Objectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropomorphic head and neck phantom has been designed to mimic the adult head and neck including some internal organs and tissues of interest, such as the thyroid gland and sentinel lymph nodes. The design of the head and neck phantom included an adjustable inner jig holding the simulated SLNs and thyroid gland. The simulated thyroid gland was designed and 3D printed taking into consideration the size and the shape of a healthy adult thyroid gland. The inner sealed space of the thyroid was filled with 15MBq of 99mTc through two upper filling valves. Sealed micro-tubes (0.2ml) have been employed to simulate SLNs containing various 99mTc activity concentrations ranging between 0.1MBq and 1MBq, and can be positioned at any desired place in the head and neck region. An active background was simulated through mixing 10MBq of 99mTc solution with the water used to fill the outer shell of the head and neck phantom. Results: The head and neck phantom was employed to simulate a situation where there are four SLNs distributed at two different vertical levels and at two depths within the neck. Contrast to noise ratio (CNR) calculations were performed for the detected SLNs at an 80mm distance between both pinhole collimators (i.e. 0.5mm and 1.0mm diameters) and the surface of the head and neck phantom with a 100s acquisition time. The recorded CNR values for the simulated SLNs are higher when the HGC was fitted with the 1.0mm diameter pinhole collimator. For instance, the recorded CNR values for the superficially simulated SLN containing 0.1MBq of 99mTc using 0.5mm and 1.0mm diameter pinhole collimators are 6.48 and 16.42, respectively (~87% difference). The anatomical context provided by the hybrid imaging aided the localization process of radioactivity accumulation in simulated SLNs. Gamma and hybrid optical images were acquired using the HGC with both available pinhole collimators for the simulated thyroid gland. The thyroid images produced varied in terms of spatial resolution and detectability. The count profiles through the middle of the simulated thyroid gland images provided by both pinhole collimators were obtained. The HGC could clearly differentiate the individual peaks of both thyroid lobes in the gamma image produced by the 0.5mm pinhole collimator. In contrast, the recorded count profile for the acquired image using the 1.0mm diameter pinhole collimator showed broader peaks for both lobes, reflecting the degradation of the spatial resolution with increasing the diameter of the pinhole collimator. Conclusion: The capability of the HGC has been evaluated utilizing a prototype anthropomorphic head and neck phantom, and the gamma and hybrid images obtained demonstrate that it is ideally suited for intraoperative SLNs detection and small organ imaging. The standardization of test phantoms and protocols for SFOV portable gamma systems will provide an opportunity to collect data across various medical centers and research groups. Moreover, it will provide a technical baseline for researchers and clinical practitioners to consider when assessing their SFOV gamma imaging systems. The anthropomorphic head and neck phantom described is cost effective, reproducible, flexible and anatomically representative.
Circular thin walled structures have wide range of applications. This type of structure is generally exposed to different types of loads, but one of the most important types is a buckling. In this work, the phenomena of buckling was studied by using finite element analysis. The circular thin walled structure in this study is constructed from; cylindrical thin shell strengthen by longitudinal stringers, subjected to pure bending in one plane. In addition, Taguchi method was used to identify the optimum combination set of parameters for enhancement of the critical buckling load value, as well as to investigate the most effective parameter. The parameters that have been analyzed were; cylinder shell thickness, shape of stiffeners section an
... Show MoreIn this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
BACKGROUNDS Nasoalveolar molding (NAM) application is among presurgical management (PSM) techniques used for infants with cleft lip and palate (CLP). It helps to approximate the palatal cleft and to reshape the nasoalveolar complex prior to primary lip repair. This study aimed to explore types of PSM and the dental speciality provision for infants with CLP in Baghdad. The status of NAM usage and surgeons’ perceptions toward NAM usage were assessed. MATERIALS AND METHODS This is a cross-sectional paper-based questionnaire study that collected responses of surgeons perform primary lip and nose repair regarding PSM. The questionnaire was distributed amongst public and private hospitals in Baghdad. Twenty surgeons were enrolled (only those su
... Show MoreEarly detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med
... Show MoreThe objective of this study is to evaluate the efficacy and safety of rowatinex and tamsulosin in the treatment of patients with ureteric stone.
Forty patients with ureteric stone ranged (4- 12) mm, were included in this study. They were randomized into two groups where the first group includes twenty patients treated with Rowatinex three times daily (Group 1), and the second group includes twenty patients treated with tamsulosin 0.4mg/day (Group 2). All patients were randomly assigned to receive the designed standard medical therapy for a maximum of 3 weeks.
Each group was given an antibiotic as prophylaxis and an injectable non-steroidal anti-inflammatory drug used on demand. At the outpatient clinic all subjects were a
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More