The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Working memory (WM) capacity affects our daily life in many ways, and its decrease often associates with neural disorders (e.g. Alzheimer's disease). Several studies have confirmed that alpha rhythms play an active role in memory mechanism. In the present study, we designed a digit verbal span experiment to find out that how the alpha power change during working memory encoding, and the relationship...
In order to enhance the contrast between ridges and valleys of contactless fingerprint, a touchless fingerprint image enhancement algorithm based on Hessian matrix and short time Fourier transform (STFT) analysis is proposed. First, initial enhancement is done through building lower
The canonical correlation analysis (CCA), double-partial least-squares (DPLS) methods and least absolute shrinkage and selection operator (LASSO) have been proven effectively in detecting the steady-state visual evoked potential (SSVEP) in SSVEP-based brain-computer interface systems. However, the accuracy of SSVEP classification can be affected by phase shifts of the electroencephalography data,...
With shorter calibration times and higher information transfer rates, steady-state visual evoked potential (SSVEP)-based brain-computer interfaces (BCIs) have been studied most activity in recent years. Target identification is the ongoing core task in BCI researches, and plays a significant role in practical applications. In order to improve the performance of SSVEP-based BCI system, we proposed...
In recent years, based on the steady-state visual evoked potential (SSVEP) brain-computer interfaces (BCIs) have generated significant interest, due to their shorter calibration times and higher information transfer rates. Target identification is the core signal processing task in BCIs. Power spectral density analysis (PSDA) and canonical correlation analysis (CCA) are the most popular and widely...
In the present study, we investigated the effect of ERK1/2 and JNK signaling pathway in the inhibition of AcSDKP on the proliferation and collagen synthesis in cultured rat cardiac fibroblasts induced by PDGF. By using MTT assay and Western Blot analysis, we found that treating the fibroblasts with PDGF, phospho-ERK1/2 and phospho-JNK expression was significantly increased compared with the control...
Myofibroblast differentiation, characterized by α-smooth muscle actin (α-SMA) expression, is a key process in organ fibrosis. Our recent studies have shown that AcSDKP has a anti-fibrotic effect in the lung of rats with silicosis. Here we explore the underlying effect of AcSDKP on myofibroblast differentiation during the anti-fibrotic process. SiO2 powders were instilled in trachea of rat to make...
The time-frequency synchronization algorithm is a critical part for the OFDM (Orthogonal Frequency Division Multiplexing) technology used in the CMMB (China Mobile Multimedia Broadcasting) systems. Several time-frequency synchronization methods have been proposed for CMMB systems, however, the amount of calculating the time-frequency offset is huge. This paper proposes a new algorithm for time-frequency...
The multiple reflections develop in deep-sea. Especially in rough deep-sea bottom, the multiple is more complicated. Conventional radon transform filtering has its deficiency, and the effection is not obvious in multiple suppressing of seismic data in deep-sea. In order to achieve high resolution radon transform, this paper proposes an improved method. This method is able to build a very good model...
E-commerce (EC) over open devices and networks poses security challenges of a new dimension. This article presents a multi-party contract signing (MPCS) protocol to demonstrate how to apply the secure EC protocols to trading terminals supported by trusted computing (TC) technology. The protocol here reduces the number of rounds to two and the message transmission number to O(n2), which is the best...
Trusted Computing Technology provides powerful support for the solution to security issues of embedded endpoints in network computing environment. In this paper a general framework of trusted access, which is for implementation on embedded trusted endpoints, is presented. The paper describes the authentication procedure of trusted access and its formal definition, and the design and implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.