Metastable dynamics of neural circuits and networks

BAW Brinkman, H Yan, A Maffei, IM Park… - Applied Physics …, 2022 - pubs.aip.org
Cortical neurons emit seemingly erratic trains of action potentials or “spikes,” and neural
network dynamics emerge from the coordinated spiking activity within neural circuits. These …

Cortical computations via metastable activity

G La Camera, A Fontanini, L Mazzucato - Current opinion in neurobiology, 2019 - Elsevier
Highlights•Metastable activity is increasingly being observed in many cortical areas and in a
variety of tasks.•Metastable activity is correlated with sensory and cognitive processes and …

[BOEK][B] Latent Markov models for longitudinal data

F Bartolucci, A Farcomeni, F Pennoni - 2012 - books.google.com
Drawing on the authors' extensive research in the analysis of categorical longitudinal data,
this book focuses on the formulation of latent Markov models and the practical use of these …

Bayesian Gaussian mixture linear inversion for geophysical inverse problems

D Grana, T Fjeldstad, H Omre - Mathematical Geosciences, 2017 - Springer
A Bayesian linear inversion methodology based on Gaussian mixture models and its
application to geophysical inverse problems are presented in this paper. The proposed …

Real-time human recognition at night via integrated face and gait recognition technologies

SAF Manssor, S Sun, MAM Elhassan - Sensors, 2021 - mdpi.com
Human recognition technology is a task that determines the people existing in images with
the purpose of identifying them. However, automatic human recognition at night is still a …

On the use of hidden markov model to predict the time to fix bugs

M Habayeb, SS Murtaza, A Miranskyy… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A significant amount of time is spent by software developers in investigating bug reports. It is
useful to indicate when a bug report will be closed, since it would help software teams to …

AI-enhanced audit inquiry: A research note

RL Raschke, A Saiewitz, P Kachroo… - Journal of Emerging …, 2018 - publications.aaahq.org
Artificial intelligence (AI) and machine learning (ML) are transforming organizations and will
soon transform auditing. Many promising areas of AI and ML are within the continuous …

Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks

ARA Moundounga, H Satori, Y Boutazart… - Microprocessors and …, 2023 - Elsevier
Alongside the rapid progress of Wireless sensor networks (WSNs) technologies, sensors
and networks can rapidly be a victim of distributed attacks. Attackers can perform intrusions …

Gesture recognition for Indonesian sign language (BISINDO)

T Handhika, RIM Zen, DP Lestari… - Journal of Physics …, 2018 - iopscience.iop.org
Sign language is different from spoken language that emphasizes both the audio and verbal
aspects. There are two sign languages applicable in Indonesia, namely Indonesian Signal …

Event-triggered risk-sensitive state estimation for hidden Markov models

J Xu, DWC Ho, F Li, W Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An event-triggered risk-sensitive state estimation problem for hidden Markov models is
investigated in this work. The event-triggered scheme considered is fairly general, which …