43 resultados para dental anomaly


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Pregnant women find themselves subject to comments and questions from people in public areas. Normally, becoming ‘public property’ is considered friendly and is relatively easy for pregnant women to deal with. However, following diagnosis of a fetal anomaly, the experience of being public property can exacerbate the emotional turmoil experienced by couples. Original research question: What is the experience of couples who continue pregnancy following the diagnosis of a fetal anomaly? Method: The study used an interpretive design informed by Merleau-Ponty and this paper reports on a subset of findings. Thirty-one interviews with pregnant women and their partners were undertaken following the diagnosis of a serious or lethal fetal anomaly. Women were between 25 and 38 weeks gestation at the time of their first interview. The non-directive interviews were audiotaped, transcribed verbatim and the transcripts were thematically analysed. Findings: A prominent theme that emerged during data analysis was that pregnancy is embodied therefore physically evident and ‘public’. Women found it difficult to deal with being public property when the fetus had a serious or lethal anomaly. Some women avoided social situations; others did not disclose the fetal condition but gave minimal or avoidant answers to minimise distress to themselves and others. The male participants were not visibly pregnant and they could continue life in public without being subject to the public’s gaze, but they were very aware and concerned about its impact on their partner. Conclusion: The public tend to assume that pregnancy is normal and will produce a healthy baby. This becomes problematic for women who have a fetus with an anomaly. Women use strategies to help them cope with becoming public property during pregnancy. Midwives can play an important role in reducing the negative consequences of a woman becoming public property following the diagnosis of a fetal anomaly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE: To explore the experience of couples who continued pregnancy following a diagnosis of serious or lethal fetal anomaly. STUDY DESIGN: Thirty-one male and female participants were recruited from a high-risk maternal–fetal medicine clinic in Washington State. Data were collected using in-depth interviews during pregnancy and after the birth of their baby. Transcribed interviews were thematically analyzed through the phenomenological lens of Merleau-Ponty. FINDINGS: Participants described how time became reconfigured and reconstituted as they tried to compress a lifetime of love for their future child into a limited period. Participants’ concepts of time became distorted and were related to their perceptual lived experience rather than the schedule-filled,regimented, linear clock time that governed the health professionals. CONCLUSION: Living in distorted time may be a mechanism parents use to cope with overwhelming and disorienting feelings when their unborn baby is diagnosed with a fetal anomaly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Online social networks can be modelled as graphs; in this paper, we analyze the use of graph metrics for identifying users with anomalous relationships to other users. A framework is proposed for analyzing the effectiveness of various graph theoretic properties such as the number of neighbouring nodes and edges, betweenness centrality, and community cohesiveness in detecting anomalous users. Experimental results on real-world data collected from online social networks show that the majority of users typically have friends who are friends themselves, whereas anomalous users’ graphs typically do not follow this common rule. Empirical analysis also shows that the relationship between average betweenness centrality and edges identifies anomalies more accurately than other approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article focuses on the relationship between private insurance status and dental service utilisation in Australia using data between 1995 and 2001. This article employs joint maximum likelihood to estimate models of time since last dental visit treating private ancillary health insurance (PAHI) as endogenous. The sensitivity of results to the choice between two different but related types of instrumental variables is examined. We find robust evidence in both 1995 and 2001 that individuals with a PAHI policy make significantly more frequent dental consultations relative to those without such coverage. A comparison of the 1995 and 2001 results, however, suggests that there has been an increasing role of PAHI in terms of the frequency of dental consultations over time. This seems intuitive given the trends in the price of unsubsidised private dental consultations. In terms of policy, our results suggest that while government measures to increase private health insurance coverage in Australia has been successful to a significant degree, it may have come at some cost in terms of socio-economic inequality as the privately insured are provided much better access to care and financial protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anomaly detection compensates shortcomings of signature-based detection such as protecting against Zero-Day exploits. However, Anomaly Detection can be resource-intensive and is plagued by a high false-positive rate. In this work, we address these problems by presenting a Cooperative Intrusion Detection approach for the AIS, the Artificial Immune System, as an example for an anomaly detection approach. In particular we show, how the cooperative approach reduces the false-positive rate of the detection and how the overall detection process can be organized to account for the resource constraints of the participating devices. Evaluations are carried out with the novel network simulation environment NeSSi as well as formally with an extension to the epidemic spread model SIR

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The purpose of this study was to identify retrospectively the predictors of implant survival when the flapless protocol was used in two private dental practices. Materials and Methods: The collected data were initially computer searched to identify the patients; later, a hand search of patient records was carried out to identify all flapless implants consecutively inserted over the last 10 years. The demographic information gathered on statistical predictors included age, sex, periodontal and peri-implantitis status, smoking, details of implants inserted, implant locations, placement time after extraction, use of simultaneous guided hard and soft tissue regeneration procedures, loading protocols, type of prosthesis, and treatment outcomes (implant survival and complications). Excluded were any implants that required flaps or simultaneous guided hard and soft tissue regeneration procedures, and implants narrower than 3.25 mm. Results: A total of 1,241 implants had been placed in 472 patients. Life table analysis indicated cumulative 5-year and 10-year implant survival rates of 97.9% and 96.5%, respectively. Most of the failed implants occurred in the posterior maxilla (54%) in type 4 bone (74.0%), and 55.0% of failed implants had been placed in smokers. Conclusion: Flapless dental implant surgery can yield an implant survival rate comparable to that reported in other studies using traditional flap techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Dental and medical students worldwide, including in Saudi Arabia, have been reported to have a high incidence of poor psychological health, such as depression, stress, anxiety, and lowlife satisfaction. Self-development coaching programs have become an increasingly popular way to improve individuals’ lives. However, few studies have evaluated the psychological effects of such programs among dental and medical students. Moreover, no studies have been conducted on self-development coaching programs in Saudi Arabia. Aims: The aim of this study was to assess the feasibility of a larger study via a pilot study and to acquire preliminary findings about the effectiveness of a self-development coaching program on psychological health among dental and medical students in Saudi Arabia. Methods: A pre-post interventional study design was used to test a self-development coaching program (How to be an Ultra-Super Student) with a sample of medical students (n=17) at Umm Al-Qura University at Saudi Arabia. The outcome measures were students’ psychological distress (depression, anxiety, and stress), life satisfaction, self-efficacy, the coach, and coaching program characteristics. Results: The study showed that there was a significant improvement in depression (p=0.04), self-efficacy (p=0.02), and satisfaction with life (p=0.04), which supported the feasibility of a large study in the future. Conclusions: The study’s findings encourage the implementation of a randomized, controlled trial study with a larger sample to further test the effectiveness of using self-development coaching programs with medical and dental students in Saudi Arabia to improve their psychological health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study was a measure forward in cultivating the scientific basis for an approach to examine clinical procedure in Flapless dental implant surgery. The thesis is based on: the systematic review, retrospective study of flapless implants, and in vivo study on the osseo-integration in osteoporotic rats. Dr Doan investigated "clinical procedures used in dental implant treatment in posterior maxilla using flapless technique". The work has yielded significant contributions to the area of implant flapless surgery and its effects on osteoporotic patients having implants in the posterior maxilla.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NSW Supreme Court decision - claim resulting from alleged damaging dental treatment of healthy teeth - failure of plaintiff to prove dishonest and fraudulent behaviour - assessment of damages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Regenerative endodontics aims to preserve, repair or regenerate the dental pulp tissue. Dental pulp stem cells, have a potential use in dental tissue generation. However, specific requirements to drive the dental tissue generation are still obscured. We established an in vivo model for studying the survival of dental pulp cells (DPC) and their potential to generate dental pulp tissue. DPC were mixed with collagen scaffold with or without slow release bone morphogenic protein 4 (BMP-4) and fibroblast growth factor 2 (FGF2). The cell suspension was transplanted into a vascularized tissue engineering chamber in the rat groin. Tissue constructs were harvested after 2, 4, 6, and 8 weeks and processed for histomorphological and immunohistochemical analysis. After 2 weeks newly formed tissue with new blood vessel formation were observed inside the chamber. DPC were found around dentin, particularly around the vascular pedicle and also close to the gelatin microspheres. Cell survival, was confirmed up to 8 weeks after transplantation. Dentin Sialophosphoprotein (DSPP) positive matrix production was detected in the chamber, indicating functionality of dental pulp progenitor cells. This study demonstrates the potential of our tissue engineering model to study rat dental pulp cells and their behavior in dental pulp regeneration, for future development of an alternative treatment using these techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tissue engineering is a multidisciplinary field with the potential to replace tissues lost as a result of trauma, cancer surgery, or organ dysfunction. The successful production, integration, and maintenance of any tissue-engineered product are a result of numerous molecular interactions inside and outside the cell. We consider the essential elements for successful tissue engineering to be a matrix scaffold, space, cells, and vasculature, each of which has a significant and distinct molecular underpinning (Fig. 1). Our approach capitalizes on these elements. Originally developed in the rat, our chamber model (Fig. 2) involves the placement of an arteriovenous loop (the vascular supply) in a polycarbonate chamber (protected space) with the addition of cells and an extracellular matrix such as Matrigel or endogenous fibrin (34, 153, 246, 247). This model has also been extended to the rabbit and pig (J. Dolderer, M. Findlay, W. Morrison, manuscript in preparation), and has been modified for the mouse to grow adipose tissue and islet cells (33, 114, 122) (Fig. 3)...