Search results for "Systems"

showing 10 items of 11952 documents

PROPAGATING INTERFACES IN A TWO-LAYER BISTABLE NEURAL NETWORK

2006

The dynamics of propagating interfaces in a bistable neural network is investigated. We consider the network composed of two coupled 1D lattices and assume that they interact in a local spatial point (pin contact). The network unit is modeled by the FitzHugh–Nagumo-like system in a bistable oscillator mode. The interfaces describe the transition of the network units from the rest (unexcited) state to the excited state where each unit exhibits periodic sequences of excitation pulses or action potentials. We show how the localized inter-layer interaction provides an "excitatory" or "inhibitory" action to the oscillatory activity. In particular, we describe the interface propagation failure a…

propagation failureBistabilityComputer science[ PHYS.COND.CM-DS-NN ] Physics [physics]/Condensed Matter [cond-mat]/Disordered Systems and Neural Networks [cond-mat.dis-nn]Interface (computing)Topology01 natural sciences010305 fluids & plasmas[NLIN.NLIN-PS]Nonlinear Sciences [physics]/Pattern Formation and Solitons [nlin.PS]Control theory0103 physical sciences[ NLIN.NLIN-PS ] Nonlinear Sciences [physics]/Pattern Formation and Solitons [nlin.PS][PHYS.COND.CM-DS-NN]Physics [physics]/Condensed Matter [cond-mat]/Disordered Systems and Neural Networks [cond-mat.dis-nn]0101 mathematicsEngineering (miscellaneous)ComputingMilieux_MISCELLANEOUSRest (physics)Artificial neural networkApplied Mathematicsneural networksAction (physics)[ SPI.TRON ] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/Electronics010101 applied mathematicsNonlinear systemNonlinear dynamicsModeling and SimulationExcited stateExcitationInternational Journal of Bifurcation and Chaos
researchProduct

Pinning of a kink in a nonlinear diffusive medium with a geometrical bifurcation: Theory and experiments

2004

International audience; We study the dynamics of a kink propagating in a Nagumo chain presenting a geometrical bifurcation. In the case of weak couplings, we define analytically and numerically the coupling conditions leading to the pinning of the kink at the bifurcation site. Moreover, real experiments using a nonlinear electrical lattice confirm the theoretical and numerical predictions.

propagation failure[ PHYS.COND.CM-DS-NN ] Physics [physics]/Condensed Matter [cond-mat]/Disordered Systems and Neural Networks [cond-mat.dis-nn]Saddle-node bifurcationBifurcation diagram01 natural sciences010305 fluids & plasmasBifurcation theory[NLIN.NLIN-PS]Nonlinear Sciences [physics]/Pattern Formation and Solitons [nlin.PS]NagumoLattice (order)0103 physical sciences[ NLIN.NLIN-PS ] Nonlinear Sciences [physics]/Pattern Formation and Solitons [nlin.PS][PHYS.COND.CM-DS-NN]Physics [physics]/Condensed Matter [cond-mat]/Disordered Systems and Neural Networks [cond-mat.dis-nn]010306 general physicsEngineering (miscellaneous)Nonlinear Sciences::Pattern Formation and SolitonsBifurcationMathematicsCouplingApplied MathematicsNonlinear latticeneural networks[SPI.TRON]Engineering Sciences [physics]/Electronics[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsNonlinear systemClassical mechanicsModeling and SimulationNonlinear dynamics
researchProduct

Protein Interaction Networks in Health and Disease

2016

protein networkdiseaseEditorialPhysiologysystems biologyprotein functionprotein interactionsFrontiers in Genetics
researchProduct

An Analysis of the Flow-Based Fast Handover Method For Mobile IPv6 Network

2006

Mobile IPv6 has been proposed by the IETF (Internet Engineering Task Force) to be the solution to mobility management in IPv6 network. The work is now culminating to a standard status. But, one problem still remaining is the length of the handover time, which might cause packet loss. Thus the handover time should be as short as possible. Especially the real-time traffic suffers from packet loss. Earlier we have introduced a new method for faster handover process in Mobile IPv6 network called the Flow-based Fast Handover Method for Mobile IPv6 (FFHMIPv6). FFHMIPv6 uses the flow state information stored in the routers for the fast redirection of the flow. In this paper we compare the proposed…

protokollatFFHMIPv6langaton tiedonsiirtowirelessComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMIPv6Mobile IPv6tiedonsiirtohandover
researchProduct

Scheduling under the network of temporo-spatial proximity relationships

2017

We discuss and introduce to the schedulingeld a novel, qualitative optimization model - scheduling under the network of temporo-spatial proximity relationships.We introduce a half perimeter proximity measure as an objective of scheduling.We present and evaluate an incremental Sequence Pair neighborhood evaluation algorithm, applicable to both scheduling and rectangle packing problems in VLSI industry. In this paper, we discuss and introduce to the scheduling field a novel optimization objective - half perimeter proximity measure in scheduling under the network of temporo-spatial proximity relationships. The presented approach enables to qualitatively express various reasons of scheduling ce…

proximity relationshipsMathematical optimizationGeneral Computer Sciencerectangle packing problemEvaluation algorithm0102 computer and information sciences02 engineering and technologyIntegrated circuitManagement Science and Operations Research01 natural scienceslaw.inventionScheduling (computing)lawApproximation error0202 electrical engineering electronic engineering information engineeringschedulingComputer Science::Operating SystemsMathematicsVery-large-scale integrationProximity measureneighborhood evaluation010201 computation theory & mathematicsModeling and Simulation020201 artificial intelligence & image processingsequence pairRectangle packingComputers & Operations Research
researchProduct

AMMINISTRAZIONE PUBBLICA E SISTEMI DI INTELLIGENZA ARTIFICIALE: ALCUNE RIFLESSIONI

2022

This paper aims to examine how public administrations tend to use artificial intelligence systems, in the light of the legal framework and jurisprudential developments. Taking the cue from a distinction between the cases in which the aforementioned systems support the administrative decision and those in which they tend to replace the ‘human decider’ it intends to point out the utility of a distinction between administration for measures and performance administration, for the purposes of allocating responsibilities for eventually produced damage

public administration artificial intelligence systems responsibilitySettore IUS/10 - Diritto Amministrativo
researchProduct

Ultrafast Interface Charge Separation in Carbon Nanodot-Nanotube Hybrids

2021

Carbon dots are an emerging family of zero-dimensional nanocarbons behaving as tunable light harvesters and photoactivated charge donors. Coupling them to carbon nanotubes, which are well-known electron acceptors with excellent charge transport capabilities, is very promising for several applications. Here, we first devised a route to achieve the stable electrostatic binding of carbon dots to multi- or single-walled carbon nanotubes, as confirmed by several experimental observations. The photoluminescence of carbon dots is strongly quenched when they contact either semiconductive or conductive nanotubes, indicating a strong electronic coupling to both. Theoretical simulations predict a favo…

pump probe spectroscopyNanotubeMaterials scienceCarbon nanotubeschemistry.chemical_elementCarbon nanotubeCarbon nanodotsPhotoinduced electron transferlaw.inventionCondensed Matter::Materials ScienceElectron transferlawUltrafast laser spectroscopyGeneral Materials Sciencecarbon nanodotsNATURAL sciences & mathematicsCarbon nanohybridschemistry.chemical_classificationcarbon nanotubesbusiness.industryElectron acceptorCondensed Matter::Mesoscopic Systems and Quantum Hall EffectPump probe spectroscopyUltrafast electron transferultrafast electron transferchemistrycarbon nanohybridsOptoelectronicsddc:500NanodotbusinessCarbonResearch Article
researchProduct

System for Executing Encrypted Java Programs

2017

pääsynvalvontavirtualisointiJavaComputer sciencetrusted computing02 engineering and technologycomputer.software_genreEncryptionReal time Java020204 information systems0202 electrical engineering electronic engineering information engineeringtietoturvahypervisorJava appletcomputer.programming_languageta113Programming languagebusiness.industrystrictfp020207 software engineeringvirtualizationJava concurrencyremote attestationbusinesscomputerJava annotationJavaProceedings of the 3rd International Conference on Information Systems Security and Privacy
researchProduct

Explainable Fuzzy AI Challenge 2022 : Winner’s Approach to a Computationally Efficient and Explainable Solution

2022

An explainable artificial intelligence (XAI) agent is an autonomous agent that uses a fundamental XAI model at its core to perceive its environment and suggests actions to be performed. One of the significant challenges for these XAI agents is performing their operation efficiently, which is governed by the underlying inference and optimization system. Along similar lines, an Explainable Fuzzy AI Challenge (XFC 2022) competition was launched, whose principal objective was to develop a fully autonomous and optimized XAI algorithm that could play the Python arcade game “Asteroid Smasher”. This research first investigates inference models to implement an efficient (XAI) agent using rule-based …

päättelyoptimointifuzzy systemsTSKalgoritmiikkaälykkäät agentitsumea logiikkatekoälyAI agentsMamdani inference systemexplainable AI
researchProduct

AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks

2023

The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…

quantum encryptioncyber threatedge-intelligence systemscyber-attacksAI-based analysingtekoälykyberturvallisuusverkkohyökkäykset
researchProduct