Submitted to the Harvard-mit Division of Health Sciences and Technology in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Health Science and Technology

نویسندگان

  • Teresa P.G. Santos
  • Christian Brown
چکیده

Understanding intensity coding and auditory learning are basic concerns of research on the auditory central pathway. There is no unifying model of intensity coding but several mechanisms have been proposed to play a role. The first aim of this thesis was to determine the mechanisms of intensity coding in the central auditory pathway from the cochlear nucleus to the auditory cortex. The Fos labeling method was used to assess neuronal activation in the central auditory system. This technique allows one to study large regions of the brain in awake animals. Increasing sound pressure level led to: (1) spreading of labeling towards neurons with higher best frequencies; (2) spread of labeling orthogonal to the tonotopic axis; (3) and increased density of labeling within the tonotopic band. In addition to encoding the physical features of a stimulus, it is fundamental for survival that we learn about the meaning of sounds and put them in a behavioral context. The second aim of this thesis was to study how learning, in particular auditory fear conditioning, changes the pattern of neuronal activation of neurons, as measured with Fos labeling, in the central nervous system. Conditioning led to an increase in Fos labeling in central auditory nuclei. This increase in labeling was similar to the effects of increasing sound intensity. The present results support the idea that auditory fear memories are stored in the auditory pathway. Thesis Supervisor: M. Christian Brown Title: Associate Professor, Dept. of Otology and Laryngology, Harvard Medical School

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

اثربخشی آموزش ابراز وجود فرهنگمحور بر عزت‌نفس فرزندان طلاق

Brever, M.M.( 2010).The effects  of child gender and child age at the time of parental divorce on the development. COLLEGE OF SOCIAL AND BEHAVIORAL SCIENCES, Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Psychology Educational Track.  

متن کامل

Optimization under Moment, Robust, and Data-Driven Models of Uncertainty

B.Eng, Software Systems Engineering, Royal Melbourne Institute of Technology (2002) S.M., High Performance Computations for Engineered Systems, Singapore-MIT Alliance, National University of Singapore (2004) Submitted to the Sloan School of Management in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Operations Research at the MASSACHUSETTS INSTITUTE OF TECHNO...

متن کامل

Chip-scale modeling of pattern dependencies in copper chemical mechanical polishing processes

Copper Chemical Mechanical Polishing Processes by Tamba E. Gbondo-Tugbawa S.B., Electrical Engineering and Computer Science, MIT, June 1997 M.Eng., Electrical Engineering and Computer Science, MIT, February 1998 Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITU...

متن کامل

Fulfillment of the Requirements of the Degree of Doctor of Philosophy in Electrical Engineering

by Richard Anton Lethin M.S., Massachusetts Institute of Technology (1991) B.S., Yale College (1985) SUBMITTED TO THE DEPARTMENT IN PARTIAL FULFILLMENT OF THE REQUIREMENTS OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN ELECTRICAL ENGINEERING AND COMPUTER SCIENCE at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY MARCH 1997 c 1997 Richard A. Lethin. All rights reserved. The author hereby grants MIT permissi...

متن کامل

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007