11 research outputs found

    Unmasking saccadic uncrowding

    Full text link
    Stimuli that are briefly presented around the time of saccades are often perceived with spatiotemporal distortions. These distortions do not always have deleterious effects on the visibility and identification of a stimulus. Recent studies reported that when a stimulus is the target of an intended saccade, it is released from both masking (De Pisapia, Kaunitz, & Melcher, 2010) and crowding (Harrison, Mattingley, & Remington, 2013). Here, we investigated pre-saccadic changes in single and crowded letter recognition performance in the absence (Experiment 1) and the presence (Experiment 2) of backward masks to determine the extent to which saccadic “uncrowding” and “unmasking” mechanisms are similar. Our results show that pre-saccadic improvements in letter recognition performance are mostly due to the presence of masks and/or stimulus transients which occur after the target is presented. More importantly, we did not find any decrease in crowding strength before impending saccades. A simplified version of a dual-channel neural model, originally proposed to explain masking phenomena, with several saccadic add-on mechanisms, could account for our results in Experiment 1. However, this model falls short in explaining how saccades drastically reduced the effect of backward masking (Experiment 2). The addition of a remapping mechanism that alters the relative spatial positions of stimuli was needed to fully account for the improvements observed when backward masks followed the letter stimuli. Taken together, our results (i) are inconsistent with saccadic uncrowding, (ii) strongly support saccadic unmasking, and (iii) suggest that pre-saccadic letter recognition is modulated by multiple perisaccadic mechanisms with different time courses

    Aleochara pseudochrysorrhoa, a new species from southern Brazil (Coleoptera: Staphylinidae: Aleocharinae), with a complete checklist of Neotropical species of the genus

    No full text

    Latent human herpesvirus 6 is reactivated in CAR T cells

    No full text
    Cell therapies have yielded durable clinical benefits for patients with cancer, but the risks associated with the development of therapies from manipulated human cells are understudied. For example, we lack a comprehensive understanding of the mechanisms of toxicities observed in patients receiving T cell therapies, including recent reports of encephalitis caused by reactivation of human herpesvirus 6 (HHV-6). Here, through petabase-scale viral genomics mining, we examine the landscape of human latent viral reactivation and demonstrate that HHV-6B can become reactivated in cultures of human CD4(+) T cells. Using single-cell sequencing, we identify a rare population of HHV-6 'super-expressors' (about 1 in 300-10,000 cells) that possess high viral transcriptional activity, among research-grade allogeneic chimeric antigen receptor (CAR) T cells. By analysing single-cell sequencing data from patients receiving cell therapy products that are approved by the US Food and Drug Administration or are in clinical studies, we identify the presence of HHV-6-super-expressor CAR T cells in patients in vivo. Together, the findings of our study demonstrate the utility of comprehensive genomics analyses in implicating cell therapy products as a potential source contributing to the lytic HHV-6 infection that has been reported in clinical trials and may influence the design and production of autologous and allogeneic cell therapies

    Argumentation in Foreign Policy Settings

    Full text link
    This is a study of argumentation in three different kinds of high level, confidential, foreign policy settings: a collegial setting, a bureaucratic setting, and a bargaining setting. The causal and value assertions of the participants were coded using the detailed records of these three settings. The data show to be inadequate a defense/ attack model of argumentation in which the participants support their own arguments to make them resistant to attack, while attacking the weak spots in others'stated positions. In fact, there are few assertions which are supported by specific evidence, almost no mutually supported causal arguments, and the assertions which were attacked were no less emphasized than the assertions which were not attacked. More in accord with the data is the novel-arguments approach in which the key factor in persuasive argumentation is the development of arguments which others have not already taken into account.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/67391/2/10.1177_002200277702100410.pd

    Tumor Immunology and Cancer Vaccines

    No full text
    corecore