Recent studies have suggested that the boundary between data-driven deep-learning non-Cartesian magnetic resonance imaging (MRI) reconstruction methods and conventional optimization-based, iterative reconstruction met...
详细信息
ISBN:
(纸本)9781665489041
Recent studies have suggested that the boundary between data-driven deep-learning non-Cartesian magnetic resonance imaging (MRI) reconstruction methods and conventional optimization-based, iterative reconstruction methods is becoming blurred. For instance, the unrolled iterative reconstruction method can be regarded as a trainable neural network. Another example is that the Moore-Penrose pseudoinverse plays a central role in finding the predefined solution to many imaging processes. However, the application of pseudoinverse in MRI reconstruction was obstructed in clinical imaging, mostly due to the excessive storage required for singular vectors. Since the spatial encoding of MRI is fully determined by the known k-space trajectory, the generalized inverse can be ”iteratively learning in a data-free fashion”, which leads to surprising but realizable properties. To compare our method with other conventional methods, numerical simulations were performed using in vivo MRI. The proposed method leads to nearly equivalent image quality with a much shorter run-time (only 0.68%) than the conjugate gradient (CG) method. We discuss the potential impact of the generalized inverse as a feasible reconstruction method for non-Cartesian MRI.
Surface registration, the task of aligning several multidimensional point sets, is a necessary task in many scientific fields. In this work, a novel statistical approach is developed to solve the problem of nonrigid r...
详细信息
Weibull distribution has received a wide range of applications in engineering and science. The utility and usefulness of an estimator is highly subject to the field of practitioner's study. In practice users looki...
详细信息
The first step in converting a plaintext to ciphertext by the famous Advanced Encryption Standard (AES), which is called Rijndael ByteSub Transformation, involves some operations: computing a multiplicative inverse, m...
详细信息
The first step in converting a plaintext to ciphertext by the famous Advanced Encryption Standard (AES), which is called Rijndael ByteSub Transformation, involves some operations: computing a multiplicative inverse, multiplying this multiplicative inverse by a specific matrix, and adding the result to a specific vector. The purpose of this research is to simplify these operations. This paper gives elegant techniques and presents the matrices multiplication as simple XOR operations, and the result is a simple, straightforward way finding the transformation.
We examine the kinetics of surface diffusion-controlled, solid-state dewetting by consideration of the retraction of the contact in a semi-infinite solid thin film on a flat rigid substrate. The analysis is performed ...
详细信息
The substitution table (S-Box) of Advanced Encryption Standard (AES) and its properties are key elements in cryptanalysis ciphering. We aim here to propose a straightforward method for the non-linear transformation of...
详细信息
The substitution table (S-Box) of Advanced Encryption Standard (AES) and its properties are key elements in cryptanalysis ciphering. We aim here to propose a straightforward method for the non-linear transformation of AES S-Box construction. The method reduces the steps needed to compute the multiplicative inverse, and computes the matrices multiplication used in this transformation, without a need to use the characteristic matrix, and the result is a modern method constructing the S-Box.
Motivated by the mushy zones of sea ice, volcanoes, and icy moons of the outer solar system, we perform a theoretical and numerical study of boundary-layer convection along a vertical heated wall in a bounded ideal mu...
详细信息
Solving Lur'e equations plays a critical role in addressing linear-quadratic optimal control (LQOC) problems, especially in cases where the control cost matrices are singular. This paper introduces, for the first ...
Solving Lur'e equations plays a critical role in addressing linear-quadratic optimal control (LQOC) problems, especially in cases where the control cost matrices are singular. This paper introduces, for the first time, two novel zeroing neural network (ZNN) models—ZNNLE and ZNNLE-LQOC—specifically designed to solve the Lur'e equation system and the LQOC problem, respectively. The proposed models extend the applicability of the ZNN methodology to these challenging scenarios by offering robust and efficient solutions to time-varying matrix equations. Theoretical analyses confirm the validity of both models, while numerical simulations and practical applications demonstrate their effectiveness. Moreover, a comparative study with an enhanced alternating-direction implicit (ADI) method highlights the superior performance of the ZNNLE-LQOC model in solving LQOC problems.
The supply of defect-free, high-quality items is a critical factor to calculate for the long-term competitiveness of industries. Quality control is important in factories to form the item defect-free as well as to mee...
The supply of defect-free, high-quality items is a critical factor to calculate for the long-term competitiveness of industries. Quality control is important in factories to form the item defect-free as well as to meet the needs of customers. With later advancements in deep learning and computer vision advances, it has ended up identifying different flaws from the images with near-human exactness. By introducing an insightful assembling framework, defects can be limited, and human expenses can be brought down to empower feasible development. The smart production line employs production equipment, functional testing equipment, and defect detection equipment. This paper is presented with a flaw identification system for application in smart factories based on deep learning. Training with deep learning method, EfficientDet to naturally identify deformity from ultrasonic pictures. The test results show that it was able to classify flawed items rapidly with high precision in a real-world manufacturing environment. The proposed model during 5-fold cross-validation accomplished 96% of mean accuracy was a noteworthy advancement compared to a few comparative strategies that were already utilized for this task. EfficientDet detected all the flaws present in the material during assessment and performance analysis showed it was comparatively good in detecting flaws.
How might one test the hypothesis that networks were sampled from the same distribution? Here, we compare two statistical tests that use subgraph counts to address this question. The first uses the empirical subgraph ...
暂无评论