A neutron based vehicle borne improvised explosive device detection system

David Koltick, Seth McConchie

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

The design and performance of a pulseable neutron source utilizing a D-T neutron generator and a depleted uranium reflector are presented for use in a scanning system of improvised explosive devices. Approximately half the generators 14 MeV neutron flux is used to produce a fission-like neutron spectrum similar to 252Cf. For every 14 MeV neutron entering the reflector, more than one fission-like neutron is reflected back across the surface of the reflector. Because the delayed neutron production is more than two orders of magnitude below the prompt neutron production, the source takes full advantage of the generators pulsed mode capability. Applications include all elemental characterization systems using neutron-induced gamma-ray spectroscopy. The source simultaneously emits 14 MeV neutrons optimal to excite fast neutron-induced gamma-ray signals, such as from carbon and oxygen, and fission-like neutrons optimal to induce neutron capture gamma-ray signals.

Original languageEnglish
Title of host publicationProceedings 2007 41st Annual IEEE International Carnahan Conference on Security Technology, ICCST
Pages292-300
Number of pages9
DOIs
StatePublished - 2007
Externally publishedYes
Event2007 41st Annual IEEE Carnahan Conference on Security Technology, ICCST - Ottawa, ON, Canada
Duration: Oct 8 2008Oct 11 2008

Publication series

NameProceedings - International Carnahan Conference on Security Technology
ISSN (Print)1071-6572

Conference

Conference2007 41st Annual IEEE Carnahan Conference on Security Technology, ICCST
Country/TerritoryCanada
CityOttawa, ON
Period10/8/0810/11/08

Keywords

  • Gamma ray spectroscopy
  • Neutron elemental analysis
  • Neutron interrogation

Fingerprint

Dive into the research topics of 'A neutron based vehicle borne improvised explosive device detection system'. Together they form a unique fingerprint.

Cite this