22 resultados para secure routing protocols
Resumo:
Introduction: The objectives of this investigation were to compare the initial cephalometric characteristics of complete Class II Division 1 malocclusions treated with 2 or 4 premolar extractions and to verify their influence on the occlusal success rate of these treatment protocols. Methods: A sample of 98 records from patients with complete Class II Division 1 malocclusion was divided into 2 groups with the following characteristics: group 1 consisted of 55 patients treated with 2 maxillary first premolar extractions at an initial mean age of 13.07 years; group 2 included 43 patients treated with 4 premolar extractions, with an initial mean age of 12.92 years. Initial and final occlusal statuses were evaluated on dental casts with Grainger`s treatment priority index (TPI), and the initial cephalometric characteristics were obtained from the pretreatment cephalograms. The initial cephalometric characteristics and the initial and final occlusal statuses of the groups were compared with the t test. A multiple regression analysis was used to evaluate the influence of all variables in the final TPI. Results: The 2-premolar extraction protocol provided a statistically smaller TPI and consequently a better occlusal success rate than the 4-premolar extraction protocol. The 4-premolar extraction group had statistically smaller apical base lengths, more vertical facial growth patterns, and greater hard- and soft-tissue convexities at pretreatment than the 2-premolar extraction group. However, the multiple regression analysis showed that only the extraction protocol was significantly associated with the final occlusal status. Conclusions: The initial cephalometric characteristics of the groups did not influence the occlusal success rate of these 2 treatment protocols.
Resumo:
Introduction: The purpose of this study was to compare the occlusal outcomes and the efficiency of 1-phase and 2-phase treatment protocols in Class II Division 1 malocclusions. Treatment efficiency was defined as a change in the occlusal characteristics in a shorter treatment time. Methods: Class II Division 1 subjects ( n = 139) were divided into 2 groups according to the treatment protocol for Class II correction. Group 1 comprised 78 patients treated with a 1-phase treatment protocol at initial and final mean ages of 12.51 and 14.68 years. Group 2 comprised 61 patients treated with a 2-phase treatment protocol at initial and final mean ages of 11.21 and 14.70 years. Lateral cephalometric radiographs were taken at the pretreatment stage to evaluate morphological differences in the groups. The initial and final study models of the patients were evaluated by using the peer assessment rating index. Chi-square tests were used to test for differences between the 2 groups for categorical variables. Variables regarding occlusal results were compared by using independent t tests. A linear regression analysis was completed, with total treatment time as the dependent variable, to identify clinical factors that predict treatment length for patients with Class II malocclusions. Results: Similar occlusal outcomes were obtained between the 1-phase and the 2-phase treatment protocols, but the duration of treatment was significantly shorter in the 1-phase treatment protocol group. Conclusions: Treatment of Class II Division 1 malocclusions is more efficient with the 1-phase than the 2-phase treatment protocol.
Resumo:
To evaluate several protocols for the application of ultrasound during removal of cast posts with varying core configurations cemented with zinc phosphate. Sixty maxillary canines were distributed into three groups (n = 20): group 1 - core with 5 mm diameter/height and post diameter of 1.3 mm; groups 2 and 3 - core with the same diameter as the post (1.3 mm) and heights of 5 mm and 3 mm, respectively. Posts/cores were cemented using a standard technique with zinc phosphate cement. Each group was divided into two subgroups according to the ultrasonic vibration mode: point vibration - ultrasonic vibration applied to the core surface for 5 s, on each face totalling 25 s; alternate vibration - intermittent application of ultrasonic vibration for 10 s to the labial and lingual surfaces, 10 s to the mesial and distal surfaces and 5 s to the incisal surface, totalling 25 s. The specimens were submitted to the tensile test using an Instron machine (1 mm min(-1)) and results were analysed by anova and t-test. The failure type was also analysed. Statistical analysis showed significant differences between groups relating to the core preparations (P < 0.05). The lowest mean values of traction force were obtained for group 3 (46.1 +/- 7.7 N), followed by group 2 (89.0 +/- 2.7 N) and group 1 (160.4 +/- 7.5 N). Regarding ultrasonic vibration, the lowest mean was observed with alternate vibration (81.1 +/- 10.1 N), which was significantly lower than the point vibration (115.9 +/- 9.5 N) (P < 0.05). Cohesive failure occurred in all cases. A reduction in core diameter/height and intermittent ultrasonic application improved the removal of cast posts cemented with zinc phosphate.
Resumo:
Purpose: The aim of this study was to evaluate the influence of artificial accelerated aging on dimensional stability of two types of acrylic resins (thermally and chemically activated) submitted to different protocols of storage. Materials and Methods: One hundred specimens were made using a Teflon matrix (1.5cmx0.5mm) with four imprint marks, following the lost-wax casting method. The specimens were divided into ten groups, according to the type of acrylic resin, aging procedure, and storage protocol (30 days). GI: acrylic resins thermally activated, aging, storage in artificial saliva for 16 hours, distilled water for 8 hours; GII: thermal, aging, artificial saliva for 16 hours, dry for 8 hours; GIII: thermal, no aging, artificial saliva for 16 hours, distilled water for 8 hours, GIV: thermal, no aging, artificial saliva for 16 hours, dry for 8 hours; GV: acrylic resins chemically activated, aging, artificial saliva for 16 hours, distilled water for 8 hours; GVI: chemical, aging, artificial saliva for 16 hours, dry for 8 hours; GVII: chemical, no aging, artificial saliva for 16 hours, distilled water for 8 hours; GVIII: chemical, no aging, artificial saliva for 16 hours, dry for 8 hours GIX: thermal, dry for 24 hours; and GX: chemical, dry for 24 hours. All specimens were photographed before and after treatment, and the images were evaluated by software (UTHSCSA-Image Tool) that made distance measurements between the marks in the specimens (mm), calculating the dimensional stability. Data were submitted to statistical analysis (two-way ANOVA, Tukey test, p = 0.05). Results: Statistical analysis showed that the specimens submitted to storage in water presented the largest distance between both axes (major and minor), statistically different (p < 0.05) from control groups. Conclusions: All acrylic resins presented dimensional changes, and the artificial accelerated aging and storage period influenced these alterations.
Resumo:
Subtle quantum properties offer exciting new prospects in optical communications. For example, quantum entanglement enables the secure exchange of cryptographic keys(1) and the distribution of quantum information by teleportation(2,3). Entangled bright beams of light are increasingly appealing for such tasks, because they enable the use of well-established classical communications techniques(4). However, quantum resources are fragile and are subject to decoherence by interaction with the environment. The unavoidable losses in the communication channel can lead to a complete destruction of entanglement(5-8), limiting the application of these states to quantum-communication protocols. We investigate the conditions under which this phenomenon takes place for the simplest case of two light beams, and analyse characteristics of states which are robust against losses. Our study sheds new light on the intriguing properties of quantum entanglement and how they may be harnessed for future applications.
Resumo:
The aim of this study was to investigate the mechanisms whereby low-intensity laser therapy may affect the severity of oral mucositis. A hamster cheek pouch model of oral mucositis was used with all animals receiving intraperitoneal 5-fluorouracil followed by surface irritation. Animals were randomly allocated into three groups and treated with a 35 mW laser, 100 mW laser, or no laser. Clinical severity of mucositis was assessed at four time-points by a blinded examiner. Buccal pouch tissue was harvested from a subgroup of animals in each group at four time-points. This tissue was used for immunohistochemistry for cyclooxygenase-2 (COX-2), vascular endothelial growth factor (VEGF), and factor VIII (marker of microvessel density) and the resulting staining was quantified. Peak severity of mucositis was reduced in the 35 mW laser group as compared to the 100 mW laser and control groups. This reduced peak clinical severity of mucositis in the 35 mW laser group was accompanied by a significantly lower level of COX-2 staining. The 100 mW laser did not have an effect on the severity of clinical mucositis, but was associated with a decrease in VEGF levels at the later time-points, as compared to the other groups. There was no clear relationship of VEGF levels or microvessel density to clinical mucositis severity. The tissue response to laser therapy appears to vary by dose. Low-intensity laser therapy appears to reduce the severity of mucositis, at least in part, by reducing COX-2 levels and associated inhibition of the inflammatory response.
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.