Memory reconsolidation allows the consolidation of a concomitant weak learning through a synaptic tagging and capture mechanism

Hippocampus ◽  
2013 ◽  
Vol 23 (10) ◽  
pp. 931-941 ◽  
Author(s):  
Lindsey F. Cassini ◽  
Rodrigo O. Sierra ◽  
Josué Haubrich ◽  
Ana P. Crestani ◽  
Fabiana Santana ◽  
...  
2016 ◽  
Author(s):  
Samuel J. Gershman

AbstractIn noisy, dynamic environments, organisms must distinguish genuine change (e.g., the movement of prey) from noise (e.g., the rustling of leaves). Expectations should be updated only when the organism believes genuine change has occurred. Although individual variables can be highly unreliable, organisms can take advantage of the fact that changes tend to be correlated (e.g., movement of prey will tend to produce changes in both visual and olfactory modalities). Thus, observing a change in one variable provides information about the rate of change for other variables. We call this the penumbra of learning. At the neural level, the penumbra of learning may offer an explanation for why strong plasticity in one synapse can rescue weak plasticity at another (synaptic tagging and capture). At the behavioral level, it has been observed that weak learning of one task can be rescued by novelty exposure before or after the learning task. Here, using a simple number prediction task, we provide direct behavioral support for the penumbra of learning in humans, and show that it can be accounted for by a normative computational theory of learning.


Author(s):  
Xiangbing Zhao ◽  
Jianhui Zhou

With the advent of the computer network era, people like to think in deeper ways and methods. In addition, the power information network is facing the problem of information leakage. The research of power information network intrusion detection is helpful to prevent the intrusion and attack of bad factors, ensure the safety of information, and protect state secrets and personal privacy. In this paper, through the NRIDS model and network data analysis method, based on deep learning and cloud computing, the demand analysis of the real-time intrusion detection system for the power information network is carried out. The advantages and disadvantages of this kind of message capture mechanism are compared, and then a high-speed article capture mechanism is designed based on the DPDK research. Since cloud computing and power information networks are the most commonly used tools and ways for us to obtain information in our daily lives, our lives will be difficult to carry out without cloud computing and power information networks, so we must do a good job to ensure the security of network information network intrusion detection and defense measures.


Sign in / Sign up

Export Citation Format

Share Document