Reverse Engineering the Brain

نویسنده

  • James S. Albus
چکیده

Reverse engineering the brain will require a deep understanding of how information is represented and how computation is performed in the brain. What are the functional operations? What are the knowledge data structures? How are messages encoded? How are relationships established and broken? How are images processed? How does the brain transform signals into symbols? How does the brain generate the incredibly complex colorful, dynamic internal representation that we consciously perceive as external reality? The model presented here hypothesizes that each cortical hypercolumn together with its underlying thalamic nuclei performs as a Cortical Computational Unit (CCU) consisting of a frame-like data structure (containing attributes, state, and pointers) plus the computational processes and mechanisms required to build and maintain it. In sensory-processing areas of the brain, CCUs enable segmentation, grouping, and classification. Pointers stored in CCUframes link pixels and signals to objects and events in situations and episodes that are overlaid with meaning and emotional values. In behavior-generating areas of the brain, CCUs make decisions, set goals and priorities, generate plans, and control behavior. Pointers are used to define rules, grammars, procedures, plans, and behaviors. It is suggested that it may be possible to reverse engineer the human brain at the CCU level of fidelity using nextgeneration massively parallel computer hardware and software.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

B U I L D I N G a B E H Av I N G B R a I N

One of the grand challenges that the National Academy of Engineers identifi ed is to reverse engineer the brain. Neuroscientists and psychologists would no doubt agree that this is, indeed, a grand challenge. But what exactly does it mean to " reverse engineer " a brain? In general , reverse engineering is a method by which we take an already made product and systematically explore its behavior...

متن کامل

ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

متن کامل

Considering chain to chain competition in forward and reverse logistics of a dynamic and integrated supply chain network design problem

In this paper, a bi-objective model is presented for dynamic and integrated network design of a new entrant competitive closed-loop supply chain. To consider dynamism and integration in the network design problem, multiple long-term periods are regarded during planning horizon, so that each long-term period includes several short-term periods. Furthermore, a chain to chain competition between t...

متن کامل

The limitations of the reverse-engineering approach to cognitive modeling.

Frost's critique reveals the limitations of the reverse-engineering approach to cognitive modeling--the style of psychological explanation in which a stipulated internal organization (in the form of a computational mechanism) explains a relatively narrow set of phenomena. An alternative is to view organization as both the explanation for some phenomena and a phenomenon to be explained. This mov...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008