transfer of information
Recently Published Documents


TOTAL DOCUMENTS

603
(FIVE YEARS 187)

H-INDEX

32
(FIVE YEARS 4)

2022 ◽  
Vol 12 (1) ◽  
Author(s):  
Klaartje T. H. Heinen ◽  
J. Leon Kenemans ◽  
Stefan van der Stigchel

AbstractHumans can flexibly transfer information between different memory systems. Information in visual working memory (VWM) can for instance be stored in long-term memory (LTM). Conversely, information can be retrieved from LTM and temporarily held in WM when needed. It has previously been suggested that a neural transition from parietal- to midfrontal activity during repeated visual search reflects transfer of information from WM to LTM. Whether this neural transition indeed reflects consolidation and is also observed when memorizing a rich visual scene (rather than responding to a single target), is not known. To investigate this, we employed an EEG paradigm, in which abstract six-item colour-arrays were repeatedly memorized and explicitly visualized, or merely attended to. Importantly, we tested the functional significance of a potential neural shift for longer-term consolidation in a subsequent recognition task. Our results show a gradually enhanced- and sustained modulation of the midfrontal P170 component and a decline in parietal CDA, during repeated WM maintenance. Improved recollection/visualization of memoranda upon WM-cueing, was associated with contralateral parietal- and right temporal activity. Importantly, only colour-arrays previously held in WM, induced a greater midfrontal P170-response, together with left temporal- and late centro-parietal activity, upon re-exposure. These findings provide evidence for recruitment of an LTM-supporting neural network which facilitates visual WM maintenance.


Author(s):  
Serhii Yevseiev ◽  
Alla Havrylova ◽  
Olha Korol ◽  
Oleh Dmitriiev ◽  
Oleksii Nesmiian ◽  
...  

The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data. When using a reliable hash function, it is computationally difficult to create a fake message with a pre-existing hash code, however, due to the weaknesses of specific hashing algorithms, this threat can be feasible. To increase the level of cryptographic strength of transmitted messages over telecommunication channels, there are ways to create hash codes, which, according to practical research, are imperfect in terms of the speed of their formation and the degree of cryptographic strength. The collisional properties of hashing functions formed using the modified UMAC algorithm using the methodology for assessing the universality and strict universality of hash codes are investigated. Based on the results of the research, an assessment of the impact of the proposed modifications at the last stage of the generation of authentication codes on the provision of universal hashing properties was presented. The analysis of the advantages and disadvantages that accompany the formation of the hash code by the previously known methods is carried out. The scheme of cascading generation of data integrity and authenticity control codes using the UMAC algorithm on crypto-code constructions has been improved. Schemes of algorithms for checking hash codes were developed to meet the requirements of universality and strict universality. The calculation and analysis of collision search in the set of generated hash codes was carried out according to the requirements of a universal and strictly universal class for creating hash codes


2022 ◽  
Vol 12 ◽  
Author(s):  
Naoyuki Takeuchi

Recent advances in second-person neuroscience have allowed the underlying neural mechanisms involved in teaching-learning interactions to be better understood. Teaching is not merely a one-way transfer of information from teacher to student; it is a complex interaction that requires metacognitive and mentalizing skills to understand others’ intentions and integrate information regarding oneself and others. Physiotherapy involving therapists instructing patients on how to improve their motor skills is a clinical field in which teaching-learning interactions play a central role. Accumulating evidence suggests that non-invasive brain stimulation (NIBS) modulates cognitive functions; however, NIBS approaches to teaching-learning interactions are yet to be utilized in rehabilitation. In this review, I evaluate the present research into NIBS and its role in enhancing metacognitive and mentalizing abilities; I then review hyperscanning studies of teaching-learning interactions and explore the potential clinical applications of NIBS in rehabilitation. Dual-brain stimulation using NIBS has been developed based on findings of brain-to-brain synchrony in hyperscanning studies, and it is delivered simultaneously to two individuals to increase inter-brain synchronized oscillations at the stimulated frequency. Artificial induction of brain-to-brain synchrony has the potential to promote instruction-based learning. The brain-to-brain interface, which induces inter-brain synchronization by adjusting the patient’s brain activity, using NIBS, to the therapist’s brain activity, could have a positive effect on both therapist-patient interactions and rehabilitation outcomes. NIBS based on second-person neuroscience has the potential to serve as a useful addition to the current neuroscientific methods used in complementary interventions for rehabilitation.


2022 ◽  
pp. 65-85
Author(s):  
Mohammad Mudassir Ahmad ◽  
Kiran Ahuja

The electroencephalogram is used in brain-computer interface (BCI) in which signal from the human brain is sensed with the help of EEG and then sent to the computer to control the external device without having any touch of muscular body parts. On the other hand, the brain chip interfacing (BCHIs) is a microelectronic chip that has physical connections with the neurons for the transfer of information. The BCI needs a reliable, high-speed network and new security tool that can assist BCI technology. 5G network and blockchain technology is ideal to support the growing needs of brain chip interfacing. Further, the Cloudmind, which is an emerging application of BCI, can be conceptualized by using blockchain technology. In this chapter, brain-computer interfaces (BCIs) are expedient to bridge the connectivity chasm between human and machine (computer) systems via 5G technologies, which offers minimal latency, faster speeds, and stronger bandwidth connectivity with strong cryptographic qualities of blockchain technologies.


2022 ◽  
pp. 867-884
Author(s):  
Daniel Castro Aniyar

Composed cognitive maps are a tool based on grounded theory and on Lynch's urban model of cognitive maps, which allow the transfer of information from ethnographic situations to general patterns, and to the so-called spatial dynamics. In criminological matters, they have been applied in the context of environmental and criminology of place to identify criminal situations, criminal patterns, and spatial dynamics of crime. The latter concept has allowed reliable diagnoses for the design of criminal policies. Their advantages are compared with traditional criminometric methods. It introduces a brief compilation of the existing literature on the subject. In a special way, this chapter shows how composed cognitive maps allowed the measurement of drug trafficking networks, police intelligence, and, above all, crime reduction.


MAUSAM ◽  
2021 ◽  
Vol 43 (3) ◽  
pp. 269-272
Author(s):  
J. N. KANAUJIA ◽  
SURINDER KAUR ◽  
D. S. Upadhyay

The correlation between two series of rainfall recorded at two stations which are at short distance, is usually found significant. This information has important applicability in the areas of data interpolation, network design, transfer of information in respect of missing data and deriving areal rainfall from point values. In this paper 70-year (1901-1970) annual rainfall data for about 1500 stations in India have been analysed. The distribution of correlation coefficient (r) for the stations located within a distance of 40 km were obtained. Attempt has been made to derive theoretical model of r. For this purpose two distributions, (1) a two parameter -distribution and (2) a two parameter bounded distribution, have been chosen as in both cases the variable ranges from 0 to 1.  


Author(s):  
I. L. Kuznetsova ◽  
A. S. Poljakov

The problem of ensuring the integrity of the transmitted information in modern information and communication systems is considered in this paper. An optimized algorithm for detecting and correcting errors in the information transmitted over communication lines is proposed. It was developed on the basis of the results of previous studies of the error correction method based on the parity values of the coordinates of a binary matrix. An easy-to-implement, high-speed and efficient error detection algorithm is proposed which is focused on the use of small binary matrices, for example, (4 × 8) or (7 × 8) bits. In such matrices, the possible number of errors that appear in them during the transfer of information is relatively small and easily detected.


2021 ◽  
Vol 6 (4(62)) ◽  
Author(s):  
Anna Zhaldak ◽  
Mariia Krasovska

The object of research is a set of stages of processes, used in the application of hunting as a method of closing vacancies. Such stages include: sources of search for candidates, ways of their interest formation, telephone conversation as an interview, negotiations and compilation of statistics with direct transfer of information to the director of the company. In the course of the study, such general scientific and specific research methods as analysis and synthesis, induction, deduction, as well as methods of comparison, observation and a systematic approach, were used. These methods are to determine the results and dynamics when recruiting strategies are changed or when they are combined. With the help of comparison methods and a systematic approach, it was possible to determine the optimal strategy for closing the required number of vacancies in the future. Using the observation method, it was possible to consider the dynamics of indicators from each selection method separately or in different combinations with each other. Among the complex methods, an analysis was used, which allowed to understand the dynamics of indicators and draw conclusions based on them on each of the options for implementing the methods. With the help of induction on the basis of a set of conclusions about each of the options separately, a generalized conclusion was made about the further rationality of the method of hunting as effective for businesses. The simulation allowed us to develop a strategy for the phased implementation of hunting based on direct search and understanding of its difference with the latter. With regard to theoretical methods, in the process of research the transition was made from the definitions and general provisions of the hunt to a specific consideration of the method in the enterprise and its direct implementation. The result of all studies was: – summary of theoretical aspects of headhunting as an effective method of attracting staff; – effective change of dynamics of indicators at the enterprise during introduction of hunting and its combination with direct search; – a developed strategy for the phased implementation of the hunt to increase the effectiveness of the method.


2021 ◽  
Author(s):  
Plamena Nedyalkova ◽  

During the control proceedings, which are carried out by various control institutions in the executive branch, it is essential to preserve the personal data of the inspected individuals and legal entities. The main scope of this report is to present a significant part of the problems that arise in complex control proceedings involving several control institutions. These complex control procedures often require the transfer of information from one control institution to another control institution, which accordingly raises problems regarding the storage and protection of personal data of the inspected objects.


Author(s):  
Evgenij F. Tarasov

The article questions if human speech communication (SC) involves a transfer of information. The information functioning in speech communication is dwelled upon in the information and systemic activity approaches. The informational approach adequately explains only the direct method of information transfer, while the systemic activity approach is relevant for the sign-mediated speech communication typical for human interaction. The more heuristic thesis is that the perception of the chain of linguistic sign bodies produced in the intersubjective space only starts the construction of the perceived speech message content by the recipient. The completeness of the constructed speech message content depends entirely on the recipient, who has the optimal common consciousness with the speaker. The purpose of speech messages is not the actual construction of the content by the recipient, but the development of the message personal meaning. In human speech communication, the communicants do not transmit information, but use verbal signs bodies to actualize images of consciousness which are developed within a single ethnic culture and therefore are common for them. The incentive for the common consciousness development by the communicants is their participation in joint activities that ensure their earthly existence.


Sign in / Sign up

Export Citation Format

Share Document