2020
DOI: 10.1016/j.heliyon.2020.e03279
|View full text |Cite
|
Sign up to set email alerts
|

Estimation of optimized timely system matrix with improved image quality in iterative reconstruction algorithm: A simulation study

Abstract: The system matrix (SM) being a main part of statistical image reconstruction algorithms establishes relationship between the object and projection space. The aim was to determine it in a short duration time, towards obtaining the best quality of contrast images. In this study, a new analytical method based on Cavalieri's principle as subdividing common regions has been proposed in which the precision of the amounts of estimated areas was improved by increasing the number of divisions (NOD), and consequently th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…In order to enhance the ability to resist some common attacks, DRPE has been applied in various domains, including Gyrator domain [ [5] , [6] , [7] ], Fresnel domain [ 8 , 9 ], fractional Fourier domain [ [10] , [11] , [12] ], and so on. Furthermore, various methods based on different kinds of optical theories and technologies, such as fractional Mellin transform [ 13 ], interference [ 14 , 15 ], transport of intensity equation [ 16 ], hologram [ 17 , 18 ], data container [ 19 ], iterative algorithm [ 20 , 21 ], photon-counting [ 22 ], monocular depth rendering [ 23 ], holography [ 24 ], image denoising [ 25 ], single-pixel imaging [ 26 ], and binary tree-sliced pattern [ 27 ], have been reported in recent years. Because a lot of optical parameters are used as secret keys, these methods has high security.…”
Section: Introductionmentioning
confidence: 99%
“…In order to enhance the ability to resist some common attacks, DRPE has been applied in various domains, including Gyrator domain [ [5] , [6] , [7] ], Fresnel domain [ 8 , 9 ], fractional Fourier domain [ [10] , [11] , [12] ], and so on. Furthermore, various methods based on different kinds of optical theories and technologies, such as fractional Mellin transform [ 13 ], interference [ 14 , 15 ], transport of intensity equation [ 16 ], hologram [ 17 , 18 ], data container [ 19 ], iterative algorithm [ 20 , 21 ], photon-counting [ 22 ], monocular depth rendering [ 23 ], holography [ 24 ], image denoising [ 25 ], single-pixel imaging [ 26 ], and binary tree-sliced pattern [ 27 ], have been reported in recent years. Because a lot of optical parameters are used as secret keys, these methods has high security.…”
Section: Introductionmentioning
confidence: 99%