Search results for "D.N.A."
showing 10 items of 6568 documents
Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks
2018
While analyzing an explosive amount of data collected in today’s wireless sensor networks (WSNs), the redundant information in the sensed data needs to be handled. In-network data processing is a technique which can eliminate or reduce such redundancy, leading to minimized resource consumption. On the other hand, trust management techniques establish trust relationships among nodes and detect unreliable nodes. In this paper, we propose two novel in-network data processing schemes for trust management in static WSNs. The first scheme targets at networks, where sensor nodes are closely collocated to report the same event. Considering both spatial and temporal correlations, this scheme generat…
Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation
2016
Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
2019
This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…
Análisis de la siniestralidad en ciclistas 2008-2013
2016
[ES] Los accidentes con víctimas ciclistas han sufrido un continuo ascenso en los últimos años. A fin de conocer cuáles son las características tanto del ciclista implicado en un accidente, como de las circunstancias en las que éste se ha producido, se ha realizado un estudio en el que se analiza la siniestralidad de los ciclistas registrada en España en el período comprendido entre 2008 a 2013. La investigación se ha realizado a partir de la base de datos de accidentes oficial de la Dirección General de Tráfico (base ARENA). En total se han analizado 25.439 accidentes con ciclistas implicados y 24.520 víctimas ciclistas. Los principales resultados de este estudio muestran que el número de …
Effect of different solutions in reversing the damage caused by radiotherapy in dentin structure
2020
Background Previous studies have shown that radiotherapy of the head and neck region can cause direct changes in dental structure. This study evaluated the effect of different solutions on the dentin chemical composition and collagen structure of irradiated dentin. Material and Methods Sixty maxillary canines were distributed in 2 groups (n=30): non-irradiated and irradiated (radiotherapy: X-rays of 6 MV in 30 cycles of 2 Gy to 60 Gy). The teeth were sectioned, sanded, and polished to obtain 3x3x2 mm fragments, which were redistributed in 3 subgroups (n=10) according to the treatment employed: chlorhexidine 2% (CL), chitosan 0.2% (QT), and 0.5 M carbodiimide (EDC). The samples were analyzed…
Deduplication Potential of HPC Applications’ Checkpoints
2016
HPC systems contain an increasing number of components, decreasing the mean time between failures. Checkpoint mechanisms help to overcome such failures for long-running applications. A viable solution to remove the resulting pressure from the I/O backends is to deduplicate the checkpoints. However, there is little knowledge about the potential to save I/Os for HPC applications by using deduplication within the checkpointing process. In this paper, we perform a broad study about the deduplication behavior of HPC application checkpointing and its impact on system design.
Clinical effect of diode laser on peri-implant tissues during non-surgical peri-implant mucositis therapy: Randomized controlled clinical study
2019
Background: The aim of this study is to evaluate the response to the non-surgical treatment of peri-implant mucositis using the diode laser as an adjuvant therapy in patients with implant-supported restorations, in terms of clinical variables, with respect to those patients in whom conventional non-surgical therapy is used. Material and Methods: Randomized controlled clinical trial with simple blind 3 months follow-up. Two groups of patients were established, the non-surgical mechanical debridement of the affected implants was performed in the control group (n = 34) and the diode laser therapy was also performed in the test group (n = 34). The implant was considered the study subject; the v…
Implant Abutment Cleaning by Plasma of Argon: 5-Year Follow-Up of a Randomized Controlled Trial.
2015
Contamination of implant abutments could potentially influence the peri-implant tissue inflammatory response. The aim of the present study is to assess the radiographic bone changes around customized, platform-switched abutments placed according to the "one-abutment-one-time" protocol, with and without plasma of argon cleaning treatment.Thirty healthy patients with thin gingival biotype (1 mm) and history of periodontal disease received one maxillary implant each. Immediately before abutment connection, patients were randomly assigned to control group (cleaning protocol by steaming) or test group (plasma of argon treatment). Outcome measures were: 1) success rate of implants and prostheses;…
Systemic blockade of ACVR2B ligands prevents chemotherapy-induced muscle wasting by restoring muscle protein synthesis without affecting oxidative ca…
2016
AbstractDoxorubicin is a widely used and effective chemotherapy drug. However, cardiac and skeletal muscle toxicity of doxorubicin limits its use. Inhibiting myostatin/activin signalling can prevent muscle atrophy, but its effects in chemotherapy-induced muscle wasting are unknown. In the present study we investigated the effects of doxorubicin administration alone or combined with activin receptor ligand pathway blockade by soluble activin receptor IIB (sACVR2B-Fc). Doxorubicin administration decreased body mass, muscle size and bone mineral density/content in mice. However, these effects were prevented by sACVR2B-Fc administration. Unlike in many other wasting situations, doxorubicin indu…
Positive Controls in Adults and Children Support That Very Few, If Any, New Neurons Are Born in the Adult Human Hippocampus.
2020
Adult hippocampal neurogenesis was originally discovered in rodents. Subsequent studies identified the adult neural stem cells and found important links between adult neurogenesis and plasticity, behavior, and disease. However, whether new neurons are produced in the human dentate gyrus (DG) during healthy aging is still debated. We and others readily observe proliferating neural progenitors in the infant hippocampus near immature cells expressing doublecortin (DCX), but the number of such cells decreases in children and few, if any, are present in adults. Recent investigations using dual antigen retrieval find many cells stained by DCX antibodies in adult human DG. This has been interprete…