• No results found

The Subiculum: What It Does, What It Might Do, And What Neuroanatomy Has Yet To Tell Us

N/A
N/A
Protected

Academic year: 2020

Share "The Subiculum: What It Does, What It Might Do, And What Neuroanatomy Has Yet To Tell Us"

Copied!
12
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 2 Intrinsic connections of the hippocampal formation, including the recently discovered projection from perirhinal cortex to CA1 and subiculum.
Fig. 3 (A) Neurons in proximal CA1 project to distal subiculum, neurons in mid-CA1 project to mid-subiculum and neurons in distal CA1 project across the CA1–subiculum border into proximal subiculum
Fig. 4 (A) Effects of high-frequency stimulation (HFS) on the amplitude of fEPSPs; post-HFS fEPSP values are expressed as a percentage of the pre-HFS baseline
Fig. 5 (A.i) Effects of LFS (10 Hz) on the amplitude of fEPSPs. The post-LFS values are expressed as a percentage of the prestimulation baseline (± SEM)
+4

References

Related documents

Online – using the online form, you have to enter the required data, and after generating the boarding pass, you have to print it and take with you to the airport (you will see

This elite 2 + 2 programme offers H.I.T.’s high achieving students the opportunity to obtain the BEng (Hons) Mechanical Engineering degree from the University of Bath, UK.. After

The JBoss Enterprise SOA Platform includes service- oriented architecture (SOA) open source middleware such as JBoss Enterprise Service Bus (ESB), JBoss jBPM, JBoss Rules and

We find that households that experienced a land dispute before the first-stage land reg- istration was implemented are more likely to be interested in a second-stage

100–120(–140) µm wide; apex outwardly greenish black to black, 80–120(–140) µm wide, K–, slightly concave to slightly convex, then occasionally with a minutely papillate

Thus, probably the most challenging of the 16 data sets for a DS detection method (see also Table 1) consisted of (1) one condition containing 15 samples and a second con-

That the certificate of insurance shall contain a provision or endorsement that the coverage afforded will not expire, be canceled, materially changed, nor renewal refused

A5: Cross Site Request Forgery (CRSF) A6: Security Misconfiguration A8: Failure to Restrict URL Access A10: Unvalidated Redirects and Forwards A7: Insecure Cryptographic