Search results for "Head"
showing 10 items of 1640 documents
Retrograde filling material in periapical surgery: a systematic review
2021
Background Periapical surgery focuses on the treatment of teeth with persistent periapical lesions when orthograde root canal treatment fails. Although MTA® is the gold standard material for retrograde filling, Biodentine® - a tricalcium silicate-based cement - has been proposed in order to resolve several of its limitations. A systematic review has been carried out to compare the physicochemical properties of Biodentine® versus MTA® as root-end filling material in periapical surgery. Material and Methods An electronic search was conducted by two independent examiners during March 2020 in the Cochrane, PubMed-MEDLINE and Scopus databases. In addition, a manual search was made in specialized…
Architectural Implementation of a Reconfigurable NoC Design for Multi-Applications
2021
With the increasing number of applications running on a Network-on-Chip (NoC) based System-on-Chip (SoC), there is a need for designing a reconfigurable NoC platform to achieve acceptable performance for all the applications. This paper proposes a novel architecture for implementing a reconfiguration logic to the NoC platform executing multiple applications. The proposed architecture reconfigures SoC modules to the routers in the NoC with the help of tri-state buffers based on the applications running. The overhead in implementing the reconfiguration circuitry is significantly less, approximately 0.9% of the area and 1% of the total power consumed by the router network. The architectures pr…
Distance Constrained Mapping to Support NoC Platforms Based on Source Routing
2010
Efficient NoC is crucial for communication among processing elements in a highly parallel processing systems on chip. Mapping cores to slots in a NoC platform and designing efficient routing algorithms are two key problems in NoC design. Source routing offers major advantages over distributed routing especially for regular topology NoC platforms. But it suffers from a serious drawback of overhead since it requires whole communication path to be stored in every packet header. In this paper, we present a core mapping technique which helps to achieve a mapping with the constraint over the path length. We have found that the path length constraint of just 50% is sufficient in most cases. We als…
Simulation d’un Affichage Tête Haute - Réalité Augmentée pour l’aide visuelle à la conduite automobile
2016
Head-Up Display is the emerging solution for visual aid while driving a car, especially during reduced visibility conditions, such as bad weather or when the road is poorly lighted. The HUD device allows to project virtual information in the central field of view of the driving scene, enabling the driver to keep his attention on the road. The visual perception of the driver is therefore augmented, with a coexistence between the real and virtual world. However, it is necessary to ensure an optimal setting in order to guarantee the good perception of the virtual information, and allow drivers to take appropriate actions at the right moment. This thesis project is dedicated to study three impo…
Protein kinase CK2 governs the molecular decision between encephalitogenic T H 17 cell and T reg cell development
2016
T helper 17 (TH17) cells represent a discrete TH cell subset instrumental in the immune response to extracellular bacteria and fungi. However, TH17 cells are considered to be detrimentally involved in autoimmune diseases like multiple sclerosis (MS). In contrast to TH17 cells, regulatory T (Treg) cells were shown to be pivotal in the maintenance of peripheral tolerance. Thus, the balance between Treg cells and TH17 cells determines the severity of a TH17 cell-driven disease and therefore is a promising target for treating autoimmune diseases. However, the molecular mechanisms controlling this balance are still unclear. Here, we report that pharmacological inhibition as well as genetic ablat…
Effects of salinity acclimation on the proteome of the gilthead seabream (Sparus aurata) heart
2009
Oncological Outcomes of Primary vs. Salvage OPHL Type II: A Systematic Review
2022
Background: Open partial horizontal laryngectomy type II (OPHL type II) has two main aims: oncological radicality and laryngeal preservation. The aim of this review is to define and emphasize the oncological efficacy of OPHL type II, both as primary and salvage surgery, by analyzing the latest literature. Methods: The research was carried out on Pubmed, Scopus and Web of Science databases, by using strict keywords. Oncological outcomes were evaluated by the following parameters: overall survival, disease-specific survival, disease-free survival, local control, laryngeal preservation, local recurrence. Results: The review included 19 articles divided into three groups: (1) primary OPHL type …
Checkpointing Workflows for Fail-Stop Errors
2017
International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment
2018
Modern electronic healthcare (e-health) settings constitute collaborative environments requiring sophisticated fine-grained access control mechanisms to cater their access demands. Access delegatability is quite crucial to realize fine-grained, flexible access control schemes compatible with such environments. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities suitable for a multi-domain e-health environment. We have utilized the blockchain technology to manage attribute assignments, delegations as well as revocations. The scheme enables delegations in a controlled manner without jeopard…
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks
2009
In In-networking storage Wireless Sensor Networks, sensed data are stored locally for a long term and retrieved on-demand instead of real-time. To maximize data survival, the sensed data are normally distributively stored at multiple nearby nodes. It arises a problem that how to check and grantee data integrity of distributed data storage in the context of resource constraints. In this paper, a technique called Two Granularity Linear Code (TGLC) that consists of Intra-codes and Inter-codes is presented. An efficient and lightweight data integrity check scheme based on TGLC is proposed. Data integrity can be checked by any one who holds short Inter-codes, and the checking credentials is shor…