Objectives: Recently, there have been important advances in the clinical application of targeted hybrid near-infrared (NIR) fluorescent-radioactive tracers. ICG-99mTc-nanocolloid, for example, is already being used by some centres for sentinel lymph node biopsy in head and neck cancer. The radioactive component allows imaging at depths which would not be possible with NIR alone and, once exposed, the NIR fluorescence reporter can be imaged at very high resolution. Gamma detection is currently carried out with a separate hand-held gamma camera or with a non-imaging probe. Visualisation of NIR fluorescence during surgery requires a dedicated NIR camera, several of which are available commercially. We describe a novel hand-held hybrid NIR-gamm
... Show MoreThis paper proposes a compact, plasmonic-based 4 × 4 nonblocking switch for optical networks. This device uses six 2 × 2 plasmonic Mach-Zehnder switch (MZS), whose arm waveguide is supported by a JRD1 polymer layer as a high electro-optic coefficient material. The 4 × 4 switch is designed in COMSOL environment for 1550 nm wavelength operation. The performance of the proposed switch outperforms those of conventional (nonplasmonic) counterparts. The designed switch yields a compact structure ( 500 × 70 µ m 2 ) having V π L = 12 V · µ m , 1.5 THz optical bandwidth, 7.7 dB insertion loss, and −26.5 dB crosstalk. The capability of the switch to route 8 × 40 Gbps WDM signal is demonstrated successfully.
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreAbstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.