Agregátor RSS
Over 20,000 crypto fraud victims identified in international crackdown
How to Build Better Digital Twins of the Human Brain
Brain twins where regions are allowed to compete for resources behave more like the real thing.
The potential to create personalized digital twins of your brain and body is a hot topic in neuroscience and medicine today. These computer models are designed to simulate how parts of your brain interact and how the brain may respond to stimulation, disease, or medication.
The extraordinary complexity of the brain’s billions of neurons makes this a very difficult task, of course, even in the era of AI and big data. Until now, whole-brain models have struggled to capture what makes each brain unique.
People’s brains are all wired slightly differently, so everyone has a unique network of neural connections that represents a kind of “brain fingerprint.”
However, most so-called brain twins are currently more like distant cousins. Their performance is barely any closer to the real thing than if the model were using the wiring diagram of a random stranger.
This matters because digital twins are increasingly proposed as tools for testing treatments by computer simulation, before applying them to real people. If these models fail to capture fundamental principles of each patient’s unique brain organization, their predictions won’t be personalized—and in worst cases could be misleading.
In our latest study, published in Nature Neuroscience, we show that realistic digital brain twins require something that many existing models overlook: competition between the brain’s different systems.
Our findings suggest that without competition, digital twins risk being overly generic, missing out on what makes you “you.”
Excess of CooperationThe human brain is never static. The ebb and flow of its activity can be mapped non-invasively using neuroimaging methods such as functional MRI. A computer model can be built from this, specific to that person and simulating how the regions of their brain interact. This is the idea of the digital twin.
The brain is often described as a highly cooperative system. Yet everyday experiences such as focusing attention or switching between tasks tells us intuitively that brain systems compete for limited resources. Our brains cannot do everything at once, and not all regions can be active together all the time.
Despite this, the vast majority of brain simulations over the past 20 years have not taken these competitive interactions between regions into account. Rather, they have “forced” neighboring regions to cooperate. This can push the simulated brain into overly synchronized states that are rarely seen in real brains.
In a large comparative study of humans, macaque monkeys, and mice, our international team of researchers used non-invasive brain activity recordings to show that the most realistic whole-brain models not only require cooperative interactions within specialized brain circuits, but long-range competitive interactions between different circuits.
To achieve this, we compared two types of brain model: one in which all interactions between brain regions were cooperative, and another in which regions could either excite or suppress each other’s activity. In humans, monkeys, and mice, the models that included competitive interactions consistently outperformed cooperative-only models.
Using a large-scale analysis of over 14,000 neuroimaging studies, we found that spontaneous activity in the competitive models more faithfully reflected known cognitive circuits, such as those involved in attention or memory. This suggests competition is crucial for enabling the brain to flexibly activate appropriate combinations of regions—a hallmark of intelligent behavior.
Visual summary of our study:
When whole-brain models of humans, macaques, and mice are allowed to treat interactions between some brain regions as competitive, they consistently do so—generating activity patterns that closely resemble those associated with real cognitive processes. Luppi et al/Nature Neuroscience, CC BYWe concluded that competitive interactions act as a stabilizing force, allowing different brain systems to take turns in shaping the direction of the brain’s ebbs and flows without interference or distraction. This ability to avoid runaway activity may also contribute to the remarkable energy-efficiency of the mammalian brain, which is many orders of magnitude more efficient than modern AI systems.
Crucially, models with competitive interactions were not only more accurate but also more individual-specific. This means they were better at capturing the unique brain fingerprint that distinguishes one person’s brain from another’s.
No Longer Lost in Translation?The fact that our findings hold across humans and other mammals suggests they reflect fundamental principles of how intelligent systems work. In each case, we found models with competitive interactions generated brain activity patterns that closely resembled those associated with real cognitive processes.
This could have major implications for translational neuroscience. Animal models are routinely used to test treatments before human trials, yet differences between species often limit how well these results translate. Around 90 percent of treatments for neuropsychiatric disorders are “lost in translation,” failing in human clinical trials after showing promise in animal trials.
Combining brain imaging data from human patients with whole-brain modeling could radically change this. A framework that works across species would provide a powerful bridge between basic research and clinical application.
If someone needs intervention in the brain, for example due to epilepsy or a tumor, their digital twin could be used to explore how the patient’s brain activity would change when stimulated with different levels of drugs or electrical impulses. This might significantly improve on existing trial-and-error approaches with real patients, and thus provide better treatments.
The general principles of brain organization across species also offer a path for understanding how to shape the next generation of artificial intelligence. In the not-too-distant future, we may be able to construct digital twins that are more faithful in reproducing the salient features of the human brain—and potentially, AI models that are more faithful to the human mind.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
The post How to Build Better Digital Twins of the Human Brain appeared first on SingularityHub.
Observatoř Very C. Rubinové odhalila přes jedenáct tisíc asteroidů a mezi nimi i 33 blízkozemních těles
Nizozemský vývojář oživil Doom pomocí CSS a ukázal, že i webový prohlížeč zvládne plnohodnotný 3D engine
Spoření v dubnu: Kam bezpečně s penězi? Přehled všech nabídek na trhu
Two different attackers poisoned popular open source tools - and showed us the future of supply chain compromise
FEATURE Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from tens of thousands – if not more – organizations. We won't know the full blast radius for months.…
Jeden z mála vítězů krátké války v Zálivu: Britská robotická věž Rapid Sentry proti íránským dronům
Masakr cen u Applu. MacBook Air M4 pod 20 tisíc, Mac mini M2 za 8 tisíc a AirTag za 300 Kč
Toto je 50 nejstahovanějších a nejoblíbenějších aplikací pro iPhone a Android v Česku
Hungarian government creds left in the safe hands of 'FrankLampard'
Hungary's government has discovered the hard way that the biggest threat to national security might just be its own password choices.…
Výrobce čipů Onsemi rozšíří aktivity v Česku, kupuje brněnskou firmu navrhující procesory
Český simulátor hackera Zero Trust vychází z reálné praxe. Pomůžete zákonu, nebo zbohatnete na dark webu?
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
Robotický vodicí pes díky GPT-4 rozumí příkazům a umí mluvit. Pomáhá nevidomým lépe chápat okolí
ChatGPT rolls out new $100 Pro subscription to challenge Claude
Splashdown! Astronauti přistáli poblíž Kalifornie. Pak nastala vtipná situace. Nefungoval telefon a záchrana se protáhla
Kompilátor C89 v bashi
10 tipů na slevy týdne: výprodej na Alze, 3 za cenu 2 v Dr. Maxu a dovolená se slevou 2 000 Kč
Google adds end-to-end Gmail encryption to Android, iOS devices for enterprises
Google has made a big step forward by extending end-to-end encryption to Android and iOS devices for Gmail client-side encryption (CSE) users, says an expert.
“All in all, this is a welcome update, especially in light of recent concerns surrounding WhatsApp’s encryption methods,” said Gartner analyst Avivah Litan. “Google’s approach offers verifiable customer-managed keys and ensures the provider does not have access to encrypted content.”
This, she said, addresses allegations raised in the January 2026 lawsuit against Meta regarding their internal access to customer encrypted message data.
Meta has reportedly said the claims are false, and that WhatsApp messages remain protected by default. The suit’s allegations have not been proven in court.
Litan noted that Google’s encryption update is only for organizations subscribing to its Enterprise Plus with Assured Controls edition. Messages and attachments are encrypted directly on-device, with encryption keys managed externally by the customer.
“For CSOs in regulated industries, this development is significant, as it supports secure mobile communication, compliance with regulations such as HIPAA [the U.S. Health Insurance Portability and Accountability Act] and GDPR [the European General Data Protection Regulation], and reduces the risk of plaintext data exposure on mobile devices,” she said. “External recipients retain the ability to reply via a web portal.”
However, Litan added, the capability remains opt-in, requires premium licensing and administrative configuration, and disables several Gmail functions, including AI features and comprehensive search, on encrypted content. But, she pointed out, the limitations are consistent with those in Gmail web and desktop implementations.
It’s also a capability that Microsoft doesn’t provide. A Microsoft spokesperson said in an email that the company doesn’t currently offer end-to-end Outlook encryption on mobile, although messages can be digitally signed and encrypted.
In its April 9 announcement, Google said Workspace users can compose and read end-to-end encrypted messages natively within the Gmail app on Android and iOS without the need to download extra apps or use mail portals. Users with a Gmail E2EE license can send an encrypted message to any recipient, regardless of their email address. If the recipient uses the Gmail app, the encrypted message will be delivered as a normal message thread to their inbox, but if not, they can seamlessly and securely read and reply in their own native browser. This, Google said, ensures that all users have a simple and secure interface, regardless of their email service or device.
Google Workspace admins will need to enable the Android and iOS clients in the CSE admin interface to give users access to the new capability. This can be done in the Admin Console.
End users also need to be taught the new process: To add client-side encryption to any message, they must click the lock icon and select ‘additional encryption’. Then they can compose a message and add attachments as they normally do.
Forrester Research Senior Analyst Andrew Cornwall noted the biggest benefit for enterprises is that Workspace admins or Google can disable the ability to take screenshots and screen recordings when users read an encrypted message in the Gmail app. That will prevent Android and iOS recipients from forwarding a message as an image, he said, noting that Google can also disable screenshots in Android Chrome for business users and presumably will do this when Android users with email programs other than Gmail open a message in a browser.
From a user’s perspective, he added, this encryption gives Gmail an advantage over third-party email programs like Outlook and Thunderbird, which won’t automatically decrypt messages that have been encrypted using Google’s encryption mechanism. Unlike some encryption methods, Gmail doesn’t require the exchange of a key in advance, so users will be more likely to use it.
However, he pointed out, Google’s client-side encryption doesn’t encrypt headers or message senders, so an attacker with access to the device can still get some potentially sensitive information even with encryption enabled.
“If you’re planning to use Gmail to commit financial crimes or plan a revolution,” he added, “you should know that Google controls the display and often the keyboard on devices they build. Even if emails are encrypted on device, your messages may still be available while being read or composed.”
And while end-to-end encryption (E2EE) is considered by experts to be an excellent protection against the hijacking of data in transit, it won’t protect data on compromised devices, stolen and hacked devices, or in unencrypted backups.
David Shipley, CEO of security awareness provider Beauceron Security, noted the extension of Gmail end to end encryption to mobile platforms will help organizations ensure compliance with privacy concerns. “On the downside,” he added, “this is going to be a powerful tool for criminals. If they spin up a Google Workspace tenant and send encrypted messages to end users who aren’t on Gmail, in those cases, users will get a link to a new portal to read the sent message which will not be intercepted by a lot of security tools like email filters.”
Událo se v týdnu 15/2026
- « první
- ‹ předchozí
- …
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- …
- následující ›
- poslední »



