نتایج جستجو برای: desynchronization attack

تعداد نتایج: 82948  

Journal: :Developmental science 2011
Peter J Marshall Thomas Young Andrew N Meltzoff

There is increasing interest in neurobiological methods for investigating the shared representation of action perception and production in early development. We explored the extent and regional specificity of EEG desynchronization in the infant alpha frequency range (6-9 Hz) during action observation and execution in 14-month-old infants. Desynchronization during execution was restricted to cen...

2012
Shuzo Sakata Kenneth D. Harris

Cortical circuits spontaneously generate coordinated activity even in the absence of external inputs. The character of this activity depends on cortical state. We investigated how state affects the organization of spontaneous activity across layers of rat auditory cortex in vivo, using juxtacellular recording of morphologically identified neurons and large-scale electrophysiological recordings....

Journal: :E3S web of conferences 2021

This study is devoted to identifying a solution algorithm for standard fractions as one of the tasks that allow investigating level human adaptability cognitive load. The influential factor successful was number stages, and an unsuccessful - their duration. It revealed success/failure correlated with spectral power values ratio in theta- alpha-diapasons EEG. accompanied by maintenance stable th...

2010
Koen Vervaeke Andrea Lőrincz Padraig Gleeson Matteo Farinella Zoltan Nusser R. Angus Silver

Electrical synapses between interneurons contribute to synchronized firing and network oscillations in the brain. However, little is known about how such networks respond to excitatory synaptic input. To investigate this, we studied electrically coupled Golgi cells (GoC) in the cerebellar input layer. We show with immunohistochemistry, electron microscopy, and electrophysiology that Connexin-36...

Journal: :The European journal of neuroscience 2012
B C M van Wijk P J Beek A Daffertshofer

Unilateral movement is usually accompanied by ipsilateral activity in the primary motor cortex (M1). It is still largely unclear whether this activity reflects interhemispheric 'cross-talk' of contralateral M1 that facilitates movement, or results from processes that inhibit motor output. We investigated the role of beta power in ipsilateral M1 during unimanual force production. Significant ips...

2002
Jean-Pierre Talpin

The engineering of an everyday broader spectrum of systems requires reasoning on a combination of synchronous and asynchronous interaction, ranging from co-designed hardware-software architectures, multi-threaded reactive systems to distributed telecommunication applications. Stepping from the synchronous specification of a system to its distributed implementation requires to address the crucia...

Journal: :Psychophysiology 2009
Dirk J A Smit Danielle Posthuma Dorret I Boomsma Eco J C De Geus

We investigated the relationship between three electrophysiological indices of response anticipation in a spatial delayed response task with a low and high memory load manipulation: a slow cortical potential (SCP), theta desynchronization, and upper alpha synchronization. Individual differences in these three measures were examined in 531 adult twins and siblings. Heritability of the SCP at occ...

2003
K. Solanki

This paper provides a summary of our work over the past two years on robust, high-volume data hiding in images. We first present a basic framework for imageadaptive hiding, which allows selection of the coefficients in which to hide, and employs powerful “turbo-like” erasures and errors codes in a novel manner to prevent desynchronization of encoder and decoder due to selective embedding. This ...

2002
Robert Bäuml Joachim J. Eggers Roman Tzschoppe Johannes B. Huber

Digital watermarking has been proposed for the copyright protection of multimedia documents, e.g., natural images, audio, video. One important unsolved problem in the field of digital watermarking is the synchronization of the watermark receiver after D/A-A/D conversion or local desynchronization attacks, e.g. StirMark’s random bending attack. In this paper, we present a channel model for water...

2010
Qingsong Yao Yong Qi Jinsong Han Jizhong Zhao Xiangyang Li Yunhao Liu

Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in large-scale RFID systems, researchers propose tree-based approaches, in which any pair of tags share a number of key components. Such designs, being efficient, often fail to achieve forward secrecy and resistance to attacks, such ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید