Inhibition of return is object-based, not category-based
نویسندگان
چکیده
منابع مشابه
Inhibition of return and object-based attentional selection.
Visual attention research has revealed that attentional allocation can occur in space- and/or object-based coordinates. Using the direct and elegant design of R. Egly, J. Driver, and R. Rafal (1994), the present experiments tested whether space- and object-based inhibition of return (IOR) emerge under similar time courses. The experiments were capable of isolating both space- and object-based e...
متن کاملColor-based inhibition of return.
The inhibition of return of visual attention based on stimulus color was examined in three experiments. In the first experiment, a discrete trial paradigm showed that subjects were slower to detect a color patch if the color matched that of a patch presented earlier in the same location. Experiment 2 showed that the inhibition only occurs if a neutral, nontarget distractor color is presented be...
متن کاملCategory vs. Object Knowledge in Category-based Induction.
In one form of category-based induction, people make predictions about unknown properties of objects. There is a tension between predictions made based on the object's specific features (e.g., objects above a certain size tend not to fly) and those made by reference to category-level knowledge (e.g., birds fly). Seven experiments with artificial categories investigated these two sources of indu...
متن کاملThe Role of Surface Feature Continuity in Object-based Inhibition of Return.
The contribution of surface feature continuity to object-based inhibition of return (IOR) was tested in three experiments. Participants executed a saccade to a previously fixated or unfixated colored disk after the object had moved to a new location. Object-based IOR was observed as lengthened saccade latency to a previously fixated object. The consistency of surface feature (color) and spatiot...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Vision
سال: 2004
ISSN: 1534-7362
DOI: 10.1167/4.8.256