Sei sulla pagina 1di 60

ACX 6.

4-MV
Software Version 7.X

Operator Manual

Number 8100-11633-OM
L-3 Communications Security and Detection Systems, Inc. - Proprietary
ACX 6.4-MV
Software Version 7.X

Operator Manual
December 2008

If this technical
If this datadata
technical is being exported
is being fromfrom
exported the United States,
the United it is it
States, being exported
is being in accordance
exported withwith
in accordance Export Administration
Export Regulations
Administration (EAR)
Regulations as as
(EAR)
follows:
follows:
† †ECCN ECCN____________
____________- No- License Required
No License to Entity
Required and and
to Entity Country of End-Use.
Country of End-Use.
† †Department of Commerce
Department License
of Commerce Number
License ____________________
Number ____________________to Entity and and
to Entity Country of End-Use.
Country of End-Use.
† †License Exception 740.13(a)1 to Entity and Country of End-Use.
License Exception 740.13(a)1 to Entity and Country of End-Use.
Diversion contrary
Diversion to U.S.
contrary law law
to U.S. is prohibited. In accordance
is prohibited. withwith
In accordance U.S.U.S.
LawLaw
(Title 15 CFR
(Title PartPart
15 CFR 746746andand
Supplement No.No.
Supplement 1 to1part 774,774,
to part andand
TitleTitle
31 31
CFR) resale/re-export
CFR) or transfer
resale/re-export to certain
or transfer designated
to certain countries
designated is prohibited
countries without
is prohibited the prior
without written
the prior consent
written of the
consent of U.S. Department
the U.S. of of
Department
Commerce.
Commerce. If further transfer
If further is required,
transfer contact
is required, your
contact L-3L-3
your Communications
Communications representative for for
representative authorization.
authorization.

Number 8100-11633-OM - Revision A1


L-3 Communications Security and Detection Systems, Inc. - Proprietary
Record of Changes 8100-11633-OM

Record of Changes
Rel.
Rev Org. ECO # Change Description
Date
10/29/08 A0 M. King 01_PMF_001771 Initial Release
12/10/08 A1 M. King 01_E001731 Clarify wording for daily inspections

Disclaimer
L-3 Communications Security & Detection Systems has made all reasonable efforts to ensure the information in this
manual is accurate and complete. L-3 Communications Security & Detection Systems shall not be held liable for any
technical or editorial errors or omissions contained herein, or for incidental, special or consequential damages
concerning the furnishing or use of this manual. The information contained in this manual is subject to change without
notice. Any comments or proposed changes should be submitted, in writing, to L-3 Communications Security &
Detection Systems to the attention of Documentation Control, Document Comments.

Proprietary Information Notice


This manual contains proprietary information that is protected by copyright, and all rights are reserved. No portion of
this document may be copied, photocopied, reproduced by any means, or translated into another language without the
prior written consent of L-3 Communications, Security & Detection Systems Inc.

Copyright Notice
Copyright © 2008 by L-3 Communications Security and Detection Systems, Inc. All rights reserved. United States
copyright laws and international treaty provisions protect this document. It may not be reproduced or transmitted
electronically for the purpose of reproduction, either in whole or in part, without the prior, express, and written consent
of L-3 Corporation.

Trademarks
ACX 6.4-MV is a registered trademark of L-3 Communications Security and Detection Systems, Inc., in the United
States and/or other countries.

Classified Information Notice


For security reasons main regulatory avaitation agencies world wide, such as, the U.S. Federal Aviation Administration
(FAA) and the U.K. Department for Transport (DfT), have classified much of the information and data pertaining to the
performance criteria, test results and technical aspects of Explosive Detection Systems. If additional information is
required that is not part of L-3 Communications Security & Detection Systems proprietary documentation packages,
qualified representatives of foreign governments and aviation agencies should specifically request the information on
letterhead. L-3 Communications Security & Detection Systems will make every effort to provide qualified individuals
with detailed information in a manner consistent with the Classifications Guide for FAA Explosive Detection Systems
Information and Data in effect at the time of the request. Contact L-3 Communications Security & Detection Systems
Customer Support for additional information.

A L-3 Communications Security and Detection Systems, Inc. - Proprietary


8100-11633-OM

Contact Information
Mailing Address Telephone FAX E-mail / Web URL
North America To reach Customer Support Services in any location, call toll free at
800-776-3031
L-3 Communications 727-556-0270 727-556-0271 manuals.sds@L-3com.com /
Security and Detection Systems, Inc. http://www.dsxray.com
2005 Gandy Blvd., North, Suite 600
St. Petersburg, FL 33702-2166 USA
L-3 Communications 781-939-3800 781-939-3996 manuals.sds@L-3com.com /
Security and Detection Systems, Inc. http://www.dsxray.com
10 Commerce Way
Woburn, MA 01801-1028 USA
Latin America
L-3 Communications 781-939-3800 781-939-3996 manuals.sds@L-3com.com /
Security and Detection Systems, Inc. http://www.dsxray.com
10 Commerce Way
Woburn, MA 01801-1028 USA
Europe/Middle East/Africa (EMEA)
L-3 Communications 44 (0) 1344 44 (0) 1344 manuals.sds@L-3com.com /
Security and Detection Systems, Inc. 477900 477901 http://www.dsxray.com
Unit 2, Astro House,
Brants Bridge
Bracknell, Berkshire
RG129HW, England
Asia and Pacific
L-3 Communications Singapore Pte Ltd 65.6787.0118 65 6787 1127 manuals.sds@L-3com.com /
3 Tampines Grande http://www.dsxray.com
#07-03 AIA Tampines
Singapore 528799
L-3 Communications Hong Kong Ltd 852 2587 1777 852 2587 1177 manuals.sds@L-3com.com /
Unit 2308, Nanyang Plaza http://www.dsxray.com
No 57 Hung To Road
Kwun Tong, Kowloon
Hong Kong
L-3 Communications Australia Pty Ltd 61.3.8645.4500 61.3.8645.4555 manuals.sds@L-3com.com /
Unit C1 http://www.dsxray.com
63-85 Turner Street
Port Melbourne VIC 3207, Australia

At the end of this document there is a Manual Improvement Form

Revision A1 L-3 Communications Security and Detection Systems - Proprietary i


8100-11633-OM Contents

Contents
Chapter 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
1.1 Controls and Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
1.1.1 Mainframe Controls and Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
1.1.2 Operator Console Controls and Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
1.1.3 Display Monitor Controls and Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Chapter 2. System Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
2.1 Checking the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
2.2 Starting Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
2.3 Operating the Conveyor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
2.3.1 Controlling the Conveyor Belt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
2.3.2 Conveyor Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
2.4 Using the Image Analysis Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
2.4.1 Selecting the Icons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
2.4.2 Zoom Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12
2.4.3 Detailed Mark Threat Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
2.5 Performing Inspections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
2.5.1 Process Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
2.5.2 Normal Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
2.5.3 Clearing a Jam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
2.5.4 Invalid Reference Air Sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
2.5.5 Image Recall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
2.5.6 Image Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19
2.5.7 Manual Save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19
2.6 Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19
2.7 Logging Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20
2.8 Powering Down the System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20
Chapter 3. Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
3.1 Threat Image Projection (TIP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
3.1.1 Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
3.1.2 Review-MT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
3.1.3 Configure Reports (CFG-RPT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
3.2 Network Supervisor Workstation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
3.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
3.2.2 NSW Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
3.2.3 Powering Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
3.2.4 Logging On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
3.2.5 Performing Inspections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
3.2.6 Logging Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
3.2.7 Powering Down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13

Revision A1 L-3 Communicatons Security and Detection Systems - Proprietary iii


Contents 8100-11633-OM

Chapter 4. Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1


Chapter 5. Service and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
5.1 Customer Support Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
5.2 Daily Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1

iv L-3 Communicatons Security and Detection Systems - Proprietary Revision A1


8100-11633-OM

List of Figures
Figure 1-1. ACX 6.4-MV Mainframe and Operator Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Figure 1-2. Mainframe Controls and Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Figure 1-3. Operator Console Controls and Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Figure 2-1. Sample Logon Screen on Monitor A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Figure 2-2. Available Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Figure 2-3. Inspection Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Figure 2-4. Displayed X-Ray Image. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Figure 2-5. Online Help Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Figure 2-6. Boundary Box on Monitor A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Figure 2-7. Start Marking Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Figure 2-8. Mark Threat Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Figure 2-9. Continuous Mode, stop pressed while scanning two items that are touching . . . . . . . . . . . . . . 2-16
Figure 2-10. Continuous Mode conveyor stopped, started and stopped and items are touching. . . . . . . . . . 2-17
Figure 2-11. Invalid Reference Air Sample Indicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Figure 3-1. Available Options area with TIP enabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Figure 3-2. Operator Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Figure 3-3. Fictional Threat with Colored Dashed Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Figure 3-4. Sample Review-MT Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Figure 3-5. Reports tab (FDRS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Figure 3-6. FDRS Screener Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Figure 3-7. Reports tab (TIP only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Figure 3-8. Individual Screener Performance Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Figure 3-9. Network Supervisor Workstation (NSW) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Figure 3-10. Uninterruptible Power Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Figure 3-11. NSW Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12

Revision A1 L-3 Communications Security and Detection Systems - Proprietary v


8100-11633-OM

List of Tables
Table 1-1. Operator Console Indicators and Buttons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Table 2-1. Voltage Warm-up Periods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Table 2-2. Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Table 3-1. FDRS Screener Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Table 3-2. Individual Screener Performance Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Table 4-1. Product Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Table 4-2. Non-Fatal Errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4

vi L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM

Preface
Software License Agreement (Embedded Products)
You have acquired a device (“DEVICE”) that includes software licensed by L-3 Communications
Security & Detection Systems from Microsoft Licensing Inc. or its affiliates (“MS”). Those
installed software products of MS origin, as well as associated media, printed materials, and
“online” or electronic documentation (“SOFTWARE”) are protected by international intellectual
property laws and treaties. The SOFTWARE is licensed, not sold. All rights reserved.
IF YOU DO NOT AGREE TO THIS END USER LICENSE AGREEMENT (“EULA”), DO NOT
USE THIS DEVICE OR COPY THE SOFTWARE. INSTEAD, PROMPTLY CONTACT L-3
Communications Security & Detection Systems FOR INSTRUCTIONS ON RETURN OF THE
UNUSED DEVICE(S) FOR A REFUND. ANY USE OF THE SOFTWARE, INCLUDING
BUT NOT LIMITED TO USE ON THE DEVICE, WILL CONSTITUTE YOUR
AGREEMENT TO THIS EULA (OR RATIFICATION OF ANY PREVIOUS CONSENT).
GRANT OF SOFTWARE LICENSE: This EULA grants you the following license:
• You may use the SOFTWARE only on the DEVICE.
• NOT FAULT TOLERANT. THE SOFTWARE IS NOT FAULT TOLERANT.
• NO WARRANTIES FOR THE SOFTWARE. THE SOFTWARE is provided “AS IS” and with all
faults. THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCU-
RACY, AND EFFORT (INCLUDING LACK OF NEGLIGENCE) IS WITH YOU. ALSO,
THERE IS NO WARRANTY AGAINST INTERFERENCE WITH YOUR ENJOYMENT OF
THE SOFTWARE OR AGAINST INFRINGEMENT. IF YOU HAVE RECEIVED ANY WAR-
RANTIES REGARDING THE DEVICE OR THE SOFTWARE, THOSE WARRANTIES DO NOT
ORIGINATE FROM, AND ARE NOT BINDING ON, MS.
• Note on Java Support. The SOFTWARE may contain support for programs written in Java. Java tech-
nology is not fault tolerant and is not designed, manufactured, or intended for use or resale as online
control equipment in hazardous environments requiring fail-safe performance, such as in the operation
of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support
machines, or weapons systems, in which the failure of Java technology could lead directly to death, per-
sonal injury, or severe physical or environmental damage. Sun Microsystems, Inc. has contractually
obligated MS to make this disclaimer.
• No Liability for Certain Damages. EXCEPT AS PROHIBITED BY LAW, MS SHALL HAVE NO
LIABILITY FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL OR INCIDENTAL DAM-
AGES ARISING FROM OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
THE SOFTWARE. THIS LIMITATION SHALL APPLY EVEN IF ANY REMEDY FAILS OF
ITS ESSENTIAL PURPOSE. IN NO EVENT SHALL MS BE LIABLE FOR ANY AMOUNT IN
EXCESS OF U.S. TWO HUNDRED FIFTY DOLLARS (U.S. $250.00).
• Limitations on Reverse Engineering, Decompilation, and Disassembly. You may not reverse engi-
neer, decompile, or disassemble the SOFTWARE, except and only to the extent that such activity is
expressly permitted by applicable law notwithstanding this limitation.
• SOFTWARE TRANSFER ALLOWED BUT WITH RESTRICTIONS. You may permanently
transfer rights under this EULA only as part of a permanent sale or transfer of the Device, and only if
the recipient agrees to this EULA. If the SOFTWARE is an upgrade, any transfer must also include all
prior versions of the SOFTWARE.
• EXPORT RESTRICTIONS. You acknowledge that the SOFTWARE is of US-origin. You agree to
comply with all applicable international and national laws that apply to the SOFTWARE, including the
U.S. Export Administration Regulations, as well as end-user, end-use and country destination restric-
tions issued by U.S. and other governments. For additional information on exporting the SOFTWARE,
see http://www.microsoft.com/exporting/.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary vii


8100-11633-OM

Safety Summary

This equipment produces ionizing X radiation when energized. Do not operate the system
without reading and understanding this manual in its entirety.

Never allow anyone to ride the Conveyor Belt. Be aware of the normal mechanical hazards
of moving conveyor components at both ends of the Conveyor System.

Do not allow placement of any part of the body through the lead curtains located at the ends of
the Conveyor System Tunnel with the X rays energized. An X-ray hazard could result.

Do not operate the system with torn or missing tunnel lead curtain strips. An X-ray hazard
could result.
If you have any questions concerning regulatory or safety issues, contact your L-3
Communications Security & Detection Systems Customer Support Representative.
Due to certification requirements, the system must be installed, maintained and relocated only by
L-3 Communications Security & Detection Systems trained and L-3 Communications Security &
Detection Systems certified Field Service/Customer Support Representatives. There are no user
serviceable parts inside. There are potentially dangerous high voltages inside. Do not attempt to
gain access to the subassemblies inside the Mainframe or Operator Console.

Panel Interlocks (Canadian Systems Only)


Panel Interlocks are internally-mounted switches located behind the Mainframe access panels on
each ACX 6.4-MV System. They are provided as a safety measure such that system operation is
immediately stopped whenever an access panel is opened or removed.

WARNING!

Mainframe access panels should only be removed by authorized personnel. Otherwise, serious
injury may occur.

If an access panel is opened by L-3 Communications S&DS-trained service personnel or by an


authorized supervisor, a mechanical interlock is automatically activated. As a result, X-ray
production is disabled and system conveyor movement is halted. Once a panel interlock is
activated, it must be reset by replacing the panel. After the panel is replaced, the system may
resume normal operation after a conveyor button is pressed.
2. Panel Interlock Condition
Close panels to restore operation

Emergency Stops
Emergency Stops are standard on the ACX 6.4-MV. They are located at the entrance and exit
above the tunnel and on the operator console. Pressing an E-Stop activates it. To de-activate the E-
Stop, either pull out the E-Stop on the operator console, or for the others turn them in the direction
of the arrows. Then follow the on-screen instructions to continue.

viii L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM

Operator Sensor
An Operator Sensor can be in the form of a Floor Mat. The Sensor is used to ensure that an
operator is in front of the Operator Console when the system is operating.
When an Operator Sensor is installed and enabled, the system will only operate if the operator is at
the Operator Console. Stepping away from the Operator Console stops the conveyor and ceases all
X-ray generation. The Display Monitor Toolbar is covered by an error message. Once the operator
steps back into position, the message is removed and the system resumes normal operation.

Operator Sensor Interlock


Please return to the normal operating position

NOTE

Use of an Operator Sensor is a requirement for systems used within the US and Canada.

Regulations
This system complies with the following U.S. Federal Regulations applicable at the time of
manufacture:
The Radiation Control for Health and Safety Act of 1968, as amended
FAA 14 CFR 108.17 Use of X-ray System
FAA 14 CFR 108.20 Use of Explosives Detection Systems
FAA 14 CFR 129.26 Use of X-ray System
CDRH 21 CFR 1020.40 Cabinet X-ray Systems
This system also meets the U.K. DfT User Requirements for X-ray Screening Equipment, Version
1 and all U.K. health and safety regulations. Being a Certified Cabinet X-ray System, various
country, state and local regulations may apply to its use. Different regulations may apply
depending on the operational location of the system. Local licensing may be required. It is the
responsibility of the user to adhere to all applicable regulations and licensing requirements. It is L-
3 Communications Security & Detection Systems' responsibility to manufacture and maintain the
system within applicable regulatory requirements.
This system has been designed to meet CSA 114/UL 187, CSA/UL 61010-1, and applicable
European CE directives.
The U.S. Federal Aviation Administration requires an annual radiation survey of all cabinet X-ray
Systems in use at U.S. airports. It is the responsibility of the user to obtain an approved radiation
survey. If desired, you may contact L-3 Communications Security & Detection Systems Customer
Support for assistance.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary ix


8100-11633-OM Introduction

Chapter 1. Introduction
The L-3 Communications Security and Detection Systems, Inc. Model ACX 6.4-MV Automated
Checkpoint X-ray is a state-of-the-art Explosives Detection System (EDS) used to automatically
detect explosives in hand-carried baggage and packages.

The basic system configuration is shown below. It consists of the Mainframe and an Operator Station.
The Operator Station contains the console and monitors.

Figure 1-1. ACX 6.4-MV Mainframe and Operator Station

The Mainframe houses the Power Distribution Unit, X-ray Control electronics, the X-ray Sources,
Detector Arrays, System Electronics, the System Computer, a Conveyor, and an Inspection Tunnel.
• The Conveyor moves items to be inspected through the inspection tunnel. This assembly consists
of a supporting frame at each end, a belt, and power roller assembly.
• The Inspection Tunnel is a lead-lined metal enclosure within which the item being inspected is
X-rayed. Lead curtains cover both ends of the tunnel to limit the effects of X-ray scatter. The
system uses photocells mounted in the tunnel walls to determine when an item enters the tunnel.
These photocells then signal the system to turn on the X-rays.

The Operator Station consists of one or two LCD Display Monitors, the Operator Console, USB
Ports, keyboard (you will need a key to access the drawer that contains the keyboard) and an optional
DVD R-W drive.
• The Display Monitors are 20" SXGA LCD monitors capable of 1280x1024 24-bit image
resolution per monitor.
• The Operator Console consists of a Power On/Off Keyswitch, Emergency Stop Switch,
Conveyor Control buttons, indicator lamps, and a Touchpad.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 1-1


Introduction 8100-11633-OM

1.1 Controls and Indicators

This section describes the controls and indicators on the Mainframe and Operator Console.

1.1.1 Mainframe Controls and Indicators

System On lamps (amber) are located at the entrance and exit ends of the Mainframe. The System
on lamps are lit whenever the system is powered ON.

System On Emergency Stop X-ray On

Figure 1-2. Mainframe Controls and Indicators

X-ray On lamps (red) are located at the entrance and exit ends of the Mainframe. The X-ray On
lamps are lit when the system produces X-rays.

Emergency Stop (E-Stop) buttons are located at the entrance and exit ends of the Mainframe.
Pressing an E-Stop button immediately terminates all X-ray generation and stops the conveyor. To
reset an E-Stop twist the cap in the direction of the arrows. After resetting an E-Stop press a conveyor
button on the Operator Console to resume normal operation.

1-2 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Introduction

1.1.2 Operator Console Controls and Indicators

The Power On/Off Keyswitch is located on the Operator Console and requires a key, provided by
L-3 Communications S&DS to operate it. Inserting and turning the key clockwise (ON) applies
power to the system and illuminates the green POWER ON indicator. The key cannot be removed
when the Keyswitch is in this position. Turning the key counterclockwise (OFF) removes power and
the key can be removed.

Emergency Stop Power On/Off Keyswitch

Caution
Symbols
Indicators:
Power On
Photocells
X-Ray On

Conveyor Control Buttons Touchpad

Figure 1-3. Operator Console Controls and Indicators

The Touchpad is a touch-sensitive glass pad used to select various image-processing functions. The
operator can manipulate the displayed images with the various imaging tools described in detail in
the section “Using the Image Analysis Tools” starting on page 2-7.

See Table 1-1 for a detailed description of the indicators and buttons.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 1-3


Introduction 8100-11633-OM

Table 1-1. Operator Console Indicators and Buttons

Description Function

Power On This indicator is illuminated when the Power On/Off Keyswitch is in


the ON position and the Main Power Circuit Breaker is ON.

Photocells These indicators are connected to the photocells within the inspection
tunnel (located near the entrance, middle and exit). When illuminated
an object has blocked the photocell beam.

X-ray On This indicator is illuminated whenever the system is producing X-rays.

Conveyor Forward-Stop-Reverse These push-buttons control the conveyor, either moving the conveyor,
in a forward or reverse direction or stopping the conveyor. The buttons
with the arrow above them are the forward and reverse buttons. The
buttons are configurable so either one of these two buttons can be
configured to be the forward button and the other button the reverse
button. The button in the center is the stop button. Pressing the stop
button or pressing the forward while the belt is moving in the reverse
direction or pressing reverse button while the belt is moving in the
forward direction stops the conveyor.
Caution The Caution Symbol means read the Operator Manual before
operating machine.

Emergency Stop Pressing the Red Emergency Stop button immediately terminates all
X-ray generation and stops the conveyor. To release the Emergency
Stop condition, pull out the button. After resetting the Emergency Stop
press a conveyor button to resume normal operation.

1.1.3 Display Monitor Controls and Indicators

The ACX 6.4-MV can be configured with one or two screen monitors. Monitor A is considered the
primary monitor. Monitor A displays the initialization, warning and error messages, the Logon screen
and images generated from what is referred to as view C. The other monitor, is considered monitor
B and is used to display the images generated from what is referred to as view B.

For Display Monitor Controls, refer to the monitor’s manufacturer’s documentation included with
your system.

1-4 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

Chapter 2. System Operation


2.1 Checking the System

L-3 S&DS recommends the following system-checks be performed by the operator on a daily basis,
or in the case of infrequent use, prior to powering on the system.
• Check the integrity of the main power cable.
• Check the integrity of the conveyor belt. In particular, there must be no wear and tear on the
edges. Remove any baggage tags, tape, etc., from the belt and clean it.
• Check the integrity of the X-ray curtains at the entrance and exit of the tunnel. They must not be
torn or show excessive wear. (They can be cleaned with glass-cleaning liquid or household
cleaning liquid, if necessary.)
• Clean the console touchpad using glass-cleaning liquid. Spray the cleaner on a towel first, and
then wipe the touchpad with the dampened cloth. Do not use alcohol to clean the touchpad!
• Report any deficiencies to L-3 Communications S&DS, Customer Support.

2.2 Starting Up

Monitor A displays the initialization messages and the Logon screen.

CAUTION

Ensure all beverages are secure and cannot spill onto or into the machine.

NOTE
The Inspection Tunnel must be clear of all items during start-up.

1. Insert the Power Key into the Power On/Off Keyswitch and turn it clockwise to the ON position.
- If an Operator Sensor (Floor Mat) is included with the system, the Operator must be at the
Operator Console during the entire start-up sequence. Otherwise, the sequence will be
interrupted and a system error message will appear on the monitor screen.
Operator out of position
Press Center console button to terminate, LEFT or RIGHT button to restart

- If the Operator steps away from the sensor or off the mat during the inspection process, the
following message appears:
14: Operator Sensor Interlock
Please return to the normal operating position

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-1


System Operation 8100-11633-OM

The machine automatically initiates a warm-up process. Warm-up times are shown in Table 2-1.

Table 2-1. Voltage Warm-up Periods

Idle Time Seasoning Time

< 3 days 5 seconds


< 7 days 15 seconds
< 30 days 30 seconds
< 90 days 60 seconds
> 90 days 300 seconds

Stage __/__: __kV@___mA. Duration: ___ seconds


Please Wait

2. Once all of the warm-up stages are complete, system initialization begins.
At this point, the system automatically performs a series of diagnostics to check and verify
system operation.
3. Follow all on-screen instructions and perform the actions as required.
A gray box appears at the bottom of the monitor screen, displaying the following messages in
sequence:
Initializing For System Verification
Press LEFT or RIGHT button to start conveyor, Center console button to terminate

Ready to start system verification


Press LEFT or RIGHT button to start conveyor, Center console button to terminate

Finding conveyor zipper


Use ESTOP or CENTER console button to stop conveyor

Running System Verification Tests


Use ESTOP to terminate

NOTE
Logging onto the Mainframe is optional, depending upon the system configuration. If required,
the Logon screen displays next (Figure 2-1) and then after a successful logon, the following
initialization messages.

2-2 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

System Powering UP
Please Wait

Tank X Powering UP
Please Wait

Depending upon your system configuration the X in the above message can be A, B or C.

Taking Dark Sample


Please Wait

Taking Air Sample


Please Wait

Processing Air Data


Please Wait

NOTE
If System Verification fails, an error message appears at the bottom of the screen. Follow the
on-screen instructions.

4. When the system configuration specifies that logon is required the Logon screen, Figure 2-1,
displays. To logon place your finger on the portion of the console touchpad and slide it about the
pad to select the corresponding alphanumeric buttons for logging on with your pre-determined
User ID and Password. Then select ‘Enter.’ (If your ID or Password contains a capital letter,
select a ‘Caps On’ button prior to selecting the letter.)

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-3


System Operation 8100-11633-OM

Alpha-
numeric
Buttons

Available
Options
area

Figure 2-1. Sample Logon Screen on Monitor A

Depending upon your system’s configuration, the Logon screen’s Available Options area
displays as one of the following:

Basic w/Logon

FDRS

TIP

Figure 2-2. Available Options

Select the Scan button, the Inspection Screen displays.

2-4 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

When no logon is required after all tests have been successfully executed the Inspection screen
(Figure 2-3) appears. The Icons on the toolbar are configurable and therefore might be different on
your system than what is shown in the figure.
5. When the Inspection Screen displays (Figure 2-3), you may begin the inspection process. See
“Normal Inspection” on page 2-15.

Monitor A Monitor B

Icon Toolbar Status Banner


Figure 2-3. Inspection Screen

2.3 Operating the Conveyor

2.3.1 Controlling the Conveyor Belt

The operator controls conveyor movement which, in turn, starts and stops the inspection process. The
system is designed to continuously operate in the forward direction.
1. Press the conveyor FORWARD pushbutton to start the conveyor belt. X-rays will come on
when an item is sensed by breaking the photocell beam.
2. Press the CONVEYOR STOP pushbutton to immediately stop the conveyor (regardless of the
progress of the inspection).

NOTE
You may press either the FORWARD or REVERSE button while the conveyor belt is
traveling in the opposite direction to also stop the conveyor belt.

3. Press the REVERSE pushbutton to move the conveyor in the opposite direction. The belt
moves until it is manually stopped or the reverse timeout occurs (20 seconds).

WARNING!
In case of an emergency, press a Red Emergency Stop button to cease all X-rays and stop the
conveyor belt immediately. Messages will appear across the bottom of the screen, as shown below.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-5


System Operation 8100-11633-OM

Emergency Stop Condition


“Waiting for emergency stop condition to be cleared”

Waiting for Operator Acknowledgement


“Press a conveyor button to resume operation”

2.3.2 Conveyor Modes

Restart Mode: An item is placed at the entrance of the moving infeed conveyor and proceeds into
the inspection tunnel. As the item is being scanned, its image pans simultaneously onto both monitor
screens. Monitor A displays the view C image and if there is a Monitor B it displays the view B image
(Figure 2-4). Once the item clears the X-ray beams, the conveyor belt stops. The system analyzes the
scanned image using the information from view C and if present view A. The conveyor restarts
automatically (except when the system cannot analyze the item - see “Bag Not Analyzed” message).

Stop Mode: An item is placed on the infeed conveyor. The Operator presses the conveyor
FORWARD button and the conveyor belt starts. The bag proceeds into the inspection tunnel. As the
item is being scanned, its image pans onto the monitor screens. Monitor A displays the view C image
and if there is a Monitor B it displays the view B image (Figure 2-4). Once the item clears the X-ray
beams, the conveyor belt stops. The system analyzes the scanned image. The belt does not restart
automatically. The Operator must press either the FORWARD or REVERSE button on the console
to restart the belt.

Continuous Mode: An item is placed on the moving infeed conveyor and proceeds into the
inspection tunnel. As the item is being scanned, its image pans onto the monitor screens. Monitor A
displays the view C image and if there is a Monitor B it displays the view B image (Figure 2-4). The
image is not analyzed and the conveyor belt does not stop after the item clears the X-ray beams. The
belt continues unless the Operator stops the belt. Only then are the image analysis results displayed
on Monitor A, the image displayed on Monitor B is not analyzed by the system. The image analysis
is performed if the belt is stopped less than five seconds from when the scan occurred, and/or prior
to a new bag scan.

2-6 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

Mode and User ID

Icon Toolbar Figure 2-4. Displayed X-Ray Image

2.4 Using the Image Analysis Tools

The Inspection Screens are displayed on the monitors as a white screen as shown in Figure 2-3 and
Figure 2-4. One monitor displays the Icon Toolbar at the bottom of the display. If the system requires
a logon, it also displays the system state (SCAN or REVIEW) and the name of the currently logged
on Operator in a box at the top-left as shown in Figure 2-4. When there are two display monitors the
Icon Toolbar, system state and Operator name can be displayed on either of the monitors. Optionally
a Status Banner can be displayed on the other monitor. The monitor screen with the Icon Toolbar is
considered the active screen. Both monitors display the image to be inspected in the rest of the screen
display. In Figure 2-3 the Status Banner is displayed and Figure 2-4 it is not.

There is space for as many as 22 icons in the Icon Toolbar. Only configured features and their icons
are displayed on the Inspection Screen. Table 2-2 shows all icons and describes their functions.

Each icon represents a specific mode or imaging function that is either enabled or disabled. All
enabled and active icons have a 3-dimensional ‘raised’ appearance. Inactive icons appear ‘pressed-
in’ and only in shades of gray. If an icon is not available or has been deactivated, then sliding over
the touchpad in order to select it has no effect. An icon may be unavailable or disabled because
another icon has been selected. For example if Trimat is selected the Contrast Icon is unavailable.

There are three basic icon categories: the Zoom, provides image magnification; Image Mode, selects
the basic display mode; and Image Enhancement, performs additional image processing functions
on the basic image.

The A & B icon is used to control independent and synchronous mode. In synchronous mode image
manipulation effects the image displayed on both monitors. In independent mode image
manipulation effects the image displayed on only the monitor that has the Icon Toolbar displayed.
When the Icon Toolbar is displayed on Monitor A the system can be in either independent or
synchronous mode. When the Icon Toolbar is displayed on Monitor B the system can only be in
independent mode.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-7


System Operation 8100-11633-OM

Table 2-2. Icons

Thumbnail
Icon(s) Function Image

Selecting this icon when in independent mode toggles the display of the N/A
Icon Toolbar between Monitor A and Monitor B. In synchronous mode
A or B the button is inactive.

Selecting this icon when the Icon Toolbar is on Monitor A toggles the N/A
system between independent and synchronous mode. Selecting this icon
A and B when the Icon Toolbar is on Monitor B switches the Icon Toolbar
display to Monitor A and sets synchronous mode.
This icon is present if Threat Image Projection (TIP) or a Network N/A
Supervisor Workstation (NSW) or both, are configured. Select this icon
Suspect if an image, or an object in an image, appears suspicious. See “Response
Option #1” on page 3-2.
Select this icon any time the conveyor is stopped to print the current N/A
screen image. It is grayed-out when the conveyor is moving.
Printer

Select this icon to mark an area (or areas) of the image that appears
suspicious. See “Detailed Mark Threat Instructions” on page 2-13 for
Mark Threat more information.

There are five available Direct Zoom modes 1x, 2x, 4x, 8x, & 16x. The (Zoom 4x)
default 1x displays the item at its normal magnification, sized to fit the
Direct Zoom entire tunnel width on the screen. Pressing the 2x, 4x, 8x, or 16x displays
the image in 1x magnification and a rectangular box. Use a finger to
slide the box around. When you lift your finger the region under the box
is centered and magnified by the selected factor, 2, 4. 8 or 16.
The presence of one or both of these ‘magnifying glass’ icons means that
the Continuous Zoom feature has been enabled. When the image is at 1x
Continuous Zoom magnification the + magnification acts similar to 2x in direct zoom. That
is you select the region and then it is centered and magnified. In all other
cases the magnification is doubled (2x, 4x, 8x, 16x, and 64x) until it
reaches 64. The - magnification decreases the current magnification by
half until 1x is reached (that is from 64 to 32, 16, 8, 4, 2 and 1).
Also known as organic/inorganic imaging. Organic materials are
displayed in orange; inorganic or mixed materials are displayed in green;
Trimat metallic objects are displayed in blue.

2-8 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

Table 2-2. Icons

Thumbnail
Icon(s) Function Image

Using this image mode strips away all organic materials, leaving only
inorganic and/or metallic materials visible.
Organic Stripping

Using this image mode strips away all inorganic materials, leaving only
organic and/or metallic materials visible.
Inorganic Stripping

In this mode, the item being inspected is displayed in 240 shades of gray,
representing the attenuation of each pixel.
Gray Scale

This mode displays the item being inspected using an extremely high
contrast to accentuate differences in material density. It uses a range of
Pseudocolor colors to display objects of dissimilar density, rather than shades of the
same color.

Selecting this icon changes the image contrast and the appearance of the
icon itself. It allows the Operator to cycle from the default medium
Contrast contrast, to high contrast, to low contrast. It is not available in Trimat,
Organic or Inorganic Stripping modes.

This feature activates a continuously variable contrast adjustment mode. (see above)
By sliding a finger left and right on the touchpad, the Operator adjusts
Variable Contrast the image contrast lower and higher respectively. Selecting the icon
again restores the image to its normal contrast state and disables the
feature. It is not available in Pseudocolor.
Selecting this icon sharpens the image. Edge Enhance is generally used
to better determine the shapes of objects in a complex image, allowing
Edge Enhance items to be identified more readily.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-9


System Operation 8100-11633-OM

Table 2-2. Icons

Thumbnail
Icon(s) Function Image

Select this icon to invert the color scale of the entire image. For example,
in Gray Scale mode, whites are replaced with blacks and vice versa.
Reverse Video Selecting the icon again restores the image to its original state.

Select this icon to display or hide the threat overlay(s). They appear as
bright red or yellow (depending upon configuration settings) boxes
Threat around the threat(s) indicating a potential explosive has been found.

Select this icon to either display or hide the dense area overlay. It is a
solid yellow or red (depending upon configuration settings) overlay
Density Alert covering one or more areas that the system has determined are too dense
to analyze.
See the Density Alert Notes box below.
Select this icon to save the current screen image. It is grayed-out when N/A
scanning is in process and becomes available when the scan is
Manual Save completed.
Select this icon to restore the image to its default settings as established N/A
by your supervisor.
Home

Density Alert Notes


The ACX 6.4-MV does not analyze dense areas. You must determine the potential threat they
represent. Additional inspection is necessary if the dense portions of the item are large enough to
conceal a potential threat.
Your ACX 6.4-MV may be configured so that the Threat and Density Alert overlays are
controlled by the Threat icon alone.
• If so configured, the Density Alert icon does not appear in the Toolbar. Its function is still
active, but is now included in the Threat overlay.
• If not, the Density Alert function is controlled by its own Toolbar icon and is not included in
the Threat overlay.
If your supervisor has deselected the Density Alert function, the icon will not appear in the
toolbar and dense areas will not be highlighted.

Overlays must be displayed prior to the belt restarting: (1) if both Threat and Density Alert have been
deselected by Supervisor, (2) if the analysis detects a Threat, or, (3) if there is an area that causes a
Density Alert. Press a conveyor button or the Threat icon to display overlays. Press a conveyor button
(again) to restart the conveyor belt.

2-10 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

Overlay coloring is configurable so that Threats can be displayed either as red or yellow. Density
Alert coloring is also configurable and they can be displayed either as red or yellow.

2.4.1 Selecting the Icons

To select an individual icon, place your finger onto the bottom portion of the touchpad on the
Operator Console and slide it left or right until the desired icon is highlighted (appearing “pressed
in”) on the display, and then lift your finger.

When a function is selected, its icon changes to white with a green border, with the following
exceptions:
• Contrast: 3-dimensional gray, with dark-gray ‘fill’ for Low, Med and High
• Home: 3-dimensional gray (appearance does not change)

NOTE
To assist in icon selection, a blue arrow cursor appears on-screen if the Operator’s finger
location on the touchpad strays outside the icon activation range. This cursor displays only if
the upper portion of the touchpad is unused at the time. If another cursor is active (e.g., Zoom)
or if Contrast Windowing is enabled, the arrow does not appear.

Online Help

If Online Help is enabled on your system and the conveyor belt is stopped, keeping your finger on a
touchpad location corresponding to an icon for a pre-determined time (1–10 seconds), causes a small
yellow text box to appear (see Figure 2-5). Sliding your finger from one icon to the next after the
initial box has appeared causes the next corresponding help text box to appear. Lifting your finger
removes the help text box.

Figure 2-5. Online Help Box

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-11


System Operation 8100-11633-OM

2.4.2 Zoom Functions

The Zoom functions allow the operator to examine a portion of a scanned item in detail. These
functions can be used in all display modes.

2.4.2.1 Direct Zoom


1. Slide a finger over the lower portion of the touchpad to select the desired magnification on the
Toolbar. (If the system was in a high magnification mode, the image returns to 1x, that allows
the operator to select the area of interest.) A Zoom Box appears in the center of the screen.
2. Move your finger about the upper portion of the touchpad to place the Zoom Box around the
desired area on the screen.
3. Lift your finger. The selected area is immediately magnified. A small window box displays at
the upper-right corner of the screen when the image is zoomed. It contains a thumbnail image of
the entire screen and a cyan color box indicating the part of the screen that is currently zoomed.
- You may de-select Variable Contrast (by selecting the Variable Contrast Icon), then use the
touchpad to move the cyan box around the Thumbnail window and, therefore, zoom a
different area.

2.4.2.2 Continuous Zoom


1. Select Zoom In (+) and lift your finger. A rectangular box appears in the center of the screen
display. Place your finger on the upper portion of the touchpad to move the box around, and then
lift it. The selected area is magnified by two times and a thumbnail window appears in the
upper-right corner of the screen. The (1x) icon also changes appearance to indicate the current
zoom level. Place your finger on the (+) icon to magnify the image by a factor of two each time
it is selected (i.e., 2x, 4x, 8x up to 64x).
- You may de-select Variable Contrast (by selecting the Variable Contrast Icon), then use the
touchpad to move the cyan box around the Thumbnail window and, therefore, zoom a
different area.
2. If you select Zoom Out (-) and lift your finger, the image size immediately decreases by a factor
of two. To return to a 1x view, repeatedly use the Zoom Out function until 1x magnification
displays or press the Home icon.

2-12 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

2.4.3 Detailed Mark Threat Instructions


1. Select the Mark Threat icon. A purple Boundary Box automatically displays around the object.
Note the Boundary Box is only displayed on the Monitor that is displaying the toolbar.

Boundary Box

Mark Threat
Figure 2-6. Boundary Box on Monitor A
2. Place your finger at a point on the touchpad that corresponds with the desired image area that
appears suspicious.

NOTE
The Boundary Box does not permit you to draw or resize a Mark Threat box outside its
border. To remove a Boundary Box, remove all Mark Threat Boxes first (page 2-17).

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-13


System Operation 8100-11633-OM

Start of Mark Threat box (blue arrow)

Figure 2-7. Start Marking Threat

3. Lift your finger to set a starting point for creating a Mark Threat box.
4. Place your finger back down and slide it left, right, up or down to “draw” a blue box around that
area. Lift your finger. The Mark Threat box is set (Figure 2-8). Repeat these steps to place up to
10 Mark Threat boxes over the image.

Mark Threat Box completed

Figure 2-8. Mark Threat Box

To remove an existing Mark Threat box:


a. Select the Mark Threat toolbar icon.
b. Slide your finger about the touchpad until the blue cursor touches the blue Mark
Threat box. Its border immediately turns green.
c. While the green border box is displayed lift your finger to remove the box.

2-14 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

2.5 Performing Inspections

2.5.1 Process Overview

WARNING!
X-rays turn on for approximately five seconds whenever the conveyor is started.

With the conveyor belt running in the forward direction, the item to be inspected enters the inspection
tunnel and interrupts the photocell beam located just inside. The system generates X-rays. The item’s
image starts to scroll across the monitor screens. X-rays turn off when scanning is complete or if the
conveyor belt is stopped by pressing the stop or reverse button.

After scanning is complete, imaging tools such as Zoom, Trimat or Gray Scale modes, Contrast, Edge
Enhancement and Reverse Video, etc. may be employed. If an image appears suspicious during
inspection, these tools can be used to further investigate a perceived threat before clearing or rejecting
the bag. Refer to Section 2.4 on page 2-7 for details on how to use these tools.

2.5.2 Normal Inspection


1. If the system is at the Logon Screen, logon and select the Scan button.
2. After completion of the system startup sequence press the FORWARD pushbutton on the
console.
3. Place the item to be inspected on the incoming end of the conveyor belt. Be sure it lies flat.

WARNING!
Do not push or load an item past the leaded curtains at the ends of the tunnel extensions. Keep
hands outside the unit.

Restart or Stop Mode:


- The item immediately enters the tunnel for scanning
- The image scrolls onto the screens and stops
- The belt stops after the item is scanned
- Analysis is performed using the information from the scan
- Once computer analysis is complete, threat overlays may be displayed (if their features are
configured and enabled) on Monitor A
- The belt automatically restarts (if configured for Restart) or remains stopped (if configured
for Stop)
- Proceed with your image analysis. See “Using the Image Analysis Tools” on page 2-7.

Continuous Mode:
- The item immediately enters the tunnel for scanning
- The image scrolls onto the screens and stops until another scan starts and then the image will
start scrolling off the screen
- The belt does not stop MOVING

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-15


System Operation 8100-11633-OM

- Stop the conveyor belt if you want Analysis to be performed on the current bag
- . See Figure 2-9 and Figure 2-10 for on-screen indicators. The conveyor has to be stopped in
less than five seconds following the scan, and prior to another item being scanned to initiate
the analysis. Only the displayed portion of the item is analyzed using the information from
view C and view A. Threat overlays are displayed on monitor A only.
- Proceed with your image analysis. See “Using the Image Analysis Tools” on page 2-7.

Once a new bag has started being scanned, analysis will not be performed on the previous bag.
- A group of items touching (no spacing) is analyzed as one item. Only the portion of the items
on the display screen are analyzed as shown in Figure 2-9.

A green bar indicates


the system analysis
did not detect an
explosive threat

Figure 2-9. Continuous Mode, stop pressed while scanning two items that are touching

2-16 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

Stopping a bag in mid-scan and restarting and stopping at the end of a bag can result in one portion
of the item being cleared and the other portion alarming with an explosive threat as shown in
Figure 2-10.

A yellow bar indicates


the system analysis
detected an
explosive threat

Threat Overlays
may or may not be
displayed.
See Note below.

Figure 2-10. Continuous Mode conveyor stopped, started and stopped and items are touching.

NOTE
In Restart, Stop, or Continuous Mode when analysis is preformed, threat overlays must
be displayed prior to the conveyor being able to be restarted. Pressing the conveyor
FORWARD button first causes any explosive threat boxes or density alerts to appear (if
not displayed already). Press the FORWARD button to continue scanning.
Alternatively, you may select the Threat icon to reveal any overlays, then press a
conveyor button.

2.5.3 Clearing a Jam

CAUTION

While the belt is stopped, clear the jam. Never reach inside the tunnel while the belt is moving.
Follow the on-screen instructions.

There are three possibilities that can cause the following message to appear on-screen:

6: “Bag Jam/Photocell Timeout”


“Press a conveyor button to continue. Check for bags stuck at tunnel entrance”

The belt is running and:

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-17


System Operation 8100-11633-OM

• The entrance photocell is blocked for longer than ten seconds without an item entering the beam
• The exit photocell remains blocked for longer than ten seconds with nothing in the beam
• A beam is blocked for longer than 15 seconds with no deviation of data

2.5.4 Invalid Reference Air Sample

A purple bar may appear at the top of the screen while the item under inspection is being displayed
(Figure 2-11). If this happens, the conveyor remains stopped for Stop or Restart modes. Re-scan the
item or follow your site protocol.

If in Continuous mode, the belt stops only when the Conveyor Stop button is pressed. Follow your
site protocol for resolving a bag scan of this type.

Purple bar

Figure 2-11. Invalid Reference Air Sample Indicator

In rare situations, a combined purple/green or purple/yellow bar may display at the top of the screen.
This indicates that a bad air sample has been taken (purple bar) as well as a determination as to
whether or not an explosive threat has been detected. (Green = no explosive; Yellow = Explosive;
Purple = Bad Air Sample or Dropped Lines in image.)

2.5.5 Image Recall

Image Recall can be used if you decide that the previous image needs to be reviewed. The item itself
does not need to be re-scanned.
1. Press the CONVEYOR STOP button.
2. Press and hold the CONVEYOR STOP button while simultaneously pressing either the
FORWARD or REVERSE button to scroll the image to the right or left.

2-18 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM System Operation

NOTE
Image Recall works if more than one item has been scanned. Fifteen to twenty bags can be
recalled, depending on their length.

2.5.6 Image Archiving

Image Archiving supports storage of up to twenty thousand images, with image retention determined
by customer-defined expiration dates or on a first-in, first-out basis.

If there is a problem, you may see an error message beginning with “Data Collection is being turned
off due to…”. If you have a site protocol for handling this type error follow the protocol.

If the message is “The Disk is Full” or “The last bag was not saved” displays, deleting images files
to create more disk storage space should fix the problem. This can be done by logging off and logging
back on if a logon is required, or by turning the machine off and on. If one of these actions is
performed the software performs disk maintenance and will create space on the disk to store more
images.

Two other options are to continue without saving image files or contacting a supervisor for assistance.
To continue without saving images from this point on press any conveyor button to clear the error
message and then continue scanning.

2.5.7 Manual Save

Select the Manual Save icon (the “File Cabinet”) any time a bag image is stationary to save it.

2.6 Review

Review provides access to the currently logged on users’ last one hundred scanned item images.
1. Press the console FORWARD and REVERSE buttons simultaneously. This brings up the
Logon screen (refer to Figure 2-3 on page 2-5).

2. Logon and select the Review button .

The User ID box at the top-left displays the system state and currently logged on user’s identification.
For example: REVIEW–OP1234.

The toolbar displays a blue ‘Projector’ icon at its left end .


3. Press the Left or Right Console buttons to view the images.
Bags that were scanned in Continuous = No analysis bar displays, but purple bar displays if
invalid reference air sample occurred when the bag was originally scanned.
Bags that were scanned in Stop or Restart = Threat overlays display.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 2-19


System Operation 8100-11633-OM

4. To leave Image Review, press the console FORWARD and REVERSE buttons simultaneously.

2.7 Logging Off


1. Verify that all items under inspection have exited the inspection tunnel.
2. Press the Console FORWARD and REVERSE buttons simultaneously.

NOTE
An automatic Log Off occurs if no one has touched any system controls for a pre-defined period
as determined by your Supervisor. The L3 Screen Saver program activates. To resume normal
operation touch the touchpad and if required logon.

2.8 Powering Down the System


1. Verify that all items under inspection have exited the inspection tunnel.
2. Press the CONVEYOR STOP pushbutton to stop the conveyor. Log off, if applicable.
3. Turn the Power On/Off Keyswitch counterclockwise (to OFF) and remove the key.

2-20 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Options

Chapter 3. Options
3.1 Threat Image Projection (TIP)

TIP is a purchasable operator testing feature that can display bag images containing threats, as well
as project fictional threat object images into real bag images. If TIP has been activated on your
system, logon to access the Operator Interface screen and to prepare for inspection. (Operator IDs and
passwords must be unique and must remain confidential.)

Once you have logged on, the “Available Options” area appears as shown below. (See “Starting Up”
on page 2-1. for logon instructions.)

Figure 3-1. Available Options area with TIP enabled

There are four selections available to a screener; Scan, Review-MT, Review and Cfg-Rpt. Use the
Console Touchpad to select the desired button.

3.1.1 Scan

The system is ready to inspect items when the Operator Interface Screen appears. ‘SCAN’ and the
Operator ID are displayed in the top-left corner. A ‘grayed-out’ Suspect icon appears in the Toolbar.
System Status
& Operator ID

Suspect Icon
Figure 3-2. Operator Interface

Press the Console FORWARD button to begin scanning items. (Refer to Section 2.4 on page 2-7 for
details on how to use the imaging tools.)

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 3-1


Options 8100-11633-OM

NOTE
If a threat is projected and no action is taken (i.e., not selecting the SUSPECT icon or pressing
CONVEYOR STOP) within the initial time-out period (1 to 10 seconds), the conveyor stops
automatically and feedback is displayed.

3.1.1.1 Response Option #1


1. Select the SUSPECT icon.

As described in Table 2-2 on page 2-8, if the Suspect icon is present in the Toolbar and its
appearance is raised, you must select it when an image or an item in an image appears suspicious.
- If the system has projected a fictional threat, a colored dashed box surrounds it (Figure 3-3).
- If the system has not projected a fictional threat, no such box appears.

Colored, Dashed
Feedback
Box

Figure 3-3. Fictional Threat with Colored Dashed Box

In either case, a message box displays across the bottom of the screen. The type of message
displayed and its contents are configurable by your supervisor. Possible sample messages are:

You have correctly identified a fictional bomb threat.


Check the bag to make sure there are no real threats.

YOU DID NOT IDENTIFY A FICTIONAL KNIFE THREAT.


CHECK THE BAG TO MAKE SURE THERE ARE NO REAL THREATS.
PRESS ‘STOP’ TO CLEAR THIS MESSAGE.
2. Perform the action(s) as instructed in the message box.

3-2 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Options

The messages may contain text only, icons only or text with icons if so configured by your
supervisor.

NOTE
If a Network Supervisor Workstation is part of your ACX 6.4-MV X-ray Inspection
System, you may receive a feedback message such as:
The bag queue on all workstations are full.
Press any console button to continue.
or
There are no workstations online.
Press any console button to continue.
or
No fictional threat was projected.
Please follow the appropriate security procedures.
Follow the on-screen instructions.
• If the NSW bag queue is full, images will not be accepted until the maximum of 12
images per workstation is reduced by the NSW User. The X-ray machine will,
however, continue to scan bags after any console button is pressed.
• If there are no NSWs currently online, the X-ray machine will continue to scan bags
after any console button is pressed.

Once you have made a decision, any projected CTI or FTI will be removed from the screen, based on
the configuration settings. The removal time for FTIs is 1–30 seconds and for CTIs it is 1–10 seconds.
Feedback messages remain on-screen until a conveyor button is pressed.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 3-3


Options 8100-11633-OM

3.1.1.2 Response Option #2

Press the CONVEYOR STOP button. This permits up to 45 seconds (configured by your supervisor)
to analyze the image.
• If you determine a potential threat is present, select the SUSPECT icon.
• If you determine a potential threat is not present, restart the conveyor.

NOTE
If an image was projected and either the conveyor is restarted without selecting the SUSPECT
icon, or the image has timed out, a “missed” feedback message bar is displayed.

3.1.2 Review-MT

If not already at the Logon screen, press the console FORWARD and REVERSE buttons
simultaneously. This brings up the Logon screen.

1. Logon and select the Review-MT button .


Review-MT Mode is active when the red “Projector” icon is present in the left end of the toolbar.
Operators may use this mode, when not scanning bags, to look at their last 100 missed FTIs
(Fictional Threat Images). Only the current operator’s missed FTIs are displayed.
2. Press the Left or Right console button to view the images. A conveyor button must be pressed
for each image to appear.
3. You may exit Review-MT Mode at anytime by logging off.
- After initial setup or if all images have been correctly identified, Review-MT Mode still
functions. However, no images will appear.

NOTE
Operators cannot delete missed FTI images from the system (consult a higher level user).

3-4 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Options

Mode & User ID Filename Operator ID Date & Time FTI Orientation

Figure 3-4. Sample Review-MT Screen

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 3-5


Options 8100-11633-OM

3.1.3 Configure Reports (CFG-RPT)

3.1.3.1 FDRS Mode

Depending on the system configuration, FDRS Mode allows the operator to view his or her Screener
Log.

1. From the Logon screen, select . The ‘Reports’ tab shows what report(s) are available to
a screener (see Figure 3-5).

Figure 3-5. Reports tab (FDRS)

2. Select ‘View Report.’

The ‘FDRS Screener Log’ appears as shown in Figure 3-6 (next page).

3-6 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Options

Figure 3-6. FDRS Screener Log

Table 3-1. FDRS Screener Log

Category Information

UserID Assigned User Identification


FName User’s First Name
LName User’s Last Name
Login Time Date and Time of Login
Logout Time Date and Time of Logout
Bag Count Number of Bags/Items processed
Affiliation User’s Employer
Site Location of machine
SubLoc More specific location of machine
Model Model Number of machine used for scanning
Serial# Serial Number of machine used for scanning

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 3-7


Options 8100-11633-OM

3.1.3.2 TIP Reports


1. For systems configured with TIP, to view the logged on Screener’s or Operator’s Screener Log

or the Individual Screener Performance Summary, select . The ‘Reports’ tab shows
what report(s) are available to a screener.

Figure 3-7. Reports tab (TIP only)

2. Choose the report you wish to view.


3. Select ‘View Report’ (see Figure 3-8 below, or Figure 3-6 on page 3-7).

3-8 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Options

Figure 3-8. Individual Screener Performance Summary

Table 3-2. Individual Screener Performance Summary

Category Information

Date Date or range of dates, selected at ‘Reports’ tab


Bags Number of bags/items processed
TIPs Number of TIP insertions
Nh Number of hits
Nnon Non-TIP event (false alarm)
Nm Number of misses
Ph Probability of hit
Pnon Probability of non-TIP event
Response Time (Sec)
Hit Correct decision
Non Non-TIP event

4. When you are finished viewing, close the report by moving the cursor to the X at the top-right
corner and then press this location to select it.
5. To return to the Logon screen, move the cursor to Logoff.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 3-9


Options 8100-11633-OM

3.2 Network Supervisor Workstation

3.2.1 Overview

A Network Supervisor Workstation (NSW) allows a properly identified operator at another location
to view and inspect a bag image that the ACX 6.4-MV machine operator has deemed suspect. In the
meantime, the ACX 6.4-MV machine operator may continue to scan additional bags.

The networking of ACX 6.4-MV X-ray machines and Network Supervisor Workstations provides:
• A network topology of at least a 1 x 1 setup (one ACX 6.4-MV X-ray machine and one Network
Supervisor Workstation) using standard 10/100 Base-T Ethernet,
• A logon/logoff feature on both the ACX 6.4-MV X-ray machine and the NSW,
• The same Operator Graphical User Interface (GUI),
• Display of both bag and user information pertaining to the image,
• Image at NSW is identical to that of the ACX 6.4-MV X-ray machine; NSW has its own option to
display or not display potential threat information

The NSW does not deliver decision information to the X-ray machine.

If the system is configured so that the ACX 6.4-MV X-ray machine “Send All” or “Send Rejects”
option is selected; an image of every bag (or every rejected bag) is automatically sent to the Network
Supervisor Workstation. During this process, the conveyor belt stops until the image has been
presented at the NSW. Only then will the belt restart, allowing the next bag to be scanned. The
SUSPECT icon is unavailable (grayed out) during this time. If TIP is enabled, the SUSPECT icon
remains available.

If the system is configured so that the ACX 6.4-MV X-ray machine “Send On Demand” option is
selected; for a suspect bag, first the SUSPECT icon is selected and then the ‘Send Bag Image
Confirmation’ message displays, and the appropriate console button is pressed.

3-10 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Options

3.2.2 NSW Description

The Network Supervisor Workstation consists of a Display Monitor, Operator Console, UPS,
Computer, Keyboard and Mouse (not shown). Additional components may be included.

Power On
Indicator Touchpad
Bag Info. Window Online/Offline
‘Show/Hide’ button Keyswitch

Left or Right - Next Image

Console Close-up

Figure 3-9. Network Supervisor Workstation (NSW)

Power On
Power Off

Figure 3-10. Uninterruptible Power Supply

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 3-11


Options 8100-11633-OM

3.2.3 Powering Up

Apply power to the Workstation by pressing the Power On button on the UPS. This starts the NSW
computer.
• If the Workstation Console’s Online/Offline Keyswitch is in the Offline (horizontal) position, a
black screen with a tumbling L-3 Cube appears on the display monitor.
• If the Workstation Console’s Online/Offline Keyswitch is in the Online (vertical) position, either
a blank user interface screen appears or a Logon screen appears (refer to Figure 2-2 or Figure 2-3
on page 2-5).

3.2.4 Logging On

Refer to step 4 on page 2-3 in the Starting Up section for instructions on logging on.

3.2.5 Performing Inspections

With the exception of any conveyor-related activities and the exclusion of a SUSPECT icon in the
Toolbar, inspection at the NSW is the same as at the ACX 6.4-MV machine.

NSW User ID

BAG
INFORMATION
WINDOW
Number of images
in queue

Sender’s Name

Sender’s ID

X-ray Machine
Model
Bag Tag
Toolbar Information

Figure 3-11. NSW Interface

Images are sent from the ACX 6.4 MV operator to the NSW system. When an image arrives at the
NSW station and the NSW is online and not processing an image (the screen is clear) the image
displays. The NSW operator processes the image. After processing the image the operator presses the
left or right button to remove the image from the screen. If another image is waiting to be processed
it is displayed. If there are no more images to process the screen is cleared.

3-12 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Options

When images are sent from the ACX 6.4 MV operator to the NSW system and the NSW is displaying
an image the newly received image is added to the image queue. These images will be displayed and
processed in the order received.

Refer to Chapter 2, Section 2.4 on page 2-7 for help regarding the use of Image Analysis Tools.

3.2.6 Logging Off

To Log Off, press the Left and Right console buttons simultaneously.

3.2.7 Powering Down

NOTE
You must be logged on in order to power down the NSW System.

1. Turn the Key to the Offline position.


2. Press the Left and Right Operator Console buttons simultaneously. This initiates the computer
shut-down sequence.
3. Once the computer has completely shut down, turn off the UPS by pressing the Power Off button,
refer to Figure 3-10.
• Wait at least 10 seconds before turning the UPS back on.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 3-13


8100-11633-OM Error Messages

Chapter 4. Error Messages

WARNING!
It is important to follow all on-screen instructions. Failure to do so could result in personal injury
and/or damage to the equipment.

When an error condition occurs, an error message is displayed in a red panel at the bottom of the
monitor screen. The error message contains a detailed description of the condition. The actual text of
the error message varies with the error condition. The condition category, on the first line, is a general
description of the condition and points out the subsystem that caused it. The detailed description, on
the second line, presents more specific information about the condition and how to remedy the
problem, if possible. Refer to the following examples:
1: Emergency Stop Condition
Waiting for Emergency Stop condition to be cleared

In this case, the Operator would twist or pull out the Emergency Stop button, then see:
Waiting for Operator acknowledgement
Press a conveyor button to resume operation

The Operator would then press a conveyor button.

-OR-
4: X-ray Source Fault
X-ray subsystem is malfunctioning

In this case, the Operator would power-cycle the system (turn OFF power, wait 30 seconds, then turn
ON power)

Power-cycling can clear most errors. If one or two repetitions of this sequence does not remedy the
situation, contact L-3 Communications S&DS-trained Customer Support for assistance. Relay as
much detail as possible about the fault and the error message displayed.

If verification fails, the following error message appears in a red box on the bottom of the monitor
screen:
8: System Failed Verification
Press a conveyor button to continue. If problem persists contact service personnel

Follow the on-screen instructions.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 4-1


Error Messages 8100-11633-OM

Table 4-1. Product Error Codes

Resolved
# Error Message by:

0 NO_HOST_ERROR “No Error”, N/A


“This message should never appear!”
1 EMERGENCY_STOP “Emergency Stop Condition”, Operator
“Waiting for Emergency Stop Condition to
be cleared”
2 PANEL_INTERLOCKS_OPEN “Panel Interlock Condition”, Service
“Close panels to restore operation”
3 DETECTOR_INTERLOCKS_OPEN “Detector Box Interlock Condition”, Service
“Close detector panels to restore operation”
4 TEMPERATURE_HIGH “Temperature Monitor Condition” Service
“System temperature has exceeded limits”
5 XRAY_SOURCE_DEAD “X-ray Source Fault” Service
“X-ray subsystem is malfunctioning”
6 PHOTOCELL_TIMEOUT “Bag Jam/Photocell Time-out” Operator
“Press a conveyor button to continue. Check
for bags stuck at tunnel entrance”
7 AD_CABLE_DISCONNECTED “A/D Cable Disconnected” Service
“Power down system and reconnect cable”
8 WATCHDOG_TIMEOUT “Watchdog Time-out” Service
“The system has shut down due to computer
malfunction”
9 FAILED_VERIFICATION “System Failed Verification” Service
“Press a conveyor button to continue. If
problem persists contact service personnel”
10 TANK_VOLT_DIFF_HIGH “Tube Voltage-Differential Exceeds Service
Allowable Range”
“Power cycle the system. If the problem
persists contact service personnel.”
11 TANK_AMP_DIFF_HIGH “Tube Current-Differential Exceeds Service
Allowable Range”
“Power cycle the system. If the problem
persists contact service personnel.”

4-2 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Error Messages

Table 4-1. Product Error Codes

Resolved
# Error Message by:

12 TANK_VOLTAGE_HIGH “Tube Voltage Exceeds Allowable Range” Service


“Turn off system and contact service
personnel”
13 TANK_AMPERAGE_HIGH “Tube Current Exceeds Allowable Range” Service
“Turn off system and contact service
personnel”
14 MAINFRAME_DISCONNECTED “X-ray Controller Cable is Disconnected Service
“Power down system and reconnect cable”
15 OPERATOR_NOT_ON_MAT “Operator Sensor Interlock” Operator
“Please return to the normal operating
position”
16 BAD_AC_VOLTAGE_TO_PDB “Line Voltage Fault” Operator
“Power cycle the system”
17 AD_TEMP_OUTSIDE_RANGE “A/D Board Temperature Exceeds Service
Allowable Range”
“Turn off system and contact service
personnel”
18 IMAGE_ARCHIVE “Image Archive Process Error” Operator
“Turn off Image Archive”
18 MISC_ERROR “Press any console button to continue” Operator
19 TIP _MSG_FEEDBACK “Press any console button to continue” Operator
101- SYSTEM_ERROR Service
106

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 4-3


Error Messages 8100-11633-OM

Table 4-2. Non-Fatal Errors

Turning off Data Collection


Turning off Data Collection: DC Manager
Turning off Data Collection: Header
Turning off Data Collection: Block
The Last Bag Was Not Saved
There Are No Workstations Online
The Bag Queue On All Workstations are Full
Fail to Send the Image to NSW, Check the connection or NSW Disk

Although Non-Fatal errors do not hinder machine operation, contact Customer Support if they
persist.

4-4 L-3 Communications Security and Detection Systems - Proprietary Revision A1


8100-11633-OM Service and Maintenance

Chapter 5. Service and Maintenance


5.1 Customer Support Information

The Model ACX 6.4-MV Automated Checkpoint X-ray is designed and manufactured to the
highest standards of quality. However, any system may require servicing from time to time. If there
is a problem, please note the circumstances and symptoms. Note any error message presented on the
display monitor. Relate this information to L-3 Communications S&DS-trained Customer Support
Personnel.

WARNING!
The ACX 6.4-MV is a Certified Cabinet X-ray System and must be installed, relocated, and
serviced only by L-3 Communications S&DS-trained Customer Support Personnel. There are
potentially hazardous high voltages, computer-controlled mechanical assemblies and X-ray
generator assemblies. There are no user serviceable parts inside.

See Contact Information on page i for details about contacting L-3 Communications Security and
Detection Systems, Inc. Customer Support.

5.2 Daily Inspection

Daily inspection is intended as a quick check by the system operator to ensure the system is fit for
operation.
1. Verify all system Emergency-Stops are operating properly.
2. Inspect all exterior surfaces for loose, missing or damaged components.
3. Verify all safety warning labels are visible and legible.
4. Check tunnel for obstructions and remove any objects that would block or impede the flow of
baggage.
5. Verify conveyor belt is NOT rubbing against the tunnel wall and is free of rips and tears.
6. Check that the X-ray ON and System ON lamps are operating properly.
7. Clean monitors with non-abrasive/non-filming glass cleaner.
8. Clean Operator Console touchpad with mild detergent and a damp soft cloth.
9. Gently clean entrance photocells with a lint-free cloth moistened with cleaner.
10.Remove all baggage tags, tape, stickers, etc. from the conveyor belt.

NOTE
Please contact L-3 S&DS Customer Support to report and schedule service for any deficiencies.

Revision A1 L-3 Communications Security and Detection Systems - Proprietary 5-1


Manual Improvement Form

Submitted by: Title: Software Rev. (if applicable):

Organization Name & Address: Telephone:

Date Submitted:

Comments (Include proposed rewrite - Attach additional pages as needed:

After completing the sections above, mail or fax this form to:
L-3 Communications Security and Detection Systems, Inc.
Design Services Department
10 Commerce Way
Woburn, MA 01801-1028 US
Fax: 781-939-3996 E-mail: manuals.sds@l-3com.com

8100-11633-OM Revision A1 ACX 6.4-MV Operator Manual

Potrebbero piacerti anche