959 resultados para Security protocol
Resumo:
A 41-year-old man with cleft palate presented with a wide dehiscence and missing teeth. Six implants had been placed for fabrication of an overdenture, which was unsatisfactory. A bar was waxed and cast for connection to the implants; precision attachments were placed laterally for retention. A fixed partial denture was fabricated, and milled crowns were fabricated at the molar region to provide a guiding plane for insertion of a removable palatal obturator. Good swallowing and speech outcomes were achieved. This technique provided functional and esthetic benefits, enhanced oral hygiene, and improved the psychological condition of the patient.
A modified orthodontic protocol for advanced periodontal disease in Class II division 1 malocclusion
Resumo:
An interdisciplinary approach is often the best option for achieving a predictable outcome for an adult patient with complex clinical problems. This case report demonstrates the combined periodontal/orthodontic treatment for a 49-year-old woman presenting with a Class II Division 1 malocclusion with moderate maxillary anterior crowding, a 9-mm overjet, and moderate to severe bone loss as the main characteristics of the periodontal disease. The orthodontic treatment included 2 maxillary first premolar extractions through forced extrusion. Active orthodontic treatment was completed in 30 months. The treatment outcomes, including the periodontal condition, were stable 17 months after active orthodontic treatment. The advantages of this interdisciplinary approach are discussed. Periodontally compromised orthodontic patients can be satisfactorily treated, achieving most of the conventional orthodontic goals, if a combined orthodontic/periodontic approach is used. (Am J Orthod Dentofacial Orthop 2011; 139:S133-44)
Resumo:
Objectives. The purpose of this study was to investigate the effect of light-curing protocol on degree of conversion (DC), volume contraction (C), elastic modulus (E), and glass transition temperature (T(g)) as measured on a model polymer. It was a further aim to correlate the measured values with each other. Methods. Different light-curing protocols were used in order to investigate the influence of energy density (ED), power density (PD), and mode of cure on the properties. The modes of cure were continuous, pulse-delay, and stepped irradiation. DC was measured by Raman micro-spectroscopy. C was determined by pycnometry and a density column. E was measured by a dynamic mechanical analyzer (DMA), and T(g) was measured by differential scanning calorimetry (DSC). Data were submitted to two-and three-way ANOVA, and linear regression analyses. Results. ED, PD, and mode of cure influenced DC, C, E, and T(g) of the polymer. A significant positive correlation was found between ED and DC (r = 0.58), ED and E (r = 0.51), and ED and T(g) (r = 0.44). Taken together, ED and PD were significantly related to DC and E. The regression coefficient was positive for ED and negative for PD. Significant positive correlations were detected between DC and C (r = 0.54), DC and E (r = 0.61), and DC and T(g) (r = 0.53). Comparisons between continuous and pulse-delay modes of cure showed significant influence of mode of cure: pulse-delay curing resulted in decreased DC, decreased C, and decreased T(g). Influence of mode of cure, when comparing continuous and step modes of cure, was more ambiguous. A complex relationship exists between curing protocol, microstructure of the resin and the investigated properties. The overall performance of a composite is thus indirectly affected by the curing protocol adopted, and the desired reduction of C may be in fact a consequence of the decrease in DC. (C) 2009 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.
Resumo:
The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.
Resumo:
Reviews the book 'Asia Pacific Security Outlook 2000,' edited by Richard W. Baker and Charles M. Morrison.
Resumo:
By exhibiting a violation of a novel form of the Bell-CHSH inequality, Żukowski has recently established that the quantum correlations exploited in the standard perfect teleportation protocol cannot be recovered by any local hidden variables model. In the case of imperfect teleportation, we show that a violation of a generalized form of Żukowski's teleportation inequality can only occur if the channel state, considered by itself, already violates a Bell-CHSH inequality. On the other hand, the fact that the channel state violates a Bell-CHSH inequality is not sufficient to imply a violation of Żukowski's teleportation inequality (or any of its generalizations). The implication does hold, however, if the fidelity of the teleportation exceeds ≈ 0.90. © 2001 Elsevier Science B.V. All rights reserved.
Resumo:
This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.
Resumo:
Koala (Phascolarctos cinereus) populations in eastern Australia are threatened by land clearing for agricultural and urban development. At the same time, conservation efforts are hindered by a dearth of information about inland populations. Faecal deposits offer a source of information that is readily available and easily collected non-invasively. We detail a faecal pellet sampling protocol that was developed for use in a large rangeland biogeographic region. The method samples trees in belt transects, uses a thorough search at the tree base to quickly identify trees with koala pellets under them, then estimates the abundance of faecal pellets under those trees using 1-m(2) quadrats. There was a strong linear relationship between these estimates and a complete enumeration of pellet abundance under the same trees. We evaluated the accuracy of our method in detecting trees where pellets were present by means of a misclassification index that was weighed more heavily for missed trees that had high numbers of pellets under them. This showed acceptable accuracy in all landforms except riverine, where some trees with large numbers of pellets were missed. Here, accuracy in detecting pellet presence was improved by sampling with quadrats, rather than basal searches. Finally, we developed a method to reliably age pellets and demonstrate how this protocol could be used with the faecal-standing-crop method to derive a regional estimate of absolute koala abundance.
Resumo:
This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.
Resumo:
A discrete protocol for teleportation of superpositions of coherent states of optical-cavity fields is presented. Displacement and parity operators are unconventionally used in Bell-like measurement for field states.
Resumo:
A successful embryo-rescue and culture protocol was developed for use with several indigenous Vigna species and mungbean cultivars grown in Australia. Germination of Vigna immature embryos and their subsequent development into plants was influenced by the time at which the embryos were isolated and by which medium additives were placed in the embryo-rescue medium. A medium containing MS basal nutrients with sucrose (88 mM), casein hydrolysate (500 mg L-1) and agar (8 g L-1) but devoid of plant-growth regulators was found to be the best for germination of immature embryos for all four Vigna species investigated. The protocol for successful germination of non-hybrid immature embryos was applied to the recovery of interspecific hybrids involving mungbean and five native Vigna species that had previously been found difficult to hybridise. Several putative hybrid plants were obtained including a confirmed interspecific cross between V. luteola (Jacq.) Benth and V. marina (Burm.) Merrill.
Resumo:
The UN Cartagena Protocol on Biosafety adopted in Montreal, 29 January, 2000 and opened for signature in Nairobi, 15-26 May, 2000 will exert a profound effect on international trade in genetically modified organisms (GMOs) and their products. In this paper, the potential effects of various articles of the Protocol on international trade in GMOs are analyzed. Based on the present status of imports of GMOs and domestic research and development of biotechnology in China, likely trends in imports of foreign GM food and related products after China accedes to WTO is explored. Also, China's potential countermeasures to control and regulate imports of GMOs in line with implementation of the Protocol are discussed. China, in recent times, has increased its food and agricultural imports substantially from USA and Canada. China imported soybean 10.42 mill. tons in 2000 and about 15 mill tons in 2001, of which majority are from USA where GM soybean accounts for 60%. The plantation of US Monsanto's transgenic Bt cotton was increased to more than 1 million ha in China in 2001. Though China has paid great attention to develop biotechnology, it appears to have little scope to export GMOs and GM products. So China may consider a range of administrative measures to implement the Cartagena Protocol and to regulate its import of GMOs and GM agricultural products. Consequently, the Regulation on Safety of Agri-GMOs was issued on June, 2001 and followed three detailed rules issued in Jan. of 2002, with a priority to limit foreign GMOs importing by safety certification and labeling system. These were outlined taking into account policies adopted in Western countries such as green barriers to international trade.