A tomographic metal detection and characterization system has been designed and built for recovering information about magnetic and/or conductive objects within the detector space. This information is gathered as a result of a ‘walk-through’ scan of a candidate in the same manner as for a typical security metal detector archway. Following the passage of the candidate, the system uses measurements from an array of coils to calculate the polarizability tensor, which describes the low frequency electromagnetic characteristic of a small metallic object when it interacts with an ac magnetic field. In addition to the magnetic polarizability dyadic tensor, the position of the perturbation is also determined as a product of the inversion algorithm. The system has been tested and is capable of inverting object tensors with <20% typical parameter variation, and determines three-dimensional object location with a typical error of less than ±3 cm. In this paper, results are shown from a set of four different test object examples, each with a different magnetic polarizability tensor. This object set consists of a ferrite sphere, a ferrite rod and phantom aluminium and steel handgun shapes.
Surgical Science is a peer reviewed international journal dedicated to the latest advancement of surgery. The goal of this journal is to keep a record of the state-of-the-art research and to promote study, research and improvement within its various specialties.
The field of Quantum Information Science is the most challenging and hot topic among all branches of science. This field is also quite interdisciplinary in character, and people from quantum theory, computer science, mathematics, information theory, condensed matter physics, many-body physics and many more have been actively involved to understand implications of quantum mechanics in information processing.
Theoretical Economics Letters (TEL) seeks high quality short papers in all topics in economic theory and mathematical economics. It also considers papers that empirically or experimentally test existing theories or assumptions. In addition, there is a section for work-in-progress, limited to one page.
A. Fragkiadakis, V. Siris, and N. Petroulakis. Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)
W. Xu, W. Trappe, Y. Zhang, and T. Wood. Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, page 46--57. New York, NY, USA, ACM, (2005)
C. Pöpper, M. Strasser, and S. Capkun. Proceedings of the 18th conference on USENIX security symposium, page 231--248. Berkeley, CA, USA, USENIX Association, (2009)
J. Bellardo, and S. Savage. Proceedings of the 12th conference on USENIX Security Symposium, volume 12 of SSYM'03, Berkeley, CA, USA, USENIX Association, (2003)
D. Liu, J. Raymer, and A. Fox. 9th International Conference on Mobile Adhoc and Sensor Systems (MASS), page 335-343. IEEE Computer Society, (December 2012)
M. Schäfer, V. Lenders, and I. Martinovic. Applied Cryptography and Network Security, volume 7954 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
J. Singer. Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software, page 91--102. New York, NY, USA, ACM, (2011)