network manipulation
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 4)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 118 (20) ◽  
pp. e2022659118
Author(s):  
Zifang Zhao ◽  
Claudia Cea ◽  
Jennifer N. Gelinas ◽  
Dion Khodagholy

Responsive neurostimulation is increasingly required to probe neural circuit function and treat neuropsychiatric disorders. We introduce a multiplex-then-amplify (MTA) scheme that, in contrast to current approaches (which necessitate an equal number of amplifiers as number of channels), only requires one amplifier per multiplexer, significantly reducing the number of components and the size of electronics in multichannel acquisition systems. It also enables simultaneous stimulation of arbitrary waveforms on multiple independent channels. We validated the function of MTA by developing a fully implantable, responsive embedded system that merges the ability to acquire individual neural action potentials using conformable conducting polymer-based electrodes with real-time onboard processing, low-latency arbitrary waveform stimulation, and local data storage within a miniaturized physical footprint. We verified established responsive neurostimulation protocols and developed a network intervention to suppress pathological coupling between the hippocampus and cortex during interictal epileptiform discharges. The MTA design enables effective, self-contained, chronic neural network manipulation with translational relevance to the treatment of neuropsychiatric disease.


Author(s):  
Thangavel M. ◽  
Pavithra V. ◽  
Guru Roja R.

Network scanning commonly implies the use of the computer network to collect information about the target systems. This type of scanning is performed by hackers for attacking the target and also by the system administrators for assessment of security and maintaining the system. Network scanning mainly analyzes the UDP and TCP network services that are running on the target, the operating system that is used by the target, and the security systems that are placed between the user and targeted hosts. Network scanning includes both the network port scanning and vulnerability scanning. Network manipulation is an effort that is made by the user to modify the network or structure of a network and thus using online network tools to achieve the target. Software-defined networking is a term that comprises several network technologies with the aim of making it adapt the features of flexibility. Key terms for SDN implementation include separation of functionality, virtualization in the network, and configuring programmatically. This chapter explores network manipulation using network scanning in SDN.


2018 ◽  
Vol 6 (7) ◽  
pp. 8875-8881 ◽  
Author(s):  
Hongwei Guo ◽  
Congcong Zhao ◽  
Jian Xu ◽  
Yuxuan Gong ◽  
Mariano Velez ◽  
...  

2017 ◽  
Vol 36 (2) ◽  
pp. 400-420 ◽  
Author(s):  
M. Rosie Shrout ◽  
Daniel J. Weigel

Two studies were conducted to test a conceptual model that expands upon the roles of attribution and forgiveness after a partner’s infidelity by integrating concepts from social network approval and attribution information selection (AIS) to examine how noninvolved partners in dating relationships decide to stay in or leave their relationships. Using a serial mediation model, we examined whether perceived social network approval was indirectly related to noninvolved partners’ relationship decisions sequentially through AIS, attributions, and forgiveness after a hypothetical infidelity (Study 1) and an actual infidelity (Study 2). In Study 1, 198 participants imagined their partners cheated on them and then were randomly assigned into one of two groups for a social network manipulation. In Study 2, 115 participants whose partners had recently engaged in infidelity reported on their experiences. Both studies supported the serial decision-making model, indicating that perceived social network approval, AIS, attributions, and forgiveness serially impact noninvolved partners’ relationship decisions following infidelity.


2016 ◽  
Author(s):  
E. Ronzitti ◽  
R. Conti ◽  
E. Papagiakoumou ◽  
D. Tanese ◽  
V. Zampini ◽  
...  

ABSTRACTOptogenetic neuronal network manipulation promises to at last unravel a long-standing mystery in neuroscience: how does microcircuit activity causally relate to behavioral and pathological states? The challenge to evoke spikes with high spatial and temporal complexity necessitates further joint development of light-delivery approaches and custom opsins. Two-photon scanning and parallel illumination strategies applied to ChR2- and C1V1-expressing neurons demonstrated reliable, in-depth generation of action potentials both in-vitro and in-vivo, but thus far lack the temporal precision necessary to induce precisely timed spiking events. Here, we show that efficient current integration enabled by two-photon holographic amplified laser illumination of Chronos, a highly light-sensitive and fast opsin, can evoke spikes with submillisecond precision and repeated firing up to 100 Hz. These results pave the way for optogenetic manipulation with the spatial and temporal sophistication necessary to mimic natural microcircuit activity.


2015 ◽  
Vol 438 ◽  
pp. 124-131 ◽  
Author(s):  
Qikai Niu ◽  
An Zeng ◽  
Ying Fan ◽  
Zengru Di

Sign in / Sign up

Export Citation Format

Share Document