Results 1 to 10 of about 555,600 (315)

Anterior Deep Bite Malocclusion Treated with Connecticut Intrusion Arch: Biomechanical Consideration [PDF]

open access: yesJournal of Clinical and Diagnostic Research, 2014
Most Class II division 2 malocclusion manifest a severe deep bite, the orthodontic correction of deep overbite can be achieved with several mechanisms one such mechanics is true intrusion of anterior teeth.
Safiya Sana   +4 more
doaj   +1 more source

Comparative Evaluation of Teeth Displacement and Stress Generated with Orthodontic Mini-Implant and Infra-Zygomatic Crestal Implant during Intrusion in the Maxillary Arch − A Three Dimensional Finite Element Analysis

open access: yesJournal of Orofacial Sciences, 2023
Introduction: This study aims to evaluate and compare the stress distribution in bone and sutures surrounding the mini-implant and the teeth displacement pattern in the maxillary arch during full arch intrusion using a mini-implant, IZC implant, and an ...
Aarti Sethia   +4 more
doaj   +1 more source

The Effects of Intrusion of Anterior Teeth by Skeletal Anchorage in Deep Bite Patients; A Systematic Review and Meta-Analysis

open access: yesBiomimetics, 2023
Background: Deep bite is known as one of the most common malocclusions, and its treatment and retention are often challenging. The use of mini-screws has been suggested as an ideal method for the intrusion of incisors in deep-bite patients.
Erfan Bardideh   +5 more
doaj   +1 more source

Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks

open access: yesMathematics, 2022
The Internet of Things (IoT) is a tremendous network based on connected smart devices. These networks sense and transmit data by using advanced communication standards and technologies.
Nazia Butt   +6 more
doaj   +1 more source

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm

open access: yesIEEE Access, 2018
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj   +1 more source

Sources and sinks of bottom water oxygen in a seasonally hypoxic fjord

open access: yesFrontiers in Marine Science, 2023
Deoxygenation of the ocean has been occurring over the last half century, particularly in poorly ventilated coastal waters. In coastal and estuarine environments, both the water column and sediments play key roles in controlling oxygen variability.
Subhadeep Rakshit   +3 more
doaj   +1 more source

Modeling Ice Melt Rates From Seawater Intrusions in the Grounding Zone of Petermann Gletscher, Greenland

open access: yesGeophysical Research Letters, 2023
Satellite radar interferometry data reveals that the grounding line of Petermann Glacier, Greenland migrates by several kilometers during the tidal cycle, bringing pressurized, subsurface, warm ocean waters in regular contact with a large sector of ...
R. Gadi, E. Rignot, D. Menemenlis
doaj   +1 more source

ANTHROPOPHILOUS REPRESENTATIVES OF BRASSICACEAE BURNETT OF THE NORTHERN TURAN (CONSPECTUS OF SPECIES)

open access: yesТруды по прикладной ботанике, генетике и селекции, 2018
In the Northern Turan's flora by the present moment 134 species of Brassicaceae Burnett family were noted. It was revealed that 96 (71.6%) species among them had the anthropophilous nature of distribution.
P. V. Vesselova
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Similarity Based Feature Transformation for Network Anomaly Detection

open access: yesIEEE Access, 2020
The fundamental objective behind any network intrusion detection system is to automate the detection process whenever intrusions occur in the network.
Arun Nagaraja   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy