plane analysis
Recently Published Documents


TOTAL DOCUMENTS

501
(FIVE YEARS 82)

H-INDEX

36
(FIVE YEARS 4)

2022 ◽  
Author(s):  
Li Li ◽  
Zhiguo Zhao ◽  
Huaguang Gu

Abstract Post-inhibitory rebound (PIR) spike, which has been widely observed in diverse nervous systems with different physiological functions and simulated in theoretical models with class 2 excitability, presents a counterintuitive nonlinear phenomenon in that the inhibitory effect can facilitate neural firing behavior. In this study, a PIR spike induced by inhibitory stimulation from the resting state corresponding to class 3 excitability that is not related to bifurcation is simulated in the Morris-Lecar neuron. Additionally, the inhibitory self-feedback mediated by an autapse with time delay can evoke tonic/repetitive spiking from phasic/transient spiking. The dynamical mechanism for the PIR spike and the tonic/repetitive spiking is acquired with the phase plane analysis and the shape of the quasi-separatrix curve. The result extends the counterintuitive phenomenon induced by inhibition to class 3 excitability, which presents a potential function of inhibitory autapse and class 3 neuron in many neuronal systems such as the auditory system.


Author(s):  
Xiaoshan Huang ◽  
Shenquan Liu ◽  
Pan Meng ◽  
Jie Zang

This paper mainly studied firing patterns and related bifurcations in the Purkinje cell dendrite model. Based on the methods of equivalent potentials and time scale analysis, the initial six-dimensional (6D) dendrite model is reduced to a 3D form to facilitate the calculation. We numerically show that the dendrite model could exhibit period-adding bifurcation and four bursting patterns for several vital parameters. Then the bifurcation mechanisms and transition of these four bursting patterns are discussed by phase plane analysis, and two-parameter bifurcation analysis of the fast subsystem, respectively. Moreover, we computed the first Lyapunov coefficient to determine the stability of Hopf bifurcation. Ultimately, we analyzed the codimension-two bifurcation of the whole system and gave a detailed theoretical derivation of the Bogdanov–Takens bifurcation.


2022 ◽  
Vol 2160 (1) ◽  
pp. 012070
Author(s):  
Guiyun Huang ◽  
Yong Li ◽  
Jian Cui

Abstract The article elaborates the significance of the cutting feature in different ways, the shape structure and modeling approach of cutting feature are analyzed through examples. The modeling method is summarized: 1) According to the projection relation, the wire frame is separated. According to the projection of view, the positional relation of each plane is analysed, the corresponding plane of the wireframe is determined the shape of the cut is clarified. This is the key to deciding whether the modeling can be completed successfully. 2) By imagining the shape, the position and order are determined. By line-plane analysis and dimensioning, the cutting position and order of the surface are determined, and the shape and structure after cutting are clarified. This is an important basis for rapid modelling. 3)Thinking overall. Repeatedly compare the shape with the views, and comprehensively check to ensure that the feature position of the shape is clear, the shape is accurate, and the structure is complete.


2021 ◽  
Author(s):  
Jingbai Li ◽  
Steven Lopez

The photochemistry of benzene is complex and non-selective because numerous mechanistic pathways are accessible in the ground- and excited-states. Fluorination is a known strategy to increase the chemoselectivities for Dewar-benzenes via 4π-disrotatory electrocyclization. However, the origin of the chemo- and regioselectivities of fluorobenzenes remains unexplained because of experimental limitations in resolving the excited-state structures on ultrafast timescales. The computational cost of multiconfigurational nonadiabatic molecular dynamics simulations is also generally prohibitive. We now provide high-fidelity structural information and reaction outcome predictions with machine-learning-accelerated photodynamics simulations of a series of fluorobenzenes, C6F6-nHn, n=0–3 to study their S1→S0 decay in 4 ns. We trained neural networks with XMS-CASPT2(6,7)/aug-cc-pVDZ calculations, which reproduced the S1 absorption features with mean absolute errors of 0.04 eV (< 2 nm). The predicted S1 excited-state lifetimes for C6F4H2, C6F6, C6F5H, and C6F3H3 are 64, 40, 18, and 8 ps, respectively. The trend is in excellent agreement with the experimental lifetimes. Our calculations show that the pseudo Jahn-Teller distortions create the S1 minimum region that prolongs the excited-state lifetime of fluorobenzenes. The pseudo Jahn-Teller distortions reduce when fluorination decreases. Characterization of the surface hopping structures suggests that the S1 relaxation first involves a cis-trans isomerization of a 𝜋C-C-bond in the benzene ring, promoted by the pseudo-Jahn-Teller distortions. A branching plane analysis revealed that the conical intersections favoring 4π-electrocyclization are less energetically accessible through the S1 relaxation; lower-energy conical intersections resemble the reactant and favor reversion.


2021 ◽  
Vol 1 (4) ◽  
pp. 704-743
Author(s):  
Moses Ashawa ◽  
Sarah Morris

The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily. While malware classification and detection tools are being developed to fight malware infection, hackers keep deploying different infection strategies, including permissions usage. Among mobile platforms, Android is the most targeted by malware because of its open OS and popularity. Permissions is one of the major security techniques used by Android and other mobile platforms to control device resources and enhance access control. In this study, we used the t-Distribution stochastic neighbor embedding (t-SNE) and Self-Organizing Map techniques to produce a visualization method using exploratory factor plane analysis to visualize permissions correlation in Android applications. Two categories of datasets were used for this study: the benign and malicious datasets. Dataset was obtained from Contagio, VirusShare, VirusTotal, and Androzoo repositories. A total of 12,267 malicious and 10,837 benign applications with different categories were used. We demonstrate that our method can identify the correlation between permissions and classify Android applications based on their protection and threat level. Our results show that every permission has a threat level. This signifies those permissions with the same protection level have the same threat level.


2021 ◽  
Vol 19 (6) ◽  
pp. 970-983
Author(s):  
Marcellin Nonti ◽  
Kolawole Kegnide Damien Adjai ◽  
Jean Akande ◽  
Marc Delphin Monsia

In this paper we present a general class of differential equations of Ermakov-Pinney type which may serve as truly nonlinear oscillators. We show the existence of periodic solutions by exact integration after the phase plane analysis. The related quadratic Lienard type equations are examined to show for the first time that the Jacobi elliptic functions may be solution of second-order autonomous non-polynomial differential equations.


2021 ◽  
Author(s):  
Edward J Hancock ◽  
Scott D Zawieja ◽  
Charlie Macaskill ◽  
Michael J Davis ◽  
Christopher D Bertram

Lymphoedema develops due to chronic dysfunction of the lymphatic vascular system which results in fluid accumulation between cells. The condition is commonly acquired secondary to diseases such as cancer or the therapies associated with it. The primary driving force for fluid return through the lymphatic vasculature is provided by contractions of the muscularized lymphatic collecting vessels, driven by electrical oscillations. However, there is an incomplete understanding of the molecular and bioelectric mechanisms involved in lymphatic muscle cell excitation, hampering the development and use of pharmacological therapies. Modelling in silico has contributed greatly to understanding the contributions of specific ion channels to the cardiac action potential, but modelling of these processes in lymphatic muscle remains limited. Here, we propose a model of oscillations in the membrane voltage (M-clock) and intracellular calcium concentrations (C-clock) of lymphatic muscle cells. We modify a model by Imtiaz and colleagues to enable the M-clock to drive the C-clock oscillations. This approach differs from typical models of calcium oscillators in lymphatic and related cell types, but is required to fit recent experimental data. We include an additional voltage dependence in the gating variable control for the L type calcium channel, enabling the M-clock to oscillate independently of the C-clock. We use phase-plane analysis to show that these M-clock oscillations are qualitatively similar to those of a generalised FitzHugh-Nagumo model. We also provide phase plane analysis to understand the interaction of the M-clock and C-clock oscillations. The model and methods have the potential to help determine mechanisms and find targets for pharmacological treatment of lymphoedema.


Author(s):  
Fang Ma ◽  
Qingju Fan ◽  
Guang Ling

In this study, we explore the subtle temporal structure of environmental data using symbolic information-theory approach. The newly developed multivariate multiscale permutation entropy and complexity-entropy causality plane methodology are applied to the six pollutants data recorded in Beijing during 2013–2016, which is a powerful tool to discriminate nonlinear deterministic and stochastic dynamics. The obtained results showed that pollutant series exhibit significant randomness and a lower level of predictability in spring and summer, and more temporal correlations in winter and fall. In addition, surrogate analysis is implemented to avoid biased conclusion. We also define the relative complexity measure of multivariate series to reflect the complexity of a system. The highest relative complexity in winter is in line with the physical behavior of the pollution phenomenon.


Sign in / Sign up

Export Citation Format

Share Document