278 research outputs found

    Breaking Synchrony by Heterogeneity in Complex Networks

    Full text link
    For networks of pulse-coupled oscillators with complex connectivity, we demonstrate that in the presence of coupling heterogeneity precisely timed periodic firing patterns replace the state of global synchrony that exists in homogenous networks only. With increasing disorder, these patterns persist until they reach a critical temporal extent that is of the order of the interaction delay. For stronger disorder these patterns cease to exist and only asynchronous, aperiodic states are observed. We derive self-consistency equations to predict the precise temporal structure of a pattern from the network heterogeneity. Moreover, we show how to design heterogenous coupling architectures to create an arbitrary prescribed pattern.Comment: 4 pages, 3 figure

    Measuring information-transfer delays

    Get PDF
    In complex networks such as gene networks, traffic systems or brain circuits it is important to understand how long it takes for the different parts of the network to effectively influence one another. In the brain, for example, axonal delays between brain areas can amount to several tens of milliseconds, adding an intrinsic component to any timing-based processing of information. Inferring neural interaction delays is thus needed to interpret the information transfer revealed by any analysis of directed interactions across brain structures. However, a robust estimation of interaction delays from neural activity faces several challenges if modeling assumptions on interaction mechanisms are wrong or cannot be made. Here, we propose a robust estimator for neuronal interaction delays rooted in an information-theoretic framework, which allows a model-free exploration of interactions. In particular, we extend transfer entropy to account for delayed source-target interactions, while crucially retaining the conditioning on the embedded target state at the immediately previous time step. We prove that this particular extension is indeed guaranteed to identify interaction delays between two coupled systems and is the only relevant option in keeping with Wiener’s principle of causality. We demonstrate the performance of our approach in detecting interaction delays on finite data by numerical simulations of stochastic and deterministic processes, as well as on local field potential recordings. We also show the ability of the extended transfer entropy to detect the presence of multiple delays, as well as feedback loops. While evaluated on neuroscience data, we expect the estimator to be useful in other fields dealing with network dynamics

    Cloud-based desktop services for thin clients

    Get PDF
    Cloud computing and ubiquitous network availability have renewed people's interest in the thin client concept. By executing applications in virtual desktops on cloud servers, users can access any application from any location with any device. For this to be a successful alternative to traditional offline applications, however, researchers must overcome important challenges. The thin client protocol must display audiovisual output fluidly, and the server executing the virtual desktop should have sufficient resources and ideally be close to the user's current location to limit network delay. From a service provider viewpoint, cost reduction is also an important issue

    Instability to a heterogeneous oscillatory state in randomly connected recurrent networks with delayed interactions

    Get PDF
    Oscillatory dynamics are ubiquitous in biological networks. Possible sources of oscillations are well understood in low-dimensional systems, but have not been fully explored in high-dimensional networks. Here we study large networks consisting of randomly coupled rate units. We identify a novel type of bifurcation in which a continuous part of the eigenvalue spectrum of the linear stability matrix crosses the instability line at non-zero-frequency. This bifurcation occurs when the interactions are delayed and partially anti-symmetric, and leads to a heterogeneous oscillatory state in which oscillations are apparent in the activity of individual units, but not on the population-average level

    Spatial flocking: Control by speed, distance, noise and delay

    Get PDF
    Fish, birds, insects and robots frequently swim or fly in groups. During their 3 dimensional collective motion, these agents do not stop, they avoid collisions by strong short-range repulsion, and achieve group cohesion by weak long-range attraction. In a minimal model that is isotropic, and continuous in both space and time, we demonstrate that (i) adjusting speed to a preferred value, combined with (ii) radial repulsion and an (iii) effective long-range attraction are sufficient for the stable ordering of autonomously moving agents in space. Our results imply that beyond these three rules ordering in space requires no further rules, for example, explicit velocity alignment, anisotropy of the interactions or the frequent reversal of the direction of motion, friction, elastic interactions, sticky surfaces, a viscous medium, or vertical separation that prefers interactions within horizontal layers. Noise and delays are inherent to the communication and decisions of all moving agents. Thus, next we investigate their effects on ordering in the model. First, we find that the amount of noise necessary for preventing the ordering of agents is not sufficient for destroying order. In other words, for realistic noise amplitudes the transition between order and disorder is rapid. Second, we demonstrate that ordering is more sensitive to displacements caused by delayed interactions than to uncorrelated noise (random errors). Third, we find that with changing interaction delays the ordered state disappears at roughly the same rate, whereas it emerges with different rates. In summary, we find that the model discussed here is simple enough to allow a fair understanding of the modeled phenomena, yet sufficiently detailed for the description and management of large flocks with noisy and delayed interactions. Our code is available at http://github.com/fij/flocComment: 12 pages, 7 figure

    A Novel Hybrid Protocol and Code Related Information Reconciliation Scheme for Physical Layer Secret Key Generation

    Get PDF
    Wireless networks are vulnerable to various attacks due to their open nature, making them susceptible to eavesdropping and other security threats. Eavesdropping attack takes place at the physical layer. Traditional wireless network security relies on cryptographic techniques to secure data transmissions. However, these techniques may not be suitable for all scenarios, especially in resource-constrained environments such as wireless sensor networks and adhoc networks. In these networks having limited power resources, generating cryptographic keys between mobile entities can be challenging. Also, the cryptographic keys are computationally complex and require key management infrastructure. Physical Layer Key Generation (PLKG) is an emerging solution to address these challenges. It establishes secure communication between two users by taking advantage of the wireless channel's inherent features. PLKG process involves channel probing, quantization, information reconciliation (IR) and privacy amplification to generate symmetric secret key. The researchers have used various PLKG techniques to get the secret key, sTop of Form till they face problems in the IR scheme to obtain symmetric keys between the users who share the same channel for communication. Both the code based and protocol based methods proposed in the literature have advantages and limitations related to their performance parameters such as information leakage, interaction delay and computation complexity. This research work proposes a novel IR mechanism that combines the protocol and code-based error correction methods to obtain reduced Bit Mismatch Rate (BMR), reduced information leakage, reduced interaction delay, and reduced computational time to enhance physical layer secret key's quality. In the proposed research work, the channel samples are generated using the Received Signal Strength (RSS) and Channel Impulse Response (CIR) parameters. These samples are quantized using Vector Quantization with Affinity Propagation Clustering (VQAPC) method to generate the preliminary key. The samples collected by the two users who wish to communicate, (for example Alice and Bob) will be different due to noise in the channel and hardware limitations. Hence their preliminary keys will be different. Removing this discrepancy between Bob's and Alice's initial keys, using novel Hybrid Protocol and Code related Information Reconciliation (HPC-IR) scheme to generate error corrected key, is the most important contribution of this research work. This key is further encoded by the MD5 hash function to generate a final secret key for exchanging information between two users over the wireless channel. It is observed that the proposed HPC-IR scheme achieves BMR of 19.4%, information leakage is 0.002, interaction delay is 0.001 seconds and computation time is 0.02 seconds

    Bits from Biology for Computational Intelligence

    Get PDF
    Computational intelligence is broadly defined as biologically-inspired computing. Usually, inspiration is drawn from neural systems. This article shows how to analyze neural systems using information theory to obtain constraints that help identify the algorithms run by such systems and the information they represent. Algorithms and representations identified information-theoretically may then guide the design of biologically inspired computing systems (BICS). The material covered includes the necessary introduction to information theory and the estimation of information theoretic quantities from neural data. We then show how to analyze the information encoded in a system about its environment, and also discuss recent methodological developments on the question of how much information each agent carries about the environment either uniquely, or redundantly or synergistically together with others. Last, we introduce the framework of local information dynamics, where information processing is decomposed into component processes of information storage, transfer, and modification -- locally in space and time. We close by discussing example applications of these measures to neural data and other complex systems
    • …
    corecore