Objectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropomorphic head and neck phantom has been designed to mimic the adult head and neck including some internal organs and tissues of interest, such as the thyroid gland and sentinel lymph nodes. The design of the head and neck phantom included an adjustable inner jig holding the simulated SLNs and thyroid gland. The simulated thyroid gland was designed and 3D printed taking into consideration the size and the shape of a healthy adult thyroid gland. The inner sealed space of the thyroid was filled with 15MBq of 99mTc through two upper filling valves. Sealed micro-tubes (0.2ml) have been employed to simulate SLNs containing various 99mTc activity concentrations ranging between 0.1MBq and 1MBq, and can be positioned at any desired place in the head and neck region. An active background was simulated through mixing 10MBq of 99mTc solution with the water used to fill the outer shell of the head and neck phantom. Results: The head and neck phantom was employed to simulate a situation where there are four SLNs distributed at two different vertical levels and at two depths within the neck. Contrast to noise ratio (CNR) calculations were performed for the detected SLNs at an 80mm distance between both pinhole collimators (i.e. 0.5mm and 1.0mm diameters) and the surface of the head and neck phantom with a 100s acquisition time. The recorded CNR values for the simulated SLNs are higher when the HGC was fitted with the 1.0mm diameter pinhole collimator. For instance, the recorded CNR values for the superficially simulated SLN containing 0.1MBq of 99mTc using 0.5mm and 1.0mm diameter pinhole collimators are 6.48 and 16.42, respectively (~87% difference). The anatomical context provided by the hybrid imaging aided the localization process of radioactivity accumulation in simulated SLNs. Gamma and hybrid optical images were acquired using the HGC with both available pinhole collimators for the simulated thyroid gland. The thyroid images produced varied in terms of spatial resolution and detectability. The count profiles through the middle of the simulated thyroid gland images provided by both pinhole collimators were obtained. The HGC could clearly differentiate the individual peaks of both thyroid lobes in the gamma image produced by the 0.5mm pinhole collimator. In contrast, the recorded count profile for the acquired image using the 1.0mm diameter pinhole collimator showed broader peaks for both lobes, reflecting the degradation of the spatial resolution with increasing the diameter of the pinhole collimator. Conclusion: The capability of the HGC has been evaluated utilizing a prototype anthropomorphic head and neck phantom, and the gamma and hybrid images obtained demonstrate that it is ideally suited for intraoperative SLNs detection and small organ imaging. The standardization of test phantoms and protocols for SFOV portable gamma systems will provide an opportunity to collect data across various medical centers and research groups. Moreover, it will provide a technical baseline for researchers and clinical practitioners to consider when assessing their SFOV gamma imaging systems. The anthropomorphic head and neck phantom described is cost effective, reproducible, flexible and anatomically representative.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreMultiple sclerosis (MS) is a chronic, inflammatory demyelinating disease of central nervous system with complex etiopathogenesis that impacts young adults (Lee et al., 2015), and MS impacts younger and middle aged character and leads to a range of disabilities that can alter their daily routines (Yara et al, 2010). Although, the exact cause of MS is still undetermined, the disease is mediated by adaptive immunity through the infiltration of T cells into the central nervous system (Bjelobaba et al, 2017). MS causes the Focal neurological symptomsand biochemical changes in the molecular level and the variation of neural cells such as loss or alteration of sensation, motor function, visible signs such as blurred vision or transient blindness,
... Show MoreTwo novel demountable shear connectors for precast steel-concrete composite bridges are presented. The connectors use high-strength steel bolts, which are fastened to the steel beam with the aid of a special locking configuration that prevents slip of bolts within their holes. Moreover, the connectors promote accelerated construction and overcome typical construction tolerances issues of precast structures. Most importantly, the connectors allow bridge disassembly, and therefore, can address different bridge deterioration scenarios with minimum disturbance to traffic flow, i.e. (1) precast deck panels can be rapidly uplifted and replaced; (2) connectors can be rapidly removed and replaced; and (3) steel beams can be replaced, while precast
... Show MoreThe semiotic trend of recent monetary trends task that took a wide range of attention of critics and readers alike, especially after the deployment, which accompanied him after widespread acts critic Grimas and powers applicable to the literary texts and is thus expanded its care circle, hence the choice of the novel (absent) woman Iraqi novelist (Mahdi ‘Issa falcon) model to be applied to the study chose to be a semiotic approach through the use of procedural mechanisms for its critical tool (Paris School of semiotics), cash and views of its founder critic Grimas.The research in the introduction and pave came we made it a vision for literary semiotic and its impact trend in cash and cash is and what it desire to clarify some poked suc
... Show MoreThis research deals with the study of the identity lost in the novel (handcuffs of paper) by Writer (Kuwaiti / Iraqi ) Yousif Hadi Mays.This is because of The strange subject presented by the writer ,Kuwait has chosen a sbace for his novel and chose apurely Kuwaiti theme. Hence the importance of the novel, as it came to the subject of identity completely dntdiffere from what we wwrote after the fall off the regime (2003), Which is related to the last coming from outside the country, which remained oscillataing between his mother,s identity where language, religion and history and the identity of the other by virtue and dazzling, and integration and here con not belong to either party. This is a violation of the taboos of
... Show MoreTerrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.
In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou
... Show MoreIn this research, titanium dioxide nanoparticles (TiO2 NPs) were prepared through the sol-gel process at an acidic medium (pH3).TiO2 nanoparticles were prepared from titanium trichloride (TiCl3) as a precursor with Ammonium hydroxide (NH4OH) with 1:3 ratio at 50 °C. The resulting gel was dried at 70 °C to obtain the Nanocrystalline powder. The powder from the drying process was treated thermally at temperatures 500 °C and 700 °C. The crystalline structure, surface morphology, and particle size were studied by using X-ray diffraction (XRD), Atomic Force Microscopy (AFM), and Scanning Electron Microscope (SEM). The results showed (anatase) phase of titanium dioxide with the average grain size
... Show More