NaI(Tl) Detector Efficiency Computation Using Radioactive Parallelepiped Sources Based on Efficiency Transfer Principle
نویسندگان
چکیده
منابع مشابه
Determination of Full Energy Peak Efficiency of NaI(Tl) Detector Depending on Efficiency Transfer Principle for Conversion Form Experimental Values
In this work we calibrated the NaI(Tl) scintillation detectors (5.08 × 5.08 cm and 7.62 × 7.62 cm) and the Full Energy Peak Efficiency (FEPE) for these detectors have been calculated for point sources placed at different positions on the detector axis using the analytical approach of the effective solid angle ratio. This approach is based on the direct mathematical method reported by Selim and ...
متن کاملassessment of the efficiency of s.p.g.c refineries using network dea
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
Interval Efficiency Assessment in Network Structure Based on Cross –Efficiency
As we know, in evaluating of DMUs some of them might be efficient, so ranking of them have a high significant. One of the ranking methods is cross-efficiency. Cross efficiency evaluation in data envelopment analysis (DEA) is a commonly used skill for ranking decision making units (DMUs). Since, many studies ignore the intra-organizational communication and consider DMUs as a black box. For sign...
متن کاملSecurity and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
In Financial Cryptography 2013, Bringer, Chabanne and Patey proposed two cryptographic protocols for the computation of Hamming distance in the two-party setting. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer (COT) and is claimed to provide full security in the malicious case. The proposed protocols ...
متن کاملHigh efficiency tin-based EUV sources
We have previously proposed ithography applications. Here we report advances in measurement
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science and Technology of Nuclear Installations
سال: 2015
ISSN: 1687-6075,1687-6083
DOI: 10.1155/2015/451932