Sign Up to like & get
recommendations!
1
Published in 2020 at "Brain and Behavior"
DOI: 10.1002/brb3.1610
Abstract: Alzheimer's disease (AD), as a neurodegenerative condition, is one of the leading causes of dementia. Our study aims to explore the key genes of Xingnaojing (XNJ) for treatment of AD by integrated microarray analysis and…
read more here.
Keywords:
alzheimer disease;
explore key;
key genes;
pharmacology ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2675478
Abstract: The recently proposed principal component analysis network (PCANet) has performed well with respect to the classification of 2-D images. However, feature extraction may perform less well when dealing with multi-dimensional images, since the spatial relationships…
read more here.
Keywords:
principal component;
analysis network;
component analysis;
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3016171
Abstract: Because conventional PCANET approach is that the conventional PCANET performs the PCA for all the segments of all the training pixel vectors, and this does not capture the difference between different segments of the same…
read more here.
Keywords:
component analysis;
analysis network;
principal component;
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Geoscience and Remote Sensing"
DOI: 10.1109/tgrs.2022.3166174
Abstract: Recently, deep learning in synthetic aperture radar (SAR) automatic target recognition (ATR) has made significant progress, but the sample limitation problem in the SAR field is still obvious. Compared with the optical remote sensing images,…
read more here.
Keywords:
scattering characteristics;
network;
analysis network;
sar images ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Visualization and Computer Graphics"
DOI: 10.1109/tvcg.2018.2865028
Abstract: Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely…
read more here.
Keywords:
analysis network;
security;
vulnus visual;
vulnerability analysis ... See more keywords