9 research outputs found

    Evaluating Potable Water Production of a Single Slope Solar Still for Waste Water under Jordan Climate Conditions

    Get PDF
    The scarcity of potable water constitutes a major problem in underdeveloped and also some developing countries. Economical and applicable water desalination solar still coupled with a solar collector was designed and investigated experimentally. Solar still can be considered an appropriate solution for solving the water scarcity in remote and semi-arid areas. The aim of this work is to determine the performance and productivity of a single slope solar still system using different operational parameters such as ambient temperature and solar intensity. The experimental results showed that water production is significantly affected by the solar radiation intensity during the day and the instantaneous productivity of distilled water increases gradually during the experiment. The water production reaches its maximum value of 0.13 L/mÂČ at 13:00 pm were the solar radiation is higher. Keywords: Feed water, Instantaneous productivity, solar still, solar radiation intensity, Potable water

    CUSTOMER SATISFACTION TOWARDS COMMUNICATION SKILLS OF FRONT OFFICE STAFF AT THE HOTEL (CASE STUDY FIVE STARS HOTELS IN AQABA)

    Get PDF
    This research will serve as a realistic guideline for hotel administration, particularly for the front desk staff. The findings of this research will help front office employees improve their communication skills, allowing them to better fulfill the requirements of their clients and increase their happiness. If the outcome revealed that the service had received a high rating, the hotel owner would be pleased. A low score would, on the other hand, prompt the hotel owner to improve the service and set up a training program for his or her employees.The technique that was used in the present investigation there are many components on this document: the research model, operational definitions of the study's independent and dependent variables, research hypotheses, as well as a data collecting instruments, research population, and research sample.The components of this study are developed on the basis of prior literature, which may be either theoretical or empirical in nature. Indeed, the factors utilized in this research are often found in the literature on tourist development. In this case, the skewness values were within the normal range (from -1.0 to +1.0), indicating that the data from the independent variables is normal. The VIF values were smaller than the critical value (10) that was shown to be the most frequent across the majority of research, indicating that there was no multicolinearity issue among the independent variables in this study

    Relationship between Cognitive Style (Impulsivity / Reflectivity) and Violence of the Tenth Grade Students in the Governorate of Ramallah and Al Bireh in Palestine

    Get PDF
    The study aimed to explore the relationship between cognitive style (impulsivity/reflectivity) and violence. It also aimed to know the significance of some variables, such as gender, place of residence, and type of school, in the cognitive style (impulsivity/reflectivity) and violence among students of tenth grade in the governorate of Ramallah and Al Bireh. The study sample, was randomly selected (N = 190, 86 males and 104 females). The Familiar Figure Test (Faramawi, 1986) and a specifically designed questionnaire to assess violence were used. The results indicated no relationship between impulsivity/reflectivity and violence. However, there were significant differences in cognitive method (impulsivity/reflectivity) due to gender and place of residence. While, there was no significant difference due to school type. There were differences in verbal violence, physical violence and violence toward property attributable to gender and in favour of males. Private schools were more physically violent than public schools

    Impact of opioid-free analgesia on pain severity and patient satisfaction after discharge from surgery: multispecialty, prospective cohort study in 25 countries

    Get PDF
    Background: Balancing opioid stewardship and the need for adequate analgesia following discharge after surgery is challenging. This study aimed to compare the outcomes for patients discharged with opioid versus opioid-free analgesia after common surgical procedures.Methods: This international, multicentre, prospective cohort study collected data from patients undergoing common acute and elective general surgical, urological, gynaecological, and orthopaedic procedures. The primary outcomes were patient-reported time in severe pain measured on a numerical analogue scale from 0 to 100% and patient-reported satisfaction with pain relief during the first week following discharge. Data were collected by in-hospital chart review and patient telephone interview 1 week after discharge.Results: The study recruited 4273 patients from 144 centres in 25 countries; 1311 patients (30.7%) were prescribed opioid analgesia at discharge. Patients reported being in severe pain for 10 (i.q.r. 1-30)% of the first week after discharge and rated satisfaction with analgesia as 90 (i.q.r. 80-100) of 100. After adjustment for confounders, opioid analgesia on discharge was independently associated with increased pain severity (risk ratio 1.52, 95% c.i. 1.31 to 1.76; P < 0.001) and re-presentation to healthcare providers owing to side-effects of medication (OR 2.38, 95% c.i. 1.36 to 4.17; P = 0.004), but not with satisfaction with analgesia (beta coefficient 0.92, 95% c.i. -1.52 to 3.36; P = 0.468) compared with opioid-free analgesia. Although opioid prescribing varied greatly between high-income and low- and middle-income countries, patient-reported outcomes did not.Conclusion: Opioid analgesia prescription on surgical discharge is associated with a higher risk of re-presentation owing to side-effects of medication and increased patient-reported pain, but not with changes in patient-reported satisfaction. Opioid-free discharge analgesia should be adopted routinely

    The Robust Stream Cipher for Securing Data in the Smartphones

    Get PDF
    مŰč Ű§Ù„ŰȘŰ·ÙˆŰ± Ű§Ù„Ű­Ű§Ű”Ù„ في ŰŁŰŹÙ‡ŰČŰ© Ű§Ù„Ű§ŰȘŰ”Ű§Ù„Ű§ŰȘ وŰȘÙƒÙ†ÙˆÙ„ÙˆŰŹÙŠŰ§ Ű§Ù„Ù…ŰčÙ„ÙˆÙ…Ű§ŰȘ ÙˆŰ§Ù†ŰȘŰŽŰ§Ű±Ù‡Ű§ ŰšÙ…ŰłŰ§Ű­Ű§ŰȘ ÙˆŰ§ŰłŰčŰ© في Ű§Ù„ŰčŰ§Ù„Ù…  Ű§ŰŻÙ‰ Ű°Ù„Ùƒ Ű§Ù„Ù‰ ŰČÙŠŰ§ŰŻŰ© Ű§Ù„Ù…ŰŽŰ§ÙƒÙ„ Ű§Ù„Ű§Ù…Ù†ÙŠŰ© Ű§Ű«Ù†Ű§ŰĄ Ű§Ù†ŰȘÙ‚Ű§Ù„ Ű§Ù„ŰšÙŠŰ§Ù†Ű§ŰȘ Űčۚ۱ ŰȘلك Ű§Ù„Ű§ŰŹÙ‡ŰČŰ©ŰŒ Űčلى ŰłŰšÙŠÙ„ Ű§Ù„Ù…Ű«Ű§Ù„ ŰȘ۳۱ۚ Ű§Ù„ŰšÙŠŰ§Ù†Ű§ŰȘی ŰȘŰčŰŻÙŠÙ„Ù‡Ű§ŰŒ Ű§Ù„ÙˆŰ”ÙˆÙ„ Ű§Ù„ŰșÙŠŰ± Ù…Ű”Ű±Ű­ ŰšÙ‡ŰŒ و ŰȘŰčŰ±Ű¶Ù‡Ű§ Ű§Ù„Ù‰ Ű§Ù„Ù‡ŰŹÙ…Ű§ŰȘ. ŰȘÙˆŰŹŰŻ ŰčŰŻŰ© Ű§Ù†ÙˆŰ§Űč من Ű§Ù„ŰȘÙ‚Ù†ÙŠŰ§ŰȘ Ű§Ù„ŰȘي ŰȘŰłŰȘŰźŰŻÙ… لمنŰč Ű­ŰŻÙˆŰ« Ù‡Ű°Ù‡ Ű§Ù„Ù…ŰŽŰ§ÙƒÙ„ وŰȘŰčمل Űčلى Ű­Ù…Ű§ÙŠŰ© Ű§Ù„ŰšÙŠŰ§Ù†Ű§ŰȘ. ŰŁŰ­ŰŻÙ‰ Ù‡Ű°Ù‡ Ű§Ù„ŰȘÙ‚Ù†ÙŠŰ§ŰȘ هي Ű§Ù„ŰȘŰŽÙÙŠŰ± Ű§Ù„Ű§Ù†ŰłÙŠŰ§ŰšÙŠ Ű§Ù„ŰȘي ŰȘŰčŰȘۚ۱ من Ű§Ù‚ÙˆÙ‰ ÙˆŰ§ŰłŰ±Űč Ű§Ù„Ű·Ű±Ù‚ Ű§Ù„Ù…ŰłŰȘŰźŰŻÙ…Ű© في ŰčÙ…Ù„ÙŠŰ© Ű§Ù„ŰȘŰŽÙÙŠŰ± وفك Ű§Ù„ŰȘŰŽÙÙŠŰ±. في Ù‡Ű°Ű§ Ű§Ù„ŰšŰ­Ű« Ù‚ŰŻÙ…Ù†Ű§ ŰȘŰ”Ù…ÙŠÙ… ŰŹŰŻÙŠŰŻ للŰȘŰŽÙÙŠŰ± Ű§Ù„Ű§Ù†ŰłÙŠŰ§ŰšÙŠ Ù„Ű­Ù…Ű§ÙŠŰ© ŰšÙŠŰ§Ù†Ű§ŰȘ Ű§Ù„Ù‡Ű§ŰȘف. Ù‚ÙˆŰ© Ű§Ù„ŰȘŰŽÙÙŠŰ± Ű§Ù„Ű§Ù†ŰłÙŠŰ§ŰšÙŠ ŰȘŰčŰȘÙ…ŰŻ Űčلى Ű§Ù„Ù…ÙŰȘۭۧ. ŰȘÙˆŰŹŰŻ ŰčŰŻŰ© Ű·Ű±Ù‚ ŰȘŰłŰȘŰźŰŻÙ… لŰș۱۶ ŰȘÙˆÙ„ÙŠŰŻ Ű§Ù„Ù…ÙŰȘۭۧ. ۧ۳ŰȘŰźŰŻÙ…Ù†Ű§ Ű«Ù„Ű§Ű«Ű© Ű§Ù†ÙˆŰ§Űč من Ű§Ù„Ù…ÙˆÙ„ŰŻŰ§ŰȘ(LFSR,FCSR,NLFSR) ÙˆŰšŰčŰŻ Ű°Ù„Ùƒ ۧ۳ŰȘŰźŰŻÙ…Ù†Ű§ Non-linear Boolean function من نوŰč (f combination function) من نوŰč ŰźÙ…ŰłŰ© مŰȘŰșÙŠŰ±Ű§ŰȘی Ù„ŰŹŰčل Ű§Ù„Ù…ÙˆÙ„ŰŻ Ű§ÙƒŰ«Ű± Ű§Ù…Ű§Ù†Ű§Ù‹. Ù‚Ù…Ù†Ű§ ŰšŰŻÙ…ŰŹ Ù‡Ű°Ù‡ Ű§Ù„Ű§Ù†ÙˆŰ§Űč Ű§Ù„Ű«Ù„Ű§Ű«Ű© ÙˆŰ°Ù„Ùƒ ŰšŰ§ŰŻŰźŰ§Ù„ ۣ۱ۚŰčŰ© Ù…ÙˆÙ„ŰŻŰ§ŰȘ من نوŰč LFSR  Ù…Űč Ű§Ű­ŰŻÙ‰ Ù…ÙˆÙ„ŰŻŰ§ŰȘ FCSR  ŰŁÙˆ NLFSR Ű§Ù„Ù‰ f. ŰšŰčŰŻ Ű°Ù„Ùƒ Ù‚Ù…Ù†Ű§ ۚۧ۟ŰȘۚۧ۱ Ű§Ù„Ù…ÙŰȘۭۧ من ŰźÙ„Ű§Ù„ Ù‚ÙŠŰ§Űł ŰčŰŽÙˆŰ§ŰŠÙŠŰȘه (Ű§Ù„ŰȘي ŰȘŰčŰȘۚ۱ من Ű§Ù‡Ù… Ű§Ù„Ù…ŰčŰ§ÙŠÙŠŰ± Ű§Ù„Ű§ŰłŰ§ŰłÙŠŰ© Ù„Ù‚ÙŠŰ§Űł ÙƒÙŰ§ŰĄŰ© Ű§Ù„Ù…ÙˆÙ„ŰŻ) ۚۧ۳ŰȘŰźŰŻŰ§Ù… ۧ۟ŰȘۚۧ۱ۧŰȘ NIST statistical tests.With the development of network and communication systems in large areas in the world, this leads to increase security problems in transmission of data such as data leakage, modification, unauthorized access, and attacks. There are many types of techniques that are used to prevent these problems and protect data. One of these techniques is a stream cipher which considered the strongest and fastest method used in encryption and decryption process. In this study presented a new design for the stream cipher to protect mobile data. The strength of stream cipher depends on it is' key. There are several methods to generate key. We used three types of generator. Then, it used the combiner to convert them into a nonlinear Boolean function in order to make the generator key more secure. To implement a new generator key by using these three kinds, we used four LFSRs and one of NLFSRs or FCSRs to produce five variables Boolean function. These variables will be as an input to the combiner function. Finally, we tested the generator and submitted it to the randomness tests that is publicly available in the National Institute of Standards and Technology (NIST)

    Early Diabetic Nephropathy and Retinopathy in Patients with Type 1 Diabetes Mellitus Attending Sudan Childhood Diabetes Centre

    No full text
    Objective. Data on microvascular complications in children and adolescents with type 1 diabetes mellitus (T1DM) in Sudan are scarce. This study was aimed at determining the prevalence of diabetic nephropathy (DN) and retinopathy (DR) and their relationship to certain risk factors in children with T1DM attending the Sudan Childhood Diabetes Centre. Design and Methods. A clinic-based cross-sectional study of 100 patients with T1DM aged 10-18 years. Patients with disease duration exceeding 5 years if the onset of diabetes was prepubertal and 2 years if it was postpubertal were included. Relevant sociodemographic, clinical, and biochemical information was obtained. Blood pressure was measured. The patients were screened for DN and DR using urinary microalbumin estimation and fundus photography, respectively. Results. The frequency of microalbuminuria and diabetic retinopathy was 36% and 33%, respectively. Eleven percent had both retinopathy and microalbuminuria. Seven percent of the patients were found to be hypertensive. Patients with diabetic retinopathy had significantly higher HbA1c levels (p=0.009) and longer diabetes duration (p=0.02) than patients without retinopathy. Logistic regression showed that high HbA1c (odds ratio (OR) 0.83, confidence interval (CI) 0.68-1.00, p=0.04), but not age, duration, ethnic group, BMI, blood pressure, and presence of nephropathy, was an independent risk factor for retinopathy. Likewise, high blood pressure (OR 6.89, CI 1.17-40.52, p=0.03), but not age, duration, ethnic group, BMI, HbA1c, and presence of retinopathy, was a predictor for nephropathy. Conclusion. High prevalence of incipient DN and early stages of DR were observed in this study. Longer diabetes duration and higher HbA1c were associated with the presence of diabetic retinopathy. High blood pressure was a risk factor for DN. So regular screening for these complications and optimization of glycemic control are needed

    Relationship between Cognitive Style (Impulsivity / Reflectivity) and Violence of the Tenth Grade Students in the Governorate of Ramallah and Al Bireh in Palestine

    Get PDF
    The study aimed to explore the relationship between cognitive style (impulsivity/reflectivity) and violence. It also aimed to know the significance of some variables, such as gender, place of residence, and type of school, in the cognitive style (impulsivity/reflectivity) and violence among students of tenth grade in the governorate of Ramallah and Al Bireh. The study sample, was randomly selected (N = 190, 86 males and 104 females). The Familiar Figure Test (Faramawi, 1986) and a specifically designed questionnaire to assess violence were used. The results indicated no relationship between impulsivity/reflectivity and violence. However, there were significant differences in cognitive method (impulsivity/reflectivity) due to gender and place of residence. While, there was no significant difference due to school type. There were differences in verbal violence, physical violence and violence toward property attributable to gender and in favour of males. Private schools were more physically violent than public schools.

    Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks

    No full text
    Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT networks need decentralized management for network security. Blockchain, with its decentralized model of authentication, can provide a solution for decentralized authentication in IoT networks. However, blockchain authentication models are known to be computationally demanding because they require complex mathematical calculations. In this paper, we present an Authentication-Chains protocol which is a lightweight decentralized protocol for IoT authentication based on blockchain distributed ledger. The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. The proposed protocol security performance is analyzed using cryptographic protocols verifier software and tested. Additionally, a test bed consisting of a Raspberry Pi network is presented to analyze the performance of the proposed protocol

    Evaluation of a quality improvement intervention to reduce anastomotic leak following right colectomy (EAGLE): pragmatic, batched stepped-wedge, cluster-randomized trial in 64 countries

    Get PDF
    Background Anastomotic leak affects 8 per cent of patients after right colectomy with a 10-fold increased risk of postoperative death. The EAGLE study aimed to develop and test whether an international, standardized quality improvement intervention could reduce anastomotic leaks. Methods The internationally intended protocol, iteratively co-developed by a multistage Delphi process, comprised an online educational module introducing risk stratification, an intraoperative checklist, and harmonized surgical techniques. Clusters (hospital teams) were randomized to one of three arms with varied sequences of intervention/data collection by a derived stepped-wedge batch design (at least 18 hospital teams per batch). Patients were blinded to the study allocation. Low- and middle-income country enrolment was encouraged. The primary outcome (assessed by intention to treat) was anastomotic leak rate, and subgroup analyses by module completion (at least 80 per cent of surgeons, high engagement; less than 50 per cent, low engagement) were preplanned. Results A total 355 hospital teams registered, with 332 from 64 countries (39.2 per cent low and middle income) included in the final analysis. The online modules were completed by half of the surgeons (2143 of 4411). The primary analysis included 3039 of the 3268 patients recruited (206 patients had no anastomosis and 23 were lost to follow-up), with anastomotic leaks arising before and after the intervention in 10.1 and 9.6 per cent respectively (adjusted OR 0.87, 95 per cent c.i. 0.59 to 1.30; P = 0.498). The proportion of surgeons completing the educational modules was an influence: the leak rate decreased from 12.2 per cent (61 of 500) before intervention to 5.1 per cent (24 of 473) after intervention in high-engagement centres (adjusted OR 0.36, 0.20 to 0.64; P < 0.001), but this was not observed in low-engagement hospitals (8.3 per cent (59 of 714) and 13.8 per cent (61 of 443) respectively; adjusted OR 2.09, 1.31 to 3.31). Conclusion Completion of globally available digital training by engaged teams can alter anastomotic leak rates. Registration number: NCT04270721 (http://www.clinicaltrials.gov)
    corecore