Author of the publication

Automatic classification of lung nodules on MDCT images with the temporal subtraction technique.

, , , , , , , , , and . Int. J. Comput. Assist. Radiol. Surg., 12 (10): 1789-1798 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hirano, Yasushi
add a person with the name Hirano, Yasushi
 

Other publications of authors with the same name

Quantification of Shrinkage of Lung Lobe from Chest CT Images Using the 3D Extended Voronoi Division and its Application to the Benign/Malignant Discrimination of Tumor Shadows., , , , and . ICPR (1), page 751-754. IEEE Computer Society, (2002)The sound wave ray-space., , , , , , and . ICME, page 1118-1121. IEEE Computer Society, (2005)Experience Map Creation by Virtual WLAN Location Estimation., , , and . ISWC, page 117-118. IEEE Computer Society, (2006)3DAV integrated system featuring arbitrary listening-point and viewpoint generation., , , , , , , , , and 1 other author(s). MMSP, page 855-860. IEEE Signal Processing Society, (2008)Semantic characteristics prediction of pulmonary nodule using Artificial Neural Networks., , , , , , and . EMBC, page 5465-5468. IEEE, (2013)Semi-automatic Story Creation System in Ubiquitous Sensor Environment., , , , and . AmI, volume 5859 of Lecture Notes in Computer Science, page 106-111. Springer, (2009)Fault- and disaster-resistant medical cloud system for various medical applications., , , , , , and . Healthcom, page 486-490. IEEE, (2013)Three dimensional concentration index-a local feature for analyzing three dimensional digital line patterns and its application to chest X-ray CT images., , , , , and . ICPR, page 1040-1043. IEEE Computer Society, (1998)Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation., , , and . SECRYPT, page 29-34. INSTICC Press, (2008)A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoT., , , , and . CANDAR Workshops, page 86-91. IEEE Computer Society, (2018)