Search results for "Image processing"
showing 10 items of 3285 documents
Endo-neuro-sonography: principles and 3-D technique
1997
To evaluate the usefulness of transendoscopic sonography we studied two new sono probes 6 F in diameter in 17 fresh specimens. We saw precise imaging of well-known anatomical structures and also gained an additional dimension in endoscopy, as the sono adds to the endo-view a transverse scan like a mini-CT at the tip of the probe. We also experienced the navigation characteristic of this imaging technique, both in real time and on line. Some 3-D reconstructions of the ventricular system were examined. The equipment has been used in clinical practice and must now be adapted for neurosurgery.
Virtual reality treatment of claustrophobia: a case report.
1998
The efficacy of a treatment for claustrophobia using only Virtual Reality (VR) exposure was examined. The subject was a 43-year-old female who suffered from clinically significant distress and impairment and sought psychological therapy. Eight individual VR graded exposure sessions were conducted. All self-report measures were reduced following VR exposure and were maintained at one month follow-up. The necessity of a theoretical framework for this new medium for exposure therapy is discussed.
A New Systematic Classification of Peripheral Anatomy of the Right Hepatic Duct: Experience From Adult Live Liver Donor Transplantation
2008
Abstract Objective The peripheral intrahepatic biliary anatomy, especially at the sectorial level on the right side, has not been adequately described. The purpose of our study was to systematically describe this complex anatomy in clinically applicable fashion. Patients and Methods We analyzed three-dimensional computed tomography (CT) imaging reconstructions of 139 potential living liver donors evaluated at our institution between January 2003 and June 2007. Results Eighty-nine (64%) donors had a normal right bile duct sectorial anatomy. In the other 50/139 (36%) cases, we observed abnormal sectorial branching patterns, with 45/50 abnormalities as trifurcations, whereas the remaining ones…
The use of computer-assisted video image analysis for the quantification of CD8+ T lymphocytes producing tumor necrosis factor alpha spots in respons…
1997
Enzyme-linked immunospot (ELISPOT) analysis is a sensitive technique for the detection and quantification of single T lymphocytes forming cytokine spots after antigen contact in vitro. Herein computer-assisted video image analysis (CVIA) was applied to automatically determine the number and size of tumor necrosis factor alpha (TNF-alpha) spots formed by single blood-derived CD8+ T cells after contact with peptide-loaded target cells. With CVIA and TNF-alpha ELISPOT analysis we quantified CD8+ T cells responsive to HLA-A2.1-binding tyrosinase and influenza matrix peptides in healthy donors. We followed the course of the virus-specific T cell response in two HLA-A2-positive patients with reac…
Multicenter validation of the magnetic resonance t2* technique for segmental and global quantification of myocardial iron
2009
Purpose To assess the transferability of the magnetic resonance imaging (MRI) multislice multiecho T2* technique for global and segmental measurement of iron overload in thalassemia patients. Materials and Methods Multiecho T2* sequences were installed on six MRI scanners. Five healthy subjects (n = 30) were scanned at each site; five thalassemia major (TM) patients were scanned at the reference site and were rescanned locally (n = 25) within 1 month. T2* images were analyzed using previously validated software. Results T2* values of healthy subjects showed intersite homogeneity. On TM patients, for global heart T2* values the correlation coefficient was 0.97, coefficients of variation (CoV…
Quantifying stenosis in renal arteriograms: a fuzzy syntactic analysis.
1999
AbstractThe introduction of fuzzy logic improves a system for the automatic quantification of renal artery lesions seen in digital subtraction angiograms. A two-step approach has been followed. An earlier system based on non-fuzzy syntactic analysis provided a clear symbolic description of the stenotic lesions. Although this system worked correctly, it did not take into account the variability and uncertainty inherent to image processing and to knowledge on the reference diameter. This system has been improved by the introduction of fuzzy logic in the representation of the reference diameter. It provides a description of the stenosis in terms of fuzzy quantities. To illustrate the benefits …
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
An Agent-Based Model of Extortion Racketeering
2016
Mafias can be considered as criminal organisations that are in the business of producing, promoting, and selling protection. Here, we describe the Palermo Scenario, an agent-based model of protection rackets aimed to deepen our understanding of protection rackets, and help policymakers to evaluate methods for destabilising them. Additionally, since the system is explicitly specified, we can use it to investigate the entire causal pathway from cause to effect: not only from actions to Mafia destabilisation, but also the intermediate actions along the path and actors' internal mental representations among the population.
Caractérisation quantitative de la pulvérisation de pesticides par imagerie
2015
In recent years, advances in plant protection have contributed considerably to increasing crop yields in a sustainable way. Easy to apply and rather inexpensive, pesticides have proven to be very efficient. However, when pesticides are applied to crops some of the spray may not reach the target, but move outside the intended spray area. This can cause serious economic and environmental problems. Most of the pesticides are applied using agricultural sprayers. These sprayers use hydraulic nozzles which break the liquid into droplets with a wide range of droplet sizes and velocities and determine the spray pattern. Small droplets are prone to wind drift, while large droplets can runoff from th…