搜索结果: 1-15 共查到“Ideal”相关记录208条 . 查询时间(0.125 秒)
MR IDEAL-IQ序列评估肝功能分级的可行性研究
肝脏 肝功能 磁共振成像
2020/10/15
探讨1.5T MR定量非对称回波的最小二乘估算法迭代水脂分离(IDEAL-IQ)序列评估肝功能分级的可行性。 方法 回顾性分析2016年2月至2017年12月行1.5T MR IDEAL-IQ序列扫描,且临床诊断为肝硬化患者。依据肝功能Child-Pugh分级标准分为A、B、C 3级。最终入组:肝功能A级30例,肝功能B级25例,肝功能C级16例。由2名观察者分别在GE AW4.6工作站通过脂肪分...
探讨急性胰腺炎(AP)状态下脾脏组织内铁沉积、脂肪及水含量变化。 方法 44例AP患者和21例健康受检者分别作为实验组和对照组,进行MR上腹部常规扫描,并采用IDEAL-IQ序列扫描,在后处理工作站多点测量脾脏弛豫率图(R2*)、水像图(Water)、脂像图(Fat)及脂肪分数图(FF)值并行统计学分析。
肝脏铁过载的MRI特征及其IDEAL-IQ定量评估的可行性
铁过载 肝脏 血色病 磁共振成像
2020/10/14
探讨继发性血色病导致肝脏铁过载的MRI特征以及迭代最小二乘法非对称采集水脂分离评估-定量铁测量(IDEAL-IQ)定量评估肝脏铁过载的可行性。 方法 选取20例继发性血色病肝脏铁过载的患者(实验组)和20例健康成人(对照组),行常规MRI及IDEAL-IQ扫描。对比分析实验组肝脏铁过载的MRI特征。在IDEAL-IQ扫描得到的R2*映像图上分别测量2组肝脏的R2*值,比较2组的年龄、性别以及R2*...
MR IDEAL技术在椎体压缩性骨折病因分析中的价值
信号比值 椎体压缩性骨折 非对称回波三点法水脂分离技术 磁共振成像
2020/10/15
探讨MR非对称回波三点法水脂分离技术(IDEAL)在良恶性椎体压缩性骨折中的鉴别价值。 方法 利用GE 1.5T超导MR扫描仪(GE Brivo 355 MR System)对48例椎体压缩性骨折患者的85个椎体进行常规MR扫描和IDEAL扫描,其中良性骨折25例,42个椎体(包括单纯外伤8例,骨质疏松16例,结核1例),恶性骨折23例,43个椎体(包括转移性肿瘤22例,骨髓瘤1例)。测量并计算2...
2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares
secret sharing ideal secret sharing 2-threshold secret sharing
2019/5/31
In a secret sharing scheme, a secret value is encrypted into several shares, which are distributed among corresponding participants. It requires that only predefined subsets of participants can recons...
探讨MRI定量非对称回波最小二乘估算法迭代水脂分离(IDEAL IQ)技术在宫颈癌放化疗过程中骨髓抑制诊断中的应用。 方法 对25例确诊为宫颈癌并接受根治性放化疗的患者行矢状位MRI IDEAL IQ 扫描,所有入组患者放疗前及放疗过程中每周均行1次MRI检查,直至放疗结束,每例患者共行6次扫描。分别在L4、L5、S1椎体和皮下脂肪组织进行脂肪分数(FF)测量,并在AW4.6工作站上进行IDEAL...
探讨定量非对称回波的最小二乘估算法迭代水脂分离序列(IDEAL-IQ)精准定量评价腰椎椎体脂肪含量(FF)的临床价值。 方法 根据骨密度(BMD)结果,将60例符合研究标准的体检者/患者,分为正常骨量组(A组,n=17)、低骨量组(B组,n=18)、骨质疏松(OP)组(C组,n=25),分析年龄差别;分别扫描腰椎矢状位T1WI、T2WI及IDEAL-IQ序列扫描,在FatFrac图上勾画长方形RO...
On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm
Quantum Cryptanalysis Cyclotomic Ideal Lattices
2019/3/4
The hardness of finding short vectors in ideals of cyclotomic number fields (hereafter, Ideal-SVP) can serve as a worst-case assumption for numerous efficient cryptosystems, via the average-case probl...
SCAN-TO-BIM vs 3D IDEAL MODEL HBIM: PARAMETRIC TOOLS TO STUDY DOMES GEOMETRY
Procedural Modeling HBIM Domes Parametric tools
2019/3/1
The contribution is part of an interdisciplinary research that aims to address the problems of knowledge, interpretation and documentation of vulnerable structures such as the brick Renaissance domes ...
Approx-SVP in Ideal Lattices with Pre-processing
heuristic assumptions pre-processing phase outputs
2019/2/28
We describe an algorithm to solve the approximate Shortest Vector Problem for lattices corresponding to ideals of the ring of integers of an arbitrary number field KK. This algorithm has a pre-process...
INTEGRATION OF SURVEYING TECHNIQUES TO DETECT THE IDEAL SHAPE OF A DOME: THE CASE OF THE ESCUELAS PíAS CHURCH IN VALENCIA
Laser scanner Cultural heritage Thermal camera 3D modelling
2019/2/28
The three-dimensional (3D) documentation and surveying of cultural heritage can be carried out following several geomatics techniques such as laser scanning and thermography in order to detect the ori...
A Public Key Exchange Cryptosystem Based on Ideal Secrecy
one way function ideal secrecy asymmetric key cryptography
2018/11/29
This paper proposes two closely related asymmetric key (or a public key) schemes for key exchange whose security is based on the notion of ideal secrecy. In the first scheme, the private key consists ...
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Threshold Secret Sharing Chinese Remainder Theorem Polynomial Ring
2018/11/16
Since (t,n)(t,n)-threshold secret sharing (SS) was initially proposed by Shamir and Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and Bloom presented a (t,n)(t,...
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures
cryptographic protocols secret sharing
2018/11/8
Multilevel and compartmented access structures are two important classes of access structures where participants are grouped into levels/compartments with different degrees of trust and privileges. Th...
Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols
Public Key Cryptography Post-quantum Cryptography Lattice-based Cryptography
2018/6/25
Post Quantum Lattice-Based Cryptography (LBC) schemes are increasingly gaining attention in traditional and emerging security problems, such as encryption, digital signature, key exchange, homomorphic...