Results 11 to 20 of about 545,206 (314)

Intrusion of posterior teeth using miniplates: intrusive mechanics is not the same as intrusion force [PDF]

open access: yesDental Press Journal of Orthodontics, 2021
ABSTRACT Objective: Biologically explain some of the bone mechanisms involved in the intrusion, or intrusive effect, of teeth submitted to skeletal open bite correction using four miniplates. Methods: The results of dental intrusion were measured and compared in 3D reconstructions of cone beam computed tomography scans taken before and after ...
Suzana T. M. P. M. APOLINÁRIO   +4 more
openaire   +6 more sources

Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone [PDF]

open access: yesEAI Endorsed Transactions on Security and Safety, 2020
It is quite common for reusing code in soft development, which may lead to the wide spread of the vulnerability, soautomatic detection of vulnerable code clone is becoming more and more important.
Yuan He   +3 more
doaj   +1 more source

Identify Vulnerability Fix Commits Automatically Using Hierarchical Attention Network [PDF]

open access: yesEAI Endorsed Transactions on Security and Safety, 2020
The application of machine learning and deep learning in the field of vulnerability detection is a hot topic in security research, but currently it faces the problem of lack of dataset.
Mingxin Sun   +4 more
doaj   +1 more source

Anterior Deep Bite Malocclusion Treated with Connecticut Intrusion Arch: Biomechanical Consideration [PDF]

open access: yesJournal of Clinical and Diagnostic Research, 2014
Most Class II division 2 malocclusion manifest a severe deep bite, the orthodontic correction of deep overbite can be achieved with several mechanisms one such mechanics is true intrusion of anterior teeth.
Safiya Sana   +4 more
doaj   +1 more source

Intrusive and non-intrusive watermarking [PDF]

open access: yesProceedings. International Conference on Image Processing, 2003
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire   +3 more sources

Comparative Evaluation of Teeth Displacement and Stress Generated with Orthodontic Mini-Implant and Infra-Zygomatic Crestal Implant during Intrusion in the Maxillary Arch − A Three Dimensional Finite Element Analysis

open access: yesJournal of Orofacial Sciences, 2023
Introduction: This study aims to evaluate and compare the stress distribution in bone and sutures surrounding the mini-implant and the teeth displacement pattern in the maxillary arch during full arch intrusion using a mini-implant, IZC implant, and an ...
Aarti Sethia   +4 more
doaj   +1 more source

The Effects of Intrusion of Anterior Teeth by Skeletal Anchorage in Deep Bite Patients; A Systematic Review and Meta-Analysis

open access: yesBiomimetics, 2023
Background: Deep bite is known as one of the most common malocclusions, and its treatment and retention are often challenging. The use of mini-screws has been suggested as an ideal method for the intrusion of incisors in deep-bite patients.
Erfan Bardideh   +5 more
doaj   +1 more source

Intrusive sheets and sheeted intrusions at Elba Island, Italy [PDF]

open access: yesGeosphere, 2010
The processes leading to successful versus failed coalescence of similar magma batches upon their emplacement are investigated at Elba Island (Tuscany), where several magma bodies were generated at a single magmatic center over a time span of ∼1 Ma during the Late Miocene. Three nested Christmas-tree laccoliths made up of separated, shallow-level
ROCCHI, SERGIO   +3 more
openaire   +4 more sources

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm

open access: yesIEEE Access, 2018
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj   +1 more source

Intelligent Deep Learning for Anomaly-Based Intrusion Detection in IoT Smart Home Networks

open access: yesMathematics, 2022
The Internet of Things (IoT) is a tremendous network based on connected smart devices. These networks sense and transmit data by using advanced communication standards and technologies.
Nazia Butt   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy