Adaptation is a key component of efficient coding in sensory neurons. However, it remains unclear how neurons can provide a stable representation of external stimuli given their history-dependent responses. Here we show that a stable representation is maintained if efficiency is optimized by a population of neurons rather than by neurons individually. We show that spike-frequency adaptation and E/I balanced recurrent connectivity emerge as solutions to a global cost-accuracy tradeoff. The network will redistribute sensory responses from highly excitable neurons to less excitable neurons as the cost of neural activity increases. This does not change the representation at the population level despite causing dynamic changes in individual neurons. By applying this framework to an orientation coding network, we reconcile neural and behavioral findings. Our approach underscores the common mechanisms behind the diversity of neural adaptation and its role in producing a reliable representation of the stimulus while minimizing metabolic cost.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6759354 | PMC |
http://dx.doi.org/10.7554/eLife.46926 | DOI Listing |
Front Public Health
December 2024
Saw Swee Hock School of Public Health, National University of Singapore and National University Health System, Singapore, Singapore.
Objective: To characterize the public conversations around long COVID, as expressed through X (formerly Twitter) posts from May 2020 to April 2023.
Methods: Using X as the data source, we extracted tweets containing #long-covid, #long_covid, or "long covid," posted from May 2020 to April 2023. We then conducted an unsupervised deep learning analysis using Bidirectional Encoder Representations from Transformers (BERT).
Netw Neurosci
December 2024
Department of Cognition, Development and Education Psychology, University of Barcelona, Barcelona, Spain.
Memories are thought to use coding schemes that dynamically adjust their representational structure to maximize both persistence and efficiency. However, the nature of these coding scheme adjustments and their impact on the temporal evolution of memory after initial encoding is unclear. Here, we introduce the Segregation-to-Integration Transformation (SIT) model, a network formalization that offers a unified account of how the representational structure of a memory is transformed over time.
View Article and Find Full Text PDFPharmacol Res Perspect
February 2025
Department of Pharmacology, Faculty of Health Sciences, University of Pretoria, Pretoria, South Africa.
Gold nanoparticles (AuNPs) present with unique physicochemical features and potential for functionalization as anticancer agents. Three-dimensional spheroid models can be used to afford greater tissue representation due to their heterogeneous phenotype and complex molecular architecture. This study developed an A549 alveolar carcinoma spheroid model for cytotoxicity assessment and mechanistic evaluation of functionalized AuNPs.
View Article and Find Full Text PDFJ Chem Inf Model
December 2024
Department of Chemistry and Institute of Functional Materials, Pusan National University, Busan 46241, South Korea.
The amber-OL21 force field (ff) was developed to better describe noncanonical DNA, including Z-DNA. Despite its improvements for DNA simulations, this study found that OL21's scope of application was limited by embedded ff artifacts. In a benchmark set of seven DNA molecules, including two double-stranded DNAs transitioning between B- and Z-DNA and five single-stranded DNAs folding into mini-dumbbell or G-quadruplex structures, the free energy landscapes obtained using OL21 revealed several issues: Z-DNA was overly stabilized; misfolded states in mini-dumbbell DNAs were most stable; DNA GQ folding was consistently biased toward an antiparallel topology.
View Article and Find Full Text PDFNeural Netw
December 2024
School of Information Science and Technology, Taishan University, Taian, 271000, Shandong, China.
Network intrusion detection (NID) is an effective manner to guarantee the security of cyberspace. However, the scale of normal network traffic is much larger than intrusion traffic (i.e.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!