Search results for " Coding"

showing 9 items of 139 documents

Functional Interaction between the Nucleosome Remodeling Factor ISWI and the Hsrω non-coding RNA

2009

non coding RNA Chromatin Remodelling
researchProduct

Detecting Kernel Vulnerabilities During the Development Phase

2015

Testing is one of the major problems in Linux kernel development cycle. Security analysis and ensuring no new vulnerabilities has been introduced is one of the toughest issues of testing. Kernel developers attempt to find as many security issues as possible before merging with the mainline branch. Failure to detect vulnerabilities will result in vulnerable kernel shipped by distribution and vulnerable systems. The kernel developers can choose between several industrial and open source tools to assist in the development process and shorten the development cycle. (Though not as many as user space developers. Kernel tools are limited and rare compared to user space tools) Some of these tools a…

procfssysfsbusiness.industryComputer scienceLinux kernelKernel virtual address spacecomputer.software_genreKernel (statistics)User spaceOperating systemHybrid kernelSoftware engineeringbusinesscomputerSecure coding2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
researchProduct

The embodied self, the pattern theory of self, and the predictive mind

2018

Do we have to presuppose a self to account for human self-consciousness? If so, how should we characterize the self? These questions are discussed in the context of two alternatives, i.e., the no-self position held by \(\textit {Metzinger (2003, 2009)}\) and the claim that the only self we have to presuppose is a narrative self \(\textit {(Dennett, 1992; Schechtman, 2007; Hardcastle, 2008)}\) which is primarily an abstract entity. In contrast to these theories, I argue that we have to presuppose an embodied self, although this is not a metaphysical substance, nor an entity for which stable necessary and jointly sufficient conditions can be given. Self-consciousness results from an integrati…

self-modelselflcsh:Psychologylcsh:BF1-990ddc:100Psychologypattern theoryembodied selfpredictive codingOriginal Research
researchProduct

Video Scene analysis for a configurable hardware accelerator dedicated to Smart Camera

2012

International audience; According to the Center for Research and Prevention of Injuries report, fall-caused injuries of elderly people in UE- 27 are five times as frequent as other injury causes which reduce considerably their mobility and independence. Among the diverse applications of computer vision systems, object detection and event recognition are of the most prominent related recognition and motion analysis, that is, researchers had the idea to spread it in fall detection. The fall event, extracted automatically from the video scene represents itself, crucial information that can be used to alert emergency. In this context, visual information on the corresponding scene is highly impo…

smart camera's acceleratorConfigurable motion estimationadaptive video coding performancesFall detectionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[ INFO.INFO-ES ] Computer Science [cs]/Embedded Systems[INFO.INFO-ES] Computer Science [cs]/Embedded Systems
researchProduct

Antennal lobe representations are optimized when olfactory stimuli are periodically structured to simulate natural wing beat effects

2014

Animals use behaviors to actively sample the environment across a broad spectrum of sensory domains. These behaviors discretize the sensory experience into unique spatiotemporal moments, minimize sensory adaptation, and enhance perception. In olfaction, behaviors such as sniffing, antennal flicking, and wing beating all act to periodically expose olfactory epithelium. In mammals, it is thought that sniffing enhances neural representations; however, the effects of insect wing beating on representations remain unknown. To determine how well the antennal lobe produces odor-dependent representations when wing beating effects are simulated, we used extracellular methods to record neural units an…

sniffingPopulation Dynamicsactive sensingSensory systemodor representationLocal field potentialOlfactionBiologylcsh:RC321-57103 medical and health sciencesCellular and Molecular Neuroscience0302 clinical medicinetemporal codingSniffingmedicineOriginal Research Articlelcsh:Neurosciences. Biological psychiatry. Neuropsychiatry030304 developmental biologyDiscrimination (Psychology)Stimulus discrimination0303 health sciencesSensory AdaptationCommunicationbusiness.industrysynchronynetwork dynamicsmedicine.anatomical_structureOdoroscillationsAntennal lobebusinessNeuroscienceOlfactory epithelium030217 neurology & neurosurgeryNeuroscienceolfactionFrontiers in Cellular Neuroscience
researchProduct

Computing variations of entropy and redundancy under nonlinear mappings not preserving the signal dimension: quantifying the efficiency of V1 cortex

2021

In computational neuroscience, the Efficient Coding Hypothesis argues that the neural organization comes from the optimization of information-theoretic goals [Barlow Proc.Nat.Phys.Lab.59]. A way to confirm this requires the analysis of the statistical performance of biological systems that have not been statistically optimized [Renart et al. Science10, Malo&Laparra Neur.Comp.10, Foster JOSA18, Gomez-Villa&Malo J.Neurophysiol.19]. However, when analyzing the information-theoretic performance, cortical magnification in the retina-cortex pathway poses a theoretical problem. Cortical magnification stands for the increase the signal dimensionality [Cowey&Rolls Exp. Brain Res.74]. Conventional mo…

symbols.namesakeWaveletRedundancy (information theory)Dimension (vector space)Computer scienceJacobian matrix and determinantsymbolsEntropy (information theory)Total correlationEfficient coding hypothesisAlgorithmCurse of dimensionalityProceedings of Entropy 2021: The Scientific Tool of the 21st Century
researchProduct

Multi-hop D2D Communications with Network Coding : From A Performance Perspective

2019

Multi-hop device-to-device (D2D) communications play an important role in expanding D2D coverage. In this paper, we study a relay-based and network-coding-assisted (in particular, XOR coding) multi-hop D2D communication system. In the system, toward jointly considering the impact of interference and network traffic conditions on the quality of D2D communications, various channel fading models and traffic models are investigated, and the packet loss probability of D2D links is meticulously computed using these models. With the packet loss probability of D2D links, the general closed-form expressions of end-to-end packet loss probability (E2EPLP) of the system with the presence (or absence) o…

ta213Computer Networks and Communicationsbusiness.industryComputer sciencetraffic modelAerospace Engineeringnetwork codingmatkaviestinverkotCommunications systemperformance evaluationSpread spectrumlangaton tiedonsiirtomobiililaitteetPacket lossLinear network codingAutomotive EngineeringFadingElectrical and Electronic Engineeringbusinessmulti-hop D2D communicationCommunication channelComputer network
researchProduct

Are We Really Hearing in Our Heads What We Think We’re Hearing? The Role of Audiation in Musical Improvisation

2016

An important and valued part of the skill of musical improvisation is to be able to play what we hear in our head (audiation). Improvisation is a cognitively demanding activity, involving the production of musical material in real time. This requires the simultaneous involvement and coordination of many different skills, and places demands on working memory, memory retrieval, auditory and sensory-motor systems. Some recent studies support a cognitive model of improvisation which posits the deployment of stored rhythmic and melodic patterns via motor programmes. According to the theory of event coding, actions and their perceptual consequences share the same cognitive representation and beha…

tonal loopcommon codingimprovisationaudiationaltered auditory feedback
researchProduct

(A,B) In vivo GCaMP6f signals recorded in layers M1, M5 and M9/10 of Mi1 (A) and Tm3 (B) neurons, before (blue, green) and after (gray, red) applicat…

2019

Sensory systems sequentially extract increasingly complex features. ON and OFF pathways, for example, encode increases or decreases of a stimulus from a common input. This ON/OFF pathway split is thought to occur at individual synaptic connections through a sign-inverting synapse in one of the pathways. Here, we show that ON selectivity is a multisynaptic process in the Drosophila visual system. A pharmacogenetics approach demonstrates that both glutamatergic inhibition through GluClα and GABAergic inhibition through Rdl mediate ON responses. Although neurons postsynaptic to the glutamatergic ON pathway input L1 lose all responses in GluClα mutants, they are resistant to a cell-type-specifi…

visionQH301-705.5GABA AgentsScienceModels Neurological610Sensory systemBiologyStimulus (physiology)distributed codingGeneral Biochemistry Genetics and Molecular BiologySynapseglutamatergic inhibition03 medical and health sciencesGlutamatergic0302 clinical medicinePostsynaptic potentialOff pathwayInterneuronsAnimalsVisual PathwaysExcitatory Amino Acid AgentsBiology (General)030304 developmental biology0303 health sciencesGeneral Immunology and MicrobiologyGABAergic inhibitionD. melanogasterON selectivityGeneral Neurosciencefeature extractionQRGeneral MedicineD. melanogaster; GABAergic inhibition; ON selectivity; distributed coding; feature extraction; glutamatergic inhibition; neuroscience; visionVisual PerceptionMedicineGabaergic inhibitionDrosophilaSelectivityNeuroscience030217 neurology & neurosurgeryResearch ArticleNeuroscience
researchProduct