A transition to sharp timing in stochastic leaky integrate-and-fire neurons driven by frozen noisy input.

Neural Comput

Laboratory of Mathematical Physics, Rockefeller University, New York, NY 10065, U.S.A., and Lewis-Sigler Institute for Integrative Genomics, Princeton University, Princeton, NJ 08544, U.S.A.

Published: May 2014

The firing activity of intracellularly stimulated neurons in cortical slices has been demonstrated to be profoundly affected by the temporal structure of the injected current (Mainen & Sejnowski, 1995 ). This suggests that the timing features of the neural response may be controlled as much by its own biophysical characteristics as by how a neuron is wired within a circuit. Modeling studies have shown that the interplay between internal noise and the fluctuations of the driving input controls the reliability and the precision of neuronal spiking (Cecchi et al., 2000 ; Tiesinga, 2002 ; Fellous, Rudolph, Destexhe, & Sejnowski, 2003 ). In order to investigate this interplay, we focus on the stochastic leaky integrate-and-fire neuron and identify the Hölder exponent H of the integrated input as the key mathematical property dictating the regime of firing of a single-unit neuron. We have recently provided numerical evidence (Taillefumier & Magnasco, 2013 ) for the existence of a phase transition when [Formula: see text] becomes less than the statistical Hölder exponent associated with internal gaussian white noise (H=1/2). Here we describe the theoretical and numerical framework devised for the study of a neuron that is periodically driven by frozen noisy inputs with exponent H>0. In doing so, we account for the existence of a transition between two regimes of firing when H=1/2, and we show that spiking times have a continuous density when the Hölder exponent satisfies H>1/2. The transition at H=1/2 formally separates rate codes, for which the neural firing probability varies smoothly, from temporal codes, for which the neuron fires at sharply defined times regardless of the intensity of internal noise.

Download full-text PDF

Source
http://dx.doi.org/10.1162/NECO_a_00577DOI Listing

Publication Analysis

Top Keywords

hölder exponent
12
stochastic leaky
8
leaky integrate-and-fire
8
driven frozen
8
frozen noisy
8
internal noise
8
neuron
5
transition
4
transition sharp
4
sharp timing
4

Similar Publications

We propose the addition of usability validation to the extended V3 framework, now "V3+", and describe a pragmatic approach to ensuring that sensor-based digital health technologies can be used optimally at scale by diverse users. Alongside the original V3 components (verification; analytical validation; clinical validation), usability validation will ensure user-centricity of digital measurement tools, paving the way for more inclusive, reliable, and trustworthy digital measures within clinical research and clinical care.

View Article and Find Full Text PDF

As part of the U.S. Food and Drug Administration's (FDA's) Closer to Zero initiative, a toxicological reference value (TRV) for oral dietary exposure to Cd was established.

View Article and Find Full Text PDF

The crowded bacterial cytoplasm is composed of biomolecules that span several orders of magnitude in size and electrical charge. This complexity has been proposed as the source of the rich spatial organization and apparent anomalous diffusion of intracellular components, although this has not been tested directly. Here, we use biplane microscopy to track the 3D motion of self-assembled bacterial genetically encoded multimeric nanoparticles (bGEMs) with tunable size (20 to 50 nm) and charge (-3,240 to +2,700 e) in live cells.

View Article and Find Full Text PDF

Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos.

Entropy (Basel)

January 2025

Electrical Engineering College, Heilongjiang University, Harbin 150080, China.

In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers. This paper proposes a new method of cryptanalysis for image encryption algorithms with a key associated with plaintext.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!