In order to solve the problem of image degradation caused by dust environments, an image degradation model considering multiple scattering factors caused by dust was first established using the first-order multiple sc...
详细信息
In X-ray CT, Beam hardening (BH) effect, which is caused by polychromatic X-ray beam and energy-dependent attenuation coefficients, always introduces cupping and streak artifacts. Most of correction methods can only d...
详细信息
In X-ray CT, Beam hardening (BH) effect, which is caused by polychromatic X-ray beam and energy-dependent attenuation coefficients, always introduces cupping and streak artifacts. Most of correction methods can only deal with beam hardening artifacts for a single material or dual-material object, but fail to correct in case of a multi-material object since the correction complexity and instability increase with the increase of the kinds of materials. In this paper, we proposed a multimaterial BH correction method. A binary Legendre polynomial is adopted to correct BH based on bi-parameter imaging physical model, and the Helgasson-Ludwig consistency condition (H-L consistency condition) is introduced to optimally determine the bi-parameters of all materials. In the simulation experiments showed that the proposed method can suppress the artifacts greatly. The corrected values approach very closely to the ideal ones.
This paper investigates the effect of fiducials configuration on target registration error (TRE) and test the accuracy of theoretical model of TRE prediction in image-guided cranio-maxillofacial surgery. The skull spe...
详细信息
This paper investigates the effect of fiducials configuration on target registration error (TRE) and test the accuracy of theoretical model of TRE prediction in image-guided cranio-maxillofacial surgery. The skull specimen is prepared with 20 titanium microscrews placed at defined locations and scanned with a 64-slice spiral computed tomography unit. These markers are separated to registration fiducial group and target fiducial group. An optical tracking system is used to perform skull-to-image registration procedures. Subsequent to each registration, the TRE is calculated by the navigation system. Each configuration have been performed registration 50 times and the average is regarded as TRE of the configuration. The TRE prediction is also calculated for each configuration. The TRE ranges from 0.58mm to 3.88mm, relatively smaller values of TRE may be achieved by placing a majority of fiducials on the maxillary alveolus in proximity about the target and placing a small number on the cranium contralaterally. The TRE values are always larger than the corresponding TRE prediction but there is high correlation between them. The configuration of fiducials is an important factor in minimizing TRE and the TRE prediction is a good guidance for fiducial markers placement.
Reconstruction algorithm based on total variation (TV) minimization has become a hot topic in CT field. In order to make a better balance between suppressing noise and preserving edge, an improved variation is propose...
详细信息
Reconstruction algorithm based on total variation (TV) minimization has become a hot topic in CT field. In order to make a better balance between suppressing noise and preserving edge, an improved variation is proposed in this paper. An anisotropic strategy is developed to effectively preserve the edges of imaging objects. Simultaneously, the unity weight in the original variation is substituted by an amplitude dependent weight to suppress the smaller variations, which arise from noise effect with a higher possibility. Numerical simulations validated that the CT reconstruction based on the improved variation has a better reconstruction performance as compared to its original counterpart.
We propose to estimate human gender from corresponding fingerprint and face information with the Bayesian hierarchical model. Different from previous works on fingerprint based gender estimation with specially designe...
详细信息
ISBN:
(纸本)9781424442959
We propose to estimate human gender from corresponding fingerprint and face information with the Bayesian hierarchical model. Different from previous works on fingerprint based gender estimation with specially designed features, our method extends to use general local image features. Furthermore, a novel word representation called latent word is designed to work with the Bayesian hierarchical model. The feature representation is embedded to our multimodality model, within which the information from fingerprint and face is fused at the decision level for gender estimation. Experiments on our internal database show the promising performance.
This paper presents a new approach for visualizing the surfaces from 3D ultrasound data. 3D ultrasound data usually contain substantial quantity of speckle noise, which makes the extraction of smooth and continuous su...
详细信息
This paper presents a new approach for visualizing the surfaces from 3D ultrasound data. 3D ultrasound data usually contain substantial quantity of speckle noise, which makes the extraction of smooth and continuous surfaces extremely difficult. In this paper, combining the partial differential equation model of anisotropic diffusion filter with the Lee filter, we present a new algorithm for handling 3D ultrasound data, aiming to suppress the speckle noise, and meanwhile, smooth the ultrasound image. Additionally, the marching cubes algorithm is applied to extract a smooth endocardial surface. Comparing experiments are presented to illustrate the effectiveness of our approach.
In this paper, a multiple fault diagnosis method based on case-based reasoning (CBR) is presented. And the characteristics of multiple fault modes are studied, then the case knowledge library is established for multip...
详细信息
In this paper, a multiple fault diagnosis method based on case-based reasoning (CBR) is presented. And the characteristics of multiple fault modes are studied, then the case knowledge library is established for multiple faults, finally a twostep case retrieval strategy is proposed. The candidate case generation method based on the membership weights is employed to initially retrieve, which can reduce the number of candidate cases efficiently. Then, through calculating the case similarity using the grey relational analysis, the most probable fault case is obtained. It can avoids the problem of time-consuming computation resulting from the combination explosion of multiple faults. Finally, an example is applied to illustrate the proposed scheme, the results mean that the above method is effective, and it can be adopted in the actual industrial production.
In tooth implantation surgery, dentist or surgeon needs to derive quantitative information about the place each implant should be go, the length and width of each implant should be, as well as the angle each implant s...
详细信息
ISBN:
(纸本)9781424480111
In tooth implantation surgery, dentist or surgeon needs to derive quantitative information about the place each implant should be go, the length and width of each implant should be, as well as the angle each implant should be inserted, based on the 3D CT image of jaw of a patient. In existing techniques, the information is measured from such slices that are generated from virtually cutting teeth-ridge along the direction perpendicular to teeth-ridge. However, according to the clinical experience and anatomical knowledge, usually the largest length of each implant should be measured on such slice that is generated by cutting teeth-ridge along the tooth root direction. Besides, for each defect tooth, the most suitable angle or orientation to insert an implant is the tooth root orientation. Thus, in surgical planning of dental implant, it is much important to compute or estimate tooth root orientation from 3D CT image of jaw. To our knowledge, this problem is seldom studied in existing literature. In this paper, we try to discuss this problem.
A method of printing and certificate forgery based on digital watermarking is presented. This method embeds watermark in the DFT domain using the principles that middle and low frequency coefficients have little chang...
详细信息
A method of printing and certificate forgery based on digital watermarking is presented. This method embeds watermark in the DFT domain using the principles that middle and low frequency coefficients have little changes in print-scan process, and using HOUGH transform for image correction to resist rotation attacks when extracting watermarks. The experimental results show that this method has strong robustness to first print-scan images, which can be detected right watermarks, while for the second print-scan images robustness drops about 20%. Therefore the algorithm can be used to identify the authenticity of printing and certificates by the correction of the watermarks and can be used to all types of copyright protection and certificates security.
In the data grid environment, when users access to files, how to select the best site to obtain files from multiple replicas and reach the highest QOS(quality of service) in the cost of same price is a problem that ne...
详细信息
暂无评论