970 resultados para Tooth intrusion
Resumo:
Dioxins are organic toxicants that are known to impair tooth development, especially dental hard tissue formation. The most toxic dioxin congener is 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD). Further, clinical studies suggest that maternal smoking during pregnancy can affect child s tooth development. One of the main components of tobacco smoke is the group of non-halogenated polycyclic aromatic hydrocarbons (PAHs), a representative of which is 7,12-dimethylbenz[a]anthracene (DMBA). Tributyltin (TBT), an organic tin compound, has been shown to impair bone mineralization in experimental animals. In addition to exposure to organic toxicants, a well-established cause for enamel hypomineralization is excess fluoride intake. The principal aim of this thesis project was to examine in vitro if, in addition to dioxins, other organic environmental toxicants, like PAHs and organic tin compounds, have adverse effects on tooth development, specifically on formation and mineralization of the major dental hard tissues, the dentin and the enamel. The second aim was to investigate in vitro if fluoride could intensify the manifestation of the detrimental developmental dental effects elicited by TCDD. The study was conducted by culturing mandibular first and second molar tooth germs of E18 NMRI mouse embryos in a Trowell-type organ culture and exposing them to DMBA, TBT, and sodium fluoride (NaF) and/or TCDD at various concentrations during the secretory and mineralization stages of development. Specific methods used were HE-staining for studying cell and tissue morphology, BrdU-staining for cell proliferation, TUNEL-staining for apoptosis, and QPCR, in situ hybridization and immunohistochemistry for the expressions of selected genes associated with mineralization. This thesis work showed that DMBA, TBT, TCDD and NaF interfere with dentin and enamel formation of embryonic mouse tooth in vitro, and that fluoride can potentiate the harmful effect of TCDD. The results suggested that adverse effects of TBT involve altered expression of genes associated with mineralization, and that DMBA and TBT as well as NaF and TCDD together primarily affect dentin mineralization. Since amelogenesis does not start until mineralization of dentin begins, impaired enamel matrix secretion could be a secondary effect. Dioxins, PAHs and organotins are all liposoluble and can be transferred to the infant by breast-feeding. Since doses are usually very low, developmental toxicity on most of the organs is difficult to indentify clinically. However, tooth may act as an indicator of exposure, since the major dental hard tissues, the dentin and the enamel, are not replaced once they have been formed. Thus, disturbed dental hard tissue formation raises the question of more extensive developmental toxicity.
Resumo:
We present a low-complexity algorithm for intrusion detection in the presence of clutter arising from wind-blown vegetation, using Passive Infra-Red (PIR) sensors in a Wireless Sensor Network (WSN). The algorithm is based on a combination of Haar Transform (HT) and Support-Vector-Machine (SVM) based training and was field tested in a network setting comprising of 15-20 sensing nodes. Also contained in this paper is a closed-form expression for the signal generated by an intruder moving at a constant velocity. It is shown how this expression can be exploited to determine the direction of motion information and the velocity of the intruder from the signals of three well-positioned sensors.
Resumo:
The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space view-point is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces f(s) and f(g) and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating f(s) and f(g) is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication-complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. Extensions to the multi-party case is straightforward and is briefly discussed. The average case CC of the relevant greaterthan (CT) function is characterized within two bits. Under the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm. 2010 Elsevier B.V. All rights reserved.
Resumo:
We consider the problem of quickest detection of an intrusion using a sensor network, keeping only a minimal number of sensors active. By using a minimal number of sensor devices,we ensure that the energy expenditure for sensing, computation and communication is minimized (and the lifetime of the network is maximized). We model the intrusion detection (or change detection) problem as a Markov decision process (MDP). Based on the theory of MDP, we develop the following closed loop sleep/wake scheduling algorithms: 1) optimal control of Mk+1, the number of sensors in the wake state in time slot k + 1, 2) optimal control of qk+1, the probability of a sensor in the wake state in time slot k + 1, and an open loop sleep/wake scheduling algorithm which 3) computes q, the optimal probability of a sensor in the wake state (which does not vary with time),based on the sensor observations obtained until time slot k.Our results show that an optimum closed loop control onMk+1 significantly decreases the cost compared to keeping any number of sensors active all the time. Also, among the three algorithms described, we observe that the total cost is minimum for the optimum control on Mk+1 and is maximum for the optimum open loop control on q.
Resumo:
Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for a wider class of intrusions. The paper presented here introduces the mathematical basis for sensor fusion and provides enough support for the acceptability of sensor fusion in performance enhancement of intrusion detection systems. The sensor fusion system is characterized and modeled with no knowledge of the intrusion detection systems and the intrusion detection data. The theoretical analysis is supported with an experimental illustration with three of the available intrusion detection systems using the DARPA 1999 evaluation data set.
Resumo:
Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.
Resumo:
Saltwater intrusion into coastal aquifers is a global issue, exacerbated by increasing demands for freshwater in coastal regions. This study investigates into the parametric analysis on saltwater intrusion in a conceptual, coastal, unconfined aquifer considering wide range of freshwater draft and anticipated sea level rise. The saltwater intrusion under various circumstances is simulated through parametric studies using MODFLOW, MT3DMS and SEAWAT. The MODFLOW is used to simulate the groundwater flow system under changing hydro-dynamics in coastal aquifer. To simulate solute transport MT3DMS and SEAWAT is used. The saltwater intrusion process has direct bearing on hydraulic conductivity and inversely related to porosity. It may also be noted that increase in recharge rate considered in the study does not have much influence on saltwater intrusion. Effect of freshwater draft at locations beyond half of the width of the aquifer considered has marginal effect and hence can be considered as safe zone for freshwater withdrawals. Due to the climate change effect, the anticipated rise in sea level of 0.88 m over a century is considered in the investigation. This causes increase in salinity intrusion by about 25%. The combined effect of sea level rise and freshwater draft (C) 2015 The Authors. Published by Elsevier B.V.
Resumo:
The anisotropy and gradient of the elastic modulus and the hardness of teeth were investigated by means of instrumented indentation method. Such properties are attributed to the unique microstructures of teeth based on scanning electron microscopic analysis. By comparing the relationship between the ratio of hardness to the reduced elastic modulus and the ratio of elastic unloading work to the total work of teeth in course of indentation to those of other materials, we found that the material behaviors of teeth display metal-like characteristics rather than ceramics as considered traditionally. These material behaviors and relevant functions are discussed briefly.
Resumo:
The evolution of the upward migration of the magma is a nonlinear and unstable problem in mathematics. It is difficult to solve it. And using the numerical method, the solution is relatively tedious and time-consuming. This paper introduces a method of the instantaneous point source to solve the linear and unstable heat conduction equation during the infinite period of time instead of the solution of the nonlinear and unstable heat conduction equation. The results obtained by this method coincide with those by the numerical method, meaning that this method offers a simple way to solve the nonlinear and unstable heat conduction equation.
Resumo:
Upward leakage of saline water from an artesian aquifer below 1,500 feet has caused an increase in chloride concentration in the lower Hawthorn aquifer from less than 1,000 mg/1 (milligrams per liter) to values ranging from about 1,300 to 15,000 mg/1. Similarly the higher temperatures of the intruding water has caused an increase in water temperatures in the aquifer from 82"F to values ranging from 83 to 93"F. The intruding water moves upward either through the open bore hole of deep wells or test holes, or along a fault or fracture system, which has been identified in the area. From these points of entry into the lower Hawthorn aquifer, the saline water spreads laterally toward the south and southeast, but is generally confined to components of the fault system. The saline water moves upward from the lower Hawthorn aquifer into the upper Hawthorn aquifer through the open bore hole of wells, which connect the aquifers. This movement has resulted in an increase in chloride from less than 200 mg/1 in the unaffected parts of the upper Hawthorn aquifer to values commonly ranging from about 300 to more than 3,000 mg/1 in parts of the aquifer affected by upward leakage. The upper Hawthorn aquifer is the principal source of ground-water supply for public water-supply systems in western Lee County. Similar effects have been noted in the water-table aquifer, where chloride increased from less than 100 to concentrations ranging from about 500 to more than 5,000 mg/1. This was caused by the downward infiltration of water discharged at land surface from wells tapping the lower Hawthorn aquifer. The spread of saline water throughout most of the McGregor Isles area is continuing as of 1971. (40 page document)
Resumo:
On 11 September 1994, a large shark was captured and later identified as the ragged-tooth shark, Odontaspis ferox (Risso). The shark was captured during routine bottom trawl survey operations onboard the NOAA R/V Albatross IV, approximately 25 n.mi. south-southeast of Cape Hatteras, N.C. (lat. 34° 51' N, long. 75° 26' W) with a “36 Yankee” bottom trawl towed at 3.5 knots. Average water depth at the time of capture was 173 m, bottom temperature was 17.8°C, and salinity was 36.41‰. Total length (cm), fork length (cm), weight (kg), and sex were recorded, the specimen was tagged, photographed, and returned live to t