Objectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropomorphic head and neck phantom has been designed to mimic the adult head and neck including some internal organs and tissues of interest, such as the thyroid gland and sentinel lymph nodes. The design of the head and neck phantom included an adjustable inner jig holding the simulated SLNs and thyroid gland. The simulated thyroid gland was designed and 3D printed taking into consideration the size and the shape of a healthy adult thyroid gland. The inner sealed space of the thyroid was filled with 15MBq of 99mTc through two upper filling valves. Sealed micro-tubes (0.2ml) have been employed to simulate SLNs containing various 99mTc activity concentrations ranging between 0.1MBq and 1MBq, and can be positioned at any desired place in the head and neck region. An active background was simulated through mixing 10MBq of 99mTc solution with the water used to fill the outer shell of the head and neck phantom. Results: The head and neck phantom was employed to simulate a situation where there are four SLNs distributed at two different vertical levels and at two depths within the neck. Contrast to noise ratio (CNR) calculations were performed for the detected SLNs at an 80mm distance between both pinhole collimators (i.e. 0.5mm and 1.0mm diameters) and the surface of the head and neck phantom with a 100s acquisition time. The recorded CNR values for the simulated SLNs are higher when the HGC was fitted with the 1.0mm diameter pinhole collimator. For instance, the recorded CNR values for the superficially simulated SLN containing 0.1MBq of 99mTc using 0.5mm and 1.0mm diameter pinhole collimators are 6.48 and 16.42, respectively (~87% difference). The anatomical context provided by the hybrid imaging aided the localization process of radioactivity accumulation in simulated SLNs. Gamma and hybrid optical images were acquired using the HGC with both available pinhole collimators for the simulated thyroid gland. The thyroid images produced varied in terms of spatial resolution and detectability. The count profiles through the middle of the simulated thyroid gland images provided by both pinhole collimators were obtained. The HGC could clearly differentiate the individual peaks of both thyroid lobes in the gamma image produced by the 0.5mm pinhole collimator. In contrast, the recorded count profile for the acquired image using the 1.0mm diameter pinhole collimator showed broader peaks for both lobes, reflecting the degradation of the spatial resolution with increasing the diameter of the pinhole collimator. Conclusion: The capability of the HGC has been evaluated utilizing a prototype anthropomorphic head and neck phantom, and the gamma and hybrid images obtained demonstrate that it is ideally suited for intraoperative SLNs detection and small organ imaging. The standardization of test phantoms and protocols for SFOV portable gamma systems will provide an opportunity to collect data across various medical centers and research groups. Moreover, it will provide a technical baseline for researchers and clinical practitioners to consider when assessing their SFOV gamma imaging systems. The anthropomorphic head and neck phantom described is cost effective, reproducible, flexible and anatomically representative.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreAbstract
The critical success factors of the means of the most modern in determining the main directions for organizations to achieve competitive advantage. and can be a critical success factors in organizations that overlap in the functional areas of the organization. that successful organizations use these factors to get to the uniqueness and distinction. as the entrance of critical success factors with the capacity Evaluative phase correction because discovery increases the perception of managers of what is important to the organization and using them to get to the Strategic Entrepreneurship. as it begins in terms of permanence of success and
... Show MorePurpose: the purpose of this study is to investigate how managers working for the General Authority for Irrigation and Reclamation Projects react to the impact of Emotional Intelligence (EI) on their performance. Theoretical framework: The current study includes an intellectual framework on two variables, namely EI and Manager Performance (MP), because it is essential to investigate the relationship between these two variables and the impact of EI on MP. Design/methodology/approach: The research problem is that a manager's capacity to make wise decisions about their work or interactions with subordinates is diminished when they have inadequate EI. The questionnaire is used as a tool for gathering data for the study, and the st
... Show MoreDespite the great economic and commercial importance given to real estate by virtue of its view of the landscape or public roads, US courts have differed in their position on compensation for damages resulting from blocking that view or vision by public projects. Some courts compensated for such damages, other courts approved such compensation. Hence, this research came to shed light on the extent of the possibility of compensation for blocking the view or vision as a result of public projects, and the research has supported us with many judicial decisions.
This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc
... Show MoreTerrorism is a serious problem for many societies today. This research aims to identify the impact of terrorism and displacement crisis on human security, which was a shock to the Iraqi society in terms of its impact on the psychological, social and economic conditions of the individual, family, and society. The variety of methods of carrying out the terrorist operations that resulted from the phenomenon of human displacement witnessed by Iraq since the middle of 2014. This phenomenon has its demographic, political and social dimensions.
In order to achieve the goal of this study and the importance of the subject, the social survey method was used by selecting a sample of 200 IDPs in a compou
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show More