Search alternatives:
greater decrease » greatest decrease (Expand Search), greater increase (Expand Search), greater disease (Expand Search)
cnn decrease » _ decrease (Expand Search), a decrease (Expand Search), 026 decrease (Expand Search)
nn decrease » _ decrease (Expand Search), a decrease (Expand Search), gy decreased (Expand Search)
greater decrease » greatest decrease (Expand Search), greater increase (Expand Search), greater disease (Expand Search)
cnn decrease » _ decrease (Expand Search), a decrease (Expand Search), 026 decrease (Expand Search)
nn decrease » _ decrease (Expand Search), a decrease (Expand Search), gy decreased (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
<b>Supporting data for manuscript</b> "<b>Voluntary locomotion induces an early and remote hemodynamic decrease in the large cerebral veins</b>"
Published 2025“…<p dir="ltr">The CSV file 'Eyreetal_DrainingVein_SourceData' contains the averaged time series traces and extracted metrics from individual experiments used across Figures 1-5 in the manuscript "Voluntary locomotion induces an early and remote hemodynamic decrease in the large cerebral veins". The following acronyms included in the CSV file are defined as follows: Hbt is total hemoglobin, Art is artery region, DV is draining vein region, WV is whisker vein region, SEM is standard error mean, TS is time series, max peak is maximum peak, min peak is minima, AUC is area under the curve, WT is wild-type, AD is Alzheimer's disease, ATH is atherosclerosis and MIX is mixed AD/atherosclerosis. …”
-
9
-
10
-
11
Global Land Use Change Impacts on Soil Nitrogen Availability and Environmental Losses
Published 2025Subjects: -
12
-
13
CNN framework.
Published 2025“…We propose to implement both MLP (Multilayer Perceptron) and CNN (Convolutional Neural Networks) based on conventional methods to detect the Denial of Services (DDoS) attack. …”
-
14
CNN frameworks.
Published 2025“…We propose to implement both MLP (Multilayer Perceptron) and CNN (Convolutional Neural Networks) based on conventional methods to detect the Denial of Services (DDoS) attack. …”
-
15
-
16
-
17
-
18
-
19
-
20