Numerical simulations have been investigated to study the external free convective heat transfer from a vertically rectangular interrupted fin arrays. The continuity, Naver-Stockes and energy equations have been solved for steady-state, incompressible, two dimensional, laminar with Boussiuesq approximation by Fluent 15 software. The performance of interrupted fins was evaluated to gain the optimum ratio of interrupted length to fin length (
Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show More
Background: Repeated blood transfusion is the main therapeutic option for transfusion-dependent anaemias with consequent iron overload and organ damage .Therefore iron chelating agents are important protective measures for these patients. The aim of this study was to investigate the efficiency and safety of Desferroxamine in paediatrics population subjected to iron overload as a consequence of repeated transfusion in a group of Sudanese children Subjects & Methods: This was a descriptive cross-sectional hospital based study. Conducted in two main paediatric reference hospitals in, Su |
Moment invariants have wide applications in image recognition since they were proposed.
In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreRecovery of time-dependent thermal conductivity has been numerically investigated. The problem of identification in one-dimensional heat equation from Cauchy boundary data and mass/energy specification has been considered. The inverse problem recasted as a nonlinear optimization problem. The regularized least-squares functional is minimised through lsqnonlin routine from MATLAB to retrieve the unknown coefficient. We investigate the stability and accuracy for numerical solution for two examples with various noise level and regularization parameter.