60 research outputs found
Radicular cyst associated with a primary first molar: A case report
Radicular cysts arising from deciduous teeth are rare. This report presents a case of radicular cyst associated with a primary molar following pulp therapy and discusses the relationship between pulp therapy and the rapid growth of the cyst. The treatment consisted of enucleation of the cyst sac and extraction of the involved primary teeth and 20 months follow up of the patient. Early diagnosis of the lesion would have lead to a less aggressive treatment plan
A Simulated Annealing method to solve a generalized maximal covering location problem
The maximal covering location problem (MCLP) seeks to locate a predefined number of facilities in order to maximize the number of covered demand points. In a classical sense, MCLP has three main implicit assumptions: all or nothing coverage, individual coverage, and fixed coverage radius. By relaxing these assumptions, three classes of modelling formulations are extended: the gradual cover models, the cooperative cover models, and the variable radius models. In this paper, we develop a special form of MCLP which combines the characteristics of gradual cover models, cooperative cover models, and variable radius models. The proposed problem has many applications such as locating cell phone towers. The model is formulated as a mixed integer non-linear programming (MINLP). In addition, a simulated annealing algorithm is used to solve the resulted problem and the performance of the proposed method is evaluated with a set of randomly generated problems
Event-Driven Network Programming
Software-defined networking (SDN) programs must simultaneously describe
static forwarding behavior and dynamic updates in response to events.
Event-driven updates are critical to get right, but difficult to implement
correctly due to the high degree of concurrency in networks. Existing SDN
platforms offer weak guarantees that can break application invariants, leading
to problems such as dropped packets, degraded performance, security violations,
etc. This paper introduces EVENT-DRIVEN CONSISTENT UPDATES that are guaranteed
to preserve well-defined behaviors when transitioning between configurations in
response to events. We propose NETWORK EVENT STRUCTURES (NESs) to model
constraints on updates, such as which events can be enabled simultaneously and
causal dependencies between events. We define an extension of the NetKAT
language with mutable state, give semantics to stateful programs using NESs,
and discuss provably-correct strategies for implementing NESs in SDNs. Finally,
we evaluate our approach empirically, demonstrating that it gives well-defined
consistency guarantees while avoiding expensive synchronization and packet
buffering
The Regenerative Effect of Intra-Articular Injection of Autologous Fat Micro-Graft in Treatment of Chronic Knee Osteoarthritis
The study started in 2010 to find the effect of autologous fat micrograft for osteoarthritis (OA); the result was published on normal animal’s model, in 10 patients, then in 80 patients with knee osteoarthritis, and the current study in 205 patients. The study was conducted at King Abdulaziz University Hospital (January 2012–October 2015); 80 adult patients were suffering from moderate to severe knee osteoarthritis. About 10–20 mL fat micrograft was prepared with liposuction and injected intra-articularly into the affected knee/s. The results revealed that pain improvement after the fat injection during rest and with activity with the visual analogue scale. The Western Ontario and McMaster Universities Osteoarthritis Index (WOMAC) indicated improvement, both in the three domains (pain, stiffness, and physical function) and in total. The use of intra-articular autologous fat micrograft is simple, safe, and effective for degenerative knee osteoarthritis
Supplier selection and order lot sizing using dynamic programming
In this paper, we consider a multi-period integrated supplier selection and order lot sizing problem where a single buyer plans to purchase a single product in multiple periods from several qualified suppliers who are able to provide the required product with the needed quality in a timely manner. Product price and order cost differs among different suppliers. Buyer’s demand for the product is deterministic and varies for different time periods. The problem is to determine how much product from which supplier must be ordered in each period such that buyer’s demand is satisfied without violating some side constraints. We have developed a mathematical programming model to deal with this problem, and proposed a forward dynamic programming approach to obtain optimal solutions in reasonable amount of time even for large scale problems. Finally, a numerical example is conducted in which solutions obtained from the proposed dynamic programming algorithm is compared with solutions from the branch-and-bound algorithm. Through the numerical example we have shown the efficiency of our algorithm
Mobility Pattern Recognition in Mobile Ad-Hoc Networks
ABSTRACT A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. Network nodes in a mobile Ad-hoc network move in some motion patterns called mobility models. The mobility models play a very important role in determining the protocol performance in MANET. Thus, it is essential to study and analyze various mobility models and their effect on MANET protocols. If we can recognize the mobility pattern of motion of mobile nodes in our environment we can customize our network protocols to deal with that existing mobility model. In this paper we introduce a new method for classification and pattern recognition of mobility traces into mobility models in mobile Adhoc networks. This method uses a simple learning based classification method to recognize the existing mobility model in raw mobility traces which was collected from real motion of mobile Ad-hoc nodes or mobility traces generated by mobility simulators. Our simulation results prove ability of our proposed method to accurately classify given unknown mobility traces into various mobility models
VNToR: Network Virtualization at the Top-of-Rack Switch
Cloud providers typically implement abstractions for net- work virtualization on the server, within the operating sys- tem that hosts the tenant virtual machines or containers. Despite being flexible and convenient, this approach has funda- mental problems: incompatibility with bare-metal support, unnecessary performance overhead, and susceptibility to hypervisor breakouts. To solve these, we propose to offload the implementation of network-virtualization abstractions to the top-of-rack switch (ToR). To show that this is feasible and beneficial, we present VNToR, a ToR that takes over the implementation of the security-group abstraction. Our prototype combines commodity switching hardware with a custom software stack and is integrated in OpenStack Neutron. We show that VNToR can store tens of thousands of access rules, adapts to traffic-pattern changes in less than a millisecond, and significantly outperforms the state of the art
Pim1 maintains telomere length in mouse cardiomyocytes by inhibiting TGF beta signalling
Aims Telomere attrition in cardiomyocytes is associated with decreased contractility, cellular senescence, and upregulation of proapoptotic transcription factors. Pim1 is a cardioprotective kinase that antagonizes the aging phenotype of cardiomyocytes and delays cellular senescence by maintaining telomere length, but the mechanism remains unknown. Another pathway responsible for regulating tetomere length is the transforming growth factor beta (TGF beta) signalling pathway where inhibiting TGF beta signalling maintains telomere Length. The relationship between Pim1 and TGF beta has not been explored. This study delineates the mechanism of telomere length regulation by the interplay between Pim1 and components of TGF beta signalling pathways in proliferating A549 cells and post-mitotic cardiomyocytes.Methods and results Telomere length was maintained by lentiviral-mediated overexpression of PIM1 and inhibition of TGF beta signalling in re A549 cells. Telomere length maintenance was further demonstrated in isolated cardiomyocytes from mice with cardiac-specific overexpression of PIM1 and by pharmacological inhibition of TGF beta signalling. Mechanistically, Pim1 inhibited phosphorylation of Smad2, preventing its translocation into the nucleus and repressing expression of TGF beta pathway genes.Conclusion Pim1 maintains tetomere lengths in cardiomyocytes by inhibiting phosphorylation of the TGF beta pathway downstream effectors Smad2 and Smad3, which prevents repression of telomerase reverse transcriptase. Findings from this study demonstrate a novel mechanism of telomere length maintenance and provide a potential target for preserving cardiac function.[GRAPHICS].Therapeutic cell differentiatio
Investigation of plant extracts for antimicrobial activity
Available from British Library Document Supply Centre-DSC:DXN015460 / BLDSC - British Library Document Supply CentreSIGLEGBUnited Kingdo
- …