Results 11 to 20 of about 555,600 (315)

Intrusion of posterior teeth using miniplates: intrusive mechanics is not the same as intrusion force [PDF]

open access: yesDental Press Journal of Orthodontics, 2021
ABSTRACT Objective: Biologically explain some of the bone mechanisms involved in the intrusion, or intrusive effect, of teeth submitted to skeletal open bite correction using four miniplates. Methods: The results of dental intrusion were measured and compared in 3D reconstructions of cone beam computed tomography scans taken before and after ...
Suzana T. M. P. M. APOLINÁRIO   +4 more
openaire   +6 more sources

Intrusive and non-intrusive watermarking [PDF]

open access: yesProceedings. International Conference on Image Processing, 2003
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire   +3 more sources

Intrusive sheets and sheeted intrusions at Elba Island, Italy [PDF]

open access: yesGeosphere, 2010
The processes leading to successful versus failed coalescence of similar magma batches upon their emplacement are investigated at Elba Island (Tuscany), where several magma bodies were generated at a single magmatic center over a time span of ∼1 Ma during the Late Miocene. Three nested Christmas-tree laccoliths made up of separated, shallow-level
ROCCHI, SERGIO   +3 more
openaire   +4 more sources

Intrusion and intrusion detection [PDF]

open access: yesInternational Journal of Information Security, 2001
Summary: Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are vulnerable to attack. This paper looks at the problem of malicious users from both a historical and practical standpoint.
openaire   +3 more sources

Intrusion of Kuroshio Helps to Diminish Coastal Hypoxia in the Coast of Northern South China Sea

open access: yesFrontiers in Marine Science, 2020
Since half a century ago, the number and area of dead zones (dissolved oxygen (DO) < 2 mg L–1 or 30% saturation) in the coastal oceans has increased dramatically.
Hon-Kit Lui   +12 more
doaj   +1 more source

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Intrusion and extrusion of water in hydrophobic nanopores [PDF]

open access: yes, 2017
Heterogeneous systems composed of hydrophobic nanoporous materials and water are capable, depending on their characteristics, of efficiently dissipating (dampers) or storing ("molecular springs") energy.
Casciola, Carlo Massimo   +3 more
core   +1 more source

Resorption of Root Apex during Orthodontic Tooth Intrusion Using Light and Heavy Forces

open access: yesČeská Stomatologie a Praktické Zubní Lékařství, 2014
Introduction, aim: The aim of this prospective study was to find a relationship between the external apical resorption and magnitude of orthodontic force during tooth intrusion.
I. Marek, J. Kučera, M. Kamínek
doaj   +1 more source

Focused Fluid Flow Along the Nootka Fault Zone and Continental Slope, Explorer‐Juan de Fuca Plate Boundary

open access: yesGeochemistry, Geophysics, Geosystems, 2020
Geophysical and geochemical data indicate there is abundant fluid expulsion in the Nootka fault zone (NFZ) between the Juan de Fuca and Explorer plates and the Nootka continental slope.
M. Riedel   +8 more
doaj   +1 more source

Toward Network-based DDoS Detection in Software-defined Networks [PDF]

open access: yes, 2018
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy