• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhai Weiming, Sheng Lin, Song Yixu, Zhao Yangnan, Wang Hong, Jia Peifa. Image Guided Computer Assisted Microwave Ablation for Liver Cancer[J]. Journal of Computer Research and Development, 2011, 48(2): 281-288.
Citation: Zhai Weiming, Sheng Lin, Song Yixu, Zhao Yangnan, Wang Hong, Jia Peifa. Image Guided Computer Assisted Microwave Ablation for Liver Cancer[J]. Journal of Computer Research and Development, 2011, 48(2): 281-288.

Image Guided Computer Assisted Microwave Ablation for Liver Cancer

More Information
  • Published Date: February 14, 2011
  • A novel computer assisted image guided surgery method for liver cancer microwave ablation is proposed. Advanced GPU accelerated visualization technique is used to reconstruct 3D patient anatomy structure from preoperative CT images in realtime. Thermal field simulation technology for percutaneous liver cancer microwave ablation is introduced, including the calculation of the specific absorption rate of microwave energy, the calculation of tissue temperature field using the Pennes bioheat transfer equation and the calculation of the tissue necrosis zone using the Arrhenius equation. Preoperative surgery planning is performed by the surgeon in an interactively way, until the optimal surgery plan is achieved, including the pose of the microwave probe and the microwave working time and power. Intraoperative sonography is used in the guidance of the placing of the probe in patient and postoperative CT is 3D visualized to evaluate the accuracy of the thermal field simulation and the placement of the microwave probe. Extensive experiments have been performed on both porcine liver and patient with liver cancer and the actual necrosis zone are measured in postoperative CT images for patients. The experiment results show that this method is accurate for surgery simluation and could be used in image guided microwave ablation surgery.
  • Related Articles

    [1]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [2]Wu Linyang, Luo Rong, Guo Xueting, Guo Qi. Partitioning Acceleration Between CPU and DRAM: A Case Study on Accelerating Hash Joins in the Big Data Era[J]. Journal of Computer Research and Development, 2018, 55(2): 289-304. DOI: 10.7544/issn1000-1239.2018.20170842
    [3]Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
    [4]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [5]Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
    [6]Yuan Xinpan, Long Jun, Zhang Zuping, Luo Yueyi, Zhang Hao, and Gui Weihua. Connected Bit Minwise Hashing[J]. Journal of Computer Research and Development, 2013, 50(4): 883-890.
    [7]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [8]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [9]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    [10]Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.

Catalog

    Article views (763) PDF downloads (817) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return