Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
CT scan
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Aviation security=== CT scanning has also found an application in transport security (predominantly [[airport security]]) where it is currently used in a materials analysis context for explosives detection [[CTX (explosive-detection device)]]<ref>{{Cite book |last1=P. Babaheidarian |title=Anomaly Detection and Imaging with X-Rays (ADIX) III |last2=D. Castanon |editor-first1=Joel A. |editor-first2=Michael E. |editor-first3=Mark A. |editor-first4=Amit |editor-last1=Greenberg |editor-last2=Gehm |editor-last3=Neifeld |editor-last4=Ashok |date=2018 |isbn=978-1-5106-1775-9 |pages=12 |chapter=Joint reconstruction and material classification in spectral CT |doi=10.1117/12.2309663 |s2cid=65469251}}</ref><ref name="jin12securityct">{{Cite book |last1=P. Jin |title=Second International Conference on Image Formation in X-Ray Computed Tomography |last2=E. Haneda |last3=K. D. Sauer |last4=C. A. Bouman |date=June 2012 |chapter=A model-based 3D multi-slice helical CT reconstruction algorithm for transportation security application |access-date=2015-04-05 |chapter-url=https://engineering.purdue.edu/~bouman/publications/orig-pdf/CT-2012a.pdf |archive-url=https://web.archive.org/web/20150411000659/https://engineering.purdue.edu/~bouman/publications/orig-pdf/CT-2012a.pdf |archive-date=2015-04-11 |url-status=dead}}</ref><ref name="jin12securityctprior">{{Cite book |last1=P. Jin |title=Signals, Systems and Computers (ASILOMAR), 2012 Conference Record of the Forty Sixth Asilomar Conference on |last2=E. Haneda |last3=C. A. Bouman |date=November 2012 |publisher=IEEE |pages=613β636 |chapter=Implicit Gibbs prior models for tomographic reconstruction |access-date=2015-04-05 |chapter-url=https://engineering.purdue.edu/~bouman/publications/pdf/Asilomar-2012-Pengchong.pdf |archive-url=https://web.archive.org/web/20150411025559/https://engineering.purdue.edu/~bouman/publications/pdf/Asilomar-2012-Pengchong.pdf |archive-date=2015-04-11 |url-status=dead}}</ref><ref name="kisner13securityct">{{Cite book |last1=S. J. Kisner |title=Security Technology (ICCST), 2013 47th International Carnahan Conference on |last2=P. Jin |last3=C. A. Bouman |last4=K. D. Sauer |last5=W. Garms |last6=T. Gable |last7=S. Oh |last8=M. Merzbacher |last9=S. Skatter |date=October 2013 |publisher=IEEE |chapter=Innovative data weighting for iterative reconstruction in a helical CT security baggage scanner |access-date=2015-04-05 |chapter-url=https://engineering.purdue.edu/~bouman/publications/pdf/iccst2013.pdf |archive-url=https://web.archive.org/web/20150410234541/https://engineering.purdue.edu/~bouman/publications/pdf/iccst2013.pdf |archive-date=2015-04-10 |url-status=dead}}</ref> and is also under consideration for automated baggage/parcel security scanning using [[computer vision]] based object recognition algorithms that target the detection of specific threat items based on 3D appearance (e.g. guns, knives, liquid containers).<ref name="megherbi10baggage">{{Cite book |last1=Megherbi, N. |title=Proc. International Conference on Image Processing |last2=Flitton, G.T. |last3=Breckon, T.P. |date=September 2010 |publisher=IEEE |isbn=978-1-4244-7992-4 |pages=1833β1836 |chapter=A Classifier based Approach for the Detection of Potential Threats in CT based Baggage Screening |citeseerx=10.1.1.188.5206 |doi=10.1109/ICIP.2010.5653676 |access-date=5 November 2013 |chapter-url=http://www.durham.ac.uk/toby.breckon/publications/papers/megherbi10baggage.pdf |s2cid=3679917 }}{{Dead link|date=November 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref><ref name="megherbi12baggage">{{Cite book |last1=Megherbi, N. |title=Proc. International Conference on Image Processing |last2=Han, J. |last3=Flitton, G.T. |last4=Breckon, T.P. |date=September 2012 |publisher=IEEE |isbn=978-1-4673-2533-2 |pages=3109β3112 |chapter=A Comparison of Classification Approaches for Threat Detection in CT based Baggage Screening |citeseerx=10.1.1.391.2695 |doi=10.1109/ICIP.2012.6467558 |access-date=5 November 2013 |chapter-url=http://www.durham.ac.uk/toby.breckon/publications/papers/megherbi12baggage.pdf |s2cid=6924816 }}{{Dead link|date=November 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref><ref name="flitton13interestpoint">{{Cite journal |last1=Flitton, G.T. |last2=Breckon, T.P. |last3=Megherbi, N. |date=September 2013 |title=A Comparison of 3D Interest Point Descriptors with Application to Airport Baggage Object Detection in Complex CT Imagery |url=http://www.durham.ac.uk/toby.breckon/publications/papers/flitton13interestpoint.pdf |journal=Pattern Recognition |volume=46 |pages=2420β2436 |bibcode=2013PatRe..46.2420F |doi=10.1016/j.patcog.2013.02.008 |access-date=5 November 2013 |number=9 |hdl=1826/15213 |s2cid=3687379 }}{{Dead link|date=November 2023 |bot=InternetArchiveBot |fix-attempted=yes}}</ref> Its usage in airport security pioneered at [[Shannon Airport]] in March 2022 has ended the ban on liquids over 100 ml there, a move that [[Heathrow Airport]] plans for a full roll-out on 1 December 2022 and the TSA spent $781.2 million on an order for over 1,000 scanners, ready to go live in the summer.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)