A Penalized-Likelihood Image Reconstruction Algorithm for Positron Emission Tomography Exploiting Root Image Size
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 4
Abstract
Iterative image reconstruction methods are considered better as compared to the analytical reconstruction methods in terms of their noise characteristics and quantification ability. Penalized-Likelihood Expectation Maximization (PLEM) image reconstruction methods are able to incorporate prior information about the object being imaged and have flexibility to include various prior functions which are based on different image descriptions. Median Root Priors intrinsically take into account the salient image features, such as edges, which becomes smooth owing to quadratic priors. Generally, a 3*3 pixels neighborhood support or root image size is used to evaluate the median. We evaluate different root image sizes to observe their effect on the final reconstructed image. Our results show that at higher parameter values, root image size has pronounced effect on different image quality parameters evaluated such as reconstructed image bias as compared to the phantom image, contrast and resolution in the reconstructed object. Our results show that for the small-sized objects, small root image is better whereas for objects of diameter more than two to three times of the resolution of the reconstructed object, larger root image size is preferable in terms of reconstruction speed and image quality.
Authors and Affiliations
Munir Ahmad, H. M. Tanveer, Z. A. Shaikh, Furkh Zeshan, Usman Sharif Bajwa
School Manager System based on a Personal Information Architecture
The current technological revolution has provided multiple benefits to human activities. For their part, organizations have had the need to make changes to their business requirements, which have led them to migrate to s...
Time-Saving Approach for Optimal Mining of Association Rules
Data mining is the process of analyzing data so as to get useful information to be exploited by users. Association rules is one of data mining techniques used to detect different correlations and to reveal relationships...
Defending Polymorphic Worms in Computer Network using Honeypot
Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts pol...
MULTITHREADING IMAGE PROCESSING IN SINGLE-CORE AND MULTI-CORE CPU USING JAVA
Multithreading has been shown to be a powerful approach for boosting a system performance. One of the good examples of applications that benefits from multithreading is image processing. Image processing requires many re...
RSSI and Public Key Infrastructure based Secure Communication in Autonomous Vehicular Networks
Autonomous Vehicular Ad hoc Networks (A-VANET) is also known as intelligent transportation systems. A-VANET ensures timely and accurate communications between vehicle to vehicle and Vehicle to Roadside Unit (RSU) to impr...