Fusion based neutron sources for security applications

Neutron techniques

S. Albright, R. Seviour

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The current reliance on X-Rays and intelligence for national security is insufficient to combat the current risks of smuggling and terrorism seen on an international level. There are a range of neutron based security techniques which have the potential to dramatically improve national security. Neutron techniques can be broadly grouped into neutron in/neutron out and neutron in/photon out techniques. The use of accelerator based fusion devices will potentially enable to wide spread application of neutron security techniques due to the potential for much safer operation than that offered by fission or sealed tube sources. In this paper we discuss some of the neutron security techniques available and the advantages they present.

Original languageEnglish
Title of host publicationIPAC 2014: Proceedings of the 5th International Particle Accelerator Conference
PublisherJoint Accelerator Conferences Website (JACoW)
Pages2227-2229
Number of pages3
ISBN (Electronic)9783954501328
Publication statusPublished - 1 Jul 2014
Event5th International Particle Accelerator Conference - Dresden, Germany
Duration: 15 Jun 201420 Jun 2014
Conference number: 5
http://inspirehep.net/record/1122761?ln=en (Link to Conference Details)

Conference

Conference5th International Particle Accelerator Conference
Abbreviated titleIPAC'14
CountryGermany
CityDresden
Period15/06/1420/06/14
Internet address

Fingerprint

neutron sources
fusion
neutrons
terrorism
combat
intelligence
fission
accelerators
tubes
photons
x rays

Cite this

Albright, S., & Seviour, R. (2014). Fusion based neutron sources for security applications: Neutron techniques. In IPAC 2014: Proceedings of the 5th International Particle Accelerator Conference (pp. 2227-2229). Joint Accelerator Conferences Website (JACoW).
Albright, S. ; Seviour, R. / Fusion based neutron sources for security applications : Neutron techniques. IPAC 2014: Proceedings of the 5th International Particle Accelerator Conference. Joint Accelerator Conferences Website (JACoW), 2014. pp. 2227-2229
@inproceedings{6c0f9c20018a45bfa8672e23788f6f55,
title = "Fusion based neutron sources for security applications: Neutron techniques",
abstract = "The current reliance on X-Rays and intelligence for national security is insufficient to combat the current risks of smuggling and terrorism seen on an international level. There are a range of neutron based security techniques which have the potential to dramatically improve national security. Neutron techniques can be broadly grouped into neutron in/neutron out and neutron in/photon out techniques. The use of accelerator based fusion devices will potentially enable to wide spread application of neutron security techniques due to the potential for much safer operation than that offered by fission or sealed tube sources. In this paper we discuss some of the neutron security techniques available and the advantages they present.",
author = "S. Albright and R. Seviour",
year = "2014",
month = "7",
day = "1",
language = "English",
pages = "2227--2229",
booktitle = "IPAC 2014: Proceedings of the 5th International Particle Accelerator Conference",
publisher = "Joint Accelerator Conferences Website (JACoW)",

}

Albright, S & Seviour, R 2014, Fusion based neutron sources for security applications: Neutron techniques. in IPAC 2014: Proceedings of the 5th International Particle Accelerator Conference. Joint Accelerator Conferences Website (JACoW), pp. 2227-2229, 5th International Particle Accelerator Conference, Dresden, Germany, 15/06/14.

Fusion based neutron sources for security applications : Neutron techniques. / Albright, S.; Seviour, R.

IPAC 2014: Proceedings of the 5th International Particle Accelerator Conference. Joint Accelerator Conferences Website (JACoW), 2014. p. 2227-2229.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Fusion based neutron sources for security applications

T2 - Neutron techniques

AU - Albright, S.

AU - Seviour, R.

PY - 2014/7/1

Y1 - 2014/7/1

N2 - The current reliance on X-Rays and intelligence for national security is insufficient to combat the current risks of smuggling and terrorism seen on an international level. There are a range of neutron based security techniques which have the potential to dramatically improve national security. Neutron techniques can be broadly grouped into neutron in/neutron out and neutron in/photon out techniques. The use of accelerator based fusion devices will potentially enable to wide spread application of neutron security techniques due to the potential for much safer operation than that offered by fission or sealed tube sources. In this paper we discuss some of the neutron security techniques available and the advantages they present.

AB - The current reliance on X-Rays and intelligence for national security is insufficient to combat the current risks of smuggling and terrorism seen on an international level. There are a range of neutron based security techniques which have the potential to dramatically improve national security. Neutron techniques can be broadly grouped into neutron in/neutron out and neutron in/photon out techniques. The use of accelerator based fusion devices will potentially enable to wide spread application of neutron security techniques due to the potential for much safer operation than that offered by fission or sealed tube sources. In this paper we discuss some of the neutron security techniques available and the advantages they present.

UR - http://www.scopus.com/inward/record.url?scp=84928310981&partnerID=8YFLogxK

M3 - Conference contribution

SP - 2227

EP - 2229

BT - IPAC 2014: Proceedings of the 5th International Particle Accelerator Conference

PB - Joint Accelerator Conferences Website (JACoW)

ER -

Albright S, Seviour R. Fusion based neutron sources for security applications: Neutron techniques. In IPAC 2014: Proceedings of the 5th International Particle Accelerator Conference. Joint Accelerator Conferences Website (JACoW). 2014. p. 2227-2229