ABSTRACT: BACKGROUND: Infantile haemangioma one of the most common tumour of new borns , a safe and effective treatment options are under ongoing research . OBJECTIVE: The authors show the effectiveness and safety of low dose propranolol as a method for infantile haemangioma treatment . METHOD: In this study twenty- four patients with infantile haemangioma in different anatomical locations were treated with oral propranolol and the result were assessed in a retrospective analysis of the results patients were kept on 0.25 mg/kg/day for one month , then on 0.5mg/kg/day in 2 divided doses for another one month , in the third month the dose will be increased to 1 mg/kg/day in 2 divided doses , then the propranolol were given in a maintenance do
... Show MoreThe gamma camera, along with SPECT and PET scanners, is one of the main imaging technologies in nuclear medicine. A collimator is typically constructed from tungsten to provide high absorption of gamma photon energies. It has a hole or holes for imaging. Gamma rays from a radioactive source within the body are emitted in all directions, while the photons required constructing an image travel through the hole. A scintillator is the most common material used to convert the high energy of gamma radiation into a lowenergy optical photon. These detectors are one of the primary secrets to radio-diagnosis in nuclear medicine. The photomultiplier tube (PMT) is a versatile device with extraordinarily highly sensitivity and response. A typical photom
... Show MoreRecently, digital communication has become a critical necessity and so the Internet has become the most used medium and most efficient for digital communication. At the same time, data transmitted through the Internet are becoming more vulnerable. Therefore, the issue of maintaining secrecy of data is very important, especially if the data is personal or confidential. Steganography has provided a reliable method for solving such problems. Steganography is an effective technique in secret communication in digital worlds where data sharing and transfer is increasing through the Internet, emails and other ways. The main challenges of steganography methods are the undetectability and the imperceptibility of con
... Show MoreIn this paper, a method is proposed to increase the compression ratio for the color images by
dividing the image into non-overlapping blocks and applying different compression ratio for these
blocks depending on the importance information of the block. In the region that contain important
information the compression ratio is reduced to prevent loss of the information, while in the
smoothness region which has not important information, high compression ratio is used .The
proposed method shows better results when compared with classical methods(wavelet and DCT).
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreIn this paper, an algorithm through which we can embed more data than the
regular methods under spatial domain is introduced. We compressed the secret data
using Huffman coding and then this compressed data is embedded using laplacian
sharpening method.
We used Laplace filters to determine the effective hiding places, then based on
threshold value we found the places with the highest values acquired from these filters
for embedding the watermark. In this work our aim is increasing the capacity of
information which is to be embedded by using Huffman code and at the same time
increasing the security of the algorithm by hiding data in the places that have highest
values of edges and less noticeable.
The perform