567 resultados para INTRUSIVE LUXATION


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Intrusion of permanent teeth is one of the most severe types of traumatic injuries. Different treatment strategies have been proposed, and the best approach for each case depends on the stage of root development, severity of the intrusive luxation, presence of alveolar fracture and number of intruded teeth. The purpose of this paper is to describe the treatment management of 2 cases of severely intruded immature permanent maxillary central incisors in 71/2- and 8-year-old children. In case 1, the traumatized tooth was treated by surgical repositioning, while in case 2 watchful waiting for spontaneous re-eruption was the treatment of choice. Treatment strategies were successful in both cases, as demonstrated by the continuation of root development, maintenance of pulp vitality, and absence of signs of per/apical pathosis during the follow-up period. Regardless of the treatment strategy, traumatically intruded teeth should undergo periodical clinical and radiographic surveillance on a long-term basis to allow early detection of possible complications. (Pediotr Dent 2009;31:340-5) Received March 11, 2008 vertical bar Last Revision June 25, 2008 vertical bar Revision Accepted July 16, 2008

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Intrusion is defined as the axial dislodgment of the tooth into its socket and is considered one of the most severe types of dental trauma. This longitudinal outcome study was undertaken to evaluate clinically and radiographically severely intruded permanent incisors in a population of children and adolescents. All cases were treated between September 2003 and February 2008 in a dental trauma service. Clinical and radiographic data were collected from 12 patients (eight males and four females) that represented 15 permanent maxillary incisors. Mean age at the time of injury was 8 years and 9 months (range 7-14 years and 8 months). Mean time elapsed to follow-up was 26.6 months (range 10-51 months). The analysis of data showed that tooth intrusion was twice as frequent in males. The maxillary central incisors were the most commonly intruded teeth (93.3%), and falling at home was the main etiologic factor (60%). More than half of the cases (53.3%) were multiple intrusions, 73.3% of the intruded teeth had incomplete root formation and 66.6% of the teeth suffered other injuries concomitant to intrusion. Immediate surgical repositioning was the treatment of choice in 66.7% of the cases, while watchful waiting for the tooth to return to its pre-injury position was adopted in 33.3% of the cases. The teeth that suffered additional injuries to the intrusive luxation presented a fivefold increased relative risk of developing pulp necrosis. The immature teeth had six times more chances of presenting pulp canal obliteration that the mature teeth and a lower risk of developing root resorption. The most frequent post-injury complications were pulp necrosis (73.3%), marginal bone loss (60%), inflammatory root resorption (40%), pulp canal obliteration (26.7%) and replacement root resorption (20%). From the results of this study, it was not possible to determine whether the type immediate treatment had any influence on the appearance of sequelae like pulp necrosis and root resorption after intrusive luxation, but the existence of additional injuries and the stage of root development influenced the clinical case outcome in a negative and positive manner, respectively.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

O diagnóstico preciso e a elaboração de um plano de tratamento adequado podem constituir uma tarefa bastante complexa, especialmente nos traumatismos dentoalveolares, pois necessitam de uma abordagem multidisciplinar e conhecimento sobre o processo de reparo após o traumatismo. O objetivo do trabalho foi analisar o conhecimento dos cirurgiões dentistas sobre plano de tratamento das injúrias do ligamento periodontal após traumatismo dentoalveolar. Para tanto, a partir de um questionário, foram abordadas perguntas referentes ao perfil dos profissionais entrevistados e conduta frente às injúrias do ligamento periodontal (concussão, subluxação, luxação extrusiva, luxação lateral e luxação intrusiva) ocasionadas por traumatismo dentoalveolar. Seiscentos e noventa e três cirurgiões dentistas que participaram da 23ª Reunião Anual da SBPqO (2006) responderam o questionário e os dados obtidos foram submetidos à análise descritiva, enquanto o teste estatístico foi aplicado para demonstrar as freqüências e o nível de significância entre as variáveis (Teste qui-quadrado ou Teste Exato de Fisher). De acordo com os resultados obtidos, grandes dificuldades foram encontradas com relação ao plano de tratamento das luxações extrusiva, lateral e intrusiva. De maneira geral, a especialidade não influenciou na elaboração de planos adequados para as injúrias mais complexas. Foi possível concluir que os cirurgiões dentistas não apresentam conhecimento suficiente para tratar de maneira adequada as injúrias mais severas do ligamento periodontal após traumatismo dentoalveolar

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A self-report measure of the emotional and behavioural reactions to intrusive thoughts was developed. The paper presents data that confirm the stability, reliability and validity of the new 7-item measure. Emotional and behavioural reactions to intrusions emerged as separate factors on the Emotional and Behavioural Reactions to Intrusions Questionnaire (EBRIQ), a finding confirmed by an independent stress study. Test retest reliability over 30-70 days was good. Expected relationships with other constructs were significant. Stronger negative responses to intrusions were associated with lower mindfulness scores and higher ratings of experiential avoidance, thought suppression and intensity and frequency of craving. The EBRIQ will help explore differences in reactions to intrusive thoughts in clinical and non clinical populations, and across different emotional and behavioural states. It will also be useful in assessing the effects of therapeutic approaches such as mindfulness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intrusive thoughts about food may play a role in unhealthy eating behaviours. Food-related thoughts that capture attention can lead to craving and further intrusive thoughts (Kavanagh, Andrade, & May, 2005). We tested whether diverting attention to mental images or bodily sensations would reduce the incidence of intrusive thoughts about snack foods. In two experiments, participants reported their thoughts in response to probes during three 10 min periods. In the Baseline and Post-task period, participants were asked to let their mind wander. In the middle, Experimental, period, participants followed mind wandering (Control), thought diversion, or Thought Suppression instructions. Self-directed or Guided Imagery, Mindfulness-based Body Scanning, and Thought Suppression all reduced the proportion of thoughts about food, compared to Baseline. Following Body Scanning and Thought Suppression, food thoughts returned to Baseline frequencies Post-task, rather than rebounding. There were no effects of the interventions upon craving, although overall, craving and thought frequency were correlated. Thought control tasks may help people to ignore thoughts about food and thereby reduce their temptation to snack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two main deformational phases are recognised in the Archaean Boorara Domain of the Kalgoorlie Terrane, Eastern Goldfields Superterrane, Yilgarn Craton, Western Australia, primarily involving southover- north thrust faulting that repeated and thickened the stratigraphy, followed by east northeast – west-southwest shortening that resulted in macroscale folding of the greenstone lithologies. The domain preserves mid-greenschist facies metamorphic grade, with an increase to lower amphibolite metamorphic grade towards the north of the region. As a result of the deformation and metamorphism, individual stratigraphic horizons are difficult to trace continuously throughout the entire domain. Volcanological and sedimentological textures and structures, primary lithological contacts, petrography and geochemistry have been used to correlate lithofacies between faultbounded structural blocks. The correlated stratigraphic sequence for the Boorara Domain comprises quartzo-feldspathic turbidite packages, overlain by high-Mg tholeiitic basalt (lower basalt), coherent and clastic dacite facies, intrusive and extrusive komatiite units, an overlying komatiitic basalt unit (upper basalt), and at the stratigraphic top of the sequence, volcaniclastic quartz-rich turbidites. Reconstruction of the stratigraphy and consideration of emplacement dynamics has allowed reconstruction of the emplacement history and setting of the preserved sequence. This involves a felsic, mafic and ultramafic magmatic system emplaced as high-level intrusions, with localised emergent volcanic centres, into a submarine basin in which active sedimentation was occurring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

High-voltage circuit breakers are among the most important equipments for ensuring the efficient and safe operation of an electric power system. On occasion, circuit breaker operators may wish to check whether equipment is performing satisfactorily and whether controlled switching systems are producing reliable and repeatable stress control. Monitoring of voltage and current waveforms during switching using established methods will provide information about the magnitude and frequency of voltage transients as a result of re-ignitions and restrikes. However, high frequency waveform measurement requires shutdown of circuit breaker and use of specialized equipment. Two utilities, Hydro-Québec in Canada and Powerlink Queensland in Australia, have been working on the development and application of a non-intrusive, cost-effective and flexible diagnostic system for monitoring high-voltage circuit breakers for reactive switching. The proposed diagnostic approach relies on the non-intrusive assessment of key parameters such as operating times, prestrike characteristics, re-ignition and restrike detection. Transient electromagnetic emissions have been identified as a promising means to evaluate the abovementioned parameters non-intrusively. This paper describes two complimentary methods developed concurrently by Powerlink and Hydro-Québec. Also, return of experiences on the application to capacitor bank and shunt reactor switching is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have come a long way from simple straw and balloon models of magma plumbing systems to a more detailed picture of shallow level intrusive complexes. In this chapter, the sub-volcanic plumbing system is considered in terms of how we can define the types and styles of magma networks from the deep to the shallow subsurface. We look at the plumbing system from large igneous provinces, through rifted systems to polygenetic volcanoes, with a view to characterising some of the key conceptual models. There is a focus on how ancient magmatic centres can help us better understand magmatic plumbing. New innovative ways to consider and quantify magma plumbing are also highlighted including 3D seismic, and using the crystal cargo to help fingerprint key magma plumbing events. Conclusions are drawn to our understanding of the 3D plumbing system and how these recent advances can be helpful when exploring the other chapters of this contribution.