理论神经科学:研究生版

需积分: 20 8 下载量 41 浏览量 更新于2024-07-09 收藏 7.94MB PDF 举报
"Theoretical Neuroscience for Graduate-Edition4 .pdf" 本书是针对研究生级别的理论神经科学教材,由Peter Dayan和L.F. Abbott撰写。它深入探讨了神经元响应的分析和建模方法,旨在帮助读者理解大脑如何处理信息。 在第一章“神经编码I:放电率与尖峰统计”中,作者首先介绍了神经元的基本属性,如它们是如何记录和传递信息的。神经元响应通常通过记录其放电活动(尖峰)来研究,从刺激到响应的转换过程被详细阐述。放电率是衡量神经元活动强度的一个关键指标,用于描述神经元对特定刺激的反应程度。调谐曲线则展示了神经元对不同刺激的敏感度。 尖峰计数变异性是另一个重要的概念,它讨论了神经元放电模式的不稳定性。接下来,作者探讨了什么因素能触发神经元放电,以及如何通过描述刺激来理解这一过程。其中,尖峰触发平均值(Spike-Triggered Average)被用来揭示神经元对特定刺激片段的反应模式。白噪声刺激被广泛使用,因为它可以提供丰富的刺激信息。此外,还讨论了多个尖峰触发平均值和尖峰触发相关性,这些对于理解神经元间的交互作用至关重要。 在尖峰序列统计部分,作者介绍了齐次泊松过程和非齐次泊松过程,以及它们在模拟神经放电中的应用。这些统计模型与实际神经数据进行比较,以评估其适用性。书中还探讨了神经编码的不同类型,如独立尖峰、独立神经元编码和相关编码,以及时间编码的概念,这些编码方式都反映了神经信息传输的复杂性。 第二章“神经编码II:反向相关和感受野”进一步深入,介绍了一种估计放电率的方法——反向相关法,这是理解神经元感受野(Receptive Fields)的重要工具。反向相关法可以帮助研究人员识别神经元对输入信号的响应特征,从而揭示神经元如何编码视觉、听觉等感官信息。 这本书涵盖了神经科学中从基本的神经元特性到高级的编码策略等多个层次的内容,结合数学模型和统计方法,为研究生提供了全面理解神经信息处理的基础。书中还包含了丰富的附录和参考文献,以便于读者进一步探索相关主题。

Unlike the classical encryption schemes,keys are dispensable in certain PLS technigues, known as the keyless secure strat egy. Sophisticated signal processing techniques such as arti- ficial noise, beamforming,and diversitycan be developed to ensure the secrecy of the MC networks.In the Alice-Bob-Eve model, Alice is the legitimate transmitter, whose intended target is the legitimate receiver Bob,while Eve is the eavesdropper that intercepts the information from Alice to Bob.The secrecy performance is quantified via information leakagei.ethe dif ference of the mutual information between the Alice-Bob and Alice-Eve links. The upper bound of the information leakage is called secrecy capacity realized by a specific distribution of the input symbols, namely,capacity-achieving distribution.The secrecy performance of the diffusion-based MC system with concentration shift keying(CSK)is analyzed from an informa- tion-theoretical point of view,providing two paramount secrecy metrics, i.e., secrecy capacity and secure distance[13].How ever, only the estimation of lower bound secrecy capacity is derived as both links attain their channel capacity.The secrecy capacity highly depends on the system parameters such as the average signal energy,diffusion coefficientand reception duration. Moreover, the distance between the transmitter and the eavesdropper is also an important aspect of secrecy per- formance. For both amplitude and energy detection schemes secure distance is proposed as a secret metricover which the eavesdropper is incapable of signal recovery. Despite the case with CSK,the results of the secure metrics vary with the modulation type(e.g.pulse position,spacetype) and reception mechanism(e.g.passive,partially absorbingper fectly absorbing).For ease of understanding,Figure 3 depicts the modulation types and the corresponding CIRs with different reception mechanisms. Novel signa processing techniques and the biochemical channel properties can further assist the secrecy enhancement in the MC system.The molecular beam forming that avoids information disclosure can be realized via the flow generated in the channel.Besidesnew dimensions of diversity, such as the aforementioned molecular diversity of ionic compounds, can beexploited. Note that the feasibility of these methods can be validated by the derived secrecy metrics.

2023-06-13 上传