Skip to main content

METHODS article

Front. Comput. Neurosci., 13 January 2014
Volume 7 - 2013 | https://doi.org/10.3389/fncom.2013.00193

Parameters for burst detection

  • 1Department of Biosystems Science and Engineering, ETH Zurich, Basel, Switzerland
  • 2Research Center for Advanced Science and Technology, The University of Tokyo, Tokyo, Japan
  • 3RIKEN Quantitative Biology Center, Kobe, Japan
  • 4Japan Science and Technology Agency, Precursory Research for Embryonic Science and Technology, Saitama, Japan

Bursts of action potentials within neurons and throughout networks are believed to serve roles in how neurons handle and store information, both in vivo and in vitro. Accurate detection of burst occurrences and durations are therefore crucial for many studies. A number of algorithms have been proposed to do so, but a standard method has not been adopted. This is due, in part, to many algorithms requiring the adjustment of multiple ad-hoc parameters and further post-hoc criteria in order to produce satisfactory results. Here, we broadly catalog existing approaches and present a new approach requiring the selection of only a single parameter: the number of spikes N comprising the smallest burst to consider. A burst was identified if N spikes occurred in less than T ms, where the threshold T was automatically determined from observing a probability distribution of inter-spike-intervals. Performance was compared vs. different classes of detectors on data gathered from in vitro neuronal networks grown over microelectrode arrays. Our approach offered a number of useful features including: a simple implementation, no need for ad-hoc or post-hoc criteria, and precise assignment of burst boundary time points. Unlike existing approaches, detection was not biased toward larger bursts, allowing identification and analysis of a greater range of neuronal and network dynamics.

Introduction

Bursts of action potentials within neurons and throughout networks are believed to serve roles in how neurons handle and store information, both in vivo and in vitro. Accurate detection of burst occurrences, durations, and boundaries are therefore crucial for many studies. In vivo studies have linked bursting, also referred to as “up states” in some cases, to oscillations traveling through brain regions, encoding of sensory input, assisting transmission of neural information, and markers of disease states such as epilepsy (Lisman, 1997; Izhikevich et al., 2003; Staley and Dudek, 2006). The prominent feature of primary central nervous system cells, cultured in vitro, is global network bursts, which are interspersed by tonic activity of varying degrees within a portion of neurons. Burst statistics have been used, for example, to study how information could become encoded after applying electrical (Madhavan et al., 2007) or chemical (Eytan et al., 2004; Selinger et al., 2004) stimulation to induce network plasticity. They have also been used to judge in vitro developmental stage, whereby networks transition from sparse uncorrelated spiking until displaying synchronized and aperiodic network bursts of various magnitudes in a “mature” network after 3–4 weeks (Van Pelt et al., 2004; Wagenaar et al., 2006). Both in vivo and in vitro, finite and repeating sets of activity, variously termed motifs or songs or assemblies, have been identified and proposed to be substrates to store memory traces (Baruchi and Ben-Jacob, 2004; Ikegaya et al., 2004; Segev et al., 2004; Harris, 2005; Eytan and Marom, 2006; Rolston et al., 2007; Kumar et al., 2010).

While a standard method to identify and detect network bursts has not been adopted, a number of algorithms were proposed for both in vivo (Legendy and Salcman, 1985; Cocatre-Zilgien and Delcomyn, 1992; Kaneoke and Vitek, 1996; Elias et al., 2007; Gourevitch and Eggermont, 2007; Ji and Wilson, 2007; Ko et al., 2012) and in vitro spike trains (Mukai et al., 2003; Xia et al., 2003; Segev et al., 2004; Turnbull et al., 2005; Wagenaar et al., 2005; Selinger et al., 2007; Pasquale et al., 2010; Tokdar et al., 2010; Pimashkin et al., 2011; Kapucu et al., 2012; Weihberger et al., 2013). Our working definition of a burst will be a period of high-frequency occurrences of multiple action potentials interspersed by periods of lower frequency tonic activity. We consider a network burst as synchronous spikes spatially distributed across multiple recording channels, including cases when few spikes occurred per channel. Burst detectors aim to build a border separating the higher and lower activity regimes. A difficulty arises because clear borders are not necessarily apparent and vary between, and even within, preparations. Many detection algorithms therefore require adjusting multiple ad-hoc parameters and further post-hoc criteria in order to produce visually acceptable results.

The various burst detection algorithms can be broadly categorized into two classes: (1) those setting a rate-threshold to detect bursts whenever the activity rate exceeds a specific value; (2) those setting an inter-spike-interval or ISI-threshold to detect bursts whenever the ISI between consecutive spikes is less than a specific value. Rate-threshold detectors simply bin together the spike times from all recording channels within a specified time window in order to create a firing rate histogram. In its most basic implementation, two parameters need to be set: the time window and the activity rate threshold. A bursting regime is then identified whenever the number of spikes exceeds the threshold (Mukai et al., 2003; Xia et al., 2003; Ji and Wilson, 2007; Pimashkin et al., 2011) or, similarly, whenever the number of active electrodes exceeds the threshold (Segev et al., 2004). This method works better for detecting multi-channel network bursts. This is due to the fact that network-wide spike trains provide higher signal-to-noise ratios than single-channel spike trains: spike counts from merged single-channel spike trains summate to multiplicatively larger values in time windows including bursts than those during non-bursting periods. The parameters are usually chosen empirically, in part, because the distribution of histogram peaks is often continuous. However, for a given time window, a rate threshold can be automatically set as the spike (or electrode) count value that separates the peaks in a bimodal probability distribution of firing rates (Ji and Wilson, 2007), also called a “discharge density” (Kaneoke and Vitek, 1996). Burst boundary time points are approximated at detection threshold crossings or via additional threshold settings. Histogram peaks and threshold crossings have been more precisely found by convolving spike times with Gaussian kernels, a decay function, or other smoothing methods (Xia et al., 2003; Segev et al., 2004; Ji and Wilson, 2007). The tendency to choose “safe” thresholds favors the detection of larger bursts, which underestimates burst number and duration.

ISI-threshold detectors consider that periods of low and high ISIs correspond to spikes occurring within and outside of bursts, respectively, and analyzing peaks in the probability distribution of the ISIs can identify appropriate thresholds (Cocatre-Zilgien and Delcomyn, 1992). The ability to assign boundary time points to specific spikes offers an advantage over rate-threshold detectors. At its most basic implementation, the ISI threshold is the only parameter required and can be automatically selected (Pasquale et al., 2010). A number of simple and complex methods to guide ISI threshold selection have been proposed. These are commonly based on finding valleys in the distributions of plain ISIs or the logarithm of ISIs or from the discharge density (Kaneoke and Vitek, 1996; Wagenaar et al., 2005; Selinger et al., 2007; Pasquale et al., 2010; Kapucu et al., 2012). The latter, actually, transforms the spike count value separating bimodal probability distributions of firing rates, as opposed to that of ISIs, to an ISI threshold by multiplying its inverse by the time window used to calculate the firing rates. Often however, a number of post-hoc criteria are introduced to better fit the data, including reintroducing rate-based metrics such as minimum spike counts or number of channels activated. A separate important branch of ISI threshold detectors statistically compares recorded ISIs to what would be expected assuming spike activity behaved following a model distribution. Burst regimes are then identified whenever activity exceeds expectations, termed a “surprise.” The famous Poisson Surprise method was introduced many decades ago (Legendy and Salcman, 1985) and amended variously into non-parametric Rank Surprise (Gourevitch and Eggermont, 2007), Robust Gaussian Surprise (Ko et al., 2012), and Pause Surprise (Elias et al., 2007) methods. Unlike rate-threshold detectors, ISI-threshold detectors typically operate on single-channel spike trains. Single-channel burst events detected in the first-stage are then combined together in order to identify network bursts, a process requiring additional parameters (Wagenaar et al., 2005; Pasquale et al., 2010). A main reason for the first-stage detection is because cumulative ISI distributions from multiple channels tend to average out peaks that would be apparent in probability distribution plots of single-channel spike trains. This obscures the choice of ISI threshold. Any method using a first-stage identification of single-channel bursts will also be biased toward the detection of large network bursts: network bursts composed of synchronized spikes, but with only one or a few spikes per channel, will be missed during the first-stage. Smaller “spatial” bursts of action potentials are reminiscent of the concepts of neuronal assemblies and synfire chains (Abeles et al., 1994; Kumar et al., 2010), and their detection may therefore be useful.

Our goal was to develop a simple yet robust network burst detector that does not depend on ad-hoc or post-hoc detection criteria and is able to detect smaller network bursts. Therefore, we built an ISIN-threshold detector, where ISIN is the inter-spike-interval between every Nth spike instead of every consecutive spike. The key simple consideration is the fact that the time points of a set of N consecutive spikes will give a better representation of a network's firing rate status than 2 consecutive spikes (i.e., ISI). Only one detection parameter is set: the number of spikes N that compose the smallest network burst to consider. N = 10 was used throughout this paper and corresponds to approximately 0.1 spikes per recording channel for our setup (126 channels). However, ISIN-threshold detection can be performed for a wide range of N for both single-channel and cumulative network spike trains. Peaks in the probability distribution of ISIN representing bursting and non-bursting regimes become more and more apparent for increasing N. The border between burst regimes is again automatically assigned at the valley between the (logarithmic) ISIN peaks. Compared to an ISI threshold, an ISIN threshold will be easier to identify, produce fewer false-positive detections, maintain precise assignment of burst boundary time points, and allow simplification of the detection algorithm. Post-hoc verification conditions are not required, and, like rate-threshold detectors, detection can be performed directly on the cumulative network spike train. ISIN-threshold detection is notated as: if Ti +(N − 1)Ti <ISIN-threshold, then spikes Si to Si +(N − 1) are in the same burst, where Ti is the time of spike Si; Matlab code is provided as Supplementary Material.

We applied the ISIN-threshold detector to data gathered from cultures of rat primary neurons and glia grown over complementary metal-oxide-semiconductor (CMOS)-based microelectrode arrays (MEA), although the specific choice of recording device was not critical. From our judgment (see Discussion), the detector performed well and avoided biasing identification toward larger bursts. In many cultures, a clear distinction between large bursts across the majority of channels and smaller bursts across a subset of channels was apparent from observing distributions of the number of spikes or number of contributing channels in a burst. On the other hand, a continuum of smaller network bursts existed without a clear cutoff between bursting and non-bursting regimes. Such bursts would not be reliably identified with existing detectors, and much diversity in network information processing may be overlooked if smaller bursts are not considered. While the ISIN-threshold detector performed well by setting only a single parameter, additional criteria can improve performance. In particular, large amounts of intermittent tonic spiking will degrade the performance of most detectors, and a method to identify and exclude such channels in an optional preprocessing step is presented.

Methods

Cell Culturing

Techniques have been developed to maintain neural cultures and conduct experiments for many months (Hales et al., 2010; Bakkum et al., 2013). Briefly, E18 Wistar rat cortices were dissociated using trypsin and mechanical trituration. 20k–40k neurons and glia were seeded over an area of ~12 mm2 on top of the CMOS chip. Layers of poly(ethyleneimine) followed by laminin were used to adhere cells. Plating media consisted of Neurobasal-B27 supplemented with 10% horse serum and 0.5 mM GlutaMAX during the first 24 h. Growth media consisted of DMEM supplemented with 10% horse serum, 0.5 mM GlutaMAX, and 1 mM sodium pyruvate. Cultures matured for about 1 month prior to experimentation, and experiments were conducted inside an incubator to control of environmental conditions (36°C and 5% CO2). Burst detection was performed on 9 cultures from 4 platings. Typical network activity is depicted in Figure 1.

FIGURE 1
www.frontiersin.org

Figure 1. (A) Network bursts (indicated in red) of varying durations of coincidental APs (raster dots) recorded across multiple channels. The majority of neurons mainly fired together within network bursts (columns of dots), but some also fired “tonically” outside of bursts (channels with gray dots). (B) Locations of the recording electrodes selected in the CMOS-based MEA (see Methods). Gray triangles correspond to the channels with gray dots in (A). Scale bar: 200 μm.

CMOS-Based MEA and Recording of Network Activity

Cortical networks were grown for many weeks over 11,011-electrode CMOS-based MEAs (Frey et al., 2010; Livi et al., 2010), which provide enough spatial and temporal resolution to detect action potentials from any neuron lying on the array: 1.8 × 2.0 mm2 area containing 8.2 × 5.8 μm2 electrodes with 17.8 μm pitch (3150 electrodes per mm2), sampled at 20 kHz. Subsets of 126 electrodes can be read-out (and/or stimulated) at one time, and electrode selection can be re-configured within a few ms. Custom software on a personal computer, including modified Meabench code, a field-programmable gate array (FPGA), and a microcontroller embedded in a custom circuit board were used to acquire data (Wagenaar et al., 2005; Muller et al., 2013). To identify the locations of neurons growing over the array, a sequence of about one hundred recording configurations were scanned across the whole array while recording spontaneous activity. To sample network activity, 126 recording electrodes were arbitrarily selected. Because an action potential from a single soma can be detected on multiple nearby electrodes, caution is required if configured electrodes are close to each other: activity from a single soma could be falsely detected as a small network burst. This case was avoided by maintaining a minimum inter-recording-electrode distance exceeding the spatial spread of somatic signals (about 40 μm). Alternatively, this case could be avoided by transforming channel spike trains into neuronal spike trains via spike sorting techniques (Franke et al., 2012a,b; Jackel et al., 2012). Matlab R2012a was used for data analysis.

Proposed Network Burst Detection Algorithm

The proposed ISIN-threshold method to detect bursts is depicted in Figure 2, and Matlab code is provided as Supplementary Material. To summarize, bursting (low ISIN) and non-bursting regimes (high ISIN) typically formed two peaks in a histogram of the base-10 logarithm of ISIN. ISIN is the inter-spike-interval between every Nth spike in the network. The time points from all spikes on all channels were combined into a single train and input to the detector; spatial information about electrode locations was not incorporated. Negative signals exceeding 5 standard deviations of the noise were considered to be spikes arising from somatic action potentials. The border between regimes, or ISIN threshold, was chosen as the valley between the peaks (or the first minima for multiple peaks). Setting histogram bin widths to be equally spaced on a logarithmic scale increases the height of the non-bursting (high ISIN) peak, providing better discrimination (Selinger et al., 2007; Pasquale et al., 2010). The user must choose a single parameter: the number of spikes N that compose the smallest network burst to consider. Detection is simply: If N consecutive spikes occur within a time period equal to or less than the ISIN threshold, the spikes are assigned to a burst. The burst ends when this condition is no longer met. Since all spikes are assigned to be within or outside of a burst, specific time points for the first and last spikes in a burst are assigned. For this paper, we chose N = 10 spikes, and identified ISIN thresholds from 1 h recordings. Channels with high levels of tonic spiking were excluded prior to analysis as depicted in Figure 5. This corresponded to between 2 and 10 percent of the recording channels (indicated by gray markers in raster plots).

FIGURE 2
www.frontiersin.org

Figure 2. ISIN thresholds and burst detection. (A) The probability of elapsed times between consecutive spikes (black; ISI) and every Nth spike (gray) up to every 10th spike (red) are plotted. Elevated firing during network bursting corresponds to lower ISI, and the red arrow indicates the threshold for burst detection used in Figure 1. (B) The elapsed time between consecutive spikes is plotted vs. the elapsed time between every 10 spikes. Histograms correspond to the black and red probability distributions in (A), and the red and black arrows correspond to the ISI and ISIN thresholds in (A). For (A) and (B), ISIs were jittered by a random value between zero and one sample (50 μs) in order to better visualize the contribution from low ISIs. These would otherwise be plotted on top of each other in discrete lines corresponding to multiples of the sampling rate. The inset pie chart shows the percentage of spikes in each quadrant. Symbols match the spike markers in (C). (C) Detector performance for a segment of network activity. Black pluses and blue squares indicate spikes that would be classified in bursts (red bars) using an ISIN = 10 threshold. Black pluses and cyan circles indicate spikes that would be classified in bursts according to an ISIN = 2 threshold. Green triangles indicate spikes outside of bursts for either case.

Existing Burst Detection Algorithms Used for Comparison

Rate-threshold detector

A rate-threshold detector algorithm was adapted from the work of Ji and Wilson (2007). Specifically, a network burst was detected if a firing rate histogram with 50 ms or 5 ms time windows exceeded N spikes. Rate-thresholds, N, were automatically set at the valley between peaks in the spike count (or electrode count) probability distributions. A 50 ms time window corresponds to the choice by Mukai et al. (2003), who used a similar preparation to ours. A shorter time window (e.g., 5 ms) may allow more precise identification of burst start and end times.

ISI-threshold detector

An ISI-threshold detector algorithm was adapted from pseudo code provided in a recent and thorough publication by Pasquale et al. (2010), who also used a similar preparation. In the first-stage single-channel burst detection, ISI thresholds were automatically set at a valley between peaks in the (logarithmic) ISI probability distribution and capped at maximum value of 100 ms. A single-channel burst was detected if the ISIs of 5 consecutive spikes were each less than the ISI threshold. Network bursts, or a “burst of bursts,” were detected using the same algorithm but on burst events instead of spikes. A post-hoc criterion of a minimum number of activated channels per network burst was specified as 20% of the recording channels. This corresponds to 25 channels in our array, but a value of 10 channels was used to improve consistency with the ISIN = 10-threshold detector.

Rank surprise detector

The non-parametric Rank Surprise algorithm was acquired from Matlab code provided with the original publication by Gourevitch and Eggermont (2007). As data in the original paper were recorded in the cortex of an anesthetized cat in vivo, two default parameters were changed to improve consistency with the other detectors: The minimum number of spikes and maximum ISI within a burst were changed to 5 spikes and 100 ms, respectively. However, the default values of 3 spikes and the 75th percentile of ISI produced similar results. A method to identify network bursts was not provided. Therefore, we identified a network burst simply whenever at least 10 single channel bursts overlapped temporally.

Results

Bursts were identified in 1-h recordings of spontaneous activity from primary cortical cultures using the ISIN-threshold detector with N = 10 (see Methods). Figure 1 shows typical neuronal network activity. Bursts showed a variety of sizes and inter-burst-intervals. Tonic activity commonly occurred in a subset of channels to varying degrees. Some channels showed elevated tonic activity throughout the duration of a recording, while others showed intermittent tonic activity. Recording channels were ordered by the overall firing rate in order to better observe the occurrence of bursts, indicated by the columns of spikes in the raster plot.

The method to find the ISIN = 10 threshold used to detect bursts in Figure 1 is depicted in Figure 2. The deflection in the probability curve suggests the existence of more than one type of activity state, such as bursting (low ISIN) and non-bursting (high ISIN; contributions from tonic activity) regimes. Increasing N increased the amount of deflection in the curve (Figures 2A, 4). This will add precision when determining a threshold and improve performance at the expense of increasing the criterion for the minimum number of spikes per burst. The ISIN = 10 threshold was 50 ms for the represented data and 150 ± 100 ms (mean ± SD) across 9 cultures. For comparison, an ISIN = 2 threshold was approximately 20 ms (Figure 2A, large black arrow) and 35 ± 45 ms (mean ± SD) across 9 cultures. The probability distributions and thresholds will depend on the overall number of neurons and their firing profiles, which may vary in time. The additional spikes that would be classified as composing a burst for ISIN = 2 but not for ISIN = 10 are presented as cyan circles in Figures 2B,C. While some of these spikes appear to be false positives, the close alignment of others may represent bursts, or perhaps assemblies, with fewer than 10 spikes.

In 6 out of 9 cultures, a clear distinction between large bursts covering the majority of channels and smaller bursts covering a subset of channels was apparent from observing distributions of burst size (number of spikes or elapsed time) or the number of contributing channels (Figure 3). Small bursts averaged less than 1 spike per recording channel, indicating they would be difficult to identify using existing detectors. A continuum of smaller bursts existed without a clear cutoff between bursting and non-bursting regimes. This suggests using caution when making assumptions about burst dimensions or “surprise” criteria for burst detection. Considering the small bursts represented 80 percent of all bursts and 10 percent of the spiking for this culture, much diversity in network information processing may be overlooked if only large bursts are detected and analyzed. Small bursts in the other 5 cultures represented 76, 45, 26, 25, and 12% of all bursts for each culture. From an information theory perspective, the extreme cases of no neuron or all neurons firing (i.e., the largest bursts) provide no information content, or only 1 bit if combined as on and off states. Smaller bursts then theoretically hold more information content. A previous experiment demonstrates the utility of small bursts, where electrically evoked bursts were used to instruct motor output in an embodied cultured network (Bakkum et al., 2008). Successful goal-directed behavior, based on plasticity in the spatio-temporal burst structure, was possible only when using a stimulation electrode that evoked small bursts.

FIGURE 3
www.frontiersin.org

Figure 3. Distribution of burst sizes. Increasing burst size correlated to increasing number of contributing channels (A) and increasing burst width (B). Larger bursts covering the majority of channels and smaller bursts covering a subset of channels are clearly distinguishable by observing valleys in each of the three histograms.

While the ISIN-threshold detector was robust in the presence of tonic activity, which in fact helped to form the second peak and valley in the logarithmic ISIN histograms that were used to determine the ISIN threshold (Figure 4), strong tonic firing on too many channels may compromise detection performance. For example, sustained tonic spiking could cause neighboring bursts to be falsely identified as a single burst. Also, tonic spiking on multiple channels could produce false-positive bursts. In any case, channels exhibiting high tonic activity are readily apparent from a visual inspection of raster plots (Figure 1). As an optional pre-processing step, these channels can be excluded. To make exclusion less subjective and more automated, a method to quantify the amount of tonic activity on a given recording channel is depicted in Figure 5. Here, a “tonic firing rate” was calculated by enforcing an arbitrarily chosen refractory period of 250 ms, whereby any spike following within the refractory period was excluded. This filtered out most spikes occurring during bursts while preserving much of the tonic spiking occurring between bursts. Channels with high tonic firing rates corresponded well to visual observations (Figure 5). A suitable choice of refractory period is longer than the average ISI of a neuron and shorter than the average inter-burst-interval.

FIGURE 4
www.frontiersin.org

Figure 4. Valleys in the bimodal ISIN probability distributions deepen with increasing N (light gray to dark gray) or with the inclusion of channels exhibiting tonic spiking (right panel). The distributions (black, red, light gray to dark gray) correspond to N equal to 2, 10, 50, 100, 250, 500, 1000, 2000, and 4000. The first peak disappears as N, the minimum burst size threshold, approaches the maximum burst size (~4000 spikes), which represents the trivial case of no spikes being within a burst. 8 out of 102 channels were identified as tonic according to the method presented in Figure 5. The inclusion of tonic channels can improve valley identification with a tradeoff of increased risk of identifying consecutive bursts as a single burst.

FIGURE 5
www.frontiersin.org

Figure 5. Quantifying levels of tonic activity. (A) Example network activity exhibiting bursting (red bars) and channels with high levels of tonic spiking (gray triangles). Spikes on all other active channels are indicated by black pluses. (B) The same network activity after introducing an artificial refractory period of 250 ms. Spikes during bursting became preferentially removed. (C) For each channel, the tonic (from B) vs. total (from A) firing rate is plotted. Channels with elevated tonic firing (gray triangles) match visual observations in (A) and (B).

Discussion

Comparison to Existing Detectors

Figures 6, 7 provide a comparison of the ISIN-threshold detector with detectors representative of the rate-threshold, ISI-threshold, and surprise methods by Ji and Wilson, Pasquale et al., and Gourevitch and Eggermont, respectively (Mukai et al., 2003; Gourevitch and Eggermont, 2007; Ji and Wilson, 2007; Pasquale et al., 2010). While the rate-threshold and ISIN-threshold methods operated directly on the cumulative network spike train, the ISI-threshold and the Rank Surprise methods required a first-stage single-channel burst detection step prior to identification of a network burst (Figures 6B,C). The ISIN = 10 threshold was equal to 140 ms in Figure 6 and 50, 250, and 350 ms in Figures 7AC, respectively. The rate threshold for a 50 ms time window was equal to 8 spikes in Figure 6 and 160, 80, and 10 spikes in Figures 7AC, respectively. Rate-threshold detector performance was similar for a 5 ms time window (see Figure 8). Refer to the Methods for implementation details. To compare performance in different culture preparations, Figure 7 contains data from 3 cultures whose small bursts were, according to the ISIN = 10-threshold detector, 80, 12, or 0% of the total number of bursts per each culture. Data from the culture in Figure 7A is also presented in Figures 13.

FIGURE 6
www.frontiersin.org

Figure 6. Performance of the ISIN = 10-threshold detector compared to example rate-threshold, ISI-threshold, and Rank Surprise detectors. (A) Burst times and durations for each detector (color bars and legend) applied to the network activity presented in the raster plot (each marker is one spike). The ISIN = 10-threshold and rate-threshold detectors were performed directly on the network spike train. The ISI-threshold and Rank Surprise detectors were performed on single-channel spike trains in a first stage. The respective single-channel burst events in (B) and (C) were then combined in a second stage to identify network bursts as described in the Methods.

FIGURE 7
www.frontiersin.org

Figure 7. An ISIN = 10-threshold detector identified small-sized bursts, and measured burst durations were shorter for a firing-rate-threshold or a rank surprise detector. (A–C) Each method was applied to 1-h long recordings from 3 cultures that each had different amounts of small bursts. The percentage of small bursts out of the total number of bursts, according to the ISIN = 10-threshold detector, were 80, 12, and 0% for (A–C), respectively. Each detector identified the largest bursts, and the ISIN = 10-threshold detector identified smaller bursts (left column). Since different detectors assign different durations to the same burst, one detector (ISIN = 10) was chosen as a reference (x-axis). In this manner, the same burst will be plotted at the same x-location, and its occurrence can be compared across detectors. Detected bursts had shorter durations for the firing-rate-threshold and rank surprise detectors. This was especially noticeable for cases with fewer short-duration small bursts in (B) and (C) (right column and D). Arrows in (B) correspond to examples of a large and a small burst in (D). (D) Plotted in (D) are durations of identified network bursts using each method (colored bars; top) and identified first-stage single-channel bursts using the ISI and Rank surprise methods (colored raster plots; each dot is a spike).

FIGURE 8
www.frontiersin.org

Figure 8. Rate-thresholds and burst detection for data presented in Figure 2. The probability distributions of (A) the total number of spikes or (B) the total number of electrodes that detected a spike within a time window between 5 and 50 ms in duration (lines) are plotted. Elevated firing during network bursting corresponds to higher spike or electrode counts, and the large arrows indicate the rate-threshold for burst detection used in (C). (C) Detector performance for a segment of network activity (black dots). Colored bars indicate detected bursts for each burst detector.

All methods detected the largest network bursts, and the ISIN-threshold detector also detected smaller network bursts (Figures 7AC; left column). In Figure 7A, 20% of the bursts detected by the ISIN = 10-threshold method were considered to be large bursts (c.f. Figure 3). This is consistent with the ISI-threshold, rate-threshold, and Rank Surprise methods detecting 18, 16, and 11% of the total bursts identified by the ISIN = 10-threshold method, respectively. For Figure 7B, the values were: 88% large bursts; 90, 90, and 76% of the total detected. For Figure 7C, the values were: 100% large bursts; 100, 100, and 93% of the total detected. The ISI-threshold detector struggled with tonic activity, whereby some bursts had artificially extended durations that sometimes merged neighbored bursts (Figure 6). The authors of the ISI-threshold detector acknowledged this situation (Pasquale et al., 2010), and they and others provided a post-hoc solution described below. Merged bursts are also possible with the ISIN-threshold detector, especially when the ISIN threshold is relatively large. The rate-threshold detector performed well. However, burst durations were consistently underestimated (Figures 7AC; right column), and the smallest bursts in a more challenging dataset were not detected (Figure 8, Supplemental Figure 1). Furthermore, the inability to accurately assign burst boundaries can be a drawback for some applications. Interestingly, rate-threshold detection with a shorter 5 ms time window underestimated burst duration to a greater extent (Figure 8). A rate-threshold detector based on the number of electrodes or the number of (spike-sorted) neurons displaying activity, as opposed to the number of spikes recorded, produced similar results (Figure 8, Supplemental Figure 1). Rate-threshold detector performance will improve with increasing numbers of recording channels: time windows that contain bursts will summate to multiplicatively larger values than windows containing lower frequency tonic activity.

The Rank Surprise method detected the fewest bursts and most underestimated burst duration (Figure 7). A commonly touted advantage of surprise methods over other methods is their ability to assign significance values to each burst. This is indeed a desirable feature if detection performs adequately. However, underestimating the number and duration of bursts appears to be inherent to the algorithm: The underlying Poisson or rank distribution, or what is “unsurprising,” is created including the “surprising” spikes that are in bursts. Therefore, spikes in the tails of bursts, where ISIs are longer than in the burst core, will no longer be “surprising.” In Figures 6, 7D, the tails of bursts are clearly excluded. This effect will be amplified for preparations with large percentages of spikes occurring within bursts, such as in vitro networks (90 ± 12% of spikes were within network bursts according to the ISIN = 10-threshold detector; mean ± SD, 9 cultures). Lowering the default threshold for what would be surprising entailed the detection of more spikes in bursts. However, the smallest bursts were still not detected, and, at the same time, wide stretches of tonic activity were now erroneously identified as bursts. Perhaps improved performance could be achieved by considering more than one distribution, with one representing a bursting regime, and then measure “surprise” with respect to modeled ISI distributions of the non-bursting regimes. The durations of the bursts detected with the Rank Surprise and rate-threshold detectors were 35 ± 15% and 49 ± 15%, respectively, of the durations of the same bursts identified by the ISIN = 10-threshold detector (mean ± SD for 9 cultures).

In their most basic form, rate-threshold and ISIN-threshold (including ISI-threshold) methods offer two sides of the same coin. The former measures the number of spikes detected within a fixed window of time while the latter measures how much time elapsed for a fixed number of spikes to occur. To emphasize the point, the rate-threshold detector in Figure 6 is related to an ISIN-threshold detector having an ISIN = 8 threshold equal to 50 ms. The choice of number of spikes or time window as a threshold is arbitrary, but the former creates artificial time points for burst boundaries at threshold crossings, while the latter allows the assignment of specific time points for the first and last spike in putative bursts.

The “discharge density” histograms (i.e., probability distributions of firing rates) (Kaneoke and Vitek, 1996; Ji and Wilson, 2007) provide a means to flip the coin and automatically determine both thresholds. By using a fixed firing-rate histogram time window, the threshold N (number of spikes) was selected at the valley separating high and low firing rate peaks in the discharge density plot (c.f. Figure 8). Flipping the coin, the method presented here can use the N found above to select an ISIN threshold (c.f. Figure 2). In turn, the ISIN threshold can update the time window of a new discharge density histogram in order to update N, thus continuing an iterative process. For our data, N and the ISIN threshold converged, but whether or not these values are optimal for burst detection is debatable. For example for data presented in Figures 1 and 6, the values converged to an ISIN = 260 threshold equal to 200 ms and an ISIN = 17 threshold equal to 220 ms, respectively. Detection appeared to work well. However, the small bursts in Figure 1 (i.e., less than N = 260) could no longer be detected, and longer ISIN thresholds led to some merged bursts. For data in Figure 1, the process appeared to find the border between large and small bursts (c.f. compare N = 260 to Figure 3). Alternatively, the simultaneous use of multiple pairs of N and ISIN thresholds is expected to improve detection performance. A simple example is given in the next paragraph, where an additional ISIN = 2 threshold helped to reduce the number of merged bursts. As a last note, the valleys in the probability distribution histograms provided an intuitive choice for a border but are not necessarily optimal. Finding optimal borders, and similarly precise measures of performance, requires having a ground truth about when bursts occur, which, unfortunately, does not exist.

Tonic activity can merge neighboring bursts for ISIN- and ISI-threshold detectors. Excluding tonic channels in a pre-processing stage, as discussed in the Results, offers one solution. Alternatively, merged bursts could be separated in a post-processing stage by finding time points of lowest firing between putative bursts as described by (Wagenaar et al., 2005; Pasquale et al., 2010); this technique is inherently done by rate-threshold detectors. However, whether or not putative bursts are distinct or different phases of the same burst was not always apparent. A further alternative that avoids pre- or post-processing steps is to introduce a second parameter during burst detection. For example, an ISIN = 2 threshold of 20 ms (50 Hz) effectively broke into pieces the tonic spike trains, which did not sustain 50 Hz firing rates. Since an ISIN = 2 threshold may be difficult to identify (c.f. Figure 2A), such a threshold may need to be adjusted in an ad-hoc manner for different preparations.

Conclusion

A network burst was defined as a period of elevated firing within or across multiple channels. Creating a network burst detector then consists of finding appropriate thresholds to separate periods of low and high firing states. We proposed an ISIN-threshold burst detector, where ISIN is the inter-spike-interval between every Nth spike in the network. The ISIN-threshold burst detector performed well with our data, but we acknowledge that other detectors may be better suited for other types of data. For example, the ISIN-threshold burst detector struggled most when multiple channels exhibited intermittent and irregular activity. For single neuron bursts, an ISI-threshold burst detector (ISIN = 2) sufficiently distinguishes bursting regimes (Pasquale et al., 2010).

Our approach offered a number of useful features including: a simple and computationally efficient implementation, no need for ad-hoc or post-hoc criteria, and precise assignment of burst boundary time points. The choice of N is not obvious, however, and could be considered to be an ad-hoc decision based on familiarity with the structure of the spike trains. We chose N = 10 as it was large enough to demonstrate a deepening of valleys in the probability distributions (Figure 2A) and small enough to allow a wide range of burst sizes to be detected. Choosing N equal to the minimum burst size would give the least sensitivity to tonic or noisy channels, but a minimum burst size may not be obvious (c.f. Figure 3). On the other hand, choosing the smallest N that provides easily separable peaks in the ISIN probability distribution would not bias detection toward larger bursts, allowing identification and analysis of a greater range of neuronal and network dynamics.

Conflict of Interest Statement

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Acknowledgments

Work was supported by the Swiss National Science Foundation Ambizione Grant PZ00P3_132245, FP7 of the European Community through the ERC Advanced Grant 267351 “NeuroCMOS,” the Japanese Society for the Promotion of Science post-doctoral grant, KAKENHI Grant 23680050, an RCAST internal grant and Denso Corp. (Kariya, Japan). We thank Alexander Stettler for post-processing CMOS chips, Zenas Chao for helpful discussions, and the D-BSSE support staff for expediting experiments.

Supplementary Material

The Supplementary Material for this article can be found online at: http://www.frontiersin.org/Computational_Neuroscience/10.3389/fncom.2013.00193/abstract

Supplemental Figure 1 | Rate-thresholds and burst detection for spike-sorted data presented in Figures 2 and 8. The probability distributions of (A) the total number of neurons spiking or (B) the total number of electrodes that detected a spike within a time window between 5 and 50 ms in duration (lines) are plotted. Elevated firing during network bursting corresponds to higher neuron or electrode counts, and the large arrows indicate the rate-threshold for burst detection used in (C) and (D). Hundred and two electrodes detected spikes, and from these, 62 individual neurons were manually identified (spike-sorted) based on having distinct spatio-temporal activity profiles (Franke et al., 2012a). (C) Histograms of neuron or electrode counts for 5 or 50 ms time windows for the network activity presented in (D). The rate-thresholds detected in (A) and (B) are plotted as dotted lines, and a burst is detected whenever a count exceeds the rate-threshold. (D) Detector performance for a segment of network activity (black dots). Colored bars indicate detected bursts for each burst detector.

Supplementary Code I | Matlab code for creating ISIN histogram plots in order to choose an ISIN threshold.

Supplementary Code II | Matlab code for ISIN burst detection.

References

Abeles, M., Prut, Y., Bergman, H., and Vaadia, E. (1994). Synchronization in neuronal transmission and its importance for information-processing. Prog. Brain Res. 102, 395–404. doi: 10.1016/S0079-6123(08)60555-5

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Bakkum, D. J., Chao, Z. C., and Potter, S. M. (2008). Spatio-temporal electrical stimuli shape behavior of an embodied cortical network in a goal-directed learning task. J. Neural Eng. 5, 310–323. doi: 10.1088/1741-2560/5/3/004

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Bakkum, D. J., Frey, U., Radivojevic, M., Russell, T. L., Muller, J., Fiscella, M., et al. (2013). Tracking axonal action potential propagation on a high-density microelectrode array across hundreds of sites. Nat. Commun. 4, 2181. doi: 10.1038/ncomms3181

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Baruchi, I., and Ben-Jacob, E. (2004). Functional holography of recorded neuronal networks activity. J. Neuroinform. 2, 333–352. doi: 10.1385/NI:2:3:333

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Cocatre-Zilgien, J. H., and Delcomyn, F. (1992). Identification of bursts in spike trains. J. Neurosci. Methods 41, 19–30. doi: 10.1016/0165-0270(92)90120-3

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Elias, S., Joshua, M., Goldberg, J. A., Heimer, G., Arkadir, D., Morris, G., et al. (2007). Statistical properties of pauses of the high-frequency discharge neurons in the external segment of the globus pallidus. J. Neurosci. 27, 2525–2538. doi: 10.1523/JNEUROSCI.4156-06.2007

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Eytan, D., and Marom, S. (2006). Dynamics and effective topology underlying synchronization in networks of cortical neurons. J. Neurosci. 26, 8465–8476. doi: 10.1523/JNEUROSCI.1627-06.2006

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Eytan, D., Minerbi, A., Ziv, N., and Marom, S. (2004). Dopamine-induced dispersion of correlations between action potentials in networks of cortical neurons. J. Neurophysiol. 92, 1817–1824. doi: 10.1152/jn.00202.2004

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Franke, F., Jackel, D., Dragas, J., Muller, J., Radivojevic, M., Bakkum, D., et al. (2012a). High-density microelectrode array recordings and real-time spike sorting for closed-loop experiments: an emerging technology to study neural plasticity. Front. Neural Circuits 6:105. doi: 10.3389/fncir.2012.00105

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Franke, F., Jackel, D., and Hierlemann, A. (2012b). “High performance spike sorting for HDMEA recordings,” in 8th International Meeting on Substrate-Integrated Micro Electrode Arrays, (Reutlingen), 218–219. Available online at: http://www.nmi.de/fileadmin/PDF/Broschueren/MEA2012_Proceedings_web.pdf

Frey, U., Sedivy, J., Heer, F., Pedron, R., Ballini, M., Mueller, J., et al. (2010). Switch-matrix-based high-density microelectrode array in CMOS technology. IEEE J. Solid-State Circuits 45, 467–482. doi: 10.1109/JSSC.2009.2035196

CrossRef Full Text

Gourevitch, B., and Eggermont, J. J. (2007). A nonparametric approach for detection of bursts in spike trains. J. Neurosci. Methods 160, 349–358. doi: 10.1016/j.jneumeth.2006.09.024

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Hales, C. M., Rolston, J. D., and Potter, S. M. (2010). How to culture, record and stimulate neuronal networks on micro-electrode arrays (MEAs). J. Vis. Exp. 39:e2056. doi: 10.3791/2056

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Harris, K. D. (2005). Neural signatures of cell assembly organization. Nat. Rev. Neurosci. 6, 399–407. doi: 10.1038/nrn1669

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Ikegaya, Y., Aaron, G., Cossart, R., Aronov, D., Lampl, I., Ferster, D., et al. (2004). Synfire chains and cortical songs: temporal modules of cortical activity. Science 304, 559–564. doi: 10.1126/science.1093173

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Izhikevich, E. M., Desai, N. S., Walcott, E. C., and Hoppensteadt, F. C. (2003). Bursts as a unit of neural information: selective communication via resonance. Trends Neurosci. 26, 161–167. doi: 10.1016/S0166-2236(03)00034-1

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Jackel, D., Frey, U., Fiscella, M., Franke, F., and Hierlemann, A. (2012). Applicability of independent component analysis on high-density microelectrode array recordings. J. Neurophysiol. 108, 334–348. doi: 10.1152/jn.01106.2011

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Ji, D., and Wilson, M. A. (2007). Coordinated memory replay in the visual cortex and hippocampus during sleep. Nat. Neurosci. 10, 100–107. doi: 10.1038/nn1825

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Kaneoke, Y., and Vitek, J. L. (1996). Burst and oscillation as disparate neuronal properties. J. Neurosci. Methods 68, 211–223. doi: 10.1016/0165-0270(96)00081-7

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Kapucu, F. E., Tanskanen, J. M., Mikkonen, J. E., Yla-Outinen, L., Narkilahti, S., and Hyttinen, J. A. (2012). Burst analysis tool for developing neuronal networks exhibiting highly varying action potential dynamics. Front. Comput. Neurosci. 6:38. doi: 10.3389/fncom.2012.00038

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Ko, D., Wilson, C. J., Lobb, C. J., and Paladini, C. A. (2012). Detection of bursts and pauses in spike trains. J. Neurosci. Methods 211, 145–158. doi: 10.1016/j.jneumeth.2012.08.013

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Kumar, A., Rotter, S., and Aertsen, A. (2010). Spiking activity propagation in neuronal networks: reconciling different perspectives on neural coding. Nat. Rev. Neurosci. 11, 615–627. doi: 10.1038/nrn2886

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Legendy, C. R., and Salcman, M. (1985). Bursts and recurrences of bursts in the spike trains of spontaneously active striate cortex neurons. J. Neurophysiol. 53, 926–939.

Pubmed Abstract | Pubmed Full Text

Lisman, J. E. (1997). Bursts as a unit of neural information: making unreliable synapses reliable. Trends Neurosci. 20, 38–43. doi: 10.1016/S0166-2236(96)10070-9

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Livi, P., Heer, F., Frey, U., Bakkum, D. J., and Hierlemann, A. (2010). Compact voltage and current stimulation buffer for high-density microelectrode arrays. IEEE Trans. Biomed. Circuits Syst. 4, 372–378. doi: 10.1109/TBCAS.2010.2080676

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Madhavan, R., Chao, Z. C., and Potter, S. M. (2007). Plasticity of recurring spatiotemporal activity patterns in cortical networks. Phys. Biol. 4, 181–193. doi: 10.1088/1478-3975/4/3/005

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Mukai, Y., Shiina, T., and Jimbo, Y. (2003). Continuous monitoring of developmental activity changes in cultured cortical networks. Elect. Eng. Jpn. 145, 28–37. doi: 10.1002/eej.10216

CrossRef Full Text

Muller, J., Bakkum, D. J., and Hierlemann, A. (2013). Sub-millisecond closed-loop feedback stimulation between arbitrary sets of individual neurons. Front. Neural Circuits 6:121. doi: 10.3389/fncir.2012.00121

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Pasquale, V., Martinoia, S., and Chiappalone, M. (2010). A self-adapting approach for the detection of bursts and network bursts in neuronal cultures. J. Comput. Neurosci. 29, 213–229. doi: 10.1007/s10827-009-0175-1

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Pimashkin, A., Kastalskiy, I., Simonov, A., Koryagina, E., Mukhina, I., and Kazantsev, V. (2011). Spiking signatures of spontaneous activity bursts in hippocampal cultures. Front. Comput. Neurosci. 5:46. doi: 10.3389/fncom.2011.00046

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Rolston, J. D., Wagenaar, D. A., and Potter, S. M. (2007). Precisely timed spatiotemporal patterns of neural activity in dissociated cortical cultures. Neuroscience 148, 294–303. doi: 10.1016/j.neuroscience.2007.05.025

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Segev, R., Baruchi, I., Hulata, E., and Ben-Jacob, E. (2004). Hidden neuronal correlations in cultured networks. Phys. Rev. Lett. 92, 118102. doi: 10.1103/PhysRevLett.92.118102

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Selinger, J. V., Kulagina, N. V., O'Shaughnessy, T. J., Ma, W., and Pancrazio, J. J. (2007). Methods for characterizing interspike intervals and identifying bursts in neuronal activity. J. Neurosci. Methods 162, 64–71. doi: 10.1016/j.jneumeth.2006.12.003

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Selinger, J. V., Pancrazio, J. J., and Gross, G. W. (2004). Measuring synchronization in neuronal networks for biosensor applications. Biosens. Bioelectron. 19, 675–683. doi: 10.1016/S0956-5663(03)00267-7

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Staley, K. J., and Dudek, F. E. (2006). Interictal spikes and epileptogenesis. Epilepsy Curr. 6, 199–202. doi: 10.1111/j.1535-7511.2006.00145.x

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Tokdar, S., Xi, P., Kelly, R. C., and Kass, R. E. (2010). Detection of bursts in extracellular spike trains using hidden semi-Markov point process models. J. Comput. Neurosci. 29, 203–212. doi: 10.1007/s10827-009-0182-2

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Turnbull, L., Dian, E., and Gross, G. (2005). The string method of burst identification in neuronal spike trains. J. Neurosci. Methods 145, 23–35. doi: 10.1016/j.jneumeth.2004.11.020

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Van Pelt, J., Wolters, P. S., Corner, M. A., Rutten, W. L. C., and Ramakers, G. J. A. (2004). Longterm characterization of firing dynamics of spontaneous bursts in cultured neural networks. IEEE Trans. Biomed. Eng. 51, 2051–2062. doi: 10.1109/TBME.2004.827936

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Wagenaar, D. A., Demarse, T. B., and Potter, S. M. (2005). “MEABench: a toolset for multi-electrode data acquisition and on-line analysis,” in IEEE EMBS Conference on Neural Engineering. (Arlington, VA).

Wagenaar, D. A., Pine, J., and Potter, S. M. (2006). An extremely rich repertoire of bursting patterns during the development of cortical cultures. BMC Neurosci. 7:11. doi: 10.1186/1471-2202-7-11

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Weihberger, O., Okujeni, S., Mikkonen, J. E., and Egert, U. (2013). Quantitative examination of stimulus-response relations in cortical networks in vitro. J. Neurophysiol. 109, 1764–1774. doi: 10.1152/jn.00481.2012

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Xia, Y., Gopal, K. V., and Gross, G. W. (2003). Differential acute effects of fluoxetine on frontal and auditory cortex networks in vitro. Brain Res. 973, 151–160. doi: 10.1016/S0006-8993(03)02367-9

Pubmed Abstract | Pubmed Full Text | CrossRef Full Text

Keywords: network dynamics, microelectrode array, information processing, burst detection, cell culture

Citation: Bakkum DJ, Radivojevic M, Frey U, Franke F, Hierlemann A and Takahashi H (2014) Parameters for burst detection. Front. Comput. Neurosci. 7:193. doi: 10.3389/fncom.2013.00193

Received: 23 August 2013; Accepted: 23 December 2013;
Published online: 13 January 2014.

Edited by:

Mayank R. Mehta, University of California, Los Angeles, USA

Reviewed by:

Daoyun Ji, Baylor College of Medicine, USA
David Foster, The Johns Hopkins University School Of Medicine, USA

Copyright © 2014 Bakkum, Radivojevic, Frey, Franke, Hierlemann and Takahashi. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Douglas J. Bakkum, Department of Biosystems Science and Engineering, ETH Zurich, Mattenstrasse 26, 4058 Basel, Switzerland e-mail: douglas.bakkum@bsse.ethz.ch

Download