Objectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropomorphic head and neck phantom has been designed to mimic the adult head and neck including some internal organs and tissues of interest, such as the thyroid gland and sentinel lymph nodes. The design of the head and neck phantom included an adjustable inner jig holding the simulated SLNs and thyroid gland. The simulated thyroid gland was designed and 3D printed taking into consideration the size and the shape of a healthy adult thyroid gland. The inner sealed space of the thyroid was filled with 15MBq of 99mTc through two upper filling valves. Sealed micro-tubes (0.2ml) have been employed to simulate SLNs containing various 99mTc activity concentrations ranging between 0.1MBq and 1MBq, and can be positioned at any desired place in the head and neck region. An active background was simulated through mixing 10MBq of 99mTc solution with the water used to fill the outer shell of the head and neck phantom. Results: The head and neck phantom was employed to simulate a situation where there are four SLNs distributed at two different vertical levels and at two depths within the neck. Contrast to noise ratio (CNR) calculations were performed for the detected SLNs at an 80mm distance between both pinhole collimators (i.e. 0.5mm and 1.0mm diameters) and the surface of the head and neck phantom with a 100s acquisition time. The recorded CNR values for the simulated SLNs are higher when the HGC was fitted with the 1.0mm diameter pinhole collimator. For instance, the recorded CNR values for the superficially simulated SLN containing 0.1MBq of 99mTc using 0.5mm and 1.0mm diameter pinhole collimators are 6.48 and 16.42, respectively (~87% difference). The anatomical context provided by the hybrid imaging aided the localization process of radioactivity accumulation in simulated SLNs. Gamma and hybrid optical images were acquired using the HGC with both available pinhole collimators for the simulated thyroid gland. The thyroid images produced varied in terms of spatial resolution and detectability. The count profiles through the middle of the simulated thyroid gland images provided by both pinhole collimators were obtained. The HGC could clearly differentiate the individual peaks of both thyroid lobes in the gamma image produced by the 0.5mm pinhole collimator. In contrast, the recorded count profile for the acquired image using the 1.0mm diameter pinhole collimator showed broader peaks for both lobes, reflecting the degradation of the spatial resolution with increasing the diameter of the pinhole collimator. Conclusion: The capability of the HGC has been evaluated utilizing a prototype anthropomorphic head and neck phantom, and the gamma and hybrid images obtained demonstrate that it is ideally suited for intraoperative SLNs detection and small organ imaging. The standardization of test phantoms and protocols for SFOV portable gamma systems will provide an opportunity to collect data across various medical centers and research groups. Moreover, it will provide a technical baseline for researchers and clinical practitioners to consider when assessing their SFOV gamma imaging systems. The anthropomorphic head and neck phantom described is cost effective, reproducible, flexible and anatomically representative.
Lying is considered a dangerous tendency among children if it has become a habit. It results in many social problems, such as child’s loss of confidence, lack of others’ respect to him, and his lack of respect to the desired values of the society, such as honesty and trust. Consequently, he will be led to a deviation when he becomes old; especially if the child’s socially unaccepted behavior has not been directed. The research, thus, aims to examine the causes of lying in the most important stage of children’s life; that is, between (4-6) years. Such an aim helps to know about the individual reasons of lying among males and females from teachers’ perspectives. To meet the objective of the study, a number of (128) children
... Show MoreA novel demountable shear connector for precast steel‐concrete composite bridges is presented. The connector uses high‐strength steel bolts, which are fastened to the top flange of the steel beam with the aid of a special locking nut configuration that prevents slip of bolts within their holes. Moreover, the connector promotes accelerated construction and overcomes typical construction tolerances issues of precast structures. Most importantly, the connector allows bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (i) precast deck panels can be rapidly uplifted and replaced; (ii) connectors can be rapidly removed and replaced; and (iii) steel beams can b
... Show MoreThe aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe novel was generally distinguished from other literary arts in its connection with the living reality as an imaginative practice that relies on political, economic, social, intellectual and cultural references and as a crucial tool in reading cultural references and dive deep into reality. As every novelist has a vision to embody this reality. As every novelist has a vision to embody this reality. The novel of ("Exceeded border by Hammed Al-Kafa’i) is a considered a fertile field for presenting social issues in their apparent structure and revealing the cultural patterns behind them which lies in its deep structure. The novel here moves its characters in its imaginary world in a way that it becomes more capable of adaptation and crysta
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreExamining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant difference
... Show More