Skip to main content
. 2015 Jun 2;9:68. doi: 10.3389/fncom.2015.00068

Figure 2.

Figure 2

Illustration of the masking steps required for information processing in a delay-based reservoir computer. Figure has been adapted from Appeltant et al. (2011).