Results 11 to 20 of about 700,206 (362)

Intrusion of posterior teeth using miniplates: intrusive mechanics is not the same as intrusion force [PDF]

open access: yesDental Press Journal of Orthodontics, 2021
ABSTRACT Objective: Biologically explain some of the bone mechanisms involved in the intrusion, or intrusive effect, of teeth submitted to skeletal open bite correction using four miniplates. Methods: The results of dental intrusion were measured and compared in 3D reconstructions of cone beam computed tomography scans taken before and after ...
Suzana T. M. P. M. APOLINÁRIO   +4 more
openaire   +6 more sources

Intrusive and non-intrusive watermarking [PDF]

open access: yesProceedings. International Conference on Image Processing, 2003
"Can we watermark without perturbing an image?" We present the salient results of an investigation carried out to find an answer to this question. We judge candidate watermarking schemes based on transparency, robustness, capacity and non-invertibility, together referred to as the governing factors. We refer to schemes that embed by perturbing an image
Krishna, Hari VJ, Ramakrishnan, KR
openaire   +3 more sources

The Effects of Intrusion of Anterior Teeth by Skeletal Anchorage in Deep Bite Patients; A Systematic Review and Meta-Analysis

open access: yesBiomimetics, 2023
Background: Deep bite is known as one of the most common malocclusions, and its treatment and retention are often challenging. The use of mini-screws has been suggested as an ideal method for the intrusion of incisors in deep-bite patients.
Erfan Bardideh   +5 more
doaj   +1 more source

Intrusion of Kuroshio Helps to Diminish Coastal Hypoxia in the Coast of Northern South China Sea

open access: yesFrontiers in Marine Science, 2020
Since half a century ago, the number and area of dead zones (dissolved oxygen (DO) < 2 mg L–1 or 30% saturation) in the coastal oceans has increased dramatically.
Hon-Kit Lui   +12 more
doaj   +1 more source

Comparative Evaluation of Teeth Displacement and Stress Generated with Orthodontic Mini-Implant and Infra-Zygomatic Crestal Implant during Intrusion in the Maxillary Arch − A Three Dimensional Finite Element Analysis

open access: yesJournal of Orofacial Sciences, 2023
Introduction: This study aims to evaluate and compare the stress distribution in bone and sutures surrounding the mini-implant and the teeth displacement pattern in the maxillary arch during full arch intrusion using a mini-implant, IZC implant, and an ...
Aarti Sethia   +4 more
doaj   +1 more source

Intrusive sheets and sheeted intrusions at Elba Island, Italy [PDF]

open access: yesGeosphere, 2010
The processes leading to successful versus failed coalescence of similar magma batches upon their emplacement are investigated at Elba Island (Tuscany), where several magma bodies were generated at a single magmatic center over a time span of ∼1 Ma during the Late Miocene. Three nested Christmas-tree laccoliths made up of separated, shallow-level
ROCCHI, SERGIO   +3 more
openaire   +4 more sources

An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs

open access: yesItalian National Conference on Sensors, 2022
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge ...
Gaoyuan Liu   +5 more
semanticscholar   +1 more source

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization

open access: yesInternational Conference on Information Systems Security and Privacy, 2018
: With exponential growth in the size of computer networks and developed applications, the significant in-creasing of the potential damage that can be caused by launching attacks is becoming obvious.
Iman Sharafaldin   +2 more
semanticscholar   +1 more source

E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm

open access: yesIEEE Access, 2018
The sequence comparison of large-scale string-typed data is fundamental in computer science and other computational disciplines. Its development has been promoted into an emerging outsourcing service by the almost unlimited powerful computing and storage
Xiaofei Wang, Yuqing Zhang
doaj   +1 more source

Network intrusion detection system: A systematic study of machine learning and deep learning approaches

open access: yesTransactions on Emerging Telecommunications Technologies, 2020
The rapid advances in the internet and communication fields have resulted in a huge increase in the network size and the corresponding data. As a result, many novel attacks are being generated and have posed challenges for network security to accurately ...
Zeeshan Ahmad   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy