signal approach
Recently Published Documents


TOTAL DOCUMENTS

98
(FIVE YEARS 5)

H-INDEX

12
(FIVE YEARS 0)

Author(s):  
Bohdan Shevchuk ◽  
Mykhaylo D Geraimchuk ◽  
Orest Ivakhiv ◽  
Yuriy Brayko

The components of technologies of increasing information and energy efficiency of IoT monitoring networks subscriber systems with protected transfer functioning of reliable packets of information with the increased information capacity are described. In the places of formation of network flows, i.e. in the places of installation of object and on-board systems the realization of a complex of adaptive filtering algorithms, compression and protection of samples of monitoring signals and video data frames with the subsequent adaptive formation and transmission of highly informative code-signal sequences is offered. It is proposed a signal approach as a basis for inputting and compact coding of signals and video data frames of the reliable samples. The signal approach is proposed, according to which the amplitude-time or amplitude-number parameters of the most informative samples of signals and video signals are determined in the rate of input of monitoring data. These are extremes and points of inflection or points of curve movement change. The obtained data are subject to data compression with controlled information loss and lossless compression-protection. According to the proposed information technology for building effective IoT networks for crypto protection of monitoring data arrays by processors of object and on-board systems, the use of disposable ciphers is proposed, which are the rules and parameters for generating crypto-resistant pseudo-random data arrays of a certain length. These rules and parameters are known only to the subscriber-transmitter and the subscriber-receiver of information packets and are used by network subscribers in the process of data compression with losses and without losses, in the process of crypto-resistant and noise-resistant information packets forming of limited duration with increased information capacity. Energy-efficient data packet transmission is based on a significant reduction in the output streams of protected highly informative monitoring data packets and the implementation by object and on-board systems processors a set of algorithms for processing, encoding, encrypting and transmitting data minimized by computational complexity.


2020 ◽  
Vol 6 (47) ◽  
pp. eabc9920
Author(s):  
T. Kim ◽  
N. Shen ◽  
J.-C. Hsiang ◽  
K.P. Johnson ◽  
D. Kerschensteiner

Approaching predators cast expanding shadows (i.e., looming) that elicit innate defensive responses in most animals. Where looming is first detected and how critical parameters of predatory approaches are extracted are unclear. In mice, we identify a retinal interneuron (the VG3 amacrine cell) that responds robustly to looming, but not to related forms of motion. Looming-sensitive calcium transients are restricted to a specific layer of the VG3 dendrite arbor, which provides glutamatergic input to two ganglion cells (W3 and OFFα). These projection neurons combine shared excitation with dissimilar inhibition to signal approach onset and speed, respectively. Removal of VG3 amacrine cells reduces the excitation of W3 and OFFα ganglion cells and diminishes defensive responses of mice to looming without affecting other visual behaviors. Thus, the dendrites of a retinal interneuron detect visual threats, divergent circuits downstream extract critical threat parameters, and these retinal computations initiate an innate survival behavior.


2020 ◽  
Vol 123 ◽  
pp. 108-117
Author(s):  
Mirto Musci ◽  
Giacomo Parigi ◽  
Virginio Cantoni ◽  
Marco Piastra

2020 ◽  
Author(s):  
Nordiana Mohd Muztaza ◽  
Rosli Saad ◽  
Mokhtar Saidin ◽  
Kiu Yap Chong

Author(s):  
Efren V. Herrera ◽  
Katherine G. Molina ◽  
Edgar M. Vela ◽  
Dennys D. Cortez ◽  
Luis E. Herrera ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document