Examining the Brain as a Neural Information Super-Highway

An article demonstrating how tools for modeling traffic on the Internet and telephone systems can be used to study information flow in brain networks will be published in the open-access journal PLoS Computational Biology on 2nd June 2011.

The brain functions as a complex system of regions that must communicate with each other to enable everyday activities such as perception and cognition. This need for networked computation is a challenge common to multiple types of communication systems. Thus, important questions about how information is routed and emitted from individual brain regions may be addressed by drawing parallels with other well-known types of communication systems, such as the Internet.

The authors, from the Rotman Research Institute at Baycrest Centre, Toronto, Canada, showed that -- similar to other communication networks -- the timing pattern of information emission is highly indicative of information traffic flow through the network. In this study the output of information was sensitive to subtle differences between individual subjects, cognitive states and brain regions.

The researchers recorded electrical activity from the brain and used signal processing techniques to precisely determine exactly when units of information get emitted from different regions. They then showed that the times between successive departures are distributed according to a specific distribution. For instance, when research study participants were asked to open their eyes in order to allow visual input, emission times became significantly more variable in parts of the brain responsible for visual processing, reflecting and indicating increased neural "traffic" through the underlying brain regions.

This method can be broadly applied in neuroscience and may potentially be used to study the effects of neural development and aging, as well as neurodegenerative disease, where traffic flow would be compromised by the loss of certain nodes or disintegration of pathways.

This research was funded by grants from the Canadian Institutes of Health Research (CIHR) and Santa Fe Institute Consortium to TP and a J.S. McDonnel Foundation grant to ARM.

One Comment

  1. ◾PROTOCOL SHIELDERS◾
    HELLO, I am COREY RODRIGUEZ by name,the only CEO of protocol-cyber-shield-hackers.  In this message, we will explain how you can almost avoid SCAMMERS and stay safe,  plus how our organization works. Read it carefully,Its reading will not take more than 10mins. 
    We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are been answered here.

    ⚠️WARNING:
    MOST HACKERS YOU SEE HERE ARE FAKES AND SIMULTANEOUSLY INCONGRUOUS. 
    It tears US up when we receive bitter mails of Jobs attempts proposals from most clients with hacking issues but never get close to having them done, thereby wasting a lot $ in the process, 
    EXAMPLES: 
    ➡️MOBILE PHONE HACKING.
    ➡️BINARY FUNDS&BITCOIN RECOVERIES.

    ➡️SOCIAL MEDIA ACCOUNT&EMAIL HACKING etc....
    if you in a haste to have any of these done by seeking hackers yourselves,you will only get ripped.
    PLEASE PAY ATTENTION TO THIS ARTICLE AS YOU READ THROUGH IT.

    HOW WOULD YOU KNOW?? 

    TAKE NOTE AND PRECAUTIONS:

    1. you see uncertified email accounts carrying numberings likeiamhacklord1232@(gmail,yahoo or hotmailDOTcom)  pls flee from them, BIG SCAMMERS.

    They take your money and never do your job.

    2. you see posts like "do you need to spy on spouse?" All fake!just a way to lure you towards getting ripped!. 3, posting fake testimonies and comments to trick you into feeling safe. Pls endeavour to ignore!! 

    ➡️NOTE: beware as we urge you not to make respond to any "IVAN HONG,PETER SANTOS,MONICA HART (impersonating with our articles pretending to work under us)
    WE ONLY HAVE 2 EMAILS WHICH ARE LISTED BELOW THIS ARTICLE TO ATTEND TO ALL MANNERS OF CYBER HACKING ISSUES.

                           ◾VERY IMPORTANT ◾
    For years now, We've helped  organizations  secure data base,  so many sites USE US AS SECURITY BACK UP TEAM BECAUSE OF OUR METHODS OF  HANDLING CYBER MISHAPS. 

    "iPhone&ANDROID HACKS"

    "CLEAR CRIMINAL RECORDS"   

    "FUNDS RECOVERIES" AND LOT MORE BEEN DONE IN SHORT TIMING.
    these are significant EXPERIENCES & RECORDS a good and effectively fully recognized organization must firmly ascertain. 

                            ◾OUR AIMS HERE◾

    1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

    2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the  availability of time given for Job contracts given to us.Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.
     write us on:
    ◾Protocolhacks@gmail .com
    ◾Cybershieldnotch@gmail .com
    COREY ROD, 
    SIGNED...
    Thank you..

    ReplyDelete

Back to Top