2,575 research outputs found

    Computing Thresholds of Linguistic Saliency

    Get PDF
    PACLIC 21 / Seoul National University, Seoul, Korea / November 1-3, 200

    Modeling of Location Estimation for Object Tracking in WSN

    Get PDF
    Location estimation for object tracking is one of the important topics in the research of wireless sensor networks (WSNs). Recently, many location estimation or position schemes in WSN have been proposed. In this paper, we will propose the procedure and modeling of location estimation for object tracking in WSN. The designed modeling is a simple scheme without complex processing. We will use Matlab to conduct the simulation and numerical analyses to find the optimal modeling variables. The analyses with different variables will include object moving model, sensing radius, model weighting value α, and power-level increasing ratio k of neighboring sensor nodes. For practical consideration, we will also carry out the shadowing model for analysis

    Qubit Mapping Toward Quantum Advantage

    Full text link
    Qubit Mapping is a pivotal stage in quantum compilation flow. Its goal is to convert logical circuits into physical circuits so that a quantum algorithm can be executed on real-world non-fully connected quantum devices. Qubit Mapping techniques nowadays still lack the key to quantum advantage, scalability. Several studies have proved that at least thousands of logical qubits are required to achieve quantum computational advantage. However, to our best knowledge, there is no previous research with the ability to solve the qubit mapping problem with the necessary number of qubits for quantum advantage in a reasonable time. In this work, we provide the first qubit mapping framework with the scalability to achieve quantum advantage while accomplishing a fairly good performance. The framework also boasts its flexibility for quantum circuits of different characteristics. Experimental results show that the proposed mapping method outperforms the state-of-the-art methods on quantum circuit benchmarks by improving over 5% of the cost complexity in one-tenth of the program running time. Moreover, we demonstrate the scalability of our method by accomplishing mapping of an 11,969-qubit Quantum Fourier Transform within five hours

    The effects of rear-wheel camber on the kinematics of upper extremity during wheelchair propulsion

    Get PDF
    BACKGROUND: The rear-wheel camber, defined as the inclination of the rear wheels, is usually used in wheelchair sports, but it is becoming increasingly employed in daily propulsion. Although the rear-wheel camber can increase stability, it alters physiological performance during propulsion. The purpose of the study is to investigate the effects of rear-wheel cambers on temporal-spatial parameters, joint angles, and propulsion patterns. METHODS: Twelve inexperienced subjects (22.3±1.6 yr) participated in the study. None had musculoskeletal disorders in their upper extremities. An eight-camera motion capture system was used to collect the three-dimensional trajectory data of markers attached to the wheelchair-user system during propulsion. All participants propelled the same wheelchair, which had an instrumented wheel with cambers of 0°, 9°, and 15°, respectively, at an average velocity of 1 m/s. RESULTS: The results show that the rear-wheel camber significantly affects the average acceleration, maximum end angle, trunk movement, elbow joint movement, wrist joint movement, and propulsion pattern. The effects are especially significant between 0° and 15°. For a 15° camber, the average acceleration and joint peak angles significantly increased (p < 0.01). A single loop pattern (SLOP) was adopted by most of the subjects. CONCLUSIONS: The rear-wheel camber affects propulsion patterns and joint range of motion. When choosing a wheelchair with camber adjustment, the increase of joint movements and the base of support should be taken into consideration

    The aging trajectories of brain functional hierarchy and its impact on cognition across the adult lifespan

    Get PDF
    IntroductionThe hierarchical network architecture of the human brain, pivotal to cognition and behavior, can be explored via gradient analysis using restingstate functional MRI data. Although it has been employed to understand brain development and disorders, the impact of aging on this hierarchical architecture and its link to cognitive decline remains elusive.MethodsThis study utilized resting-state functional MRI data from 350 healthy adults (aged 20–85) to investigate the functional hierarchical network using connectome gradient analysis with a cross-age sliding window approach. Gradient-related metrics were estimated and correlated with age to evaluate trajectory of gradient changes across lifespan.ResultsThe principal gradient (unimodal-to-transmodal) demonstrated a significant non-linear relationship with age, whereas the secondary gradient (visual-to-somatomotor) showed a simple linear decreasing pattern. Among the principal gradient, significant age-related changes were observed in the somatomotor, dorsal attention, limbic and default mode networks. The changes in the gradient scores of both the somatomotor and frontal–parietal networks were associated with greater working memory and visuospatial ability. Gender differences were found in global gradient metrics and gradient scores of somatomotor and default mode networks in the principal gradient, with no interaction with age effect.DiscussionOur study delves into the aging trajectories of functional connectome gradient and its cognitive impact across the adult lifespan, providing insights for future research into the biological underpinnings of brain function and pathological models of atypical aging processes

    Differentiation of Foot-and-Mouth Disease-Infected pigs from Vaccinated Pigs Using Antibody-Detecting Sandwich ELISA

    Get PDF
    The presence of serum antibodies for nonstructural proteins of the foot-and-mouth disease virus (FMDV) can differentiate FMDV-infected animals from vaccinated animals. In this study, a sandwich ELISA was developed for rapid detection of the foot-and-mouth disease (FMD) antibodies; it was based on an Escherichia coli-expressed, highly conserved region of the 3ABC nonstructural protein of the FMDV O/TW/99 strain and a monoclonal antibody derived from the expressed protein. The diagnostic sensitivity of the assay was 98.4%, and the diagnostic specificity was 100% for naïve and vaccinated pigs; the detection ability of the assay was comparable those of the PrioCHECK and UBI kits. There was 97.5, 93.4 and 66.6% agreement between the results obtained from our ELISA and those obtained from the PrioCHECK, UBI and CHEKIT kits, respectively. The kappa statistics were 0.95, 0.87 and 0.37, respectively. Moreover, antibodies for nonstructural proteins of the serotypes A, C, Asia 1, SAT 1, SAT 2 and SAT 3 were also detected in bovine sera. Furthermore, the absence of cross-reactions generated by different antibody titers against the swine vesicular disease virus and vesicular stomatitis virus (VSV) was also highlighted in this assay's specificit

    The human language effective connectome

    Get PDF
    To advance understanding of brain networks involved in language, the effective connectivity between 26 cortical regions implicated in language by a community analysis and 360 cortical regions was measured in 171 humans from the Human Connectome Project, and complemented with functional connectivity and diffusion tractography, all using the HCP multimodal parcellation atlas. A (semantic) network (Group 1) involving inferior cortical regions of the superior temporal sulcus cortex (STS) with the adjacent inferior temporal visual cortex TE1a and temporal pole TG, and the connected parietal PGi region, has effective connectivity with inferior temporal visual cortex (TE) regions; with parietal PFm which also has visual connectivity; with posterior cingulate cortex memory-related regions; with the frontal pole, orbitofrontal cortex, and medial prefrontal cortex; with the dorsolateral prefrontal cortex; and with 44 and 45 for output regions. It is proposed that this system can build in its temporal lobe (STS and TG) and parietal parts (PGi and PGs) semantic representations of objects incorporating especially their visual and reward properties. Another (semantic) network (Group 3) involving superior regions of the superior temporal sulcus cortex and more superior temporal lobe regions including STGa, auditory A5, TPOJ1, the STV and the Peri-Sylvian Language area (PSL) has effective connectivity with auditory areas (A1, A4, A5, Pbelt); with relatively early visual areas involved in motion, e.g., MT and MST, and faces/words (FFC); with somatosensory regions (frontal opercular FOP, insula and parietal PF); with other TPOJ regions; and with the inferior frontal gyrus regions (IFJa and IFSp). It is proposed that this system builds semantic representations specialising in auditory and related facial motion information useful in theory of mind and somatosensory / body image information, with outputs directed not only to regions 44 and 45, but also to premotor 55b and midcingulate premotor cortex. Both semantic networks (Groups 1 and 3) have access to the hippocampal episodic memory system via parahippocampal TF. A third largely frontal network (Group 2) (44, 45, 47l; 55b; the Superior Frontal Language region SFL; and including temporal pole TGv) receives effective connectivity from the two semantic systems, and is implicated in syntax and speech output

    Square Key Matrix Management Scheme in Wireless Sensor Networks

    Get PDF
    In this paper we propose a symmetric cryptographic approach named Square Key Matrix Management Scheme (SKMaS) in which a sensor node named Key Distribution Server (KDS) is responsible for the security of key management. When the system starts up, the KDS sends its individual key and two sets of keys to sensor nodes. With the IDs, any two valid sensor nodes, e.g. i and j, can individually identify the corresponding communication keys (CKs) to derive a dynamic shared key (DSK) for encrypting/decrypting messages transmitted between them. When i leaves the underlying network, the CKs and the individually keys currently utilized by i can be reused by a newly joining sensor, e.g. h. However, when h joins the network, if no such previously-used IDs are available, h will be given a new ID, CKs and the individually key by the KDS. The KDS encrypts the CKs, with which an existing node q can communicate with h, with individual key so that only q rather than h can correctly decrypt the CKs. The lemmas and security analyses provided in this paper prove that the proposed system can protect at least three common attacks

    Running Spectral Index in Noncommutative Inflation and WMAP Three Year Results

    Full text link
    A model independent analysis shows that the running of the spectral index of the three year WMAP results can be nicely realized in noncommutative inflation. We also re-examine some concrete noncommutative inflation models. We find that a large tensor-scalar ratio is required, corresponding to a low number of e-folds before the end of inflation in some simple models.Comment: 11 pages, 2 figures, harvmac, version for publication in NP
    • …
    corecore