This requires the CT operators to have an adequate knowledge about the amount of radiation dose that is being delivered during routine procedures, as well as strategies to reduce radiation dose. Studies have…
Download file to see previous pages...
The protocols given below are used in the Department of Radiology and Molecular Imaging in king Abdul Aziz Hospital (KAH) in Saudi and in Sir Charles Gardean Hospital (SCGH) in Perth, WA. A 64-slice Siemens multi-detector computed tomography (MDCT) was recently introduced in KAH and is used for all CT procedures, including routine procedures. SCGH also has a 64-slice GE, which is used for all CT procedures.
In any x-ray system, the energy of the x-ray beam depends on its tube potential (kVp). Changes in kVp results in changes in radiation dose, image noise and image contrast. Radiation dose can be reduced up to 30% if kVp is reduced from 120 to 100. In addition, lowering the kVp to 100 during CTA for PE improves visualization of sub segmental arteries (Kubo et al 2008). A study by Hausleiter et al 2006, showed that in a 64-slice CT cardiac procedure, a 100 kV protocol used instead of a 120 kV protocol along with an ECG gated technique, resulted in a 64% reduction in the effective dose.
In liver imaging, 120 kVp is suitable and usually preferred than 140 kVp in order to reduce patient dose. Although it is said that that by reducing the kVp the image noise increases, the process leads to the improvement of tissue contrast (Laghi 2007).
Kim et al 2009, in their study, aimed to assess the effect on image quality and radiation dose with low-kilovoltage protocols by chest multidetector computed tomography (CT) examinations in adults. The study included 210 patients (83 women and 127 men with a mean age of 56.1 years). These patients were randomly assigned to one of three protocol groups: (1) protocol A (the standard protocol) with 120 kilovolt (peak) (kV[p]) and 100 effective milliampere-second (eff mA s); (2) protocol B, with 100 kV (p) and 140 eff mA s; and (3) protocol C, with 80 kV(p) and 180 eff mA s. Each group had 70 patients. A marginal
...Download file to see next pagesRead More
CT scans were initially developed to provide non-invasive imaging for the central nervous system. In the past 20 years, it has been used for three-dimensional imaging for multi body structures including vascular anatomy and organ perfusion physiology (Wesolowski, 2005).
This assignment will evaluate the case study of a patient where MDCT had been performed with 64 slices per revolution (Achenbach 2005). In CT angiography, acquisition of multiple images with a single revolution of the X-ray tube and provision of multislice images (Gopal et al.
At home, one gets bogged down by a ringing phone, a washing machine that overflows and has to be replaced, or an emergency errand like getting to the cleaners with a suit one needs for the next day. If one has kids, one's daily routine can begin with the realization that everything planned must be unplanned.
Constantly the organisation is supposed to invest in knowledge management so as to empower its employees.
Efforts to improve both internal processes as well as the external process in an organisation should also involve adopting the right technology so as to improve production and service delivery in the organisation.
CT imaging is more prone for artifacts when compared to conventional radiography because "the image is reconstructed from something on the order of a million independent detector measurements. The reconstruction
Other than the enormous cost of sedation to the children, the current scanners, may expose the children patients to unnecessary radiation which has long term consequences. The machines also consume a vast deal of energy leading to high operation costs.
In this literature review, the standardized procedure for CT scan of head, chest and abdomen is evaluated in comparison with the procedures for CT used at King Saud Medical Complex (KSMC) to look for optimization and to deduce the best practice related to Computed
Vulnerability scanners of different types are used to operate for various levels of invasiveness. Simple vulnerabilities scanners only check the information about software version and windows registry and determine whether
Domain name system (DNS) was added in the edirectory 8.7.1 as a discovery protocol. The domain name system is a type of edirectory discovery protocol that enables the user to locate and translate internet domain
1 Pages(250 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Routine CT scanning protocols for FREE!