Share Email Print

Proceedings Paper

Rapid GPU-based simulation of x-ray transmission, scatter, and phase measurements for threat detection systems
Author(s): Qian Gong; David Coccarelli; Razvan-Ionut Stoian; Joel Greenberg; Esteban Vera; Michael Gehm
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

To support the statistical analysis of x-ray threat detection, we developed a very high-throughput x-ray modeling framework based upon GPU technologies and have created three different versions focusing on transmission, scatter, and phase. The simulation of transmission imaging is based on a deterministic photo-absorption approach. This initial transmission approach is then extended to include scatter effects that are computed via the Born approximation. For phase, we modify the transmission framework to propagate complex ray amplitudes rather than radiometric quantities. The highly-optimized NVIDIA OptiX API is used to implement the required ray-tracing in all frameworks, greatly speeding up code execution. In addition, we address volumetric modeling of objects via a hierarchical representation structure of triangle-mesh-based surface descriptions. We show that the x-ray transmission and phase images of complex 3D models can be simulated within seconds on a desktop computer, while scatter images take approximately 30-60 minutes as a result of the significantly greater computational complexity.

Paper Details

Date Published: 12 May 2016
PDF: 8 pages
Proc. SPIE 9847, Anomaly Detection and Imaging with X-Rays (ADIX), 98470Q (12 May 2016); doi: 10.1117/12.2223244
Show Author Affiliations
Qian Gong, Duke Univ. (United States)
David Coccarelli, Duke Univ. (United States)
Razvan-Ionut Stoian, Duke Univ. (United States)
Joel Greenberg, Duke Univ. (United States)
Esteban Vera, Duke Univ. (United States)
Michael Gehm, Duke Univ. (United States)

Published in SPIE Proceedings Vol. 9847:
Anomaly Detection and Imaging with X-Rays (ADIX)
Amit Ashok; Mark A. Neifeld; Michael E. Gehm, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?