This paper deals with a numerical method based on the simulation of a 2D tank, for
unsteady and laminar two - dimensional incompressible viscous flow. Navier-Stokes and
Continuity equations are solved in a fluid domain. These equations are discreti
zed by
Finite Differences Method. The pressure is obtained by solving a Poisson equation dealing
with a fictitious velocity field. The Poisson equation is solved by a Finite Volume Method.
The grid is refined by a new method “Adaptive Selective Mesh Refinement” called
“ASMR”.
The aim of this study to assesment the effect of using titanium mesh to repair isolated monolateral blow- out orbital fractures. The research sample comprised 15cases reported to the Department of ophthalmology and department of oral and maxillofacia
l surgery at Alassad University Hospital Latakia-Syria , the time between trauma and procedure of surgery was taken into account. The clinical observation contained studying of eye movement , vertical localization of eyeball, diplopia through15 day, month, and 3month after the surgery . The enophthalmos was monitored also through: 3 months ans 6 months after the surgery Results showed that there is statistical difference before and after the surgery operation. Eye movement returned completely normal after 3 months, the localization of injured side of eyeball returned natural when compared to the localization of intact side, and diplopia was corrected through the catamnesis Using Titanium mesh in repairing blow- out fractures led to improve the functional side of eyeball, so this important part of face was returned functionally and esthetically.
Wireless Mesh Networks, WMNs, are foreseen to be an alternative to LANs and last- mile access
infrastructures, and they have many unique characteristics, such as ease of deployment and installation,
and cost efficiency. Security is crucial for WMNs
to be widely accepted as internetworking and access
network technologies. Access control, as a security requirement, is one of the most important pillars that
lay down the foundation for such an acceptance. We identify in this paper the criteria that should be
fulfilled by a viable security solution to control access to WMNs, and specify DUA, a security scheme, that
allows for mutual authentication. DUA is based on the distribution of authentication key material over
many nodes in such a way that any coalition of a predetermined threshold of corrupted nodes or fewer
does not compromise the security of the system. Further, the key material is never handled by a single
node. In addition, DUA provides for efficiency through the use of lightweight cryptographic operations.