Radionuclide's such as radium-226, cesium-137, and cobalt-60 have been used as sources of gamma rays for teletherapy. These gamma rays are emitted from the radionuclide's as they undergo radioactive disintegration. Of all the radionuclide's, Co-60 has proved to be the most suitable for external beam radiotherapy.
Radionuclide's such as radium-226, cesium-137, and cobalt-60 have been used as sources of gamma rays for teletherapy. These gamma rays are emitted from the radionuclide's as they undergo radioactive disintegration. Of all the radionuclide's, Co-60 has proved to be the most suitable for external beam radiotherapy.
TISSUE PHANTOM RATIO - THE PHOTON BEAM QUALITY INDEXVictor Ekpo
TPR(20,10) is the recommended photon beam quality index by IAEA TRS-398 for megavoltage clinical photons generated by linear accelerators. This presentation goes through the basics of Tissue Phantom Ratio (TPR).
In 2000 IAEA published another International Code of Practice.
“Absorbed Dose Determination in External Beam Radiotherapy” (Technical Report Series No. 398)
Recommending procedures to obtain the absorbed dose in water from measurements made with an ionisation chamber in external beam radiotherapy (EBRT).
TISSUE PHANTOM RATIO - THE PHOTON BEAM QUALITY INDEXVictor Ekpo
TPR(20,10) is the recommended photon beam quality index by IAEA TRS-398 for megavoltage clinical photons generated by linear accelerators. This presentation goes through the basics of Tissue Phantom Ratio (TPR).
In 2000 IAEA published another International Code of Practice.
“Absorbed Dose Determination in External Beam Radiotherapy” (Technical Report Series No. 398)
Recommending procedures to obtain the absorbed dose in water from measurements made with an ionisation chamber in external beam radiotherapy (EBRT).
Application of ann for ultimate shear strength of fly ash concrete beamseSAT Journals
Abstract
The application of artificial neural networks (ANN) for ultimate shear strength of fly ash concrete beams with transverse
reinforcement is investigated in this paper. An ANN model is built, trained and tested using the available test data of 216 RC beams
collected from the literature also the experimental data of twenty seven fly ash concrete beams under shear. The experimental shear
strength were also compared to those obtained using building codal equations and empirical equations proposed by various
researchers. The ANN model was found to predict satisfactorily when compared to available analytical predictions.
Keywords: Artificial Neural Network (ANN), Building codes, Comparison, Charts, Empirical Equations, Fly ash
Concrete, Shear Strength.
Application of ann for ultimate shear strength of fly ash concrete beamseSAT Journals
Abstract
The application of artificial neural networks (ANN) for ultimate shear strength of fly ash concrete beams with transverse
reinforcement is investigated in this paper. An ANN model is built, trained and tested using the available test data of 216 RC beams
collected from the literature also the experimental data of twenty seven fly ash concrete beams under shear. The experimental shear
strength were also compared to those obtained using building codal equations and empirical equations proposed by various
researchers. The ANN model was found to predict satisfactorily when compared to available analytical predictions.
Keywords: Artificial Neural Network (ANN), Building codes, Comparison, Charts, Empirical Equations, Fly ash
Concrete, Shear Strength.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A new approach of edge detection in sar images using region based active cont...eSAT Journals
Abstract This paper presents a new methodology for the edge detection of complex radar images. The approach includes the edge improvisation algorithm and followed with edge detection. The nature of complex radar images made edge enhancement part before the edge detection as the data is highly heterogeneous in nature. Thus, the use of discrete wavelet transform in the edge improvisation algorithm is justified. Then region based active contour model is used as edge detection algorithm. The paper proposes the distribution fitting energy with a level set function and neighborhood means and variances as variables. The performance is tested by applying it on different images and the results are been analyzed. Keywords: Edge detection, Edge improvisation, Synthetic Aperture radar (SAR), wavelet transforms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
Automatic reading cr39
1. DEVELOPMENT AND
IMPLEMENTATION OF AN
AUTOMATIC COUNTING
SYSTEM FOR CR-39 SSTND
Name: Moayyad Mazen
Alssabbagh
Matric No.: MGQ120003
Supervisor: Mr. Tan Li Kuo
Co-supervisor: Prof. Kwan-Hoong Ng and Dr. Vincent Phua
UNIVERSITI
M A L A Y A
MEDICAL PHYSICS RESEARCH PROJECT
MGQG6189
2. INTRODUCTION
• The CR-39 solid state passive nuclear track detector is a
popular method to measure charged particle and neutron
radiation due to its low cost, robustness, track
permanence, and insensitivity to Gamma, X-ray, Beta and
Electromagnetic waves.
• Heavy charged particles passing through these passive
detectors leave a narrow trail of damage; this damage is
visible at modest optical magnification levels.
• Traditional manual counting methods are labor intensive
and highly operator dependent.
11 July 2013
4. 11 July 2013
• The main aim of this research is to develop
an affordable automatic CR-39 track
counting system.
• Comparing the obtained results from the
software with the manual ones.
OBJECTIVES
5. BACKGROUND AND LITERATURE
REVIEW
• CR-39 detectors are constructed from a polyallyl diglycol
carbonate (C12H18O7)
• Applications: Radon dosimetry, Personal neutron
dosimeter.
• Advantages: inexpensive, insensitive to EM, simple
processing method, robust, transparent and can be cut
into small pieces.
• Disadvantages: not reusable, counting is time consuming
(manual counting), Commercial digital system (expensive)
6. BACKGROUND AND LITERATURE
REVIEW (Cont.)
• The characteristic of tracks: small light spot and
uniform shape (circular or elliptical)
• The diameter is affected by:
1. etching conditions (time, temp.,
concentration … etc.) and
2. The energy of incident particles
Artefacts
Tracks
7. BACKGROUND AND LITERATURE
REVIEW (Cont.)
• Most track-reading systems use:
1. conventional optical microscopes.
2. high resolution charged couple device (CCD) camera to capture the magnified
picture.
• Commercial software packages used for track counting, such as:
• Image-Pro
• Free software as Image-J
• Monte Carlo simulation
• Others used MATLAB® (Patiris, Blekas, & Ioannides, 2007) (Ahn & Lee, 2005; Puglies, Sciani, Stanojev
Pereira, & Pugliesi, 2007) (Dwaikat, et al., 2010) (Zylstra, et al., 2012).
8. METHODOLOGY
EQUIPMENT USED
• Traditional Microscope
• Full Digital Microscope
• Stage micro-ruler microscope slide
• CR-39 detectors.
• Ra-226 with activity of 122KBq (AECS)
• Chemical solution (NaOH)
• MatLab software v. R2009a
11 July 2013
9. METHODOLOGY (Cont.)
• A set of CR-39 detectors with dimensions of 1.5 cm x 1.3 cm were
exposed to Ra-226 for different time periods (1, 2, 4, 8 and 12 hours).
• 6 M of NaOH solution at a 70 ᵒC over 7 hours used for etching process.
• Two Microscopes were used to capture the images of the detectors:
• The first one was a traditional light microscope with a digital camera
connected to the eye piece. (0.3 MP)
• The second microscope was a full digital one with an LCD monitor with
an area of 3.5” which acts as a 10x eyepiece. (2 MP).
• The same magnification (40x) was used for both microscopes.
11 July 2013
10. METHODOLOGY (Cont.)
11 July 2013
• Manual and Automatic counting were performed for
both images from old and new microscope.
• A comparison between manual and automated
counting is performed.
11. RESULTS
11 July 2013
Manual counting.: Traditional microscope and the Digital Microscope
20 scenes have been captured from each detector. Manual counting has been done
and the average was calculated.
(Traditional: 0.7 mm x 0.55 mm) (Digital: 1 mm x 1.3 mm)
12. RESULTS (Cont.)
11 July 2013
Automatic counting.: Traditional microscope and the Digital Microscope
Automatic counting has been done for the 20 scenes of each detector and the
average was calculated.
13. RESULTS (Cont.)
Manual counting.: Traditional microscope and the Digital Microscope
Table 1: The difference of reading for both manual and automatic counting (first & second
microscopes)
First microscope Second microscope
Exp. time
(hr)
Radon Con.
kBq.h/m3
Manual
counting
Auto.
counting
Difference
in reading
Manual
counting
Auto.
counting
Difference
in reading
1 170 973 850 14.9% 516 550 6.6%
2 340 1671 1565 6.3% 1094 1124 2.7%
4 680 3052 2750 9.9% 2976 2927 1.6%
8 1360 5434 3789 30.3% 5857 5857 0.0%
13 2210 9157 6144 32.9% 10713 10602 1.0%
14. RESULTS (Cont.)
11 July 2013
Calibration curves for manual counting:
Traditional microscope and the Digital Microscope
973
1671
3052
5434
9157y = 4.1467x
R² = 0.9946
0.00
1000.00
2000.00
3000.00
4000.00
5000.00
6000.00
7000.00
8000.00
9000.00
10000.00
0 500 1000 1500 2000 2500
Density(Tr/cm2)
Radon Exp. (KBq.hr/m3)
Calibration curve for manual counting
(Traditional Microscope)
516 1094
2976
5857
10713y = 4.6491x
R² = 0.9892
0.00
2000.00
4000.00
6000.00
8000.00
10000.00
12000.00
0 500 1000 1500 2000 2500
Density(Tr/cm2)
Radon Cons. (KBq.hr/cm3)
Calibration curve of manual counting
(New Microscope)
15. RESULTS (Cont.)
11 July 2013
Calibration curves for Automatic counting:
Traditional microscope and the Digital Microscope
868
1434
2421
3789
6144y = 2.8629x
R² = 0.9648
0.00
1000.00
2000.00
3000.00
4000.00
5000.00
6000.00
7000.00
0 500 1000 1500 2000 2500
Density(Tr/cm2)
Radon Exp. (KBq.hr/cm3)
Calibration curve for automatic counting
(Traditional Microscope)
550 1124
2927
5857
10602y = 4.6133x
R² = 0.9907
0.00
2000.00
4000.00
6000.00
8000.00
10000.00
12000.00
0 500 1000 1500 2000 2500
Density(Tr/cm2)
Radon Cons. (KBq.hr/cm3)
Calibration curve of Automatic Counting
(New Microscope)
16. DISCUSSION
11 July 2013
Elliptical
tracks
Circle
tracks
Bubbles
Defects
De-noising the image
means to remove the
scratches, bubbles and
small dots that are
caused by the camera
or the detector itself.
To achieve a clear and
acceptable image, the
program depends on
three Steps:
1. Binary threshold
2. Size Threshold
3. Circularity Threshold
17. DISCUSSION (Cont.)
Binary
• The tracks are usually having lower brightness than the defects (more dark). The
image is converted to binary image (Black and white)
All pixels having an illumination greater than the threshold value replaced with the value of 1
while the other pixels with the value of 0 .
• Clearness of the images affected by the illumination number of tracks counted .
• The user has to chose the binary threshold.
Origin image Traditional Microscope Digital Microscope
11 July 2013
18. DISCUSSION (Cont.)
Size threshold
The tracks either have circular
or elliptical shapes.
All objects with less than the
pixel threshold were removed.
(26 pixel minimum, 201 pixel maximum)
11 July 2013
19. DISCUSSION (Cont.)
Circularity
Circularity threshold was settled to 0.75 - 1 (practically) this is sufficient for the detection
of circular and elliptical tracks, and objects having values less than this threshold will not
be considered as tracks.
11 July 2013
The uncounted objects were
surrounded by white lines
𝑅 =
4𝜋. 𝐴𝑟𝑒𝑎
𝑃𝑒𝑟𝑖𝑚𝑒𝑡𝑒𝑟2
20. LIMITATION
• The uniformity of illumination is very important to
reduce the graded black shadows on the image
edges
• The system currently lacks features such as counting
overlapping tracks and calculating their average size
to estimate the average energy
• The binary threshold value entered manually by the
user and still observer dependent
21. FUTURE WORK
• One of the suggested methods to count the overlapping tracks is
to divide the size of the overlapped tracks by the average size of
individual track. This method need to be tested for various
overlapping tracks from different detectors and different
particles’ energies
• An algorithm should be developed to calculate the binary
threshold value automatically.
• Enhance the system to detect tracks under the graded black
edges on image.
22. CONCLUSION
• By using MATLAB® software, an automatic system that can count
the tracks on the CR-39 was developed.
• The system is highly dependent on image clearness. Despite this,
the system showed the ability to count the tracks on different
resolutions (0.3 Megapixel and 2 Megapixel )
• A good ability to find and count elliptical tracks .
• The system takes less than one minute for track counting per
detector .
23. Finally
A new set of CR-39 has exposed
to a photon beam in LINAC unit to
detect the neutron activation
when using megavoltage of 10MV Optically Stimulated Luminescence (OSL)
25. References
Spring, K. R., Fellers, T. J., & Davidson, M. W. (2013). Introduction to Charge-Coupled Devices
(CCDs). Retrieved April 30, 2013, from MicroscopyU:
http://www.microscopyu.com/articles/digitalimaging/ccdintro.html
Ahmed, S. N. (2007). Physics and Engineering of Radiation Detection (1st ed.). San Diego,
USA: Academic Press - Elsevier.
AHN, G. H., & LEE, J.-K. (2005). CONSTRUCTION OF AN ENVIRONMENTAL RADON MONITORING
SYSTEM USING CR-39 NUCLEAR TRACK DETECTORS. NUCLEAR ENGINEERING AND
TECHNOLOGY, 37(4), 395-400.
AL-Talbany, N. F., Jaafar, S. M., & Al-Nafiey, M. S. (2013). Measurement the Concentration of
Alpha Emitters in the Urine In Vitro, Natural Exposure. Journal of Natural Sciences Research,
3(3), 62-68.
Choppin, G., Rydberg, J., & Liljenzin, J. O. (2002). Radiochemistry and Nuclear Chemistry
(Third ed.). Butterworth-Heinemann.
Durrani, S. A., & Radomir, I. (1997). Radon Measurements by Etched track Detectors.
Singapore: World Scientific Pub. Co. Pte. Ltd.
26. Dwaikat, N., El-hasan, M., Sueyasu, M., Kada, W., Sato, F., Kato, Y., et al. (2010). A fast method
for the determination of the efficiency coefficient of bare CR-39 detector. Nuclear Instruments
and Methods in Physics Research B, 268, 3351–3355.
FELICE, P. D., COTELLESSA, G., CAPOGNI, M., CARDELLINI, F., PAGLIARI, M., & SCIOCCHETTI, G.
(2013). The Novel Track Recording Apparatus From Ssntd For Radon Measurement.
Romanian Journal of Physics, 58, S115-S125.
Gaillard, S., Fuchs, J., Galloudec, N. R.-L., & Cowan, T. E. (2007). Study of saturation of CR39
nuclear track detectors at high ion fluence and of associated artifact patterns. Review of
Scientific Instruments, 78, 013304.
Gonzalez, R. C., Woods, R. E., & Eddins, S. L. (2004). Digital Image Processing Using Matlab.
New Jersey, USA: Pearson Education. Inc.
KHAN, H. A., & KHAN, A. N. (1989). Solid state nuclear track detection (ssntd): a useful
scientific tool for basic and applied research. Journal of Islamic Academy of Sciences, 2:4,
303-312.
References
27. Matthews, R. (2013, Jan 6). Digital Image File Types Explained. Retrieved May 5, 2013, from
Wake Forest University Student, Faculty and Staff Web Pages:
http://users.wfu.edu/matthews/misc/graphics/formats/formats.html
Nikezic, D., & Yu, K. N. (2004). Formation and growth of tracks in nuclear track materials.
Materials Science and Engineering, 46, 51-123.
Nikezic, D., & Yu, K. N. (2007). Computer simulation of radon measurements with nuclear
track detectors. In S. J. Bianco, Computer Physics Research Trends (1st ed., pp. 119-150).
Nova Science Publishers, Inc.
Patiris, D. L., Blekas, K., & Ioannides, K. G. (2007). TRIAC II. A MatLab code for track
measurements from SSNT detectors. Computer Physics Communications, 177, 329-338.
Puglies, F., Sciani, V., Stanojev Pereira, M. A., & Pugliesi, R. (2007). Digital System to
Characterize Solid State Nuclear Track Detectors. Brazilian Journal of Physics, 37(2A), 446-
449.
References
28. Sidorov, M., & Ivanov, O. (Eds.). (2010). Nuclear Track Detectors: Design, Methods and
Applications. Nova Science Publishers, Inc.
Sinenian, N., Rosenberg, M. J., Manuel, S. , M. J.-E., Casey, D. T., Zylstra, A. B., Rinderknecht, H.
G., et al. (2012). The response of CR-39 nuclear track detector to 1-9 MeV protons. MA:
Plasma Science and Fusion Center.
Thorpe, G. S. (2001). Chemistry (3rd ed.). (D. Wright, S. Gomoll, & C. Bushee, Eds.) New York,
USA: Hungry Minds, Inc.
ZAKI, M. F., & EL-SHAER, Y. H. (2007). Particularization of alpha contamination using CR-39
track detectors. journal of physics, 69(4), 567-574.
Zylstra, A. B., Frenje, J. A., Se´guin, F. H., GatuJohnson, M., Casey, D. T., Rosenberg, M. J., et al.
(2012). A newmodeltoaccountfortrackoverlapinCR-39data. Nuclear Instruments and Methods
in Physics Research A, 681, 84-90.
References