our group.Comment: 16 pages, 6 figure

    Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    Full text link
    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.Comment: 5 pages, 3 figures. Substantially revised versio
    corecore