Do you want to publish a course? Click here

This paper deals with a numerical method based on the simulation of a 2D tank, for unsteady and laminar two - dimensional incompressible viscous flow. Navier-Stokes and Continuity equations are solved in a fluid domain. These equations are discreti zed by Finite Differences Method. The pressure is obtained by solving a Poisson equation dealing with a fictitious velocity field. The Poisson equation is solved by a Finite Volume Method. The grid is refined by a new method “Adaptive Selective Mesh Refinement” called “ASMR”.
The aim of this study to assesment the effect of using titanium mesh to repair isolated monolateral blow- out orbital fractures. The research sample comprised 15cases reported to the Department of ophthalmology and department of oral and maxillofacia l surgery at Alassad University Hospital Latakia-Syria , the time between trauma and procedure of surgery was taken into account. The clinical observation contained studying of eye movement , vertical localization of eyeball, diplopia through15 day, month, and 3month after the surgery . The enophthalmos was monitored also through: 3 months ans 6 months after the surgery Results showed that there is statistical difference before and after the surgery operation. Eye movement returned completely normal after 3 months, the localization of injured side of eyeball returned natural when compared to the localization of intact side, and diplopia was corrected through the catamnesis Using Titanium mesh in repairing blow- out fractures led to improve the functional side of eyeball, so this important part of face was returned functionally and esthetically.
Wireless Mesh Networks, WMNs, are foreseen to be an alternative to LANs and last- mile access infrastructures, and they have many unique characteristics, such as ease of deployment and installation, and cost efficiency. Security is crucial for WMNs to be widely accepted as internetworking and access network technologies. Access control, as a security requirement, is one of the most important pillars that lay down the foundation for such an acceptance. We identify in this paper the criteria that should be fulfilled by a viable security solution to control access to WMNs, and specify DUA, a security scheme, that allows for mutual authentication. DUA is based on the distribution of authentication key material over many nodes in such a way that any coalition of a predetermined threshold of corrupted nodes or fewer does not compromise the security of the system. Further, the key material is never handled by a single node. In addition, DUA provides for efficiency through the use of lightweight cryptographic operations.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا