【论文】

[1]Xiang J, Tian C, Niu Y, et al.   Abnormal entropy modulation of the EEG signal in patients with schizophrenia   during the auditory paired-stimulus paradigm[J]. Frontiers in   Neuroinformatics, 2019, 13: 4.

[2]Wang B, Li P, Li D, Xiang   J, et al. Increased Functional Brain Network Efficiency During   Audiovisual Temporal Asynchrony Integration Task in Aging[J]. Frontiers in   aging neuroscience, 2018, 10.(通讯作者)

[3]Niu Y, Wang B, Zhou M, Xiang J,   et al. Dynamic Complexity of Spontaneous BOLD Activity in Alzheimer’s Disease   and Mild Cognitive Impairment Using Multiscale Entropy Analysis[J]. Frontiers   in neuroscience, 2018, 12.(通讯作者)

[4]Li Y, Huang M, Xiang J, et al.   Correlation of Interpedicular Distance with Radiographic Parameters,   Neurologic Deficit, and Posterior Structures Injury in Thoracolumbar Burst   Fractures[J]. World neurosurgery, 2018, 118: e72-e78.

[5]Wang B, Li T, Zhou M, Xiang   J, et al. The Abnormality of Topological Asymmetry in Hemispheric Brain   Anatomical Networks in Bipolar Disorder[J]. Frontiers in neuroscience, 2018,   12.

[6]Guo H, Yan P, Cheng C, Xiang   J, et al. fMRI classification method with multiple feature fusion based   on minimum spanning tree analysis[J]. Psychiatry research. Neuroimaging,   2018, 277: 14-27.

[7]Guo H, Li Y, Xu Y, Xiang J, et   al. Resting-State Brain Functional Hyper-Network Construction Based on   Elastic Net and Group Lasso Methods[J]. Frontiers in neuroinformatics, 2018,   12.

[8]Yang Y, Zhou M, Niu Y, Xiang J,   et al. Epileptic seizure prediction based on permutation entropy[J].   Frontiers in computational neuroscience, 2018, 12.(通讯作者)

[9]Li D, Li T, Niu Y, Xiang J, et   al. Reduced hemispheric asymmetry of brain anatomical networks in attention   deficit hyperactivity disorder[J]. Brain imaging and behavior, 2018: 1-16.

[10]Cui X. Xiang J, et   al. Classification of Alzheimer’s disease, mild cognitive impairment and   normal controls with subnetwork selection and graph kernel principal   component analysis based on minimum spanning tree brain functional   network[J]. Frontiers in computational neuroscience, 2018, 12: 31.

[11]Wang B, Li T, Niu Y,Xiang   J,et al. Differences in neural responses to ipsilateral stimuli in   wide-view fields between face-and house-selective areas[J]. PloS one, 2018,   13(2): e0192532.

[12]Guo H, Zhang F, Chen J, Xiang   J,et al. Machine learning classification combining multiple features of a   hyper-network of fMRI data in Alzheimer's disease[J]. Frontiers in   neuroscience, 2017, 11: 615.(通讯作者)

[13]Wang B, Niu Y, Miao L, Xiang   J,et al. Decreased complexity in Alzheimer's disease: resting-state fMRI   evidence of brain entropy mapping[J]. Frontiers in aging neuroscience, 2017,   9: 378.(通讯作者)

[14]Li J, Guo H, Ge L,Xiang   J, et al. Mechanism of Cerebralcare Granule® for Improving Cognitive   Function in Resting-State Brain Functional Networks of Sub-healthy   Subjects[J]. Frontiers in neuroscience, 2017, 11: 410.

[15]Han X H, Quan L, Xiong X Y,   Xiang J,et al. A novel data clustering algorithm based on modified   gravitational search algorithm[J]. Engineering Applications of Artificial   Intelligence, 2017, 61: 1-7.

[16]Wang B, Zhao J, Wu Z, Xiang   J,et al. Eccentricity Effects on the Efficiency of Attentional Networks:   Evidence From a Modified Attention Network Test[J]. Perception, 2016, 45(12):   1375-1386.

[17]Xiang J,Jia X, Li H, et al. Altered   spontaneous brain activity in cortical and subcortical regions in Parkinson’s   disease[J]. Parkinson’s disease, 2016.

[18]Xiang J,Han X H, Duan F, et al. A   novel hybrid system for feature selection based on an improved gravitational   search algorithm and k-NN method[J]. Applied Soft Computing, 2015, 31:   293-307.

[19]Xiang J,Li C, Li H, et al. The   detection of epileptic seizure signals based on fuzzy entropy[J]. Journal of   neuroscience methods, 2015, 243: 18-25.

[20]Cao R, Wu Z, Li H, Xiang J,et al. Disturbed connectivity of EEG   functional networks in alcoholism: a graph-theoretic analysis[J]. Bio-medical   materials and engineering, 2014, 24(6): 2927-2936.

[21]Liang P, Xiang J,   Liang H, et al. Altered amplitude of low-frequency fluctuations in early and   late mild cognitive impairment and Alzheimer's disease[J]. Current Alzheimer   Research, 2014, 11(4): 389-398.

[22]Guo H, Cheng C, Cao X, Xiang   J,et al. Resting-state functional connectivity abnormalities in first-onset   unmedicated depression[J]. Neural regeneration research, 2014, 9(2): 153

[23]Xiang J, Guo H, Cao R, et al. An   abnormal resting-state functional brain network indicates progression towards   Alzheimer's disease[J]. Neural regeneration research, 2013, 8(30): 2789.

[24]Xiang J, Cao R, Li L. Emotion   recognition based on the sample entropy of EEG[J]. Bio-medical materials and   engineering, 2014, 24(1): 1185-1192.

【专利】

基于脑网络模块结构特征的功能磁共振影像数据分类方法(已授权),专利号:201410101262.7;

太原理工大学计算机院招生网,相洁-太原理工大学信息与计算机学院相关推荐

  1. 永州计算机职称考试网,永州2016年11月职称计算机考试时间

    一.报名时间 2016年11月7日9:00至11月11日24:00. 二.报名科数及要求 本次报名限额800科,缴费额满后系统自动截止报名,请广大考生抓紧时间完成报名和缴费. 三.准考证打印时间 20 ...

  2. 南京航天航空大学计算机考研招生,2018年南京航天航空大学计算机科学与技术学院考研调剂信息公布...

    2018考研复试交流群(进群领内部资料) 576433840 2018年南京航天航空大学计算机科学与技术学院考研调剂信息公布 2018年考研成绩查询接近尾声,部分成绩不太理想的考生可能会考虑考研调剂, ...

  3. 计算机一级基础知识理论,计算机一级考试理论试题 第6部分 信息与计算机基础知识...

    64.[D]关于基本ASCII码,在计算机中的表示方法准确的描述是______. (A)使用8位二进制数,最右边一位为1 (B)使用8位二进制数,最左边一位为1 (C)使用8位二进制数,最右边一位为0 ...

  4. 安徽农业大学计算机信息管理专业,刘连忠 - 安徽农业大学 - 信息与计算机学院...

    近期论文 查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认) 论文论著: 近年来发表的学术论文: 1. Lianzhong Liu, Cheng Zhu. Boundary ...

  5. 软考计算机英语考题,《全国计算机软考网管英语试题及答案.doc

    <全国计算机软考网管英语试题及答案 全国计算机软考网管英语试题及答案(1) Heterogeneous network environments consist of computer syst ...

  6. 全国计算机软考试题及答案,全国计算机软考网管语试题及答案.doc

    全国计算机软考网管语试题及答案 全国计算机软考网管英语试题及答案(1) Heterogeneous network environments consist of computer systems f ...

  7. 在手机上如何模拟计算机考试,2018年计算机一级考试精选模拟题库/手机版:计算机基础及MS Office应用...

    &nbsp&nbsp[导读]: 2018年计算机一级考试精选模拟题库/手机版:计算机基础及MS Office应用,更多全国计算机等级考试模拟试题.复习教材和培训网课,请访问易考吧计算机 ...

  8. 涉密计算机及网络保密管理制度,威海市国家保密局 保密制度 计算机及网络保密管理制度...

    (一)涉密计算机及网络保密管理制度 1.涉密计算机是指存储.处理涉及国家秘密信息的计算机,包括涉密台式机和涉密笔记本电脑.涉密网络是指由计算机及其相关配套设备.设施构成的,按照一定的应用目标和规则存储 ...

  9. java-net-php-python-java雅思教育培训信息管理系统计算机毕业设计程序

    java-net-php-python-java雅思教育培训信息管理系统计算机毕业设计程序 java-net-php-python-java雅思教育培训信息管理系统计算机毕业设计程序 本源码技术栈: ...

最新文章

  1. 在耗时操作结束之前 销毁tableView 如何让tableViewCell 销毁
  2. [转]WinXP、Win7脚本自动加域及用户资料迁移
  3. improvement不可数
  4. 数码管时钟程序C语言00到99,[单片机]ACT89C51数码管时钟程序
  5. java如何忽略过程值_如果值为null,如何告诉Jackson在序列化期间忽略某个字段?...
  6. 动态规划——最长公共子序列(洛谷P1439)
  7. python——item()返回可遍历的(键,值)元组数据
  8. Layer:layui.util.timeAgo 使用
  9. 渐进记号 Asymptotic Notations-------geeksforgeeks 翻译
  10. Android仿微信新消息提示音
  11. 根据路由器MAC地址查详细地址(WIFI定位)免费接口
  12. 让前端走进微时代, 微微一弄很哇塞!
  13. PXE网络启动 windows PE (使用微软官方工具)
  14. 将win7电脑无线网变身WiFi热点,让手机、笔记本共享上网
  15. Extracting Multiple-Relations in One-Pass with Pre-Trained Transformers [论文研读]
  16. 吴裕雄 18-MySQL GROUP BY 语句
  17. FCKEDITOR编辑器的使用
  18. 【区域赛总结】2015ACM-ICPC北京区域赛
  19. 美国计算机教育方向相关的论文题目,浅谈美国大学计算机教育论文
  20. 计蒜客-19 幼儿园买玩具

热门文章

  1. vue使用echart绘制全国地图,叠加图表
  2. MATLAB遇到NaN
  3. 佳能Canon PIXMA MG4160 打印机驱动
  4. ck6.8整合php,WordPress整合ckplayer X和ckplayer 6.8的最新完美代码
  5. 计算机网络学习笔记(一)——什么是Internet
  6. Redis缓存接入监控、运维平台CacheCloud
  7. 人脸识别数据集-Glint360K
  8. 浏览器获取MAC地址
  9. 前端——html——html图像
  10. php获取网站截图,异步获取评论者网站截图