Skip to main content

医学图像处理

生物医学工程专业考研考哪方面好?不是有图像处理和医疗仪器么,考哪个更好啊?急求!!!
2010-12-04 15:42 提问者: 天空殇之城 |浏览次数:1088次
我来帮他解答
满意回答
2010-12-04 19:03

这两个都不错,一个偏软件算法,一个偏硬件接口。我个人觉得关键要看你的兴趣,只有在有兴趣的前提之下才能自学更多的知识

1|评论

求助知友

new_problem |七级采纳率42%

擅长领域:工程技术科学
按默认排序|按时间排序
其他回答 共2条
2010-12-06 20:37gzljsslcw|二级

可以先咨询一下想考学院的学长们,问一下就业前景在做打算。

0|评论
2010-12-12 21:16Latmpens|三级

看你的基础啦,仪器偏电子方面。软件基础好的话可以考虑生物信息的方面,我也是学这的,呵呵

------------------------------------------
医学图像处理是目前医学影像工作的一项重要内容,平常我们为病人做了照片或扫描,有大量的图像处理工作要做,图像处理的好坏直接影响到医生的诊断质量。

==============================

就讲一下现在的吧 图像处理在医学图像中很重要 但是专家有两种观点 一种是可以借助图像处理 为医生提供更好的图像 但是另外一种说法是因为图像处理会改变图像的信息 误导医生 不太赞同更多使用图像处理        
在医学成像之后,才有图像处理这样步骤。医学成像比如说有X射线照相 CT 核磁共振等仪器 采集完信号后 进行图像重建 图像处理以及图像分析 在西门子 GE等有名的仪器公司的产品里 图像处理的算法是相当高明的 而且是整套系统的卖点 国内也有做仪器(硬件)做得很好的 但是在软件编写里面 外国的更强 而且很难破解 使得重建 处理之后的结果要逊于外国巨头
图像处理应用广泛 能医用 工业用 军用 在乎个人造诣

------------------------------------------


http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...