936 resultados para Cryptographic Protocols, Provable Security, ID-Based Cryptography
Resumo:
The presence of residual endodontic sealer in the pulp chamber may cause discoloration of the dental crown and interfere with the adhesion of restorative materials. The aim of this study was to compare the efficacy of different solvents in removing residues of an epoxy resin-based sealer (AH Plus) from the dentin walls of the pulp chamber, by scanning electron microscopy (SEM). Forty-four bovine incisor dental crown fragments were treated with 17% EDTA and 2.5% NaOCl. Specimens received a coating of AH Plus and were left undisturbed for 5 min. Then, specimens were divided in four groups (n = 10) and cleaned with one of the following solutions: isopropyl alcohol, 95% ethanol, acetone solution, or amyl acetate solution. Negative controls (n = 2) did not receive AH Plus, while in positive controls (n = 2) the sealer was not removed. AH Plus removal was evaluated by SEM, and a score system was applied. Data were analyzed by Kruskal-Wallis and Dunn tests. None of the solutions tested was able to completely remove AH Plus from the dentin of the pulp chamber. Amyl acetate performed better than 95% ethanol and isopropyl alcohol (p < 0.05), but not better than acetone (p > 0.05) in removing the sealer from dentin. No significant differences were observed between acetone, 95% ethanol, and isopropyl alcohol (p > 0.05). It was concluded that amyl acetate and acetone may be good options for cleaning the pulp chamber after obturation with AH Plus. SCANNING 35:17-21, 2013. © 2012 Wiley Periodicals, Inc. © Wiley Periodicals, Inc.
Resumo:
The aim of the present study was to evaluate the efficacy of QMiX, SmearClear, and 17% EDTA for the debris and smear layer removal from the root canal and its effects on the push-out bond strength of an epoxy-based sealer by scanning electron microscopy (SEM). Forty extracted human canines (n=10) were assigned to the following final rinse protocols: G1-distilled water (control), G2-17% EDTA, G3-SmearClear, and G4-QMiX. The specimens were submitted to a SEM analysis to evaluate the presence of debris and smear layer, respectively, in the apical or cervical segments. In sequence, forty extracted human maxillary canines with the root canals instrumented were divided into four groups (n=10) similar to the SEM analysis study. After the filling with AH Plus, the roots were transversally sectioned to obtain dentinal slices. The specimens were submitted to a push-out bond strength test using an electromechanical testing machine. The statistical analysis for the SEM and push-out bond strength studies were performed using the Kruskal-Wallis and Dunn tests (α=5%). There was no difference among the G2, G3, and G4 efficacy in removing the debris and smear layer (P>0.05). The efficacy of these groups was superior to the control group. The push-out bond strength values of G2, G3, and G4 were superior to the control group. The ability to remove the debris and smear layer by SmearClear and QMiX was as effective as the 17% EDTA. The final rinse with these solutions promoted similar push-out bond strength values. © 2013 Wiley Periodicals, Inc.
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
To evaluate the transdentinal cytotoxicity of resin-based luting cements (RBLCs), with no HEMA in their composition, to odontoblast-like cells. Human dentine discs 0.3 mm thick were adapted to artificial pulp chambers (APCs) and placed in wells of 24-well plates containing 1 mL of culture medium (DMEM). Two categories of HEMA-free RBLCs were evaluated: group 1, self-adhesive Rely X Unicem (RU; 3M ESPE), applied directly to the dentine substrate; and group 2, Rely X ARC (RARC; 3M ESPE), applied to dentine previously acid-etched and treated with a bonding agent. In group 3 (control), considered as representing 100% cell metabolic activity, no treatment was performed on dentine. The APC/disc sets were incubated for 24 h or 7 days at 37 °C and 5% CO2 . Then, the extracts (DMEM + dental materials components that diffused through dentine) were applied to cultured odontoblast-like MDPC-23 cells for 24 h. After that, the cell viability (MTT assay), cell morphology (SEM), total protein production (TP) and alkaline phosphatase (ALP) activity were assessed. Data from MTT assay and TP production were analysed by Kruskal-Wallis and Mann-Whitney tests (α = 5%). Data from ALP activity were analysed by one-way anova and Tukey's test (α = 5%). In group 1, a slight reduction in cell viability (11.6% and 16.8% for 24-h and 7-day periods, respectively) and ALP activity (13.5% and 17.9% for 24-h and 7-day periods, respectively) was observed, with no significant difference from group 3 (control) (P > 0.05). In group 2, a significant reduction in cell viability, TP production and ALP activity compared with group 3 (control) occurred (P < 0.05), regardless of incubation time. Alteration in MDPC-23 cell morphology was observed only in group 2. HEMA-free Rely X ARC cement caused greater toxicity to odontoblast-like MDPC-23 cells than did Rely X Unicem cement when both resin-based luting materials were applied to dentine as recommended by the manufacturer.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for set- UP).
Resumo:
The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against some attacks, the absence of formal security proofs in a strong security model still brings uncertainty on its robustness. In this paper, aiming to give a better understanding of the security level provided by different authentication algorithms based on this design strategy, we formally analyze two ALRED variants-the MARVIN message authentication code and the LETTERSOUP authenticated-encryption scheme,-bounding their security as a function of the attacker's resources and of the underlying cipher's characteristics.
Resumo:
The aim of the present study was to evaluate the efficacy of QMiX, SmearClear, and 17% EDTA for the debris and smear layer removal from the root canal and its effects on the push-out bond strength of an epoxy-based sealer by scanning electron microscopy (SEM). Forty extracted human canines (n = 10) were assigned to the following final rinse protocols: G1-distilled water (control), G2–17% EDTA, G3-SmearClear, and G4-QMiX. The specimens were submitted to a SEM analysis to evaluate the presence of debris and smear layer, respectively, in the apical or cervical segments. In sequence, forty extracted human maxillary canines with the root canals instrumented were divided into four groups (n = 10) similar to the SEM analysis study. After the filling with AH Plus, the roots were transversally sectioned to obtain dentinal slices. The specimens were submitted to a push-out bond strength test using an electromechanical testing machine. The statistical analysis for the SEM and push-out bond strength studies were performed using the Kruskal–Wallis and Dunn tests (α = 5%). There was no difference among the G2, G3, and G4 efficacy in removing the debris and smear layer (P > 0.05). The efficacy of these groups was superior to the control group. The push-out bond strength values of G2, G3, and G4 were superior to the control group. The ability to remove the debris and smear layer by SmearClear and QMiX was as effective as the 17% EDTA. The final rinse with these solutions promoted similar push-out bond strength values.
Resumo:
The aim of the present study was to evaluate the effects of the PGF2˛treatment givenat the onset of a synchronization of ovulation protocol using a norgestomet (NORG) earimplant on ovarian follicular dynamics (Experiment 1) and pregnancy per AI (P/AI; Exper-iment 2) in cyclic (CL present) Bos indicus heifers. In Experiment 1, a total of 46 heiferswere presynchronized using two consecutive doses of PGF2˛12 days apart. At first dayof the synchronization protocol the heifers received implants containing 3 mg of NORGand 2 mg of estradiol benzoate (EB). At the same time, heifers were randomly assignedto receive 150 mg of d-cloprostenol (n = 23; PGF2˛) or no additional treatment (n = 23;Control). When the ear implants were removed 8 days later, all heifers received a PGF2˛treatment and 1 mg of EB was given 24 h later. The follicular diameter and interval toovulation were determined by transrectal ultrasonography. No effects of PGF2˛treat-ment on the diameter of the largest follicle present were observed at implant removal(PGF2˛= 9.8 ± 0.4 vs. Control = 10.0 ± 0.3 mm; P = 0.73) or after 24 h (PGF2˛= 11.1 ± 0.4 vs.Control = 11.0 ± 0.4 mm; P = 0.83). No differences in the time of ovulation after ear implantremoval (PGF2˛= 70.8 ± 1.2 vs. Control = 73.3 ± 0.9 h; P = 0.10) or in the ovulation rate(PGF2˛= 87.0 vs. Control = 82.6%; P = 0.64) between treatments were observed. In Experi-ment 2, 280 cyclic heifers were synchronized using the same experimental design describedabove (PGF2˛; n = 143 and Control; n = 137), at random day of the estrous cycle. All heifersreceived 300 IU of equine chorionic gonadotropin (eCG) and 0.5 mg of estradiol cypionate(as ovulatory stimulus) when the NORG ear implants were removed. Timed artificial insem-ination (TAI) was performed 48 h after implant removal and the pregnancy diagnosis wasconducted 30 days later. No effects on the P/AI due to PGF2˛treatment were observed(PGF2˛= 51.7 vs. Control = 57.7%; P = 0.29). In conclusion, PGF2˛treatment at the onset ofNORG-based protocols for the synchronization of ovulation did not alter the ovarian follic-ular responses or the P/AI in cyclic Bos indicus beef heifers synchronized for TAI.
Resumo:
Interaction protocols establish how different computational entities can interact with each other. The interaction can be finalized to the exchange of data, as in 'communication protocols', or can be oriented to achieve some result, as in 'application protocols'. Moreover, with the increasing complexity of modern distributed systems, protocols are used also to control such a complexity, and to ensure that the system as a whole evolves with certain features. However, the extensive use of protocols has raised some issues, from the language for specifying them to the several verification aspects. Computational Logic provides models, languages and tools that can be effectively adopted to address such issues: its declarative nature can be exploited for a protocol specification language, while its operational counterpart can be used to reason upon such specifications. In this thesis we propose a proof-theoretic framework, called SCIFF, together with its extensions. SCIFF is based on Abductive Logic Programming, and provides a formal specification language with a clear declarative semantics (based on abduction). The operational counterpart is given by a proof procedure, that allows to reason upon the specifications and to test the conformance of given interactions w.r.t. a defined protocol. Moreover, by suitably adapting the SCIFF Framework, we propose solutions for addressing (1) the protocol properties verification (g-SCIFF Framework), and (2) the a-priori conformance verification of peers w.r.t. the given protocol (AlLoWS Framework). We introduce also an agent based architecture, the SCIFF Agent Platform, where the same protocol specification can be used to program and to ease the implementation task of the interacting peers.
Resumo:
The aim of this thesis was to describe the development of motion analysis protocols for applications on upper and lower limb extremities, by using inertial sensors-based systems. Inertial sensors-based systems are relatively recent. Knowledge and development of methods and algorithms for the use of such systems for clinical purposes is therefore limited if compared with stereophotogrammetry. However, their advantages in terms of low cost, portability, small size, are a valid reason to follow this direction. When developing motion analysis protocols based on inertial sensors, attention must be given to several aspects, like the accuracy of inertial sensors-based systems and their reliability. The need to develop specific algorithms/methods and software for using these systems for specific applications, is as much important as the development of motion analysis protocols based on them. For this reason, the goal of the 3-years research project described in this thesis was achieved first of all trying to correctly design the protocols based on inertial sensors, in terms of exploring and developing which features were suitable for the specific application of the protocols. The use of optoelectronic systems was necessary because they provided a gold standard and accurate measurement, which was used as a reference for the validation of the protocols based on inertial sensors. The protocols described in this thesis can be particularly helpful for rehabilitation centers in which the high cost of instrumentation or the limited working areas do not allow the use of stereophotogrammetry. Moreover, many applications requiring upper and lower limb motion analysis to be performed outside the laboratories will benefit from these protocols, for example performing gait analysis along the corridors. Out of the buildings, the condition of steady-state walking or the behavior of the prosthetic devices when encountering slopes or obstacles during walking can also be assessed. The application of inertial sensors on lower limb amputees presents conditions which are challenging for magnetometer-based systems, due to ferromagnetic material commonly adopted for the construction of idraulic components or motors. INAIL Prostheses Centre stimulated and, together with Xsens Technologies B.V. supported the development of additional methods for improving the accuracy of MTx in measuring the 3D kinematics for lower limb prostheses, with the results provided in this thesis. In the author’s opinion, this thesis and the motion analysis protocols based on inertial sensors here described, are a demonstration of how a strict collaboration between the industry, the clinical centers, the research laboratories, can improve the knowledge, exchange know-how, with the common goal to develop new application-oriented systems.
Resumo:
OBJECTIVES To investigate the frequency of interim analyses, stopping rules, and data safety and monitoring boards (DSMBs) in protocols of randomized controlled trials (RCTs); to examine these features across different reasons for trial discontinuation; and to identify discrepancies in reporting between protocols and publications. STUDY DESIGN AND SETTING We used data from a cohort of RCT protocols approved between 2000 and 2003 by six research ethics committees in Switzerland, Germany, and Canada. RESULTS Of 894 RCT protocols, 289 prespecified interim analyses (32.3%), 153 stopping rules (17.1%), and 257 DSMBs (28.7%). Overall, 249 of 894 RCTs (27.9%) were prematurely discontinued; mostly due to reasons such as poor recruitment, administrative reasons, or unexpected harm. Forty-six of 249 RCTs (18.4%) were discontinued due to early benefit or futility; of those, 37 (80.4%) were stopped outside a formal interim analysis or stopping rule. Of 515 published RCTs, there were discrepancies between protocols and publications for interim analyses (21.1%), stopping rules (14.4%), and DSMBs (19.6%). CONCLUSION Two-thirds of RCT protocols did not consider interim analyses, stopping rules, or DSMBs. Most RCTs discontinued for early benefit or futility were stopped without a prespecified mechanism. When assessing trial manuscripts, journals should require access to the protocol.