2012 ◽  
Vol 71 (5) ◽  
pp. 445-453
Author(s):  
M. D. Rasnikov ◽  
I. T. Rozhkov

Circuit World ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Chiemeka Loveth Maxwell ◽  
Dongsheng Yu ◽  
Yang Leng

Purpose The purpose of this paper is to design and construct an amplitude shift keying (ASK) modulator, which, using the digital binary modulating signal, controls a floating memristor emulator (MR) internally without the need for additional control circuits to achieve the ASK modulated wave. Design/methodology/approach A binary digital unipolar signal to be modulated is converted by a pre-processor circuit into a suitable bipolar modulating direct current (DC) signal for the control of the MR state, using current conveyors the carrier signal’s amplitude is varied with the change in the memristance of the floating MR. A high pass filter is then used to remove the DC control signal (modulating signal) leaving only the modulated carrier signal. Findings The results from the experiment and simulation are in agreement showed that the MR can be switched between two states and that a change in the carrier signals amplitude can be achieved by using an MR. Thus, showing that the circuit behavior is in line with the proposed theory and validating the said theory. Originality/value In this paper, the binary signal to be modulated is modified into a suitable control signal for the MR, thus the MR relies on the internal operation of the modulator circuit for the control of its memristance. An ASK modulation can then be achieved using a floating memristor without the need for additional circuits or signals to control its memristance.


1998 ◽  
Vol 80 (6) ◽  
pp. 3163-3172 ◽  
Author(s):  
Rukmini Rao-Mirotznik ◽  
Gershon Buchsbaum ◽  
Peter Sterling

Rao-Mirotznik, Rukmini, Gershon Buchsbaum, and Peter Sterling. Transmitter concentration at a three-dimensional synapse. J. Neurophysiol. 80: 3163–3172, 1998. At intensities from starlight to 1000-fold brighter, the mammalian rod synapse transmits a binary signal, the capture of 0 or 1 photon. Zero is signified by tonic exocytosis, and 1 is signified by a brief pause. The synapse is three dimensional: vesicles discharge at the apex of a deep cleft created by the invagination of four postsynaptic processes. Two horizontal cell spines bearing α-amino-3-hydroxy-5-methyl-4-isoxazolepropionic acid (AMPA) receptors reach near to the release sites (16 nm), and two bipolar dendrites bearing mGluR6 receptors end far from the release sites (up to 640 nm). We considered two hypotheses for signal transfer: transmitter quanta might be integrated in the cleft and sensed as a steady concentration (high for 0 and low for 1); or quanta might be sensed at the postsynaptic membrane as discrete postsynaptic potentials (PSPs) and integrated within the dendrite. We calculate from a passive diffusion model that the invagination empties rapidly (τ ∼ 1.7 ms). Further calculations suggest that a glutamate concentration high enough to hold a bipolar cell in darkness at one end of its response range would require ∼4,000 vesicles/s. On the other hand, the glutamate pulse from a single vesicle would reach both nearby AMPA receptors (low affinity) and distant mGluR6 receptors (high affinity) at spatiotemporal concentrations matched to their apparent binding affinities. Thus one vesicle could evoke a discrete PSP in all four postsynaptic processes. We calculate from a stochastic model that PSPs could transfer the binary signal at ∼100 vesicles/s. Thus dendritic integration of unitary PSPs is both plausible and 40-fold more efficient than the alternative mechanism. The rod's deep invagination, rather than serving to pool transmitter, may serve to prevent “spillover” of transmitter to neighboring rods. Spillover, by pooling the noise from neighboring rods, would impair transmission of their binary signals.


2005 ◽  
Vol 13 (13) ◽  
pp. 5100 ◽  
Author(s):  
Byungjik Kim ◽  
Jichai Jeong ◽  
Jaehoon Lee ◽  
Hanlim Lee ◽  
Hoon Kim ◽  
...  

Author(s):  
Miao Kong ◽  
Jianjun Yu ◽  
Junwen Zhang ◽  
Kaihui Wang ◽  
Mingming Zhao ◽  
...  

2008 ◽  
Vol 18 (02) ◽  
pp. 567-575 ◽  
Author(s):  
DONATELLO MATERASSI ◽  
MICHELE BASSO

The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preserving its phase portrait. Exploiting this property, a chaos encryption technique to transmit a binary signal through an analog channel is proposed. The scheme is based on a suitable time-scaling function which plays the role of a private key. The encoded transmitted signal is proved to resist known decryption attacks offering a secure and reliable communication.


2019 ◽  
Vol 34 (4) ◽  
Author(s):  
Anna Weichselbraun

In the world of global politics, talk is cheap. States sign negotiated agreements, but a treaty without an enforcement mechanism is considered weak, because states are not expected to adhere to commitments whose materiality is merely that of ink and paper. To verify the terms of state commitments to the Treaty on the Non-proliferation of Nuclear Weapons, which entered into force in 1970, International Atomic Energy Agency (IAEA) nuclear safeguards inspectors place tamper-evident seals in nuclear facilities. While seals appear to work simply as a binary signal, their meanings are multivalent. This article draws on fieldwork at the IAEA, and on broken seals in Iran between 2004 and 2006 that escalated into an international crisis, to examine the relationship between the material properties of the seal and its signifying potentialities. Bringing the perspective of semiotic ontology to the question of materiality, this essay argues that seals constitute a semiotic infrastructure of nuclear governance that materializes international law.


2008 ◽  
Vol 18 (06) ◽  
pp. 527-545 ◽  
Author(s):  
PETRO GOPYCH

On the basis of recent binary signal detection theory (BSDT), optimal recognition algorithms for complex images are constructed and their optimal performance are calculated. A methodology for comparing BSDT predictions and measured human performance is developed and applied to explaining particular face recognition experiment. The BSDT makes possible computer codes with recognition performance better than that in humans, its fundamental discreteness is consistent with the experiment. Related neurobiological and behavioral effects are briefly discussed.


Sign in / Sign up

Export Citation Format

Share Document