163 research outputs found
Integration of optogenetics with complementary methodologies in systems neuroscience
Modern optogenetics can be tuned to evoke activity that corresponds to naturally occurring local or global activity in timing, magnitude or individual-cell patterning. This outcome has been facilitated not only by the development of core features of optogenetics over the past 10 years (microbial-opsin variants, opsin-targeting strategies and light-targeting devices) but also by the recent integration of optogenetics with complementary technologies, spanning electrophysiology, activity imaging and anatomical methods for structural and molecular analysis. This integrated approach now supports optogenetic identification of the native, necessary and sufficient causal underpinnings of physiology and behaviour on acute or chronic timescales and across cellular, circuit-level or brain-wide spatial scales
On metric dimension of cube of trees
Let be a connected graph and be the shortest distance
between the vertices and in . A set
is said to be a {\em resolving
set} if for all distinct vertices of , there exist an element
such that . The minimum cardinality of a resolving set for a
graph is called the {\em metric dimension} of and it is denoted by
. A resolving set having number of vertices is named
as {\em metric basis} of . The metric dimension problem is to find a metric
basis in a graph , and it has several real-life applications in network
theory, telecommunication, image processing, pattern recognition, and many
other fields. In this article, we consider {\em cube of trees} ,
where any two vertices are adjacent if and only if the distance between
them is less than equal to three in . We establish the necessary and
sufficient conditions of a vertex subset of to become a resolving set for
. This helps determine the tight bounds (upper and lower) for the metric
dimension of . Then, for certain well-known cubes of trees, such as
caterpillars, lobsters, spiders, and -regular trees, we establish the
boundaries of the metric dimension. Further, we characterize some restricted
families of cube of trees satisfying . We provide a
construction showing the existence of a cube of tree attaining every positive
integer value as their metric dimension
Evolving Secret Sharing in Almost Semi-honest Model
Evolving secret sharing is a special kind of secret sharing where the number of shareholders is not known beforehand, i.e., at time t = 0. In classical secret sharing such a restriction was assumed inherently i.e., the the number of shareholders was given to the dealer’s algorithm as an input. Evolving secret sharing relaxes this condition. Pramanik and Adhikari left an open problem regarding malicious shareholders in the evolving setup, which we answer in this paper. We introduce a new cheating model, called the almost semi-honest model, where a shareholder who joins later can check the authenticity of share of previous ones. We use collision resistant hash function to construct such a secret sharing scheme with malicious node identification. Moreover, our scheme preserves the share size of Komargodski et al. (TCC 2016)
Recommended from our members
Cholinergic receptor pathways involved in apoptosis, cell proliferation and neuronal differentiation
Acetylcholine (ACh) has been shown to modulate neuronal differentiation during early development. Both muscarinic and nicotinic acetylcholine receptors (AChRs) regulate a wide variety of physiological responses, including apoptosis, cellular proliferation and neuronal differentiation. However, the intracellular mechanisms underlying these effects of AChR signaling are not fully understood. It is known that activation of AChRs increase cellular proliferation and neurogenesis and that regulation of intracellular calcium through AChRs may underlie the many functions of ACh. Intriguingly, activation of diverse signaling molecules such as Ras-mitogen-activated protein kinase, phosphatidylinositol 3-kinase-Akt, protein kinase C and c-Src is modulated by AChRs. Here we discuss the roles of ACh in neuronal differentiation, cell proliferation and apoptosis. We also discuss the pathways involved in these processes, as well as the effects of novel endogenous AChRs agonists and strategies to enhance neuronal-differentiation of stem and neural progenitor cells. Further understanding of the intracellular mechanisms underlying AChR signaling may provide insights for novel therapeutic strategies, as abnormal AChR activity is present in many diseases
Bounds on the Size of the Minimum Dominating Sets of Some Cylindrical Grid Graphs
Let γPm □ Cn denote the domination number of the cylindrical grid graph formed by the Cartesian product of the graphs Pm, the path of length m, m≥2, and the graph Cn, the cycle of length n, n≥3. In this paper we propose methods to find the domination numbers of graphs of the form Pm □ Cn with n≥3 and m=5 and propose tight bounds on domination numbers of the graphs P6 □ Cn, n≥3. Moreover, we provide rough bounds on domination numbers of the graphs Pm □ Cn, n≥3 and m≥7. We also point out how domination numbers and minimum dominating sets are useful for wireless sensor networks.</jats:p
Recommended from our members
To Approach or Avoid: An Introductory Overview of the Study of Anxiety Using Rodent Assays
Anxiety is a widely studied phenomenon in behavioral neuroscience, but the recent literature lacks an overview of the major conceptual framework underlying anxiety research to introduce young researchers to the field. In this mini-review article, which is aimed toward new undergraduate and graduate students, we discuss how researchers exploit the approach-avoidance conflict, an internal conflict rodents face between exploration of novel environments and avoidance of danger, to inform rodent assays that allow for the measurement of anxiety-related behavior in the laboratory. We review five widely-used rodent anxiety assays, consider the pharmacological validity of these assays, and discuss neural circuits that have recently been shown to modulate anxiety using the assays described. Finally, we offer related lines of inquiry and comment on potential future directions
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures
In this paper, we consider a special type of secret sharing
scheme known as Visual Cryptographic Scheme (VCS) in which the secret reconstruction is done
visually without any mathematical computation unlike other secret sharing schemes.
We put forward an efficient direct construction of a visual cryptographic scheme for compartmented access structure which generalizes the access structure for threshold as well as for threshold with certain essential participants. Up to the best of our knowledge, the scheme is the first proposed scheme for compartmented access structure in the literature of visual cryptography. Finding the closed form of relative contrast of a scheme is, in general, a combinatorially hard problem. We come up with a closed form of both pixel expansion as well as relative contrast. Numerical evidence shows that our scheme performs better in terms of both relative contrast as well as pixel expansion than the cumulative array based construction obtained as a particular case of general access structure
- …
