Robustness of Persistent Firing in a minimal recurrent network of Working memory
The minimal model network comprising 2 QIF neurons that reciprocally excite each other and form a kind of neural oscillator, simulating the persistent activity of cortical delay selective neurons in a WM task. The effect of random perturbations.
Подобные документы
The article considers an example that contains the main features of a relational database - tabular representation, primary key, foreign key. It is shown that this database is completely described by the new format. A comma-separated values (CSV) files.
статья, добавлен 06.07.2023Автоматизация построения синтаксически и семантически правильной имитационной модели. Математическая теория систем массового обслуживания; модели Queue Network. Проверка синтаксической правильности модели в статье; использование графовой грамматики.
статья, добавлен 26.04.2019Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.
статья, добавлен 25.03.2016The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.
статья, добавлен 18.09.2018- 55. Memory Basics
Memory Definitions. Memory Block Diagram. Memory Organization Example. Basic Memory Operations. Timing of signal changes and data observation. RAM Integrated Circuits. Cell Arrays and Coincident Selection. Storage of information on different capacitors.
презентация, добавлен 03.06.2012 International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014- 57. The bias of the initial information flows intensities estimates of the global cyber-physical network
Forecasting the development of the statistical reporting network. Improving the accuracy of predicting the development of the Internet of things in the context of the dynamics of primary information flows. Deterministic models of mathematical programming.
статья, добавлен 07.09.2022 Анализ особенностей системы Neural-Network-Driven Fuzzy Reasoning (NNDFR) и рассмотрение вариантов ее оптимизации. Разработка программного модуля для реализации алгоритма системы NNDFR. Применение системы для решения задач регрессионного прогнозирования.
дипломная работа, добавлен 30.08.2016The concept and structure of telecommunications, their latest achievements and prospects. Trends in the field of telecommunications, networking model, the interaction of the client and the server. The types of operating systems, external utilities.
учебное пособие, добавлен 11.10.2014Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.
статья, добавлен 27.12.2016Shadow boxing – a type of training. Total automatization and gamification boxing pose. Investigating an action person. Recurrent convolutional networks for visual recognition. Corrections the performed action in program. Human pose estimation for boxing.
дипломная работа, добавлен 07.12.2019Giant and Tunnel Magnetoresistance. Ferromagnetic and spacer layer of synthetic antiferromagnetic. Future MRAM Improvements. 16-Mbit MRAM with a 180 nm lithographic process. The next-generation MRAM that is said to operate with write cycles under 1 ns.
презентация, добавлен 03.06.2012Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.
статья, добавлен 20.01.2017Transactional memory, the interface matters. Programmability is the key motivation for transactional memory. Processors support small (few memory operations) easily. Unlimited transactions are convenient for software. Virtualize transactional memory.
презентация, добавлен 03.06.2012The comprehensive analysis of the American concept of threats to information security and determination of priority areas of the US’s activity in creating a secure national cyberspace. The number of incidents related to computer systems and networks.
статья, добавлен 15.04.2024- 66. Task models
Methods to analyse people's jobs. Approaches to task analysis. Development of the script processing, review grammar. Description of the procedure subtasks, hierarchical evaluation tasks using temporary operators. Refinement description of the model.
лекция, добавлен 28.12.2013 Vector computers, main memory background. Multilevel caches, a typical memory hierarchy. Core memory, semiconductor memory, DRAM. Fast hit times via trace cache. Increasing cache bandwidth by pipelining, non-blocking caches. Merging arrays example.
презентация, добавлен 03.06.2012Target Server Memory Pool. A pool of memory on the target reserved for use by the Tornado tools. The target server manages the pool, keeping overhead such as block lists on the host. Additional memory is allocated from the system memory pool if needed.
презентация, добавлен 03.06.2012The model of the turbulent boundary layer over a rough surface is presented. The roughness density effect on the shift of the mean velocity logarithmic profile has been estimated in the case of 2D and 3D roughness elements. Surface layer transformation.
статья, добавлен 27.04.2017UNIX Memory Management. Sharing of memory segments or regions. Allocating memory in pages. Address space management. Initial Access to Pages. Hardware Translation Tables. Hardware Requirements. Mappings between backing store and address regions.
презентация, добавлен 03.06.2012A problem of binary pseudo random sequences creation of cryptographic security system for sequences of maximal length, with static characteristics. The questions of Galois and Fibonacci of creation primitive matrices random size over the simple field.
статья, добавлен 22.12.2016- 72. Internal Memory
Semiconductor Memory Types. Memory Cell Operation. Dynamic and Static RAM. DRAM Operation. SRAM v DRAM. Read Only Memory (ROM). Organisation in detail. Interleaved Memory, Error Correction. Synchronous DRAM (SDRAM) and RAMBUS. DDR SDRAM Read Timing.
презентация, добавлен 03.06.2012 One of the basic primitives in cryptography and of computer science is a pseudo-random generator. The number of important applications, including the construction of a private provably secure key cryptosystem. The construct a pseudo-random generator.
статья, добавлен 15.09.2012Cryptography in the Information Age. Information Protection Problems in Computer Systems. The Fundamentals of One-Key Cryptography. Substituion—Permutation Networks with Minimal Controlled Elements. Designing Fast Ciphers Based on Controlled Operations.
книга, добавлен 08.03.2014The results of program modeling of biological "molecular current generator" are described. Simulation was done on the base of experimental studying of electrical currents through molecular channel-receptor complex in membrane of natural brain neurons.
статья, добавлен 14.09.2016