6,329 research outputs found

    Delayed eruption of permanent dentition and maxillary contraction in patients with cleidocranial dysplasia: review and report of a family

    Get PDF
    Introduction. Cleidocranial dysplasia (CCD) is an inherited disease caused by mutations in the RUNX2 gene on chromosome 6p21. This pathology, autosomal dominant or caused by a spontaneous genetic mutation, is present in one in one million individuals, with complete penetrance and widely variable expressivity. Aim. To identify the incidence of these clinical findings in the report of the literature by means of PubMed interface from 2002 to 2015, with the related keywords. The report of local patients presents a clinical example, related to the therapeutic approach. Results and Discussions. The PubMed research resulted in 122 articles. All the typical signs were reported in all presented cases. The maxilla was hypoplastic in 94% of the patients. Missing of permanent teeth was found in two cases: one case presented a class II jaw relationship, instead of class III malocclusion. Similar findings were present in our cohort. Conclusion. CCD is challenging for both the dental team and the patient. The treatment requires a multidisciplinary approach. Further studies are required to better understand the cause of this disease. According to this review, a multistep approach enhances the possibilities to achieve the recovery of the most possible number of teeth, as such to obtain a good occlusion and a better aesthetic

    BSML: A Binding Schema Markup Language for Data Interchange in Problem Solving Environments (PSEs)

    Full text link
    We describe a binding schema markup language (BSML) for describing data interchange between scientific codes. Such a facility is an important constituent of scientific problem solving environments (PSEs). BSML is designed to integrate with a PSE or application composition system that views model specification and execution as a problem of managing semistructured data. The data interchange problem is addressed by three techniques for processing semistructured data: validation, binding, and conversion. We present BSML and describe its application to a PSE for wireless communications system design

    Unifying Amplitude and Phase Analysis: A Compositional Data Approach to Functional Multivariate Mixed-Effects Modeling of Mandarin Chinese

    Full text link
    Mandarin Chinese is characterized by being a tonal language; the pitch (or F0F_0) of its utterances carries considerable linguistic information. However, speech samples from different individuals are subject to changes in amplitude and phase which must be accounted for in any analysis which attempts to provide a linguistically meaningful description of the language. A joint model for amplitude, phase and duration is presented which combines elements from Functional Data Analysis, Compositional Data Analysis and Linear Mixed Effects Models. By decomposing functions via a functional principal component analysis, and connecting registration functions to compositional data analysis, a joint multivariate mixed effect model can be formulated which gives insights into the relationship between the different modes of variation as well as their dependence on linguistic and non-linguistic covariates. The model is applied to the COSPRO-1 data set, a comprehensive database of spoken Taiwanese Mandarin, containing approximately 50 thousand phonetically diverse sample F0F_0 contours (syllables), and reveals that phonetic information is jointly carried by both amplitude and phase variation.Comment: 49 pages, 13 figures, small changes to discussio

    Principled Flow Tracking in IoT and Low-Level Applications

    Get PDF
    Significant fractions of our lives are spent digitally, connected to and dependent on Internet-based applications, be it through the Web, mobile, or IoT. All such applications have access to and are entrusted with private user data, such as location, photos, browsing habits, private feed from social networks, or bank details.In this thesis, we focus on IoT and Web(Assembly) apps. We demonstrate IoT apps to be vulnerable to attacks by malicious app makers who are able to bypass the sandboxing mechanisms enforced by the platform to stealthy exfiltrate user data. We further give examples of carefully crafted WebAssembly code abusing the semantics to leak user data.We are interested in applying language-based technologies to ensure application security due to the formal guarantees they provide. Such technologies analyze the underlying program and track how the information flows in an application, with the goal of either statically proving its security, or preventing insecurities from happening at runtime. As such, for protecting against the attacks on IoT apps, we develop both static and dynamic methods, while for securing WebAssembly apps we describe a hybrid approach, combining both.While language-based technologies provide strong security guarantees, they are still to see a widespread adoption outside the academic community where they emerged.In this direction, we outline six design principles to assist the developer in choosing the right security characterization and enforcement mechanism for their system.We further investigate the relative expressiveness of two static enforcement mechanisms which pursue fine- and coarse-grained approaches for tracking the flow of sensitive information in a system.\ua0Finally, we provide the developer with an automatic method for reducing the manual burden associated with some of the language-based enforcements

    Software Engineering Laboratory (SEL) programmer workbench phase 1 evaluation

    Get PDF
    Phase 1 of the SEL programmer workbench consists of the design of the following three components: communications link, command language processor, and collection of software aids. A brief description, and evaluation, and recommendations are presented for each of these three components

    Neuere Entwicklungen der deklarativen KI-Programmierung : proceedings

    Get PDF
    The field of declarative AI programming is briefly characterized. Its recent developments in Germany are reflected by a workshop as part of the scientific congress KI-93 at the Berlin Humboldt University. Three tutorials introduce to the state of the art in deductive databases, the programming language Gödel, and the evolution of knowledge bases. Eleven contributed papers treat knowledge revision/program transformation, types, constraints, and type-constraint combinations

    Reading-related skills of kindergarteners from diverse linguistic backgrounds

    Get PDF
    This study examined whether measures used to identify children at risk for reading failure are appropriate for children from different language backgrounds. Tasks assessing literacy and phonological and language processing at the beginning and end of kindergarten were administered to 540 native English speakers (NS), 59 bilingual children (BL), and 60 children whose initial exposure to English was when they began school (ESL). Although the BL and ESL children performed more poorly than the NS children on most measures of phonological and linguistic processing, the acquisition of basic literacy skills for children with different language backgrounds developed in a similar manner. Furthermore, planned contrasts between the language groups did not explain the variance in the children’s literacy performance in May. Instead, alphabetic knowledge and phonological processing were important contributors to early reading skill. Therefore, children learning English may acquire literacy skills in English in a similar manner to NS children, although their alphabetic knowledge may precede and facilitate the acquisition of phonological awareness in English
    • …
    corecore