Ferdinand Peper
YOU?
Author Swipe
View article: Energy-Efficient Pseudo-Ratchet for Brownian Computers through One-Dimensional Quantum Brownian Motion
Energy-Efficient Pseudo-Ratchet for Brownian Computers through One-Dimensional Quantum Brownian Motion Open
Brownian computers utilize thermal fluctuations as a resource for computation and hold promise for achieving ultra-low-energy computations. However, the lack of a statistical direction in Brownian motion necessitates the incorporation of r…
View article: Performance Evaluation of Asynchronous Pulse Code Multiple Access in Massive IoT Networks
Performance Evaluation of Asynchronous Pulse Code Multiple Access in Massive IoT Networks Open
The Internet of Things (IoT) has revolutionized the way we interact with everyday objects by connecting sensors/actuators to the Internet to monitor and control various aspects of our environment. As the number of IoT devices continues to …
View article: Thermodynamic cost of Brownian computers in the stochastic thermodynamics of resetting
Thermodynamic cost of Brownian computers in the stochastic thermodynamics of resetting Open
We analyze the thermodynamic cost of a logically reversible Brownian Turing machine operating in the first-passage time protocol based on the stochastic thermodynamics of resetting. In this framework, the thermodynamic cost of computation …
View article: Performance evaluation of CSS-APCMA for massive IoT using GNU Radio/USRP
Performance evaluation of CSS-APCMA for massive IoT using GNU Radio/USRP Open
Asynchronous Pulse Code Multiple Access (APCMA) is a pulse-based communication system for massive IoT. It enables high-density communication because it can decode messages with a high probability even if they collide. We evaluate the perfo…
View article: Computation time and thermodynamic uncertainty relation of Brownian circuits
Computation time and thermodynamic uncertainty relation of Brownian circuits Open
We analyze a token-based Brownian circuit in which Brownian particles, coined `tokens,' move randomly by exploiting thermal fluctuations, searching for a path in multi-token state space corresponding to the solution of a given problem. The…
View article: Evaluation and optimization of asynchronous pulse code multiple access
Evaluation and optimization of asynchronous pulse code multiple access Open
To realize massive IoT environments, we proposed Asynchronous Pulse Code Multiple Access (APCMA). APCMA encodes information as intervals between pulses. The sparse signal of APCMA allows a large number of devices to share the limited radio…
View article: High-Density Resource-Restricted Pulse-Based IoT Networks
High-Density Resource-Restricted Pulse-Based IoT Networks Open
For the realization of an Internet of Things (IoT) with high densities of devices it is necessary that wireless communication protocols are developed that offer 1) low energy consumption; 2) simplicity of encoding and decoding; 3) an async…
View article: Performance evaluation of pulse-based multiplexing protocol implemented on massive IoT devices
Performance evaluation of pulse-based multiplexing protocol implemented on massive IoT devices Open
An Internet of Things (IoT) employing resource-restricted (e.g., battery-limited) IoT devices at high densities will require an effective multiplexing protocol that can be implemented with low energy consumption, while being able to effect…
View article: Functional network activity during errorless and trial‐and‐error color‐name association learning
Functional network activity during errorless and trial‐and‐error color‐name association learning Open
Introduction In cognitive rehabilitation, errorless (EL) and trial‐and‐error (T&E) learning are well‐known methods, but their neural mechanisms are not well known. In this study, we investigated functional magnetic resonance imaging data f…
View article: Turing-completeness of asynchronous non-camouflage cellular automata
Turing-completeness of asynchronous non-camouflage cellular automata Open
Asynchronous Boolean totalistic cellular automata have recently attracted attention as promising models for implementation by reaction-diffusion systems. It is unknown, however, to what extent they are able to conduct computation. In this …
View article: Application of APCMA protocol to power packet networks for multiplexing power packet transmissions
Application of APCMA protocol to power packet networks for multiplexing power packet transmissions Open
Asynchronous Pulse-Code Multiple Access (APCMA) has been proposed as a brain-inspired communication protocol based on pulse-like signals (Peper et al, The Brain & Networks, 2018). Encoding data as intervals between pulses, APCMA allows mul…
View article: Neural Networks for Cause of Hospitalization and Final Cause of Death Extraction from Discharge Summaries
Neural Networks for Cause of Hospitalization and Final Cause of Death Extraction from Discharge Summaries Open
Determining the cause of death of hospitalized patients with cardiovascular disease is of the utmost importance. This is usually recorded in free text form. In this study we aimed to develop a series of supervised natural language processi…
View article: Spike-based Communication Networks with Error Correcting Capability
Spike-based Communication Networks with Error Correcting Capability Open
Brain-like communication based on spikes has potential advantages in terms of energy consumption, but it is unclear what type of encoding of information allows good robustness to errors. This paper shows how to construct Error Correcting C…
View article: Reservoir computing with dipole coupled nanomagnets array
Reservoir computing with dipole coupled nanomagnets array Open
The feasibility of reservoir computing based on dipole-coupled nanomagnets is demonstrated using micro-magnetic simulations. The reservoir consists of an 2x10 array of nanomagnets. The static-magnetization directions of the nanomagnets are…
View article: Assessment of leg muscle activity using toe tapping in patients with Parkinson’s disease: comparison of two types of toe tapping
Assessment of leg muscle activity using toe tapping in patients with Parkinson’s disease: comparison of two types of toe tapping Open
[Purpose] This study investigates two types of toe tapping, i.e., "closed," with both feet on the floor, and "open," in which the foot does not touch the ground, and evaluates their usefulness in combination with monitoring of muscle activ…
View article: The End of Moore’s Law: Opportunities for Natural Computing?
The End of Moore’s Law: Opportunities for Natural Computing? Open
The impending end of Moore's Law has started a rethinking of the way computers are built and computation is done. This paper discusses two directions that are currently attracting much attention as future computation paradigms: the merging…
View article: Average consensus in asymmetric broadcasting wireless sensor networks through gossiping
Average consensus in asymmetric broadcasting wireless sensor networks through gossiping Open
Average consensus algorithms have attracted increasing interest in the last decade because of their potential for use in high-density wireless sensor networks. This paper analyzes an algorithm that is based on a model of asymmetric broadca…
View article: Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'"
Response to "Comment on 'Zero and negative energy dissipation at information-theoretic erasure'" Open
We prove that statistical information theoretic quantities, such as information entropy, cannot generally be interrelated with the lower limit of energy dissipation during information erasure. We also point out that, in deterministic and e…
View article: Zero and negative energy dissipation at information-theoretic erasure
Zero and negative energy dissipation at information-theoretic erasure Open
We introduce information-theoretic erasure based on Shannon's binary channel formula. It is pointed out that this type of erasure is a natural energy-dissipation-free way in which information is lost in double-potential-well memories, and …