Each Intensity Modulated Radiation Therapy (IMRT) plan needs to be tested and verified before any treatment to check its quality. Octavius 4D-1500 phantom detector is a modern and qualified device for quality assurance procedure. This study aims to compare the common dosimetric criteria 3%/3 mm with 2%/2 mm for H&N plans for the IMRT technique. Twenty-five patients with head and neck (H&N) tumor were with 6MV x-ray photon beam using Monaco 5.1 treatment planning software and exported to Elekta synergy linear accelerator then tested for pretreatment verification study using Octavius 4D-1500 phantom detector. The difference between planned and measured dose were assessed by using local and global gamma index (GI) analysis method at threshold 10%. The DD/DTA criteria are performed with 3%/3 mm and 2%/2 mm. A significant difference is shown between the measured and calculated point dose for the treatment plans. A comparison made between the gamma passing rate between the 2%/2 mm and 3%/3 mm shows a significant difference for local and global which shows that the 2%/2 mm are more sensitive to dose variation than 3%/3 mm. The total monitor unit (MU) shows a negative linear relationship with both criteria and %GP types. A significant correlation is shown between the total MU and global %GP at 2%/2 mm criterion. The conclusion of the study indicates that 2%/2 mm criterion is more sensitive to the dose distribution changes than the 3%/3 mm. The total number of monitor units should be taken into consideration during the planning of H&N tumors using the IMRT plans.
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
The Child is the first sedum for the human society performing, and we deal in our
research to explain the nature of the mutual relations in between the form and the medicine
social caring foundation. So the motherhood and the childhood nowadays become the most
dedicated in the researchers works, whom interesting in the social affairs, and that whom
work in the medicine field as scientists.
So the child is the future man and must be in wright body construction that need to great
care and interest to make him wright mind through capability of performing anything support
to him.
In our research we deal with the main factors in which lead to infect the child by the
creative malfunction, like the environmental and m
The flexible joint robot manipulators provide various benefits, but also present many control challenges such as nonlinearities, strong coupling, vibration, etc. This paper proposes optimal second order integral sliding mode control (OSOISMC) for a single link flexible joint manipulator to achieve robust and smooth performance. Firstly, the integral sliding mode control is designed, which consists of a linear quadratic regulator (LQR) as a nominal control, and switching control. This control guarantees the system robustness for the entire process. Then, a nonsingularterminal sliding surface is added to give a second order integral sliding mode control (SOISMC), which reduces chartering effect and gives the finite time convergence as well. S
... Show MoreThe choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.
<p>Recently, reconfigurable intelligent surfaces have an increasing role to enhance the coverage and quality of mobile networks especially when the received signal level is very weak because of obstacles and random fluctuation. This motivates the researchers to add more contributions to the fields of reconfigurable intelligent surfaces (RIS) in wireless communications. A substantial issue in reconfigurable intelligent surfaces is the huge overhead for channel state information estimation which limits the system’s performance, oppressively. In this work, a newly proposed method is to estimate the angle of arrival and path loss at the RIS side and then send short information to the base station rather than huge overhe
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreIn this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete
... Show MoreThis research considers the preservation of environment through recycling old toys. This is achieved by transforming the old toys into educational clothing accessories for kindergarten stages. The research methodology adapts both descriptive and applied approaches. The research questionnaire targeted a sample of 35 teachers to collect information about the waste toys in kindergarten. Also, another sample of 30 teachers and mothers were targeted to measure the suitability of the clothing designs for the early childhood stages. The results shows that both teachers and mothers were well satisfied with clothing accessories designed with the toys waste. This concept contributes to limiting the pollution caused by toys and could save time, eff
... Show More