Radiation treatment has long been the conventional approach for treating nasopharyngeal cancer (NPC) tumors due to its anatomic features, biological characteristics, and radiosensitivity. The most common treatment for nasopharyngeal carcinoma is radiotherapy. This study aimed to assess the better quality of radiotherapy treatment techniques using intensity-modulated radiotherapy (IMRT) and volumetric-modulated arc therapy (VMAT). The VMAT and IMRT are comparative techniques. Forty patients with nasopharyngeal carcinoma and forwarded for radiotherapy were treated with both advanced techniques, IMRT and VMAT, using eclipse software from Varian. The x-ray energy was set at 6 MV. The total prescribed dose was 70 Gy. The results show that the VMAT had better tumor coverage than the IMRT. Regarding quality indices, the IMRT shows a better dose homogeneity, while the VMAT gives better gradient and conformity indices. The best technique that reduces the dose to the right eye, optic chiasm, and thyroid is VMAT, while the esophagus and spinal cord are protected better with IMRT. The VMAT shows a special effect for IMRT for treating nasopharyngeal carcinoma.
Despite the vast areas occupied by deserts in the world, it is still far from the civilized development and development of the other regions, so they became semi-neglected areas that extend to the hand of urbanization only in specific places and for special purposes, due to the harsh natural conditions surrounding it and to the accuracy The ecological balance in it became the greatest enemy of human beings in the desert areas is the same person who paved the way for increased intervention in the exploitation of natural resources and increase the demand for them to drain seriously affect the impact and still on the environmental and climatic conditions and thus living for the inhabitants of these Areas. The main potential for deve
... Show MoreThis research deals with the effect of constructive conflict of the organizational identification .These relatively recent subjects have relative importance in the field of administration and they have strong effect in the success of organizations .The objective of this research is to detect the level of the constructive conflict and the organizational identification in the center of The Ministry of Planning. So, two major hypotheses were formulated The first are searched the correlation between the constructive conflict and the organizational identification and it emerged with four sub-hypotheses searched the correlation among every dimension of the constructive conflict with the organizational identification .The second major h
... Show MoreThe objective that the researcher seeks to achieve through this research is to clarify the relationship between strategic management accounting techniques and the reliability of financial statements, and to measure the impact of these techniques as an independent variable with its three dimensions, which are: activities-based cost, target cost, and benchmarking on the reliability of financial statements as a dependent variable. To achieve this objective, the researcher did the following: First: Determine the research problem through the following question: Do strategic management accounting techniques affect the reliability of financial statements in industrial companies listed on the Palestine Exchange? Second: Making the analytical des
... Show MoreThe spray quality of two spraying agents with different physical properties was investigated under laboratory conditions to find whether the measurement of deposited drops could be affected by spraying those agents. The first spraying agent Moddus, which is a plant growth regulator, has a surface tension of 28 mN m-1 with almost half the value of the second spraying agent Kelpak (58 mN m-1). A mini boom sprayer containing three flat fan nozzles (XR 11003) was used in the test with three traveling speeds (4.74, 5.42 and 8.13 km. h-1). The test was performed to evaluate the quality of spray drops (spray coverage, spray density and stains diameter) after they were deposited on water sensitive papers (WSP). The results showed a higher ability o
... Show MoreThe effect of solution heat treatment on the mechanical properties of Aluminum-Copper alloy. (2024-T3) by the rolling process is investigated. The solution heat treatment was implemented by heating the sheets to 480 C° and quenching them by water; then forming by rolling for many passes. And then natural aging is done for one month. Mechanical properties (tensile strength and hardness) are evaluated and the results are compared with the metal without treatment during the rolling process. ANSYS analysis is used to show the stresses distribution in the sheet during the rolling process. It has been seen that good mechanical properties are evident in the alloy without heat treatment due to the strain hardening and also the mechanical
... Show MoreThe process of evaluating data (age and the gender structure) is one of the important factors that help any country to draw plans and programs for the future. Discussed the errors in population data for the census of Iraqi population of 1997. targeted correct and revised to serve the purposes of planning. which will be smoothing the population databy using nonparametric regression estimator (Nadaraya-Watson estimator) This estimator depends on bandwidth (h) which can be calculate it by two ways of using Bayesian method, the first when observations distribution is Lognormal Kernel and the second is when observations distribution is Normal Kernel
... Show MoreDelays and disruption are a common issue in both community and personal building programs The problem exists all throughout the world, but it is particularly prevalent in Iraq, where millions of dollars are squandered each time as a outcome. Delays and interruptions may have serious consequences not just for Iraq's construction plans, but also for the country's economic and social status. While numerous studies have been conducted to investigate the factors driving delays and disruption in Iraqi construction projects, slight consideration has been given to by what means project management implements and approaches have affected the occurrence of project delays and disruption. After analyzing the crucial reasons for delays and instability in
... Show More
Abstract
Friction stir welding is a relatively new joining process, which involves the joining of metals without fusion or filler materials. In this study, the effect of welding parameters on the mechanical properties of aluminum alloys AA2024-T351 joints produced by FSW was investigated.
Different ranges of welding parameters, as input factors, such as welding speed (6 - 34 mm/min) and rotational speed (725 - 1235 rpm) were used to obtain their influences on the main responses, in terms of elongation, tensile strength, and maximum bending force. Experimental measurements of main responses were taken and analyzed using DESIGN EXPERT 8 experimental design software which was used to develop t
... Show MoreThis research evaluated the effect of (UV)(400-320A)Hz(320-220B)Hz on the patient with vitiligo , using it with our new combing therapy that include the oral (Psorlene ) topical , meladinine solution applied on the Vitiligiousns Lesions , In edition to the instralesnional injection in the Vitiligiousns Lesions by long acting steroid (kenacort-A ) by aprecentage of (5%) , after that we expose the patient to UV . The ruslets of this way of treatment more effective by using of the UV rays in the treatment of vitiligo , while the previous treatment that used the UV ray with or with out the psorlene , the results were not effective on controlling of the Vitiligio diseases comparing by the treatment used in this research as it stop’s the sp
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show More