Results 1 to 10 of about 118,794 (290)
Design of an iterative method for adaptive federated intrusion detection for energy-constrained edge-centric 6G IoT cyber-physical systems. [PDF]
Praveen SP +5 more
europepmc +3 more sources
Intrusion of posterior teeth using miniplates: intrusive mechanics is not the same as intrusion force [PDF]
ABSTRACT Objective: Biologically explain some of the bone mechanisms involved in the intrusion, or intrusive effect, of teeth submitted to skeletal open bite correction using four miniplates. Methods: The results of dental intrusion were measured and compared in 3D reconstructions of cone beam computed tomography scans taken before and after ...
Suzana T. M. P. M. APOLINÁRIO +4 more
openaire +5 more sources
Anterior Deep Bite Malocclusion Treated with Connecticut Intrusion Arch: Biomechanical Consideration [PDF]
Most Class II division 2 malocclusion manifest a severe deep bite, the orthodontic correction of deep overbite can be achieved with several mechanisms one such mechanics is true intrusion of anterior teeth.
Safiya Sana +4 more
doaj +1 more source
Introduction: This study aims to evaluate and compare the stress distribution in bone and sutures surrounding the mini-implant and the teeth displacement pattern in the maxillary arch during full arch intrusion using a mini-implant, IZC implant, and an ...
Aarti Sethia +4 more
doaj +1 more source
Intrusive and non-intrusive watermarking [PDF]
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire +2 more sources
Background: Deep bite is known as one of the most common malocclusions, and its treatment and retention are often challenging. The use of mini-screws has been suggested as an ideal method for the intrusion of incisors in deep-bite patients.
Erfan Bardideh +5 more
doaj +1 more source
Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks
The Internet of Things (IoT) is a tremendous network based on connected smart devices. These networks sense and transmit data by using advanced communication standards and technologies.
Nazia Butt +6 more
doaj +1 more source
Sources and sinks of bottom water oxygen in a seasonally hypoxic fjord
Deoxygenation of the ocean has been occurring over the last half century, particularly in poorly ventilated coastal waters. In coastal and estuarine environments, both the water column and sediments play key roles in controlling oxygen variability.
Subhadeep Rakshit +3 more
doaj +1 more source
E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj +1 more source
Satellite radar interferometry data reveals that the grounding line of Petermann Glacier, Greenland migrates by several kilometers during the tidal cycle, bringing pressurized, subsurface, warm ocean waters in regular contact with a large sector of ...
R. Gadi, E. Rignot, D. Menemenlis
doaj +1 more source

