exploratorium | We wish to suggest a structure for the salt of deoxyribose
nucleic acid (D.N.A.). This structure has novel features which are of
considerable biological interest.
A structure for nucleic
acid has already been proposed by Pauling (4)
and Corey1.
They kindly made their manuscript available to us in advance of publication.
Their model consists of three intertwined chains, with the phosphates
near the fibre axis, and the bases on the outside. In our opinion, this
structure is unsatisfactory for two reasons:
(1) We believe that
the material which gives the X-ray diagrams is the salt, not the free
acid. Without the acidic hydrogen atoms it is not clear what forces would
hold the structure together, especially as the negatively charged phosphates
near the axis will repel each other.
(2) Some of the van
der Waals distances appear to be too small.
Another three-chain
structure has also been suggested by Fraser (in the press). In his model
the phosphates are on the outside and the bases on the inside, linked
together by hydrogen bonds. This structure as described is rather ill-defined,
and for this reason we shall not comment on it. We
wish to put forward aradically different structure
for the salt of deoxyribose nucleic acid (5).
This structure has two helical chains each coiled round the same axis
(see diagram). We have made the usual chemical assumptions, namely, that
each chain consists of phosphate diester groups joining beta-D-deoxyribofuranose
residues with 3',5' linkages. The two chains (but not their bases) are
related by a dyad perpendicular to the fibre axis. Both chains follow
right-handed helices, but owing to the dyad the sequences of the atoms
in the two chains run in opposite directions
(6) . Each chain loosely resembles Furberg's2
model No. 1 (7); that is, the bases are on the inside of the
helix and the phosphates on the outside. The configuration of the sugar
and the atoms near it is close to Furberg's "standard configuration,"
the sugar being roughly perpendicular to the attached base. There is a
residue on each every 3.4 A. in the z-direction. We have assumed
an angle of 36° between adjacent residues in the same chain, so that
the structure repeats after 10 residues on each chain, that is, after
34 A. The distance of a phosphorus atom from the fibre axis is 10 A. As
the phosphates are on the outside, cations have easy access to them.
wired | At the most basic level, scientists create phylogenetic trees by
grouping species according to their degree of relatedness. Lining up the
DNA of humans, chimpanzees and fish, for example, makes it readily
apparent that humans and chimps are more closely related to each other
than they are to fish.
Researchers once used just one gene or a handful to compare
organisms. But the last decade has seen an explosion in phylogenetic
data, rapidly inflating the data pool for generating these trees. These
analyses filled in some of the sparse spots on the tree of life, but
considerable disagreement still remains.
For example, it’s not clear whether snails are most closely related
to clams and other bivalves or to another mollusk group known as tusk
shells, said Rokas. And we have no idea how some of the earliest animals
to branch off the tree, such as jellyfish and sponges, are related to
each other. Scientists can rattle off examples of conflicting trees
published in the same scientific journal within weeks, or even in the same issue.
“That poses a question: Why do you have this lack of agreement?” said Rokas.
Rokas and his graduate student Leonidas Salichos explored that question by evaluating each gene independently
and using only the most useful genes — those that carry the greatest
amount of information with respect to evolutionary history — to
construct their tree.
They started with 23 species of yeast, focusing on 1,070 genes. They
first created a phylogenetic tree using the standard method, called
concatenation. This involves stringing together all the sequence data
from individual species into one mega-gene and then comparing that long
sequence among the different species and creating a tree that best
explains the differences.
The resulting tree was accurate according to standard statistical
analysis. But given that similar methods have produced trees of life
that are rife with contradiction, Rokas and Salichos decided to delve
deeper. They built a series of phylogenetic trees using data from
individual yeast genes and employed an algorithm derived from
information theory to find the areas of greatest agreement among the
trees. The result, published in Nature in May, was unexpected. Every gene they studied appeared to tell a slightly different story of evolution.
“Just about all the trees from individual genes were in conflict with
the tree based on a concatenated data set,” says Hilu. “It’s a bit
shocking.”
They concluded that if a number of genes support a specific
architecture, it is probably accurate. But if different sets of genes
support two different architectures equally, it is much less likely that
either structure is accurate. Rokas and Salichos used a statistical
method called bootstrap analysis to select the most informative genes.
In essence, “if you take just the strongly supported genes, then you recover the correct tree,” said Donoghue.Fist tap Dale.
technion | Using only biomolecules (such as DNA and enzymes), scientists at the Technion-Israel Institute of Technology have developed and constructed an advanced biological transducer, a computing machine capable of manipulating genetic codes, and using the output as new input for subsequent computations. The breakthrough might someday create new possibilities in biotechnology, including individual gene therapy and cloning. The findings appear in (May 23, 2013) Chemistry & Biology (Cell Press).
Interest in such biomolecular computing devices is strong, mainly because of their ability (unlike electronic computers) to interact directly with biological systems and even living organisms. No interface is required since all components of molecular computers, including hardware, software, input and output, are molecules that interact in solution along a cascade of programmable chemical events.
“Our results show a novel, synthetic designed computing machine that computes iteratively and produces biologically relevant results,” says lead researcher Prof. Ehud Keinan of the Technion Schulich Faculty of Chemistry. “In addition to enhanced computation power, this DNA-based transducer offers multiple benefits, including the ability to read and transform genetic information, miniaturization to the molecular scale, and the aptitude to produce computational results that interact directly with living organisms.”
The transducer could be used on genetic material to evaluate and detect specific sequences, and to alter and algorithmically process genetic code. Similar devices, says Prof. Keinan, could be applied for other computational problems.
“All biological systems, and even entire living organisms, are natural molecular computers. Every one of us is a biomolecular computer, that is, a machine in which all components are molecules “talking” to one another in a logical manner. The hardware and software are complex biological molecules that activate one another to carry out some predetermined chemical tasks. The input is a molecule that undergoes specific, programmed changes, following a specific set of rules (software) and the output of this chemical computation process is another well defined molecule.”
newyorker | Dianne Feinstein, a Democrat from liberal Northern California and the
chairman of the Senate Select Committee on Intelligence, assured the
public earlier today that the government’s secret snooping into the
phone records of Americans was perfectly fine, because the information
it obtained was only “meta,” meaning it excluded the actual content of
the phone conversations, providing merely records, from a Verizon
subsidiary, of who called whom when and from where. In addition, she
said in a prepared statement, the “names of subscribers” were not
included automatically in the metadata (though the numbers, surely,
could be used to identify them). “Our courts have consistently
recognized that there is no reasonable expectation of privacy in this
type of metadata information and thus no search warrant is required to
obtain it,” she said, adding that “any subsequent effort to obtain the
content of an American’s communications would require a specific order
from the FISA court.”
She said she understands privacy—“that’s why this is carefully
done”—and noted that eleven special federal judges, the Foreign
Intelligence Surveillance Court, which meets in secret, had authorized
the vast intelligence collection. A White House official made the same
points to reporters, saying, “The order reprinted overnight does not
allow the government to listen in on anyone’s telephone calls” and was
subject to “a robust legal regime.” The gist of the defense was that, in
contrast to what took place under the Bush Administration, this form of
secret domestic surveillance was legitimate because Congress had
authorized it, and the judicial branch had ratified it, and the actual
words spoken by one American to another were still private. So how bad
could it be?
The answer, according to the mathematician and
former Sun Microsystems engineer Susan Landau, whom I interviewed while
reporting on the plight of the former N.S.A. whistleblower Thomas Drake and who is also the author of “Surveillance or Security?,” is that it’s worse than many might think.
“The public doesn’t understand,” she told me, speaking about
so-called metadata. “It’s much more intrusive than content.” She
explained that the government can learn immense amounts of proprietary
information by studying “who you call, and who they call. If you can
track that, you know exactly what is happening—you don’t need the
content.”
globalresearch | Over millennia, numerous enterprises have sought the status of science. Few have succeeded because they have failed to discover anything that stood up to scrutiny as knowledge. No body of beliefs, no matter how widely accepted or how extensive in scope, can ever be scientific.
In the Ptolemaic system of astronomy, the epicycle is a geometric model of the solar system and planetary motion. It was first proposed by Apollonius of Perga at the end of the 3rd century BCE and its development continued until Kepler came up with a better model in the 17th century, and the geocentric model of the solar system was replaced by Copernican heliocentrism. In spite of some very good approximations to the problems of planetary motion, the system of epicycles could never get anything right.
Phrenology was originated by Franz Joseph Gall [right] in the late 1700s. After examining the heads of a number of young pickpockets, Gall found that many of them had bumps on their skulls just above their ears and suggested that the bumps, indentations, and shape of the skull could be linked to different aspects of a person’s personality, character, and abilities. Gall measured the skulls of people in prisons, hospitals, and asylums and developed a system of 27 different “faculties” that he believed could be directly diagnosed by assessing specific parts of the head, and he chose to ignore any contradictory evidence. After Gall’s death in 1828, several of his followers continued to develop phrenology. Despite some brief popularity, it was eventually viewed as a pseudoscience much like astrology, numerology, and palmistry. All of these, too, could never get anything right.
Sigmund Freud was an Austrian neurologist who is known as the father of psychoanalysis which is a clinical method for treating psychopathology by having a patient talk to a psychoanalyst. Results on the mental health of patients were scanty at best. Some contend that Freud set back the study of psychology and psychiatry “by something like fifty years or more”, and that “Freud’s method is not capable of yielding objective data about mental processes”. Others consider psychoanalysis to be perhaps the most complex and successful pseudoscience in history. Karl Popper, who argued that all proper scientific theories must be potentially falsifiable, claimed that no experiment could ever disprove Freud’s psychoanalytic theories and thus were totally unscientific. Now Freud’s work has little relevance in psychiatry. It could never cure anyone. But it was not Freud who created a pseudoscience, it was the people who uncritically adopted his views.
Today the great fraudulent science is economics, but I don’t intend to beat that carcass. It has been shown not to be a science by numerous astute people. Even some renowned economists have been convinced of it. Paul Samuelson has said, “Economics has never been a science—and it is even less now than a few years ago.” Even Nassau William Senior knew it: “The confounding Political Economy with the Sciences and Arts to which it is subservient, has been one of the principal obstacles to its improvement.”
Yet many working economists continue to claim that it is or at least that it is more of a science than its siblings in the social enterprises of study. Perhaps these people feel that their work lacks dignity if it is not scientific, being unable to say exactly what it is if it is not science. So let’s look at some things that economists regularly do to see if what they are doing can be defined.
project-syndicate | One of the dirty secrets of economics is that there is no such thing as
“economic theory.” There is simply no set of bedrock principles on which
one can base calculations that illuminate real-world economic outcomes.
We should bear in mind this constraint on economic knowledge as the
global drive for fiscal austerity shifts into top gear.
Unlike economists,
biologists, for example, know that every cell functions according to
instructions for protein synthesis encoded in its DNA. Chemists begin
with what the Heisenberg and Pauli principles, plus the
three-dimensionality of space, tell us about stable electron
configurations. Physicists start with the four fundamental forces of
nature.
Economists
have none of that. The “economic principles” underpinning their
theories are a fraud – not fundamental truths but mere knobs that are
twiddled and tuned so that the “right” conclusions come out of the
analysis.
The
“right” conclusions depend on which of two types of economist you are.
One type chooses, for non-economic and non-scientific reasons, a
political stance and a set of political allies, and twiddles and tunes
his or her assumptions until they yield conclusions that fit their
stance and please their allies. The other type takes the carcass of
history, throws it into the pot, turns up the heat, and boils it down,
hoping that the bones will yield lessons and suggest principles to guide
our civilization’s voters, bureaucrats, and politicians as they slouch
toward utopia.
Not surprisingly, I believe that only the second kind of economist has
anything useful to say. So what lessons does history have to teach us
about our current global economic predicament?
douglasvalentine | "Central to Phoenix is the fact that it targeted civilians, not
soldiers. As a result, its detractors charge that Phoenix violated that
part of the Geneva Conventions guaranteeing protection to civilians in
time of war. "By analogy," said Ogden Reid, a member of a congressional
committee investigating Phoenix in 1971, "if the Union had had a Phoenix
program during the Civil War, its targets would have been civilians
like Jefferson Davis or the mayor of Macon, Georgia."
"Under Phoenix, or Phung Hoang as it was called by the Vietnamese, due
process was totally non-existent. South Vietnamese civilians whose names
appeared on blacklists could be kidnapped, tortured, detained for two
years without trial, or even murdered simply on the word of an anonymous
informer. At its height, Phoenix managers imposed a quota of eighteen
hundred neutralizations per month on the people running the program in
the field, opening up the program to abuses by corrupt security
officers, policemen, politicians, and racketeers, all of whom extorted
innocent civilians as well as VCI. Legendary CIA officer Lucien Conein
described Phoenix as, "A very good blackmail scheme for the central
government: 'If you don't do what I want, you're VC.'"
"Because Phoenix "neutralizations" were often conducted at midnight
while its victims were home, sleeping in bed, Phoenix proponents
describe the program as a "scalpel" designed to replace the "bludgeon"
of search and destroy operations, air strikes, and artillery barrages
that indiscriminately wiped out entire villages and did little to "win
the hearts and minds" of the Vietnamese population. Yet the scalpel cut
deeper than the U.S. government admits. Indeed, Phoenix was, among other
things, an instrument of counter-terror - the psychological warfare
tactic in which members of the VCI were brutally murdered along with
their families or neighbors as a means of terrorizing the entire
population into a state of submission. Such horrendous acts were, for
propaganda purposes, often made to look as if they had been committed by
the enemy.
"This book questions how Americans, who consider themselves a nation
ruled by laws and an ethic of fair play, could create a program like
Phoenix. By scrutinizing the program and the people who participated in
it, and by employing the program as a symbol of the dark side of the
human psyche, the author hopes to articulate the subtle ways in which
the Vietnam War changed how Americans think about themselves. This book
is about terror and its role in political warfare. It will show how, as
successive American governments sink deeper and deeper into the vortex
of covert operations - ostensibly to combat terrorism and Communist
insurgencies - the American people gradually lose touch with the
democratic ideals that once defined their national self-concept. This
book asks what happens when Phoenix comes home to roost."
guardian | The National Security Agency is currently collecting the telephone
records of millions of US customers of Verizon, one of America's largest
telecoms providers, under a top secret court order issued in April.
The
document shows for the first time that under the Obama administration
the communication records of millions of US citizens are being collected
indiscriminately and in bulk – regardless of whether they are suspected
of any wrongdoing.
The secret Foreign Intelligence Surveillance
Court (Fisa) granted the order to the FBI on April 25, giving the
government unlimited authority to obtain the data for a specified
three-month period ending on July 19.
Under the terms of the
blanket order, the numbers of both parties on a call are handed over, as
is location data, call duration, unique identifiers, and the time and
duration of all calls. The contents of the conversation itself are not
covered.
The disclosure is likely to reignite longstanding debates
in the US over the proper extent of the government's domestic spying
powers.
Under the Bush administration, officials in security
agencies had disclosed to reporters the large-scale collection of call
records data by the NSA, but this is the first time significant and
top-secret documents have revealed the continuation of the practice on a
massive scale under President Obama.
outpost-of-freedom | I've been following the concepts of digital cash and encryption since I read the article in the August 1992 issue of Scientific American on "encrypted signatures." While I've only followed the Digitaliberty area for a few weeks, I can already see a number of points that do (and should!) strongly concern the average savvy individual:
1. How can we translate the freedom afforded by the Internet to ordinary life?
2. How can we keep the government from banning encryption, digital cash, and other systems that will improve our freedom?
A few months ago, I had a truly and quite literally "revolutionary" idea, and I jokingly called it "Assassination Politics": I speculated on the question of whether an organization could be set up to legally announce that it would be awarding a cash prize to somebody who correctly "predicted" the death of one of a list of violators of rights, usually either government employees, officeholders, or appointees. It could ask for anonymous contributions from the public, and individuals would be able send those contributions using digital cash.
I also speculated that using modern methods of public-key encryption and anonymous "digital cash," it would be possible to make such awards in such a way so that nobody knows who is getting awarded the money, only that the award is being given. Even the organization itself would have no information that could help the authorities find the person responsible for the prediction, let alone the one who caused the death.
It was not my intention to provide such a "tough nut to crack" by arguing the general case, claiming that a person who hires a hit man is not guilty of murder under libertarian principles. Obviously, the problem with the general case is that the victim may be totally innocent under libertarian principles, which would make the killing a crime, leading to the question of whether the person offering the money was himself guilty.
On the contrary; my speculation assumed that the "victim" is a government employee, presumably one who is not merely taking a paycheck of stolen tax dollars, but also is guilty of extra violations of rights beyond this. (Government agents responsible for the Ruby Ridge incident and Waco come to mind.) In receiving such money and in his various acts, he violates the "Non-aggression Principle" (NAP) and thus, presumably, any acts against him are not the initiation of force under libertarian principles.
The organization set up to manage such a system could, presumably, make up a list of people who had seriously violated the NAP, but who would not see justice in our courts due to the fact that their actions were done at the behest of the government. Associated with each name would be a dollar figure, the total amount of money the organization has received as a contribution, which is the amount they would give for correctly "predicting" the person's death, presumably naming the exact date. "Guessers" would formulate their "guess" into a file, encrypt it with the organization's public key, then transmit it to the organization, possibly using methods as untraceable as putting a floppy disk in an envelope and tossing it into a mailbox, but more likely either a cascade of encrypted anonymous remailers, or possibly public-access Internet locations, such as terminals at a local library, etc.
In order to prevent such a system from becoming simply a random unpaid lottery, in which people can randomly guess a name and date (hoping that lightning would strike, as it occasionally does), it would be necessary to deter such random guessing by requiring the "guessers" to include with their "guess" encrypted and untraceable "digital cash," in an amount sufficiently high to make random guessing impractical.
For example, if the target was, say, 50 years old and had a life expectancy of 30 years, or about 10,000 days, the amount of money required to register a guess must be at least 1/10,000th of the amount of the award. In practice, the amount required should be far higher, perhaps as much as 1/1000 of the amount, since you can assume that anybody making a guess would feel sufficiently confident of that guess to risk 1/1000th of his potential reward.
The digital cash would be placed inside the outer "encryption envelope," and could be decrypted using the organization's public key. The prediction itself (including name and date) would be itself in another encryption envelope inside the first one, but it would be encrypted using a key that is only known to the predictor himself. In this way, the organization could decrypt the outer envelope and find the digital cash, but they would have no idea what is being predicted in the innermost envelope, either the name or the date.
If, later, the "prediction" came true, the predictor would presumably send yet another encrypted "envelope" to the organization, containing the decryption key for the previous "prediction" envelope, plus a public key (despite its name, to be used only once!) to be used for encryption of digital cash used as payment for the award. The organization would apply the decryption key to the prediction envelope, discover that it works, then notice that the prediction included was fulfilled on the date stated. The predictor would be, therefore, entitled to the award. Nevertheless, even then nobody would actually know WHO he is!
It doesn't even know if the predictor had anything to do with the outcome of the prediction. If it received these files in the mail, in physical envelopes, which had no return address, it would have burned the envelopes before it studied their contents. The result is that even the active cooperation of the organization could not possibly help anyone, including the police, to locate the predictor.
Also included within this "prediction-fulfilled" encryption envelope would be unsigned (not-yet-valid) "digital cash," which would then be blindly signed by the organization's bank and subsequently encrypted using the public key included. (The public key could also be publicized, to allow members of the public to securely send their comments and, possibly, further grateful remuneration to the predictor, securely.) The resulting encrypted file could be published openly on the Internet, and it could then be decrypted by only one entity: The person who had made that original, accurate prediction. The result is that the recipient would be absolutely untraceable.
The digital cash is then processed by the recipient by "unbinding" it, a principle which is explained in far greater detail by the article in the August 1992 issue of Scientific American. The resulting digital cash is absolutely untraceable to its source.Fist tap Dale.
msu | Short interruptions – such as the few seconds it takes to silence
that buzzing smartphone – have a surprisingly large effect on one’s
ability to accurately complete a task, according to new research led by
Michigan State University.
The study, in which 300 people performed a sequence-based procedure
on a computer, found that interruptions of about three seconds doubled
the error rate.
Brief interruptions are ubiquitous in today’s society, from text
messages to a work colleague poking his head in the door and
interrupting an important conversation. But the ensuing errors can be
disastrous for professionals such as airplane mechanics and emergency
room doctors, said Erik Altmann, lead researcher on the study.
“What this means is that our health and safety is, on some level,
contingent on whether the people looking after it have been
interrupted,” said Altmann, MSU associate professor of psychology.
The study, funded by the U.S. Navy’s Office of Naval Research, is one
of the first to examine brief interruptions of relatively difficult
tasks. The findings appear in the Journal of Experimental Psychology:
General.
newscientist | NO CREVICE of the human experience is safe. Our
deepest fears and desires, our pasts and our futures – all have been
revealed, and all in the form of colourful images that look like lava
bubbling under the skull.
That, at least, is the popular conception of neuroscience – and it's worth big money. The US and the European Union
are throwing billions of dollars at two new projects to map the human
brain. Yet there is also a growing anxiety that many of neuroscience's
findings don't stand up to scrutiny. It's not just sensational headlines
reporting a "dark patch" in a psychopath's brain, there are now serious concerns that some of the methods themselves are flawed.
The intrepid outsider needs expert guidance through this rocky terrain – and there's no better place to start than Brainwashed
by Sally Satel and Scott O. Lilienfeld. Satel, a practising
psychiatrist, and Lilienfeld, a clinical psychologist, are terrific
sherpas. They are clear-sighted, considered and forgiving of the
novice's ignorance.
Such fishy results are troubling
enough, but even legitimate scans can be problematic. As the authors
point out, brain images should be used only alongside other kinds of
evidence. But all too often they are given the final say on human
behaviour. A common pitfall, assert Satel and Lilienfeld, is
"neurodeterminism" – the idea that a murderer, say, had been cursed with
a brain defect that destroyed their sense of morality.
notredame | Neuroscience is the study of the physiological mechanisms that give
rise to a manifold of human capacities, including perception, memory,
vision and the emotions. To achieve the goals of scientific
understanding, neuroscientists must of necessity advance claims and
hypotheses which are subjected to scientific experiment. In addition to
experimental techniques, neuroscientists need a conceptual framework
within which to make sense of the results of their empirical work. In
short, a necessary complement to empirical research is a coherent
conception of the phenomena under investigation, that is, human
psychological capacities.
Bennett - a distinguished neuroscientist - and Hacker - the
preeminent scholar of Wittgenstein's thought - have teamed up to produce
a withering attack on the conception of the mental that lies at the
heart of contemporary neuroscience. Although neuroscientists are
committed materialists, and adamantly insist on this aspect of their
anti-Cartesianism, they have, Bennett and Hacker argue, merely
jettisoned the dual substance doctrine of Cartesianism, but retained its
faulty structure with respect to the relation of mind and behavior.
theroot | "I'm a young black woman with what you would call a 'ghetto' name. I'd have no problem with my name if it weren't for the fact that for my entire life, white people have made fun of me. I've been made fun of by teachers, even professors in college when they call out my name. I've had people tell me, 'You seem like such a good person, though -- I can't believe you have such a ghetto name.' People have said my parents made a huge mistake. I've had hiring managers tell me that they would hire me only on the condition that I 'shorten' my name for the customers.
"My name is Laquita, so it really isn't even complicated. Anyway, I'm tired of it all.
"The problem with this is telling my family -- I have no idea why my mother gave me this name. I feel like it's a curse. So how do I tell her that I'm doing this without offending her? Do you think it's the right choice, or am I 'giving up'?"
nih | A social contingency analysis of religion is presented, arguing that
individual religious behaviors are principally maintained by the many
powerful benefits of participating in social groups rather than by any
immediate or obvious consequences of the religious behaviors. Six common
strategies are outlined that can shape the behaviors of large groups of
people. More specifically, religious behavior is shaped and maintained
by making already-existing contingencies contingent upon
low-probability, but socially beneficial, group behaviors. Many specific
examples of religious themes are then analyzed in terms of these common
strategies for social shaping, including taboos, rituals, totems,
personal religious crises, and symbolic expression. For example, a
common view is that people are anxious about life, death, and the
unknown, and that the direct function of religious behaviors is to
provide escape from such anxiety. Such an explanation is instead
reversed—that any such anxiety is utilized or created by groups through
having escape contingent upon members performing less probable behaviors
that nonetheless provide important benefits to most individual group
members. These generalized beneficial outcomes, rather than escape from
anxiety, maintain the religious behaviors and this fits with
observations that religions typically act to increase anxiety rather
than to reduce it. An implication of this theory is that there is no
difference in principle between religious and nonreligious social
control, and it is demonstrated that the same social strategies are
utilized in both contexts, although religion has been the more
historically important form of social control.
medicalexpress | As a person's IQ increases, so too does his or her ability to filter out distracting background motion. This surprisingly strong relationship may help scientists better understand what makes a brain more efficient, and, as a result, more intelligent.
A brief visual task can predict IQ, according to a new study. This surprisingly simple exercise measures the brain's unconscious ability to filter out visual movement. The study shows that individuals whose brains are better at automatically suppressing background motion perform better on standard measures of intelligence.
The test is the first purely sensory assessment to be strongly correlated with IQ and may provide a non-verbal and culturally unbiased tool for scientists seeking to understand neural processes associated with general intelligence. "Because intelligence is such a broad construct, you can't really track it back to one part of the brain," says Duje Tadin, a senior author on the study and an assistant professor of brain and cognitive sciences at the University of Rochester. "But since this task is so simple and so closely linked to IQ, it may give us clues about what makes a brain more efficient, and, consequently, more intelligent." The unexpected link between IQ and motion filtering was reported online in the Cell Press journal Current Biology on May 23 by a research team lead by Tadin and Michael Melnick, a doctoral candidate in brain and cognitive sciences at the University of Rochester. In the study, individuals watched brief video clips of black and white bars moving across a computer screen. Their sole task was to identify which direction the bars drifted: to the right or to the left. The bars were presented in three sizes, with the smallest version restricted to the central circle where human motion perception is known to be optimal, an area roughly the width of the thumb when the hand is extended. Participants also took a standardized intelligence test.
As a person's IQ increases,
so too does his or her ability to filter out distracting background
motion. This surprisingly strong relationship may help scientists better
understand what makes a brain more efficient, and, as a result, more
intelligent.
sana | President Bashar al-Assad gave an interview to al-Manar TV broadcasted on Thursday, following is the full text of the interview:
Al-Manar:
In the name of Allah, the Compassionate, the Merciful. Assalamu
Alaikum. Bloodshed in Syria continues unabated. This is the only
constant over which there is little disagreement between those loyal to
the Syrian state and those opposed to it. However, there is no common
ground over the other constants and details two years into the current
crisis. At the time, a great deal was said about the imminent fall of
the regime. Deadlines were set and missed; and all those bets were lost.
Today, we are here in the heart of Damascus, enjoying the hospitality
of a president who has become a source of consternation to many of his
opponents who are still unable to understand the equations that have
played havoc with their calculations and prevented his ouster from the
Syrian political scene. This unpleasant and unexpected outcome for his
opponents upset their schemes and plots because they didn’t take into
account one self-evident question: what happens if the regime doesn’t
fall? What if President Assad doesn’t leave the Syrian scene? Of course,
there are no clear answers; and the result is more destruction, killing
and bloodshed. Today there is talk of a critical juncture for Syria.
The Syrian Army has moved from defense to attack, achieving one success
after another. On a parallel level, stagnant diplomatic waters have been
shaken by discussions over a Geneva 2 conference becoming a recurrent
theme in the statements of all parties. There are many questions which
need answers: political settlement, resorting to the military option to
decide the outcome, the Israeli enemy’s direct interference with the
course of events in the current crisis, the new equations on the Golan
Heights, the relationship with opponents and friends. What is the Syrian
leadership’s plan for a way out of a complex and dangerous crisis whose
ramifications have started to spill over into neighboring countries? It
is our great pleasure tonight to put these questions to H. E. President
Bashar al-Assad. Assalamu Alaikum, Mr. President.
President Assad: Assalamu Alaikum. You are most welcome in Damascus.
Al-Manar:
Mr. President, we are in the heart of the People’s Palace, two and a
half years into the Syrian crisis. At the time, the bet was that the
president and his regime would be overthrown within weeks. How have you
managed to foil the plots of your opponents and enemies? What is the
secret behind this steadfastness?
President
Assad: There are a number of factors are involved. One is the Syrian
factor, which thwarted their intentions; the other factor is related to
those who masterminded these scenarios and ended up defeating themselves
because they do not know Syria or understand in detail the situation.
They started with the calls of revolution, but a real revolution
requires tangible elements; you cannot create a revolution simply by
paying money. When this approach failed, they shifted to using sectarian
slogans in order to create a division within our society. Even though
they were able to infiltrate certain pockets in Syrian society, pockets
of ignorance and lack of awareness that exist in any society, they were
not able to create this sectarian division. Had they succeeded, Syria
would have been divided up from the beginning. They also fell into their
own trap by trying to promote the notion that this was a struggle to
maintain power rather than a struggle for national sovereignty. No one
would fight and martyr themselves in order to secure power for anyone
else.
Al-Manar: In the
battle for the homeland, it seems that the Syrian leadership, and after
two and a half years, is making progress on the battlefield. And here if
I might ask you, why have you chosen to move from defense to attack?
And don’t you think that you have been late in taking the decision to go
on the offensive, and consequently incurred heavy losses, if we take of
Al-Qseir as an example.
President
Assad: It is not a question of defense or attack. Every battle has its
own tactics. From the beginning, we did not deal with each situation
from a military perspective alone. We also factored in the social and
political aspects as well - many Syrians were misled in the beginning
and there were many friendly countries that didn’t understand the
domestic dynamics. Your actions will differ according to how much
consensus there is over a particular issue. There is no doubt that as
events have unfolded Syrians have been able to better understand the
situation and what is really at stake. This has helped the Armed Forces
to better carry out their duties and achieve results. So, what is
happening now is not a shift in tactic from defense to attack, but
rather a shift in the balance of power in favor of the Armed Forces.
washingtonsblog | Syria’s central role in the Arab gas pipeline is … a key to why it is now being targeted.
Just as the Taliban was scheduled for removal after they demanded too
much in return for the Unocal pipeline, Syria’s Assad is being targeted
because he is not a reliable “player”.
Specifically, Turkey, Israel and their ally the U.S. want an assured
flow of gas through Syria, and don’t want a Syrian regime which is not
unquestionably loyal to those 3 countries to stand in the way of the
pipeline … or which demands too big a cut of the profits.
And the monarchies in Qatar and Saudi Arabia would also benefit as competitors in the gas market if Syria’s regime is taken out … so they’re backing the “rebels” as well.
And the U.S. is now considering imposing a no-fly zone over Syria … which was also the opening move in the wars against Iraq and Libya.
Bush launched the Iraq war under false pretenses … similarly, the war
in Syria is really being launched by Obama and natural gas players in
the region who want to cut Syria and Russia out of the game.
Postscript: If the corporate media were reporting more accurately on Syria than they did on Iraq, the American people would realize that there is grave doubt about who is most responsible for the violence, and who really used chemical weapons in Syria.
Not that Assad is a saint, but he poses no danger to the United
States, and shouldn’t be demonized and turned into a threat to American
national security man any more than Saddam Hussein.
The Iraq war will end up with a final price tag of between $5-6trillion dollars. We simply can’t afford to get involved in another war … especially with Russia and Iran actively aligned against us.
globalresearch |According to a report in Turkey’s state media agency Zaman,
agents from the Turkish General Directorate of Security (Emniyet Genel
Müdürlüğü) ceased 2 kg of sarin gas in the city of Adana in the early
hours of yesterday morning. The chemical weapons were in the possession
of Al Nusra terrorists believed to have been heading for Syria.
Sarin gas is a colourless, odorless substance which is extremely
difficult to detect. The gas is banned under the 1993 Chemical Weapons
Convention.
The EGM identified 12 members of the AL Nusra terrorist cell and also
ceased fire arms and digital equipment. This is the second major
official confirmation of the use of chemical weapons by
Al-Qaeda terrorists in Syria after UN inspector Carla Del Ponte’s
recent statement confirming the use of chemical weapons by the
Western-backed terrorists in Syria.
The Turkish police are currently conducting further investigations into the operations of Al-Qaeda linked groups in Turkey.[1]
This further confirmation that the Syrian ‘rebels’ are using chemical
weapons while also using Turkey as a base of terrorist operations
against Syria, could cause further domestic problems for Prime Minister
Recep Tayyip Erdogan, whom Turkish opposition leader Kemal Kilicdaroglu
has called the ‘chief of the terrorists’.[2]
The Syrian National Coalition abroad has persisted in accusing the
Syrian government of using chemical weapons. The Syrian National
Coalition Head of Media Khaled Saleh told Al Jazeera on May 26th that
Turkish authorities were certain about the use of chemical weapons by
the Syrian government.
Saleh also claimed that he was in contact with several ‘brigades’
fighting in Syria. Perhaps, Mr. Saleh should be advised to consult the
Turkish police now that one of his ‘brigades’ has been arrested in
possession of chemical weapons.[3]
lrb | When the US invaded Iraq in 2003, it changed the overall balance of
power and destabilised every country in the region. The same thing is
happening again, except that the impact of the Syrian war is likely to
be less easily contained. Already the frontier dividing the western
deserts of Iraq from the eastern deserts of Syria is ceasing to have any
physical reality. In April, al-Qaida in Iraq embarrassed the rebels’
Western supporters by revealing that it had founded, reinforced with
experienced fighters and devoted half its budget to supporting al-Nusra,
militarily the most effective rebel group. When Syrian soldiers fled
into Iraq in March they were ambushed by al-Qaida and 48 of them were
killed before they could return to Syrian territory.
There is
virtually no state in the region that hasn’t got some stake in the
conflict. Jordan, though nervous of a jihadi victory in Syria, is
allowing arms shipments from Saudi Arabia to reach rebels in southern
Syria by road. Qatar has reportedly spent $3 billion on supporting the
rebels over the last two years and has offered $50,000 to every Syrian
army defector and his family. In co-ordination with the CIA it has sent
seventy military flights to Turkey with arms and equipment for the
insurgents. The Tunisian government says that eight hundred Tunisians
are fighting on the rebel side but security sources are quoted as saying
the real figure is closer to two thousand. Moaz al-Khatib, the outgoing
president of the Syrian National Coalition, which supposedly represents
the opposition, recently resigned, declaring as he did so that the
group was controlled by outside powers – i.e. Saudi Arabia and Qatar.
‘The people inside Syria,’ he said, ‘have lost the ability to decide
their own fate. I have become only a means to sign some papers while
hands from different parties want to decide on behalf of the Syrians.’
He claimed that on one occasion a rebel unit failed to go to the rescue
of villagers being massacred by government forces because they hadn’t
received instructions from their paymasters.
Fear of widespread
disorder and instability is pushing the US, Russia, Iran and others to
talk of a diplomatic solution to the conflict. Some sort of peace
conference may take place in Geneva over the next month, with the aim at
least of stopping things getting worse. But while there is an appetite
for diplomacy, nobody knows what a solution would look like. It’s hard
to imagine a real agreement being reached when there are so many players
with conflicting interests. Five distinct conflicts have become tangled
together in Syria: a popular uprising against a dictatorship which is
also a sectarian battle between Sunnis and the Alawite sect; a regional
struggle between Shia and Sunni which is also a decades-old conflict
between an Iranian-led grouping and Iran’s traditional enemies, notably
the US and Saudi Arabia. Finally, at another level, there is a reborn
Cold War confrontation: Russia and China v. the West. The conflict is
full of unexpected and absurd contradictions, such as a purportedly
democratic and secular Syrian opposition being funded by the absolute
monarchies of the Gulf who are also fundamentalist Sunnis.
By
savagely repressing demonstrations two years ago Bashar al-Assad helped
turn mass protests into an insurrection which has torn Syria apart. He
is probably correct in predicting that diplomacy will fail, that his
opponents inside and outside Syria are too divided to agree on a peace
deal. He may also be right in believing that greater foreign
intervention ‘is a clear probability’. The quagmire is turning out to be
even deeper and more dangerous than it was in Iraq.
reuters | Syria has received the first shipment of a sophisticated air defense system from Russia, President Bashar al-Assad was quoted as saying, sending a signal of military strength days before an EU arms embargo on the country lapses.
Russia had promised delivery of the S-300 missile system to the Syrian government despite Western objections, saying the move would help stabilize the regional balance at a time of insurgency in Syria waged by Western-backed rebels.
Moscow is a staunch ally of Assad and it has appeared to grow more defiant since the European Union let its arms embargo on Syria expire as of June 1, opening up the possibility of the West arming the Syrian rebels.
"Syria has received the first shipment of Russian anti-aircraft S-300 rockets," Lebanese newspaper al-Akhbar newspaper quoted Assad as saying in an interview due to be broadcast later on Thursday.
More of the missiles would arrive soon, he was quoted as saying.
A source close to Russia's Defense Ministry said there had been a "bank transfer" in connection with the S-300 transaction but that Russian banks were becoming increasingly nervous about dealing with Assad.
"There were some problems with payments because big Russian banks were scared of dealing with Assad, but there was a bank transfer," the source said. "There are also not big banks and banks that are not based in Moscow. Beyond the down payment there was almost certainly a second payment, maybe a third."
Begrudgingly Acknowledged Country Bangers
-
When someone says they hate country music, they’re typically referring,
whether they know it or not, to the neotraditionalist “young country” that
arose in...
A Foundation of Joy
-
Two years and I've lost count of how many times my eye has been operated
on, either beating the fuck out of the tumor, or reattaching that slippery
eel ...
April Three
-
4/3
43
When 1 = A and 26 = Z
March = 43
What day?
4 to the power of 3 is 64
64th day is March 5
My birthday
March also has 5 letters.
4 x 3 = 12
...
Return of the Magi
-
Lately, the Holy Spirit is in the air. Emotional energy is swirling out of
the earth.I can feel it bubbling up, effervescing and evaporating around
us, s...
New Travels
-
Haven’t published on the Blog in quite a while. I at least part have been
immersed in the area of writing books. My focus is on Science Fiction an
Historic...
Covid-19 Preys Upon The Elderly And The Obese
-
sciencemag | This spring, after days of flulike symptoms and fever, a man
arrived at the emergency room at the University of Vermont Medical Center.
He ...