2011
DOI: 10.1007/s11571-011-9171-z
|View full text |Cite
|
Sign up to set email alerts
|

Visual one-shot learning as an ‘anti-camouflage device’: a novel morphing paradigm

Abstract: Once people perceive what is in the hidden figure such as Dallenbach's cow and Dalmatian, they seldom seem to come back to the previous state when they were ignorant of the answer. This special type of learning process can be accomplished in a short time, with the effect of learning lasting for a long time (visual one-shot learning). Although it is an intriguing cognitive phenomenon, the lack of the control of difficulty of stimuli presented has been a problem in research. Here we propose a novel paradigm to c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
11
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 24 publications
1
11
0
Order By: Relevance
“…The Norrkross software is a freeware, open-source program that allows morphing of two photographic images creating a prototypical facial image from exemplars using a sophisticated morphing algorithm that implements the principles described by Benson and Perrett, 1993, as cited by Pearson and Adamson, 2004). The software is widely used in research (Pearson and Adamson, 2004; Liu and Jagadeesh, 2008; Akrami et al, 2009; Vida and Mondloch, 2009; Ishikawa and Mogi, 2011). Similar to the work of Pearson and Adamson (2004), an average of 75 key points were allocated to identify points of similarity between the faces, with more points assigned around areas of greater change with increasing emotional intensity, such as around the pupils, eyelids, eyebrows, lips, and nose.…”
Section: Methodsmentioning
confidence: 99%
“…The Norrkross software is a freeware, open-source program that allows morphing of two photographic images creating a prototypical facial image from exemplars using a sophisticated morphing algorithm that implements the principles described by Benson and Perrett, 1993, as cited by Pearson and Adamson, 2004). The software is widely used in research (Pearson and Adamson, 2004; Liu and Jagadeesh, 2008; Akrami et al, 2009; Vida and Mondloch, 2009; Ishikawa and Mogi, 2011). Similar to the work of Pearson and Adamson (2004), an average of 75 key points were allocated to identify points of similarity between the faces, with more points assigned around areas of greater change with increasing emotional intensity, such as around the pupils, eyelids, eyebrows, lips, and nose.…”
Section: Methodsmentioning
confidence: 99%
“…After an insightful realization, the learned knowledge sometimes prevents subjects from going back to the previous naïve state. This unique type of learning is a long-term memory encoding of one-shot experience (Ludmer et al, 2011), or called “one-shot learning” (Giovannelli et al, 2010; Ishikawa and Mogi, 2011; Dudai and Morris, 2013).…”
Section: Introductionmentioning
confidence: 99%
“…In this “no change paradigm (NCP),” the task difficulty is not easy to adjust properly, as the process of utilizing the combination of blurring and thresholding to create a hidden figure often makes the image too hard or too easy to recognize. If the problem is too difficult to solve, the answer rate within a certain period of time decreases, while the responded data available to analyze also decreases (Ishikawa and Mogi, 2011). On the other hand, if the problem is too easy, there is no stagnation (“impasse”) in the first place, compromising the suitability as a problem-solving task (Salvi et al, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…To tackle the problem of having a limited number of labelled instances, some methods based on the concepts of learning by knowledge transfer have been proposed and this approach has been termed as one-shot learning. The aim is to use a large number of available instances of a related domain (the source domain) to the target domain, and only one or a few labelled instances per class of the target domain, to build a model (Fei-Fei et al, 2006;Ishikawa and Mogi, 2011;Salakhutdinov et al, 2012). Fei-Fei et al (2006) proposed a Bayesian-based model for the problem of object recognition.…”
Section: Introductionmentioning
confidence: 99%