nonlinear operation
Recently Published Documents


TOTAL DOCUMENTS

68
(FIVE YEARS 13)

H-INDEX

12
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Yue Kris Wu ◽  
Friedemann Zenke

To rapidly process information, neural circuits have to amplify specific activity patterns transiently. How the brain performs this nonlinear operation remains elusive. Hebbian assemblies are one possibility whereby symmetric excitatory connections boost neuronal activity. However, such Hebbian amplification is often associated with dynamical slowing of network dynamics, non-transient attractor states, and pathological run-away activity. Feedback inhibition can alleviate these effects but typically linearizes responses and reduces amplification gain. At the same time, other alternative mechanisms rely on asymmetric connectivity, in conflict with the Hebbian doctrine. Here we propose nonlinear transient amplification (NTA), a plausible circuit mechanism that reconciles symmetric connectivity with rapid amplification while avoiding the above issues. NTA has two distinct temporal phases. Initially, positive feedback excitation selectively amplifies inputs that exceed a critical threshold. Subsequently, short-term plasticity quenches the run-away dynamics into an inhibition-stabilized network state. By characterizing NTA in supralinear network models, we establish that the resulting onset transients are stimulus selective and well-suited for speedy information processing. Further, we find that excitatory-inhibitory co-tuning widens the parameter regime in which NTA is possible. In summary, NTA provides a parsimonious explanation for how excitatory-inhibitory co-tuning and short-term plasticity collaborate in recurrent networks to achieve transient amplification.


2021 ◽  
Vol 17 (3) ◽  
pp. e1008013
Author(s):  
Julian Rossbroich ◽  
Daniel Trotter ◽  
John Beninger ◽  
Katalin Tóth ◽  
Richard Naud

Short-term synaptic dynamics differ markedly across connections and strongly regulate how action potentials communicate information. To model the range of synaptic dynamics observed in experiments, we have developed a flexible mathematical framework based on a linear-nonlinear operation. This model can capture various experimentally observed features of synaptic dynamics and different types of heteroskedasticity. Despite its conceptual simplicity, we show that it is more adaptable than previous models. Combined with a standard maximum likelihood approach, synaptic dynamics can be accurately and efficiently characterized using naturalistic stimulation patterns. These results make explicit that synaptic processing bears algorithmic similarities with information processing in convolutional neural networks.


2020 ◽  
Author(s):  
Julian Rossbroich ◽  
Daniel Trotter ◽  
Katalin Tóth ◽  
Richard Naud

AbstractSynaptic dynamics differ markedly across connections and strongly regulate how action potentials are being communicated. To model the range of synaptic dynamics observed in experiments, we develop a flexible mathematical framework based on a linear-nonlinear operation. This model can capture various experimentally observed features of synaptic dynamics and different types of heteroskedasticity. Despite its conceptual simplicity, we show it is more adaptable than previous models. Combined with a standard maximum likelihood approach, synaptic dynamics can be accurately and efficiently characterized using naturalistic stimulation patterns. These results make explicit that synaptic processing bears algorithmic similarities with information processing in convolutional neural networks.Author summaryUnderstanding how information is transmitted relies heavily on knowledge of the underlying regulatory synaptic dynamics. Existing computational models for capturing such dynamics are often either very complex or too restrictive. As a result, effectively capturing the different types of dynamics observed experimentally remains a challenging problem. Here, we propose a mathematically flexible linear-nonlinear model that is capable of efficiently characterizing synaptic dynamics. We demonstrate the ability of this model to capture different features of experimentally observed data.


2020 ◽  
pp. 905-912
Author(s):  
Wageda I. El Sobky ◽  
◽  
Ahmed R. Mahmoud ◽  
Ashraf S. Mohra ◽  
T. El-Garf

Human relationships rely on trust, which is the reason that the authentication and related digital signatures are the most complex and confusing areas of cryptography. The Massage Authentication Codes (MACs) could be built from cryptographic hash functions or block cipher modes of operations. Substitution-Box (S-Box) is the unique nonlinear operation in block ciphers, and it determines the cipher performance. The stronger S-Box, the stronger and more secure the algorithm. This paper focuses on the security considerations for MACs using block cipher modes of operations with the Hierocrypt-3 block cipher. the Hierocrypt-3 could be considered as a week cipher. It could be enhanced by changing its S-Box with a new one that has better performance against algebraic attack with using different modes of operations. The mathematical model for the new S-Boxes with its properties is provided. The result of this change appeared in the mirror of Average Strict Avalanche Criterion (SAC) and some other properties. SAC could be improved from 0.80469 to 0.16406. The Hierocrypt-3 could be enhanced for more security.


Photonics ◽  
2019 ◽  
Vol 6 (4) ◽  
pp. 121
Author(s):  
Juan M. Vilardy O. ◽  
Leiner Barba J. ◽  
Cesar O. Torres M.

We propose the use of the Jigsaw transform (JT) and the iterative cosine transform over a finite field in order to encrypt and decrypt images. The JT is a nonlinear operation that allows one to increase the security over the encrypted images by adding new keys to the encryption and decryption systems. The finite field is a finite set of integer numbers where the basic mathematical operations are performed using modular arithmetic. The finite field used in the encryption and decryption systems has an order given by the Fermat prime number 257. The iterative finite field cosine transform (FFCT) was used in our work with the purpose of obtaining images that had an uniform random distribution. We used a security key given by an image randomly generated and uniformly distributed. The JT and iterative FFCT was utilized twice in the encryption and decryption systems. The encrypted images presented a uniformly distributed histogram and the decrypted images were the same original images used as inputs in the encryption system. The resulting decrypted images had a high level of image quality in comparison to the image quality of the decrypted images obtained by the actual optical decryption systems. The proposed encryption and decryption systems have three security keys represented by two random permutations used in the JTs and one random image. The key space of the proposed encryption and decryption systems is larger. The previous features of the security system allow a better protection of the encrypted image against brute force and statistical analysis attacks.


Author(s):  
Ze Liu ◽  
Yingfeng Cai ◽  
Long Chen ◽  
Hai Wang ◽  
Youguo He

The license plate robust recognition algorithm in complex road scene has both theoretical and practical values. The existing license plate recognition algorithm can achieve better recognition results under ideal road scenes such as moderate light intensity, good shooting angle, and clear license plate target, but in complex road scenes such as fast speed, blurred aging of license plates, and low illumination such as rainy days, the effectiveness of the license plate recognition algorithm still needs to be improved. Based on the realistic requirements of license plate recognition algorithm and in-depth analysis of the principle of deep convolution network, we designed a deep convolution network for Chinese characters, letters, and numbers in the license plate to automatically learn the essential features of the image to make up for the limitation of the artificial feature recognition of the traditional license plate recognition algorithm. At the same time, according to the convolution kernel, downsampling, and nonlinear operation of the deep convolution network, the nonlinear abstraction ability of the license plate character feature is improved. The experimental results show that the proposed method can quickly and accurately identify the license plate character in complex road scenes. The recognition accuracy is better than the existing license plate recognition algorithm, which improves the accuracy of license plate recognition and achieves an ideal license plate recognition effect.


Sign in / Sign up

Export Citation Format

Share Document