Results 41 to 50 of about 1,150,684 (289)

Direct position determination algorithm for non‐circular sources in the presence of mutual coupling and its theoretical performance analysis

open access: yesIET Signal Processing, 2023
This article proposes a direct position determination (DPD) algorithm for non‐circular sources observed by a moving array using the self‐calibration technique in the presence of mutual coupling.
Jie Deng   +3 more
doaj   +1 more source

Information Theoretic Characterization of Uncertainty Distinguishes Surprise From Accuracy Signals in the Brain

open access: yesFrontiers in Artificial Intelligence, 2020
Uncertainty presents a problem for both human and machine decision-making. While utility maximization has traditionally been viewed as the motive force behind choice behavior, it has been theorized that uncertainty minimization may supersede reward ...
Leyla Loued-Khenissi   +2 more
doaj   +1 more source

Fermionic and Majorana Bound States in Hybrid Nanowires with Non-Uniform Spin-Orbit Interaction

open access: yes, 2014
We study intragap bound states in the topological phase of a Rashba nanowire in the presence of a magnetic field and with non-uniform spin orbit interaction (SOI) and proximity-induced superconductivity gap.
Klinovaja, Jelena, Loss, Daniel
core   +1 more source

Bandwidth Efficiency Maximization for Single-Cell Massive Spatial Modulation MIMO: An Adaptive Power Allocation Perspective

open access: yesIEEE Access, 2017
The concept of massive spatial modulation aided multiple-input multiple-output (SM-MIMO) systems, where the base station (BS) is equipped with a large number of antennas and simultaneously serves several multi-antenna users that employ SM for their ...
Longzhuang He   +3 more
doaj   +1 more source

Polynomial Bounds for Oscillation of Solutions of Fuchsian Systems [PDF]

open access: yes, 2009
We study the problem of placing effective upper bounds for the number of zeros of solutions of Fuchsian systems on the Riemann sphere. The principal result is an explicit (non-uniform) upper bound, polynomially growing on the frontier of the class of ...
Binyamini, Gal, Yakovenko, Sergei
core   +2 more sources

On Certifying Non-uniform Bound against Adversarial Attacks

open access: yes, 2019
This work studies the robustness certification problem of neural network models, which aims to find certified adversary-free regions as large as possible around data points. In contrast to the existing approaches that seek regions bounded uniformly along all input features, we consider non-uniform bounds and use it to study the decision boundary of ...
Liu, Chen   +2 more
openaire   +2 more sources

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Direction-of-Arrival Estimation Based on Variational Bayesian Inference Under Model Errors

open access: yesRemote Sensing
The current self-calibration approaches based on sparse Bayesian learning (SBL) demonstrate robust performance under uniform white noise conditions. However, their efficacy degrades significantly in non-uniform noise environments due to acute sensitivity
Can Wang   +4 more
doaj   +1 more source

Shape selection of surface-bound helical filaments: biopolymers on curved membranes

open access: yes, 2016
Motivated to understand the behavior of biological filaments interacting with membranes of various types, we study a theoretical model for the shape and thermodynamics of intrinsically-helical filaments bound to curved membranes. We show filament-surface
Gopinathan, A.   +2 more
core   +2 more sources

Non-uniform Stepping Approach to RFID Distance Bounding Problem

open access: yes, 2011
RFID systems are vulnerable to relay attacks (mafia fraud and terrorist fraud) as well as distance fraud. Several distance bounding protocols suitable to RFID systems were proposed to avoid these attacks. The common point of these protocols is to try to reduce success probability of the attacker.
Gurel, Ali Ozhan   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy