Question

In: Physics

explaine the theory of the procedures that was used for reference dosimetry protocol TG 51 ?

explaine the theory of the procedures that was used for reference dosimetry protocol TG 51 ?

Solutions

Expert Solution

Protocol for Clinical Reference Dosimetry of Protocol for Clinical Reference Dosimetry of High-Energy Photon and Electron Beams. Energy Photon and Electron Beams

Based on an Absorbed Dose to Water (in Water) Standard (60Co):

• Conversion to Absorbed dose at other energies and modalities (electrons) is by correction factors, kecal, k’R50, and Pgr (electrons).

• Based on Bragg Gray cavity theory.

• All of the chamber correction factors introduced in TG-21 are incorporated into Kecal, and k’R50.

• Many chamber specific corrections are averaged into “classes” of chambers, so only a few k’R50 values are needed.

Requires Calibration in Water ( at least annually): ¾Plastics may be used for monthly output checks, but must be referenced to the water calibration by a correction factor.

• Electrons Energy characterized by depth of 50% of max dose, d50 Reference measurement depth, dref,is related to d50.

Chamber Calibration Factor Chamber Calibration Factor

• Obtain from ADCL

• Chamber waterproofing material: – 1 mm Acrylic (PMMA) wall – Provided by ADCL – Waterproof chambers

Calibrate P-P Chamber -P Chamber P Chamber

• ADCL’s: – TG-39, in water – 60Co – Evidence of problems with kecal

• User: (Recommended) – TG-39 in water/plastic – Cylindrical Chamber is NIST traceable – TG-51 In water – high energy electron R50 near 7.5 cm – compare with cylindrical chamber.

TG-51 Measurements

• Look up kecal for your chamber.

• Search for Imax and I50 (use 0.5 rcav shift)

• Determine R50

• Determine dref and k’R50 • Move chamber to physical dref (no shift)

• Measure Ppol and Pion • Move chamber to dref + 0.5 rcav

• Calculate the gradient correction, Pgr

Protocol for Clinical Reference Dosimetry of Protocol for Clinical Reference Dosimetry of High-Energy Photon and Electron Beams. Energy Photon and Electron Beams

Based on an Absorbed Dose to Water (in Water) Standard (60Co):

• Conversion to Absorbed dose at other energies and modalities (electrons) is by correction factors, kecal, k’R50, and Pgr (electrons).

• Based on Bragg Gray cavity theory.

• All of the chamber correction factors introduced in TG-21 are incorporated into Kecal, and k’R50.

• Many chamber specific corrections are averaged into “classes” of chambers, so only a few k’R50 values are needed.

Requires Calibration in Water ( at least annually): ¾Plastics may be used for monthly output checks, but must be referenced to the water calibration by a correction factor.

• Electrons Energy characterized by depth of 50% of max dose, d50 Reference measurement depth, dref,is related to d50.

Chamber Calibration Factor Chamber Calibration Factor

• Obtain from ADCL

• Chamber waterproofing material: – 1 mm Acrylic (PMMA) wall – Provided by ADCL – Waterproof chambers

Calibrate P-P Chamber -P Chamber P Chamber

• ADCL’s: – TG-39, in water – 60Co – Evidence of problems with kecal

• User: (Recommended) – TG-39 in water/plastic – Cylindrical Chamber is NIST traceable – TG-51 In water – high energy electron R50 near 7.5 cm – compare with cylindrical chamber.

TG-51 Measurements

• Look up kecal for your chamber.

• Search for Imax and I50 (use 0.5 rcav shift)

• Determine R50

• Determine dref and k’R50 • Move chamber to physical dref (no shift)

• Measure Ppol and Pion • Move chamber to dref + 0.5 rcav

• Calculate the gradient correction, Pgr


Related Solutions

What is the 2PC protocol, and what is it used for?
What is the 2PC protocol, and what is it used for?
Is the IRC protocol (application-level) protocol used in any connection in this trace. How to filter...
Is the IRC protocol (application-level) protocol used in any connection in this trace. How to filter packets for application-level in IRC protocol.
a) Compare and contrast the Reference Theory of meaning and the Idea Theory of Meaning and...
a) Compare and contrast the Reference Theory of meaning and the Idea Theory of Meaning and explain how best each one of them can be used to explain the term Covid-19. (15marks)
Describe a hypothetical situation where you can apply the OSI reference model in conjunction with protocol...
Describe a hypothetical situation where you can apply the OSI reference model in conjunction with protocol analysis to solve a problem or think through a solution involving an information system or network. Discuss the advantages, disadvantages, and limits of using the model and protocol analysis in that situation. Describe a real-world problem where you can apply the OSI reference model to solve a problem or to think through a solution involving an information system or network. Discuss the advantages, disadvantages,...
Design an indirect IF protocol that could be used to detect the presence of antibodies to...
Design an indirect IF protocol that could be used to detect the presence of antibodies to SARS CoV-2, the virus causing covid-19. Assume that the specificity of the antibodies from patients would be against epitopes on the spike proteins of the virus. Include both a description of the protocol and a diagram showing the steps of your protocol. (Draw the diagram, take a picture of it, and then insert that JPEG image into this word document).
The following questions relate to the protocol used to manage the health of the network and...
The following questions relate to the protocol used to manage the health of the network and allow network devices to communicate to each other to keep network traffic flowing freely. An example of a common command that uses this protocol is ‘ping’. (10 marks total) What is the name of this protocol? (1 mark) What layer of the TCP/IP network model does this protocol belong? (1 mark) What is the command used to display a path that network traffic takes...
. The following is a key exchange protocol used by two clients, A and B, to...
. The following is a key exchange protocol used by two clients, A and B, to obtain a symmetric key???, using a trusted server, S. Assume that A and B had previously obtained the symmetric keys ??? and ??? securely with the server. Also assume that anyone can securely obtain a secret symmetric key with the server. I. A → S : A, B II. S → A : (???) ??? ,( ???) ??? III. A → B : (???)...
What is a metric in a routing protocol? What is a metric used for? List and...
What is a metric in a routing protocol? What is a metric used for? List and describe two major metrics used in routing protocols.
51   Which of the following auditing procedures most likely would assist an auditor in identifying related-party...
51   Which of the following auditing procedures most likely would assist an auditor in identifying related-party transactions?    A)   Inspecting correspondence with lawyers for evidence of unreported contingent liabilities      B)   Vouching accounting records for recurring transactions recorded just after the balance sheet date      C)   Reviewing confirmations of loans receivable and payable for indications of guarantees      D)   Performing analytical procedures for indications of possible financial difficulties.       52   Which of the following conditions or events most likely would...
Suppose 218subjects are treated with a drug that is used to treat pain and 51 of...
Suppose 218subjects are treated with a drug that is used to treat pain and 51 of them developed nausea. Use a 0.01 significance level to test the claim that more than 20​% of users develop nausea. Identify the null and alternative hypotheses for this test. Choose the correct answer below. A. Upper H0​: p=0.20 Upper H1​: p>0.20 B. Upper H 0: p>0.20 Upper H1​: p=0.20 C. Upper H 0H0​: p= 0.20 Upper H 1H1​: p<0.20 D. Upper H0​: p=0.20 Upper...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT