473,795 Members | 3,279 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

I uncover the secret of visual consciousness

I uncover the secret of visual consciousness

Proof of visual consciousness
>From image formation by a plane mirror to the generation of (human)
visual consciousness

image formation by a plane mirror , visual consciousness, transform,
virtual image , overlap(superpo se), dual identities, seeing an object

How could an object become visible when observed by the eyes of the
human beings, i.e., how could the electrochemical changes of the
visual cortex and cerebral cortex be transformed into an object?
Apparently, this transformation would never occur if we take the word
"transformation " by the common sense. However, given the fact we could
indeed see an object, the changes in the visual and cerebral cortex
MUST have already been transformed into an object. Therefore,
"transformation " here should have other implications more profound
than commonly understood , and we ought to find out the mechanism and
pathway involved in this process.

The electrochemical changes in the visual and cerebral cortex must be
firstly translated into an image. Then this image ought be changed
into the corresponding object. In comparison with image formation by a
plane mirror, we would elucidate the mechanisms and pathways of these
most unexpected transformations , with an effort to reveal the mystery
of visual consciousness .

Does it hold true that the mirror itself produces the image (a virtual
image) formed by a plane mirror? Definitely no. The virtual image is
produced by the brains of human beings and animals, rather than by the
mirror itself.

Can it be more clearly demonstrated that the virtual image is
generated via the brain, than analyzing the process during which the
light enters into a plane mirror from the object, and then gets into
the eyes and brain, thus leading to the visualization of the virtual
image?
Can we assume that there exists a virtual image before the light
enters the eyes? Of course we cannot.

The single role a plane mirror plays in the whole process is the
reflection of light. However, after entering into the eyes, do not
these reflected lights need further procession by the brain? The
eventual result of this procession is seeing the virtual image.

The reason why we are capable of taking photos of an object while
taking pictures facing the plane mirror with a camer is NOT due to our
capability to capture a virtual image, as there is no real light given
out by the virtual image; rather, it lies in the fact that the
reflected light is able to enter into the lens of the camera.

As shown by Fig A, the convergence of the inverse expansion lines
helps to explain the position of a virtual point. However, neither the
virtual points nor the virtual images are produced by the convergence
of the inverse expansion lines, as the latter are not actual entities
while the former are existing facts. How could a non-existing inverse
expansion line be used to explain the existing actual fact of a
virtual image? In fact, it is exactly the mechanism of image
generation in the brain that defines the laws(/rules) of image
formation by a plane mirror.

What is the ultimate role for the fact that the brain is capable of
producing (/generating) an image( virtual image)?
Actually, it is exactlly this capability that enables a human being to
achieve the final results, i.e. , seeing an object, during the process
of visual consciousness generation.

In the following, we will explain how the brain sees an object when
obseved by a human being.

As shown by Fig B, when an object A is observed by the eyes and the
brain O, a
virtual image A' is fomed (/produced) in the first place, which
possesses two unique
characteristics .

Firstly, it is exactlly identical to the object A itself. Secondly,
and the most strikingly,
it can be filled with the corresponding object, resulting in what we
called the
overlapping£¨su perposing) of an object with its virtual image.

Only the virtual image itself can be entirely overlapped(supe rposed)
by the related object, and the space a virtual image occupys is called
the virtual space , while the space of an object is defined as the
physical space.

Fig C shows that the virtual image A' and the object A are
overlapped(supe rposed), leading to the presentation of both A' and A
in the same position. Because the virtual image A' and the
corresponding object A utilize an identical image after overlapping on
each other,So, the image here has dual identities, with one as a
virtual image and the other a physical object. The image has an extra
character ,The image becomes the object A.
Thus, as we see the virtual image A', we are actually observing the
object A itself.

It becomes apparent that the final result of visual consciousness is
achieved via a
two-step process, i.e., the formation of a virtual image in the first
place, and
secondly the overlapping(sup erposing) of this virtual image with the
corresponding object.

It is the process of overlapping(sup erposing) that turns a virtual
image into a visible object. This unique character( of a virtual
image) is best utilized in a most perfect and magic way during the
final stage of visual consciousness.

A A'
____|______|___ ___0 £¨the eyes and the brain £©
B Fig

A A'
____|__________ ___ 0 £¨the eyes and the brain £©
C Fig

my email:ma******* *@yahoo.om.cn
mantaintai

Feb 1 '07 #1
1 1341
ma********@yaho o.com.cn writes:
The electrochemical changes in the visual and cerebral cortex must be
firstly translated into an image. Then this image ought be changed
into the corresponding object. In comparison with image formation by a
plane mirror, we would elucidate the mechanisms and pathways of these
most unexpected transformations , with an effort to reveal the mystery
of visual consciousness .
+1 QOTW.

At least, I *think* this is telling me I need to see measurements of
my program's performance before trying to optimised based on merely
cerebral hunches. No?

--
\ "I was stopped by the police for speeding; they said 'Don't you |
`\ know the speed limit is 55 miles an hour?' I said 'Yeah I know, |
_o__) but I wasn't going to be out that long.'" -- Steven Wright |
Ben Finney

Feb 1 '07 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
2075
by: John Lee | last post by:
Hi, Which API can I use to encrypt data without using the secret key and also without purchased certificate? Is there an API that uses NT domain account to get sort of "certificate" and encrypt data in memory or to a file - same idea as EFS? Any sample or arcticles? Thanks a lot! John
2
1171
by: et | last post by:
In the web.config file, there is an option for pageOutput, and a notation that says you can view the trace in the trace.axd file. Well, there is no trace.axd file that I can find, I've searched everywhere. So what is the secret that is always left out to find this file. I have put pageOutput to true and I have put it to false and run the program a gazillion times and still do not find the trace.axd file, I do not find any axd file.
5
7584
by: Morten Mikkelsen | last post by:
Hi, On my SQL Server 2000, I have a table of data (tblAllData) containing a number of columns, some of which are 'secret'. I have to let some users access the database using ODBC from an Excel sheet, and I would like that they do not know at all that the columns exist. I tried creating a view for them (qryAllData) that only selects the columns that should be visible, but when the creating the ODBC-connection, both the query and the...
2
1696
by: Arnold | last post by:
For some of my secondary students studying bits and bytes, I'd like to make a form in which they can create secret codes with bytes. I'd like the form to have a memo field that can only accept 0s and 1s and spaces. I was envisioning the following: --On after update or so, check the memo and only allow groups of eight 0s and 1s, and only single spaces. --If students typed groups with < or > eight 0s or 1s, show a msgbox to alert the...
0
282
by: mantaintai | last post by:
Proof of visual consciousness visual consciousness image formation by a plane mirror , visual consciousness, transform, virtual image , overlap(superpose), dual identities, seeing an object How could an object become visible when observed by the eyes of the human beings, i.e., how could the electrochemical changes of the visual cortex and cerebral cortex be transformed into an object?
0
1059
by: mantaintai | last post by:
I uncover the secret of visual consciousness Proof of visual consciousness visual consciousness image formation by a plane mirror , visual consciousness, transform, virtual image , overlap(superpose), dual identities, seeing an object How could an object become visible when observed by the eyes of the
5
1936
by: 1 | last post by:
I have discovered the secret of the soul The soul is the emotion. The soul and the emotion are completely nonmaterial existence. The consciousness and the emotion are inseparable, which means each consciousness accompanies the corresponding emotion. We must understand that the whole brain is a energy system besides as a nervous system, which has the basic property of each energy system- the process of energy release and absorb. The...
0
1096
by: Laptop secret | last post by:
HI, We may not aware that the laptop you bring around has abig secret inside. Some of expert may have known it and keep it as secret. If you are fond of browsing in internet you may probably discover it. Read further thru this site and you may find out : http://sharinginfo4.googlepages.com/home
2
1360
by: sanjay.bidi1 | last post by:
I have puzzle in which I need to hash a value comprised of 2 form fields and a shared password before submitting form to external web application. My question is, what are the possibilities for doing something like this in JavaScript? In pseudo code terms I need to: var myHash = someHashFunction("sharedSecret" + form.field1 + form.field2)
0
10435
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10213
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
10000
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9037
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7538
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6779
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5563
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4113
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3721
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.