Brachytherapy treatment is primarily used for the certain handling kinds of cancerous tumors. Using radionuclides for the study of tumors has been studied for a very long time, but the introduction of mathematical models or radiobiological models has made treatment planning easy. Using mathematical models helps to compute the survival probabilities of irradiated tissues and cancer cells. With the expansion of using HDR-High dose rate Brachytherapy and LDR-low dose rate Brachytherapy for the treatment of cancer, it requires fractionated does treatment plan to irradiate the tumor. In this paper, authors have discussed dose calculation algorithms that are used in Brachytherapy treatment planning. Precise and less time-consuming calculations using 3D dose distribution for the patient is one of the important necessities in modern radiation oncology. For this it is required to have accurate algorithms which help in TPS. There are certain limitations with the algorithm which are used for calculating the dose. This work is done to evaluate the correctness of five algorithms that are presently employed for treatment planning, including pencil beam convolution (PBC), superposition (SP), anisotropic analytical algorithm (AAA), Monte Carlo (MC), Clarkson Method, Fast Fourier Transform, Convolution method. The algorithms used in radiotherapy treatment planning are categorized as correction‐based and model‐based.
The dose rate for bremsstrahlung radiation from beta particles with energy (1.710) MeV and (2.28) MeV which comes from (32P and 90Y) beta source respectively have been calculated through six materials (polyethylene, wood, aluminum, iron, tungsten and lead) for first shielding material with thickness (x=1) mm which are putting between beta sources and second shield (polyethylene, aluminum and lead) with thickness (1, 2 &4) mm have been calculated. The distance between beta source and second shield is constant (D=1) cm. This dose rate was found by program called Rad Pro Calculator (version 3.26). The results of dose rate of beta particles were plotted as a function to the atomic number (Z) for first shield materials for each
... Show MoreThe dose rate for bremsstrahlung radiation from beta particles with energy (1.710) MeV and (2.28) MeV which comes from (32P and 90Y) beta source respectively have been calculated through six materials (polyethylene, wood, aluminum, iron, tungsten and lead) for first shielding material with thickness (x=1) mm which are putting between beta sources and second shield (polyethylene, aluminum and lead) with thickness (1, 2 &4) mm have been calculated. The distance between beta source and second shield is constant (D=1) cm. This dose rate was found by program called Rad Pro Calculator (version 3.26). The results of dose rate of beta particles were plotted as a function to the atomic number (Z) for first shield materials for each
... Show MoreBackground: Unlike normal EEG patterns, the epileptiform abnormal pattern is characterized by different mor phologies such as the high-frequency oscillations (HFOs) of ripples on spikes, spikes and waves, continuous and sporadic spikes, and ploy2 spikes. Several studies have reported that HFOs can be novel biomarkers in human epilepsy study. S) Method: To regenerate and investigate these patterns, we have proposed three large scale brain network models (BNM by linking the neural mass model (NMM) of Stefanescu-Jirsa 2D (S-J 2D) with our own structural con nectivity derived from the realistic biological data, so called, large-scale connectivity connectome. These models include multiple network connectivity of brain regions at different
... Show MoreThe researcher highlighted in his research on an important subject that people need, which is the excuse of ignorance in Islamic law. , As the flag of light and ignorance of darkness. Then the researcher lameness of the reasons for research in this subject as it is one of the assets that should be practiced by the ruler and the judge and the mufti and the diligent and jurisprudent, but the public should identify the issues that ignore ignorance and issues that are not excused even if claimed ignorance.
Then the researcher concluded the most important results, and recommendations that he wanted to set scientific rules for students of science and Muslims in general, to follow the issues of legitimacy and learn its provisions and i
Self-driving automobiles are prominent in science and technology, which affect social and economic development. Deep learning (DL) is the most common area of study in artificial intelligence (AI). In recent years, deep learning-based solutions have been presented in the field of self-driving cars and have achieved outstanding results. Different studies investigated a variety of significant technologies for autonomous vehicles, including car navigation systems, path planning, environmental perception, as well as car control. End-to-end learning control directly converts sensory data into control commands in autonomous driving. This research aims to identify the most accurate pre-trained Deep Neural Network (DNN) for predicting the steerin
... Show MoreThe efficiency of management is determining factor for the success or failure of agricultural projects generally and Livestock particularly achieving its objectives. Therefore, this research came to diagnose the most important variables that determine the efficiency of management using the probability regression models to measure the probability of management efficient of broilers production projects using random sample included (60) broilers projects represented 11.6% of Baghdad province (research community) in 2016. After estimating the relationship between the management efficiency (descriptive dependent variable) and the independent variables affecting it (age, educational level, production index (PI), experience). The results
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show Moreجدلية التنظرية في الذاكرة المنظمة بين متاهة النماذج الصناعية وواقعيةالنموذج الهجين