87 research outputs found

    Experimental observation of extreme multistability in an electronic system of two coupled R\"{o}ssler oscillators

    Get PDF
    We report the first experimental observation of extreme multistability in a controlled laboratory investigation. Extreme multistability arises when infinitely many attractors coexist for the same set of system parameters. The behavior was predicted earlier on theoretical grounds, supported by numerical studies of models of two coupled identical or nearly identical systems. We construct and couple two analog circuits based on a modified coupled R\"{o}ssler system and demonstrate the occurrence of extreme multistability through a controlled switching to different attractor states purely through a change in initial conditions for a fixed set of system parameters. Numerical studies of the coupled model equations are in agreement with our experimental findings.Comment: to be published in Phys. Rev.

    An Energy Driven Architecture for Wireless Sensor Networks

    Full text link
    Most wireless sensor networks operate with very limited energy sources-their batteries, and hence their usefulness in real life applications is severely constrained. The challenging issues are how to optimize the use of their energy or to harvest their own energy in order to lengthen their lives for wider classes of application. Tackling these important issues requires a robust architecture that takes into account the energy consumption level of functional constituents and their interdependency. Without such architecture, it would be difficult to formulate and optimize the overall energy consumption of a wireless sensor network. Unlike most current researches that focus on a single energy constituent of WSNs independent from and regardless of other constituents, this paper presents an Energy Driven Architecture (EDA) as a new architecture and indicates a novel approach for minimising the total energy consumption of a WS

    A subdivision-based implementation of non-uniform local refinement with THB-splines

    Get PDF
    Paper accepted for 15th IMA International Conference on Mathematics on Surfaces, 2017. Abstract: Local refinement of spline basis functions is an important process for spline approximation and local feature modelling in computer aided design (CAD). This paper develops an efficient local refinement method for non-uniform and general degree THB-splines(Truncated hierarchical B-splines). A non-uniform subdivision algorithm is improved to efficiently subdivide a single non-uniform B-spline basis function. The subdivision scheme is then applied to locally hierarchically refine non-uniform B-spline basis functions. The refined basis functions are non-uniform and satisfy the properties of linear independence, partition of unity and are locally supported. The refined basis functions are suitable for spline approximation and numerical analysis. The implementation makes it possible for hierarchical approximation to use the same non-uniform B-spline basis functions as existing modelling tools have used. The improved subdivision algorithm is faster than classic knot insertion. The non-uniform THB-spline approximation is shown to be more accurate than uniform low degree hierarchical local refinement when applied to two classical approximation problems

    Self-Organization of Topographic Mixture Networks Using Attentional Feedback

    Full text link
    This paper proposes a biologically-motivated neural network model of supervised learning. The model possesses two novel learning mechanisms. The first is a network for learning topographic mixtures. The network's internal category nodes are the mixture components, which learn to encode smooth distributions in the input space by taking advantage of topography in the input feature maps. The second mechanism is an attentional biasing feedback circuit. When the network makes an incorrect output prediction, this feedback circuit modulates the learning rates of the category nodes, by amounts based on the sharpness of their tuning, in order to improve the network's prediction accuracy. The network is evaluated on several standard classification benchmarks and shown to perform well in comparison to other classifiers. Possible relationships are discussed between the network's learning properties and those of biological neural networks. Possible future extensions of the network are also discussed.Defense Advanced Research Projects Agency and the Office of Naval Research (N00014-95-1-0409

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Figure-Ground Organization Emerges in a Deep Net with a Feedback Loop

    Get PDF
    We used a deep net to model how object-specific activation at the high levels of a hierarchical neural network could be fed back to modify representations at lower levels. We first identified a subset of nodes in the uppermost hidden layer that were preferentially activated by images of people. We then ran a procedure to recursively modify an image so as to increase activation of the \u27person-selective\u27 nodes. The image was modified by choosing a rectangular region (of random size and position) and reducing contrast in that region. The modification was kept if the activation of the \u27person-selective’ nodes became larger relative to the activation of the remaining nodes in that layer, and discarded otherwise. This process led to appearance modification according to learned statistics, which includes: (i) recovery of figural details in the occlusion zone, and (ii) modification of figural details in un-occluded zone according to what is consistent with object category statistics, and suppression of distractors in the background. We also tried this process with the classic ambiguous face-vase image of Rubin. Depending of the focus of the feedback signals, either the faces or the center figure would be developed in details. These results indicate that feedback of object-specific information can be used to facilitate figure-ground segregation and drive low-level representation towards enhancing perceptual interpretation
    • …
    corecore