期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Correlation between corneal demarcation line depth in epithelium-off and trans-epithelium accelerated corneal cross linking and keratoconus progression 被引量:2
1
作者 Mahmoud Abdel-Radi Zeiad Eldaly +3 位作者 Hazem Abdelmotaal Reham Abdelrahman mohamed sayed Kamel Soliman 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2020年第6期907-912,共6页
AIM:To compare corneal demarcation line(DL)depth in both accelerated epithelium-off and trans-epithelium cross linking(CXL)using anterior segment optical coherence tomography(AS-OCT)and its relation to maximum keratom... AIM:To compare corneal demarcation line(DL)depth in both accelerated epithelium-off and trans-epithelium cross linking(CXL)using anterior segment optical coherence tomography(AS-OCT)and its relation to maximum keratometry(Kmax)progression in both techniques.METHODS:A prospective comparative interventional study where patients with mild to moderate keratoconus(KC)were classified into two groups:accelerated epitheliumoff and trans-epithelium CXL based on corneal pachymetry.Assessment of corneal DL depth was carried out after 3mo by AS-OCT.Kmax readings were evaluated after one year follow up using the Scheimpflug imaging system.RESULTS:Study included 74 eyes of 44 patients.Group A underwent epithelium-off CXL(41 eyes),while Group B underwent trans-epithelium CXL(33 eyes).At 3mo follow up,mean corneal DL depth in Group A was 219.9±58.4μm while in Group B was 127.2±7.8μm(P<0.05).The mean Kmaxchangedfrom51.9±3.9to51.3±4.2dioptersin Group A and from 53.1±4.1 to 53.6±5 diopters in Group B with insignificant difference in Kmax changes in either group(P>0.05).In addition,no significant change in corneal pachymetry was found in both groups(meanchange at 1y:6.4±4.7 and-10.1±2.3μm in Groups A and B respectively).CONCLUSION:Despite a significantly deeper corneal DL depth created by accelerated epithelium-off CXL technique compared to accelerated trans-epithelium CXL,there is no significant impact on keratoconus progression. 展开更多
关键词 anterior segment optical coherence tomography cross linking demarcation line KERATOCONUS
下载PDF
An Innovative Solutions for the Generalized FitzHugh-Nagumo Equation by Using the Generalized (G'/G)-Expansion Method 被引量:1
2
作者 sayed Kahlil Elagan mohamed sayed Yaser Salah Hamed 《Applied Mathematics》 2011年第4期470-474,共5页
In this paper, the generalized (G'/G)-expansion method is used for construct an innovative explicit traveling wave solutions involving parameter of the generalized FitzHugh-Nagumo equation , for some special param... In this paper, the generalized (G'/G)-expansion method is used for construct an innovative explicit traveling wave solutions involving parameter of the generalized FitzHugh-Nagumo equation , for some special parameter where satisfies a second order linear differential equation , , where and are functions of . 展开更多
关键词 FitzHugh-Nagumo Equation GENERALIZED (G'/G)-Expansion Method TRAVELING Wave Solutions
下载PDF
Palm Vein Authentication Based on the Coset Decomposition Method
3
作者 mohamed sayed 《Journal of Information Security》 2015年第3期197-205,共9页
The palm vein authentication technology is extremely safe, accurate and reliable as it uses the vascular patterns contained within the body to confirm personal identification. The pattern of veins in the palm is compl... The palm vein authentication technology is extremely safe, accurate and reliable as it uses the vascular patterns contained within the body to confirm personal identification. The pattern of veins in the palm is complex and unique to each individual. Its non-contact function gives it a healthful advantage over other biometric technologies. This paper presents an algebraic method for personal authentication and identification using internal contactless palm vein images. We use MATLAB image processing toolbox to enhance the palm vein images and employ coset decomposition concept to store and identify the encoded palm vein feature vectors. Experimental evidence shows the validation and influence of the proposed approach. 展开更多
关键词 BIOMETRICS COSET Decomposition Method HAND VEINS PERSONAL AUTHENTICATION
下载PDF
E-Learning Optimization Using Supervised Artificial Neural-Network
4
作者 mohamed sayed Faris Baker 《Journal of Software Engineering and Applications》 2015年第1期26-34,共9页
Improving learning outcome has always been an important motivating factor in educational inquiry. In a blended learning environment where e-learning and traditional face to face class tutoring are combined, there are ... Improving learning outcome has always been an important motivating factor in educational inquiry. In a blended learning environment where e-learning and traditional face to face class tutoring are combined, there are opportunities to explore the role of technology in improving student’s grades. A student’s performance is impacted by many factors such as engagement, self-regulation, peer interaction, tutor’s experience and tutors’ time involvement with students. Furthermore, e-course design factors such as providing personalized learning are an urgent requirement for improved learning process. In this paper, an artificial neural network model is introduced as a type of supervised learning, meaning that the network is provided with example input parameters of learning and the desired optimized and correct output for that input. We also describe, by utilizing e-learning interactions and social analytics how to use artificial neural network to produce a converging mathematical model. Then students’ performance can be efficiently predicted and so the danger of failing in an enrolled e-course should be reduced. 展开更多
关键词 Artificial NEURAL NETWORKS E-LEARNING PREDICTION MODELS Supervised LEARNING
下载PDF
Grobner Bases Method for Biometric Traits Identification and Encryption
5
作者 mohamed sayed 《Journal of Information Security》 2015年第3期241-249,共9页
Biometric identification systems are principally related to the information security as well as data protection and encryption. The paper proposes a method to integrate biometrics data encryption and authentication in... Biometric identification systems are principally related to the information security as well as data protection and encryption. The paper proposes a method to integrate biometrics data encryption and authentication into error correction techniques. The normal methods of biometric templates matching are replaced by a more powerful and high quality identification approach based on Grobner bases computations. In the normal biometric systems, where the data are always noisy, an approximate matching is expected;however, our cryptographic method gives particularly exact matching. 展开更多
关键词 BIOMETRICS CRYPTOGRAPHY GROBNER Bases
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部