scholarly journals Dynamic Information Encoding With Dynamic Synapses in Neural Adaptation

Author(s):  
Luozheng Li ◽  
Yuanyuan Mi ◽  
Wenhao Zhang ◽  
Da-Hui Wang ◽  
Si Wu
1992 ◽  
Vol 35 (4) ◽  
pp. 892-902 ◽  
Author(s):  
Robert Allen Fox ◽  
Lida G. Wall ◽  
Jeanne Gokcen

This study examined age-related differences in the use of dynamic acoustic information (in the form of formant transitions) to identify vowel quality in CVCs. Two versions of 61 naturally produced, commonly occurring, monosyllabic English words were created: a control version (the unmodified whole word) and a silent-center version (in which approximately 62% of the medial vowel was replaced by silence). A group of normal-hearing young adults (19–25 years old) and older adults (61–75 years old) identified these tokens. The older subjects were found to be significantly worse than the younger subjects at identifying the medial vowel and the initial and final consonants in the silent-center condition. These results support the hypothesis of an age-related decrement in the ability to process dynamic perceptual cues in the perception of vowel quality.


1997 ◽  
Author(s):  
James J. Jenkins ◽  
Winifred Strange ◽  
Sonja A. Trent
Keyword(s):  

2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


2006 ◽  
Author(s):  
Donald Perlis ◽  
Michael Anderson ◽  
Darsana Josyula ◽  
Waiyian Chong ◽  
Scott Fults

Sign in / Sign up

Export Citation Format

Share Document