Methods and systems for the rapid detection of concealed objects

a technology of concealed objects and methods, applied in the direction of material analysis using wave/particle radiation, liquid/fluent solid measurement, instruments, etc., can solve the problems of compromising detection performance, difficult interpretation of radiographs, and inability to calculate the actual atomic number of dual-energy methods. , to achieve the effect of reducing the dependence on operator skill and performan

Inactive Publication Date: 2005-03-17
RAPISCAN INC
View PDF14 Cites 148 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

is to provide for improved processing techniques performed in association with various scanning systems. The improved processing techniques enable the substantially automated detection of threats and decrease the dependence on operator skill and performance.

Problems solved by technology

These radiographs are often difficult to interpret because objects are superimposed.
With a large number of such radiographs to be interpreted, and with the implied requirement to keep the number of false alarms low, operator fatigue and distraction can compromise detection performance.
However, the dual-energy method does not readily allow for the calculation of the actual atomic number of the concealed ‘threat’ itself, but rather yields only an average atomic number that represents the mix of the various items falling within the X-ray beam path, as the contents of an actual luggage is composed of different items and rarely conveniently separated.
Thus dual-energy analysis is often confounded.
Even if the atomic number of an item could be measured, the precision of this measurement would be compromised by X-ray photon noise to the extent that many innocuous items would show the “same” atomic number as many threat substances, and therefore the atomic number in principle cannot serve as a sufficiently specific classifier for threat versus no threat.
However, conventional CT systems take considerable time to perform multiple scans, to capture data, and to reconstruct the images.
The throughput of CT systems is generally low.
Coupled with the size and expense of CT systems this limitation has hindered CT use in applications such as baggage inspection where baggage throughput is an important concern.
In addition, CT alarms on critical mass and density of a threat, but such properties are not unique to explosives.
CT based systems suffer from high false alarm rate.
Each of the prior art systems and methods, however, suffer from low processing rates because the scatter interaction cross sections are relatively small and the exposure times required to obtain useful diffraction spectra are long, in the range of seconds and minutes.
However, the use of CT scanning is still inefficient, not threat specific, and does not allow for rapid scanning of objects.
The disclosed system does not, however, address critical problems that arise in the course of the frequency of false alarms by applying threat specific analysis.
These objects may be considered threats, such as an illegal drug, an explosive material, or a weapon.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and systems for the rapid detection of concealed objects
  • Methods and systems for the rapid detection of concealed objects
  • Methods and systems for the rapid detection of concealed objects

Examples

Experimental program
Comparison scheme
Effect test

second embodiment

In a second embodiment, the transmission detector array functions as an imaging detector to provide precise attenuation data for certain areas in containers, like container wall areas, where contraband can be hidden. When the circular beam is centered on an edge of a container, the edge of the container can be imaged in good detail, and can help analyze the edges for concealed threats.

third embodiment

In a third embodiment, transmission detector measurements can be used to determine whether the inspection region is, in fact, the same target region previously identified in the first stage scan. If the transmission data correlates with X-ray characteristics different than those obtained in the first stage scan, the relative positioning of the second stage scanning system and the object under inspection may be modified until the transmission data correlates with the same material characteristics that was identified in the first stage scan.

fourth embodiment

In a fourth embodiment, transmission detector data are also being used to simplify the algorithm-training procedure of the system, as described below, in particular the collection of threat material properties with irregularly shaped threat samples, like sticks of dynamite.

It should be noted that it would appear because the scatter radiation path and transmission path differ downstream from the scatter volume, there would be inconsistencies in the data when scatter and transmission data are combined. This inconsistency is one example of a number of partial volume effects, solutions for which are addressed herein. However, the inconsistencies are not significant and can be tolerated without encountering significant performance degradation of the system as a whole. As shown, FIG. 4 is not an isometric schematic and, in reality, the scatter angle is preferably about 3 degrees, and the real path differences are comparatively smaller.

As previously discussed, the second stage scanning ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

PropertyMeasurementUnit
scatter angleaaaaaaaaaa
scatter angleaaaaaaaaaa
volumeaaaaaaaaaa
Login to view more

Abstract

The present invention provides for an improved scanning process having a first stage to rapidly identify a threat location and a second stage to accurately identify the nature of the threat. The improved scanning process maintains a high degree of accuracy while still providing an operationally desirable high throughput. The present invention also uses improved processing techniques that enable the substantially automated detection of threats and decrease the dependence on operator accuracy. One embodiment of the present invention provides an apparatus for identifying an object concealed within a container. It comprises a first stage inspection system having at least two X-ray projection systems to generate a first set of data and a plurality of processors in data communication with the first stage inspection system. The processors process the first set of data to generate at least two images. The two images are used to identify at least one target region from the two images. A second stage inspection system is then used to generate an inspection region which is then positioned relative to the target region and made to at least partially physically coincide with the target region. A second set of data is produced specifically from the inspection region, data which have a high degree of specificity for the material in the inspection region.

Description

FIELD OF THE INVENTION The present invention relates generally to X-ray based methods and systems for detection of concealed threats, and threat resolution, and more specifically to improved methods and systems, using dual stage scanning to process luggage for faster inspection with reduced false alarm rate. BACKGROUND OF THE INVENTION Conventional X-ray systems produce radiographic projection images, which are then interpreted by an operator. These radiographs are often difficult to interpret because objects are superimposed. A trained operator must study and interpret each image to render an opinion on whether or not a target of interest, a threat, is present. With a large number of such radiographs to be interpreted, and with the implied requirement to keep the number of false alarms low, operator fatigue and distraction can compromise detection performance. Advanced technologies, such as dual-energy projection imaging and Computed Tomography (CT), are being used for contraban...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G01V5/00
CPCG01V5/0016G01V11/00G01V5/0025G01R27/06G01N22/00G01F23/284
Inventor PESCHMANN, KRISTIAN R.
Owner RAPISCAN INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products