263 resultados para Dental impression techniques


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous studies have shown that the human lens contains glycerophospholipids with ether linkages. These lipids differ from conventional glycerophospholipids in that the sn-1 substituent is attached to the glycerol backbone via an 1-O-alkyl or an 1-O-alk-1'-enyl ether rather than an ester bond. The present investigation employed a combination of collision-induced dissociation (CID) and ozone-induced dissociation (OzID) to unambiguously distinguish such 1-O-alkyl and 1-O-alk-1'-enyl ethers. Using these methodologies the human lens was found to contain several abundant 1-O-alkyl glycerophos-phoethanolamines, including GPEtn(16:0e/9Z-18:1), GPEtn(11Z-18:1e/9Z-18:1), and GPEtn(18:0e/9Z-18:1), as well as a related series of unusual 1-O-alkyl glycerophosphoserines, including GPSer(16:0e/9Z-18:1), GPSer(11Z-18:1e/9Z-18:1), GPSer(18:0e/9Z-18:1) that to our knowledge have not previously been observed in human tissue. Isomeric 1-O-alk-1'-enyl ethers were absent or in low abundance. Examination of the double bond position within the phospholipids using OzID revealed that several positional isomers were present, including sites of unsaturation at the n-9, n-7, and even n-5 positions. Tandem CID/OzID experiments revealed a preference for double bonds in the n-7 position of 1-O-ether linked chains, while n-9 double bonds predominated in the ester-linked fatty acids [e.g., GPEtn(11Z-18:1e/9Z-18:1) and GPSer(11Z-18:1e/9Z-18:1)]. Different combinations of these double bond positional isomers within chains at the sn-1 and sn-2 positions point to a remarkable molecular diversity of ether-lipids within the human lens.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a new multi-class steganalysis for binary image. The proposed method can identify the type of steganographic technique used by examining on the given binary image. In addition, our proposed method is also capable of differentiating an image with hidden message from the one without hidden message. In order to do that, we will extract some features from the binary image. The feature extraction method used is a combination of the method extended from our previous work and some new methods proposed in this paper. Based on the extracted feature sets, we construct our multi-class steganalysis from the SVM classifier. We also present the empirical works to demonstrate that the proposed method can effectively identify five different types of steganography.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Designing systems for multiple stakeholders requires frequent collaboration with multiple stakeholders from the start. In many cases at least some stakeholders lack a professional habit of formal modeling. We report observations from student design teams as well as two case studies, respectively of a prototype for supporting creative communication to design objects, and of stakeholder-involvement in early design. In all observations and case studies we found that non-formal techniques supported strong collaboration resulting in deep understanding of early design ideas, of their value and of the feasibility of solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rolling Element Bearings (REBs) are vital components in rotating machineries for providing rotating motion. In slow speed rotating machines, bearings are normally subjected to heavy static loads and a catastrophic failure can cause enormous disruption to production and human safety. Due to its low operating speed the impact energy generated by the rotating elements on the defective components is not sufficient to produce a detectable vibration response. This is further aggravated by the inability of general measuring instruments to detect and process the weak signals at the initiation of the defect accurately. Furthermore, the weak signals are often corrupted by background noise. This is a serious problem faced by maintenance engineers today and the inability to detect an incipient failure of the machine can significantly increases the risk of functional failure and costly downtime. This paper presents the application of noise removal techniques for enhancing the detection capability for slow speed REB condition monitoring. Blind deconvolution (BD) and adaptive line enhancer (ALE) are compared to evaluate their performance in enhancing the source signal with consequential removal of background noise. In the experimental study, incipient defects were seeded on a number of roller bearings and the signals were acquired using acoustic emission (AE) sensor. Kurtosis and modified peak ratio (mPR) were used to determine the detectability of signal corrupted by noise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This qualitative study explores the methods that chefs use to create innovative marketable product and compares these findings to other design tools. This study is based on a series of interviews with locally recognised chefs in Minnesota and observations of them in their kitchens in order to understand the details of how they conceive and develop dishes from preliminary concept to final plating and user consumption. This paper focuses on idea generation and discusses two key findings: first, the variety of idea generation techniques presented by the chefs can be classified into the creativity tool SCAMPER (substitute, combine, adapt, modify/magnify, put to other use, eliminate, reverse/rearrange); second, chefs evoke the theory of MAYA or Most Advanced Yet Acceptable when innovating new dishes, which implies making novel changes while remaining relatable to the consumer. Other reoccurring topics in the interview discussion of food innovation include play, surprise, and humour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Regenerative endodontics is an innovative treatment concept aiming to regenerate pulp, dentin and root structures. In the diseased or necrotic tooth, the limitation in vascular supply renders successful tissue regeneration/generation in a whole tooth challenging. The aim of this study is to evaluate the ability of vascularized tissue to develop within a pulpless tooth using tissue engineering techniques. Materials and methods A pulpless tooth chamber, filled with collagen I gel containing isolated rat dental pulp cells (DPC) and angiogenic growth factors, was placed into a hole created in the femoral cortex or into its own tooth socket, respectively. The gross, histological and biochemical characteristics of the de novo tissue were evaluated at 4 and 8weeks post-transplantation. Results Tooth revascularization and tissue generation was observed only in the femur group, confirming the important role of vascular supply in tissue regeneration. The addition of cells and growth factors significantly promoted connective tissue production in the tooth chamber. Conclusion Successful revascularization and tissue regeneration in this model demonstrate the importance of a direct vascular supply and the advantages of a stem cell approach. © 2012 John Wiley & Sons A/S.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Designing systems for multiple stakeholders requires frequent collaboration with multiple stakeholders from the start. In many cases at least some stakeholders lack a professional habit of formal modeling. We report observations from two case studies of stakeholder-involvement in early design where non-formal techniques supported strong collaboration resulting in deep understanding of requirements and of the feasibility of solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bauxite refinery residues are derived from the Bayer process by the digestion of crushed bauxite in concentrated caustic at elevated temperatures. Chemically, it comprises, in varying amounts (depending upon the composition of the starting bauxite), oxides of iron and titanium, residual alumina, sodalite, silica, and minor quantities of other metal oxides. Bauxite residues are being neutralised by seawater in recent years to reduce the alkalinity in bauxite residue, through the precipitation of hydrotalcite-like compounds and some other Mg, Ca, and Al hydroxide and carbonate minerals. A combination of X-ray diffraction (XRD) and vibrational spectroscopy techniques, including mid-infrared (IR), Raman, near-infrared (NIR), and UV-Visible, have been used to characterise bauxite residue and seawater neutralised bauxite residue. Both the ferrous (Fe2+) and ferric (Fe3+) ions within bauxite residue can be identified by their characteristic NIR bands, where ferrous ions produce a strong absorption band at around 9000 cm-1, while ferric ions produce two strong bands at 25000 and 14300 cm-1. The presence of adsorbed carbonate and hydroxide anions can be identified at around 5200 and 7000 cm-1, respectively, attributed to the 2nd overtone of the 1st fundamental overtones observed in the mid-IR spectra. The complex bands in the Raman and mid-IR spectra around 3500 cm-1 are assigned to the OH stretching vibrations of the various oxides present in bauxite residue, and water. The combination of carbonate and hydroxyl units and their fundamental overtones give rise to many of the features of the NIR spectra.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tissue engineering is a multidisciplinary field with the potential to replace tissues lost as a result of trauma, cancer surgery, or organ dysfunction. The successful production, integration, and maintenance of any tissue-engineered product are a result of numerous molecular interactions inside and outside the cell. We consider the essential elements for successful tissue engineering to be a matrix scaffold, space, cells, and vasculature, each of which has a significant and distinct molecular underpinning (Fig. 1). Our approach capitalizes on these elements. Originally developed in the rat, our chamber model (Fig. 2) involves the placement of an arteriovenous loop (the vascular supply) in a polycarbonate chamber (protected space) with the addition of cells and an extracellular matrix such as Matrigel or endogenous fibrin (34, 153, 246, 247). This model has also been extended to the rabbit and pig (J. Dolderer, M. Findlay, W. Morrison, manuscript in preparation), and has been modified for the mouse to grow adipose tissue and islet cells (33, 114, 122) (Fig. 3)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recurrence relations in mathematics form a very powerful and compact way of looking at a wide range of relationships. Traditionally, the concept of recurrence has often been a difficult one for the secondary teacher to convey to students. Closely related to the powerful proof technique of mathematical induction, recurrences are able to capture many relationships in formulas much simpler than so-called direct or closed formulas. In computer science, recursive coding often has a similar compactness property, and, perhaps not surprisingly, suffers from similar problems in the classroom as recurrences: the students often find both the basic concepts and practicalities elusive. Using models designed to illuminate the relevant principles for the students, we offer a range of examples which use the modern spreadsheet environment to powerfully illustrate the great expressive and computational power of recurrences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With nine examples, we seek to illustrate the utility of the Renormalization Group approach as a unification of other asymptotic and perturbation methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this chapter is to provide an overview of traffic data collection that can and should be used for the calibration and validation of traffic simulation models. There are big differences in availability of data from different sources. Some types of data such as loop detector data are widely available and used. Some can be measured with additional effort, for example, travel time data from GPS probe vehicles. Some types such as trajectory data are available only in rare situations such as research projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the renewable energy sources whose outputs vary continuously, a Z-source current-type inverter has been proposed as a possible buck-boost alternative for grid-interfacing. With a unique X-shaped LC network connected between its dc power source and inverter topology, Z-source current-type inverter is however expected to suffer from compounded resonant complications in addition to those associated with its second-order output filter. To improve its damping performance, this paper proposes the careful integration of Posicast or three-step compensators before the inverter pulse-width modulator for damping triggered resonant oscillations. In total, two compensators are needed for wave-shaping the inverter boost factor and modulation ratio, and they can conveniently be implemented using first-in first-out stacks and embedded timers of modern digital signal processors widely used in motion control applications. Both techniques are found to damp resonance of ac filter well, but for cases of transiting from current-buck to boost state, three-step technique is less effective due to the sudden intermediate discharging interval introduced by its non-monotonic stepping (unlike the monotonic stepping of Posicast damping). These findings have been confirmed both in simulations and experiments using an implemented laboratory prototype.