首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
一般工业技术   1篇
冶金工业   1篇
自动化技术   5篇
  2022年   1篇
  2021年   1篇
  2019年   1篇
  2018年   1篇
  2016年   1篇
  1998年   1篇
  1986年   1篇
排序方式: 共有7条查询结果,搜索用时 31 毫秒
1
1.
In the digital era, patient-specific 3D models (3D-PSMs) are becoming increasingly relevant in computer-assisted diagnosis, surgery training on digital models, or implant design. While advanced imaging and reconstruction techniques can create accurate and detailed 3D models of patients’ anatomy, software tools that are able to fully exploit the potential of 3D-PSMs are still far from being satisfactory. In particular, there is still a lack of integrated approaches for extracting, coding, sharing and retrieving medically relevant information from 3D-PSMs and use it concretely as a support to diagnosis and treatment. In this article, we propose the SemAnatomy3D framework, which demonstrates how the ontology-driven annotation of 3D-PSMs and of their anatomically relevant features (parts of relevance) can assist clinicians to document more effectively pathologies and their evolution. We exemplify the idea in the context of the diagnosis of rheumatoid arthritis of the hand district, and show how feature extraction tools and semantic 3D annotation can provide a rich characterization of anatomical landmarks (e.g., articular facets, prominent features, ligament attachments) and pathological markers (erosions, bone loss). The core contributions are an ontology-driven part-based annotation method for the 3D-PSMs and a novel automatic localization of erosion and quantification of the OMERACT RAMRIS erosion score. Finally, our results have been compared against a medical ground truth.  相似文献   
2.
Multimedia Tools and Applications - Data hiding is a noteworthy research topic in digital technology for years. Reversible data hiding (RDH) technique plays a vital role for confirming security of...  相似文献   
3.
Multimedia Tools and Applications - Steganography is the growing field of research, where hiding techniques are used to secure the communicative elements (e.g., images). In this paper, the message...  相似文献   
4.
Science and technology devices pose new and vibrant solutions to the day to day problems faced by the Information Technology user society, data security issues are on the rise as well. Now-a-days security concerns are directly proportional with the steep hike in amount of data handled. The greatest threat comes from individuals who try to access information stored in servers or the cloud or any other location without authorised permission. Visual Cryptography is one of such schemes that involves securing ones information and so is Audio Cryptography. We hardly find any approach that takes into consideration both audio and image files. In our paper we present an algorithm that preserves multiple audio and image files of equal length which in turn can be extended to audio-video clips, naming it Audio-Visual Cryptography. These audio-video clips are broken into equal number of dependant share clips using Folded Back Audio-Visual Cryptography Scheme (FBAVCS) such that the decryption process includes basic logical operations between the corresponding pixels and samples, in case of image and audio respectively, of the successive shares.  相似文献   
5.
Multimedia Tools and Applications - Data hiding is an important research topic over the years. The PVD based techniques embed secret data into the cover image on the difference between the two...  相似文献   
6.
7.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号