Most cohort-2 patients (15) were imaged on the same PET/CT scanner in serial studies. However, due to the addition of the GE Discovery STE PET/CT scanners at our center, thirteen cohort-2 patients were initially imaged on a GE Advance PET scanner [36 (link)] and underwent the second scan on a Discovery scanner. We have shown that our calibration and cross-calibration procedures and identical acquisition and reconstruction protocols provide test-retest accuracy comparable to a well-calibrated single scanner [37 (link)].
PET Scanner Calibration and Cross-Validation
Most cohort-2 patients (15) were imaged on the same PET/CT scanner in serial studies. However, due to the addition of the GE Discovery STE PET/CT scanners at our center, thirteen cohort-2 patients were initially imaged on a GE Advance PET scanner [36 (link)] and underwent the second scan on a Discovery scanner. We have shown that our calibration and cross-calibration procedures and identical acquisition and reconstruction protocols provide test-retest accuracy comparable to a well-calibrated single scanner [37 (link)].
Corresponding Organization : University of Washington
Other organizations : Thomayer University Hospital, University of Pennsylvania, Cleveland Clinic
Variable analysis
- PET scanner used for imaging
- Cohort of patients
- Quantitative accuracy of PET imaging
- Reconstruction parameters for PET imaging
- Calibration and cross-calibration procedures for PET scanners
- Acquisition and reconstruction protocols for PET imaging
- Positive control: NIST-traceable reference sources used to monitor quantitative performance of PET scanners
- Negative control: Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!