New Methods to Improve Large-Scale Microscopy Image Analysis with Prior Knowledge and Uncertainty Arxiv:1608.08471V1 [Cs.CV] 3

Total Page:16

File Type:pdf, Size:1020Kb

New Methods to Improve Large-Scale Microscopy Image Analysis with Prior Knowledge and Uncertainty Arxiv:1608.08471V1 [Cs.CV] 3 New Methods to Improve Large-Scale Microscopy Image Analysis with Prior Knowledge and Uncertainty Zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften der Fakultat¨ fur¨ Maschinenbau Karlsruher Institut fur¨ Technologie (KIT) genehmigte Dissertation arXiv:1608.08471v1 [cs.CV] 30 Aug 2016 von Johannes Stegmaier, M.Sc. geboren am 16. November 1985 in Stuttgart Hauptreferent: apl. Prof. Dr.-Ing. Ralf Mikut Korreferenten: Prof. Dr. Uwe Strahle¨ Prof. Dr. Jan G. Korvink Tag der mundlichen¨ Prufung:¨ 3. Juni 2016 This document is licensed under the Creative Commons Attribution – Share Alike 3.0 DE License (CC BY-SA 3.0 DE): http://creativecommons.org/licenses/by-sa/3.0/de/ Zusammenfassung Jungste¨ Entwicklungen im Bereich der mehrdimensionalen Mikroskopie bieten ein großes Potential fur¨ die Beantwortung vielerlei Fragestellungen in wissen- schaftlichen Bereichen. Beispielsweise bieten neue Verfahren wie die zeitauf- geloste¨ 3D Konfokal- und Lichtscheibenmikroskopie oder die Transmissions- elektronenmikroskopie weitreichende Moglichkeiten¨ im Bereich der Biologie, die von der ganzheitlichen Analyse embryonaler Entwicklung uber¨ die Be- trachtung subzellularer¨ Prozesse bis hin zur Rekonstruktion von Verschaltun- gen im Nervensystem von Modellorganismen reichen. Die dabei routinemaßig¨ anfallenden Datenmengen im Terabyte-Bereich konnen¨ allerdings nur unzurei- chend manuell ausgewertet werden und eine wichtige Komponente fur¨ die er- folgreiche Auswertung solcher bildbasierter Experimente ist daher eine großt-¨ mogliche¨ Anzahl von Analyseschritten durch Bildanalyseverfahren zu automa- tisieren. Bestehende Verfahren fur¨ die automatische Bildauswertung sind hier- bei jedoch meist nicht unmittelbar auf die großen Datenmengen anwendbar und die Analysen mussen¨ daher auf kleine Auszuge¨ der Daten beschrankt¨ wer- den, falls die enormen Anforderungen an Rechenleistung und Verarbeitungs- zeit nicht gewahrleistet¨ werden konnen.¨ Zudem wird vorhandenes a priori Wis- sen oft nur unzureichend in automatische Verfahren eingebettet und somit ein bedeutender Teil an Zusatzinformationen vernachlassigt,¨ der zu einer verbes- serten Ergebnisqualitat¨ beitragen kann. Die Hauptbeitrage¨ der vorliegenden Arbeit sind ein neues Konzept zur Abscha-¨ tzung und Weiterleitung von Unsicherheiten in Bildverarbeitungsketten sowie die Entwicklung neuer Segmentierungsverfahren, die fur¨ eine effiziente Ana- lyse von 3D Mikroskopbildern im Terabyte-Bereich eingesetzt werden konnen.¨ Basierend auf unscharfen Mengen (engl. fuzzy sets) wurde zur Verfugung¨ ste- hendes Vorwissen systematisch in eine mathematische Reprasentation¨ uberf¨ uh-¨ rt, die anschließend fur¨ effiziente Datenselektion, eine Unsicherheitsabschat-¨ zung von automatisch extrahierten Daten sowie fur¨ eine gezielte Verbesserung von Bildverarbeitungsoperatoren eingesetzt werden konnte. Um den Bedarf an effizienten Bildverarbeitungsalgorithmen zu reduzieren wurden drei neue Seg- mentierungsalgorithmen entwickelt, die sich fur¨ eine Extraktion von sphari-¨ schen, linienformigen¨ und lokal planaren Objekten eignen. Die neuen Segmen- tierungsmethoden wurden dabei gezielt fur¨ den Einsatz in der automatisierten i Analyse von großen 3D Bilddatensatzen¨ optimiert, insbesondere durch die sys- tematische Ausnutzung von vorhandenem a priori Wissen wahrend¨ der Algo- rithmenentwicklung und durch die Beschrankung¨ auf rechen- und speicheref- fiziente Teilkomponenten in der Implementierung. Anhand einer exemplari- schen Bildverarbeitungskette wurde veranschaulicht, wie Unsicherheiten in be- stehende Operatoren integriert werden und zur Verbesserung der Ergebnis- qualitat¨ beitragen konnen.¨ Um die Funktionalitat¨ der vorgestellten Verfahren zu validieren, wurden erweiterte oder zum Teil neu erstellte, simulierte Bench- markdatensatze¨ verwendet, die eine Vielzahl moglicher¨ Einsatzszenarien sys- tematisch abdecken. Die effizienten Implementierungen werden zum einen in- nerhalb der vorliegenden Arbeit vorgestellt und zum anderen als plattformu- nabhangige¨ Open-Source Software zur allgemeinen Verfugung¨ bereitgestellt. Eine Reihe von Problemen im Bereich der Entwicklungsbiologie wurde mit- tels der theoretisch eingefuhrten¨ Verfahren erfolgreich ausgewertet. So wur- den die Methoden beispielsweise fur¨ eine automatisierte, quantitative Analy- se der Auswirkungen von bekannten und unbekannten Chemikalien auf die neuronale Entwicklung im Ruckenmark¨ von Zebrabarblingen,¨ fur¨ die Detek- tion, Segmentierung und zeitliche Verfolgung von fluoreszenzmarkierten Zell- kernen in Zebrabarblingsembryos¨ sowie zur quantitativen Charakterisierung von Zellmorphologieanderungen¨ in zeitaufgelosten¨ 3D Mikroskopbildern von Fruchtfliegen-, Zebrabarblings-¨ und Mausembryos eingesetzt. ii Abstract Recent developments in the area of multidimensional imaging techniques pro- vide powerful ways to examine various kinds of scientific questions. For in- stance, in biological applications, time-resolved 3D light-sheet microscopy and serial section electron microscopy provide unprecedented possibilities ranging from in toto analyses of embryonic development down to investigations of sub- cellular processes or reconstructions of the nervous system. The routinely pro- duced datasets in the terabyte-range, however, can hardly be analyzed manu- ally. Thus, the extensive use of image analysis-based automation is an essential key to the success of the performed imaging experiments. Existing algorithms for such analysis tasks are mostly not directly applicable to these large-scale datasets and either have to be confined to small excerpts of the data or require an immense amount of computation capacities and execution time. Moreover, available prior knowledge that could be exploited for advanced analyses is of- ten not sufficiently considered by automatic processing pipelines. The major contributions of the present thesis are a new concept for the estima- tion and propagation of uncertainty involved in image analysis operators and the development of new segmentation algorithms that are suitable for terabyte- scale analyses of 3D+t microscopy images. Based on fuzzy set theory, available a priori knowledge was transformed into a mathematical representation and extensively used to enhance the performance of processing operators by data filtering, uncertainty propagation and explicit exploitation of information un- certainty for result improvements. To target the need for efficient image analy- sis operators, three new segmentation algorithms were specifically developed to detect a generalized geometric class of objects, namely, spherical objects, line-like objects and locally plane-like objects. The developed pipelines were specifically tuned to be applicable to large-scale analyses, i.e., only fast and memory efficient processing operators were used in the implementation. Us- ing an exemplary pipeline, it is demonstrated how a combination of both the fast algorithms and the proposed uncertainty framework could be used to fur- ther enhance the overall quality of the considered processing operators. All developed methods were thoroughly validated on existing and newly devel- oped simulated benchmarks, to be able to quantitatively assess their applica- bility to different imaging conditions. In addition, the efficient implementa- tions of all developed algorithms are presented and were made accessible to iii the community as platform independent open-source software tools. The new methods were successfully applied to multiple large-scale analyses of fluores- cence microscopy images in the field of developmental biology. In particular, the proposed pipelines were used to quantify the impact of both known and unknown chemical substances on the neuronal development in the spinal cord of zebrafish in 2D images. Furthermore, the developed methods were applied to time-resolved 3D images to detect, segment and track fluorescently labeled cellular nuclei of entire zebrafish embryos and to quantitatively characterize cell morphology dynamics using fluorescently labeled cellular membranes in 3D+t microscopy images of fruit fly, zebrafish and mouse embryos. iv Acknowledgements In the first place I want to thank Prof. Dr.-Ing. habil. Georg Bretthauer for the great opportunity to spend my time as a PhD student at the Institute for Ap- plied Computer Science (IAI) at the Karlsruhe Institute of Technology (KIT) and for his supervision of the thesis. Special thanks to my direct supervi- sor apl. Prof. Dr.-Ing. Ralf Mikut for the guidance, encouragement, construc- tive discussions and the continuous support throughout the entire time at the IAI. I deeply appreciate having had the chance to work freely and responsi- bly on a highly captivating project. I want to thank Prof. Dr. Uwe Strahle¨ and Prof. Dr. Jan G. Korvink for reviewing the thesis and Prof. Dr. Barbara Deml for heading the examination board. Thanks to all colleagues, Bachelor’s stu- dents and trainees at the IAI, especially, to Rudiger¨ Alshut, Thomas Antrit- ter, Andreas Bartschat, Dr. Christian Bauer, Wolfgang Doneit, Eduard Hubner,¨ Arif ul Maula Khan, Jorge Angel Gonzalez Ordiano, Nico Peter, Willis Pinaud, Dr. Markus Reischl, Benjamin Schott, Manuel Traub, Michele Rene Tuga and Simon Waczowicz for the pleasant, cooperative and exciting working atmo- sphere in the group for biosignal analysis. Many thanks to all the collaboration partners from the Institute of Toxicology and Genetics (ITG) and the Institute for Applied Physics (APH), especially, for igniting my interest in developmen- tal biology.
Recommended publications
  • File System Design Approaches
    File System Design Approaches Dr. Brijender Kahanwal Department of Computer Science & Engineering Galaxy Global Group of Institutions Dinarpur, Ambala, Haryana, INDIA [email protected] Abstract—In this article, the file system development design The experience with file system development is limited approaches are discussed. The selection of the file system so the research served to identify the different techniques design approach is done according to the needs of the that can be used. The variety of file systems encountered developers what are the needed requirements and show what an active area of research file system specifications for the new design. It allowed us to identify development is. The file systems researched fell into one of where our proposal fitted in with relation to current and past file system development. Our experience with file system the following four categories: development is limited so the research served to identify the 1. The file system is developed in user space and runs as a different techniques that can be used. The variety of file user process. systems encountered show what an active area of research file 2. The file system is developed in the user space using system development is. The file systems may be from one of the FUSE (File system in USEr space) kernel module and two fundamental categories. In one category, the file system is runs as a user process. developed in user space and runs as a user process. Another 3. The file system is developed in the kernel and runs as a file system may be developed in the kernel space and runs as a privileged process.
    [Show full text]
  • Alpha Release of the Data Service
    This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 777533. PROviding Computing solutions for ExaScale ChallengeS D5.2 Alpha release of the Data service Start / 01 November 2017 Project: PROCESS H2020 – 777533 Duration: 36 Months Dissemination1: Public Nature2: R Due Date: 31 January 2019 Work Package: WP 5 Filename3 PROCESS_D5.2_Alpha_release_of_the_Data_service_v1.0.docx ABSTRACT During the first 15 months of its implementation, PROCESS has progressed from architecture design based on use cases’ requirements (D4.1) and through architecture validation again based on use cases (D4.2) towards initial implementations of computing services (D6.1) and data services - effort presented here in the deliverable D5.2. In D5.2 we provide an initial demonstrator of the data services, which works in cooperation with the computation services demonstrated in D6.1. The demonstrator is based on the design of the PROCESS data infrastructure described in D5.1. The implementation and initial integration of the infrastructure are based on use case requirements, formulated here as custom application-specific services which are part of the infrastructure. The central, connecting component of the data infrastructure is LOBCDER. It implements a micro-infrastructure of data services, based on dynamically provisioned Docker containers. Additionally to LOBCDER and use case-specific services, the data infrastructure contains generic data and metadata- handling services (DISPEL, DataNet). Finally, Cloudify integrates the micro-infrastructure and the orchestration components of WP7. 1 PU = Public; CO = Confidential, only for members of the Consortium (including the EC services). 2 R = Report; R+O = Report plus Other.
    [Show full text]
  • Hands-On Linux Administration on Azure
    Hands-On Linux Administration on Azure Explore the essential Linux administration skills you need to deploy and manage Azure-based workloads Frederik Vos BIRMINGHAM - MUMBAI Hands-On Linux Administration on Azure Copyright © 2018 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. Commissioning Editor: Vijin Boricha Acquisition Editor: Rahul Nair Content Development Editor: Nithin George Varghese Technical Editor: Komal Karne Copy Editor: Safis Editing Project Coordinator: Drashti Panchal Proofreader: Safis Editing Indexer: Mariammal Chettiyar Graphics: Tom Scaria Production Coordinator: Deepika Naik First published: August 2018 Production reference: 1310818 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78913-096-6 www.packtpub.com mapt.io Mapt is an online digital library that gives you full access to over 5,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career.
    [Show full text]
  • Tahoe-LAFS Documentation Release 1.X
    Tahoe-LAFS Documentation Release 1.x The Tahoe-LAFS Developers January 19, 2017 Contents 1 Welcome to Tahoe-LAFS! 3 1.1 What is Tahoe-LAFS?..........................................3 1.2 What is “provider-independent security”?................................3 1.3 Access Control..............................................4 1.4 Get Started................................................4 1.5 License..................................................4 2 Installing Tahoe-LAFS 5 2.1 First: In Case Of Trouble.........................................5 2.2 Pre-Packaged Versions..........................................5 2.3 Preliminaries...............................................5 2.4 Install the Latest Tahoe-LAFS Release.................................6 2.5 Running the tahoe executable.....................................8 2.6 Running the Self-Tests..........................................8 2.7 Common Problems............................................9 2.8 Using Tahoe-LAFS............................................9 3 How To Run Tahoe-LAFS 11 3.1 Introduction............................................... 11 3.2 Do Stuff With It............................................. 12 3.3 Socialize................................................. 13 3.4 Complain................................................. 13 4 Configuring a Tahoe-LAFS node 15 4.1 Node Types................................................ 16 4.2 Overall Node Configuration....................................... 16 4.3 Connection Management........................................
    [Show full text]
  • Porting FUSE to L4re
    Großer Beleg Porting FUSE to L4Re Florian Pester 23. Mai 2013 Technische Universit¨at Dresden Fakult¨at Informatik Institut fur¨ Systemarchitektur Professur Betriebssysteme Betreuender Hochschullehrer: Prof. Dr. rer. nat. Hermann H¨artig Betreuender Mitarbeiter: Dipl.-Inf. Carsten Weinhold Erkl¨arung Hiermit erkl¨are ich, dass ich diese Arbeit selbstst¨andig erstellt und keine anderen als die angegebenen Hilfsmittel benutzt habe. Declaration I hereby declare that this thesis is a work of my own, and that only cited sources have been used. Dresden, den 23. Mai 2013 Florian Pester Contents 1. Introduction 1 2. State of the Art 3 2.1. FUSE on Linux . .3 2.1.1. FUSE Internal Communication . .4 2.2. The L4Re Virtual File System . .5 2.3. Libfs . .5 2.4. Communication and Access Control in L4Re . .6 2.5. Related Work . .6 2.5.1. FUSE . .7 2.5.2. Pass-to-Userspace Framework Filesystem . .7 3. Design 9 3.1. FUSE Server parts . 11 4. Implementation 13 4.1. Example Request handling . 13 4.2. FUSE Server . 14 4.2.1. LibfsServer . 14 4.2.2. Translator . 14 4.2.3. Requests . 15 4.2.4. RequestProvider . 15 4.2.5. Node Caching . 15 4.3. Changes to the FUSE library . 16 4.4. Libfs . 16 4.5. Block Device Server . 17 4.6. File systems . 17 5. Evaluation 19 6. Conclusion and Further Work 25 A. FUSE operations 27 B. FUSE library changes 35 C. Glossary 37 V List of Figures 2.1. The architecture of FUSE on Linux . .3 2.2. The architecture of libfs .
    [Show full text]
  • Paratrac: a Fine-Grained Profiler for Data-Intensive Workflows
    ParaTrac: A Fine-Grained Profiler for Data-Intensive Workflows Nan Dun Kenjiro Taura Akinori Yonezawa Department of Computer Department of Information and Department of Computer Science Communication Engineering Science The University of Tokyo The University of Tokyo The University of Tokyo 7-3-1 Hongo, Bunkyo-Ku 7-3-1 Hongo, Bunkyo-Ku 7-3-1 Hongo, Bunkyo-Ku Tokyo, 113-5686 Japan Tokyo, 113-5686 Japan Tokyo, 113-5686 Japan [email protected] [email protected] [email protected] tokyo.ac.jp tokyo.ac.jp tokyo.ac.jp ABSTRACT 1. INTRODUCTION The realistic characteristics of data-intensive workflows are With the advance of high performance distributed com- critical to optimal workflow orchestration and profiling is puting, users are able to execute various data-intensive an effective approach to investigate the behaviors of such applications by harnessing massive computing resources [1]. complex applications. ParaTrac is a fine-grained profiler Though workflow management systems have been developed for data-intensive workflows by using user-level file system to alleviate the difficulties of planning, scheduling, and exe- and process tracing techniques. First, ParaTrac enables cuting complex workflows in distributed environments [2{5], users to quickly understand the I/O characteristics of from optimal workflow management still remains a challenge entire application to specific processes or files by examining because of the complexity of applications. Therefore, one low-level I/O profiles. Second, ParaTrac automatically of important and practical demands is to understand and exploits fine-grained data-processes interactions in workflow characterize the data-intensive applications to help workflow to help users intuitively and quantitatively investigate management systems (WMS) refine their orchestration for realistic execution of data-intensive workflows.
    [Show full text]
  • Extendable Storage Framework for Reliable Clustered Storage Systems by Sumit Narayan B.E., University of Madras, 2002 M.S., University of Connecticut, 2004
    Extendable Storage Framework for Reliable Clustered Storage Systems Sumit Narayan, Ph.D. University of Connecticut, 2010 The total amount of information stored on disks has increased tremendously in re­ cent years with data storage, sharing and backup becoming more important than ever. The demand for storage has not only changed in size, but also in speed, reli­ ability and security. These requirements not only create a big challenge for storage administrators who must decide on several aspects of storage policy with respect to provisioning backups, retention, redundancy, security, performance, etc. but also for storage system architects who must aim for a one system fits all design. Storage poli­ cies like backup and security are typically set by system administrators for an entire file system, logical volume or storage pool. However, this granularity is too large and can sacrifice storage efficiency and performance - particularly since different files have different storage requirements. In the same context, clustered storage systems that are typically used for data storage or as file servers, provide very high performance and maximum scalability by striping data across multiple nodes. However, high num­ ber of storage nodes in such large systems also raises concerns for reliability in terms of loss of data due to failed nodes, or corrupt blocks on disk drives. Redundancy techniques similar to RAID across these nodes are not common because of the high overhead incurred owing to the parity calculations for all the files present on the file system. In the same way, data integrity checks are often omitted or disabled in file systems to guarantee high throughput from the storage system.
    [Show full text]
  • Remote Filesystem Event Notification and Processing for Distributed Systems
    ICDT 2021 : The Sixteenth International Conference on Digital Telecommunications Remote Filesystem Event Notification and Processing for Distributed Systems Kushal Thapa†‡, Vinay Lokesh*#, Stan McClellan†§ †Ingram School of Engineering *Dept. of Computer Science Texas State University San Marcos, TX, USA e-mail: ‡[email protected], #[email protected], §[email protected] Abstract— Monitoring and safeguarding the integrity of files networking solutions and architectures allow the users to in local filesystems is imperative to computer systems for many circumvent certain firewall restrictions, thus increasing purposes, including system security, data acquisition, and other complexity while introducing security risks. Here, we leverage processing requirements. However, distributed systems may the well-known network architecture where an Internet- have difficulty in monitoring remote filesystem events even reachable system acts as a middleman to establish a secure, though asynchronous notification of filesystem events on a bidirectional network connection between firewalled devices. remote, resource-constrained device can be very useful. This This approach is not new, however, comprehensive analysis paper discusses several aspects of monitoring remote filesystem of various parameters is difficult to obtain, so we provide some events in a loosely-coupled and distributed architecture. This results and discussion regarding the various configuration paper investigates a simple and scalable technique to enable secure remote file system monitoring using existing Operating options and performance of this architecture. System resident tools with minimum overhead. In Section II of this paper, we describe various tools that are generally used to monitor local filesystem events. We also Keywords— Secure Remote Filesystem Monitoring; Firewall; briefly discuss about Secure Shell Protocol Filesystem Distributed Architecture; Secure Network Communication; SSH; (SSHFS) [9] and Secure Shell Protocol (SSH) [12].
    [Show full text]
  • Freebsd Enterprise Storage Polish BSD User Group Welcome 2020/02/11 Freebsd Enterprise Storage
    FreeBSD Enterprise Storage Polish BSD User Group Welcome 2020/02/11 FreeBSD Enterprise Storage Sławomir Wojciech Wojtczak [email protected] vermaden.wordpress.com twitter.com/vermaden bsd.network/@vermaden https://is.gd/bsdstg FreeBSD Enterprise Storage Polish BSD User Group What is !nterprise" 2020/02/11 What is Enterprise Storage? The wikipedia.org/wiki/enterprise_storage page tells nothing about enterprise. Actually just redirects to wikipedia.org/wiki/data_storage page. The other wikipedia.org/wiki/computer_data_storage page also does the same. The wikipedia.org/wiki/enterprise is just meta page with lin s. FreeBSD Enterprise Storage Polish BSD User Group What is !nterprise" 2020/02/11 Common Charasteristics o Enterprise Storage ● Category that includes ser$ices/products designed &or !arge organizations. ● Can handle !arge "o!umes o data and !arge num%ers o sim#!tano#s users. ● 'n$olves centra!ized storage repositories such as SA( or NAS de$ices. ● )equires more time and experience%expertise to set up and operate. ● Generally costs more than consumer or small business storage de$ices. ● Generally o&&ers higher re!ia%i!it'%a"aila%i!it'%sca!a%i!it'. FreeBSD Enterprise Storage Polish BSD User Group What is !nterprise" 2020/02/11 EnterpriCe or EnterpriSe? DuckDuckGo does not pro$ide search results count +, Goog!e search &or enterprice word gi$es ~ 1 )00 000 results. Goog!e search &or enterprise word gi$es ~ 1 000 000 000 results ,1000 times more). ● /ost dictionaries &or enterprice word sends you to enterprise term. ● Given the *+,CE o& many enterprise solutions it could be enterPRICE 0 ● 0 or enterpri$e as well +.
    [Show full text]
  • 2 Linux Installation 5
    MRtrix Documentation Release 3.0 MRtrix contributors May 05, 2017 Install 1 Before you install 3 2 Linux installation 5 3 macOS installation 11 4 Windows installation 15 5 HPC clusters installation 19 6 Key features 23 7 Commands and scripts 25 8 Beginner DWI tutorial 27 9 Images and other data 29 10 Command-line usage 41 11 Configuration file 47 12 DWI denoising 49 13 DWI distortion correction using dwipreproc 51 14 Response function estimation 55 15 Maximum spherical harmonic degree lmax 61 16 Multi-tissue constrained spherical deconvolution 63 17 Anatomically-Constrained Tractography (ACT) 65 18 Spherical-deconvolution Informed Filtering of Tractograms (SIFT) 69 19 Structural connectome construction 73 20 Using the connectome visualisation tool 77 i 21 labelconvert: Explanation & demonstration 81 22 Global tractography 85 23 ISMRM tutorial - Structural connectome for Human Connectome Project (HCP) 89 24 Fibre density and cross-section - Single shell DWI 93 25 Fibre density and cross-section - Multi-tissue CSD 103 26 Expressing the effect size relative to controls 111 27 Displaying results with streamlines 113 28 Warping images using warps generated from other packages 115 29 Diffusion gradient scheme handling 117 30 Global intensity normalisation 123 31 Orthonormal Spherical Harmonic basis 125 32 Dixels and Fixels 127 33 Motivation for afdconnectivity 129 34 Batch processing with foreach 131 35 Frequently Asked Questions (FAQ) 135 36 Display issues 141 37 Unusual symbols on terminal 145 38 Compiler error during build 149 39 Hanging or Crashing 151 40 Advanced debugging 155 41 List of MRtrix3 commands 157 42 List of MRtrix3 scripts 307 43 List of MRtrix3 configuration file options 333 44 MRtrix 0.2 equivalent commands 341 ii MRtrix Documentation, Release 3.0 MRtrix provides a large suite of tools for image processing, analysis and visualisation, with a focus on the analysis of white matter using diffusion-weighted MRI Features include the estimation of fibre orientation distributions using constrained spherical deconvolution (Tournier et al.
    [Show full text]
  • Stan Reichardt
    Secure Linux to Linux Shares Saint Louis Unix Users Group https://www.sluug.org/ Stan Reichardt 2019-08-14 WHO Anybody here using ssh? Anybody here using sshfs? 2019-08-14 Stan Reichardt 2 Secure Linux to Linux Shares Secure Linux to Linux Shares ( Using sshfs instead of SAMBA ) 2019-08-14 Stan Reichardt 3 WHAT Mostly about using sshfs to securely share directories of files between Linux machines, instead of sharing using SAMBA. Demonstration will show useage for both: ● Command Line Interface (CLI) and ● Graphical User Interface (GUI) 2019-08-14 Stan Reichardt 4 WHAT Using sshfs instead of SAMBA. 2019-08-14 Stan Reichardt 5 WHY Using SAMBA may be needed. ● Family and friends may be using MS Windows. ● Work environment. Using SAMBA may not be needed. ● All my machines are running Linux. Using SAMBA may be broken out of the box. ● "Just works out of the box" may not be the experience. ● This is what I have been experiencing for about last two years. ● Known to be a wide spread useability issue. Using SAMBA may be difficult to fix or set up. ● An exercise in fixing something others may need. ● An exercise in fixing something I do not need. ● An exercise in fixing something I may never need. ● An exercise in fixing something I do not want. 2019-08-14 Stan Reichardt 6 WHAT user@example:~$ whatis ssh ssh (1) - OpenSSH SSH client (remote login program) 2019-08-14 Stan Reichardt 7 WHAT FUSERMOUNT(1) Filesystem in Userspace (FUSE) FUSERMOUNT(1) NAME fusermount - unmount FUSE filesystems ... ... More information about fusermount and the FUSE project can be found at http://fuse.sourceforge.net/ which then went to https://github.com/libfuse/libfuse > The reference implementation of the Linux FUSE (Filesystem in Userspace) interface > > About > > FUSE (Filesystem in Userspace) is an interface for userspace programs > to export a filesystem to the Linux kernel.
    [Show full text]
  • 27Th Large Installation System Administration Conference (LISA '13)
    conference proceedings Proceedings of the 27th Large Installation System Administration Conference 27th Large Installation System Administration Conference (LISA ’13) Washington, D.C., USA November 3–8, 2013 Washington, D.C., USA November 3–8, 2013 Sponsored by In cooperation with LOPSA Thanks to Our LISA ’13 Sponsors Thanks to Our USENIX and LISA SIG Supporters Gold Sponsors USENIX Patrons Google InfoSys Microsoft Research NetApp VMware USENIX Benefactors Akamai EMC Hewlett-Packard Linux Journal Linux Pro Magazine Puppet Labs Silver Sponsors USENIX and LISA SIG Partners Cambridge Computer Google USENIX Partners Bronze Sponsors Meraki Nutanix Media Sponsors and Industry Partners ACM Queue IEEE Security & Privacy LXer ADMIN IEEE Software No Starch Press CiSE InfoSec News O’Reilly Media Computer IT/Dev Connections Open Source Data Center Conference Distributed Management Task Force IT Professional (OSDC) (DMTF) Linux Foundation Server Fault Free Software Magazine Linux Journal The Data Center Journal HPCwire Linux Pro Magazine Userfriendly.org IEEE Pervasive © 2013 by The USENIX Association All Rights Reserved This volume is published as a collective work. Rights to individual papers remain with the author or the author’s employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. Permission is granted to print, primarily for one person’s exclusive use, a single copy of these Proceedings. USENIX acknowledges all trademarks herein. ISBN 978-1-931971-05-8 USENIX Association Proceedings of the 27th Large Installation System Administration Conference November 3–8, 2013 Washington, D.C. Conference Organizers Program Co-Chairs David Nalley, Apache Cloudstack Narayan Desai, Argonne National Laboratory Adele Shakal, Metacloud, Inc.
    [Show full text]