Magnetoencephalography 2014
DOI: 10.1007/978-3-642-33045-2_16
|View full text |Cite
|
Sign up to set email alerts
|

An Introduction to MEG Connectivity Measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 123 publications
0
4
0
Order By: Relevance
“…The delay τ , which has to be assigned as a positive integer number, and is therefore expressed in sampling time units, must be much smaller than the time scale to investigate. An example is provided by MEG analysis, in which the source leakage phenomenon spoils direct evaluations of r(k, w) [9]. It has to be noted that the use of a delay changes the value of the time series length to be used in the m max definition above from Λ to Λ − τ .…”
Section: Zero-delay Cross Correlation Analysis Of Networkmentioning
confidence: 99%
“…The delay τ , which has to be assigned as a positive integer number, and is therefore expressed in sampling time units, must be much smaller than the time scale to investigate. An example is provided by MEG analysis, in which the source leakage phenomenon spoils direct evaluations of r(k, w) [9]. It has to be noted that the use of a delay changes the value of the time series length to be used in the m max definition above from Λ to Λ − τ .…”
Section: Zero-delay Cross Correlation Analysis Of Networkmentioning
confidence: 99%
“…However, the magnetic field recorded by each sensor may be a mixed signal generated in multiple functional regions, whereas multiple sensors may include a signal from a common source. Since the computation of typical graph metrics requires all‐to‐all connectivity in the network of interest, a graph‐theory analysis in the sensor space may overestimate connectivity, called spurious connectivity, by changes in the amplitude of sources (Brookes, Woolrich, & Price, 2014 ; Hipp et al, 2012 ). A source‐space analysis may reduce the estimation bias in connectivity and graph metrics by separating overlapping source signals, but still has source leakage due to the ill‐posed nature of the inverse problem, inaccuracies in the forward solution, and incorrect assumptions caused by the inverse localization algorithm used (Brookes, Woolrich, & Price, 2014 ), which may lead to spurious connectivity in the source space.…”
Section: Introductionmentioning
confidence: 99%
“…Since the computation of typical graph metrics requires all‐to‐all connectivity in the network of interest, a graph‐theory analysis in the sensor space may overestimate connectivity, called spurious connectivity, by changes in the amplitude of sources (Brookes, Woolrich, & Price, 2014 ; Hipp et al, 2012 ). A source‐space analysis may reduce the estimation bias in connectivity and graph metrics by separating overlapping source signals, but still has source leakage due to the ill‐posed nature of the inverse problem, inaccuracies in the forward solution, and incorrect assumptions caused by the inverse localization algorithm used (Brookes, Woolrich, & Price, 2014 ), which may lead to spurious connectivity in the source space. Sophisticated methods for estimating reliable functional connectivity with a corrected bias in the source space have been developed by utilizing amplitude, phase, or other variables (Bastos & Schoffelen, 2015 ; Colclough et al, 2015 ; Hipp et al, 2012 ; Kim & Davis, 2021 ; Marzetti et al, 2013 ; Nolte et al, 2004 ; Palva et al, 2018 ; Sanchez‐Bornot et al, 2021 ; Stam, Nolte, & Daffertshofer, 2007 ; Vinck et al, 2011 ; Wang et al, 2018 ; Wens et al, 2015 ) as well as effective connectivity (Baccala & Sameshima, 2001 ; He et al, 2014 ; Kaminski & Blinowska, 1991 ; Lobier et al, 2014 ; Nolte, Ziehe, Kramer, et al, 2008 ; Nolte, Ziehe, Nikulin, et al, 2008 ; Schreiber, 2000 ).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation