Skip to main content

医学影像学



医学成像也称医学影像学,是指外科医生用以诊断从身体外部无法看到的身体部位的过程,比较常见的方式包括使用内视镜、X光等方式。医学成像又称卤化银成像,因为从前的菲林(胶卷)是用感光材料卤化银化学感光物成像的。

通过X光成像(X-ray),电脑断层扫描(CT),核磁共振成像(MRI), 超声成像(ultrasound),正电子发射计算机断层扫描(PET),脑电图(EEG),脑磁图(MEG),眼球追踪(eye-tracking),穿颅磁波刺激(TMS),光学相干断层扫描等现代成像技术检查人体无法用非手术手段检查的部位的过程。医学影像学可以作为一种医疗辅助手段用于诊断和治疗,也可以作为一种科研手段用于生命科学的研究中。

除了医疗上面的用途之外,影像学结合其他学术领域,譬如认知心理学(cognitive psychology)、语言学(linguistics)、教育学(education)、社会学(sociology)等,可以让研究人员探索人类在进行认知行为时的大脑活动,这样的研究已经越渐成形,学术界称之为认知神经科学(cognitive neuroscience)。

医学影像学中的许多技术已经在科学研究的工业中获得了广泛的应用。医学影像学的发展受益于现代计算机技术的突飞猛进,其与图像处理,计算机视觉,模式识别技术的结合产生了一个新的计算机技术分支--医学图像处理。
成像分类

根据成像的形式,可以分成以下各项:

    影像诊断学:通过特殊手段,展示患者身体内部结构的影像的分析。
    医学超声检查:一种基于超声波的影像学诊断技术
    超声诊断学:将超声波的原理运用到临床诊断中的一种科学。
    乳房摄影术:利用X光检查人类的乳房
    X射线断层成像
    光学相干断层扫描
    核磁共振成像(又称磁振造影)
    X光成像
    萤光成像

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...