001     281077
005     20240313095009.0
037 _ _ |a FZJ-2016-00782
041 _ _ |a English
100 1 _ |a Krishnan, Jeyashree
|0 P:(DE-Juel1)164187
|b 0
|e Corresponding author
111 2 _ |a 3rd HBP Winter School, Manchester, UK
|g HBP
|c Manchester
|d 2016-01-11 - 2016-01-15
|w UK
245 _ _ |a Detection of spiking events in continuous-time spiking neuron models
260 _ _ |c 2015
336 7 _ |a Conference Paper
|0 33
|2 EndNote
336 7 _ |a INPROCEEDINGS
|2 BibTeX
336 7 _ |a conferenceObject
|2 DRIVER
336 7 _ |a CONFERENCE_POSTER
|2 ORCID
336 7 _ |a Output Types/Conference Poster
|2 DataCite
336 7 _ |a Poster
|b poster
|m poster
|0 PUB:(DE-HGF)24
|s 1665062836_7692
|2 PUB:(DE-HGF)
|x Other
502 _ _ |c RWTH Aachen
520 _ _ |a The leaky integrate-and-fire neuron model is one of the commonly used spiking neuron models that can mimic the dynamics of neurons to high accuracy. This model consists of a system of first order linear differential equations with which the sub-threshold dynamics can be exactly integrated. Any excursion of the membrane potential above threshold leads to a spike, immediately after which the membrane potential is clamped to zero and input is sent to other neurons.Theoretical descriptions of neuron models require that the numerical implementations be in agreement with the exact solutions of the mathematical model. In time-driven simulators like NEST, the state of the neurons is updated in discrete time steps, and the spikes are detected and emitted only at the end of each step. Such a discrete-time neuronal network simulation leads to the following problems:- Spikes get constrained to the time grid, therefore they do not carry a precise time stamp, leading to artifical synchronization.- Depending on the computational step size, it may happen that the neuron voltage is below threshold at the beginning and end of the timestep with the excursion happening within the step, thereby causing a spike miss. - In addition, grid-constrained spiking causes an integration error that decreases only linearly with the computational step size.The purpose of this work is to formulate and implement efficient techniques that can be included in the neuron models to handle events at every point on the time grid by computing the precise spike times. We have constructed a precise numerical implementation of a particular variant of the leaky integrate-and-fire neuron model that does not miss any spikes. This implementation relies on the computation of the exact time to the maximum of potential in closed form based on the Lambert-W function. This model can catch otherwise missed spikes for large computational step sizes but is in principle computationally expensive because the cost comes from both the frequency of the test and the time for its calculation.To decrease the computational cost of the spike test, we have constructed an additional test that can predict the occurrence of threshold crossing in continuous-time allowing us to calculate the time to maximum from the previous test only when necessary. This test is based on the analysis of the trajectories in state-space governed by the system of equations describing this model. This has helped us construct a series of tests that can predict before propagation whether or not an event is expected in the future, thereby helping us achieve both high accuracy and less computational time.
536 _ _ |a 574 - Theory, modelling and simulation (POF3-574)
|0 G:(DE-HGF)POF3-574
|c POF3-574
|f POF III
|x 0
536 _ _ |a Simulation and Data Laboratory Quantum Materials (SDLQM) (SDLQM)
|0 G:(DE-Juel1)SDLQM
|c SDLQM
|f Simulation and Data Laboratory Quantum Materials (SDLQM)
|x 2
700 1 _ |a Mana, PierGianLuca
|0 P:(DE-Juel1)165939
|b 1
700 1 _ |a Helias, Moritz
|0 P:(DE-Juel1)144806
|b 2
700 1 _ |a Kunkel, Susanne
|0 P:(DE-Juel1)151364
|b 3
700 1 _ |a Di Napoli, Edoardo
|0 P:(DE-Juel1)144723
|b 4
|u fzj
700 1 _ |a Diesmann, Markus
|0 P:(DE-Juel1)144174
|b 5
909 C O |p VDB
|o oai:juser.fz-juelich.de:281077
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 0
|6 P:(DE-Juel1)164187
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 1
|6 P:(DE-Juel1)165939
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 2
|6 P:(DE-Juel1)144806
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 3
|6 P:(DE-Juel1)151364
910 1 _ |a Forschungszentrum Jülich
|0 I:(DE-588b)5008462-8
|k FZJ
|b 4
|6 P:(DE-Juel1)144723
910 1 _ |a Forschungszentrum Jülich GmbH
|0 I:(DE-588b)5008462-8
|k FZJ
|b 5
|6 P:(DE-Juel1)144174
913 1 _ |a DE-HGF
|b Key Technologies
|l Decoding the Human Brain
|1 G:(DE-HGF)POF3-570
|0 G:(DE-HGF)POF3-574
|3 G:(DE-HGF)POF3
|2 G:(DE-HGF)POF3-500
|4 G:(DE-HGF)POF
|v Theory, modelling and simulation
|x 0
914 1 _ |y 2015
915 _ _ |a No Authors Fulltext
|0 StatID:(DE-HGF)0550
|2 StatID
920 1 _ |0 I:(DE-Juel1)INM-6-20090406
|k INM-6
|l Computational and Systems Neuroscience
|x 0
920 1 _ |0 I:(DE-Juel1)JSC-20090406
|k JSC
|l Jülich Supercomputing Center
|x 1
980 _ _ |a poster
980 _ _ |a VDB
980 _ _ |a I:(DE-Juel1)INM-6-20090406
980 _ _ |a I:(DE-Juel1)JSC-20090406
980 _ _ |a UNRESTRICTED
981 _ _ |a I:(DE-Juel1)IAS-6-20130828


LibraryCollectionCLSMajorCLSMinorLanguageAuthor
Marc 21