code

Review: Let's hear it for the codependents

Nina Renata Aron's memoir, "Good Morning, Destroyer of Men's Souls," doubles as an ennobling history of recovering enablers of addiction.




code

Motorists given ‘green light’ to break speed limit as roads turn into ‘postcode lottery'



LOCKDOWN measures could turn the UK into "postcode lottery" as police forces admit they will not pursue low level speeding offences amid the restrictions.




code

oscon: RT @OReillyMedia #Video Deal/Week: Data and Databases at #OSCON 2012 - $49.99 (Save 50%) Use code VDWK http://t.co/BnDD750NQv

oscon: RT @OReillyMedia #Video Deal/Week: Data and Databases at #OSCON 2012 - $49.99 (Save 50%) Use code VDWK http://t.co/BnDD750NQv




code

oscon: Alumnus of #OSCON can save an extra 20% on their 2013 registration. Use code ALUMNI when you register http://t.co/E0JKpcj1Rp #opensource

oscon: Alumnus of #OSCON can save an extra 20% on their 2013 registration. Use code ALUMNI when you register http://t.co/E0JKpcj1Rp #opensource




code

oscon: Easily Invoke Common Protocols with Twisted - Spin up Python-friendly services with 0 lines of code http://t.co/29oTkk0isW

oscon: Easily Invoke Common Protocols with Twisted - Spin up Python-friendly services with 0 lines of code http://t.co/29oTkk0isW




code

AI and Machine Learning for Coders

If you’re looking to make a career move from programmer to AI specialist, this is the ideal place to start. Based on Laurence Moroney's extremely successful AI courses, this introductory book provides a hands-on, code-first approach to help you build confidence while you learn key topics.You’ll understand how to implement the most common scenarios in machine learning, such as computer vision, natural language processing (NLP), and sequence modeling for web, mobile, cloud, and embedded runtimes.




code

Effects of deficiency in the RLBP1-encoded visual cycle protein CRALBP on visual dysfunction in humans and mice [Cell Biology]

Mutations in retinaldehyde-binding protein 1 (RLBP1), encoding the visual cycle protein cellular retinaldehyde-binding protein (CRALBP), cause an autosomal recessive form of retinal degeneration. By binding to 11-cis-retinoid, CRALBP augments the isomerase activity of retinoid isomerohydrolase RPE65 (RPE65) and facilitates 11-cis-retinol oxidation to 11-cis-retinal. CRALBP also maintains the 11-cis configuration and protects against unwanted retinaldehyde activity. Studying a sibling pair that is compound heterozygous for mutations in RLBP1/CRALBP, here we expand the phenotype of affected individuals, elucidate a previously unreported phenotype in RLBP1/CRALBP carriers, and demonstrate consistencies between the affected individuals and Rlbp1/Cralbp−/− mice. In the RLBP1/CRALBP-affected individuals, nonrecordable rod-specific electroretinogram traces were recovered after prolonged dark adaptation. In ultrawide-field fundus images, we observed radially arranged puncta typical of RLBP1/CRALBP-associated disease. Spectral domain-optical coherence tomography (SD-OCT) revealed hyperreflective aberrations within photoreceptor-associated bands. In short-wavelength fundus autofluorescence (SW-AF) images, speckled hyperautofluorescence and mottling indicated macular involvement. In both the affected individuals and their asymptomatic carrier parents, reduced SW-AF intensities, measured as quantitative fundus autofluorescence (qAF), indicated chronic impairment in 11-cis-retinal availability and provided information on mutation severity. Hypertransmission of the SD-OCT signal into the choroid together with decreased near-infrared autofluorescence (NIR-AF) provided evidence for retinal pigment epithelial cell (RPE) involvement. In Rlbp1/Cralbp−/− mice, reduced 11-cis-retinal levels, qAF and NIR-AF intensities, and photoreceptor loss were consistent with the clinical presentation of the affected siblings. These findings indicate that RLBP1 mutations are associated with progressive disease involving RPE atrophy and photoreceptor cell degeneration. In asymptomatic carriers, qAF disclosed previously undetected visual cycle deficiency.




code

Human Hepatocyte Nuclear Factor 4-{alpha} Encodes Isoforms with Distinct Transcriptional Functions [Research]

HNF4α is a nuclear receptor produced as 12 isoforms from two promoters by alternative splicing. To characterize the transcriptional capacities of all 12 HNF4α isoforms, stable lines expressing each isoform were generated. The entire transcriptome associated with each isoform was analyzed as well as their respective interacting proteome. Major differences were noted in the transcriptional function of these isoforms. The α1 and α2 isoforms were the strongest regulators of gene expression whereas the α3 isoform exhibited significantly reduced activity. The α4, α5, and α6 isoforms, which use an alternative first exon, were characterized for the first time, and showed a greatly reduced transcriptional potential with an inability to recognize the consensus response element of HNF4α. Several transcription factors and coregulators were identified as potential specific partners for certain HNF4α isoforms. An analysis integrating the vast amount of omics data enabled the identification of transcriptional regulatory mechanisms specific to certain HNF4α isoforms, hence demonstrating the importance of considering all isoforms given their seemingly diverse functions.




code

Low-Code Automation and the Future of Work

Tuesday, April 28, 2020 - 13:15




code

CBD News: An informal meeting for government experts and relevant stakeholders to discuss model contractual clauses, voluntary codes of conduct, guidelines and best practices and/or standards, as set out in Articles 19 and 20 of the Nagoya Protocol on Acc




code

Learn to code with these classroom-based UK coding courses




code

Human Hepatocyte Nuclear Factor 4-{alpha} Encodes Isoforms with Distinct Transcriptional Functions

Élie Lambert
May 1, 2020; 19:808-827
Research




code

Improving Identification of In-organello Protein-Protein Interactions Using an Affinity-enrichable, Isotopically Coded, and Mass Spectrometry-cleavable Chemical Crosslinker

Karl A. T. Makepeace
Apr 1, 2020; 19:624-639
Research




code

Create a Global Code of Conduct for Outer Space

12 June 2019

Dr Patricia Lewis

Research Director, Conflict, Science & Transformation; Director, International Security Programme
The rules governing human activity in space have been in place for only a few decades, and yet they are already out of date. They need to be built on and extended to reflect the dramatic and rapid changes in the use of space.

2016-09-27-Space2.jpg

Nighttime view of the strait of Gibraltar. Photo by NASA.

The 1967 Outer Space Treaty (OST) is the mainframe for space law. It recognizes the importance of the use and scientific exploration of outer space for the benefit and in the interests of all countries. It also prohibits national sovereignty in space, including of the Moon and other celestial bodies.

The OST prohibits all weapons of mass destruction in space – in orbit or on other planets and moons – and does not allow the establishment of military infrastructure, manoeuvres or the testing of any type of weapon on planets or moons. As the treaty makes clear, outer space is for peaceful purposes only. Except of course, it is not – nor has it ever been so.

The very first satellite, Sputnik, was a military satellite which kicked off the Cold War space race between the US and the USSR. The militaries of many countries followed suit, and space is now used for military communication, signals intelligence, imaging, targeting, arms control verification and so on.

However, in keeping with international aspirations, space is also being used for all kinds of peaceful purposes such as environmental monitoring, broadcast communications, delivering the internet, weather prediction, navigation, scientific exploration and – very importantly – monitoring the ‘space weather’ (including the activity from the Sun).

There are several other international agreements on space, such as on the rescue of astronauts, the registration of satellites and liability for damage caused by space objects. There is also the Moon Treaty, which governs activities on the Moon and other moons, asteroids and planets.[i]

More recently, states at the UN Committee on the Peaceful Uses of Outer Space (COPUOS) in Vienna have agreed on guidelines to deal with the worrying situation of space debris which is cluttering up orbits and posing a danger to satellites, the space station and astronauts.

The problem the international community now faces is that the use of space is changing dramatically and rapidly. There are more satellites than ever – well over 1,000 – and more owners of satellites – almost every country uses information generated from space. Increasingly, however, those owners are not countries, militaries or international organizations but the commercial sector. Very soon, the owners will even include individuals.

Small ‘mini-satellites’ or ‘cube-sats’ are poised to be deployed in space. These can act independently or in ‘swarms’, and are so small that they piggy-back on the launching of other satellites and so are very cheap to launch. This is changing the cost–benefit equation of satellite ownership and use. Developing countries are increasingly dependent on space for communications, the internet and information on, for example, weather systems, coastal activities and agriculture. 

Another major development is the advent of asteroid mining. Asteroids contain a wide range of metals and minerals – some asteroids are more promising than others, and some are closer to Earth than others. Several companies have been set up and registered around the world to begin the exploitation of asteroids for precious metals (such as platinum) and compounds (such as rare-earth minerals).

Legally, however, this will be a murky venture. The current international treaty regime prohibits the ownership of a celestial body by a country – space is for all. But does international law prohibit the ownership or exploitation of a celestial body by a private company? The law has yet to be tested, but there are space lawyers who think that companies are exempt. Luxembourg and Australia are two countries that have already begun the registration of interest for space-mining companies.

As humanity becomes more dependent on information that is generated in or transmitted through space, the vulnerability to the manipulation of space data is increasing. The demands on the use of communications frequencies (the issue of spectrum availability and rights), managed by the International Telecommunication Union (ITU),[ii] need to be urgently addressed.

There are now constant cyberattacks in space and on the digital information on which our systems rely. For example, position, navigation and timing information such as from GPS or Galileo is not only vital for getting us safely from A to B, but also for fast-moving financial transactions that require accurate timing signals.

Almost all of our electronic systems depend on those timing signals for synchronization and basic functioning. Cyber hacks, digital spoofing and ‘fake’ information are now a real possibility. There is no rules-based order in place that is fit to deal with these types of attacks.

Cyberweapons are only part of the problem. It is assumed that states, if they haven’t already done so, will be positioning ‘defensive’ space weaponry to protect their satellites. The protection may be intended to be against space debris – nets, grabber bars and harpoons, for example, are all being investigated.

All of these ideas, however, could be used as offensive weapons. Once one satellite operator decides to equip its assets with such devices, many others will follow. The weaponization of space is in the horizon.

There are no international rules or agreements to manage these developments. Attempts in Geneva to address the arms race in space have floundered alongside the inability of the Conference on Disarmament to negotiate any instrument since 1996.

Attempts to develop rules of the road and codes of conduct, or even to begin negotiations to prohibit weapons in space, have failed again and again. There are no agreed rules to govern cyber activity. The Tallinn Manuals[iii] that address how international law is applicable to cyberwarfare also address the laws of armed conflict in space, but data spoofing and cyber hacking in space exist in far murkier legal frameworks.

The current system of international space law – which does not even allow for a regular review and consideration of the OST – is struggling to keep up. Space is the inheritance of humankind, yet the current generation of elders – as they have done with so many other parts of our global environment – have let things go and failed to shepherd in the much-needed system of rules to protect space for future generations.

It is not too late, but it will require international cooperation among the major space players: Russia, the US, China, India and Europe – hardly a promising line-up of collaborators in the current political climate.

Filling the governance gaps

Norms of behaviour and rules of the road need to be established for space before it becomes a 21st-century ‘wild west’ of technology and activity. Issues such as cleaning up space debris, the principle of non-interference, and how close satellites can manoeuvre to each other (proximity rules) need to be agreed as a set of international norms for space behaviour.

A cross-regional group of like-minded countries (for example Algeria, Canada, Chile, France, India, Kazakhstan, Malaysia, Nigeria, Sweden, the UAE and the UK) should link up with UN bodies, including the Office for Outer Space Affairs (UNOOSA), COPUOS and ITU, and key private-sector companies to kick-start a new process for a global code of conduct to establish norms and regulate behaviour in space.

The UN could be the host entity for this new approach – or it could be established in the way the Ottawa process for landmines was established, by a group of like-minded states with collective responsibility for, and collective hosting and funding of, the negotiations.

A new approach should also cover cybersecurity in space. The UN processes on space and cyber should intersect more to find ways to create synergies in their endeavours. And the problems ahead as regards spectrum management – particularly given the large number of small satellites and constellations that are to be launched in the near future – need urgent attention in ITU.

What needs to happen

  • The international rules-based order for space – enshrined in particular in the 1967 Outer Space Treaty – has not kept pace with the rapid and dramatic changes in the use of space. New norms of behaviour and rules of the road are needed.
  • These norms and rules need to address a host of contemporary or prospective developments, including asteroid mining, increased numbers of satellite owners, the emergence of ‘mini-satellites’, cyberwarfare, and the potential deployment of ‘defensive’ space weaponry to protect satellites.
  • A cross-regional group of like-minded countries should link up with UN bodies – including UNOOSA, COPUOS and ITU – and key private-sector companies to kick-start a new process for developing a global code of conduct.
  • Problems related to radio spectrum management – given the large number of small satellites and constellations to be launched in the near future – need urgent attention in ITU.

Notes

[i] All of these treaties and other documents can be found at UN Office for Outer Space Affairs (2002), United Nations Treaties and Principles on Outer Space, http://www.unoosa.org/pdf/publications/STSPACE11E.pdf.

[ii] ITU (undated), ‘ITU Radiocommunication Sector’, https://www.itu.int/en/ITU-R/Pages/default.aspx.

[iii] The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), ‘Tallinn Manual 2.0’, https://ccdcoe.org/research/tallinn-manual/.

This essay was produced for the 2019 edition of Chatham House Expert Perspectives – our annual survey of risks and opportunities in global affairs – in which our researchers identify areas where the current sets of rules, institutions and mechanisms for peaceful international cooperation are falling short, and present ideas for reform and modernization.




code

Improving Identification of In-organello Protein-Protein Interactions Using an Affinity-enrichable, Isotopically Coded, and Mass Spectrometry-cleavable Chemical Crosslinker [Research]

An experimental and computational approach for identification of protein-protein interactions by ex vivo chemical crosslinking and mass spectrometry (CLMS) has been developed that takes advantage of the specific characteristics of cyanurbiotindipropionylsuccinimide (CBDPS), an affinity-tagged isotopically coded mass spectrometry (MS)-cleavable crosslinking reagent. Utilizing this reagent in combination with a crosslinker-specific data-dependent acquisition strategy based on MS2 scans, and a software pipeline designed for integrating crosslinker-specific mass spectral information led to demonstrated improvements in the application of the CLMS technique, in terms of the detection, acquisition, and identification of crosslinker-modified peptides. This approach was evaluated on intact yeast mitochondria, and the results showed that hundreds of unique protein-protein interactions could be identified on an organelle proteome-wide scale. Both known and previously unknown protein-protein interactions were identified. These interactions were assessed based on their known sub-compartmental localizations. Additionally, the identified crosslinking distance constraints are in good agreement with existing structural models of protein complexes involved in the mitochondrial electron transport chain.




code

Human Hepatocyte Nuclear Factor 4-{alpha} Encodes Isoforms with Distinct Transcriptional Functions [Research]

HNF4α is a nuclear receptor produced as 12 isoforms from two promoters by alternative splicing. To characterize the transcriptional capacities of all 12 HNF4α isoforms, stable lines expressing each isoform were generated. The entire transcriptome associated with each isoform was analyzed as well as their respective interacting proteome. Major differences were noted in the transcriptional function of these isoforms. The α1 and α2 isoforms were the strongest regulators of gene expression whereas the α3 isoform exhibited significantly reduced activity. The α4, α5, and α6 isoforms, which use an alternative first exon, were characterized for the first time, and showed a greatly reduced transcriptional potential with an inability to recognize the consensus response element of HNF4α. Several transcription factors and coregulators were identified as potential specific partners for certain HNF4α isoforms. An analysis integrating the vast amount of omics data enabled the identification of transcriptional regulatory mechanisms specific to certain HNF4α isoforms, hence demonstrating the importance of considering all isoforms given their seemingly diverse functions.




code

Problem Notes for SAS®9 - 65939: "ERROR: Unable to transcode data to/from UCS-2 encoding" occurs when you run an SQL query using SAS/ACCESS Interface to ODBC on SAS 9.4M5 with UTF-8

When you run an SQL query using SAS/ACCESS Interface to ODBC under the following conditions, you might receive an error: You run SAS 9.4M5 (TS1M5) or SAS 9.4M6 (TS1M6)  i




code

Problem Notes for SAS®9 - 65935: The UNICODE function does not support Numeric Character Representation (NCR) for a surrogate pair

Using the NCR form of a surrogate pair as an input string to the UNICODE function does not convert the string to the appropriate display character.




code

Effects of deficiency in the RLBP1-encoded visual cycle protein CRALBP on visual dysfunction in humans and mice [Cell Biology]

Mutations in retinaldehyde-binding protein 1 (RLBP1), encoding the visual cycle protein cellular retinaldehyde-binding protein (CRALBP), cause an autosomal recessive form of retinal degeneration. By binding to 11-cis-retinoid, CRALBP augments the isomerase activity of retinoid isomerohydrolase RPE65 (RPE65) and facilitates 11-cis-retinol oxidation to 11-cis-retinal. CRALBP also maintains the 11-cis configuration and protects against unwanted retinaldehyde activity. Studying a sibling pair that is compound heterozygous for mutations in RLBP1/CRALBP, here we expand the phenotype of affected individuals, elucidate a previously unreported phenotype in RLBP1/CRALBP carriers, and demonstrate consistencies between the affected individuals and Rlbp1/Cralbp−/− mice. In the RLBP1/CRALBP-affected individuals, nonrecordable rod-specific electroretinogram traces were recovered after prolonged dark adaptation. In ultrawide-field fundus images, we observed radially arranged puncta typical of RLBP1/CRALBP-associated disease. Spectral domain-optical coherence tomography (SD-OCT) revealed hyperreflective aberrations within photoreceptor-associated bands. In short-wavelength fundus autofluorescence (SW-AF) images, speckled hyperautofluorescence and mottling indicated macular involvement. In both the affected individuals and their asymptomatic carrier parents, reduced SW-AF intensities, measured as quantitative fundus autofluorescence (qAF), indicated chronic impairment in 11-cis-retinal availability and provided information on mutation severity. Hypertransmission of the SD-OCT signal into the choroid together with decreased near-infrared autofluorescence (NIR-AF) provided evidence for retinal pigment epithelial cell (RPE) involvement. In Rlbp1/Cralbp−/− mice, reduced 11-cis-retinal levels, qAF and NIR-AF intensities, and photoreceptor loss were consistent with the clinical presentation of the affected siblings. These findings indicate that RLBP1 mutations are associated with progressive disease involving RPE atrophy and photoreceptor cell degeneration. In asymptomatic carriers, qAF disclosed previously undetected visual cycle deficiency.




code

The Diabetes Code: Prevent and Reverse Type 2 Diabetes Naturally

Renza Scibilia
Jul 1, 2019; 37:302-303
Book Reviews




code

Framingham, SCORE, and DECODE Risk Equations Do Not Provide Reliable Cardiovascular Risk Estimates in Type 2 Diabetes

Ruth L. Coleman
May 1, 2007; 30:1292-1293
BR Cardiovascular and Metabolic Risk




code

Member review, comment solicited for changes to CDT Code

The 2021 Code on Dental Procedures and Nomenclature — better known as the CDT Code — could include changes or additions to codes regarding oral/oropharyngeal cancer, caries management by risk assessment, laboratory surface scanning for diagnostic purposes, and counseling for the control and prevention of adverse oral, behavioral, and systemic health effects associated with high-risk substance use.




code

Code Maintenance Committee approves new codes associated with vaping, teledentistry

On the heels of the ADA’s December interim policy on vaping comes a new CDT code that references counseling services about high-risk substance use including vaping.




code

ADA council affirms importance of code of ethics during COVID-19 pandemic

The ADA Council on Ethics, Bylaws and Judicial Affairs’ ethics subcommittee authored an online essay as part of its Ethical Moment series in the May issue of The Journal of the American Dental Association, affirming that the ADA Principles of Ethics and Code of Professional Conduct is just as important as ever when making the difficult decisions they encounter on a daily basis.




code

The diabetes code : prevent and reverse type 2 diabetes naturally / Dr. Jason Fung ; foreword by Nina Teicholz.

Prediabetic state -- Prevention.




code

Interpreting Rate-Distortion of Variational Autoencoder and Using Model Uncertainty for Anomaly Detection. (arXiv:2005.01889v2 [cs.LG] UPDATED)

Building a scalable machine learning system for unsupervised anomaly detection via representation learning is highly desirable. One of the prevalent methods is using a reconstruction error from variational autoencoder (VAE) via maximizing the evidence lower bound. We revisit VAE from the perspective of information theory to provide some theoretical foundations on using the reconstruction error, and finally arrive at a simpler and more effective model for anomaly detection. In addition, to enhance the effectiveness of detecting anomalies, we incorporate a practical model uncertainty measure into the metric. We show empirically the competitive performance of our approach on benchmark datasets.




code

Data-Space Inversion Using a Recurrent Autoencoder for Time-Series Parameterization. (arXiv:2005.00061v2 [stat.ML] UPDATED)

Data-space inversion (DSI) and related procedures represent a family of methods applicable for data assimilation in subsurface flow settings. These methods differ from model-based techniques in that they provide only posterior predictions for quantities (time series) of interest, not posterior models with calibrated parameters. DSI methods require a large number of flow simulations to first be performed on prior geological realizations. Given observed data, posterior predictions can then be generated directly. DSI operates in a Bayesian setting and provides posterior samples of the data vector. In this work we develop and evaluate a new approach for data parameterization in DSI. Parameterization reduces the number of variables to determine in the inversion, and it maintains the physical character of the data variables. The new parameterization uses a recurrent autoencoder (RAE) for dimension reduction, and a long-short-term memory (LSTM) network to represent flow-rate time series. The RAE-based parameterization is combined with an ensemble smoother with multiple data assimilation (ESMDA) for posterior generation. Results are presented for two- and three-phase flow in a 2D channelized system and a 3D multi-Gaussian model. The RAE procedure, along with existing DSI treatments, are assessed through comparison to reference rejection sampling (RS) results. The new DSI methodology is shown to consistently outperform existing approaches, in terms of statistical agreement with RS results. The method is also shown to accurately capture derived quantities, which are computed from variables considered directly in DSI. This requires correlation and covariance between variables to be properly captured, and accuracy in these relationships is demonstrated. The RAE-based parameterization developed here is clearly useful in DSI, and it may also find application in other subsurface flow problems.




code

Alternating Maximization: Unifying Framework for 8 Sparse PCA Formulations and Efficient Parallel Codes. (arXiv:1212.4137v2 [stat.ML] UPDATED)

Given a multivariate data set, sparse principal component analysis (SPCA) aims to extract several linear combinations of the variables that together explain the variance in the data as much as possible, while controlling the number of nonzero loadings in these combinations. In this paper we consider 8 different optimization formulations for computing a single sparse loading vector; these are obtained by combining the following factors: we employ two norms for measuring variance (L2, L1) and two sparsity-inducing norms (L0, L1), which are used in two different ways (constraint, penalty). Three of our formulations, notably the one with L0 constraint and L1 variance, have not been considered in the literature. We give a unifying reformulation which we propose to solve via a natural alternating maximization (AM) method. We show the the AM method is nontrivially equivalent to GPower (Journ'{e}e et al; JMLR 11:517--553, 2010) for all our formulations. Besides this, we provide 24 efficient parallel SPCA implementations: 3 codes (multi-core, GPU and cluster) for each of the 8 problems. Parallelism in the methods is aimed at i) speeding up computations (our GPU code can be 100 times faster than an efficient serial code written in C++), ii) obtaining solutions explaining more variance and iii) dealing with big data problems (our cluster code is able to solve a 357 GB problem in about a minute).




code

Binary code fingerprinting for cybersecurity : application to malicious code fingerprinting

Alrabaee, Saed, authior
9783030342388 (electronic bk.)




code

Matching strings in encoded sequences

Adriana Coutinho, Rodrigo Lambert, Jérôme Rousseau.

Source: Bernoulli, Volume 26, Number 3, 2021--2050.

Abstract:
We investigate the length of the longest common substring for encoded sequences and its asymptotic behaviour. The main result is a strong law of large numbers for a re-scaled version of this quantity, which presents an explicit relation with the Rényi entropy of the source. We apply this result to the zero-inflated contamination model and the stochastic scrabble. In the case of dynamical systems, this problem is equivalent to the shortest distance between two observed orbits and its limiting relationship with the correlation dimension of the pushforward measure. An extension to the shortest distance between orbits for random dynamical systems is also provided.




code

Comment: Variational Autoencoders as Empirical Bayes

Yixin Wang, Andrew C. Miller, David M. Blei.

Source: Statistical Science, Volume 34, Number 2, 229--233.




code

Heteromodal Cortical Areas Encode Sensory-Motor Features of Word Meaning

The capacity to process information in conceptual form is a fundamental aspect of human cognition, yet little is known about how this type of information is encoded in the brain. Although the role of sensory and motor cortical areas has been a focus of recent debate, neuroimaging studies of concept representation consistently implicate a network of heteromodal areas that seem to support concept retrieval in general rather than knowledge related to any particular sensory-motor content. We used predictive machine learning on fMRI data to investigate the hypothesis that cortical areas in this "general semantic network" (GSN) encode multimodal information derived from basic sensory-motor processes, possibly functioning as convergence–divergence zones for distributed concept representation. An encoding model based on five conceptual attributes directly related to sensory-motor experience (sound, color, shape, manipulability, and visual motion) was used to predict brain activation patterns associated with individual lexical concepts in a semantic decision task. When the analysis was restricted to voxels in the GSN, the model was able to identify the activation patterns corresponding to individual concrete concepts significantly above chance. In contrast, a model based on five perceptual attributes of the word form performed at chance level. This pattern was reversed when the analysis was restricted to areas involved in the perceptual analysis of written word forms. These results indicate that heteromodal areas involved in semantic processing encode information about the relative importance of different sensory-motor attributes of concepts, possibly by storing particular combinations of sensory and motor features.

SIGNIFICANCE STATEMENT The present study used a predictive encoding model of word semantics to decode conceptual information from neural activity in heteromodal cortical areas. The model is based on five sensory-motor attributes of word meaning (color, shape, sound, visual motion, and manipulability) and encodes the relative importance of each attribute to the meaning of a word. This is the first demonstration that heteromodal areas involved in semantic processing can discriminate between different concepts based on sensory-motor information alone. This finding indicates that the brain represents concepts as multimodal combinations of sensory and motor representations.




code

The Effect of Counterfactual Information on Outcome Value Coding in Medial Prefrontal and Cingulate Cortex: From an Absolute to a Relative Neural Code

Adaptive coding of stimuli is well documented in perception, where it supports efficient encoding over a broad range of possible percepts. Recently, a similar neural mechanism has been reported also in value-based decision, where it allows optimal encoding of vast ranges of values in PFC: neuronal response to value depends on the choice context (relative coding), rather than being invariant across contexts (absolute coding). Additionally, value learning is sensitive to the amount of feedback information: providing complete feedback (both obtained and forgone outcomes) instead of partial feedback (only obtained outcome) improves learning. However, it is unclear whether relative coding occurs in all PFC regions and how it is affected by feedback information. We systematically investigated univariate and multivariate feedback encoding in various mPFC regions and compared three modes of neural coding: absolute, partially-adaptive and fully-adaptive.

Twenty-eight human participants (both sexes) performed a learning task while undergoing fMRI scanning. On each trial, they chose between two symbols associated with a certain outcome. Then, the decision outcome was revealed. Notably, in one-half of the trials participants received partial feedback, whereas in the other half they got complete feedback. We used univariate and multivariate analysis to explore value encoding in different feedback conditions.

We found that both obtained and forgone outcomes were encoded in mPFC, but with opposite sign in its ventral and dorsal subdivisions. Moreover, we showed that increasing feedback information induced a switch from absolute to relative coding. Our results suggest that complete feedback information enhances context-dependent outcome encoding.

SIGNIFICANCE STATEMENT This study offers a systematic investigation of the effect of the amount of feedback information (partial vs complete) on univariate and multivariate outcome value encoding, within multiple regions in mPFC and cingulate cortex that are critical for value-based decisions and behavioral adaptation. Moreover, we provide the first comparison of three possible models of neural coding (i.e., absolute, partially-adaptive, and fully-adaptive coding) of value signal in these regions, by using commensurable measures of prediction accuracy. Taken together, our results help build a more comprehensive picture of how the human brain encodes and processes outcome value. In particular, our results suggest that simultaneous presentation of obtained and foregone outcomes promotes relative value representation.




code

Codex Alimentarius: protecting health, facilitating trade

Eradicating world hunger can only be achieved if food is safe, nutritious and of good quality. Eating unsafe food increases the chances of contracting diseases and can be, in some cases, deadly. Unsafe food can also lead to rejections causing food to be wasted, which then impacts on food security. One thing is certain: there can be no food security [...]






code

http://digg.com/submit?url=http://www.edge.org/conversation/a-universe-of-self-replicating-code




code

The Narnia Code




code

Markets Committee calls for wider adoption of global code of conduct for foreign exchange markets

Markets Committee calls for wider adoption of global code of conduct for foreign exchange markets (Press release, 30 January 2020)




code

LOCKDOWN HOMEWORK: How to teach your children to code and build their own robot

HELP is on hand for parents hoping to inspire their children at home during the coronavirus lockdown – and it’s all free.




code

Why Do Schools Hang On to Discriminatory Dress Codes?

School dress codes are clashing with students, parents, and researchers who see the rules and their enforcement as rife with racism and sexism. Some school leaders say the codes are important for safety and teaching kids to comply.




code

Using Data to Decode English-Learner Education

The Migration Policy Institute published the first in a series of reports that aim to educate parents, policymakers, and the public about how to find and use data to examine whether schools are adequately serving their English-language-learner students.




code

When moral codes disappear in the fog of bloody war

The court was furnished in blond wood. There were no wigs and the accused man wore a jersey. But the informality was in contrast to the gravity of the charges. An army officer was on trial for a war crime: the killing of 11 innocent women and children in Afghanistan.




code

National Patterns of Codeine Prescriptions for Children in the Emergency Department

Owing to genetic variability in its metabolism, codeine can lead to fatal toxicity or inadequate treatment in pediatric subpopulations and several guidelines have recommended against its use in children. Little is known about codeine prescribing for children in the United States.

There has been a small decline in pediatric codeine prescriptions overall in emergency departments, but no change in prescription for children who have cough or upper respiratory infection, despite professional recommendations against this practice. Substantial numbers of children are being prescribed codeine annually. (Read the full article)




code

Busting the Zip Code Curse with Blended Learning

Online learning holds great potential to transform rural education by ensuring that every student has access to great instruction.




code

PHP Barcode Generator Save Image (New)

Package:
Summary:
Generate barcode images in several formats
Groups:
Author:
Description:
This package can generate barcode images in several formats...

Read more at https://www.phpclasses.org/package/11615-PHP-Generate-barcode-images-in-several-formats.html




code

Google Authenticator Update Allows Transfer of 2FA Codes Between Devices

Google has released an update for its Authenticator app to allow users to manage their account security keys easily while switching to a different phone.




code

Moratorium under the Insolvency And Bankruptcy Code

Moratorium under the Insolvency And Bankruptcy Code




code

27,000 coders vs. the coronavirus

At the end of March, the German government sponsored a hackathon called #WirVsVirus. The aim was to bring Germany’s collective coding expertise to bear on some of the many problems surrounding COVID-19. In total, more than 27,000 coders joined the challenge, working from home, and programming for 48 hours from [...]

27,000 coders vs. the coronavirus was published on SAS Voices by Tom Sabo




code

Code Purple Declared As Bitterly Cold Temperatures, Sub-Zero Wind Chills Arrive

NEW CASTLE (Jan. 30, 2019) With Delaware facing the coldest temperatures of the winter from Wednesday night through Thursday, Code Purple is being declared across the state by the nonprofit and volunteer organizations that operate the shelters to keep people who are homeless safe during dangerous winter weather. When severe snowstorms or sub-zero temperatures are […]