5 research outputs found

    Similarity Analysis of Understorey Plant Species in Forest Areas

    Get PDF
    Many forests have substantial understorey plants. These plants have an important contribution to soil and water conservation. The similarity index determines the resemblance of species structure and composition in a community. This research is aimed to see the impact and relationship of changes in the allocation of forest areas to the similarity of understorey species. The research was conducted using the line plot sampling method, sized 2 m x 2 m, with the understorey plants observed have been measured from germination to young plant (height 1.5 m). The number of plots in the plantation forest is 480 plots, protected areas 224 plots, and natural forest 96 plots. Determination of the number of understorey plots based on the minimum representative area curve. A Similarity Index was performed to analyze the data.  The results indicated that there is an impact of changes in the forest area on the similarity of understorey species. It is known from the low similarity index value at the research location. It is due to the differences in environmental factors at the two locations such as air humidity, air temperature, the intensity of sunlight, and different patterns of forest area management

    Hippocampal Contributions to the Large-Scale Episodic Memory Network Predict Vivid Visual Memories

    Get PDF
    † The first two authors contributed equally to this work. Abstract A common approach in memory research is to isolate the function(s) of individual brain regions, such as the hippocampus, without addressing how those regions interact with the larger network. To investigate the properties of the hippocampus embedded within large-scale networks, we used functional magnetic resonance imaging and graph theory to characterize complex hippocampal interactions during the active retrieval of vivid versus dim visual memories. The study yielded 4 main findings. First, the right hippocampus displayed greater communication efficiency with the network (shorter path length) and became a more convergent structure for information integration (higher centrality measures) for vivid than dim memories. Second, vivid minus dim differences in our graph theory measures of interest were greater in magnitude for the right hippocampus than for any other region in the 90-region network. Moreover, the right hippocampus significantly reorganized its set of direct connections from dim to vivid memory retrieval. Finally, beyond the hippocampus, communication throughout the whole-brain network was more efficient (shorter global path length) for vivid than dim memories. In sum, our findings illustrate how multivariate network analyses can be used to investigate the roles of specific regions within the large-scale network, while also accounting for global network changes

    Authenticating the writings of Julius Caesar

    Get PDF
    In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100–44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of the texts remains a puzzle that has persisted for nineteen centuries. In particular, the role of Caesar’s general Aulus Hirtius, who has claimed a role in shaping the corpus, has remained in contention. Determining the authorship of documents is an increasingly important authentication problem in information and computer science, with valuable applications, ranging from the domain of art history to counter-terrorism research. We describe two state-of-the-art authorship verification systems and benchmark them on 6 present-day evaluation corpora, as well as a Latin benchmark dataset. Regarding Caesar’s writings, our analyses allow us to establish that Hirtius’s claims to part of the corpus must be considered legitimate. We thus demonstrate how computational methods constitute a valuable methodological complement to traditional, expert-based approaches to document authentication
    corecore