Segmentation of the Ventricle Membranes in Short-Axis Sequences by Optical Flow Base on DLSRE Model

来源 :Chinese Journal of Electronics | 被引量 : 1次 | 上传用户:daniel86999
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Recent studies have pointed out that the boundary of the extracted ventricle membranes is unsmooth, and the segmentation of the cardiac papillary muscle and trabecular muscle do inconformity the clinical requirements. To address these issues, this pape
其他文献
Automated human facial image deidentification is a much-needed technology for privacypreserving social media and intelligent surveillance applications. We propose a novel utility preserved facial imag
Service-based architecture (SBA) is a profound advancement in the novel 5G Core network (5GC). Existing studies show that SBA can benefit from cloud computing t
Network on a chip (NoC) uses packet-switched network to implement interconnections in System on chip (SoC). In SoC design, performance and energy efficiency are
Inspired by the self-similar fractal proper-ties of chaotic attractors and the heuristics of similarity filtering of images, a novel chaotic signal denoising al
In order to reduce the volume, weight and cost of conventional hybrid energy storage system (HESS) while properly exploring the complementary features of differ
Automatic identification of intracranial electroencephalogram (iEEG) signals has become more and more important in the field of medical diagnostics. In this pap
Electric drive system with Insulated gate bipolar transistor (IGBT) power device is widely used in Electric vehicle (EV), which consists of inverter, cables and
Power analysis methods are commonly used for evaluating the security of cryptographic devices. They are characteristically low-cost and display a high success r
This paper presents a Very large scale integration (VLSI) design method for Three-dimensional (3D) depth perception chip based on infrared coding structure ligh
In this paper, we try to give a security evaluation of LIZARD stream cipher in regard to fault attacks, which, to the best of our knowledge, is the first fault