52,145 research outputs found
Recommended from our members
Coil combination using linear deconvolution in k-space for phase imaging
Background: The combination of multi-channel data is a critical step for the imaging of phase and susceptibility contrast in magnetic resonance imaging (MRI). Magnitude-weighted phase combination methods often produce noise and aliasing artifacts in the magnitude images at accelerated imaging sceneries. To address this issue, an optimal coil combination method through deconvolution in k-space is proposed in this paper.
Methods: The proposed method firstly employs the sum-of-squares and phase aligning method to yield a complex reference coil image which is then used to calculate the coil sensitivity and its Fourier transform. Then, the coil k-space combining weights is computed, taking into account the truncated frequency data of coil sensitivity and the acquired k-space data. Finally, combining the coil k-space data with the acquired weights generates the k-space data of proton distribution, with which both phase and magnitude information can be obtained straightforwardly. Both phantom and in vivo imaging experiments were conducted to evaluate the performance of the proposed method.
Results: Compared with magnitude-weighted method and MCPC-C, the proposed method can alleviate the phase cancellation in coil combination, resulting in a less wrapped phase.
Conclusions: The proposed method provides an effective and efficient approach to combine multiple coil image in parallel MRI reconstruction, and has potential to benefit routine clinical practice in the future
Hawking Radiation of an Arbitrarily Accelerating Kinnersley Black Hole: Spin-Acceleration Coupling Effect
The Hawking radiation of Weyl neutrinos in an arbitrarily accelerating
Kinnersley black hole is investigated by using a method of the generalized
tortoise coordinate transformation. Both the location and temperature of the
event horizon depend on the time and on the angles. They coincide with previous
results, but the thermal radiation spectrum of massless spinor particles
displays a kind of spin-acceleration coupling effect.Comment: 8 pages, no figure, revtex 4.0, revisted version with typesetting
errors and misprint correcte
Recommended from our members
Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories
In this paper, we present an efficient fault tolerant solution for multi-level per cell (MLC) flash memory that concatenates trellis coded modulation (TCM) with an outer low-density parity-check (LDPC) code. Traditional flash coding systems employ simple hard-decisions based codes, such as Bose-Chaudhuri-Hocquenghem (BCH) codes, that can correct a fixed, specified number of errors. Thanks to the Bahl, Cocke, Jelinek, and Raviv (BCJR) algorithm, the TCM decoder within the proposed design can provide soft decisions which make it possible to use the more powerful LDPC codes. Moreover, the error-correction performance is further improved since TCM can decrease the raw error rate of MLC and hence relieve the burden of outer LDPC code. The effectiveness of concatenated LDPC-TCM systems has been successfully demonstrated through computer simulations
Recommended from our members
ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks
his paper presents a new routing protocol called Secure and Energy Aware Routing Protocol (ETARP) designed for energy efficiency and security for wireless sensor networks (WSNs). ETARP attempts to deal with WSN applications operating in extreme environments such as the battleield. The key part of the routing protocol is route selection based on utility theory. The concept of utility is a novel approach to simultaneously factor energy eiciency and trustworthiness of routes in the routing protocol. ETARP discovers and selects routes on the basis of maximum utility with incurring additional cost in overhead compared to the commonAODV (Ad Hoc On Demand Distance Vector) routing protocol. Simulation results show that, in comparison to previously proposed routing protocols, namely, AODV-EHA and LTB-AODV (Light-Weight Trust-Based Routing Protocol), the proposed ETARP can keep the same security level while achieving more energy eiciency for data packet delivery
Recommended from our members
Energy Harvesting Aware routing protocol for wireless sensor networks
This paper considers energy efficiency of routing protocols in wireless sensor networks. Many routing protocols for sensor network have been proposed, some of them tried to cope with the ad-hoc nature while some others focus on improving the energy efficiency. We propose an Energy Harvesting Aware Ad hoc On-Demand Distance Vector Routing Protocol (AODV-EHA) that not only inherits the advantage of existing AODV in dealing with WSN's ad hoc nature, but also make use of the energy harvesting capability of the sensor nodes in the network, which is very meaningful to the data transmission in the environmental and military applications under consideration. Simulations results show the proposed routing protocol has advantages over competing routing protocols in terms of energy cost for data packet delivery
Reaction kinetic analysis of damage rate effects on defect structural evolution in Fe–Cu
In Fe–Cu alloys, Cu precipitates are formed during high-energy particle irradiation. If there exists energetic binding between vacancies and Cu atoms, vacancy clusters (voids) are formed in precipitates at an initial stage of irradiation, separate from voids in the matrix, because of the migration of Cu atoms with vacancies. In this paper, the damage rate dependence on the formation and annihilation of voids in the precipitates and in the matrix is simulated by reaction kinetic analysis. The initial formation of voids at precipitates, the annihilation of them with an increased dosage and new formation of voids in the matrix are simulated, and the results are compared with the experiments. In a high damage rate of 3.3 × 10^[−7] dpa/s, the formation of voids in Cu precipitates is not significant, but the formation of voids in the matrix is dominant, different from those in a low damage rate of 1.5 × 10^[−10] dpa/s
Pseudospin symmetry in supersymmetric quantum mechanics: Schr\"odinger equations
The origin of pseudospin symmetry (PSS) and its breaking mechanism are
explored by combining supersymmetry (SUSY) quantum mechanics, perturbation
theory, and the similarity renormalization group (SRG) method. The
Schr\"odinger equation is taken as an example, corresponding to the
lowest-order approximation in transforming a Dirac equation into a diagonal
form by using the SRG. It is shown that while the spin-symmetry-conserving term
appears in the single-particle Hamiltonian , the PSS-conserving term appears
naturally in its SUSY partner Hamiltonian . The eigenstates of
Hamiltonians and are exactly one-to-one identical except for
the so-called intruder states. In such a way, the origin of PSS deeply hidden
in can be traced in its SUSY partner Hamiltonian . The
perturbative nature of PSS in the present potential without spin-orbit term is
demonstrated by the perturbation calculations, and the PSS-breaking term can be
regarded as a very small perturbation on the exact PSS limits. A general
tendency that the pseudospin-orbit splittings become smaller with increasing
single-particle energies can also be interpreted in an explicit way.Comment: 31 pages, 11 figures, 2 table
- …