4,217 research outputs found
Scene Configuration and Object Reliability Affect the Use of Allocentric Information for Memory-Guided Reaching
Previous research has shown that egocentric and allocentric information is used for coding target locations for memory-guided reaching movements. Especially, task-relevance determines the use of objects as allocentric cues. Here, we investigated the influence of scene configuration and object reliability as a function of task-relevance on allocentric coding for memory-guided reaching. For that purpose, we presented participants images of a naturalistic breakfast scene with five objects on a table and six objects in the background. Six of these objects served as potential reach-targets (= task-relevant objects). Participants explored the scene and after a short delay, a test scene appeared with one of the task-relevant objects missing, indicating the location of the reach target. After the test scene vanished, participants performed a memory-guided reaching movement toward the target location. Besides removing one object from the test scene, we also shifted the remaining task-relevant and/or task-irrelevant objects left- or rightwards either coherently in the same direction or incoherently in opposite directions. By varying object coherence, we manipulated the reliability of task-relevant and task-irrelevant objects in the scene. In order to examine the influence of scene configuration (distributed vs. grouped arrangement of task-relevant objects) on allocentric coding, we compared the present data with our previously published data set (Klinghammer et al., 2015). We found that reaching errors systematically deviated in the direction of object shifts, but only when the objects were task-relevant and their reliability was high. However, this effect was substantially reduced when task-relevant objects were distributed across the scene leading to a larger target-cue distance compared to a grouped configuration. No deviations of reach endpoints were observed in conditions with shifts of only task-irrelevant objects or with low object reliability irrespective of task-relevancy. Moreover, when solely task-relevant objects were shifted incoherently, the variability of reaching endpoints increased compared to coherent shifts of task-relevant objects. Our results suggest that the use of allocentric information for coding targets for memory-guided reaching depends on the scene configuration, in particular the average distance of the reach target to task-relevant objects, and the reliability of task-relevant allocentric information
Tyrosinase and phenolic pressor amines
Basic to the consideration of the action of tyrosinase on the oxidation of phenolic pressor amines are the observations of Keilin and Mann (16) and of Nelson and his coworkers (17-19) that show that different preparations may vary considerably in their relative actions on monophenols and o-diphenols. Both of these types of activity appear to belong to the same enzyme complex, as they bear a proportionality to the same copper content. However, since the activities vary with the purity and method of purification, each enzyme preparation must be defined in terms of both monophenolase and o-diphenolase activities. This was done in the present studies, and modifications of previously described preparative methods were required to retain a reasonable proportioning of such activities in purified preparations
Constrained structure of ancient Chinese poetry facilitates speech content grouping
Ancient Chinese poetry is constituted by structured language that deviates from ordinary language usage [1, 2]; its poetic genres impose unique combinatory constraints on linguistic elements [3]. How does the constrained poetic structure facilitate speech segmentation when common linguistic [4, 5, 6, 7, 8] and statistical cues [5, 9] are unreliable to listeners in poems? We generated artificial Jueju, which arguably has the most constrained structure in ancient Chinese poetry, and presented each poem twice as an isochronous sequence of syllables to native Mandarin speakers while conducting magnetoencephalography (MEG) recording. We found that listeners deployed their prior knowledge of Jueju to build the line structure and to establish the conceptual flow of Jueju. Unprecedentedly, we found a phase precession phenomenon indicating predictive processes of speech segmentation—the neural phase advanced faster after listeners acquired knowledge of incoming speech. The statistical co-occurrence of monosyllabic words in Jueju negatively correlated with speech segmentation, which provides an alternative perspective on how statistical cues facilitate speech segmentation. Our findings suggest that constrained poetic structures serve as a temporal map for listeners to group speech contents and to predict incoming speech signals. Listeners can parse speech streams by using not only grammatical and statistical cues but also their prior knowledge of the form of language
Recommended from our members
Dr. Koch: A Cancer Quack?
This paper discusses the life and medical research of Dr. William F. Koch, a physiologist who claimed to have discovered a cure for cancer in the 20th century. Dr. Koch’s early education and research is discussed as background. The paper presents two allegedly successful results of Dr. Koch’s treatment, while also presenting quotes and opinions of skeptics of Dr. Koch’s work. Two FDA trials against Dr. Koch are discussed, as well as a successful FTC trial and appeal. Finally, the paper discusses typical characteristics of a quack, and analyzes Dr. Koch under this rubric. The conclusion of this paper finishes the story of Dr. Koch’s life and highlights some questions remaining understand
Recommended from our members
Fatal Tension Hemothorax Combined with Exanguination: A Rare Complication of Neurofibromatosis
Neurofibromatosis (NF) is a common autosomal dominant disorder that can be subdivided into type 1, type 2, and schwannomatosis. Patients with NF1 typically develop café-au-lait spots, scoliosis, and benign neurofibromas. In addition, NF1 predisposes to vascular complications including stenosis, arterial ectasia, and aneurysms. Here, we report the case of an otherwise healthy 32-year-old man who developed a fatal tension hemothorax due to vertebral artery aneurysm rupture. Based on the available literature, we discuss the presentation, workup, and available therapeutic approaches to this complication of neurofibromatosis
From cyber-security deception to manipulation and gratification through gamification
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3]. Changes in mindsets have also been witnessed, a couple of years ago the cyber-security industry only blamed users for their mistakes often depicted as the number one reason behind security breaches. Nowadays, companies are empowering users, modifying their perception of being the weak link, into being the center-piece of the network design [4]. Users are by definition "in control" and therefore a cyber-security asset. Researchers have focused on the gamification of cyber- security elements, helping users to learn and understand the concepts of attacks and threats, allowing them to become the first line of defense to report anoma- lies [5]. However, over the past years numerous infrastructures have suffered from malicious intent, data breaches, and crypto-ransomeware, clearly showing the technical "know-how" of hackers and their ability to bypass any security in place, demonstrating that no infrastructure, software or device can be consid- ered secure. Researchers concentrated on the gamification, learning and teaching theory of cyber-security to end-users in numerous fields through various techniques and scenarios to raise cyber-situational awareness [2][1]. However, they overlooked the users’ ability to gather information on these attacks. In this paper, we argue that there is an endemic issue in the the understanding of hacking practices leading to vulnerable devices, software and architectures. We therefore propose a transparent gamification platform for hackers. The platform is designed with hacker user-interaction and deception in mind enabling researchers to gather data on the techniques and practices of hackers. To this end, we developed a fully extendable gamification architecture allowing researchers to deploy virtualised hosts on the internet. Each virtualised hosts contains a specific vulnerability (i.e. web application, software, etc). Each vulnerability is connected to a game engine, an interaction engine and a scoring engine
Motivations, Classification and Model Trial of Conversational Agents for Insurance Companies
Advances in artificial intelligence have renewed interest in conversational
agents. So-called chatbots have reached maturity for industrial applications.
German insurance companies are interested in improving their customer service
and digitizing their business processes. In this work we investigate the
potential use of conversational agents in insurance companies by determining
which classes of agents are of interest to insurance companies, finding
relevant use cases and requirements, and developing a prototype for an
exemplary insurance scenario. Based on this approach, we derive key findings
for conversational agent implementation in insurance companies.Comment: 12 pages, 6 figure, accepted for presentation at The International
Conference on Agents and Artificial Intelligence 2019 (ICAART 2019
- …
