|
The papers in this volume were part of the technical conference cited on the cover and title page. Papers were selected and subject to review by the editors and conference program committee. Some conference presentations may not be available for publication. Additional papers and presentation recordings may be available online in the SPIE Digital Library at SPIEDigitalLibrary.org. The papers reflect the work and thoughts of the authors and are published herein as submitted. The publisher is not responsible for the validity of the information or for any outcomes resulting from reliance thereon. Please use the following format to cite material from these proceedings: Author(s), “Title of Paper,” in Anomaly Detection and Imaging with X-Rays (ADIX), edited by Amit Ashok, Mark A. Neifeld, Michael E. Gehm, Proceedings of SPIE Vol. 9847 (SPIE, Bellingham, WA, 2016) Six-digit Article CID Number. ISSN: 0277-786X ISSN: 1996-756X (electronic) ISBN: 9781510600881 Published by SPIE P.O. Box 10, Bellingham, Washington 98227-0010 USA Telephone +1 360 676 3290 (Pacific Time) · Fax +1 360 647 1445 Copyright © 2016, Society of Photo-Optical Instrumentation Engineers. Copying of material in this book for internal or personal use, or for the internal or personal use of specific clients, beyond the fair use provisions granted by the U.S. Copyright Law is authorized by SPIE subject to payment of copying fees. The Transactional Reporting Service base fee for this volume is $18.00 per article (or portion thereof), which should be paid directly to the Copyright Clearance Center (CCC), 222 Rosewood Drive, Danvers, MA 01923. Payment may also be made electronically through CCC Online at copyright.com. Other copying for republication, resale, advertising or promotion, or any form of systematic or multiple reproduction of any material in this book is prohibited except with permission in writing from the publisher. The CCC fee code is 0277-786X/16/$18.00. Printed in the United States of America. Publication of record for individual papers is online in the SPIE Digital Library. Paper Numbering: Proceedings of SPIE follow an e-First publication model. A unique citation identifier (CID) number is assigned to each article at the time of publication. Utilization of CIDs allows articles to be fully citable as soon as they are published online, and connects the same identifier to all online and print versions of the publication. SPIE uses a six-digit CID article numbering system structured as follows:
AuthorsNumbers in the index correspond to the last two digits of the six-digit citation identifier (CID) article numbering system used in Proceedings of SPIE. The first four digits reflect the volume number. Base 36 numbering is employed for the last two digits and indicates the order of articles within the volume. Numbers start with 00, 01, 02, 03, 04, 05, 06, 07, 08, 09, 0A, 0B...0Z, followed by 10-1Z, 20-2Z, etc. Allouche, Genevieve G., 0F Arguello, Henry, 0Z Ashok, Amit, 0B, 0F, 0T Azevedo, Stephen G., 0D Barlow, Jason, 0P Bilgin, Ali, 0U Bosch, Carl, 0P Bouman, Charles A., 0K Boyd, Douglas P., 0M Brady, David J., 06, 0A, 0E, 0R, 0X Can, Ali, 0J, 0L, 0O Carin, Lawrence, 0R, 0Y Champley, Kyle E., 0D Clarkson, Eric W., 0S, 0U Coccarelli, David, 0B, 0F, 0Q Cushing, Johnathan B., 0U D’Aries, Lawrence J., 0G Davies, Mike E., 0O De Man, Bruno, 0J, 0L Degirmenci, Soysal, 0P Ely, Austin, 0M Enyeart, John, 0M Fritsch, Sebastian, 04 Fu, Lin, 0J, 0L Gehm, Michael E., 0B, 0F, 0Q Gong, Qian, 0B, 0F, 0Q Greenberg, Joel A., 06, 0A, 0B, 0E, 0Q, 0R, 0W, 0X Griffin, Lewis D., 0N Haneda, Eri, 0J, 0L Harvey, T., 02 Hassan, Laila, 0C Hassan, Mehadi, 0E, 0X Hayden, Danielle, 0C Holmgren, Andrew D., 0A, 0R, 0X Huang, Liang-Chih James, 0B, 0F, 0T Iniewski, Kris, 0E Jaccard, Nicolas, 0N Johnson, Chad, 0M Kaganovsky, Yan, 0R Kim, Namho, 0M Kisner, Sherman J., 0K Kwon, Junghyun, 0M Lee, Jongkyu, 0M Lexa, Michael A., 0O Liao, Xuejun, 0Y Lin, Yuzhang, 0B, 0F Luo, Jiajia, 0J, 0L MacDonald, C. A., 0C Mandava, Sagar, 0U Marquez, Miguel A., 0Z Martz, Harry E., Jr., 0D Masoudi, Ahmad, 0H Mesika, Assaf, 0P Miller, Eric, 0V Miller, Stuart R., 0G Mojica, Edson, 0Z Morton, Edward J., 0N Mrozack, Alex, 0Y Nagarkar, Vivek V., 0G Neifeld, Mark A., 0H Odinaka, Ikenna, 0A, 0R, 0X O’Sullivan, Joseph A., 0P, 0R Perelli, Alessandro, 0O Petruccelli, Jonathan C., 0C Politte, David G., 0P, 0R Ramani, Sathish, 0J, 0L Robertson, Rob, 0G Rogers, Thomas W., 0N Schlomka, Jens-Peter, 04 Seetho, Issac M., 0D Singh, Bipin, 0G Skatter, Sondre, 04, 0K, 0Y Smith, Jerel A., 0D Song, Samuel M., 0M Sridhar, Venkatesh, 0K Starr-Baier, Sean, 0C Stoian, Razvan-Ionut, 0B, 0F, 0Q Tahir, Sajjad, 0C Thamvichai, Ratchaneekorn, 0H Tracey, Brian, 0V Ur Rehman, Mahboob, 0C Vera, Esteban, 0Q Wolter, Scott D., 0W Yuan, Yaoshen, 0V Zhu, Yunhui, 09 Conference CommitteeSymposium Chair Symposium Co-chair Conference Chairs
Conference Program Committee
Session Chairs
IntroductionWe would like to begin by thanking everyone who participated in the inaugural SPIE Anomaly Detection and Imaging with X-Rays (ADIX) conference. It is our hope that this will be the first of many such meetings that can bring together the broad range of expertise/interest characterizing this important discipline. Indeed, this first meeting involved participation by all segments of the community, government, industry, and academia, resulting in a vibrant and intellectually rewarding forum for exchange of ideas. Although x-ray imaging has its roots in medical imaging, advances in x-ray component technology coupled with the exponential growth in computational capability has fueled the expansion of x-ray imaging to numerous defense and security applications. For example, x-ray based imaging systems are now widely deployed at security checkpoints for explosive and contraband detection at airports, seaports, commercial and military building and installations. Another modern application of x-ray imaging is non-destructive part inspection for industrial and aviation safety. While the application base for X-ray based anomaly detection and imaging continues to grow, the x-ray imaging system architecture (inspired by medical CT) has remained largely unchanged. However, recently non-traditional x-ray imaging architectures and sophisticated post-processing algorithms have begun to emerge which leverage advances in mathematical theory of sampling (e.g. compressive sensing) together with increased exploitation of available signal and task prior information. Reviewing the collection of excellent talks that were presented at the meeting, it was clear that the conference provided a much needed venue for researchers to address current and future challenges through advances in all aspects of x-ray based anomaly detection and imaging: ranging from component technology, reconstruction and data exploitation algorithms, imaging/sensing system architectures to system performance metrics and novel defense and security applications. The conference began with a very engaging keynote address [9847-2] by Dr. Eric Houser from the United States Transportation Security Administration (TSA) who described not only the substantial technical challenges associated with explosive threat detection in airports, but also the regulatory, administrative; and ‘ecosystem’ challenges that arise from the combination of government, industry, and academic participants in this important enterprise. Following the keynote address, the ADIX conference was organized into four Session Topic Areas (STAs), the first of which was X-Ray Scatter and Phase Anomaly Imaging and Detection. A plurality of papers in this STA describe research projects related to novel measurement architectures and reconstruction methods for exploiting Raleigh scattering for materials identification and liquid/low-density threat detection. Taken together these papers illuminate some of the tradeoffs associated with scatter-based x-ray measurements in both the scanning and snapshot modalities. Also in this STA we find several excellent papers on the topic of x-ray phase measurement presenting new ideas about sources, detectors, and phase retrieval algorithms and the information theoretic limits of this novel modality. The next STA on day one was X-ray Photoabsorption Anomaly Imaging and Detection and these papers described various refinements for improving the performance of dual-energy, multi-energy, multi-angle, and/or adaptive measurements in the photo-absorption modality. On day two of ADIX we began with the STA X-ray CT Reconstruction and Exploitation Algorithms. The ten papers in this STA described how the latest advances in nonlinear optimization, machine learning, and graphical inference can be applied to all of the modalities discussed during day one. As a testament to the importance of these advanced algorithms, many of these papers describe numerical acceleration to enable real-time operation. Our last STA was X-ray System Design/Analysis and Forward-model and the six paper in this STA addressed a multitude of important topics related to the rapid simulation of x-ray/matter interaction physics, development and application of system design and decision metrics. From this brief overview of the papers presented at the inaugural ADIX conference, it was clear that the field of Anomaly Detection and Imaging with X-Rays is currently experiencing significant innovation. The papers included in this volume describe important advances on many of the topics described in our original call for papers such as coded-apertures designs, non-traditional system architectures, coherent and incoherent scatter, phase-contrast based x-ray imaging/sensing systems, adaptive measurement, task-specific system design, and compressive scan geometries for direct and reconstruction-based anomaly detection/estimation. Amit Ashok Mark A. Neifeld Michael E. Gehm |