Visual Search Without Selective Attention: A Cognitive Architecture Account

被引:2
|
作者
Kieras, David E. [1 ]
机构
[1] Univ Michigan, Elect Engn & Comp Sci Dept, 2260 Hayward St, Ann Arbor, MI 48109 USA
关键词
Cognitive architecture; Visual search; Cognitive modeling; Eye movements; EYE-MOVEMENTS; ECCENTRICITY; MASKING; TIME;
D O I
10.1111/tops.12406
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
A key phenomenon in visual search experiments is the linear relation of reaction time (RT) to the number of objects to be searched (set size). The dominant theory of visual search claims that this is a result of covert selective attention operating sequentially to bind visual features into objects, and this mechanism operates differently depending on the nature of the search task and the visual features involved, causing the slope of the RT as a function of set size to range from zero to large values. However, a cognitive architectural model presented here shows these effects on RT in three different search task conditions can be easily obtained from basic visual mechanisms, eye movements, and simple task strategies. No selective attention mechanism is needed. In addition, there are little-explored effects of visual crowding, which is typically confounded with set size in visual search experiments. Including a simple mechanism for crowding in the model also allows it to account for significant effects on error rate (ER). The resulting model shows the interaction between visual mechanisms and task strategy, and thus it represents a more comprehensive and fruitful approach to visual search than the dominant theory. Visual Search without Selective Attention calls into question the necessity of a covert selective attention mechanism by implementing a formal model that includes basic visual mechanisms, saccades, and simple task strategies. Across three search tasks, the model accounts for response times as well as the proportion of errors observed in human participants, including effects of item crowding in the visual stimulus.
引用
收藏
页码:222 / 239
页数:18
相关论文
共 50 条
  • [31] SEARCH AND SELECTIVE ATTENTION
    HOWARTH, CI
    BLOOMFIELD, JR
    BRITISH MEDICAL BULLETIN, 1971, 27 (03) : 253 - +
  • [32] Modelling visual search experiments: the selective attention for identification model (SAIM)
    Heinke, D
    Humphreys, GW
    di Virgilio, G
    NEUROCOMPUTING, 2002, 44 : 817 - 822
  • [33] MODULATION OF SELECTIVE ATTENTION BY SEQUENTIAL EFFECTS IN VISUAL-SEARCH TASKS
    RABBITT, P
    CUMMING, G
    VYAS, S
    QUARTERLY JOURNAL OF EXPERIMENTAL PSYCHOLOGY, 1979, 31 (MAY): : 305 - 317
  • [34] Selective attention for action New evidence from visual search studies
    Hannus, Aave
    Neggers, Sebastian F. W.
    Cornelissen, Frans W.
    Bekkering, Harold
    ATTENTION IN ACTION: ADVANCES FROM COGNITIVE NEUROSCIENCE, 2005, : 131 - 149
  • [35] Modeling visual search: Evolving the selective attention for identification model (SAIM)
    Heinke, D
    Humphreys, GW
    Tweed, CL
    CONNECTIONIST MODELS OF COGNITION AND PERCEPTION II, 2004, 15 : 168 - 177
  • [36] Exploring selective attention in ADHD: visual search through space and time
    Mason, DJ
    Humphreys, GW
    Kent, LS
    JOURNAL OF CHILD PSYCHOLOGY AND PSYCHIATRY, 2003, 44 (08) : 1158 - 1176
  • [37] Visual architecture and cognitive architecture
    Horswill, I
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 1997, 9 (2-3) : 277 - 292
  • [38] Visual and cognitive processes contribute to age-related improvements in visual selective attention
    Lynn, Andrew
    Maule, John
    Amso, Dima
    CHILD DEVELOPMENT, 2024, 95 (02) : 391 - 408
  • [39] Modelling Visual Search with the Selective Attention for Identification Model (VS-SAIM): A Novel Explanation for Visual Search Asymmetries
    Heinke, Dietmar
    Backhaus, Andreas
    COGNITIVE COMPUTATION, 2011, 3 (01) : 185 - 205
  • [40] Modelling Visual Search with the Selective Attention for Identification Model (VS-SAIM): A Novel Explanation for Visual Search Asymmetries
    Dietmar Heinke
    Andreas Backhaus
    Cognitive Computation, 2011, 3 : 185 - 205