Statistical Reconstruction Methods Sample Clauses

Statistical Reconstruction Methods. ‌ We know that x-ray beams are made of x-ray photons, and rather than computing the deterministic solution directly from an equation, we can explore the randomness of x-ray photons. If we assume that the detector is a photon-counting detector, then we can use statistical tools to build the model.
AutoNDA by SimpleDocs
Statistical Reconstruction Methods. ‌ We know that x-ray beams are made of x-ray photons, and rather than computing the deterministic solution directly from an equation, we can explore the randomness of x-ray photons. If we assume that the detector is a photon-counting detector, then we can use statistical tools to build the model. ∫ ( )∫ In Equation (2.3), if we discretize the equation with respect to the j-th projection and the i-th detector pixel, then we can obtain yi = S(e) exp − µ (→r (t)) d t d e, (2.23) E t∈li,j where yi represents the number of photons measured at the i-th pixel of detector. If we further discretize the equation over the energy spectrum, then it can be expressed ( as yi = Σ sk exp − ∫ k t∈li,j µ (→r (t)) d t) . (2.24) Repeating the same steps as (2.12), (2.13) and (2.14), we can obtain yi = s¯i exp {− [Au]i} , (2.25) where s¯i is the average photon density of the j-th projection. If we both consider the errors introduced in the photon diffusion and counting, we can add a noise term yi = s¯i exp {− [Au]i} + ηi. (2.26) One realistic assumption is that the projected data are Poisson distributed as yi ∼ Poisson(s¯i exp {− [Au]i}). (2.27) With this assumption, we can build a maximum likelihood function fy (y; u) = . (2.28) Y s¯yi exp {−yi [Au] } exp (−s¯i exp {− [Au] }) yi! If we ignore the constant terms, the corresponding likelihood function is Y L (u; y) = exp {−yi [Au]i} exp (−s¯i exp {− [Au]i}) . (2.29) i The log-likelihood function can be expressed as Σ l (u; y) = (−yi [Au]i − s¯i exp {− [Au]i}) . (2.30) To maximize the log-likelihood function, it is equivalent to minimizing the negative log-likelihood function. So the objective function is Σ

Related to Statistical Reconstruction Methods

  • Statistical Analysis 31 F-tests and t-tests will be used to analyze OV and Quality Acceptance data. The F-test is a 32 comparison of variances to determine if the OV and Quality Acceptance population variances 33 are equal. The t-test is a comparison of means to determine if the OV and Quality Acceptance 34 population means are equal. In addition to these two types of analyses, independent verification 35 and observation verification will also be used to validate the Quality Acceptance test results.

  • Statistical Sampling Documentation a. A copy of the printout of the random numbers generated by the “Random Numbers” function of the statistical sampling software used by the IRO.

  • Single Source Selection Services for tasks in circumstances which meet the requirements of paragraph 3.10 of the Consultant Guidelines for Single Source Selection, may, with the Association's prior agreement, be procured in accordance with the provisions of paragraphs 3.9 through 3.13 of the Consultant Guidelines.

  • Authoritative Root Database To the extent that ICANN is authorized to set policy with regard to an authoritative root server system (the “Authoritative Root Server System”), ICANN shall use commercially reasonable efforts to (a) ensure that the authoritative root will point to the top-­‐level domain nameservers designated by Registry Operator for the TLD, (b) maintain a stable, secure, and authoritative publicly available database of relevant information about the TLD, in accordance with ICANN publicly available policies and procedures, and (c) coordinate the Authoritative Root Server System so that it is operated and maintained in a stable and secure manner; provided, that ICANN shall not be in breach of this Agreement and ICANN shall have no liability in the event that any third party (including any governmental entity or internet service provider) blocks or restricts access to the TLD in any jurisdiction.

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Disturbance Analysis Data Exchange The Parties will cooperate with one another and the NYISO in the analysis of disturbances to either the Large Generating Facility or the New York State Transmission System by gathering and providing access to any information relating to any disturbance, including information from disturbance recording equipment, protective relay targets, breaker operations and sequence of events records, and any disturbance information required by Good Utility Practice.

  • Using Student feedback in Educator Evaluation ESE will provide model contract language, direction and guidance on using student feedback in Educator Evaluation by June 30, 2013. Upon receiving this model contract language, direction and guidance, the parties agree to bargain with respect to this matter.

  • Random Drug Testing All employees covered by this Agreement shall be subject to random drug testing in accordance with Appendix D.

  • Treatment Program Testing The Employer may request or require an employee to undergo drug and alcohol testing if the employee has been referred by the employer for chemical dependency treatment or evaluation or is participating in a chemical dependency treatment program under an employee benefit plan, in which case the employee may be requested or required to undergo drug or alcohol testing without prior notice during the evaluation or treatment period and for a period of up to two years following completion of any prescribed chemical dependency treatment program.

Time is Money Join Law Insider Premium to draft better contracts faster.