Quality assurance (QA) protocols can and should be used to proactively detect low-level spiking and other artifacts early so that these problems can be remedied before becoming more debilitating and adding significant overhead to the image analysis workflow. However, one generally needs corrupted data sets to test the accuracy of the novel algorithm. This prevents researchers from taking a proactive stance of establishing these QA protocols before corruption of data sets occurs. Here, we detail a simple method to generate spikes reliably and reproducibly to generate corrupted data that can be used to test and debug any new QA algorithms.
How to access this content:
For one year after publication, abstracts and videos are only open to registrants of this annual meeting. Registrants should use their existing login information. Non-registrant access can be purchased via the ISMRM E-Library.
After one year, current ISMRM & ISMRT members get free access to both the abstracts and videos. Non-members and non-registrants must purchase access via the ISMRM E-Library.
After two years, the meeting proceedings (abstracts) are opened to the public and require no login information. Videos remain behind password for access by members, registrants and E-Library customers.
Keywords