{"title":"比较成像和非成像技术减少背景杂波和分辨远距离点源","authors":"R. Wurtz, K. Ziock, L. Fabris, R. Graham","doi":"10.1109/NSSMIC.2005.1596266","DOIUrl":null,"url":null,"abstract":"To reach maximum sensitivity, any method used to search for orphan sources must be insensitive to local variations of the background. Using imaging and non-imaging techniques, we analyzed the same data acquired by a large-area, coded-mask-imager search instrument. Data from many passes past a 1 mCi source at 65 m from the instrument were used to construct a model of the instrument response. We then used the model to \"hide\" the source in data taken in a light urban environment. We compared the success of detecting the hidden sources using coded-mask imaging methods, pseudo-imaging based on a zero-area matched filter, and non-imaging using simple thresholding. The results clearly indicate the superiority of imaging with the coded-mask techniques returning the best results","PeriodicalId":105619,"journal":{"name":"IEEE Nuclear Science Symposium Conference Record, 2005","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Comparing imaging and non-imaging techniques for reducing background clutter and resolving distant point sources\",\"authors\":\"R. Wurtz, K. Ziock, L. Fabris, R. Graham\",\"doi\":\"10.1109/NSSMIC.2005.1596266\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To reach maximum sensitivity, any method used to search for orphan sources must be insensitive to local variations of the background. Using imaging and non-imaging techniques, we analyzed the same data acquired by a large-area, coded-mask-imager search instrument. Data from many passes past a 1 mCi source at 65 m from the instrument were used to construct a model of the instrument response. We then used the model to \\\"hide\\\" the source in data taken in a light urban environment. We compared the success of detecting the hidden sources using coded-mask imaging methods, pseudo-imaging based on a zero-area matched filter, and non-imaging using simple thresholding. The results clearly indicate the superiority of imaging with the coded-mask techniques returning the best results\",\"PeriodicalId\":105619,\"journal\":{\"name\":\"IEEE Nuclear Science Symposium Conference Record, 2005\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Nuclear Science Symposium Conference Record, 2005\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NSSMIC.2005.1596266\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Nuclear Science Symposium Conference Record, 2005","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSSMIC.2005.1596266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparing imaging and non-imaging techniques for reducing background clutter and resolving distant point sources
To reach maximum sensitivity, any method used to search for orphan sources must be insensitive to local variations of the background. Using imaging and non-imaging techniques, we analyzed the same data acquired by a large-area, coded-mask-imager search instrument. Data from many passes past a 1 mCi source at 65 m from the instrument were used to construct a model of the instrument response. We then used the model to "hide" the source in data taken in a light urban environment. We compared the success of detecting the hidden sources using coded-mask imaging methods, pseudo-imaging based on a zero-area matched filter, and non-imaging using simple thresholding. The results clearly indicate the superiority of imaging with the coded-mask techniques returning the best results