4 resultados para aesthetic security

em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the biodimensional anatomical expander-implant system (BEIS) is a reliable technique, little information has been available regarding outcome following nipple-areola sparing mastectomy (NSM). To perform the resection of glandular tissue, while improving the surgical access and maintaining the nipple-areola vascularization we have developed a new approach for NSM based on the double concentric periareolar incision (DCPI). The purpose of this study is to analyze the feasibility, surgical planning and its outcome following NSM. 18 patients underwent NSM reconstructions. Mean time of follow-up was 29 months. The technique was indicated in patients with small/moderate volume breasts. Flap complications were evaluated and information on aesthetic results and patient satisfaction were collected. 83.3% had tumors measuring 2 cm or less (T1) and 72.1% were stage 0 and 1. All patients presented peripherally tumors located (at least 5 cm from the nipple). Skin complications occurred in 11.1%. One patient (5.5%) presented small skin necrosis and a wound dehiscence was observed in one patient (5.5%). The aesthetic result was good/very good in 94.4 percent and the majority of patients were very satisfied/satisfied. No local recurrences were observed. All complications except one were treated by a conservative approach. DCPI-BEIS is a simple and reliable technique for NSM reconstruction. The success depends on patient selection, coordinated planning with the oncologic surgeon and careful intra-operative and post-operative management. (C) 2009 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived from the abstract policies (defined by the modeller), we must be sure that the derived policies uphold the high-level ones. This paper builds upon previous work on Model-based Management, particularly on the Diagram of Abstract Subsystems approach, and goes further to propose a formal validation approach for the policy hierarchies yielded by the automated policy refinement process. We establish general validation conditions for a multi-layered policy model, i.e. necessary and sufficient conditions that a policy hierarchy must satisfy so that the lower-level policy sets are valid refinements of the higher-level policies according to the criteria of consistency and completeness. Relying upon the validation conditions and upon axioms about the model representativeness, two theorems are proved to ensure compliance between the resulting system behaviour and the abstract policies that are modelled.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of the present study was to evaluate the effects of low-dose therapeutic ionizing radiation on different aesthetic dental materials. Forty five specimens (n = 45) of three different aesthetic restorative materials were prepared and randomly divided into five groups: G1 (control group); G2, G3, G4, G5 experimental groups irradiated respectively with 0.25, 0.50, 0.75, and 1.00 Gy of gamma radiation by the (60)Co teletherapy machine. Chemical analyses were performed using a FT-IR Nicolet 520 spectrophotometer with reflectance diffuse technique. Even a minimal exposition at ionizing radiation in therapeutic doses can provide chemical changes on light-cured composite resins. The three studied restorative materials showed changes after exposure at gamma radiation, however the increase of the radiation dose did not contribute to an increase in this effect.