{"title":"Detectors for Accelerator-Based Security Applications","authors":"G. Warren, S. Stave, E. Miller","doi":"10.1142/S179362681530011X","DOIUrl":null,"url":null,"abstract":"We present a review of detector systems used in accelerator-based security applications. The applications discussed span stockpile stewardship, material interdiction, treaty verification, and spent nuclear fuel assay. The challenge for detectors in accelerator-based applications is the separation of the desired signal from the background, frequently during high input count rates. Typical techniques to address the background challenge include shielding, timing, selection of sensitive materials, and choice of accelerator.","PeriodicalId":376234,"journal":{"name":"Reviews of Accelerator Science and Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Reviews of Accelerator Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/S179362681530011X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We present a review of detector systems used in accelerator-based security applications. The applications discussed span stockpile stewardship, material interdiction, treaty verification, and spent nuclear fuel assay. The challenge for detectors in accelerator-based applications is the separation of the desired signal from the background, frequently during high input count rates. Typical techniques to address the background challenge include shielding, timing, selection of sensitive materials, and choice of accelerator.