Objectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropomorphic head and neck phantom has been designed to mimic the adult head and neck including some internal organs and tissues of interest, such as the thyroid gland and sentinel lymph nodes. The design of the head and neck phantom included an adjustable inner jig holding the simulated SLNs and thyroid gland. The simulated thyroid gland was designed and 3D printed taking into consideration the size and the shape of a healthy adult thyroid gland. The inner sealed space of the thyroid was filled with 15MBq of 99mTc through two upper filling valves. Sealed micro-tubes (0.2ml) have been employed to simulate SLNs containing various 99mTc activity concentrations ranging between 0.1MBq and 1MBq, and can be positioned at any desired place in the head and neck region. An active background was simulated through mixing 10MBq of 99mTc solution with the water used to fill the outer shell of the head and neck phantom. Results: The head and neck phantom was employed to simulate a situation where there are four SLNs distributed at two different vertical levels and at two depths within the neck. Contrast to noise ratio (CNR) calculations were performed for the detected SLNs at an 80mm distance between both pinhole collimators (i.e. 0.5mm and 1.0mm diameters) and the surface of the head and neck phantom with a 100s acquisition time. The recorded CNR values for the simulated SLNs are higher when the HGC was fitted with the 1.0mm diameter pinhole collimator. For instance, the recorded CNR values for the superficially simulated SLN containing 0.1MBq of 99mTc using 0.5mm and 1.0mm diameter pinhole collimators are 6.48 and 16.42, respectively (~87% difference). The anatomical context provided by the hybrid imaging aided the localization process of radioactivity accumulation in simulated SLNs. Gamma and hybrid optical images were acquired using the HGC with both available pinhole collimators for the simulated thyroid gland. The thyroid images produced varied in terms of spatial resolution and detectability. The count profiles through the middle of the simulated thyroid gland images provided by both pinhole collimators were obtained. The HGC could clearly differentiate the individual peaks of both thyroid lobes in the gamma image produced by the 0.5mm pinhole collimator. In contrast, the recorded count profile for the acquired image using the 1.0mm diameter pinhole collimator showed broader peaks for both lobes, reflecting the degradation of the spatial resolution with increasing the diameter of the pinhole collimator. Conclusion: The capability of the HGC has been evaluated utilizing a prototype anthropomorphic head and neck phantom, and the gamma and hybrid images obtained demonstrate that it is ideally suited for intraoperative SLNs detection and small organ imaging. The standardization of test phantoms and protocols for SFOV portable gamma systems will provide an opportunity to collect data across various medical centers and research groups. Moreover, it will provide a technical baseline for researchers and clinical practitioners to consider when assessing their SFOV gamma imaging systems. The anthropomorphic head and neck phantom described is cost effective, reproducible, flexible and anatomically representative.
Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different
... Show MoreProtein arginine methyltransferases (PRMTs) play important roles in transcription, splicing, DNA damage repair, RNA biology, and cellular metabolism. Thus, PRMTs have been attractive targets for various diseases. In this study, we reported the design and synthesis of a potent pan-inhibitor for PRMTs that tethers a thioadenosine and various substituted guanidino groups through a propyl linker. Compound II757 exhibits a half-maximal inhibition concentration (IC50) value of 5 to 555 nM for eight tested PRMTs, with the highest inhibition for PRMT4 (IC50 = 5 nM). The kinetic study demonstrated that II757 competitively binds at the SAM binding site of PRMT1. Notably, II757 is selective for PRMTs over a panel of other methyltransferases, w
... Show MoreThe evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show MoreIn this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn this study an experimental work was done to study the possibility of using aluminum rubbish material as a coagulant to remove the colloidal particles from oily wastewater by dissolving this rubbish in sodium hydroxide solution. The experiments were carried out on simulated oily wastewater that was prepared at different oil concentrations and hardness levels (50, 250, 500, and 1000) ppm oil for (2000, 2500, 3000, and 3500) ppm CaCo3 respectively. The initial turbidity values were (203, 290, 770, and 1306) NTU, while the minimum values of turbidity that have been gained from the experiments in NTU units were (1.67, 1.95, 2.10, and 4.01) at best sodium aluminate dosages in milliliters (12, 20, 24, and 28) for
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Abstract
The purposes of this study were to identifying the (attitudes of college of
education and college of science for womens in Baghdad university students
toward aggresive behaviore) and to determine the differences of student's
attitudes due to Specialization.
The study sample consists of (460) Female students.Aquestionave of
(59) items was desiged and distributed selected sample after established it's
validity and reliablity.The results indicated that the attitude of Baghdad
University For College of education and college of science students toward
aggresive behaviore were Negative.
The findings revealed that there were statistically significant differences
in the student's attitudes due to special