A new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.
Artificial roughness applied to a Solar Air Heater (SAH) absorber plate is a popular technique for increasing its total thermal efficiency (ηt−th). In this paper, the influence of geometrical parameters of V-down ribs attached below the corrugated absorbing plate of a SAH on the ηt−th was examined. The impacts of key roughness parameters, including relative pitch p/e (6–12), relative height e/D (0.019–0.043), angles of attack α (30–75°), and Re (1000–20,000), were examined under real weather conditions. The SAH ηt−th roughened by V-down ribs was predicted using an in-house developed conjugate heat-transfer numerical model. The maximum SAH ηt−th was shown to be 78.8% as predicted under the steady-state condition
... Show MoreMobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10
... Show MoreObjectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropom
... Show MoreIntroduction: The use of screw-retained hybrid arch bars (HABs) is a relatively recent development in the treatment of mandibular fractures. The purpose of this study is to compare the clinical outcome between HAB and the conventional Erich arch bar (EAB) in the closed treatment of mandibular fractures. Materials and methods: This study included 18 patients who were treated for mandibular fractures with maxillomandibular fixation (MMF), patients were randomly assigned into a control group (n = 10) in which EAB was used and study group (n = 8) in which HAB was used. The outcome variables were time required for application and removal, gingival inflammation scores, postoperative complications, and incidence of wire-stick injury or gloves perf
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show More
