Advances in spatial transcriptomics and its applications in cancer research

Y **, Y Zuo, G Li, W Liu, Y Pan, T Fan, X Fu, X Yao… - Molecular Cancer, 2024 - Springer
Malignant tumors have increasing morbidity and high mortality, and their occurrence and
development is a complicate process. The development of sequencing technologies …

[HTML][HTML] Applications of electronic nose (e-nose) and electronic tongue (e-tongue) in food quality-related properties determination: A review

J Tan, J Xu - Artificial Intelligence in Agriculture, 2020 - Elsevier
Background An e-nose or an e-tongue is a group of gas sensors or chemical sensors that
simulate human nose or human tongue. Both e-nose and e-tongue have shown great …

An enhanced multi-stage deep learning framework for detecting malicious activities from autonomous vehicles

IA Khan, N Moustafa, D Pi, W Haider… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Intelligent Transportation Systems (ITS), particularly Autonomous Vehicles (AVs), are
susceptible to safety and security concerns that impend people's lives. Nothing like manually …

Detection of cyberattacks in industrial control systems using enhanced principal component analysis and hypergraph-based convolution neural network (EPCA-HG …

K Krithivasan, S Pravinraj, SS VS - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The automated operations of industrial control systems (ICSs) highly rely on the
interconnected devices, sensors, and actuators that are monitored and controlled by the …

Heteroskedastic PCA: Algorithm, optimality, and applications

AR Zhang, TT Cai, Y Wu - The Annals of Statistics, 2022 - projecteuclid.org
Heteroskedastic PCA: Algorithm, optimality, and applications Page 1 The Annals of Statistics
2022, Vol. 50, No. 1, 53–80 https://doi.org/10.1214/21-AOS2074 © Institute of Mathematical …

Data-driven false data injection attacks against power grids: A random matrix approach

S Lakshminarayana, A Kammoun… - … on Smart Grid, 2020 - ieeexplore.ieee.org
We address the problem of constructing false data injection (FDI) attacks that can bypass the
bad data detector (BDD) of a power grid. The attacker is assumed to have access to only …

A self-adaptive classification method for plant disease detection using GMDH-Logistic model

J Chen, H Yin, D Zhang - Sustainable Computing: Informatics and Systems, 2020 - Elsevier
Agriculture occupies an important position in the economic development, and which is one
of the important sources of earning for human beings in many countries. However, a number …

Distributed linear regression by averaging

E Dobriban, Y Sheng - The Annals of Statistics, 2021 - JSTOR
Distributed statistical learning problems arise commonly when dealing with large datasets.
In this setup, datasets are partitioned over machines, which compute locally, and …

Three PV plants performance analysis using the principal component analysis method

M Adar, Y Najih, M Gouskir, A Chebak, M Mabrouki… - Energy, 2020 - Elsevier
This paper presents a comparative analysis of the performance of three grid-connected
photovoltaic power plants, of about 2kWp for each plant, using the principal component …

Multimodal mixing convolutional neural network and transformer for Alzheimer's disease recognition

J Chen, Y Wang, A Zeb, MD Suzauddola, Y Wen… - Expert Systems with …, 2025 - Elsevier
Early recognition of Alzheimer's disease (AD) and its precursor state, mild cognitive
impairment (MCI), is pivotal in interrupting the progression of the disease and providing …