4,216 research outputs found

    A diagrammatic approach to study the information transfer in weakly non-linear channels

    Full text link
    In a recent work we have introduced a novel approach to study the effect of weak non-linearities in the transfer function on the information transmitted by an analogue channel, by means of a perturbative diagrammatic expansion. We extend here the analysis to all orders in perturbation theory, which allows us to release any constraint concerning the magnitude of the expansion parameter and to establish the rules to calculate easily the contribution at any order. As an example we explicitly compute the information up to the second order in the non-linearity, in presence of random gaussian connectivities and in the limit when the output noise is not small. We analyze the first and second order contributions to the mutual information as a function of the non-linearity and of the number of output units. We believe that an extensive application of our method via the analysis of the different contributions at distinct orders might be able to fill a gap between well known analytical results obtained for linear channels and the non trivial treatments which are required to study highly non-linear channels.Comment: 17 pages, 3 figure

    A replica free evaluation of the neuronal population information with mixed continuous and discrete stimuli: from the linear to the asymptotic regime

    Full text link
    Recent studies have explored theoretically the ability of populations of neurons to carry information about a set of stimuli, both in the case of purely discrete or purely continuous stimuli, and in the case of multidimensional continuous angular and discrete correlates, in presence of additional quenched disorder in the distribution. An analytical expression for the mutual information has been obtained in the limit of large noise by means of the replica trick. Here we show that the same results can actually be obtained in most cases without the use of replicas, by means of a much simpler expansion of the logarithm. Fitting the theoretical model to real neuronal data, we show that the introduction of correlations in the quenched disorder improves the fit, suggesting a possible role of signal correlations-actually detected in real data- in a redundant code. We show that even in the more difficult analysis of the asymptotic regime, an explicit expression for the mutual information can be obtained without resorting to the replica trick despite the presence of quenched disorder, both with a gaussian and with a more realistic thresholded-gaussian model. When the stimuli are mixed continuous and discrete, we find that with both models the information seem to grow logarithmically to infinity with the number of neurons and with the inverse of the noise, even though the exact general dependence cannot be derived explicitly for the thresholded gaussian model. In the large noise limit lower values of information were obtained with the thresholded-gaussian model, for a fixed value of the noise and of the population size. On the contrary, in the asymptotic regime, with very low values of the noise, a lower information value is obtained with the gaussian model.Comment: 34 pages, 5 figure

    Nanometer-scale Tomographic Reconstruction of 3D Electrostatic Potentials in GaAs/AlGaAs Core-Shell Nanowires

    Full text link
    We report on the development of Electron Holographic Tomography towards a versatile potential measurement technique, overcoming several limitations, such as a limited tilt range, previously hampering a reproducible and accurate electrostatic potential reconstruction in three dimensions. Most notably, tomographic reconstruction is performed on optimally sampled polar grids taking into account symmetry and other spatial constraints of the nanostructure. Furthermore, holographic tilt series acquisition and alignment have been automated and adapted to three dimensions. We demonstrate 6 nm spatial and 0.2 V signal resolution by reconstructing various, previously hidden, potential details of a GaAs/AlGaAs core-shell nanowire. The improved tomographic reconstruction opens pathways towards the detection of minute potentials in nanostructures and an increase in speed and accuracy in related techniques such as X-ray tomography

    Replica symmetric evaluation of the information transfer in a two-layer network in presence of continuous+discrete stimuli

    Full text link
    In a previous report we have evaluated analytically the mutual information between the firing rates of N independent units and a set of multi-dimensional continuous+discrete stimuli, for a finite population size and in the limit of large noise. Here, we extend the analysis to the case of two interconnected populations, where input units activate output ones via gaussian weights and a threshold linear transfer function. We evaluate the information carried by a population of M output units, again about continuous+discrete correlates. The mutual information is evaluated solving saddle point equations under the assumption of replica symmetry, a method which, by taking into account only the term linear in N of the input information, is equivalent to assuming the noise to be large. Within this limitation, we analyze the dependence of the information on the ratio M/N, on the selectivity of the input units and on the level of the output noise. We show analytically, and confirm numerically, that in the limit of a linear transfer function and of a small ratio between output and input noise, the output information approaches asymptotically the information carried in input. Finally, we show that the information loss in output does not depend much on the structure of the stimulus, whether purely continuous, purely discrete or mixed, but only on the position of the threshold nonlinearity, and on the ratio between input and output noise.Comment: 19 pages, 4 figure

    An architecture to integrate IEC 61131-3 systems in an IEC 61499 distributed solution

    Get PDF
    The IEC 61499 standard has been developed to allow the modeling and design of distributed control systems, providing advanced concepts of software engineering (such as abstraction and encapsulation) to the world of control engineering. The introduction of this standard in already existing control environments poses challenges, since programs written using the widespread IEC 61131-3 programming standard cannot be directly executed in a fully IEC 61499 environment without reengineering effort. In order to solve this problem, this paper presents an architecture to integrate modules of the two standards, allowing the exploitation of the benefits of both. The proposed architecture is based on the coexistence of control software of the two standards. Modules written in one standard interact with some particular interfaces that encapsulate functionalities and information to be exchanged with the other standard. In particular, the architecture permits to utilize available run-times without modification, it allows the reuse of software modules, and it utilizes existing features of the standards. A methodology to integrate IEC 61131-3 modules in an IEC 61499 distributed solution based on such architecture is also developed, and it is described via a case study to prove feasibility and benefits. Experimental results demonstrate that the proposed solution does not add substantial load or delays to the system when compared to an IEC 61131-3 based solution. By acting on task period, it can achieve performances similar to an IEC 61499 solution

    A Study on Secret Key Rate in Wideband Rice Channel

    Get PDF
    Standard cryptography is expected to poorly fit IoT applications and services, as IoT devices can hardly cope with the computational complexity often required to run encryption algorithms. In this framework, physical layer security is often claimed as an effective solution to enforce secrecy in IoT systems. It relies on wireless channel characteristics to provide a mechanism for secure communications, with or even without cryptography. Among the different possibilities, an interesting solution aims at exploiting the random-like nature of the wireless channel to let the legitimate users agree on a secret key, simultaneously limiting the eavesdropping threat thanks to the spatial decorrelation properties of the wireless channel. The actual reliability of the channel-based key generation process depends on several parameters, as the actual correlation between the channel samples gathered by the users and the noise always affecting the wireless communications. The sensitivity of the key generation process can be expressed by the secrecy key rate, which represents the maximum number of secret bits that can be achieved from each channel observation. In this work, the secrecy key rate value is computed by means of simulations carried out under different working conditions in order to investigate the impact of major channel parameters on the SKR values. In contrast to previous works, the secrecy key rate is computed under a line-of-sight wireless channel and considering different correlation levels between the legitimate users and the eavesdropper

    Feasibility of laparoscopic portal vein ligation prior to major hepatectomy

    Get PDF
    AbstractBackground. Patients noted to have an inadequate future liver remnant on pre operative volumetric assessment are considered to be candidates for portal vein embolization (PVE). A subset of patients undergo laparoscopic intervention prior to PVE for staging purposes or to address the primary in Stage IV colon cancer. These patients usually undergo PVE as a subsequent additional procedure by the transhepatic route. The aim of this study was to assess the feasibility of portal vein ligation by the laparoscopic approach in suitable patients. Materials and methods. A retrospective review of a prospectively maintained database was performed to identify patients that underwent laparoscopic portal vein ligation (LPVL). The demographic, clinical, radiographic, operative and volumetric details were collected to determine the feasibility of portal vein ligation. Results. A total of nine patients underwent LPVL as part of a two stage procedure in preparation for subsequent major hepatectomy. With a median age of 67 yrs, the diagnoses included: colorectal metastasis (five patients), cholangiocarcinoma (three patients) and hepatocellular carcinoma (one patient). The ligation involved the right portal vein in all and was performed with silk ligature (seven patients) and clips (two patients). Volumetric data was available in six patients which showed a mean increase from 209.1 cc±97.76 to 495.83 cc±310.91 (increase by 181.5%) In two patients, inadequate hypertrophy mandated later embolization by percutaneous technique. Five patients underwent subsequent major hepatic resection as planned. The remaining four patients were noted to have progression of disease that precluded the planned procedure. There were no complications associated with LPVL. Conclusions. LPVL is feasible and can be safely performed. In a select group of patients, it may be considered as an alternative to subsequent embolization and thereby potentially absolve the need for an additional procedure with its attendant complications
    • …
    corecore