StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Routine CT scanning protocols - Essay Example

Cite this document
Summary
This requires the CT operators to have an adequate knowledge about the amount of radiation dose that is being delivered during routine procedures, as well as strategies to reduce radiation dose. Studies have…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Routine CT scanning protocols
Read Text Preview

Extract of sample "Routine CT scanning protocols"

Download file to see previous pages

The protocols given below are used in the Department of Radiology and Molecular Imaging in king Abdul Aziz Hospital (KAH) in Saudi and in Sir Charles Gardean Hospital (SCGH) in Perth, WA. A 64-slice Siemens multi-detector computed tomography (MDCT) was recently introduced in KAH and is used for all CT procedures, including routine procedures. SCGH also has a 64-slice GE, which is used for all CT procedures. In any x-ray system, the energy of the x-ray beam depends on its tube potential (kVp).

Changes in kVp results in changes in radiation dose, image noise and image contrast. Radiation dose can be reduced up to 30% if kVp is reduced from 120 to 100. In addition, lowering the kVp to 100 during CTA for PE improves visualization of sub segmental arteries (Kubo et al 2008). A study by Hausleiter et al 2006, showed that in a 64-slice CT cardiac procedure, a 100 kV protocol used instead of a 120 kV protocol along with an ECG gated technique, resulted in a 64% reduction in the effective dose.

In liver imaging, 120 kVp is suitable and usually preferred than 140 kVp in order to reduce patient dose. Although it is said that that by reducing the kVp the image noise increases, the process leads to the improvement of tissue contrast (Laghi 2007). Kim et al 2009, in their study, aimed to assess the effect on image quality and radiation dose with low-kilovoltage protocols by chest multidetector computed tomography (CT) examinations in adults.  The study included 210 patients (83 women and 127 men with a mean age of 56.1 years). These patients were randomly assigned to one of three protocol groups: (1) protocol A (the standard protocol) with 120 kilovolt (peak) (kV[p]) and 100 effective milliampere-second (eff mA s); (2) protocol B, with 100 kV (p) and 140 eff mA s; and (3) protocol C, with 80 kV(p) and 180 eff mA s.

Each group had 70 patients. A marginal

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Routine CT scanning protocols Essay Example | Topics and Well Written Essays - 3250 words”, n.d.)
Routine CT scanning protocols Essay Example | Topics and Well Written Essays - 3250 words. Retrieved from https://studentshare.org/miscellaneous/1565616-routine-ct-scanning-protocols
(Routine CT Scanning Protocols Essay Example | Topics and Well Written Essays - 3250 Words)
Routine CT Scanning Protocols Essay Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/miscellaneous/1565616-routine-ct-scanning-protocols.
“Routine CT Scanning Protocols Essay Example | Topics and Well Written Essays - 3250 Words”, n.d. https://studentshare.org/miscellaneous/1565616-routine-ct-scanning-protocols.
  • Cited: 0 times

CHECK THESE SAMPLES OF Routine CT scanning protocols

Advanced Routing Protocols

The paper "Advanced Routing protocols" tells us about the Internet.... hellip; The power & speed of the Internet has achieved this level because of the routing protocols that have ensured smooth & reliable performance irrespective of the number of nodes getting added continuously.... The routing protocols can propagate millions of network changes across the globe within a small timeframe to every routing device connected to the Internet....
27 Pages (6750 words) Essay

STATEGIC BUSINESS

This became a major hassle for those who were working with new and old networking protocols.... Some of the main protocols that TLS supports are HTTP, IMAP, POP3, and SMTP.... It also gives a keen insight into the various aspects of Internet protocol - it's main strengths, weaknesses and core areas for improvement....
28 Pages (7000 words) Essay

Network Security Planning

Network infrastructure devices aims at providing a wide range and different variety of access protocols.... This includes asynchronous and console connections, In addition to protocols based on remote access such as HTTP, Telnet, rlogin and SSH.... It entails establishing a security baseline for securing the main management planes in an organization....
2 Pages (500 words) Research Paper

Spanning Tree Protocol Issues

isco utilises additional spanning trees in seeking to ensure that the protocols operate smoothly in environments where there are several virtual LANs in existence.... The spanning tree protocol (STP) refers to a network protocol utilised in the creation of a topology that is free from loops that occur on bridged Ethernet networks....
1 Pages (250 words) Essay

Applications of Graph Theory

It is also referred to as the study of graphs.... It is a mathematical branch that focuses on encoding networks and measurement of network properties (Mandal et al.... 2012).... A graph refers to a set… The graph theory originated in 1735, as Euler attempted to solve the Koinsberg bridge problem and later constructed a graphical structure known as the Eulerian graph....
4 Pages (1000 words) Assignment

Networking Technologies, Applications and Issues

This essay "Networking Technologies, Applications and Issues" discusses the Advanced Research Projects Agency Network that was designed to form a network that would help communication between devices.... It also discusses why and how ARPANET changed into the Internet.... nbsp;… The growing demand for a network that could synchronize different smaller networks to facilitate data communication worldwide led to the invention of the internet....
6 Pages (1500 words) Essay

Optimizing MPLS Traffic Engineering

… Proposals for Optimising MPLS Traffic Engineering Abstract An important effect of traffic engineering is the elimination of path congestion.... TE does not necessarily go for the shortest distance between two domains; two different packets can travel Proposals for Optimising MPLS Traffic Engineering Abstract An important effect of traffic engineering is the elimination of path congestion....
12 Pages (3000 words) Assignment

Advanced Routing in the Computer Networking Environment

In this network task paper "Advanced Routing in the Computer Networking Environment",  several factors will be considered where two different protocols exist in two different network segments and especially when there is an interest to upgrade the network system from the current IPv4 to IPv6.... For it to be deployed, the current arrangement is mostly preferred to be left just as it is together with its protocols and hence a new protocol, which is compatible with the existing system, is therefore installed into the system....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us