100 patient will be recruited for hystrectomy for benign cause and TLH will be copared to TAH and effect of learning curve will be assessed by comparing operative time between early and lat patients in TLH group
Applied Sciences, Vol. 12, Pages 10852: Spatial Variations in Microfiber Transport in a Transnational River Basin Applied Sciences doi: 10.3390/app122110852 Authors: Alexia Balla Ahmed Mohsen Sándor Gönczy Tímea Kiss Five countries share the catchment of the Tisza River (Central Europe). In most households electricity and water are available, and by washing synthetic clothes they can produce a lar...
Hydrology, Vol. 9, Pages 88: Remote Sensing of Sediment Discharge in Rivers Using Sentinel 2 Images and Machine Learning Algorithms Hydrology doi: 10.3390/hydrology9050088 Authors: Ahmed Mohsen Ferenc Kovács Tímea Kiss The spatio temporal dynamism of sediment discharge (Qs) in rivers is influenced by various natural and anthropogenic factors. Unfortunately, most rivers are only monitored at a limi...
Nov 22, 2019
in Multimedia manual of cardiothoracic surgery : MMCTS
In this video tutorial, we present our surgical technique for single-stage complete repair of an interrupted aortic arch with ventricular septal defect. The key operative steps, which include dual cannulation, the arch repair, and the intra-cardiac repair, are clearly demonstrated.
Jan 1, 2018
in 2018 International Conference on Computer and Applications
Due to the rapid developments in wireless communications and mobile computing, mobile devices such as personal digital assistants (PDAs) and Smartphones are becoming increasingly popular. Services based on users location have received vast attention, because the mobile devices are carried by the users almost anywhere and anytime. A wide variety of important services for mobile users such as naviga...
The aim of the study is to observe retrospectively the correlation between Oral Squamous Cell Carcinoma (OSCC) and risk factors; including tobacco, alcohol and Family History of Cancer (FHC). A total of 478 patients were included retrospectively from the database of the Department of Oral Sciences and Maxillofacial Surgery, Sapienza University of Rome. A Test Group (TG) consisted of 239 patients w...
Jan 1, 2013
in 2013 International Conference on Computing, Networking and Communications
We present a novel practical and provably secure key sharing scheme for Near Field Communication (NFC) devices. The scheme is based on sharing secret keys using the noisy wireless channel. We present two schemes based on the different modes of operation of typical NFC devices. Our numerical results establish the achievability of vanishing secrecy rates using the proposed techniques. Implementation...
Jan 1, 2012
in 2012 International Conference on Multimedia Computing and Systems
Wireless sensor nodes are resource constrained and have limited amount of energy. Therefore, designing protocols that conserve energy is an important area of research. Researchers have investigated architectures and topologies that allow energy efficient operation of WSNs. One of the popular techniques in this regard is clustering. The different methods of node clustering techniques have appeared ...