Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Among several techniques for contrast-enhanced MRA, the elliptical centric view ordering method, originally developed at the Mayo Clinic, is a promising one. It has been difficult to apply a fat-suppression prepulse, mainly because the conventional fat suppression method requires a longer acquisition time during sampling of the low-frequency domain in k-space, and it causes severe image distortion due to the great change in longitudinal magnetization derived from fat tissue. We developed a novel method to append fat saturation to the elliptical centric view ordering technique, and assessed the feasibility of its use. Our method is to apply fat-saturation pulses only at selected sampling points when any gradient is applied in the slice-encoding direction. In this way, we achieved efficient suppression of fat-derived signal within a relatively short time, comparable to that of the conventional fat-saturation method, and succeeded in minimizing artifacts.

Download full-text PDF

Source
http://dx.doi.org/10.6009/jjrt.kj00000921769DOI Listing

Publication Analysis

Top Keywords

elliptical centric
12
centric view
12
view ordering
12
ordering technique
8
method
5
[study elliptical
4
technique spectrally
4
spectrally selected
4
selected inversion
4
inversion recovery
4

Similar Publications

A novel dual-band multi-linear polarization reconfigurable (MLPR) antenna for body-centric wireless communication systems (BWCS) is presented in this paper. The design comprises five symmetrically arranged multi-branch radiating units, each integrating an elliptical patch and curved spring branch for the Medical Implant Communication Service (MICS) band (403-405 MHz), and a pair of orthogonal strip patches for the Industrial, Scientific and Medical (ISM) 2.45 GHz band (2.

View Article and Find Full Text PDF

As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism. However, existing signature schemes for NDN-IoT face dual challenges: resource-constrained IoT terminals struggle with certificate management and computationally intensive bilinear pairings under traditional Public Key Infrastructure (PKI), while NDN routers require low-latency batch verification for high-speed data forwarding. To address these issues, this study proposes ECAE, an efficient certificateless aggregate signature scheme based on elliptic curve cryptography (ECC).

View Article and Find Full Text PDF

There is a growing interest in generating bimodal, single-cell RNA sequencing (RNA-seq) data for studying biological pathways. These data are predominantly utilized in understanding phenotypic trajectories using RNA velocities; however, the shape information encoded in the two-dimensional resolution of such data is not yet exploited. In this paper, we present an elliptical parametrization of two-dimensional RNA-seq data, from which we derived statistics that reveal four different modalities.

View Article and Find Full Text PDF

Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN.

Sci Rep

December 2024

Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India.

Wireless Sensor Networks present a significant issue for data routing because of the potential use of obtaining data from far locations with greater energy efficiency. Networks have become essential to modern concepts of the Internet of Things. The primary foundation for supporting diverse service-centric applications has continued to be the sensor node activity of both sensing phenomena in their local environs and relaying their results to centralized Base Stations.

View Article and Find Full Text PDF

The Military Internet of Things (MIoT) has emerged as a new research area in military intelligence. The MIoT frequently has to constitute a federation-capable IoT environment when the military needs to interact with other institutions and organizations or carry out joint missions as part of a coalition such as in NATO. One of the main challenges of deploying the MIoT in such an environment is to acquire, analyze, and merge vast amounts of data from many different IoT devices and disseminate them in a secure, reliable, and context-dependent manner.

View Article and Find Full Text PDF