Ahmad Hakimi

Learn More
Olfactory loss is among early signs of idiopathic Parkinson’s disease (IPD). The present pilot study aimed to investigate whether this loss would be reflected in a decreased volume of the olfactory bulb (OB) established through magnetic resonance imaging. Eleven consecutive IPD patients were compared to 9 healthy, age-matched controls. Results indicated(More)
RATIONALE AND OBJECTIVES To evaluate cone beam computed tomography (CBCT) for monitoring of tibial bone defect healing in comparison to histopathological findings. MATERIALS AND METHODS Circumscribed tibial bone defects were created in 16 mini-pigs and imaging of the tibia was performed on day 42 using a modern CBCT scanner with flat panel detector(More)
Although, the finite element method numerically is efficient it exhibits difficulties whenever the remeshing of the analysis domain must be performed. For such problems, utilizing meshless computation methods is very promising. But, their large computational cost, which arises from following a time-consuming process to find shape functions, is one of the(More)
In this paper, an improved meshless method is presented by eliminating the time consuming process of determining the shape function. We introduce a direct approach, based on the properties, which is required for any shape function, to prepare the shape function and propose a new meshless method. The proposed method does not need to any predetermined basis(More)
To evaluate multidetector CT volumetry in the assessment of bone defect healing in comparison to histopathological findings in an animal model. In 16 mini-pigs, a circumscribed tibial bone defect was created. Multidetector CT (MDCT) of the tibia was performed on a 64-row scanner 42 days after the operation. The extent of bone healing was estimated(More)
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected(More)