Syntactic Computations in the Language Network: Characterizing Dynamic Network Properties Using Representational Similarity Analysis

نویسندگان

  • Lorraine K. Tyler
  • Teresa P. L. Cheung
  • Barry J. Devereux
  • Alex Clarke
چکیده

The core human capacity of syntactic analysis involves a left hemisphere network involving left inferior frontal gyrus (LIFG) and posterior middle temporal gyrus (LMTG) and the anatomical connections between them. Here we use magnetoencephalography (MEG) to determine the spatio-temporal properties of syntactic computations in this network. Listeners heard spoken sentences containing a local syntactic ambiguity (e.g., "… landing planes …"), at the offset of which they heard a disambiguating verb and decided whether it was an acceptable/unacceptable continuation of the sentence. We charted the time-course of processing and resolving syntactic ambiguity by measuring MEG responses from the onset of each word in the ambiguous phrase and the disambiguating word. We used representational similarity analysis (RSA) to characterize syntactic information represented in the LIFG and left posterior middle temporal gyrus (LpMTG) over time and to investigate their relationship to each other. Testing a variety of lexico-syntactic and ambiguity models against the MEG data, our results suggest early lexico-syntactic responses in the LpMTG and later effects of ambiguity in the LIFG, pointing to a clear differentiation in the functional roles of these two regions. Our results suggest the LpMTG represents and transmits lexical information to the LIFG, which responds to and resolves the ambiguity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In Language Sciences

Journal Name: Frontiers in Psychology ISSN: 1664-1078 Article type: Original Research Article Received on: 16 Jan 2013 Accepted on: 26 Apr 2013 Provisional PDF published on: 26 Apr 2013 Frontiers website link: www.frontiersin.org Citation: Tyler LK, Cheung TP, Devereux BJ and Clarke A(2013) Syntactic computations in the language network: Characterising dynamic network properties using represent...

متن کامل

Generalization of Dynamic Two Stage Models in DEA: An Application in Saderat Bank

Dynamic network data envelopment analysis (DNDEA) has attracted a lot of attention in recent years. On one hand the available models in DNDEA evaluating the performance of a DMU with interrelated processes during specified multiple periods but on the other hand they can only measure the efficiency of dynamic network structure when a supply chain structure present. For example, in the banking in...

متن کامل

Multi-period network Data Envelopment Analysis to measure the efficiency of a real business

Measuring the efficiency of real businesses is not a simple task, because a real business may involve several processes and sub-processes, forming a very complicated dynamic network of interactions. In this paper, a customized dynamic network data envelopment analysis (NDEA) model is proposed to measure the efficiency of the sub-processes in a real business. The proposed dynamic NDEA model is f...

متن کامل

Link Prediction using Network Embedding based on Global Similarity

Background: The link prediction issue is one of the most widely used problems in complex network analysis. Link prediction requires knowing the background of previous link connections and combining them with available information. The link prediction local approaches with node structure objectives are fast in case of speed but are not accurate enough. On the other hand, the global link predicti...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2013