Consistency of renal stone volume measurements across CT scanner model and reconstruction algorithm configurations

Alice E. Huang, Juan C. Montoya, Maria Shiung, Shuai Leng, Cynthia H. McCollough

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

OBJECTIVE. The objective of this prospective study is to evaluate the consistency of renal stone volume estimation using dual-energy CT across scanner model and reconstruction algorithm configurations. SUBJECTS AND METHODS. Patients underwent scanning with routine kidney stone composition protocols on both second- and third-generation dual-source CT scanners. Images were reconstructed using filtered back projection and iterative reconstruction (IR). In addition, a modified IR kernel on the third-generation CT scanner was evaluated. Individual kidney stone volumes were determined and compared. RESULTS. No significant difference was noted in measured volumes between filtered back-projection data, IR data from the second-generation scanner, and the modified IR kernel data (p > 0.05). The third-generation commercially available IR kernel yielded lower volumes than did the other configurations (p < 0.0001). CONCLUSION. With the use of a modified kernel for the third-generation scanner, patients being monitored for changes in kidney stone volume can undergo scanning performed with second- or third-generation dual-energy CT scanners, and the images obtained can be reconstructed with either filtered back projection or IR without the introduction of bias into kidney stone volume measurements.

Original languageEnglish (US)
Pages (from-to)116-121
Number of pages6
JournalAmerican Journal of Roentgenology
Volume209
Issue number1
DOIs
StatePublished - Jul 2017

Keywords

  • CT
  • Iterative reconstruction
  • Nephrolithiasis
  • Renal stone
  • Stone volume

ASJC Scopus subject areas

  • Radiology Nuclear Medicine and imaging

Fingerprint

Dive into the research topics of 'Consistency of renal stone volume measurements across CT scanner model and reconstruction algorithm configurations'. Together they form a unique fingerprint.

Cite this