Filtern
Erscheinungsjahr
Dokumenttyp
- Wissenschaftlicher Artikel (237)
- Konferenzveröffentlichung (216)
- Teil eines Buches (Kapitel) (32)
- Sonstiges (31)
- Video (14)
- Buch (Monographie) (13)
- Preprint (12)
- Dissertation (4)
- Bericht (4)
- Arbeitspapier (4)
Sprache
- Englisch (572) (entfernen)
Schlagworte
- Robotik (8)
- Flugkörper (7)
- UAV (7)
- Rettungsrobotik (5)
- Dissipative Particle Dynamics (4)
- Polymer-Elektrolytmembran-Brennstoffzelle (4)
- adhesion (4)
- Bionik (3)
- Deep Learning (3)
- Erweiterte Realität <Informatik> (3)
Institut
- Westfälisches Institut für Gesundheit (115)
- Westfälisches Energieinstitut (61)
- Institut für Internetsicherheit (56)
- Informatik und Kommunikation (51)
- Elektrotechnik und angewandte Naturwissenschaften (50)
- Wirtschaft und Informationstechnik Bocholt (46)
- Institut für biologische und chemische Informatik (44)
- Maschinenbau Bocholt (37)
- Institut Arbeit und Technik (15)
- Wirtschaftsingenieurwesen (15)
- Maschinenbau und Facilities Management (13)
- Institut für Innovationsforschung und -management (11)
- Fachbereiche (9)
- Wirtschaftsrecht (9)
- Mechatronik-Institut Bocholt (2)
- Strategische Projekte (2)
- Institute (1)
Three-dimensional magnetic resonance medical images may contain scanner- and patient-induced geometric distortion. For qualitative diagnosis, geometric errors of a few millimeters are often tolerated. However, quantitative applications such as image-guided neurosurgery and radiotherapy can require an accuracy of a millimeter or better. We have developed a method to accurately measure scanner-induced geometric distortion and to correct the MR images for this type of distortion. The method involves a number of steps. First, a specially designed phantom is scanned that contains a large number of reference structures on positions with a manufacturing error of less than 0.05 mm. Next, the positions of the reference structures are automatically detected in the scanned images and a higher-order polynomial distortion-correction transformation is estimated. Then the patient is scanned and the transformation is applied to correct the patient images for the detected distortion. The distortion-correction method is explained in detail in this paper. The accuracy of the method has been measured with synthetically generated phantom scans that contain an exactly-known amount and type of distortion. The reproducibility of the method has been measured by applying it to a series of consecutive phantom scans. Validation results are briefly described in this paper, a more-detailed description is given in another submission to SPIE Medical Imaging 2001.
Diversity Management - an approach to use people of different ages as a resource in enterprises
(2003)
Many fluids transported by pipelines are in some sense hazardous. It is therefore often necessary to install leak detection (and locating) systems (LDS), especially due to legal regulations like the "Code for Federal Regulations (CFR) Title 49 Part 195", API 1130 2nd Ed., both for the USA, or the "Technische Regeln für Fernleitungen" (TRFL) (Technical Rules for Pipelines) in Germany. This paper gives a survey of methodologies, methods and techniques for leak detection and locating. The survey starts with some remarks concerning (legal) regulations both for the USA and for Germany. Some few words about externally based systems (due to API 1130 2nd Ed.) follow next. A significant part of the paper deals with internally based systems (also due to API 1130 2nd Ed.) like balancing systems (line balance, volume balance, compensated mass balance etc.), Real Time Transient Model LDS (RTTM-LDS), pressure/flow monitoring and statistical analysis LDS. Different methods for leak locating (gradient intersection method, wave propagation analysis etc.) will also be shown. The presentation of an Extended RTTM approach (E-RTTM) combining advantages of conventional RTTM LDS and statistical analysis follows next, together with the demonstration of applicability by means of two examples, a liquid multi-batch pipeline, and a gas pipeline. Sketching future work and the conclusion conclude the survey.
Web Service Security - XKMS
(2004)