Medical image segmentation in digital mammography
Advanced algorithmic approaches to medical image segmentation
The utility of x-ray dual-energy transmission and scatter technologies for illicit material detection
Negative coeffcient polynomial kernel density estimation for visualization
MOAS'07 Proceedings of the 18th conference on Proceedings of the 18th IASTED International Conference: modelling and simulation
A Method of X-Ray Image Recognition Based on Fuzzy Rule and Parallel Neural Networks
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Part II--Advances in Neural Networks
Negative Coeffcient Polynomial kernel density estimation for visualization
MS '07 The 18th IASTED International Conference on Modelling and Simulation
EPCE'11 Proceedings of the 9th international conference on Engineering psychology and cognitive ergonomics
Image enhancement optimization for hand-luggage screening at airports
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Combining iterative inverse filter with shock filter for baggage inspection image deblurring
ACCV'06 Proceedings of the 7th Asian conference on Computer Vision - Volume Part II
Computers and Industrial Engineering
Automatic segmentation of unknown objects, with application to baggage security
ECCV'12 Proceedings of the 12th European conference on Computer Vision - Volume Part II
Hi-index | 0.08 |
The detection of explosives and illicit material for the purposes of aviation security is an important area for preventing terrorism and smuggling. A number of different methods of explosive detection have been developed in the past that can detect such material from a very small up to a very large quantity. For the purposes of aviation security, the checks are performed on passengers, their carry on luggage, checked baggage, and cargo containers. Similar technology is used in post-offices for detecting dangerous substances in mail. In this paper we review some of these technologies and in particular discuss the application of computers for the analysis of data and images generated from security equipment.