Introduction The Hybrid Gamma Camera (HGC) is being developed to enhance the localisation of radiopharmaceutical uptake in targeted tissues during surgical procedures such as sentinel lymph node (SLN) biopsy. Purpose To assess the capability of the HGC, a lymph-node-contrast (LNC) phantom was constructed for an evaluative study simulating medical scenarios of varying radioactivity concentration and SLN size. Materials and methods The phantom was constructed using two methyl methacrylate PMMA plates (8 mm thick). The SLNs were simulated by drilling circular wells of diameters ranging between 10 mm and 2.5 mm (16 wells in total) in one plate. These simulated SLNs were placed underneath scattering material with thicknesses ranging between 5 mm and 40 mm. The second plate contains four rectangular wells to simulate background activity uptake surrounding the SLNs. The activity used ranged between 4 MBq and 0.025 MBq for the SLNs. The background activity was 1/10 of the SLNs activity. The collimator to source distance was 120 mm. Results Signal to Noise Ratio (SNR) analysis and spatial resolution measurements of the simulated SLN were used to compare the imaging sets over acquisition times ranging between 60s and 240s. The HGC successfully detected 87.5% to 100% of the SLNs through 20mm of scattering material, and it could detect 75% to 93.75% of the SLNs through 40mm of scattering material. Measurement of Full-Width-at-Half-Maximum (FWHM) for the detected SLNs ranged between 9.5 mm and 12 mm. Conclusion The HGC is capable of detecting low activity uptake in small SLNs indicating its usefulness as an intraoperative imaging system during surgical SLN procedures.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MorePurpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreBackground. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod
... Show MoreMorphological and phonological studies of fungal pathogen infecting alfalfa weevil Hypera postica (Gyllenhal) indicating that infection has been shown to develop along two distinct physiological lines, each culminating in the production of either conidial or resting spores, in host cadavers which are morphologically distinct. The percent of infection and epizootic development appeared to be dependent on host density. Farther evidence to entail proper correlation between conidia and resting spores suggest that these two forms of spores are stages in the development of one pathogen.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Background: One of the strongest risk factors for breast cancer is high breast density, relatively little fat in the breast and more connective and glandular tissue.
Objectives: this study aims to measure risk of increase breast density in correlation of CA breast & compare our results with results in other population, to compare the performance of ultrasonography and mammography in measuring breast density according to BIRDS system
Materials &methods: The study included 45 females .Measuring risk of increase breast density in correlation of CA breast & comparing the performance of ultrasonography and mammography in measuring breast density according to BIRADS system.
Results : there is stron
Given a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.