Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEMS AND METHODS FOR HIGH THROUGHPUT ANOMALY DETECTION WITH 3-D MILLIMETER WAVE IMAGING
Document Type and Number:
WIPO Patent Application WO/2022/216512
Kind Code:
A1
Abstract:
Systems and methods for detecting anomalies in an envelope including scanning an envelope moving along a conveyor with multiple millimeter wave imaging sensor modules and collecting reflection measurements from the sensor modules. The systems and methods can further include constructing a one or more voxel thick horizontal 3D image of the envelope and then creating an image of the envelope comprising the magnitude of the mean of the one or more voxel layers. The image of the envelope can be fed into a binary logistic regression classifier to provide a probability that the envelope contains an anomaly from the classifier. The systems and methods can include causing the envelope to be diverted from the conveyor for further inspection when the probability is greater than a selected threshold.

Inventors:
GANSE ANDREW (US)
MADDEN CHRISTINE (US)
WATTS CLAIRE (US)
PEDROSS-ENGEL ANDREAS (US)
REYNOLDS MATTHEW (US)
Application Number:
PCT/US2022/022754
Publication Date:
October 13, 2022
Filing Date:
March 31, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
THRUWAVE INC (US)
International Classes:
G06K9/62; G06N20/00; G06Q10/08; G06T7/00
Domestic Patent References:
WO2018147929A22018-08-16
Foreign References:
US20160275441A12016-09-22
US20150186839A12015-07-02
US20200171548A12020-06-04
US20070009085A12007-01-11
Other References:
SHCHEPETILNIKOV A. V.; GUSIKHIN P. A.; MURAVEV V. M.; TSYDYNZHAPOV G. E.; NEFYODOV YU. A.; DREMIN A. A.; KUKUSHKIN I. V.: "New Ultra-Fast Sub-Terahertz Linear Scanner for Postal Security Screening", JOURNAL OF INFRARED, MILLIMETER AND TERAHERTZ WAVES, SPRINGER NEW YORK LLC, US, vol. 41, no. 6, 7 May 2020 (2020-05-07), US , pages 655 - 664, XP037196559, ISSN: 1866-6892, DOI: 10.1007/s10762-020-00692-4
Attorney, Agent or Firm:
CARPENTER, John, W. et al. (US)
Download PDF:
Claims:
What is claimed is:

1 . A system for detecting anomalies in a parcel, the system comprising: a conveyor operative to carry a parcel; an array of millimeter wave transmitting and receiving antennas disposed proximate to the conveyor and operative to produce millimeter wave data; an image reconstruction processor configured to produce a three-dimensional millimeter wave image using the millimeter wave data; and a classification processor configured to estimate a probability that the parcel contains an anomaly using a logistic regression classifier operating on at least a portion of the millimeter wave image.

2. The system of Claim 1 wherein the classification processor generates a trigger signal to divert the parcel when the probability that the parcel contains an anomaly exceeds a selected threshold.

3. The system of Claim 1 wherein the logistic regression classifier utilizes a one or more voxel thick slice of the three-dimensional image to calculate the probability that the parcel contains an anomaly.

4. The system of Claim 1 wherein the anomaly comprises a non-paper inclusion in the parcel.

5. The system of Claim 1 wherein the three-dimensional millimeter wave image is comprised of voxels, each having an associated millimeter wave reflectivity.

6. The system of Claim 5 wherein the millimeter wave reflectivity comprises a real portion and an imaginary portion.

7. The system of Claim 5 wherein the logistic regression classifier operates on the magnitude of the mean of one or more voxel layers comprising the millimeter wave image.

8. A method for detecting anomalies in a parcel, comprising: scanning a parcel moving along a conveyor with multiple millimeter wave imaging sensor modules; collecting reflection measurements from the sensor modules; constructing a one or more voxel thick horizontal 3D image of the parcel; creating an image of the parcel comprising the magnitude of the mean of the one or more voxel layers; feeding the image of the parcel into a logistic regression classifier; receiving a probability that the parcel contains an anomaly from the classifier; and causing the parcel to be diverted from the conveyor when the probability is greater than a selected threshold.

9. The method of claim 8, wherein the classifier is trained using a set of labeled images.

Description:
SYSTEMS AND METHODS FOR HIGH THROUGHPUT ANOMALY DETECTION WITH 3-D MILLIMETER WAVE IMAGING

CROSS-REFERENCE TO RELATED APPLICATION

[0001] This application claims the benefit of and priority to U.S. Provisional Patent Application No. 63/173,322, filed April 9, 2021 , the disclosure of which is incorporated herein by reference in its entirety.

TECHNICAL FIELD

[0002] This patent application is directed to imaging systems, and more specifically, to high-throughput imaging systems used to scan envelopes and thin packages for contraband.

BACKGROUND

[0003] Screening and verification of mail and package contents by non-destructive methods has long been of interest in commercial and government applications in order to detect contraband items such as passports, credit cards, blades, and drugs. The past few decades have seen increasing exploration of higher-frequency electromagnetic imaging technologies for these purposes, and examples of relevant computer vision detection have been seen in fields including airport security and industrial inspection. Even with the existing applications of higher-frequency electromagnetic imaging technologies there is still a need for higher throughput screening with improved accuracy.

SUMMARY

[0004] In some embodiments, a system for detecting anomalies in a parcel can include a conveyor operative to carry a parcel, an array of millimeter wave transmitting and receiving antennas disposed proximate to the conveyor and operative to produce millimeter wave data, an image reconstruction processor configured to produce a three- dimensional millimeter wave image using the millimeter wave data, and a classification processor configured to estimate a probability that the parcel contains an anomaly using a logistic regression classifier operating on at least a portion of the millimeter wave image.

[0005] In some aspects of the technology, the classification processor generates a trigger signal to divert the parcel when the probability that the parcel contains an anomaly exceeds a selected threshold. In some aspects, the logistic regression classifier utilizes a one or more voxel thick slice of the three-dimensional image to calculate the probability that the parcel contains an anomaly. In some aspects, the anomaly comprises a non paper inclusion in the parcel. In various aspects of the technology, the three-dimensional millimeter wave image is comprised of voxels, each having an associated millimeter wave reflectivity. In some aspects, the millimeter wave reflectivity comprises a real portion and an imaginary portion. In some aspects, the logistic regression classifier operates on the magnitude of the mean of one or more voxel layers comprising the millimeter wave image.

[0006] In some embodiments, a method for detecting anomalies in a parcel can include scanning a parcel moving along a conveyor with multiple millimeter wave imaging sensor modules, collecting reflection measurements from the sensor modules, and constructing a one or more voxel thick horizontal 3D image of the parcel. An image of the parcel can be created comprising the magnitude of the mean of the one or more voxel layers. In some embodiments, the image of the parcel can be fed into a logistic regression classifier. The method can also include receiving a probability that the parcel contains an anomaly from the classifier and causing the parcel to be diverted from the conveyor when the probability is greater than a selected threshold. In some aspects of the technology, the classifier is trained using a set of labeled images.

BRIEF DESCRIPTION OF THE DRAWINGS

[0007] The systems and methods described herein may be better understood by referring to the following Detailed Description in conjunction with the accompanying drawings, in which like reference numerals indicate identical or functionally similar elements: [0008] FIG. 1 is a diagram illustrating a high throughput anomaly detection system according to some embodiments of the disclosed technology;

[0009] FIG. 2 includes examples of image plots of envelopes containing various items of contraband derived according to some embodiments of the disclosed technology;

[0010] FIG. 3A illustrates image intensity distributions for images of envelopes with and without contraband according to some embodiments of the disclosed technology;

[0011] FIG. 3B illustrates a plot corresponding the FIG. 3A showing fit of a logistic regression model to the maximum intensities according to some embodiments of the disclosed technology;

[0012] FIG. 4 illustrates a plot of ROC curves showing performance for 6, 3, and 2 sensor modules according to some embodiments of the disclosed technology;

[0013] FIG. 5 is a flow diagram showing a method for detecting anomalies in an envelope according to some embodiments of the disclosed technology;

[0014] FIG. 6 is a block diagram illustrating an overview of devices on which some implementations can operate;

[0015] FIG. 7 is a block diagram illustrating an overview of an environment in which some implementations can operate; and

[0016] FIG. 8 is a block diagram illustrating components which, in some implementations, can be used in a system employing the disclosed technology.

[0017] The headings provided herein are for convenience only and do not necessarily affect the scope of the embodiments. Further, the drawings have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be expanded or reduced to help improve the understanding of the embodiments. Moreover, while the disclosed technology is amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to unnecessarily limit the embodiments described. On the contrary, the embodiments are intended to cover all suitable modifications, combinations, equivalents, and alternatives falling within the scope of this disclosure.

DETAILED DESCRIPTION

[0018] Various examples of the systems and methods introduced above will now be described in further detail. The following description provides specific details for a thorough understanding and enabling description of these examples. One skilled in the relevant art will understand, however, that the techniques and technology discussed herein may be practiced without many of these details. Likewise, one skilled in the relevant art will also understand that the technology can include many other features not described in detail herein. Additionally, some well-known structures or functions may not be shown or described in detail below so as to avoid unnecessarily obscuring the relevant description.

[0019] The terminology used below is to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of some specific examples of the embodiments. Indeed, some terms may even be emphasized below; however, any terminology intended to be interpreted in any restricted manner will be overtly and specifically defined as such.

[0020] Disclosed are methods and systems for high-throughput K-Band (24 GHz) mmWave imaging used to scan envelopes and thin packages transiting a conveyor belt. This imaging system is capable of supporting high conveyor speeds and enables non destructive imaging inside sealed envelopes. An automated screening algorithm that uses a logistic regression approach to detect anomalies among the expected paper documents is also described. Automatic anomaly detection eliminates the need for human labor and allows for high-throughput diversion of suspect envelopes for secondary screening.

[0021] Examples of mmWave detection of non-paper inclusions such as metalized plastic and metal items among paper documents in paper, cardboard, and Tyvek envelopes, as well as padded bubble packs, are presented. Resolution better than 1 cm in the plane of the envelope is demonstrated, allowing for identification of sub-cm3 anomalies, and methods and systems for automated first-pass flagging of suspect envelopes are described.

[0022] Example images and initial classification results based on logistic regression are presented, in which anomaly detection is based on a static supervised learning model. The simplicity of the modeling is aided by narrowing of scope to a particular category of contents (metallic and thus highly reflective of mmWaves), which happens to correspond well to many contraband items of interest, as seen in Table 1. Table 1 lists envelope materials and content types used in various combinations.

Envelope Contraband content types materials vendor A cardboard passport (modern) vendor B cardboard credit card (with chip) Tyvek Xacto blade plastic bubble mailer razor blade

Mylar baggies small, med, large 10g sugar in some med & Ig Mylar baggies Table 1

[0023] With reference to FIG. 1 , a mmWave imaging system 100 uses mmWave sensor modules 102 comprised of transmit and receive antennas that may be arranged to image the appropriate volume. The modules may be stacked in a two-column configuration along the X axis. The conveyor 104 moves with approximately constant velocity in Y, allowing sampling of the scene with mmWave reflection measurements to enable reconstruction of those measurements into a 3D mmWave image. Each voxel in this image represents the complex mmWave reflectivity of that part of the scene. A voxel is a unit of graphic information that defines a point in three-dimensional space.

[0024] An example dataset can include 101 mmWave 3D images of envelopes with combinations of the materials and contents shown in Table 1. In addition to optional contraband contents, in all images the envelopes contained 12 sheets of standard printer paper. The envelope 106 may optionally rest on a foam box 108 or another supporting material such as a tray made of a non-reflective material to ensure responses to its contents are distinguished from reflections from the conveyor. Example mmWave images of these envelopes are seen in FIG. 2, where each envelope contains 12 sheets of paper and various contraband items taped inside them. These images are imaged with six mmWave sensor modules. The envelope at bottom right contains only paper and the rest contain contraband items in addition to the paper.

[0025] The imaging reconstruction domain is a one or more voxel thick horizontal sheet centered vertically at the level of the envelopes (the plots in FIG. 2 show the magnitude of the mean of these two layers). Predictive performance is compared between several groupings of mmWave sensor modules to investigate the tradeoff between number of modules and accuracy of the prediction. Images in this example dataset are marked with the ground truth of with- or without-contraband and used for training and evaluation of the classifier. The dataset has more with-contraband images than without.

[0026] From the original measurements of the scans, the dataset may be re-imaged three times, using three subsets of the mmWave sensor modules, which can be enabled or disabled in software. Referring again to FIG. 1 , the three subsets of modules, which have 6, 3, and 2 modules respectively (mounted across the x-axis) aim down the Z-axis from above the horizontal envelopes, while the envelopes are moved on a conveyor along the Y-axis. The accuracy of the detector may be evaluated for each of the three subsets of sensor modules to facilitate the key tradeoff between hardware cost and complexity vs. detection accuracy.

[0027] A binary classifier predicts the probability that the image contains any of the contraband seen in the dataset. This prediction allows the imaging system to trigger a diverter on the conveyor system, to route away items for further inspection when the predicted probability of anomaly is greater than a threshold. Such a diverter may be controlled by a programmable logic control (PLC) system that is triggered in response to the output of a classifier. One example classifier is a logistic regression operating on the maximum image intensity over the image voxels. It should be appreciated that the imaging system provides complex-valued reflectivity per voxel, not just intensity, but high performance for this application may be obtained based on intensity alone.

[0028] FIG. 3A shows an example intensity distributions of the 101 images as imaged by three modules. There is strong separability of these images with and without reflective contraband contents based on their intensities. In one example, there are 57 images with anomalies and 44 without anomalies in the dataset. Logistic regression can be susceptible to bias caused by class imbalance (and some datasets have greater class imbalance than this), so the SMOTE over-sampling method is used to balance the data, and a 5-fold cross validation approach to generalize evaluation over multiple train/test splits of the dataset. The logistic regression can be regularized by an L2 term whose weighting is estimated in the cross validation; the optimization can be solved by the limited-memory Broyden-Fletcher-Goldfarb-Shanno (L-BFGS) method (a quasi-Newton method). With the data balanced in the cross validation folds, the model can be optimized based on mean accuracy to find the best regularization parameter. As depicted in FIG. 3B, the model fits a sigmoid probability curve to the discrete ground truth points plotted at probability 0.0 and 1.0. Points jittered in Y-axis on right merely to aid visualization. Some overlap is seen here in the maximum intensities of each class; for 2 modules there is more overlap and for 6 modules there is no overlap at all in this dataset.

[0029] FIG. 4 shows receiver operating characteristic (ROC) curves for the three subsets of mmWave sensor modules, which have 6, 3, and 2 modules; it also highlights which modules were used in each case, referring to the equipment layout in FIG. 1 . Table 2 lists the mean classification performance over the 5 folds of cross validation mentioned above. [0030] The table’s values are cited at the operating points shown on the ROC curves, which correspond to the accuracy-optimized solution points for the regularization parameters. The black dots on the ROC curves depict the operating points at which the performance stats in Table 2 are reported; these are the points of maximal accuracy at which the models' regularization parameters were solved. The table includes performance metrics of: the area under the ROC curve (ROC AUC), accuracy, true positive rate (TPR), false positive rate (FPR), positive predictive value (PPV), and negative predictive value (PPV). The ROC AUC is the one metric here that is independent of the operating point choice - it is equivalent to the probability the model will assign a higher probability score to a randomly chosen positive class than to a randomly chosen negative class. The TPR, FPR, PPV, and NPV metrics are concerned with false positives and false negatives in the predictions, and it can be seen by the 0.0 FPR and 1 .0 PPV in Table 2 that the 6-module and 3-module cases have no false positives at all. Similarly, as evident by its 0.0 NPV, the 6-module case had no false negatives either.

[0031] The classification performance degrades with decreasing number of sensor modules. With all six modules mounted along the top of the sensor archway, the separation between the max intensities for the two classes is quite wide in this dataset, with a significant gap between the max intensities for paper-only and paper-plus- anomaly images, and performance was perfect for this dataset in that case. With half the number of sensor modules the performance achieved is 94% accuracy and 99% ROC AUC. The performance for the 2-module case was significantly worse at 76% accuracy and 83% ROC AUC - those images were much more decimated and unevenly illuminated due to the limited modules used.

[0032] This work presents examples of a probabilistic, binary classifier to detect contraband items contained in a variety of common mailer envelopes, and presented examples of typical mmWave images of those scenarios. On an example dataset of 101 images, with a variety of envelope and contraband types per Table 1 , perfect performance was obtained when using all mmWave sensor modules. [0033] For the application of selecting mail envelopes to divert for further inspection for contraband contents, similar or different operating points on ROC curves to those in FIG. 4 may be chosen depending on available secondary inspection resources. Where resource-constrained, a reasonable choice is to tolerate very limited false positives with the goal of reducing contraband flux by some amount, at the cost of letting some amount still go though (false negatives). But with additional secondary inspection resources available, it may be preferable to minimize false negatives (maximize true positive rate) to minimize the number of contraband items that pass, at the cost of diverting and sending to secondary screening more packages than actually have contraband.

[0034] FIG. 5 is a flow diagram showing a method 500 for detecting anomalies in an envelope. In some embodiments, at step 502 the method can comprise scanning an envelope moving along a conveyor with multiple K-band imaging sensor modules. At step 504, the method can include collecting reflection measurements from the sensor modules. At step 506, the method can include constructing a one or more voxel thick horizontal 3D image of the envelope. At step 508, the method can include creating an image of the envelope comprising the magnitude of the mean of the one or more voxel layers. At step 510, the method can include feeding the image of the envelope into a binary logistic regression classifier. At step 512, the method can include receiving a probability that the envelope contains an anomaly from the classifier. At step 514, the method can include causing the envelope to be diverted from the conveyor when the probability is greater than a selected threshold.

Suitable System

[0035] The techniques disclosed here can be embodied as special-purpose hardware (e.g., circuitry), as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry. Flence, embodiments may include a machine-readable medium having stored thereon instructions which may be used to cause a computer, a microprocessor, processor, and/or microcontroller (or other electronic devices) to perform a process. The machine-readable medium may include, but is not limited to, optical disks, compact disc read-only memories (CD-ROMs), magneto-optical disks, ROMs, random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media / machine-readable medium suitable for storing electronic instructions.

[0036] Several implementations are discussed below in more detail in reference to the figures. FIG. 6 is a block diagram illustrating an overview of devices on which some implementations of the disclosed technology can operate. The devices can comprise hardware components of a device 1000 that captures mmWave images, for example. Device 1000 can include one or more input devices 1020 that provide input to the CPU (processor) 1010, notifying it of actions. The actions are typically mediated by a hardware controller that interprets the signals received from the input device and communicates the information to the CPU 1010 using a communication protocol. Input devices 1020 include, for example, a mouse, a keyboard, a touchscreen, a mmWave imaging sensor (e.g., a K-band mmWave imaging sensor operating at 24 GHz), an infrared sensor, a touchpad, a wearable input device, a camera or image-based input device, a microphone, or other user input devices.

[0037] CPU 1010 can be a single processing unit or multiple processing units in a device or distributed across multiple devices. CPU 1010 can be coupled to other hardware devices, for example, with the use of a bus, such as a PCI bus or SCSI bus. The CPU 1010 can communicate with a hardware controller for devices, such as for a display 1030. Display 1030 can be used to display text and graphics. In some examples, display 1030 provides graphical and textual visual feedback to a user. In some implementations, display 1030 includes the input device as part of the display, such as when the input device is a touchscreen or is equipped with an eye direction monitoring system. In some implementations, the display is separate from the input device. Examples of display devices are: an LCD display screen; an LED display screen; a projected, holographic, or augmented reality display (such as a heads-up display device or a head-mounted device); and so on. Other I/O devices 1040 can also be coupled to the processor, such as a network card, video card, audio card, USB, FireWire or other external device, sensor, camera, printer, speakers, CD-ROM drive, DVD drive, disk drive, or Blu-Ray device. Further I/O devices 1040 may include a diverter that is configured to divert items under the control of CPU 1010.

[0038] In some implementations, the device 1000 also includes a communication device capable of communicating wirelessly or wire-based with a network node. The communication device can communicate with another device or a server through a network using, for example, TCP/IP protocols. Device 1000 can utilize the communication device to distribute operations across multiple network devices.

[0039] The CPU 1010 can have access to a memory 1050. A memory includes one or more of various hardware devices for volatile and non-volatile storage, and can include both read-only and writable memory. For example, a memory can comprise random access memory (RAM), CPU registers, read-only memory (ROM), and writable non volatile memory, such as flash memory, hard drives, floppy disks, CDs, DVDs, magnetic storage devices, tape drives, device buffers, and so forth. A memory is not a propagating signal divorced from underlying hardware; a memory is thus non-transitory. Memory 1050 can include program memory 1060 that stores programs and software, such as an operating system 1062, high-throughput anomaly detection platform 1064, and other application programs 1066. Memory 1050 can also include data memory 1070 that can include database information, etc., which can be provided to the program memory 1060 or any element of the device 1000.

[0040] Some implementations can be operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with the technology include, but are not limited to, personal computers, server computers, handheld or laptop devices, cellular telephones, mobile phones, wearable electronics, gaming consoles, tablet devices, multiprocessor systems, microprocessor-based systems, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, or the like.

[0041] FIG. 7 is a block diagram illustrating an overview of an environment 1100 in which some implementations of the disclosed technology can operate. Environment 1100 can include one or more client computing devices 1105A-D, examples of which can include device 1000. Client computing devices 1105 can operate in a networked environment using logical connections through network 1130 to one or more remote computers, such as a server computing device 1110.

[0042] In some implementations, server computing device 1110 can be an edge server that receives client requests and coordinates fulfillment of those requests through other servers, such as servers 1120A-C. Server computing devices 1110 and 1120 can comprise computing systems, such as device 1000. Though each server computing device 1110 and 1120 is displayed logically as a single server, server computing devices can each be a distributed computing environment encompassing multiple computing devices located at the same or at geographically disparate physical locations. In some implementations, each server computing device 1120 corresponds to a group of servers.

[0043] Client computing devices 1105 and server computing devices 1110 and 1120 can each act as a server or client to other server/client devices. Server 1110 can connect to a database 1115. Servers 1120A-C can each connect to a corresponding database 1125A-C. As discussed above, each server 1120 can correspond to a group of servers, and each of these servers can share a database or can have their own database. Databases 1115 and 1125 can warehouse (e.g., store) information. Though databases 1115 and 1125 are displayed logically as single units, databases 1115 and 1125 can each be a distributed computing environment encompassing multiple computing devices, can be located within their corresponding server, or can be located at the same or at geographically disparate physical locations. [0044] Network 1130 can be a local area network (LAN) or a wide area network (WAN), but can also be other wired or wireless networks. Network 1130 may be the Internet or some other public or private network. Client computing devices 1105 can be connected to network 1130 through a network interface, such as by wired or wireless communication. While the connections between server 1110 and servers 1120 are shown as separate connections, these connections can be any kind of local, wide area, wired, or wireless network, including network 1130 or a separate public or private network.

[0045] FIG. 8 is a block diagram illustrating components 1200 which, in some implementations, can be used in a system employing the disclosed technology. The components 1200 include hardware 1202, general software 1220, and specialized components 1240. As discussed above, a system implementing the disclosed technology can use various hardware, including processing units 1204 (e.g., CPUs, GPUs, APUs, etc.), working memory 1206, storage memory 1208, and input and output devices 1210. Components 1200 can be implemented in a client computing device such as client computing devices 1105 or on a server computing device, such as server computing device 1110 or 1120.

[0046] General software 1220 can include various applications, including an operating system 1222, local programs 1224, and a basic input output system (BIOS) 1226. Specialized components 1240 can be subcomponents of a general software application 1220, such as local programs 1224. Specialized components 1240 can include an Imaging Module 1244, a Classifier Module 1246, a Model Training Module 1248, and components that can be used for transferring data and controlling the specialized components, such as interface 1242. In some implementations, components 1200 can be in a computing system that is distributed across multiple computing devices or can be an interface to a server-based application executing one or more of specialized components 1240.

[0047] Those skilled in the art will appreciate that the components illustrated in FIGS. 6-8 described above, and in each of the flow diagrams discussed above, may be altered in a variety of ways. For example, the order of the logic may be rearranged, sub steps may be performed in parallel, illustrated logic may be omitted, other logic may be included, etc. In some implementations, one or more of the components described above can execute one or more of the processes described herein.

[0048] Although specific embodiments have been shown by way of example in the drawings and are described in detail above, other embodiments are possible. For example, in some embodiments, a method for detecting anomalies in an envelope can include scanning an envelope moving along a conveyor with multiple K-band imaging sensor modules and collecting reflection measurements from the sensor modules. The method can further include constructing a one or more voxel thick horizontal 3D image of the envelope and then creating an image of the envelope comprising the magnitude of the mean of the one or more voxel layers. The image of the envelope can be fed into a binary logistic regression classifier to provide a probability that the envelope contains an anomaly from the classifier. The method can include causing the envelope to be diverted from the conveyor when the probability is greater than a selected threshold.

Remarks

[0049] The above description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding of the disclosure. Flowever, in some instances, well-known details are not described in order to avoid obscuring the description. Further, various modifications may be made without deviating from the scope of the embodiments.

[0050] Reference in this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not for other embodiments.

[0051] The terms used in this specification generally have their ordinary meanings in the art, within the context of the disclosure, and in the specific context where each term is used. It will be appreciated that the same thing can be said in more than one way. Consequently, alternative language and synonyms may be used for any one or more of the terms discussed herein, and any special significance is not to be placed upon whether or not a term is elaborated or discussed herein. Synonyms for some terms are provided. A recital of one or more synonyms does not exclude the use of other synonyms. The use of examples anywhere in this specification, including examples of any term discussed herein, is illustrative only and is not intended to further limit the scope and meaning of the disclosure or of any exemplified term. Likewise, the disclosure is not limited to various embodiments given in this specification. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure pertains. In the case of conflict, the present document, including definitions, will control.