Automatic Generation of Noise-Free Time-Activity Curve With Gated Blood-Pool Emission Tomography Using Deformation of a Reference Curve
نویسندگان
چکیده
منابع مشابه
Direct manipulation of free-form deformation using curve-pairs
Curve-pair based deformation is an extension of axial deformation for providing more intuitive and convenient control of object deformation. In this paper, we investigate the problem of direct manipulation of curve-pair based deformation with geometric constraints. With different objective functions, two kinds of constrained optimization problems are derived from the direct manipulation problem...
متن کامل"W-shaped" volume curve with gated myocardial perfusion single photon emission computed tomography.
OBJECTIVES Gating errors (GEs) with ECG gated myocardial SPECT (G-SPECT) may occur irrespective of the presence or absence of arrhythmias. We evaluated the impact of GEs on both reconstructed tomograms and left ventricular ejection fraction (LVEF) derived from G-SPECT, and searched for clues to identify these errors. METHODS We studied 2 GE patients, 10 normal subjects (NLs), and 10 atrial fi...
متن کاملdetection of volatile compounds of medicinal plants with some nano-sorbents using modified or new methodologies and investigation of antioxidant activity of their methanolic extracts
in this work, a novel and fast method for direct analysis of volatile compounds (davc) of medicinal plants has been developed by holding a filament from different parts of a plant in the gc injection port. the extraction and analysis of volatile components of a small amount of plant were carried out in one-step without any sample preparation. after optimization of temperature, extraction time a...
Time Deformation and the Yield Curve
This paper considers how trading activity at one maturity of the yield curve a¤ects and is a¤ected by trading at other maturities. We approach the modelling of bond prices from a stochastic volatility perspective based on time deformation. We put forward a new, continuous time, multivariate time deformation model which is coherent with the market microstructure theory of price discovery and cap...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Medical Imaging
سال: 2004
ISSN: 0278-0062
DOI: 10.1109/tmi.2004.825638