32 resultados para Mind-Wandering

em Indian Institute of Science - Bangalore - Índia


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Accumulator models that integrate incoming sensory information into motor plans provide a robust framework to understand decision making. However, their applicability to situations that demand a change of plan raises an interesting problem for the brain. This is because interruption of the current motor plan must occur by a competing motor plan, which is necessarily weaker in strength. To understand how changes of mind get expressed in behavior, we used a version of the double-step task called the redirect task, in which monkeys were trained to modify a saccade plan. We microstimulated the frontal eye fields during redirect behavior and systematically measured the deviation of the evoked saccade from the response field to causally track the changing saccade plan. Further, to identify the underlying mechanisms, eight different computational models of redirect behavior were assessed. It was observed that the model that included an independent, spatially specific inhibitory process, in addition to the two accumulators representing the preparatory processes of initial and final motor plans, best predicted the performance and the pattern of saccade deviation profile in the task. Such an inhibitory process suppressed the preparation of the initial motor plan, allowing the final motor plan to proceed unhindered. Thus, changes of mind are consistent with the notion of a spatially specific, inhibitory process that inhibits the current inappropriate plan, allowing expression of the new plan.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A cardinal feature of early stages of human brain development centers on the sensory, cognitive, and emotional experiences that shape neuronal-circuit formation and refinement. Consequently, alterations in these processes account for many psychiatric and neurodevelopmental disorders. Neurodevelopment disorders affect 3-4% of the world population. The impact of these disorders presents a major challenge to clinicians, geneticists, and neuroscientists. Mutations that cause neurodevelopmental disorders are commonly found in genes encoding proteins that regulate synaptic function. Investigation of the underlying mechanisms using gain or loss of function approaches has revealed alterations in dendritic spine structure, function, and plasticity, consequently modulating the neuronal circuit formation and thereby raising the possibility of neurodevelopmental disorders resulting from synaptopathies. One such gene, SYNGAP1 (Synaptic Ras-GTPase-activating protein) has been shown to cause Intellectual Disability (ID) with comorbid Autism Spectrum Disorder (ASD) and epilepsy in children. SYNGAP1 is a negative regulator of Ras, Rap and of AMPA receptor trafficking to the postsynaptic membrane, thereby regulating not only synaptic plasticity, but also neuronal homeostasis. Recent studies on the neurophysiology of SYNGAP1, using Syngapl mouse models, have provided deeper insights into how downstream signaling proteins and synaptic plasticity are regulated by SYNGAP1. This knowledge has led to a better understanding of the function of SYNGAP1 and suggests a potential target during critical period of development when the brain is more susceptible to therapeutic intervention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A cardinal feature of early stages of human brain development centers on the sensory, cognitive, and emotional experiences that shape neuronal-circuit formation and refinement. Consequently, alterations in these processes account for many psychiatric and neurodevelopmental disorders. Neurodevelopment disorders affect 3-4% of the world population. The impact of these disorders presents a major challenge to clinicians, geneticists, and neuroscientists. Mutations that cause neurodevelopmental disorders are commonly found in genes encoding proteins that regulate synaptic function. Investigation of the underlying mechanisms using gain or loss of function approaches has revealed alterations in dendritic spine structure, function, and plasticity, consequently modulating the neuronal circuit formation and thereby raising the possibility of neurodevelopmental disorders resulting from synaptopathies. One such gene, SYNGAP1 (Synaptic Ras-GTPase-activating protein) has been shown to cause Intellectual Disability (ID) with comorbid Autism Spectrum Disorder (ASD) and epilepsy in children. SYNGAP1 is a negative regulator of Ras, Rap and of AMPA receptor trafficking to the postsynaptic membrane, thereby regulating not only synaptic plasticity, but also neuronal homeostasis. Recent studies on the neurophysiology of SYNGAP1, using Syngapl mouse models, have provided deeper insights into how downstream signaling proteins and synaptic plasticity are regulated by SYNGAP1. This knowledge has led to a better understanding of the function of SYNGAP1 and suggests a potential target during critical period of development when the brain is more susceptible to therapeutic intervention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

High temperature expansion is an effective tool for studying second order phase transitions. With this in mind, we have looked at a high momentum expansion for homogeneous isotropic turbulence. Combining our results with those of the inertial range, we give another view of extended self-similarity (ESS).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sun salutation is a part of yoga. It consists of a sequence of postures done with synchronized breathing. The practice of few cycles of sun salutation is known to help in maintaining good health and vigor. The practice of sun salutation does not need any extra gadgets. Also it is very much aerobic and invigorates the body and the mind.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space viewpoint is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces $\mathcal{S_I}$ and $\mathcal{S_C}$ and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating $\mathcal{S_I}$ and $\mathcal{S_C}$ is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. The average case CC of the relevant greater-than (GT) function is characterized within two bits. In the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article we describe and demonstrate the versatility of a computer program, GENOME MAPPING, that uses interactive graphics and runs on an IRIS workstation. The program helps to visualize as well as analyse global and local patterns of genomic DNA sequences. It was developed keeping in mind the requirements of the human genome sequencing programme, which requires rapid analysis of the data. Using GENOME MAPPING one can discern signature patterns of different kinds of sequences and analyse such patterns for repetitive as well as rare sequence strings. Further, one can visualize the extent of global homology between different genomic sequences. An application of our method to the published yeast mitochondrial genome data shows similar sequence organizations in the entire sequence and in smaller subsequences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a need to understand the carbon (C) sequestration potential of the forestry option and its financial implications for each country.In India the C emissions from deforestation are estimated to be nearly offset by C sequestration in forests under succession and tree plantations. India has nearly succeeded in stabilizing the area under forests and has adequate forest conservation strategies. Biomass demands for softwood, hardwood and firewood are estimated to double or treble by the year 2020. A set of forestry options were developed to meet the projected biomass needs, and keeping in mind the features of land categories available, three scenarios were developed: potential; demand-driven; and programme-driven scenarios. Adoption of the demand-driven scenario, targeted at meeting the projected biomass needs, is estimated to sequester 78 Mt of C annually after accounting for all emissions resulting from clearfelling and end use of biomass. The demand-driven scenario is estimated to offset 50% of national C emission at 1990 level. The cost per t of C sequestered for forestry options is lower than the energy options considered. The annual investment required for implementing the demand-driven scenario is estimated to be US$ 2.1 billion for six years and is shown to be feasible. Among forestry options, the ranking based on investment cost per t of C sequestered from least cost to highest cost is; natural regeneration-agro-forestry-enhanced natural regeneration (< US$ 2.5/t C)-timber-community-softwood forestry (US$ 3.3 to 7.3 per t of C).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An attempt is made to present some challenging problems (mainly to the technically minded researchers) in the development of computational models for certain (visual) processes which are executed with, apparently, deceptive ease by the human visual system. However, in the interest of simplicity (and with a nonmathematical audience in mind), the presentation is almost completely devoid of mathematical formalism. Some of the findings in biological vision are presented in order to provoke some approaches to their computational models, The development of ideas is not complete, and the vast literature on biological and computational vision cannot be reviewed here. A related but rather specific aspect of computational vision (namely, detection of edges) has been discussed by Zucker, who brings out some of the difficulties experienced in the classical approaches.Space limitations here preclude any detailed analysis of even the elementary aspects of information processing in biological vision, However, the main purpose of the present paper is to highlight some of the fascinating problems in the frontier area of modelling mathematically the human vision system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

THE study of swirling boundary layers is of considerable importance in many rotodynamic machines such as rockets, jet engines, swirl generators, swirl atomizers, arc heaters, etc. For example, the introduction of swirl in a flow acceleration device such as a nozzle in a rocket engine promises efficient mass flow control. In nuclear rockets, swirl is used to retain the uranium atoms in the rocket chamber. With these applications in mind, Back1 and Muthanna and Nath2 have obtained the similarity solutions for a low-speed three-dimensional steady laminar compressible boundary layer with swirl inside an axisymmetric surface of variable cross section. The aim of the present analysis is to study the effect of massive blowing rates on the unsteady laminar swirling compressible boundary-layer flow of an axisymmetric body of arbitrary cross section when the freestream velocity and blowing rate vary with time. The type of swirl considered here is that of a free vortex superimposed on the longitudinal flow of a compressible fluid with variable properties. The analysis is applicable to external flow over a body as well as internal flow along a surface. For the case of external flow, strong blowing can have significant use in cooling the surface of hypervelocity vehicles, particularly when ablation occurs under large aerodynamic or radiative heating, but there may not be such an important application of strong blowing in the case of internal flow. The governing partial differential equations have been solved numerically using an implicit finite difference scheme with a quasilinearization technique.3 High temperature gas effects, such as radiation, dissociation, and ionization, etc., are not investigated. The nomenclature is usually that of Ref. 4 and is listed in the full paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space view-point is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces f(s) and f(g) and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating f(s) and f(g) is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication-complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. Extensions to the multi-party case is straightforward and is briefly discussed. The average case CC of the relevant greaterthan (CT) function is characterized within two bits. Under the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm. 2010 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We address the problem of allocating a single divisible good to a number of agents. The agents have concave valuation functions parameterized by a scalar type. The agents report only the type. The goal is to find allocatively efficient, strategy proof, nearly budget balanced mechanisms within the Groves class. Near budget balance is attained by returning as much of the received payments as rebates to agents. Two performance criteria are of interest: the maximum ratio of budget surplus to efficient surplus, and the expected budget surplus, within the class of linear rebate functions. The goal is to minimize them. Assuming that the valuation functions are known, we show that both problems reduce to convex optimization problems, where the convex constraint sets are characterized by a continuum of half-plane constraints parameterized by the vector of reported types. We then propose a randomized relaxation of these problems by sampling constraints. The relaxed problem is a linear programming problem (LP). We then identify the number of samples needed for ``near-feasibility'' of the relaxed constraint set. Under some conditions on the valuation function, we show that value of the approximate LP is close to the optimal value. Simulation results show significant improvements of our proposed method over the Vickrey-Clarke-Groves (VCG) mechanism without rebates. In the special case of indivisible goods, the mechanisms in this paper fall back to those proposed by Moulin, by Guo and Conitzer, and by Gujar and Narahari, without any need for randomization. Extension of the proposed mechanisms to situations when the valuation functions are not known to the central planner are also discussed. Note to Practitioners-Our results will be useful in all resource allocation problems that involve gathering of information privately held by strategic users, where the utilities are any concave function of the allocations, and where the resource planner is not interested in maximizing revenue, but in efficient sharing of the resource. Such situations arise quite often in fair sharing of internet resources, fair sharing of funds across departments within the same parent organization, auctioning of public goods, etc. We study methods to achieve near budget balance by first collecting payments according to the celebrated VCG mechanism, and then returning as much of the collected money as rebates. Our focus on linear rebate functions allows for easy implementation. The resulting convex optimization problem is solved via relaxation to a randomized linear programming problem, for which several efficient solvers exist. This relaxation is enabled by constraint sampling. Keeping practitioners in mind, we identify the number of samples that assures a desired level of ``near-feasibility'' with the desired confidence level. Our methodology will occasionally require subsidy from outside the system. We however demonstrate via simulation that, if the mechanism is repeated several times over independent instances, then past surplus can support the subsidy requirements. We also extend our results to situations where the strategic users' utility functions are not known to the allocating entity, a common situation in the context of internet users and other problems.