802 resultados para Critical potency


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Given capacity limits, only a subset of stimuli 1 give rise to a conscious percept. Neurocognitive models suggest that humans have evolved mechanisms that operate without awareness and prioritize threatening stimuli over neutral stimuli in subsequent perception. In this meta analysis, we review evidence for this ‘standard hypothesis’ emanating from three widely used, but rather different experimental paradigms that have been used to manipulate awareness. We found a small pooled threat-bias effect in the masked visual probe paradigm, a medium effect in the binocular rivalry paradigm and highly inconsistent effects in the breaking continuous flash suppression paradigm. Substantial heterogeneity was explained by the stimulus type: the only threat stimuli that were robustly prioritized across all three paradigms were fearful faces. Meta regression revealed that anxiety may modulate threat biases, but only under specific presentation conditions. We also found that insufficiently rigorous awareness measures, inadequate control of response biases and low level confounds may undermine claims of genuine unconscious threat processing. Considering the data together, we suggest that uncritical acceptance of the standard hypothesis is premature: current behavioral evidence for threat-sensitive visual processing that operates without awareness is weak.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We prove that ∑k,ℓ=1N(nk,nℓ)2α(nknℓ)α≪N2−2α(logN)b(α) holds for arbitrary integers 1≤n1<⋯

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) have been an exciting topic in recent years. The services offered by a WSN can be classified into three major categories: monitoring, alerting, and information on demand. WSNs have been used for a variety of applications related to the environment (agriculture, water and forest fire detection), the military, buildings, health (elderly people and home monitoring), disaster relief, and area or industrial monitoring. In most WSNs tasks like processing the sensed data, making decisions and generating emergency messages are carried out by a remote server, hence the need for efficient means of transferring data across the network. Because of the range of applications and types of WSN there is a need for different kinds of MAC and routing protocols in order to guarantee delivery of data from the source nodes to the server (or sink). In order to minimize energy consumption and increase performance in areas such as reliability of data delivery, extensive research has been conducted and documented in the literature on designing energy efficient protocols for each individual layer. The most common way to conserve energy in WSNs involves using the MAC layer to put the transceiver and the processor of the sensor node into a low power, sleep state when they are not being used. Hence the energy wasted due to collisions, overhearing and idle listening is reduced. As a result of this strategy for saving energy, the routing protocols need new solutions that take into account the sleep state of some nodes, and which also enable the lifetime of the entire network to be increased by distributing energy usage between nodes over time. This could mean that a combined MAC and routing protocol could significantly improve WSNs because the interaction between the MAC and network layers lets nodes be active at the same time in order to deal with data transmission. In the research presented in this thesis, a cross-layer protocol based on MAC and routing protocols was designed in order to improve the capability of WSNs for a range of different applications. Simulation results, based on a range of realistic scenarios, show that these new protocols improve WSNs by reducing their energy consumption as well as enabling them to support mobile nodes, where necessary. A number of conference and journal papers have been published to disseminate these results for a range of applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective defense against natural threats in the environment is essential for the survival of individual animals. Thus, instinctive behavioral responses accompanied by fear have evolved to protect individuals from predators and from opponents of the same species (dominant conspecifics). While it has been suggested that all perceived environmental threats trigger the same set of innately determined defensive responses, we tested the alternate hypothesis that different stimuli may evoke differentiable behaviors supported by distinct neural circuitry. The results of behavioral, neuronal immediate early gene activation, lesion, and neuroanatomical experiments indicate that the hypothalamus is necessary for full expression of defensive behavioral responses in a subordinate conspecific, that lesions of the dorsal premammillary nucleus drastically reduce behavioral measures of fear in these animals, and that essentially separate hypothalamic circuitry supports defensive responses to a predator or a dominant conspecific. It is now clear that differentiable neural circuitry underlies defensive responses to fear conditioning associated with painful stimuli, predators, and dominant conspecifics and that the hypothalamus is an essential component of the circuitry for the latter two stimuli.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Experts from six Latin American countries met to discuss critical issues and needs in the diagnosis and management of primary immunodeficiency diseases (PIDD). The diagnosis of PIDD is generally made following referral to an immunology centre located in a major city, but many paediatricians and general practitioners are not sufficiently trained to suspect PIDD in the first place. Access to laboratory testing is generally limited, and only some screening tests are typically covered by government health programmes. Specialised diagnostic tests are generally not reimbursed. Access to treatment varies by country reflecting differences in healthcare systems and reimbursement policies. An online PIDD Registry Programme for Latin America has been available since 2009, which will provide information about PIDD epidemiology in the region. Additional collaboration across countries appears feasible in at least two areas: a laboratory network to facilitate the diagnosis of PIDD, and educational programmes to improve PIDD awareness. In total, these collaborations should make it possible to advance the diagnosis and management of PIDD in Latin America. (C) 2010 SEICAP. Published by Elsevier Espana, S.L. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Renal ischemia and reperfusion injury (IRI) is considered an inflammatory syndrome. To move forward in its pathogenesis, we exploited the role of several cytokines on renal damages triggered by IRI. Specifically to evaluate the role of Th1 immune profile in this system, IL-12, IFN-gamma, and IFN-gamma/IL-12 deficient (KO) mice on C57BL/6 background and their controls were subjected to IRI. In each group, blood and kidney samples were harvested. Renal function was evaluated by serum creatinine and renal morphometric analyses. Gene expression of IL-6 and HO-1 were also investigated by Q-PCR. IFN-gamma KO animals presented the highest impairment in renal function compared to controls. Conversely, IL-12 KO animals were absolutely protected and, in a lesser extent, IFN-gamma/IL-12 KO double knockout was also protected from IRI. Gene expression analyses showed higher expression of HO-1, a cytoprotective gene, and IL-6, a pro-inflammatory cytokine, in IFN-gamma deficient animals subjected to IRI. Our results confirm that Th1 related cytokines such as IL-12 and IFN-gamma are critically involved in renal ischemia and reperfusion injury. (C) 2008 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is concerned with the existence of solutions for the quasilinear problem {-div(vertical bar del u vertical bar(N-2) del u) + vertical bar u vertical bar(N-2) u = a(x)g(u) in Omega u = 0 on partial derivative Omega, where Omega subset of R(N) (N >= 2) is an exterior domain; that is, Omega = R(N)\omega, where omega subset of R(N) is a bounded domain, the nonlinearity g(u) has an exponential critical growth at infinity and a(x) is a continuous function and changes sign in Omega. A variational method is applied to establish the existence of a nontrivial solution for the above problem.