1,380 research outputs found

    Chimeras in Leaky Integrate-and-Fire Neural Networks: Effects of Reflecting Connectivities

    Full text link
    The effects of nonlocal and reflecting connectivity are investigated in coupled Leaky Integrate-and-Fire (LIF) elements, which assimilate the exchange of electrical signals between neurons. Earlier investigations have demonstrated that non-local and hierarchical network connectivity often induces complex synchronization patterns and chimera states in systems of coupled oscillators. In the LIF system we show that if the elements are non-locally linked with positive diffusive coupling in a ring architecture the system splits into a number of alternating domains. Half of these domains contain elements, whose potential stays near the threshold, while they are interrupted by active domains, where the elements perform regular LIF oscillations. The active domains move around the ring with constant velocity, depending on the system parameters. The idea of introducing reflecting non-local coupling in LIF networks originates from signal exchange between neurons residing in the two hemispheres in the brain. We show evidence that this connectivity induces novel complex spatial and temporal structures: for relatively extensive ranges of parameter values the system splits in two coexisting domains, one domain where all elements stay near-threshold and one where incoherent states develop with multileveled mean phase velocity distribution.Comment: 12 pages, 12 figure

    Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols

    Full text link
    Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum's work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make - especially if the mail system cannot be trusted. When conspiring with the recipient of the cast ballots, privacy is broken. It is clear to the public that when it comes to privacy, computers and "secure" communication over the Internet cannot fully be trusted. This emphasizes the importance of using: (1) Unconditional security for secure network communication. (2) Reduce reliance on untrusted computers. In this paper we explore how to remove the mail system trust assumption in code voting. We use PSMT protocols (SCN 2012) where with the help of visual aids, humans can carry out mod  10\mod 10 addition correctly with a 99\% degree of accuracy. We introduce an unconditionally secure MIX based on the combinatorics of set systems. Given that end users of our proposed voting scheme construction are humans we \emph{cannot use} classical Secure Multi Party Computation protocols. Our solutions are for both single and multi-seat elections achieving: \begin{enumerate}[i)] \item An anonymous and perfectly secure communication network secure against a tt-bounded passive adversary used to deliver voting, \item The end step of the protocol can be handled by a human to evade the threat of malware. \end{enumerate} We do not focus on active adversaries

    Multi-chimera States in the Leaky Integrate-and-Fire Model

    Get PDF
    We study the dynamics of identical leaky integrate-and-fire neurons with symmetric non-local coupling. Upon varying control parameters (coupling strength, coupling range, refractory period) we investigate the system's behaviour and highlight the formation of chimera states. We show that the introduction of a refractory period enlarges the parameter region where chimera states appear and affects the chimera multiplicity

    Integrated topology optimisation of multi-energy networks

    Get PDF
    Multi-carrier hybrid energy distribution net- works provide flexibility in case of network malfunctions, energy shortages and price fluctuations through energy conversion and storage. Therefore hybrid networks can cope with large-scale integration of distributed and intermittent renewable energy sources. In this article an optimisation approach is proposed which determines the optimal topology of hybrid networks

    Quantum protocols for anonymous voting and surveying

    Get PDF
    We describe quantum protocols for voting and surveying. A key feature of our schemes is the use of entangled states to ensure that the votes are anonymous and to allow the votes to be tallied. The entanglement is distributed over separated sites; the physical inaccessibility of any one site is sufficient to guarantee the anonymity of the votes. The security of these protocols with respect to various kinds of attack is discussed. We also discuss classical schemes and show that our quantum voting protocol represents a N-fold reduction in computational complexity, where N is the number of voters.Comment: 8 pages. V2 includes the modifications made for the published versio

    Regional facial asymmetries in unilateral orofacial clefts

    Get PDF
    SummaryObjectives: Assess facial asymmetry in subjects with unilateral cleft lip (UCL), unilateral cleft lip and alveolus (UCLA), and unilateral cleft lip, alveolus, and palate (UCLP), and to evaluate which area of the face is most asymmetrical. Methods: Standardized three-dimensional facial images of 58 patients (9 UCL, 21 UCLA, and 28 UCLP; age range: 8.6-12.3 years) and 121 controls (age range 9-12 years) were mirrored and distance maps were created. Absolute mean asymmetry values were calculated for the whole face, cheek, nose, lips, and chin. One-way analysis of variance, Kruskal-Wallis, and t-test were used to assess the differences between clefts and controls for the whole face and separate areas. Results: Clefts and controls differ significantly for the whole face as well as in all areas. Asymmetry is distributed differently over the face for all groups. In UCLA, the nose was significantly more asymmetric compared with chin and cheek (P = 0.038 and 0.024, respectively). For UCL, significant differences in asymmetry between nose and chin and chin and cheek were present (P = 0.038 and 0.046, respectively). In the control group, the chin was the most asymmetric area compared to lip and nose (P = 0.002 and P = 0.001, respectively) followed by the nose (P = 0.004). In UCLP, the nose, followed by the lips, was the most asymmetric area compared to chin, cheek (P < 0.001 and P = 0.016, respectively). Limitations: Despite division into regional areas, the method may still exclude or underrate smaller local areas in the face, which are better visualized in a facial colour coded distance map than quantified by distance numbers. The UCL subsample is small. Conclusion: Each type of cleft has its own distinct asymmetry pattern. Children with unilateral clefts show more facial asymmetry than children without cleft

    Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption

    Get PDF
    Public Blockchains on their own are, by definition, incapable of keeping data private and disclosing it at a later time. Control over the eventual disclosure of private data must be maintained outside a Blockchain by withholding and later publishing encryption keys, for example. We propose the Atomic Information Disclosure (AID) pattern based on threshold encryption that allows a set of key holders to govern the release of data without having access to it. We motivate this pattern with problems that require independently reproduced solutions. By keeping submissions private until a deadline expires, participants are unable to plagiarise and must therefore generate their own solutions which can then be aggregated and analysed to determine a final answer. We outline the importance of a game-theoretically sound incentive scheme, possible attacks, and other future work
    • …
    corecore