163 research outputs found

    Integration of optogenetics with complementary methodologies in systems neuroscience

    Get PDF
    Modern optogenetics can be tuned to evoke activity that corresponds to naturally occurring local or global activity in timing, magnitude or individual-cell patterning. This outcome has been facilitated not only by the development of core features of optogenetics over the past 10 years (microbial-opsin variants, opsin-targeting strategies and light-targeting devices) but also by the recent integration of optogenetics with complementary technologies, spanning electrophysiology, activity imaging and anatomical methods for structural and molecular analysis. This integrated approach now supports optogenetic identification of the native, necessary and sufficient causal underpinnings of physiology and behaviour on acute or chronic timescales and across cellular, circuit-level or brain-wide spatial scales

    On metric dimension of cube of trees

    Full text link
    Let G=(V,E)G=(V,E) be a connected graph and dG(u,v)d_{G}(u,v) be the shortest distance between the vertices uu and vv in GG. A set S={s1,s2,,sn}V(G)S=\{s_{1},s_{2},\cdots,s_{n}\}\subset V(G) is said to be a {\em resolving set} if for all distinct vertices u,vu,v of GG, there exist an element sSs\in S such that d(s,u)d(s,v)d(s,u)\neq d(s,v). The minimum cardinality of a resolving set for a graph GG is called the {\em metric dimension} of GG and it is denoted by β(G)\beta{(G)}. A resolving set having β(G)\beta{(G)} number of vertices is named as {\em metric basis} of GG. The metric dimension problem is to find a metric basis in a graph GG, and it has several real-life applications in network theory, telecommunication, image processing, pattern recognition, and many other fields. In this article, we consider {\em cube of trees} T3=(V,E)T^{3}=(V, E), where any two vertices u,vu,v are adjacent if and only if the distance between them is less than equal to three in TT. We establish the necessary and sufficient conditions of a vertex subset of VV to become a resolving set for T3T^{3}. This helps determine the tight bounds (upper and lower) for the metric dimension of T3T^{3}. Then, for certain well-known cubes of trees, such as caterpillars, lobsters, spiders, and dd-regular trees, we establish the boundaries of the metric dimension. Further, we characterize some restricted families of cube of trees satisfying β(T3)=β(T)\beta{(T^{3})}=\beta{(T)}. We provide a construction showing the existence of a cube of tree attaining every positive integer value as their metric dimension

    Evolving Secret Sharing in Almost Semi-honest Model

    Get PDF
    Evolving secret sharing is a special kind of secret sharing where the number of shareholders is not known beforehand, i.e., at time t = 0. In classical secret sharing such a restriction was assumed inherently i.e., the the number of shareholders was given to the dealer’s algorithm as an input. Evolving secret sharing relaxes this condition. Pramanik and Adhikari left an open problem regarding malicious shareholders in the evolving setup, which we answer in this paper. We introduce a new cheating model, called the almost semi-honest model, where a shareholder who joins later can check the authenticity of share of previous ones. We use collision resistant hash function to construct such a secret sharing scheme with malicious node identification. Moreover, our scheme preserves the share size of Komargodski et al. (TCC 2016)

    Bounds on the Size of the Minimum Dominating Sets of Some Cylindrical Grid Graphs

    Get PDF
    Let γPm □ Cn denote the domination number of the cylindrical grid graph formed by the Cartesian product of the graphs Pm, the path of length m, m≥2, and the graph Cn, the cycle of length n, n≥3. In this paper we propose methods to find the domination numbers of graphs of the form Pm □ Cn with n≥3 and m=5 and propose tight bounds on domination numbers of the graphs P6 □ Cn, n≥3. Moreover, we provide rough bounds on domination numbers of the graphs Pm □ Cn, n≥3 and m≥7. We also point out how domination numbers and minimum dominating sets are useful for wireless sensor networks.</jats:p

    Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures

    Get PDF
    In this paper, we consider a special type of secret sharing scheme known as Visual Cryptographic Scheme (VCS) in which the secret reconstruction is done visually without any mathematical computation unlike other secret sharing schemes. We put forward an efficient direct construction of a visual cryptographic scheme for compartmented access structure which generalizes the access structure for threshold as well as for threshold with certain essential participants. Up to the best of our knowledge, the scheme is the first proposed scheme for compartmented access structure in the literature of visual cryptography. Finding the closed form of relative contrast of a scheme is, in general, a combinatorially hard problem. We come up with a closed form of both pixel expansion as well as relative contrast. Numerical evidence shows that our scheme performs better in terms of both relative contrast as well as pixel expansion than the cumulative array based construction obtained as a particular case of general access structure
    corecore