Background: Radiotherapy, is therapy using ionizing radiation in order to deliver an optimal dose of either particulate or electromagnetic radiation to a particular area of the body with minimal damage to normal tissues. The source of radiation may be outside the body of the patient (external beam irradiation) or it may be an isotope that has been implanted or instilled into abnormal tissue or a body cavity. Called also radiotherapy. The aim of work studies the relationship between the depth dose and the high photon xray energies (6MeV and 10MeV). Patients and methods: in our work, we studied the dose distribution in water phantom given at different depths (zero-18) cm deep at1cm intervals treated with different field size (5×5-,10×1
... Show MoreThe interactions of drug amoxicillin with maltose or galactose solutions with a variation of temperature have been discussed by taking in the volumetric and viscometric procedures. Physical properties [densities (ρ) and viscosities (η)] of amoxicillin (AMOX) aqueous solutions and aqueous solutions of two type saccharides (maltose and galactose 0.05m) have been measured at T = (298.15, 303.15 and 308.15) K under atmospheric pressure. The apparent molar volume (ϕv cm3mole-1) has been evaluated from density data and fitted to a Redlich-Mayer equation. The empirical parameters of the Mayer-Redlich equation and apparent molar volume at infinite dilution ذv were explicated in terms of interactions from type solute-solvent and solute
... Show MoreDielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show MoreCerebral palsy "is one of the diseases that afflict children, and it is a term given to the condition of a child who is exposed to a normal brain injury by accident due to its inability to grow or damage to the cells of the areas responsible for movement and knowledge of strength and balance during the stage of normal development." (116: 1999: 10) Cerebral palsy causes disruption in movement and posture due to damage to brain cells in areas that control and coordinate muscle tone, reflexes, strength, and movement. The degree and location of brain damage varies greatly between people with paralysis, as well as the severity of disability and symptoms, as they fall into severe to very simple, and cerebral palsy is one of the diseases that caus
... Show MoreABSTRACT Background: This study measured the effects of three parameters pH value, length of immersion and type of archwire on metal ions released from orthodontic appliances. Materials and Methods: Ninety maxillary halves simulated fixed orthodontic appliances that were immersed in artificial saliva of different pH values (6.75, 5 and 3.5) during 28 day period. Three types of archwires were used: stainless steel, nickel titanium and thermal activated nickel titanium. The quantity of nickel and chromium ions was determined with the use of atomic force spectrophotometer while iron ions by spectrophotometer. Each orthodontic set was weighted two times, before the ligation and immersion in the artificial saliva and after 28 days at the end of
... Show MoreIn this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes
... Show MoreThis work includes preparation of Az, Qz, and Tz derivatives from the reaction of Schiff base (Sb) derivative with anthranilic acid, chloroacetyl chloride, and sodium azide, as well as, the characterization via FT-IR, 1H-NMR, and 13CNMR. The anticorrosion inhibition of these compounds was studied and the measurements of carbon steel (CS) corrosion in sodium chloride solution 3.5% (blank) and inhibitor in solutions were calculated at a temperature range of 293-323 K by the technique of electrochemical polarization. In addition, some thermodynamic and kinetic activation parameters for inhibitor and blank solutions (Ea⋇, ΔH⋇, ΔS⋇, and ΔG⋇) were determined. The results showed high inhibition efficacy for all the prepared compounds,
... Show MoreThe analysis and efficiency of phenol extraction from the industrial water using different solvents, were investigated. To our knowledge, the experimental information available in the literature for liquid-liquid equilibria of ternary mixtures containing the pair phenol-water is limited. Therefore the purpose of the present investigation is to generate the data for the water-phenol with different solvents to aid the correlation of liquid-liquid equilibria, including phase diagrams, distribution coefficients of phenol, tie-lines data and selectivity of the solvents for the aqueous phenol system.
The ternary equilibrium diagrams and tie-lines
... Show MoreThe major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech
... Show More