Abstract Objective: Comparison of femtosecond small incision lenticule extraction (FS-SMILE) versus Femtosecond laser Insitu keratomileusis (FS-LASIK) regarding dry eye disease (DED) and corneal sensitivity (CS) after those refractive surgeries. Methods: A comparative prospective study conducted for a period of 2 years; from March 2017 until February, 2019. Enrolled patients were diagnosed with myopia. Fifty patients (100 eyes) were scheduled for bilateral FS-SMILE and the other 50 patients (100 eyes) had been scheduled for bilateral FS-LASIK. Both groups were followed for six months after surgery. The age, gender, and preoperative refraction for both groups were matched. Complete evaluation of dry eye disease had been
... Show MoreAbstract Objective: Comparison of femtosecond small incision lenticule extraction (FS-SMILE) versus Femtosecond laser Insitu keratomileusis (FS-LASIK) regarding dry eye disease (DED) and corneal sensitivity (CS) after those refractive surgeries. Methods: A comparative prospective study conducted for a period of 2 years; from March 2017 until February, 2019. Enrolled patients were diagnosed with myopia. Fifty patients (100 eyes) were scheduled for bilateral FS-SMILE and the other 50 patients (100 eyes) had been scheduled for bilateral FS-LASIK. Both groups were followed for six months after surgery. The age, gender, and preoperative refraction for both groups were matched. Complete evaluation of dry eye disease had been
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreThe process of capital investment appraisal takes hold the attention of managers and accountants of the industrial companies. This process involves the use of multiple and diverse financial evaluation methods to measure the economic attractiveness of capital investment peojects. This multiplicity and diversity of financial evaluation metods have been the motive of this research to: investigate some organizational variables such as the desired objectives, identify managerial procedures which regulate the capital investment process, specify evaluation methods and examine the relationships between these variables and evaluation methods actually used by a sample of public industrial companies in Jordan.
The data wa
... Show MoreThe study aims to use the European Excellence Model (EFQM) in assessing the institutional performance of the National Center for Administrative Development and Information Technology in order to determine the gap between the actual reality of the performance of the Center and the standards adopted in the model, in order to know the extent to which the Center seeks to achieve excellence in performance to improve the level of services provided and the adoption of methods Modern and contemporary management in the evaluation of its institutional performance.
The problem of the study was the absence of an institutional performance evaluation system at the centre whereby weaknesses (areas of improvement) and st
... Show MoreThis study utilized low-cost agricultural waste (molasses production waste powder) to extract copper ions from aqueous solutions. The present investigation explored a range of factors that influence the adsorption process, including temperature, pH, ionic strength, contact time, quantity of adsorbent, and particle size. Spectrophotometric analysis was used to determine the solution's absorbance both before and after the adsorption procedure. The Langmuir and Freundlich adsorption models were used to match the equilibrium data. The Freundlich model was determined to be the best isotherm model using the linear regression coefficient R2=0.9868. Thermodynamic parameters, including enthalpy, entropy, and Gibbs free energy, were calculate
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show More