118 research outputs found
Mixed-mode oscillations and interspike interval statistics in the stochastic FitzHugh-Nagumo model
We study the stochastic FitzHugh-Nagumo equations, modelling the dynamics of
neuronal action potentials, in parameter regimes characterised by mixed-mode
oscillations. The interspike time interval is related to the random number of
small-amplitude oscillations separating consecutive spikes. We prove that this
number has an asymptotically geometric distribution, whose parameter is related
to the principal eigenvalue of a substochastic Markov chain. We provide
rigorous bounds on this eigenvalue in the small-noise regime, and derive an
approximation of its dependence on the system's parameters for a large range of
noise intensities. This yields a precise description of the probability
distribution of observed mixed-mode patterns and interspike intervals.Comment: 36 page
Recommended from our members
Fibonacci facts and formulas
We investigate several methods of computing Fibonacci numbers quickly and generalize some properties of the Fibonacci numbers to degree r Fibonacci (R-nacci) numbers. Sections 2 and 3 present several algorithms for computing the traditional, degree two, Fibonacci numbers quickly. Sections 4 and 5 investigate the structure of the binary representation of the Fibonacci numbers. Section 6 shows how the generalized Fibonacci numbers can be expressed as rounded powers of the dominant root of the characteristic equation. Properties of the roots of the characteristic equation of the generalized Fibonacci numbers are presented in Section 7. Section 8 introduces several properties of the Zeckendorf representation of the integers. Finally, in Section 9 the asymptotic proportion of 1's in the Zekendorf representation of integers is computed and an easy to compute closed formula is given
The Communication Complexity of Private Simultaneous Messages, Revisited
Private Simultaneous Message (PSM) protocols were introduced by Feige, Kilian and Naor (STOC \u2794) as a minimal non-interactive model for information-theoretic three-party secure computation. While it is known that every function admits a PSM protocol with exponential communication of (Beimel et al., TCC \u2714), the best known (non-explicit) lower-bound is bits. To prove this lower-bound, FKN identified a set of simple requirements, showed that any function that satisfies these requirements is subject to the lower-bound, and proved that a random function is likely to satisfy the requirements.
We revisit the FKN lower-bound and prove the following results:
(Counterexample) We construct a function that satisfies the FKN requirements but has a PSM protocol with communication of bits, revealing a gap in the FKN proof.
(PSM lower-bounds) We show that, by imposing additional requirements, the FKN argument can be fixed leading to a lower-bound for a random function. We also get a similar lower-bound for a function that can be computed by a polynomial-size circuit (or even polynomial-time Turing machine under standard complexity-theoretic assumptions). This yields the first non-trivial lower-bound for an explicit Boolean function partially resolving an open problem of Data, Prabhakaran and Prabhakaran (Crypto \u2714, IEEE Information Theory \u2716). We further extend these results to the setting of imperfect PSM protocols which may have small correctness or privacy error.
(CDS lower-bounds) We show that the original FKN argument applies (as is) to some weak form of PSM protocols which are strongly related to the setting of Conditional Disclosure of Secrets (CDS). This connection yields a simple combinatorial criterion for establishing linear -bit CDS lower-bounds. As a corollary, we settle the complexity of the Inner Product predicate resolving an open problem of Gay, Kerenidis, and Wee (Crypto \u2715)
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
In the \emph{conditional disclosure of secrets} problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs and respectively, wish to release a common secret to Carol (who knows both and ) if only if the input satisfies some predefined predicate . Alice and Bob are allowed to send a single message to Carol which may depend on their inputs and some joint randomness and the goal is to minimize the communication complexity while providing information-theoretic security.
Following Gay, Kerenidis, and Wee (Crypto 2015), we study the communication complexity of CDS protocols and derive the following positive and negative results.
1. *Closure* A CDS for can be turned into a CDS for its complement with only a minor blow-up in complexity. More generally, for a (possibly non-monotone) predicate , we obtain a CDS for whose cost is essentially linear in the formula size of and polynomial in the CDS complexity of .
2. *Amplification* It is possible to reduce the privacy and correctness error of a CDS from constant to with a multiplicative overhead of . Moreover, this overhead can be amortized over -bit secrets.
3. *Amortization* Every predicate over -bit inputs admits a CDS for multi-bit secrets whose amortized communication complexity per secret bit grows linearly with the input length for sufficiently long secrets. In contrast, the best known upper-bound for single-bit secrets is exponential in .
4. *Lower-bounds* There exists a (non-explicit) predicate over -bit inputs for which any perfect (single-bit) CDS requires communication of at least . This is an exponential improvement over the previously known lower-bound.
5. *Separations* There exists an (explicit) predicate whose CDS complexity is exponentially smaller than its randomized communication complexity. This matches a lower-bound of Gay et. al., and, combined with another result of theirs, yields an exponential separation between the communication complexity of linear CDS and non-linear CDS. This is the first provable gap between the communication complexity of linear CDS (which captures most known protocols) and non-linear CDS
On the Power of Amortization in Secret Sharing: -Uniform Secret Sharing and CDS with Constant Information Rate
Consider the following secret-sharing problem. Your goal is to distribute a long file between servers such that -subsets cannot recover the file, -subsets can recover the file, and -subsets should be able to recover if and only if they appear in some predefined list . How small can the information ratio (i.e., the number of bits stored on a server per each bit of the secret) be?
We initiate the study of such -uniform access structures, and view them as a useful scaled-down version of general access structures. Our main result shows that, for constant , any -uniform access structure admits a secret sharing scheme with a *constant* asymptotic information ratio of that does not grow with the number of servers . This result is based on a new construction of -party Conditional Disclosure of Secrets (Gertner et al., JCSS \u2700) for arbitrary predicates over -size domain in which each party communicates at most four bits per secret bit.
In both settings, previous results achieved non-constant information ratio which grows asymptotically with even for the simpler (and widely studied) special case of . Moreover, our results provide a unique example for a natural class of access structures that can be realized with information rate smaller than its bit-representation length (i.e., for -uniform access structures) showing that amortization can beat the representation size barrier.
Our main result applies to exponentially long secrets, and so it should be mainly viewed as a barrier against amortizable lower-bound techniques. We also show that in some natural simple cases (e.g., low-degree predicates), amortization kicks in even for quasi-polynomially long secrets. Finally, we prove some limited lower-bounds, point out some limitations of existing lower-bound techniques, and describe some applications to the setting of private simultaneous messages
Creating a multi-center rare disease consortium - the Consortium of Eosinophilic Gastrointestinal Disease Researchers (CEGIR).
Eosinophilic gastrointestinal disorders (EGIDs) affect various segments of the gastrointestinal tract. Since these disorders are rare, collaboration is essential to enroll subjects in clinical studies and study the broader population. The Rare Diseases Clinical Research Network (RDCRN), a program of the National Center for Advancing Translational Sciences (NCATS), funded the Consortium of Eosinophilic Gastrointestinal Disease Researchers (CEGIR) in 2014 to advance the field of EGIDs. CEGIR facilitates collaboration among various centers, subspecialties, patients, professional organizations and patient-advocacy groups and includes 14 clinical sites. It has successfully initiated two large multi-center clinical studies looking to refine EGID diagnoses and management. Several pilot studies are underway that focus on various aspects of EGIDs including novel therapeutic interventions, diagnostic and monitoring methods, and the role of the microbiome in pathogenesis. CEGIR currently nurtures five physician-scholars through a career training development program and has published more than 40 manuscripts since its inception. This review focuses on CEGIR's operating model and progress and how it facilitates a framework for exchange of ideas and stimulates research and innovation. This consortium provides a model for progress on other potential clinical areas
A review of combined advanced oxidation technologies for the removal of organic pollutants from water
Water pollution through natural and anthropogenic activities has become a global problem causing short-and long-term impact on human and ecosystems. Substantial quantity of individual or mixtures of organic pollutants enter the surface water via point and nonpoint sources and thus affect the quality of freshwater. These pollutants are known to be toxic and difficult to remove by mere biological treatment. To date, most researches on the removal of organic pollutants from wastewater were based on the exploitation of individual treatment process. This single-treatment technology has inherent challenges and shortcomings with respect to efficiency and economics. Thus, application of two advanced treatment technologies characterized with high efficiency with respect to removal of primary and disinfection by-products in wastewater is desirable. This review article focuses on the application of integrated technologies such as electrohydraulic discharge with heterogeneous photocatalysts or sonophotocatalysis to remove target pollutants. The information gathered from more than 100 published articles, mostly laboratories studies, shows that process integration effectively remove and degrade recalcitrant toxic contaminants in wastewater better than single-technology processing. This review recommends an improvement on this technology (integrated electrohydraulic discharge with heterogeneous photocatalysts) viz-a-vis cost reduction in order to make it accessible and available in the rural and semi-urban settlement. Further recommendation includes development of an economic model to establish the cost implications of the combined technology. Proper monitoring, enforcement of the existing environmental regulations, and upgrading of current wastewater treatment plants with additional treatment steps such as photocatalysis and ozonation will greatly assist in the removal of environmental toxicants
Treatment of persistent organic pollutants in wastewater using hydrodynamic cavitation in synergy with advanced oxidation process
Persistent organic pollutants (POPs) are very tenacious wastewater contaminants. The consequences of their existence have been acknowledged for negatively affecting the ecosystem with specific impact upon endocrine disruption and hormonal diseases in humans. Their recalcitrance and circumvention of nearly all the known wastewater treatment procedures are also well documented. The reported successes of POPs treatment using various advanced technologies are not without setbacks such as low degradation efficiency, generation of toxic intermediates, massive sludge production, and high energy expenditure and operational cost. However, advanced oxidation processes (AOPs) have recently recorded successes in the treatment of POPs in wastewater. AOPs are technologies which involve the generation of OH radicals for the purpose of oxidising recalcitrant organic contaminants to their inert end products. This review provides information on the existence of POPs and their effects on humans. Besides, the merits and demerits of various advanced treatment technologies as well as the synergistic efficiency of combined AOPs in the treatment of wastewater containing POPs was reported. A concise review of recently published studies on successful treatment of POPs in wastewater using hydrodynamic cavitation technology in combination with other advanced oxidation processes is presented with the highlight of direction for future research focus
- …