نتایج جستجو برای: desynchronization attack

تعداد نتایج: 82948  

Journal: :Journal of neurophysiology 2000
D W Hochman P A Schwartzkroin

Antagonism of the chloride-cotransport system in hippocampal slices has been shown to block spontaneous epileptiform (i.e., hypersynchronized) discharges without diminishing excitatory synaptic transmission. Here we test the hypotheses that chloride-cotransport blockade, with furosemide or low-chloride (low-[Cl(-)](o)) medium, desynchronizes the firing activity of neuronal populations and that ...

2012
Pietro Avanzini Maddalena Fabbri-Destro Riccardo Dalla Volta Elena Daprati Giacomo Rizzolatti Gaetano Cantalupo

BACKGROUND The observation of action done by others determines a desynchronization of the rhythms recorded from cortical central regions. Here, we examined whether the observation of different types of hand movements (target directed, non-target directed, cyclic and non-cyclic) elicits different EEG cortical temporal patterns. METHODOLOGY Video-clips of four types of hand movements were shown...

Journal: :Applied Economics Letters 2021

We assess empirically the role that uncertainty plays as a determinant of business cycle synchronization dynamics in European Monetary Union. Using time-varying measure and Bayesian model averaging methods, we find increase tends to robustly predict desynchronization, particular for countries whose cycles are not line with those rest monetary union.

2009
Xingang Wang Shuguang Guan Ying-Cheng Lai Baowen Li Choy Heng Lai

Most existing works on synchronization in complex networks concern the synchronizability and its dependence on network topology. While there has also been work on desynchronization wave patterns in networks that are regular or nearly regular, little is known about the dynamics of synchronous patterns in complex networks. We find that, when a complex network becomes desynchronized, a giant clust...

Journal: :Mathematics 2022

Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number clients such a system, however, provides attacker with ability clone them, for example. Device fingerprints, or Physically Unclonable Functions (PUF), have been investigated as an authentication feature thwart attacks. In order accomplish security grid neighborhood area network commu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید