Patients with hemispatial neglect exhibit a myriad of profound deficits. A hallmark of this syndrome is the patients' absence of awareness of items located in their contralesional space. Many studies, however, have demonstrated that neglect patients exhibit some level of processing of these neglected items. It has been suggested that unconscious processing of neglected information may manifest as a fast denial. This theory of fast denial proposes that neglected stimuli are detected in the same way as non-neglected stimuli, but without overt awareness. We evaluated the fast denial theory by conducting two separate visual search task experiments, each differing by the duration of stimulus presentation. Specifically, in Experiment 1 each stimulus remained in the participants' visual field until a response was made. In Experiment 2 each stimulus was presented for only a brief duration. We further evaluated the fast denial theory by comparing verbal to motor task responses in each experiment. Overall, our results from both experiments and tasks showed no evidence for the presence of implicit knowledge of neglected stimuli. Instead, patients with neglect responded the same when they neglected stimuli as when they correctly reported stimulus absence. These findings thus cast doubt on the concept of the fast denial theory and its consequent implications for non-conscious processing. Importantly, our study demonstrated that the only behavior affected was during conscious detection of ipsilesional stimuli. Specifically, patients were slower to detect stimuli in Experiment 1 compared to Experiment 2, suggesting a duration effect occurred during conscious processing of information. Additionally, reaction time and accuracy were similar when reporting verbally versus motorically. These results provide new insights into the perceptual deficits associated with neglect and further support other work that falsifies the fast denial account of non-conscious processing in hemispatial visual neglect.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3360686PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0037369PLOS

Publication Analysis

Top Keywords

fast denial
24
denial theory
16
neglected stimuli
12
hemispatial neglect
8
visual search
8
search task
8
processing neglected
8
evaluated fast
8
experiment stimulus
8
stimuli patients
8

Similar Publications

The fast growth of the Internet has made network security problems more noticeable, so intrusion detection systems (IDSs) have become a crucial tool for maintaining network security. IDSs guarantee the normal operation of the network by tracking network traffic and spotting possible assaults, thereby safeguarding data security. However, traditional intrusion detection methods encounter several issues such as low detection efficiency and prolonged detection time when dealing with massive and high-dimensional data.

View Article and Find Full Text PDF

Objective: This study aimed to assess the relationship between childhood maltreatment (CM), objective and subjective cognition, and psychosocial functioning in adults with first-episode psychosis (FEP) by examining the moderating role of cognitive reserve (CR). A secondary objective was to explore whether unique CM subtypes (physical and/or emotional abuse, sexual abuse, physical and/or emotional neglect) were driving this relationship.

Method: Sixty-six individuals with FEP ( = 27.

View Article and Find Full Text PDF

Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data. Thus, irregularity detection in traffic data is crucial in detecting malicious behavior in a network, which is essential for network security and the integrity of modern Cyber-Physical Systems (CPS).

View Article and Find Full Text PDF

DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain.

Sensors (Basel)

July 2023

State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an 710071, China.

The Domain Name System (DNS) is a fundamental component of the internet, responsible for resolving domain names into IP addresses. DNS servers are typically categorized into four types: recursive resolvers, root name servers, Top-Level Domain (TLD) name servers, and authoritative name servers. The latter three types of servers store actual records, while recursive resolvers do not store any real data and are only responsible for querying the other three types of servers and responding to clients.

View Article and Find Full Text PDF
Article Synopsis
  • The development of novel network technologies, like P4, enhances how data packets are processed, allowing for customized network device configurations to respond to security threats.
  • Distributed ledger technologies, particularly blockchain, provide secure alerts for malicious activities but face scalability challenges due to their consensus protocols.
  • IOTA presents a solution by offering a scalable distributed ledger system that retains security features and can be integrated with a P4-based software-defined network to efficiently detect and report network attacks.
View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!