Skip to main content

Computational Processes that Appear to Model Human Memory

  • Conference paper
  • First Online:
Algorithms for Computational Biology (AlCoB 2017)

Part of the book series: Lecture Notes in Computer Science ((LNBI,volume 10252))

Included in the following conference series:

Abstract

This paper presents two computable functions, \(\omega \) and \(\varepsilon \), that map networks into networks. If all cognition occurs as an active neural network, then it is thought that \(\omega \) models long-term memory consolidation and \(\varepsilon \) models memory recall. A derived, intermediate network form, consisting of chordless cycles, could be the structural substrate of long-term memory; just as the double helix is the necessary substrate for genomic memory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This is primarily for mathematical convenience.

  2. 2.

    Probably essential. If \(\eta \) is not monotone, we can prove very few mathematical results of interest.

  3. 3.

    Unnecessary, relaxed in other papers such as [25, 26].

  4. 4.

    In [24], this was called the “spine” of \(\mathcal{N}\).

  5. 5.

    Cord Hockemeyer, http://www.uni-graz.at/cord.hockemeyer/KST_Bibliographie/kst-bib.html, maintains a bibliography of over 400 related references.

  6. 6.

    This network, \(\mathcal{N}\), that we received from a lab at Johns Hopkins Univ. was only identified as GrN2. We believe it is an natively unfolded phenylalanine-glycine (FG)-repeat [15].

References

  1. Braham, C.R., Messaoudi, E.: BDNF function in adult synaptic plasticity: the synaptic consolidation hypothesis. Prog. Neurobiol. 76(2), 99–125 (2005)

    Article  Google Scholar 

  2. Brandes, U.: A faster algorithm for betweeness centrality. J. Math. Sociol. 25(2), 163–177 (2001)

    Article  MATH  Google Scholar 

  3. Bretto, A.: Hypergraph Theory: An Introduction. Springer, Cham (2013)

    Book  MATH  Google Scholar 

  4. Crowder, R.G.: Principles of Learning and Memory. Psychology Press, New York (2015)

    Google Scholar 

  5. Davachi, L.: Encoding: the proof is still required. In: Roediger-III, H.L., Dudai, Y., Fitzpatrick, S.M. (eds.) Science of Memory: Concepts, pp. 129–135. Oxford University Press (2007)

    Google Scholar 

  6. Doignon, J.P., Falmagne, J.C.: Knowledge Spaces. Springer, Berlin (1999)

    Book  MATH  Google Scholar 

  7. Farber, M., Jamison, R.E.: Convexity in graphs and hypergraphs. SIAM J. Algebra Discrete Methods 7(3), 433–444 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  8. Freeman, L.C.: Centrality in social networks, conceptual clarification. Soc. Netw. 1, 215–239 (1978/1979)

    Google Scholar 

  9. Freeman, L.C.: Going the wrong way on a one-way street: centrality in physics and biology. J. Soc. Struct. 9, 1–15 (2008)

    Google Scholar 

  10. Frey, S., Görlich, D.: A saturated FG-repeat hydrogel can reproduce the permeability of nuclear pore complexes. Cell 130, 512–523 (2007)

    Article  Google Scholar 

  11. Gabrieli, J.D.E.: Cognitive neuroscience of human memory. Ann. Rev. Psychol. 49, 87–115 (1998)

    Article  Google Scholar 

  12. Gazzaniga, M.S., Ivry, R.B., Mangun, G.R., Steven, M.S.: Cognitive Neuroscience, The Biology of the Mind. W.W. Norton, New York (2009)

    Google Scholar 

  13. Granovetter, M.S.: The strength of weak ties. Am. J. Sociol. 78(6), 1360–1380 (1973)

    Article  Google Scholar 

  14. LeDoux, J.E.: Consolidation: Challenging the traditional view. In: Roediger-III, H.L., Dudai, Y., Fitzpatrick, S.M. (eds.) Science of Memory: Concepts, pp. 171–175. Oxford University Press (2007)

    Google Scholar 

  15. Lim, R.Y.H., Huang, N.P., Köser, J., Deng, J., et al.: Flexible phenylalanine-glycine nucleoporins as entropic barriers to nucleocytoplasmic transport. Proc. Nat. Acad. Science (PNAS) 103(25), 9512–9517 (2006)

    Article  Google Scholar 

  16. McKee, T.A.: How chordal graphs work. Bull. ICA 9, 27–39 (1993)

    MathSciNet  MATH  Google Scholar 

  17. Moshfeghi, Y., Triantafillou, P., Pollick, F.E.: Understanding information need: an fMRI study. In: SIGIR 2016, Pisa, Italy, pp. 335–344, July 2016

    Google Scholar 

  18. Nadel, L.: Consolidation: the demise of the fixed trace. In: Roediger-III, H.L., Dudai, Y., Fitzpatrick, S.M. (eds.) Science of Memory: Concepts, pp. 177–181. Oxford University Press (2007)

    Google Scholar 

  19. Orlandic, R., Pfaltz, J., Taylor, C.: A functional database representation of large sets of objects. In: Wang, H., Sharaf, M.A. (eds.) ADC 2014. LNCS, vol. 8506, pp. 189–197. Springer, Cham (2014). doi:10.1007/978-3-319-08608-8_17

    Google Scholar 

  20. Patel, S.S., Belmont, B.J., Sante, J.M., Rexach, M.F.: Natively unfolded nucleoporins gate protein diffusion across the nuclear pore complex. Cell 129, 83–96 (2007)

    Article  Google Scholar 

  21. Pfaltz, J.L.: Closure lattices. Discrete Math. 154, 217–236 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  22. Pfaltz, J.L.: Neighborhood expansion grammars. In: Ehrig, H., Engels, G., Kreowski, H.-J., Rozenberg, G. (eds.) TAGT 1998. LNCS, vol. 1764, pp. 30–44. Springer, Heidelberg (2000). doi:10.1007/978-3-540-46464-8_3

    Chapter  Google Scholar 

  23. Pfaltz, J.L.: Finding the mule in the network. In: Alhajj, R., Werner, B. (eds.) International Conference on Advances in Social Network Analysis and Mining, ASONAM 2012, Istanbul, Turkey, pp. 667–672, August 2012

    Google Scholar 

  24. Pfaltz, J.L.: The irreducible spine(s) of undirected networks. In: Lin, X., Manolopoulos, Y., Srivastava, D., Huang, G. (eds.) WISE 2013. LNCS, vol. 8181, pp. 104–117. Springer, Heidelberg (2013). doi:10.1007/978-3-642-41154-0_8

    Chapter  Google Scholar 

  25. Pfaltz, J.L.: Using closed sets to model cognitive behavior. In: Ray, T., Sarker, R., Li, X. (eds.) ACALCI 2016. LNCS (LNAI), vol. 9592, pp. 13–26. Springer, Cham (2016). doi:10.1007/978-3-319-28270-1_2

    Chapter  Google Scholar 

  26. Pfaltz, J.L.: A role for chordless cycles in the retrieval and representation of information. In: Proceedings of 6th International Workshop on Querying Graph Structured Data (GraphQ 2017), Venice, IT (2017, to appear)

    Google Scholar 

  27. Pfaltz, J.L.: Two network transformations. Math. Appl. 6(1) (2017, to appear)

    Google Scholar 

  28. Phinney, A.L., Calhoun, M.E., Wolfer, D.P., Lipp, H.P., Zheng, H., Jucker, M.: No hippocampal neuron or synaptic bouton loss in learning-impaired aged \(\beta \)-amyloid precursor protein-null mice. Neuroscience 90(4), 1207–1216 (1999)

    Article  Google Scholar 

  29. Purves, D., Augustine, G.J., Fitzpatrick, D., et al.: Neuroscience. Sinauer Assoc., Sunderland (2008)

    Google Scholar 

  30. Rolls, E.T., Treves, A.: Neural Networks and Brain Function. Oxford University Press, Oxford (1998)

    Google Scholar 

  31. Rosenfeld, A., Pfaltz, J.L.: Sequential operations in digital picture processing. J. ACM 13(4), 471–494 (1966)

    Article  MATH  Google Scholar 

  32. Ryan, T.J., Roy, D.S., Pignatelli, M., Arons, A., Tonegawa, S.: Engram cells retain memory under retrograde amnesia. Science 348(6238), 1007–1013 (2015)

    Article  Google Scholar 

  33. Sarti, A., Citti, G., Petitot, J.: Functional geometry of the horizontal connectivity in the primary visual cortex. J. Physiol. Paris 103(1–2), 37–45 (2009)

    Article  Google Scholar 

  34. Sun, Z., Wang, H., Wang, H., Shao, B., Li., J.: Efficient subgraph matching on billion node graphs. In: Proceedings of the VLDB Endowment (originally presented at VLDB Conference, Istanbul, Turkey), vol. 5(9), pp. 788–799 (2012)

    Google Scholar 

  35. Tronson, N.C., Taylor, J.R.: Molecular mechanisms of memory reconsolidation. Nat. Rev. Neurosci. 8(4), 262–275 (2007)

    Article  Google Scholar 

  36. Tulving, E.: Coding and representation: searching for a home in the brain. In: Roediger-III, H.L., Dudai, Y., Fitzpatrick, S.M. (eds.) Science of Memory: Concepts, pp. 65–68. Oxford University Press (2007)

    Google Scholar 

  37. Weis, K.: The nuclear pore complex: oily spaghetti or gummy bear? Cell 130, 405–407 (2007)

    Article  Google Scholar 

  38. Zhu, F., Guan, Y.: Predicting dynamic signaling network response under unseen perturbations. Bioinformatics 30(19), 2772–2778 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John L. Pfaltz .

Editor information

Editors and Affiliations

A Appendix

A Appendix

Too much formal mathematics makes a paper hard to read. Yet, it is important to be able to check some of the statements made in the body of the paper. In this appendix we provide a few propositions to formally prove some of our assertions.

The order in which nodes, or more accurately the singleton subsets, of \(\mathcal{N}\) are encountered can alter which points are subsumed and subsequently deleted. Nevertheless, we show below that the reduced trace \(\mathcal{T}= \mathcal{N}.\omega \) will be unique, up to isomorphism.

Proposition 1

Let \(\mathcal{T}= \mathcal{N}.\omega \) and \(\mathcal{T}' = \mathcal{N}.\omega '\) be irreducible subsets of a finite network \(\mathcal{N}\), then \(\mathcal{T}\cong \mathcal{T}'\).

Proof

Let \(y_0 \in \mathcal{T}\), \(y_0 \not \in \mathcal{T}'\). Then \(y_0\) can be subsumed by some point \(y_1\) in \(\mathcal{T}'\) and \(y_1 \not \in \mathcal{T}\) else because \(y_0.\eta \subseteq y_1.\eta \) implies \(y_0 \in \{y_1\}.\varphi \) and \(\mathcal{T}\) would not be irreducible.

Similarly, since \(y_1 \in \mathcal{T}'\) and \(y_1 \not \in \mathcal{T}\), there exists \(y_2 \in \mathcal{T}\) such that \(y_1\) is subsumed by \(y_2\). So, \(y_1.\eta \subseteq y_2.\eta \).

Now we have two possible cases; either \(y_2 = y_0\), or not.

Suppose \(y_2 = y_0\) (which is often the case), then \(y_0.\eta \subseteq y_1.\eta \) and \(y_1.\eta \subseteq y_2.\eta \) or \(y_0.\eta = y_1.\eta \). Hence \(i(y_0) = y_1\) is part of the desired isometry, i.

Now suppose \(y_2 \ne y_0\). There exists \(y_3 \ne y_1 \in \mathcal{T}'\) such that \(y_2.\eta \subseteq y_3.\eta \), and so forth. Since \(\mathcal{T}\) is finite this construction must halt with some \(y_n\). The points \(\{ y_0, y_1, y_2, \dots y_n \}\) constitute a complete graph \(Y_n\) with \(\{y_i\}.\eta = Y_n.\eta \), for \(i \in [0, n]\). In any reduction all \(y_i \in Y_n\) reduce to a single point. All possibilities lead to mutually isomorphic maps.    \(\square \)

In addition to \(\mathcal{N}.\omega \) being unique, we may observe that the transformation \(\omega \) is functional because \(\omega \) maps all subsets of N onto \(N_{\omega }\). So we can have , thus “deleting” z. Similarly, \(\varepsilon \) is functional because provides for the inclusion of new elements. Both \(\omega \) and \(\varepsilon \) are monotone, if we only modify its definition to be \(X \subseteq Y\) implies \(X.\varepsilon \subseteq Y.\varepsilon \), provided .

The following proposition characterizes the structure of irreducible traces.

Proposition 2

Let \(\mathcal{N}\) be a finite symmetric network with \(\mathcal{T}= \mathcal{N}.\omega \) being its irreducible trace. If \(y \in \mathcal{T}\) is not an isolated point then either

  • (1) there exists a chordless k-cycle C, \(k \ge 4\) such that \(y \in C\), or

  • (2) there exist chordless k-cycles \(C_1, C_2\) each of length \(\ge 4\) with \(x \in C_1\) \(z \in C_2\) and y lies on a path from x to z.

Proof

 

  1. (1)

    Let \(y \in N_{\mathcal{T}}\). Since y is not isolated, we let \(y = y_0\) with \(y_1 \in y_0.\eta \), so \((y_0, y_1) \in E\). Since \(y_1\) is not subsumed by \(y_0\), \(\exists y_2 \in y_1.\eta , y_2 \not \in y_0.\eta \), and since \(y_2\) is not subsumed by \(y_1\), \(\exists y_3 \in y_2.\eta \), \(y_3 \not \in y_1.\eta \). Since \(y_2 \not \in y_0.\eta \), \(y_3 \ne y_0\). Suppose \(y_3 \in y_0.\eta \), then \(< y_0, y_1, y_2, y_3, y_0>\) constitutes a k-cycle \(k \ge 4\), and we are done. Suppose \(y_3 \not \in y_0.\eta \). We repeat the same path extension. \(y_3.\eta \not \subseteq y_2.\eta \) implies \(\exists y_4 \in y_3.\eta \), \(y_4 \not \in y_2.\eta \). If \(y_4 \in y_0.\eta \) or \(y_4 \in y_1.\eta \), we have the desired cycle. If not \(\exists \ y_5, \ldots \) and so forth. Because \(\mathcal{N}\) is finite, this path extension must terminate with \(y_k \in y_i.\eta \), where \(0 \le i \le n-3\), \(n = |N|\). Let \(x = y_0, z = y_k\).

  2. (2)

    follows naturally.    \(\square \)

Finally, we show that \(\omega \) preserves the shortest paths between all elements of the trace, \(\mathcal{T}\).

Proposition 3

Let \(\sigma (x, z)\) denote a shortest path between x and z in \(\mathcal{N}\). Then for all \(y \ne x, z, \in \sigma (x, z)\), if y can be subsumed by \(y'\), then there exists a shortest path \(\sigma '(x, z)\) through \(y'\).

Proof

We may assume without loss of generality that y is adjacent to z in \(\sigma (x, z)\).

Let \(< x, \ldots , x_n, y, z>\) constitute \(\sigma (x, z)\). If y is subsumed by \(y'\), then \(y.\eta = \{x_n, y, z\} \subseteq y'.\eta \). So we have \(\sigma '(x, z) = < x. \ldots , x_n, y', z>\) of equal length. (Also proven in [23].)    \(\square \)

In other words, z can be removed from \(\mathcal{N}\) with the certainty that if there was a path from some node x to z through y, there will still exist a path of equal length from x to z after y’s removal.

Fig. 9.
figure 9

A network diamond

Figure 9 visually illustrates the situation described in Proposition 3, which we call a diamond. There may, or may not, be a connection between y and \(y'\) as indicated by the dashed line. If there is, as assumed in Proposition 3, then either \(y'\) subsumes y or vice versa, depending on the order in which y and \(y'\) are encountered by \(\omega \). This provides one example of the isomorphism described in Proposition 1. If there is no connection between y and \(y'\) then we have two distinct paths between x and z of the same length.

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Pfaltz, J.L. (2017). Computational Processes that Appear to Model Human Memory. In: Figueiredo, D., Martín-Vide, C., Pratas, D., Vega-Rodríguez, M. (eds) Algorithms for Computational Biology. AlCoB 2017. Lecture Notes in Computer Science(), vol 10252. Springer, Cham. https://doi.org/10.1007/978-3-319-58163-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58163-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58162-0

  • Online ISBN: 978-3-319-58163-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics