Radial distribution of dose within heavy charged particle tracks – Models and experimental verification using LiF:Mg,Cu,P TL detectors
نویسندگان
چکیده
منابع مشابه
Evaluation of the dose variation for prostate heavy charged particle therapy using four-dimensional computed tomography
We quantified dose variation effects due to respiratory-induced intrafractional motion in conventional carbon-ion prostate treatment by using four-dimensional computed tomography (4DCT). 4DCT scans of 20 patients were acquired under free-breathing conditions using a 256 multi-slice CT scanner. The clinical target volume (CTV) was defined as the prostate and the seminal vesicle. Two types of pla...
متن کاملRadial distribution of dose.
The radial distribution of dose about the path of a heavy ion, principally from delta rays, is one of the central contributions of atomic physics to the systematization of high LET radiation effects in condensed matter, whether the detection arises in chemical, physical, or biological systems. In addition to the radial distribution of dose, we require knowledge of the response of the system to ...
متن کاملVerification of the Accuracy of the Delivered Dose in Brain Tumors by in Vivo Dosimetry Using Diode Detectors
Introduction: During radiotherapy, high accuracy in the dose delivery is required because there is a strong relationship between the absorbed dose, local tumor control and particularly the normal tissue damage. In many institutions, in vivo dosimetry using diodes is performed to check the actual dose delivered. In general, the uncertainty in the dose delivered should fall within ± 5% of the...
متن کاملA new laser test stand for simulating charged-particle tracks
We report on the construction of a new laser test stand equipped with a 1064nm pulsed infrared YAG laser for simulating the passage of a charged particle in a silicon detector. The standard semiconductor repairing tool, the socalled laser-cutter, has been modified to have a newly developed optics which has the ability to reduce the light by the order of 106~108 and to adjust the spot size to se...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Radiation Measurements
سال: 2014
ISSN: 1350-4487
DOI: 10.1016/j.radmeas.2014.01.017