Shadow Image Processing of X-Ray Screening System for Aviation Security

Автор: Maksym Zaliskyi, Olga Shcherbyna, Lidiia Tereshchenko, Alina Osipchuk, Olena Zharova

Журнал: International Journal of Image, Graphics and Signal Processing @ijigsp

Статья в выпуске: 6 vol.14, 2022 года.

Бесплатный доступ

The aviation security is an important component of aviation safety providing. One of the main goals of aviation security service is to detect dangerous and prohibited objects during passengers and baggage screening. For this purpose, aviation security personnel use various equipment: X-ray screening system, body-scans, metal detectors, moving ions detectors, explosive trace detectors. The X-ray screening system gives information on internal structure of baggage. The main disadvantage of X-ray screening system is rather high level of the false alarm probability. This requires developing new methods of image processing and recognition of dangerous and prohibited objects on the background of other objects. This article develops the principles of shadow image processing while screening the baggage using X-ray system to fix the mentioned disadvantage. The math equation for shadow image is obtained based on the laws of geometry and Beer-Lambert equation taking into account the chosen scanning technique. Based on this, the article is focused to the analysis of simple objects images and their application for complex objects recognition. The article discusses the example of handgun recognition using a new approach based on spectral analysis of developed shadow images. The results of the research can be used for improvement of algorithmic toolkit in aviation security automatic decision-making system while screening the baggage by X-ray equipment.

Еще

Aviation Security, X-Ray Equipment, Shadow Image Reconstruction, Objects Recognition, Scanning Methods.

Короткий адрес: https://sciup.org/15018733

IDR: 15018733   |   DOI: 10.5815/ijigsp.2022.06.03

Текст научной статьи Shadow Image Processing of X-Ray Screening System for Aviation Security

Safety is the key point for general, corporate, military and commercial aviation [1]. The safety is the condition, for which risks of aviation events are reduced and controlled to an acceptable level [2]. Maintaining and increasing the level of safety is the most important task for civil aviation [3, 4].

Aviation safety can be considered as a dynamic stochastic process [5, 6] that depends on many factors including airport organizational structure, reliability of aviation equipment, human factor, environmental conditions [2, 7]. The aviation safety depends on the influence of unintentional and deliberate actions. The unintentional actions are associated with the random occurrence of different aviation events. For example, the aircraft safety depends on: a) the serviceable operation of radio equipment of flight providing such as radar, navigation systems, communication devices [8]; b) the efficiency of data processing techniques for modern radio equipment in different environmental conditions [9, 10]; c) the psychological state of the pilot, especially in a stressful situation [6].

The deliberate actions are associated with aviation security. The aviation security is an important component for safety of aviation providing. The purpose of aviation security services is to ensure aviation safety, the efficiency of civil aviation airports by implementing measures to protect against acts of unlawful interference in accordance with current rules, recommended practices and procedures [11].

In order to evaluate the planning of civil aviation security measures, a general strategy should be developed taking into account the trends in the occurrence of threats and international requirements [12]. The main principles that regulate the aviation security service are following:

  • –    security measures applied at a specific airport or aerodrome must be adequate to the level of threat to civil aviation that exists at a specific time;

  • –    any civil aircraft may not fly outside the certain country without the permission of the civil aviation authority;

  • –    any person may not be admitted on board of aircraft located in a restricted area of airport without a valid reason;

  • –    any person or vehicle may not enter or pass through the restricted area of the airport without passing established security control procedures;

  • –    items, as well as hand luggage, baggage, courier and express items, mail, on-board supplies excluding standard equipment of the aircraft, may not be placed on board without passing security control;

  • –    all aviation personnel and other specialists (persons), whose work belongs to the branch of interests of civil aviation and concerns the interests of aviation security, may be allowed to perform such work only after they graduate appropriate training.

Based on a systematic approach and analysis, the International Civil Aviation Organization (ICAO) identified the main threats to aviation safety: hijacking of aircraft by terrorists and other criminal elements and acts of sabotage; illegal transportation of dangerous goods; dangers during aircraft flights caused by aggressive or mentally unbalanced passengers; use of surface-to-air missiles by terrorists; illegal transportation of nuclear and radioactive substances; cyberterrorism.

While planning aviation security, it is necessary to solve the following problems:

  • 1.    Minimization of explosions impact. In paper [13], the analysis of using conventional explosives in attacks on airports is carried out and recommendations are given for the detection and disposal of improvised explosive devices placed in vehicles or baggage items.

  • 2.    The protection of passengers and personnel. This is a primary problem, which means the practical development of permanent or temporary protection of air transport passengers, service personnel and visitors from attacks with the use of firearms and grenades [14]. Solution of this problem is associated with recommendations for the use of bulletproof fabrics, materials capable of resisting explosions or grenades, as well as for preventing (in the interests of the customs service) the transfer of contraband goods from one group of violators to another.

  • 3.    Access control. Reducing the number of full-time employees who need access to restricted areas is an obvious, but often ignored security measure [15]. Baggage drop-off points are often located in restricted area where they should not be. In places where baggage is issued to passengers of international lines, the requirements of the local customs service can be ensured by other means, but taking out the baggage places from the restricted zone can significantly reduce the risk of passengers re-entering this zone and provide the impossibility to enter it by unauthorized persons.

  • 4.    Perimeter protection. This problem is often treated as secondary, although the lack of such protection creates favorable conditions for terrorists to attack airport infrastructure or aircraft and is often the object of criticism from the mass media, usually in connection with some aviation incidents. Solution of this problem is associated with usage of technical devices of alarm system, security closed television systems, lighting and passive infrared detectors [16].

  • 5.    Protection against cyberterrorism. Threats of cyberterrorism are new and, at the same time, the most dangerous threats of the 21st century [17]. Cyberterrorism can manifest itself in various forms. The simplest of them is psychological warfare aimed at spreading disinformation using mass media to disrupt the normal operation of airports and airlines [18]. This can cause the refusal of air passengers to fly, which will affect the economy of countries that depend on civil aviation. Other dangerous threats of cyberterrorism can lead to serious disturbances with fatal consequences for people, disorganization of airports and damage to aircraft in flight. The actions of cyberterrorists against airports and airplanes are significantly different from traditional terrorist and criminal attacks on civil aviation facilities. Cyberterrorists can, acting from one location, affect events in hundreds of other locations on a global scale.

  • 2.    Analysis of Signal Processing at X-ray Screenning and the Research Problem Statement

Solution of this problem is associated with development of new methods for detecting DDoS attacks [19], cyber incidents [20], analysis of the security of sites and equipment with access to the Internet [21], analysis of the efficiency of the use of information web-resources [22] and others.

One of the main goals of aviation security service is to detect dangerous and prohibited objects during passengers and baggage screening [23]. For this purpose, aviation security personnel use various equipment: X-ray screening system, body-scans, metal detectors, moving ions detectors, explosive trace detectors. Modern airports use three to five levels of inspection for baggage. The screening of passengers is carried out line mode. The X-ray screening system provides information on internal structure of baggage objects and gives possibility to detect explosives, narcotics, firearms, cold weapon and other dangerous and prohibited objects [24].

According to the modern recommendations of air terminals building, it is assumed that all baggage undergoes automatic inspection with the help of X-ray screening systems. Unfortunately, the high reliability of detection of dangerous objects and materials (the probability of correct detection is above 0.99) is also accompanied by high levels of the false alarm probability (this probability is approximately equal to 0.15 ... 0.3) [24, 25]. The timely and correct detection of dangerous and prohibited objects has significant influence not only the aviation safety, but also aircraft departures and arrivals delays [26], increasing the throughput rates for each aviation security inspection line [27].

The main reasons of rather high level of the false alarm probability are:

  • 1.    Dependence of detection performance on obtained image quality [28].

  • 2.    Disadvantages in terms of probabilistic characteristics of imaging technologies and used algorithms for recognition of dangerous and prohibited objects while X-ray screening [29].

  • 3.    Human factor [30].

  • 4.    Equipment malfunction and failures [31, 32].

The human factor is taken into account mainly through the aviation personnel training. At the same time, special software is being developed, such as threat image projection. This software is installed on X-ray screening systems [33]. Threat image projection generates and puts fictitious images of dangerous objects on X-ray images of real baggage that is being checked. In addition, paper [34] analyses the color compositions obtained based on threat image projection merging algorithm. The authors proved that this algorithm increases the efficiency of detection and confidence level, provides shorter reaction times compared with standard technique of computer-based X-ray screening training images.

The methods of operational efficiency increasing suppose improvement of maintenance techniques [35, 36] and equipment diagnostics and repair [37], reliability analysis for deteriorating systems [38, 39], developing methods of statistical data processing [40, 41], implementation of control and support system for equipment lifecycle.

Список литературы Shadow Image Processing of X-Ray Screening System for Aviation Security

  • S. K. Cusick, A. I. Cortes and C. C. Rodrigues, Commercial Aviation Safety, Sixth Edition, New York: McGraw-Hill Education, 2012, 696 p.
  • Doc 9859, Safety Management Manual. Montreal: International Civil Aviation Organization, 2018.
  • M. Chen, Y. Zhang and Y. Chen, “Review on Civil Aviation Safety Investment Research,” In 2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS), 2016, pp. 1–5, doi: 10.1109/ICRMS.2016.8050113.
  • I. Ostroumov and N. Kuzmenko, “Statistical Analysis and Flight Route Extraction from Automatic Dependent Surveillance-Broadcast Data,” In 2022 Integrated Communication, Navigation and Surveillance Conference (ICNS),2022, pp. 1–9, doi: 10.1109/ICNS54818.2022.9771515.
  • I. V. Ostroumov and N. S. Kuzmenko, “Accuracy Estimation of Alternative Positioning in Navigation,” In 4th International Conference on Methods and Systems of Navigation and Motion Control, 2016, pp. 291–294, doi:10.1109/MSNMC.2016.7783164.
  • T. Shmelova, D. Bondarev and Y. Znakovska, “Modeling of the Decision Making by UAV’s Operator in Emergency Situations,” In 4th International Conference on Methods and Systems of Navigation and Motion Control, 2016, pp. 31–34, doi: 10.1109/MSNMC.2016.7783099.
  • I. Ostroumov and N. Kuzmenko, “Configuration Analysis of European Navigational Aids Network,” In 2021 Integrated Communications Navigation and Surveillance Conference (ICNS), 2021, pp. 1–9, doi: 10.1109/ICNS52807.2021.9441576.
  • A. I. Nosich, Y. M. Poplavko, D. M. Vavriv and F. J. Yanovsky, “Microwaves in Ukraine,” IEEE Microwave Magazine, Vol. 3, No. 4, pp. 82–90, Dec. 2002, doi: 10.1109/MMW.2002.1145680.
  • R. B. Sinitsyn and F. J. Yanovsky, “Acoustic Noise Atmospheric Radar with Nonparametric Copula Based Signal Processing,” Telecommunications and Radio Engineering, Vol. 71, No. 4, 2012, pp. 327–335, doi: 10.1615/TelecomRadEng.v71.i4.30.
  • R. B. Sinitsyn and F. J. Yanovsky, “MIMO Radar Copula Ambiguity Function,” In European Microwave Week 2012: “Space for Microwaves”, EuMW 2012, Conference Proceedings – 9th European Radar Conference, EuRAD 2012, 31 Oct.-2 Nov. 2012, Amsterdam, Netherlands, pp. 146–149.
  • Annex 17 to the Convention on International Civil Aviation, Security, Montreal: ICAO, 2006.
  • Wu Wei, “The Application Research of Airport Security Information Management System on the Field of Civil Aviation Security,” In International Carnahan Conference on Security Technology, 2009, pp. 277–280, doi: 10.1109/CCST.2009.5335522.
  • M. Merzbacher and T. Gable, “Applying Data Mining to False Alarm Reduction in an Aviation Explosives Detection System,” In 44th Annual 2010 IEEE International Carnahan Conference on Security Technology, 2010, pp. 161–164, doi: 10.1109/CCST.2010.5678738.
  • D. Li and H. Chen, “Review of Security Inspection Networking System Development in China Airports and Its Trend in the Future,” In Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology, 2005, pp. 178–181, doi: 10.1109/CCST.2005.1594825.
  • R. Lazarick, “Applications of Technology in Airport Access Control,” In Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology, 2001, pp. 85–95, doi: 10.1109/CCST.2001.962817.
  • A. S. Barry, K. P. Dickie and D. S. Mazel, “Perimeter Security at San Francisco International Airport: Leveraging Independent, Existing Systems to Form an Integrated Solution,” In 2009 IEEE Conference on Technologies for Homeland Security, 2009, pp. 35–42, doi: 10.1109/THS.2009.5168012.
  • S. Gnatyuk, “Critical Aviation Information Systems Cybersecurity,” Meeting Security Challenges Through Data Analytics and Decision Support, NATO Science for Peace and Security Series, D: Information and Communication Security. IOS Press Ebooks, 2016, Vol. 47, № 3, рр. 308–316, doi: 10.3233/978-1-61499-716-0-308.
  • M. Kalimoldayev, S. Tynymbayev, S. Gnatyuk, M. Ibraimov and M. Magzom, “The Device for Multiplying Polynomials Modulo an Irreducible Polynomial,” News of the National Academy of Sciences of the Republic of Kazakhstan, Series of Geology and Technical Sciences, 2019, № 2 (434), pp. 199–205.
  • M. Zaliskyi, R. Odarchenko, S. Gnatyuk, Y. Petrova and A. Chaplits, “Method of Traffic Monitoring for DDoS Attacks Detection in E-Health Systems and Networks,” CEUR Workshop Proceedings, 2018, Vol. 2255, pp 193–204.
  • Z. Hu, R. Odarchenko, S. Gnatyuk, M. Zaliskyi, A. Chaplits, S. Bondar and V. Borovik, “Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior,” International Journal of Computer Network and Information Security (IJCNIS), 2020, Vol. 12, No 6, pp 1–13,doi: 10.5815/ijcnis.2020.06.01.
  • S. Gnatyuk, B. Akhmetov, V. Kozlovskyi, V. Kinzeryavyy, M. Aleksander and D. Prysiazhnyi, “New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis,” Advances in Intelligent Systems and Computing, 2020, Vol. 1126, pp. 93–104, doi: 10.1007/978-3-030-39162-1_9.
  • M. Dyvak, A. Melnyk, A. Kovbasistyi, R. Shevchuk, O. Huhul and V. Tymchyshyn, “Mathematical Modeling of the Estimation Process of Functioning Efficiency Level of Information Web-Resources,” In 10th International Conference on Advanced Computer Information Technologies, 2020, pp. 492–496, doi: 10.1109/ACIT49673.2020.9208846.
  • L. Ji and Y. Mou, “Research on the Feasibility of Application of Millimeter-wave Security Screening Equipment in Civil Aviation,” In 2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT), 2021, pp. 71-75, doi: 10.1109/ICCASIT53235.2021.9633747.
  • O. O. Semenov, Aviation Security Equipment, Kyiv: NAU, 2013, 264 p. (in Ukrainian)
  • D. Anderson, “Optimising Multi-layered Security Screening,” Journal of Transportation Security, Vol. 14, 2021, pp. 249–273, doi: 10.1007/s12198-021-00237-3.
  • I. Ostroumov et al., “A Probability Estimation of Aircraft Departures and Arrivals Delays,” In: Gervasi O. et al. (eds) “Computational Science and Its Applications – ICCSA 2021,” Lecture Notes in Computer Science, Vol. 12950, 2021, pp. 363–377, doi: 10.1007/978-3-030-86960-1_26.
  • K. Leone, “Security System Throughput Modeling,” In Proceedings of 36th Annual 2002 International Carnahan Conference on Security Technology, 2002, pp. 144–150, doi: 10.1109/CCST.2002.1049240.
  • P. Gupta, Z. Sinno, J. L. Glover, N. G. Paulter and A. C. Bovik, “Predicting Detection Performance on Security X-Ray Images as a Function of Image Quality,” IEEE Transactions on Image Processing, Vol. 28, No. 7, 2019, pp. 3328–3342, doi: 10.1109/TIP.2019.2896488.
  • S. Almazroui, W. Wang and G. Zhang, “Imaging Technologies in Aviation Security,” European Journal of Applied Sciences, Vol. 3, No. 4, 2015, pp. 12–27, doi: 10.14738/aivp.34.1433.
  • J. Skorupski and P. Uchroński, “A Human Being as a Part of the Security Control System at the Airport,” Procedia Engineering, Vol. 134, 2016, pp. 291–300, doi: 10.1016/j.proeng.2016.01.010.
  • O. Solomentsev, M. Zaliskyi, T. Herasymenko and Y. Petrova, “Data Processing Method for Deterioration Detection during Radio Equipment Operation,” In 2019 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), 2019, pp. 1–4, doi: 10.1109/MTTW.2019.8897232.
  • O. Solomentsev, M. Zaliskyi, O. Shcherbyna and O. Kozhokhina, “Sequential Procedure of Changepoint Analysis During Operational Data Processing,” In 2020 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), 2020, pp. 168–171, doi: 10.1109/MTTW51045.2020.9245068.
  • V. Cutler and S. Paddock, “Use of Threat Image Projection (TIP) to Enhance Security Performance,” In 43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, pp. 46–51, doi: 10.1109/CCST.2009.5335565.
  • C. C. von Bastian, A. Schwaninger and S. Michel, “The Impact of Color Composition on X-ray Image Interpretation in Aviation Security Screening,” In 43rd Annual 2009 International Carnahan Conference on Security Technology, 2009, pp. 201–205, doi: 10.1109/CCST.2009.5335539.
  • A. V. Goncharenko, “Optimal UAV Maintenance Periodicity Obtained on the Multi-optional Basis,” In Proceedings of IEEE 4th International Conference on Actual Problems of UAV Developments, 2017, pp 65–68, doi: 10.1109/APUAVD.2017.8308778.
  • A. Raza and V. Ulansky, “Optimization of Condition Monitoring Decision Making by the Criterion of Minimum Entropy,” Entropy (Basel), Vol. 21, Issue 12, 2019, pp 1193, doi: 10.3390/e21121193.
  • O. Shcherbyna et al., “Diagnostic Process Efficiency Analysis for Block Diagram of Electric Field Parameters Meter,” In IEEE XIIth International Conference on Electronics and Information Technologies (ELIT), 2021, pp. 5–9, doi: 10.1109/ELIT53502.2021.9501136.
  • O. V. Solomentsev, M. Yu. Zaliskyi, O. V. Zuiev and M. M. Asanov, “Data Processing in Exploitation System of Unmanned Aerial Vehicles Radioelectronic Equipment,” In IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments (APUAVD), 2013, pp. 77–80, doi: 10.1109/APUAVD.2013.6705288.
  • M. Zaliskyi et al., “Sequential Method of Reliability Parameters Estimation for Radio Equipment,” In IEEE XIIth International Conference on Electronics and Information Technologies (ELIT), 2021, pp. 37–40. doi: 10.1109/ELIT53502.2021.9501099.
  • M. Zaliskyi and O. Solomentsev, “Method of Sequential Estimation of Statistical Distribution Parameters in Control Systems Design,” In IEEE 3rd International Conference Methods and Systems of Navigation and Motion Control (MSNMC), 2014, pp. 135–138. doi: 10.1109/MSNMC.2014.6979752.
  • O. Solomentsev, M. Zaliskyi and O. Zuiev, “Radioelectronic Equipment Availability Factor Models,” In Signal Processing Symposium 2013 (SPS 2013), 2013, pp. 1–4. doi: 10.1109/SPS.2013.6623616.
  • C. Luo, Y. Hao and Z. Tong, “Research on Digital Image Processing Technology and Its Application,” In Proceedings of the 2018 8th International Conference on Management, Education and Information (MEICI 2018), 2018, pp. 587–592, doi: 10.2991/meici-18.2018.116.
  • R. Alberts, Modeling and Control of Image Processing for Interventional X-Ray, Eindhoven: Technische Universiteit Eindhoven, 2010, 202 p.
  • I. Prokopenko, I. Omelchuk and M. Maloyed, “Synthesis of Signal Detection Algorithms under Conditions of Aprioristic Uncertainty,” In IEEE Ukrainian Microwave Week, 2020, pp 418–423, doi: 10.1109/UkrMW49653.2020.9252687.
  • O. Shmatko et al., “Synthesis of the Optimal Algorithm and Structure of Contactless Optical Device for Estimating the Parameters of Statistically Uneven Surfaces,” Radioelectronic and Computer Systems, No. 4, 2021, pp. 199–213, doi: 10.32620/reks.2021.4.16.
  • L. Wang, A. Mohammad-Djafari and N. Gac, “X-ray Computed Tomography Simultaneous Image Reconstruction and Contour Detection Using a Hierarchical Markovian Model,” In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 6070–6074, doi: 10.1109/ICASSP.2017.7953322.
  • R. Gesick, C. Saritac and C.-C. Hung, “Automatic Image Analysis Process for the Detection of Concealed Weapons,” In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, 2009, pp. 1–12, doi: 10.1145/1558607.1558630.
  • V. Riffo and D. Mery, “Automated Detection of Threat Objects Using Adapted Implicit Shape Model,” IEEE Transactions on Systems, Man, and Cybernetics Systems, Vol. 46, No. 4, 2016, pp. 472–482, doi: 10.1109/TSMC.2015.2439233.
  • S. Akçay, M. E. Kundegorski, M. Devereux and T. P. Breckon, “Transfer Learning Using Convolutional Neural Networks for Object Classification within X-ray Baggage Security Imagery,” In 2016 IEEE International Conference on Image Processing (ICIP), 2016, pp. 1057–1061, doi: 10.1109/ICIP.2016.7532519.
  • B. Gu, R. Ge, Y. Chen, L. Luo and G. Coatrieux, “Automatic and Robust Object Detection in X-Ray Baggage Inspection Using Deep Convolutional Neural Networks,” IEEE Transactions on Industrial Electronics, Vol. 68, No. 10, 2021, pp. 10248–10257, doi: 10.1109/TIE.2020.3026285.
  • Y. F. A. Gaus, N. Bhowmik, S. Akçay, P. M. Guillén-Garcia, J. W. Barker and T. P. Breckon, “Evaluation of a Dual Convolutional Neural Network Architecture for Object-wise Anomaly Detection in Cluttered X-ray Security Imagery,” In 2019 International Joint Conference on Neural Networks (IJCNN), 2019, pp. 1–8, doi: 10.1109/IJCNN.2019.8851829.
  • J. Zhang, X. Song, J. Feng and J. Fei, “X-Ray Image Recognition Based on Improved Mask R-CNN Algorithm,” Mathematical Problems in Engineering, Vol. 2021, pp. 1–14, doi: 10.1155/2021/6544325.
  • I. V. Ostroumov, K. Marais and N. S. Kuzmenko, “Aircraft Positioning Using Multiple Distance Measurements and Spline Prediction,” Aviation, Vol. 26, Issue 1, 2022, pp. 1-10, doi:10.3846/aviation.2022.16589.
  • I. G. Prokopenko, “Robust Methods and Algorithms of Signal Processing,” In 2017 IEEE Microwaves, Radar and Remote Sensing Symposium (MRRS), 2017, pp. 71–74, doi: 10.1109/MRRS.2017.8075029.
  • Y. Averyanova et al., “Polarimetric-radar Drop Size Evaluation for Wind Speed Estimate Based on Weber Criterion,” In Signal Processing Symposium (SPSympo), 2021, pp 17–22, doi: 10.1109/SPSympo51155.2020.9593349.
  • I. V. Ostroumov, N. S. Kuzmenko and K. Marais, “Optimal Pair of Navigational Aids Selection,” In 5th International Conference on Methods and Systems of Navigation and Motion Control, 2018, pp. 32–35, doi: 10.1109/MSNMC.2018.8576293.
  • Y. Averyanova et al., “Model for Wind-related Phenomena Estimation Using Polarization Characteristics of Microwave Radar Signal,” In IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, 2022, pp. 173–177, doi: 10.1109/TCSET55632.2022.9767049.
  • V. Volosyuk et al., “Optimal Method for Polarization Selection of Stationary Objects against the Background of the Earth’s Surface,” International Journal of Electronics and Telecommunications, 2022, Vol. 68, No. 1, pp. 83–89. doi: 10.24425/ijet.2022.139852.
  • S. Zhyla et al., “Statistical Synthesis of Aerospace Radars Structure with Optimal Spatio-temporal Signal Processing, Extended Observation Area and High Spatial Resolution,” Radioelectronic and Computer Systems, 2022, No. 1 (101), pp. 178–194, doi: 10.32620/reks.2022.1.14.
  • V. Chikovani, O. Sushchenko and H. Tsiruk, “Redundant Information Processing Techniques Comparison for Differential Vibratory Gyroscope,” Eastern-European Journal of Enterprise Technologies, 2016, Vol. 4, No 7 (82), pp 45–52, doi: 10.15587/1729-4061.2016.75206.
  • Yu. Averyanova, A. Averyanov and F. Yanovsky, “The Approach to Estimating Critical Wind Speed in Liquid Precipitation using Radar Polarimetry,” In International Conference on Mathematical Methods in Electromagnetic Theory, MMET, 2012, pp. 517–520, doi: 10.1109/MMET.2012.6331259.
  • F. J. Yanovsky and I. M. Braun, “Models of Scattering on Hailstones in X-band,” In First European Radar Conference, EURAD, Amsterdam, Netherlands, 2004, pp. 229–232.
  • A. K. Shukla, Medical Imaging Methods: Theory and Applications. Boca Raton: CRC Press, 2022, 200 p.
  • J. Hsieh, B. Nett, Z. Yu, K. Sauer, J.-B. Thibault and C. A. Bouman, “Recent Advances in CT Image Reconstruction,” Current Radiology Reports, Vol. 1, 2013, pp. 39–51, doi: 10.1007/s40134-012-0003-7.
  • V. Hnatushenko, V. Hnatushenko, V. Kashtan, O. Reuta and I. Udovyk, “Voxel Approach to the Shadow Formation Process in Image Analysis,” In 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021, pp. 33–36, doi: 10.1109/IDAACS53288.2021.9660909.
  • B. D. Man and S. Basu, “Distance-driven Projection and Backprojection in Three Dimensions,” Physics in Medicine and Biology, Vol. 49, No 11, 2004, pp. 2463–2475, doi: 10.1088/0031-9155/49/11/024.
  • J. A. Fessler, “Statistical Image Reconstruction Methods for Transmission Tomography,” In: J. M. Fitzpatrick and M. Sonka (eds), “Handbook of Medical Imaging, Volume 2. Medical Image Processing and Analysis,” 2000, pp. 1–70, doi: 10.1117/3.831079.ch1.
  • J. Jakubek, “Data Processing and Image Reconstruction Methods for Pixel Detectors,” Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, Vol. 576, No 1, 2007, pp. 223–234. doi: 10.1016/j.nima.2007.01.157.
  • R. K. Schulze, O. Weinheimer, D. D. Brüllmann, F. Röder, B. d'Hoedt and E. Schoemer, “Software for Automated Application of a Reference-based Method for a Posteriori Determination of the Effective Radiographic Imaging Geometry,” Dentomaxillofac Radiology, Vol. 34, No 4, 2005, pp. 205–211. doi: 10.1259/dmfr/56357032. PMID: 15961593.
Еще
Статья научная