Shape threat detection via adaptive computed tomography

Ahmad Masoudi, Ratchaneekorn Thamvichai, Mark A. Neifeld

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations


X-ray Computed Tomography (CT) is used widely for screening purposes. Conventional x-ray threat detection systems employ image reconstruction and segmentation algorithms prior to making threat/no-threat decisions. We find that in many cases these pre-processing steps can degrade detection performance. Therefore in this work we will investigate methods that operate directly on the CT measurements. We analyze a fixed-gantry system containing 25 x-ray sources and 2200 photon counting detectors. We present a new method for improving threat detection performance. This new method is a so-called greedy adaptive algorithm which at each time step uses information from previous measurements to design the next measurement. We utilize sequential hypothesis testing (SHT) in order to derive both the optimal "next measurement" and the stopping criterion to insure a target probability of error Pe. We find that selecting the next x-ray source according to such a greedy adaptive algorithm, we can reduce Pe by a factor of 42.4× relative to the conventional measurement sequence employing all 25 sources in sequence.

Original languageEnglish (US)
Title of host publicationAnomaly Detection and Imaging with X-Rays (ADIX)
EditorsMichael E. Gehm, Amit Ashok, Mark A. Neifeld
ISBN (Electronic)9781510600881
StatePublished - 2016
EventAnomaly Detection and Imaging with X-Rays (ADIX) Conference - Baltimore, United States
Duration: Apr 19 2016Apr 20 2016

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
ISSN (Print)0277-786X
ISSN (Electronic)1996-756X


OtherAnomaly Detection and Imaging with X-Rays (ADIX) Conference
Country/TerritoryUnited States


  • Adaptive Imaging System
  • Computational Imaging System
  • Computed Tomography

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering


Dive into the research topics of 'Shape threat detection via adaptive computed tomography'. Together they form a unique fingerprint.

Cite this