- Full text PDF available (3)
The Wisconsin Card Sorting Test (WCST) evaluates a subject's ability to shift to a new pattern of behavior in response to the presentation of unexpected negative feedback. The present study introduces a novel version of the traditional WCST by integrating a probabilistic component into its traditional rule shifting to add uncertainty to the task, as well as… (More)
The thalamus is a critical brain structure involved in gating and regulating the flow of sensory and cortical information. The reticular nucleus of the thalamus (TRN) sends inhibitory projections to the thalamic relay nuclei instead of projecting to the cortex as the other thalamic nuclei do. These inhibitory projections endow the TRN with the functionality… (More)
Skill acquisition requires distributed learning both within (online) and across (offline) days to consolidate experiences into newly learned abilities. In particular, piloting an aircraft requires skills developed from extensive training and practice. Here, we tested the hypothesis that transcranial direct current stimulation (tDCS) can modulate neuronal… (More)
The blood-oxygen-level-dependent (BOLD) signal measured in functional magnetic resonance imaging (fMRI) experiments is generally regarded as sluggish and poorly suited for probing neural function at the rapid timescales involved in sentence comprehension. However, recent studies have shown the value of acquiring data with very short repetition times (TRs),… (More)
Neurotechnologies in clinical applications can image the brain noninvasively, but they typically require surgical insertion to stimulate it. Although an increasingly popular alternative is to use noninvasive stimulation to enhance nervous system functions, questions about its effectiveness and ethical use remain unanswered.
Finding the balance between security, privacy, and usability for mobile authentication has been an active area of research for the past several years. Many researchers have taken advantage of the availability of multiple sensors on mobile devices and have used these data to train classifiers to authenticate users. For example, implicit authentication… (More)