Search results for "Memory."
showing 10 items of 1949 documents
Introducing implicit learning: from the laboratory to the real life
2010
The dissociation between implicit and explicit cognition has a long history in psychology. As early as 1920, Clark Hull (25) investigated the learning of Chinese ideographs and identified the process of concept formation by abstraction of common elements, a process that occurs without explicit knowledge from the subjects of these regularities. Perceptual learning is another example of those processes that take place largely in the absence of awareness of the rules that govern the stimulations of the environment. Helmholtz (24) was one of the first to refer to implicit inference made by the perceptual system and to perceptual learning. Some years later, the distinction between implicit and e…
Parallelizing Epistasis Detection in GWAS on FPGA and GPU-Accelerated Computing Systems
2015
This is a post-peer-review, pre-copyedit version of an article published in IEEE - ACM Transactions on Computational Biology and Bioinformatics. The final authenticated version is available online at: http://dx.doi.org/10.1109/TCBB.2015.2389958 [Abstract] High-throughput genotyping technologies (such as SNP-arrays) allow the rapid collection of up to a few million genetic markers of an individual. Detecting epistasis (based on 2-SNP interactions) in Genome-Wide Association Studies is an important but time consuming operation since statistical computations have to be performed for each pair of measured markers. Computational methods to detect epistasis therefore suffer from prohibitively lon…
Encriptación óptica empleando llaves Weierstrass-Mandelbrot
2013
[EN] This paper presents the generation of encryption keys using the local oscillating properties of the partial sums of Weierstrass-Mandelbrot fractal function. In this way, the security key can be replicated if the parameters used to obtain it are known. Therefore, these parameters can be sent instead of sending the key. This procedure reduces the amount of information to be sent and prevents possible interception of the key. Moreover, the key can not be affected by data loss or pollution. The effectiveness of the Weierstrass-Mandelbrot keys were demonstrated by computer simulation in a 4f optical encryption system and the double random phase encoding technique. These keys allow us to enc…
Single neuron binding properties and the magical number 7
2008
When we observe a scene, we can almost instantly recognize a familiar object or can quickly distinguish among objects differing by apparently minor details. Individual neurons in the medial temporal lobe of humans have been shown to be crucial for the recognition process, and they are selectively activated by different views of known individuals or objects. However, how single neurons could implement such a sparse and explicit code is unknown and almost impossible to investigate experimentally. Hippocampal CA1 pyramidal neurons could be instrumental in this process. Here, in an extensive series of simulations with realistic morphologies and active properties, we demonstrate how n radial (ob…
2020
Abstract Efficient neuronal communication between brain regions through oscillatory synchronization at certain frequencies is necessary for cognition. Such synchronized networks are transient and dynamic, established on the timescale of milliseconds in order to support ongoing cognitive operations. However, few studies characterizing dynamic electrophysiological brain networks have simultaneously accounted for temporal non-stationarity, spectral structure, and spatial properties. Here, we propose an analysis framework for characterizing the large-scale phase-coupling network dynamics during task performance using magnetoencephalography (MEG). We exploit the high spatiotemporal resolution of…
Massively parallel computation of atmospheric neutrino oscillations on CUDA-enabled accelerators
2019
Abstract The computation of neutrino flavor transition amplitudes through inhomogeneous matter is a time-consuming step and thus could benefit from optimization and parallelization. Next to reliable parameter estimation of intrinsic physical quantities such as neutrino masses and mixing angles, these transition amplitudes are important in hypothesis testing of potential extensions of the standard model of elementary particle physics, such as additional neutrino flavors. Hence, fast yet precise implementations are of high importance to research. In the recent past, massively parallel accelerators such as CUDA-enabled GPUs featuring thousands of compute units have been widely adopted due to t…
Concurrent Computing with Shared Replicated Memory
2019
Any concurrent system can be captured by a concurrent Abstract State Machine (cASM). This remains valid, if different agents can only interact via messages. It even permits a strict separation between memory managing agents and other agents that can only access the shared memory by sending query and update requests. This paper is dedicated to an investigation of replicated data that is maintained by a memory management subsystem, where the replication neither appears in the requests nor in the corresponding answers. We specify the behaviour of a concurrent system with such memory management using concurrent communicating ASMs (ccASMs), provide several refinements addressing different replic…
Asymmetries in path encoding in Sicilian: A diachronic overview
2017
This talk aims at describing the encoding of path within the system of spatial relations in Sicilian, an Italo-Romance language spoken in Sicily and its satellite islands. In general terms, spatial relations in Sicilian remain largely unexplored in the light of the current linguistic theories. As a consequence, the first point addressed in the proposed description is the comparison of Sicilian data with the cross-linguistic scenario. It is generally argued in the relevant literature that the encoding of path appears to be less autonomous compared to source, goal, and location at the cross-linguistic level, and its encoding is frequently based on location (see Stolz 1992). In Sicilian, the s…
Topology of synaptic connectivity constrains neuronal stimulus representation, predicting two complementary coding strategies
2020
In motor-related brain regions, movement intention has been successfully decoded from in-vivo spike train by isolating a lower-dimension manifold that the high-dimensional spiking activity is constrained to. The mechanism enforcing this constraint remains unclear, although it has been hypothesized to be implemented by the connectivity of the sampled neurons. We test this idea and explore the interactions between local synaptic connectivity and its ability to encode information in a lower dimensional manifold through simulations of a detailed microcircuit model with realistic sources of noise. We confirm that even in isolation such a model can encode the identity of different stimuli in a lo…
''Investigating reduction of dimensionality during single-joint elbow movements: a case study on muscle synergies''
2013
Chiovetto, Enrico | Berret, Bastien | Delis, Ioannis | Panzeri, Stefano | Pozzo, Thierry; International audience; ''A long standing hypothesis in the neuroscience community is that the central nervous system (CNS) generates the muscle activities to accomplish movements by combining a relatively small number of stereotyped patterns of muscle activations, often referred to as" muscle synergies." Different definitions of synergies have been given in the literature. The most well-known are those of synchronous, time-varying and temporal muscle synergies. Each one of them is based on a different mathematical model used to factor some EMG array recordings collected during the execution of variety…