Metastable dynamics of neural circuits and networks
Cortical neurons emit seemingly erratic trains of action potentials or “spikes,” and neural
network dynamics emerge from the coordinated spiking activity within neural circuits. These …
network dynamics emerge from the coordinated spiking activity within neural circuits. These …
Cortical computations via metastable activity
Highlights•Metastable activity is increasingly being observed in many cortical areas and in a
variety of tasks.•Metastable activity is correlated with sensory and cognitive processes and …
variety of tasks.•Metastable activity is correlated with sensory and cognitive processes and …
[BOEK][B] Latent Markov models for longitudinal data
Drawing on the authors' extensive research in the analysis of categorical longitudinal data,
this book focuses on the formulation of latent Markov models and the practical use of these …
this book focuses on the formulation of latent Markov models and the practical use of these …
Bayesian Gaussian mixture linear inversion for geophysical inverse problems
A Bayesian linear inversion methodology based on Gaussian mixture models and its
application to geophysical inverse problems are presented in this paper. The proposed …
application to geophysical inverse problems are presented in this paper. The proposed …
Real-time human recognition at night via integrated face and gait recognition technologies
Human recognition technology is a task that determines the people existing in images with
the purpose of identifying them. However, automatic human recognition at night is still a …
the purpose of identifying them. However, automatic human recognition at night is still a …
On the use of hidden markov model to predict the time to fix bugs
A significant amount of time is spent by software developers in investigating bug reports. It is
useful to indicate when a bug report will be closed, since it would help software teams to …
useful to indicate when a bug report will be closed, since it would help software teams to …
AI-enhanced audit inquiry: A research note
Artificial intelligence (AI) and machine learning (ML) are transforming organizations and will
soon transform auditing. Many promising areas of AI and ML are within the continuous …
soon transform auditing. Many promising areas of AI and ML are within the continuous …
Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks
Alongside the rapid progress of Wireless sensor networks (WSNs) technologies, sensors
and networks can rapidly be a victim of distributed attacks. Attackers can perform intrusions …
and networks can rapidly be a victim of distributed attacks. Attackers can perform intrusions …
Gesture recognition for Indonesian sign language (BISINDO)
Sign language is different from spoken language that emphasizes both the audio and verbal
aspects. There are two sign languages applicable in Indonesia, namely Indonesian Signal …
aspects. There are two sign languages applicable in Indonesia, namely Indonesian Signal …
Event-triggered risk-sensitive state estimation for hidden Markov models
J Xu, DWC Ho, F Li, W Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An event-triggered risk-sensitive state estimation problem for hidden Markov models is
investigated in this work. The event-triggered scheme considered is fairly general, which …
investigated in this work. The event-triggered scheme considered is fairly general, which …