--%>

Simulation of artifacts in CT using MATLAB

How is Simulation of artifacts in CT is done utilizing MATLAB?

E

Expert

Verified

Supposing that one of detectors (at l = l0) of a CT scanner is malfunction, which forever outputs a value of 0, i.e. g(l0, θ) = 0. The malfunctioned detector locates below the object however not in the center of the detector array as illustrated in the figure. The parallel ray geometry is supposed.

(1) If the projections are obtained with this CT scanner, display the sinogram for the object employed in Q1.

(2) Apply the inverse Radon transform to projections to re-construct the object. Display the re-constructed image.

(3) Discuss what types of artifacts are examined in the reconstructed image and what a technician must do to avoid such artifacts?

(4) In the inverse Radon transform (that is, ‘iradon’), use a distinct filter (that is, the default filter is Ram-Lak) and dispaly the reconstructed image. Discuss how and why the re-constructed image is enhanced.

859_matlab.jpg

   Related Questions in Programming Languages

  • Q : What is Native method Native method :

    Native method: In native method, the method is written in a language other than Java, however accessible to a Java program. Native methods are far away from the scope of this definition.

  • Q : Basic Units of CSS Specify the Basic

    Specify the Basic Units of the CSS.

  • Q : Explain Magic number Magic number : It

    Magic number: It is a constant value with significance within a specific context. For example, the value 12 could mean numerous different things - the number of hrs you have worked today, the number of dollars you are payable by a friend, and so forth

  • Q : Describe MCP or Model Checker for C plus

    MCP: Model Checker for C++ (MCP) is an explicit-state software model checker being introduced by the Robust Software Engineering group at NASA Ames Research Center (Thompson and Brat, 2008). MCP was constructed specifically to allow programs written i

  • Q : What is Memory leak Memory leak : It is

    Memory leak: It is a situation in which memory which is no longer being employed has not been returned to the pool of free memory. The garbage collector is designed to return unreferenced objects to the free memory pool in order to shun memory leaks.<

  • Q : How can Login dialog accessed The web

    The web page I am testing displays the Login dialog. How can I access this dialog?

  • Q : Define Deadlock Deadlock : A situation

    Deadlock: A situation which occurs whenever two threads each acquires the lock to one of a set of resources which they both require.

  • Q : Define Byte code Byte code : Java

    Byte code: Java source files are converted by a compiler into bytecodes that is, the instruction set of the Java Virtual Machine (JVM). The Bytecodes are stored in the .class files.

  • Q : Define the term XML Canonicalization

    Define the term XML Canonicalization?

  • Q : Explain Imperative programming

    Imperative programming: The style of programming generally related with languages such as FORTRAN, C, Pascal and so forth. Imperative programming is differentiated from functional programming in that the previous is strongly tied to the idea of variab