Threat Sources for Detection Algorithm Testing Developed with SCALE

Douglas E. Peplow, Daniel E. Archer, James M. Ghawaly, Tenzing H.Y. Joshi, Mark S. Bandstra, Brian J. Quiter

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The result for each of the 64 “threat” sources, summarized in Table III, is an energy-dependent source distribution in both a SCALE/MAVRIC distribution definition format and an MCNP SI/SP format. These can be used in MC simulations—an example is shown in Fig. 7—as simple point sources in air, with the self-shielding and outer shielding already included. The MC fluxes will be processed into list-mode detection events (a given deposited energy at a given time), which can be fed into various detection algorithms. Hundreds of GB of synthetic detector data will be made for algorithm training and comparisons.

Original languageEnglish
Title of host publicationProceedings of the 14th International Conference on Radiation Shielding and 21st Topical Meeting of the Radiation Protection and Shielding Division, ICRS 2022/RPSD 2022
PublisherAmerican Nuclear Society
Pages136-139
Number of pages4
ISBN (Electronic)9780894487866
DOIs
StatePublished - 2022
Event14th International Conference on Radiation Shielding, ICRS 2022 and 21st Topical Meeting of the Radiation Protection and Shielding Division, RPSD 2022 - Seattle, United States
Duration: Sep 25 2022Sep 29 2022

Publication series

NameProceedings of the 14th International Conference on Radiation Shielding and 21st Topical Meeting of the Radiation Protection and Shielding Division, ICRS 2022/RPSD 2022

Conference

Conference14th International Conference on Radiation Shielding, ICRS 2022 and 21st Topical Meeting of the Radiation Protection and Shielding Division, RPSD 2022
Country/TerritoryUnited States
CitySeattle
Period09/25/2209/29/22

Funding

This work was sponsored by the Office of Defense Nuclear Nonproliferation Research and Development, National Nuclear Security Administration. 1This manuscript has been authored by UT-Battelle LLC under contract DE-AC05-00OR22725 with the US Department of Energy (DOE). The US government retains and the publisher, by accepting the article for publication, acknowledges that the US government retains a nonexclusive, paid-up, irrevocable, worldwide license to publish or reproduce the published form of this manuscript, or allow others to do so, for US government purposes. DOE will provide public access to these results of federally sponsored research in accordance with the DOE Public Access Plan (http://energy.gov/downloads/doe-public-access-plan).

FundersFunder number
Office of Defense Nuclear Nonproliferation Research and Development
U.S. Department of Energy
National Nuclear Security Administration
UT-BattelleDE-AC05-00OR22725

    Fingerprint

    Dive into the research topics of 'Threat Sources for Detection Algorithm Testing Developed with SCALE'. Together they form a unique fingerprint.

    Cite this