1,385 research outputs found
Chimeras in Leaky Integrate-and-Fire Neural Networks: Effects of Reflecting Connectivities
The effects of nonlocal and reflecting connectivity are investigated in
coupled Leaky Integrate-and-Fire (LIF) elements, which assimilate the exchange
of electrical signals between neurons. Earlier investigations have demonstrated
that non-local and hierarchical network connectivity often induces complex
synchronization patterns and chimera states in systems of coupled oscillators.
In the LIF system we show that if the elements are non-locally linked with
positive diffusive coupling in a ring architecture the system splits into a
number of alternating domains. Half of these domains contain elements, whose
potential stays near the threshold, while they are interrupted by active
domains, where the elements perform regular LIF oscillations. The active
domains move around the ring with constant velocity, depending on the system
parameters. The idea of introducing reflecting non-local coupling in LIF
networks originates from signal exchange between neurons residing in the two
hemispheres in the brain. We show evidence that this connectivity induces novel
complex spatial and temporal structures: for relatively extensive ranges of
parameter values the system splits in two coexisting domains, one domain where
all elements stay near-threshold and one where incoherent states develop with
multileveled mean phase velocity distribution.Comment: 12 pages, 12 figure
Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols
Code voting was introduced by Chaum as a solution for using a possibly
infected-by-malware device to cast a vote in an electronic voting application.
Chaum's work on code voting assumed voting codes are physically delivered to
voters using the mail system, implicitly requiring to trust the mail system.
This is not necessarily a valid assumption to make - especially if the mail
system cannot be trusted. When conspiring with the recipient of the cast
ballots, privacy is broken.
It is clear to the public that when it comes to privacy, computers and
"secure" communication over the Internet cannot fully be trusted. This
emphasizes the importance of using: (1) Unconditional security for secure
network communication. (2) Reduce reliance on untrusted computers.
In this paper we explore how to remove the mail system trust assumption in
code voting. We use PSMT protocols (SCN 2012) where with the help of visual
aids, humans can carry out addition correctly with a 99\% degree of
accuracy. We introduce an unconditionally secure MIX based on the combinatorics
of set systems.
Given that end users of our proposed voting scheme construction are humans we
\emph{cannot use} classical Secure Multi Party Computation protocols.
Our solutions are for both single and multi-seat elections achieving:
\begin{enumerate}[i)]
\item An anonymous and perfectly secure communication network secure against
a -bounded passive adversary used to deliver voting,
\item The end step of the protocol can be handled by a human to evade the
threat of malware. \end{enumerate} We do not focus on active adversaries
Multi-chimera States in the Leaky Integrate-and-Fire Model
We study the dynamics of identical leaky integrate-and-fire neurons with symmetric non-local coupling. Upon varying control parameters (coupling strength, coupling range, refractory period) we investigate the system's behaviour and highlight the formation of chimera states. We show that the introduction of a refractory period enlarges the parameter region where chimera states appear and affects the chimera multiplicity
Integrated topology optimisation of multi-energy networks
Multi-carrier hybrid energy distribution net- works provide flexibility in case of network malfunctions, energy shortages and price fluctuations through energy conversion and storage. Therefore hybrid networks can cope with large-scale integration of distributed and intermittent renewable energy sources. In this article an optimisation approach is proposed which determines the optimal topology of hybrid networks
Quantum protocols for anonymous voting and surveying
We describe quantum protocols for voting and surveying. A key feature of our
schemes is the use of entangled states to ensure that the votes are anonymous
and to allow the votes to be tallied. The entanglement is distributed over
separated sites; the physical inaccessibility of any one site is sufficient to
guarantee the anonymity of the votes. The security of these protocols with
respect to various kinds of attack is discussed. We also discuss classical
schemes and show that our quantum voting protocol represents a N-fold reduction
in computational complexity, where N is the number of voters.Comment: 8 pages. V2 includes the modifications made for the published versio
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
Public Blockchains on their own are, by definition, incapable of keeping data private and disclosing it at a later time. Control over the eventual disclosure of private data must be maintained outside a Blockchain by withholding and later publishing encryption keys, for example. We propose the Atomic Information Disclosure (AID) pattern based on threshold encryption that allows a set of key holders to govern the release of data without having access to it. We motivate this pattern with problems that require independently reproduced solutions. By keeping submissions private until a deadline expires, participants are unable to plagiarise and must therefore generate their own solutions which can then be aggregated and analysed to determine a final answer. We outline the importance of a game-theoretically sound incentive scheme, possible attacks, and other future work
Regional facial asymmetries in unilateral orofacial clefts
SummaryObjectives: Assess facial asymmetry in subjects with unilateral cleft lip (UCL), unilateral cleft lip and alveolus (UCLA), and unilateral cleft lip, alveolus, and palate (UCLP), and to evaluate which area of the face is most asymmetrical. Methods: Standardized three-dimensional facial images of 58 patients (9 UCL, 21 UCLA, and 28 UCLP; age range: 8.6-12.3 years) and 121 controls (age range 9-12 years) were mirrored and distance maps were created. Absolute mean asymmetry values were calculated for the whole face, cheek, nose, lips, and chin. One-way analysis of variance, Kruskal-Wallis, and t-test were used to assess the differences between clefts and controls for the whole face and separate areas. Results: Clefts and controls differ significantly for the whole face as well as in all areas. Asymmetry is distributed differently over the face for all groups. In UCLA, the nose was significantly more asymmetric compared with chin and cheek (P = 0.038 and 0.024, respectively). For UCL, significant differences in asymmetry between nose and chin and chin and cheek were present (P = 0.038 and 0.046, respectively). In the control group, the chin was the most asymmetric area compared to lip and nose (P = 0.002 and P = 0.001, respectively) followed by the nose (P = 0.004). In UCLP, the nose, followed by the lips, was the most asymmetric area compared to chin, cheek (P < 0.001 and P = 0.016, respectively). Limitations: Despite division into regional areas, the method may still exclude or underrate smaller local areas in the face, which are better visualized in a facial colour coded distance map than quantified by distance numbers. The UCL subsample is small. Conclusion: Each type of cleft has its own distinct asymmetry pattern. Children with unilateral clefts show more facial asymmetry than children without cleft
Recommended from our members
Validation of Urban Concentrations and Their Diurnal and Seasonal Variations Observed from the SCIAMACHY and OMI Sensors Using In Situ Surface Measurements in Israeli Cities
We compare a full-year (2006) record of surface air concentrations measured in Israeli cities to coinciding retrievals of tropospheric columns from satellite sensors (SCIAMACHY aboard ENVISAT and OMI aboard Aura). This provides a large statistical data set for validation of satellite measurements in urban air, where validation is difficult yet crucial for using these measurements to infer emissions by inverse modeling. Assuming that is well-mixed throughout the boundary layer (BL), and using observed average seasonal boundary layer heights, near-surface concentrations are converted into BL columns. The agreement between OMI and (13:45) BL columns (slope=0.93, n=542), and the comparable results at 10:00 h for SCIAMACHY, allow a validation of the seasonal, weekly, and diurnal cycles in satellite-derived . OMI and BL columns show consistent seasonal cycles (winter 1.6–2.7× higher than summer). BL and coinciding OMI columns both show a strong weekly cycle with 45–50% smaller columns on Saturday relative to the weekday mean, reflecting the reduced weekend activity, and validating the weekly cycle observed from space. The diurnal difference between SCIAMACHY (10:00) and OMI (13:45) is maximum in summer when SCIAMACHY is up to 40% higher than OMI, and minimum in winter when OMI slightly exceeds SCIAMACHY. A similar seasonal variation in the diurnal difference is found in the source region of Cairo. The surface measurements in Israel cities confirm this seasonal variation in the diurnal cycle. Using simulations from a global 3-D chemical transport model (GEOS-Chem), we show that this seasonal cycle can be explained by a much stronger photochemical loss of in summer than in winter.Engineering and Applied Science
- …