Chaotic analysis and modeling methods were applied to a small collection of healthy individuals' sleeping EEGs in order to establish whether a common representational space could be discovered for use in comparative analysis. Common challenges were encountered and dealt with in a practical manner. The methods used and the choices made in this effort are described herein. The authors observe and describe a common representation, obtained from a delay coordinate embedding, that should be usable for comparative analysis leading to clinical utility.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/IEMBS.2006.259999 | DOI Listing |
Theor Popul Biol
December 2024
School of Mathematics, Sun Yat-sen University, Guangzhou, 510275, PR China.
This paper considers Lotka-Volterra competitive systems characterizing laboratory experiment by Hu et al. (Science, 378:85-89, 2022). Using dynamical systems theory and projection method, we give theoretical analysis and numerical simulation on the model with four species by demonstrating equilibrium stability, periodic oscillation and chaotic fluctuation in the systems.
View Article and Find Full Text PDFUnlabelled: Considering the similarity in clinical presentations of iris neoplasms of various origins, questions of their noninvasive diagnosis remain relevant. Optical coherence tomography angiography (OCT-A) is one of the imaging method that enables visualization of tumor vessels.
Purpose: This article examines the features of angioarchitecture, vascular network density, and perfusion density of iris melanoma and progressive iris nevus using OCT-A.
Sci Rep
December 2024
Electronic Engineering College, Heilongjiang University, Harbin, 150080, China.
With the rapid development of the semiconductor industry, Hardware Trojans (HT) as a kind of malicious function that can be implanted at will in all processes of integrated circuit design, manufacturing, and deployment have become a great threat in the field of hardware security. Side-channel analysis is widely used in the detection of HT due to its high efficiency, non-contact nature, and accuracy. In this paper, we propose a framework for HT detection based on contrastive learning using power consumption information in unsupervised or weakly supervised scenarios.
View Article and Find Full Text PDFSci Rep
December 2024
Department of Computer Science, Faculty of Computers and Information, Suez University, P.O. Box 43221, Suez, Egypt.
Developing robust and secure image encryption methods for transmitting multiple images in batches over unprotected networks has become imperative. This necessity arises from the limitations of single-image encryption techniques in managing the escalating volume of extensive data. This paper introduces a novel three-layer multiple-image encryption (MIE) technique to encrypt batch images based on three 2D-chaotic maps.
View Article and Find Full Text PDFCogn Neurodyn
December 2024
Department of Electronics and Communication Engineering, Vemu Institute of Technology, Chittoor, India.
The studies conducted in this contribution are based on the analysis of the dynamics of a homogeneous network of five inertial neurons of the Hopfield type to which a unidirectional ring coupling topology is applied. The coupling is achieved by perturbing the next neuron's amplitude with a signal proportional to the previous one. The system consists of ten coupled ODEs, and the investigations carried out have allowed us to highlight several unusual and rarely related dynamics, hence the importance of emphasizing them.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!