Orthodontic appliances causes specific alterations in oral environment, including reduction of pH, increase of dental biofilm and elevation of salivary microbial levels, causing an increased risk for dental caries. This study evaluated, using microbial culture and scanning electron microscopy (SEM), the in situ contamination by mutans streptococci (MS) of different surfaces of Haas palatal expanders with and without use of chlorhexidine gluconate mouthrinses (CHX). Thirty‐four patients were randomly assigned to two groups (n = 17/group), using placebo (Group I) and 0.12% CHX (Group II—Periogard®) mouthrinses twice a week. After 4 months, appliances were submitted to microbiological processing and after fragments were analyzed by SEM. Mann–Whitney U test (α = 5%) was used to assess differences between groups on the appliances' different surfaces and to compare the contamination on the free and nonfree surfaces of these components. There was no difference (p = 0.999) between groups regarding the number of MS colonies/biofilms on the nonfree surfaces, which showed intense contamination. However, free surfaces of Group II presented less contamination (p < 0.001) than those of Group I in all appliances' components. Results of the microbial culture were confirmed by SEM. Use of 0.12% CHX was effective in reducing the formation of MS colonies/biofilms on free surfaces of Haas expanders, in situ. 相似文献
Currently, the Internet of Things (IoT) is revolutionizing communication technology by facilitating the sharing of information between different physical devices connected to a network. To improve control, customization, flexibility, and reduce network maintenance costs, a new Software-Defined Network (SDN) technology must be used in this infrastructure. Despite the various advantages of combining SDN and IoT, this environment is more vulnerable to various attacks due to the centralization of control. Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service (DDoS) attacks, but they often lack mechanisms to mitigate their severity. This paper proposes a Multi-Attack Intrusion Detection System (MAIDS) for Software-Defined IoT Networks (SDN-IoT). The proposed scheme uses two machine-learning algorithms to improve detection efficiency and provide a mechanism to prevent false alarms. First, a comparative analysis of the most commonly used machine-learning algorithms to secure the SDN was performed on two datasets: the Network Security Laboratory Knowledge Discovery in Databases (NSL-KDD) and the Canadian Institute for Cybersecurity Intrusion Detection Systems (CICIDS2017), to select the most suitable algorithms for the proposed scheme and for securing SDN-IoT systems. The algorithms evaluated include Extreme Gradient Boosting (XGBoost), K-Nearest Neighbor (KNN), Random Forest (RF), Support Vector Machine (SVM), and Logistic Regression (LR). Second, an algorithm for selecting the best dataset for machine learning in Intrusion Detection Systems (IDS) was developed to enable effective comparison between the datasets used in the development of the security scheme. The results showed that XGBoost and RF are the best algorithms to ensure the security of SDN-IoT and to be applied in the proposed security system, with average accuracies of 99.88% and 99.89%, respectively. Furthermore, the proposed security scheme reduced the false alarm rate by 33.23%, which is a significant improvement over prevalent schemes. Finally, tests of the algorithm for dataset selection showed that the rates of false positives and false negatives were reduced when the XGBoost and RF algorithms were trained on the CICIDS2017 dataset, making it the best for IDS compared to the NSL-KDD dataset. 相似文献
The central issue for pillar design in underground coal mining is the in situ uniaxial compressive strength (σcm). The paper proposes a new method for estimating in situ uniaxial compressive strength in coal seams based on laboratory
strength and P wave propagation velocity. It describes the collection of samples in the Bonito coal seam, Fontanella Mine,
southern Brazil, the techniques used for the structural mapping of the coal seam and determination of seismic wave propagation
velocity as well as the laboratory procedures used to determine the strength and ultrasonic wave velocity. The results obtained
using the new methodology are compared with those from seven other techniques for estimating in situ rock mass uniaxial compressive
strength.
相似文献
One of the most important functionalities for the dual connectivity (DC) technology in non-stand-alone (NSA) fifth generation (5G) networks is the flow control algorithm (FCA), which has the role of correctly splitting the data traffic of users in DC. However, delays in backhaul links and the time between two executions of the FCA may limit the effectiveness of the split ratios computed by the FCA in situations where unexpected channel variations or an increase in the traffic load happen. In this context, we propose a heuristic mechanism where the user assists the FCA in performing a faster and finer adjustment of the bearer split ratios. The proposed mechanism works based on a single scalar value and can be combined with any existing FCA. Besides the adjustment of the bearer split ratios, the proposed mechanism may also trigger handover/disconnection when it detects problems in one of the user connections, which is a novel feature that is not present in existing solutions. Simulations demonstrate the gains provided by the proposed mechanism in terms of user satisfaction, total system rate and user throughput.
Water Distribution Systems (WDSs) have losses, which are difficult to be eliminated due to the complex socio-technical nature of these systems. This paper presents a systematic review of the literature on losses in WDSs, which addresses two questions: which are the factors that influence the complexity of WDSs, having an impact on the losses of water? How do the methods used to control losses in WDSs account for complexity? We assumed that to be compatible with the nature of WDSs, the loss control methods should account for five attributes of complexity. Twenty-one factors that influence these attributes were identified from 49 selected papers, based on a content analysis. Non-linear interactions were the attribute most frequently accounted by the methods (36.5%), and none of the methods simultaneously accounted for all the five attributes. The review also supported the development of a model of the relationships between the factors that influence the complexity attributes. This model is a basis for the analysis of the impacts of actions for tackling losses. 相似文献
This article presents a dosimetric investigation of boron neutron capture therapy (BNCT) combined with (252)Cf brachytherapy for brain tumour control. The study was conducted through computational simulation in MCNP5 code, using a precise and discrete voxel model of a human head, in which a hypothetical brain tumour was incorporated. A boron concentration ratio of 1:5 for healthy-tissue: tumour was considered. Absorbed and biologically weighted dose rates and neutron fluency in the voxel model were evaluated. The absorbed dose rate results were exported to SISCODES software, which generates the isodose surfaces on the brain. Analyses were performed to clarify the relevance of boron concentrations in occult infiltrations far from the target tumour, with boron concentration ratios of 1:1 up to 1:50 for healthy-tissue:infiltrations and healthy-tissue:tumour. The average biologically weighted dose rates at tumour area exceed up to 40 times the surrounding healthy tissue dose rates. In addition, the biologically weighted dose rates from boron have the main contribution at the infiltrations, especially far from primary tumour. In conclusion, BNCT combined with (252)Cf brachytherapy is an alternative technique for brain tumour treatment because it intensifies dose deposition at the tumour and at infiltrations, sparing healthy brain tissue. 相似文献