Radiotherapy is the branch of clinical medicine concerned with the application of ionizing radiation in the treatment of disease. And it is used to killing of cancer cells in a tissue using ionizing radiation while keeping the sparing of healthy cells at acceptable level. X-ray beams are used to deposit absorbed dose at depth within a patient at the site of the tumor. The aim of this work is studying the relationship between the depth dose and the field size in water phantom and homogenous actual planning. In our work, the dose distribution at different depths (zero-18 cm) deep at1cm interval treated with field size (10×10 and 20×20) cm2 were studied. Results show that high similarity between water phantom and actual planning for this reason water is taken as phantom for Quality Assurance (QA) and calculation the depth dose. When increasing the field size, the percentage of surface dose increases that this could be caused by an increase of the amount of scattering in the larger fields. Conclusion: There is almost no difference in depth dose between homogenous planning and water phantom
Abstract: Background: High percentage of diabetes patients complain from post extraction hemorrhage. Many types of hemostatic materials are used to stop bleeding after teeth extraction: diode lasers are good hemostatic agents owing to their highly absorption by hemoglobin therefore they are used in soft tissue procedures with relatively no effects on dental hard tissues due to their poorly absorption by water and hydroxyapatite. Objectives: The aim of this study is to evaluate the efficiency of diode laser to assist the clot formation after tooth extraction for type II diabetes patients with minimum temperature elevation to prevent periodontal destruction. Materials and methods: From 12 type II diabetes patients (7 males and 5 females wi
... Show MoreA mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThe effect of using three different interpolation methods (nearest neighbour, linear and non-linear) on a 3D sinogram to restore the missing data due to using angular difference greater than 1° (considered as optimum 3D sinogram) is presented. Two reconstruction methods are adopted in this study, the back-projection method and Fourier slice theorem method, from the results the second reconstruction proven to be a promising reconstruction with the linear interpolation method when the angular difference is less than 20°.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreA common problem facing many Application models is to extract and combine information from multiple, heterogeneous sources and to derive information of a new quality or abstraction level. New approaches for managing consistency, uncertainty or quality of Arabic data and enabling e-client analysis of distributed, heterogeneous sources are still required. This paper presents a new method by combining two algorithms (the partitioning and Grouping) that will be used to transform information in a real time heterogeneous Arabic database environment