precise degree
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 6)

H-INDEX

3
(FIVE YEARS 1)

Author(s):  
Michaela Klimova ◽  
Ilona M Bloem ◽  
Sam Ling

Normalization within visual cortex is modulated by contextual influences; stimuli sharing similar features suppress each other more than dissimilar stimuli. This feature-tuned component of suppression depends on multiple factors, including the orientation content of stimuli. Indeed, pairs of stimuli arranged in a center-surround configuration attenuate each other's response to a greater degree when oriented collinearly than when oriented orthogonally. While numerous studies have examined the nature of surround suppression at these two extremes, far less is known about how the strength of tuned normalization varies as a function of continuous changes in orientation similarity, particularly in humans. In this study, we used fMRI to examine the bandwidth of orientation-tuned suppression within human visual cortex. BOLD responses were acquired as participants viewed a full-field circular stimulus composed of wedges of orientation-bandpass filtered noise. This stimulus configuration allowed us to parametrically vary orientation differences between neighboring wedges in gradual steps between collinear and orthogonal. We found the greatest suppression for collinearly arranged stimuli, with a gradual increase in BOLD response as the orientation content became more dissimilar. We quantified the tuning width of orientation-tuned suppression, finding that the voxelwise bandwidth of orientation tuned normalization was between 20-30 degrees, and did not differ substantially between V1-V3. Voxelwise analyses revealed that suppression width covaried with retinotopic preference, with the tightest bandwidths at outer eccentricities. Having an estimate of orientation-tuned suppression bandwidth can serve to constrain models of tuned normalization, establishing the precise degree to which suppression strength depends on similarity between visual stimulus components.


Languages ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 82
Author(s):  
Markus Bader ◽  
Yvonne Portele

In German, the subject usually precedes the object (SO order), but, under certain discourse conditions, the object is allowed to precede the subject (OS order). This paper focuses on main clauses in which either the subject or a discourse-given object occurs in clause-initial position. Two acceptability experiments show that OS sentences with a given object are generally acceptable, but the precise degree of acceptability varies both with the object‘s referential form (demonstrative objects leading to higher acceptability than other types of objects) and with formal properties of the subject (pronominal subjects leading to higher acceptability than non-pronominal subjects). For SO sentences, acceptability was reduced when the object was a d-pronoun, which contrasts with the high acceptability of OS sentences with a d-pronoun object. This finding was explored in a third acceptability experiment comparing d-pronouns in subject and object function. This experiment provides evidence that a reduction in acceptability due to a prescriptive bias against d-pronouns is suspended when the d-pronoun occurs as object in the prefield. We discuss the experimental results with respect to theories of German clause structure that claim that OS sentences with different information-structural properties are derived by different types of movement.


Author(s):  
Antonio Benítez-Burraco ◽  
Ljiljana Progovac

We demonstrate how two linguistic phenomena, figurative language (implicating cross-modality) and derogatory language (implicating aggression), both demand a precise degree of (dis)inhibition in the same cortico-subcortical brain circuits, in particular cortico-striatal networks, whose connectivity has been significantly enhanced in recent evolution. We examine four cognitive disorders/conditions that exhibit abnormal patterns of (dis)inhibition in these networks: schizophrenia (SZ), autism spectrum disorder (ASD), synaesthesia and Tourette's syndrome (TS), with the goal of understanding why the two phenomena altered reactive aggression and altered cross-modality cluster together in these disorders. Our proposal is that enhanced cross-modality (necessary to support language, in particular metaphoricity) was a result, partly a side-effect, of self-domestication (SD). SD targeted the taming of reactive aggression, but reactive impulses are controlled by the same cortico-subcortical networks that are implicated in cross-modality. We further add that this biological process of SD did not act alone, but was engaged in an intense feedback loop with the cultural emergence of early forms of language/grammar, whose high degree of raw metaphoricity and verbal aggression also contributed to increased brain connectivity and cortical control. Consequently, in conjunction with linguistic expressions serving as approximations/‘fossils’ of the earliest stages of language, these cognitive disorders/conditions serve as confident proxies of brain changes in language evolution, helping us reconstruct certain crucial aspects of early prehistoric languages and cognition, as well as shed new light on the nature of the disorders. This article is part of the theme issue ‘Reconstructing prehistoric languages’.


Reactive Powder Concrete is a Concrete which does not have fine &coarse aggregate in it. It is due to the high cost in coarse aggregate and at the same time scarcity of the fine aggregate. RPC is also consists of fully a partially replacement of cement .so we are using partially replacement of cement. Where it is a special concrete and the microstructure is optimized by precise degree of all particles in the mix yield to maximum density. It consists of metakaolin, quartz-sand and cement. Here we are replacing coarse and fine aggregate by quartz-sand, and cement is partially replaced by metakaolin. And the percentage of meta kaolin is identified by trial and error method. In this we get the compressive, flexural & split tensile strength of RPC for 28 days


2019 ◽  
Author(s):  
Jonas Reeb ◽  
Theresa Wirth ◽  
Burkhard Rost

AbstractDeep mutational scanning (DMS) studies exploit the mutational landscape of sequence variation by systematically and comprehensively assaying the effect of single amino acid variants (SAVs) for particular proteins. Different experimental protocols proxy effect through a diversity of measures. We evaluated three early prediction methods trained on traditional variant effect data (PolyPhen-2, SIFT, SNAP2) along with a regression method optimized on DMS data (Envision). On a common subset of 32,981 SAVs, all methods capture some aspects of variant effects, albeit not the same. Early effect prediction methods correlated slightly more with measurements and better classified binary states (effect or neutral), while Envision predicted better the precise degree of effect. Most surprising was that a simple approach predicting residues conserved in families (found and aligned by PSI-BLAST) in many cases outperformed other methods. All methods predicted beneficial effects (gain-of-function) significantly worse than deleterious (loss-of-function). For the few proteins with several DMS measurements, experiments agreed more with each other than predictions with experiments. Our findings highlight challenges and opportunities of DMS for improving variant effect predictions.


2019 ◽  
Vol 101 (910) ◽  
pp. 333-355
Author(s):  
Michael N. Schmitt

AbstractAs a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.


2017 ◽  
Vol 312 (4) ◽  
pp. F732-F743 ◽  
Author(s):  
Zarine R. Balsara ◽  
Xue Li

The bladder urothelium is essentially quiescent but regenerates readily upon injury. The process of urothelial regeneration harkens back to the process of urothelial development whereby urothelial stem/progenitor cells must proliferate and terminally differentiate to establish all three urothelial layers. How the urothelium regulates the level of proliferation and the timing of differentiation to ensure the precise degree of regeneration is of significant interest in the field. Without a carefully-orchestrated process, urothelial regeneration may be inadequate, thereby exposing the host to toxins or pathogens. Alternatively, regeneration may be excessive, thereby setting the stage for tumor development. This review describes our current understanding of urothelial regeneration. The current controversies surrounding the identity and location of urothelial progenitor cells that mediate urothelial regeneration are discussed and evidence for each model is provided. We emphasize the factors that have been shown to be crucial for urothelial regeneration, including local growth factors that stimulate repair, and epithelial-mesenchymal cross talk, which ensures feedback regulation. Also highlighted is the emerging concept of epigenetic regulation of urothelial regeneration, which additionally fine tunes the process through transcriptional regulation of cell cycle genes and growth and differentiation factors. Finally, we emphasize how several of these pathways and/or programs are often dysregulated during malignant transformation, further corroborating their importance in directing normal urothelial regeneration. Together, evidence in the field suggests that any attempt to exploit regenerative programs for the purposes of enhanced urothelial repair or replacement must take into account this delicate balance.


2015 ◽  
Vol 2 (2) ◽  
Author(s):  
Frank M. Machovec

AbstractThe concepts of free will and uncertainty are inseparably intertwined. This interdisciplinary essay, instead of expounding upon the technical difference between risk and uncertainty (as classically delineated by Frank Knight), assumes that both words bring to mind the same general idea to a layperson, namely, something that’s not certain to occur but may occur, whether or not the precise degree of likelihood can be calculated. With this simplification as a given, the article proceeds to analyze, first, the cultural perspective that’s a prerequisite to the existence of a belief in free will; second, the role of the limits of human knowledge in constraining the efficacy of the quest to battle uncertainty by building models of predictability and control in the physical sciences versus the social sciences; and third (and finally), the negative implications for capital-market health of attempting to satisfy, through the adoption of public policies of redress and entitlement based on a Rawlsian system of fairness, the alleged yearning by individuals to obviate distributional uncertainty.


2014 ◽  
Vol 79 (01) ◽  
pp. 103-134 ◽  
Author(s):  
M. MALLIARIS ◽  
S. SHELAH

Abstract Our results in this paper increase the model-theoretic precision of a widely used method for building ultrafilters, and so advance the general problem of constructing ultrafilters whose ultrapowers have a precise degree of saturation. We begin by showing that any flexible regular ultrafilter makes the product of an unbounded sequence of finite cardinals large, thus saturating any stable theory. We then prove directly that a “bottleneck” in the inductive construction of a regular ultrafilter on λ (i.e., a point after which all antichains of ${\cal P}\left( \lambda \right)/{\cal D}$ have cardinality less than λ) essentially prevents any subsequent ultrafilter from being flexible, thus from saturating any nonlow theory. The constructions are as follows. First, we construct a regular filter ${\cal D}$ on λ so that any ultrafilter extending ${\cal D}$ fails to ${\lambda ^ + }$ -saturate ultrapowers of the random graph, thus of any unstable theory. The proof constructs the omitted random graph type directly. Second, assuming existence of a measurable cardinal κ, we construct a regular ultrafilter on $\lambda > \kappa$ which is λ-flexible but not ${\kappa ^{ + + }}$ -good, improving our previous answer to a question raised in Dow (1985). Third, assuming a weakly compact cardinal κ, we construct an ultrafilter to show that ${\rm{lcf}}\left( {{\aleph _0}} \right)$ may be small while all symmetric cuts of cofinality κ are realized. Thus certain families of precuts may be realized while still failing to saturate any unstable theory.


2013 ◽  
Vol 779-780 ◽  
pp. 779-783
Author(s):  
Huan Jiong Zhang ◽  
Xiao Ping Jin ◽  
Ping Zhang

in this paper, the key technology of the traffic statement automatic detection is researched, based on analyzing the properties of the information from the collected license plates, a new automatic traffic statement detective method is pointed out, this new method can express the essential characters of the traffic statement, and valuably gain the precise degree. This automatic detective method expresses the fine applicative prospect in the field of the real time traffic statement detection and management.


Sign in / Sign up

Export Citation Format

Share Document