31 research outputs found

    Smear Layer Removal from the Apical Third Using the Er,Cr:YSGG Photon-induced Photoacoustic Streaming

    Get PDF
    Introduction: The purpose was to study the influence of Erbium,Chromium:Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration on smear layer removal from apical root third. Materials and Methods: Twenty-four single-rooted mandibular premolars were used. The roots length was cut to 14 mm and instrumented using the Protaper Gold system to size 40/0.06. The samples were divided into four groups (n=6) as follows: (A) conventional irrigation with 5 mL of 17% Ethylenediaminetetraacetic acid ( EDTA), (B) passive ultrasonic irrigation with 5mL of 17% EDTA, (C) Er,Cr:YSGG induced photoacoustic streaming (PIPS) with 5 mL of 17% EDTA and (D)Er,Cr: YSGG induced PIPS with 5 mL of 5.25% sodium hypochlorite (NaOCl). After final irrigation with normal saline and drying, the roots were painted with nail varnish externally, and 2%methylene blue dye was injected into the canal. The tooth split horizontally at the fourth millimetres. The picture was taken by a professional Digital SLR camera. The dye penetration was measured using analytical software (measure picture CAD-KAS Kessler Germany). Dunnett's test was used to compare control group against experimental groups. Results: After the statistical test, the highest mean percentage was presented in the laser group with 17% EDTA (Group C=85.9804) followed by the laser group with 5.25% NaOCl (Group D=69.7817) and ultrasonic group (Group B=34.5453) respectively and the lowest mean percentage was in the control group (Group A=20.7969). Conclusion: Based on this in vitro study, PIPS technique using Er,Cr:YSGG pulse laser (0.5 W,5 Hz, air and water off) at short pulse duration and 17% EDTA proved effectively in smear layer removal, while the PIPS proved an acceptable result when the laser is used alone assisted by NaOCl

    On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things:Current Solutions and Future Directions

    Get PDF
    The Internet of Things (IoT) is gaining ground as a pervasive presence around us by enabling miniaturized things with computation and communication capabilities to collect, process, analyze, and interpret information. Consequently, trustworthy data act as fuel for applications that rely on the data generated by these things, for critical decision-making processes, data debugging, risk assessment, forensic analysis, and performance tuning. Currently, secure and reliable data communication in IoT is based on public-key cryptosystems such as Elliptic Curve Cryptosystem (ECC). Nevertheless, reliance on the security of de-facto cryptographic primitives is at risk of being broken by the impending quantum computers. Therefore, the transition from classical primitives to quantum-safe primitives is indispensable to ensure the overall security of data en route. In this paper, we investigate applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era. We give a succinct overview of the evolution of HBS schemes with emphasis on their construction parameters and associated strengths and weaknesses. Then, we outline the striking features of HBS schemes and their significance for the IoT security in the quantum era. We investigate the optimal selection of HBS in the IoT networks with respect to their performance-constrained requirements, resource-constrained nature, and design optimization objectives. In addition to ongoing standardization efforts, we also highlight current and future research and deployment challenges along with possible solutions. Finally, we outline the essential measures and recommendations that must be adopted by the IoT ecosystem while preparing for the quantum world.Comment: 18 pages, 7 tables, 7 figure

    Orchestrating product provenance story:When IOTA ecosystem meets electronics supply chain space

    Get PDF
    "Trustworthy data" is the fuel for ensuring transparent traceability, precise decision-making, and cogent coordination in the supply chain (SC) space. However, the disparate data silos act as a trade barrier in orchestrating the provenance of product story starting from the transformation of raw materials into the circuit board to the assembling of electronic components into end products available on the store shelf for customers. Therefore, to bridge the fragmented siloed information across global supply chain partners, the diffusion of blockchain (BC) as one of the advanced distributed ledger technology (DLT) takeover the on-premise legacy systems. Nevertheless, the challenging constraints of blockchain including scalability, accessing off-line data, fee-less microtransactions and many more lead to the third wave of blockchain called IOTA. In this paper, we propose a framework for supporting provenance in the electronic supply chain (ECS) by using permissioned IOTA ledger. Realizing the crucial requirement of trustworthy data, we use Masked Authenticated Messaging (MAM) channel provided by IOTA that allows the SC players to procure distributed information while keeping confidential trade flows, tamper-proof data, and fine-grained accessibility rights. To identify operational disruption, we devise a transparent product ledger through transaction data and consignment information to keep track of the complete product journey at each intermediary step during SC processes. Furthermore, we evaluate the secure provenance data construction time for varying payload size.Comment: 47 pages, 18 figure

    Blockchain-based Digital Twins:Research Trends, Issues, and Future Challenges

    Get PDF
    Industrial processes rely on sensory data for decision-making processes, risk assessment, and performance evaluation. Extracting actionable insights from the collected data calls for an infrastructure that can ensure the dissemination of trustworthy data. For the physical data to be trustworthy, it needs to be cross validated through multiple sensor sources with overlapping fields of view. Cross-validated data can then be stored on the blockchain, to maintain its integrity and trustworthiness. Once trustworthy data is recorded on the blockchain, product lifecycle events can be fed into data-driven systems for process monitoring, diagnostics, and optimized control. In this regard, digital twins (DTs) can be leveraged to draw intelligent conclusions from data by identifying the faults and recommending precautionary measures ahead of critical events. Empowering DTs with blockchain in industrial use cases targets key challenges of disparate data repositories, untrustworthy data dissemination, and the need for predictive maintenance. In this survey, while highlighting the key benefits of using blockchain-based DTs, we present a comprehensive review of the state-of-the-art research results for blockchain-based DTs. Based on the current research trends, we discuss a trustworthy blockchain-based DTs framework. We also highlight the role of artificial intelligence in blockchain-based DTs. Furthermore, we discuss the current and future research and deployment challenges of blockchain-supported DTs that require further investigation.</p

    Resumes vs. application forms: Why the stubborn reliance on resumes?

    Get PDF
    The focus of this Perspective article is on the comparison of two of the most popular initial applicant screening methods: Resumes and application forms. The viewpoint offered is that application forms are superior to resumes during the initial applicant screening stage of selection. This viewpoint is supported in part based on criterion-related validity evidence that favors application forms over resumes. For example, the biographical data (biodata) inventory, which can contain similar questions to those used in application forms, is one of the most valid predictors of job performance (if empirically keyed), whereas job experience and years of education, which are often inferred from resumes and cover letters, are two of the least valid predictors of job performance (among commonly used screening criteria). In addition to validity evidence, making decisions based on application forms as opposed to resumes is likely to help organizations defend against claims of discriminatory hiring while enhancing their ability to hire in a more diverse, equitable, and inclusive manner. For example, applicant names on resumes can lead to screening bias against members of identifiable subgroups, whereas an applicant’s name can be easily and automatically hidden from decision-makers when reviewing application forms (particularly digital application forms). Despite these convincing arguments focused on applicant quality and diversity, a substantial research–practice gap regarding the use of resumes and cover letters remains

    Role of anti-inflammatory interleukin 10 in asymptomatic heartworm infection (Dirofilariasis) in dogs

    Get PDF
    Background: Dirofilaria immitis causes heartworm disease (HWD), a vector-borne zoonotic disease that primarily affects dogs and cats. Occasionally, human beings were reported to be infected as well. The current study aims to discover the asymptomatic dirofilariasis infection in dogs. In addition, to determine the prevalence of heartworm disease and the role of anti-inflammatory interleukin 10 (IL10) in developing the disease. Household dogs were selected from 10 veterinary clinics throughout Basrah, south of Iraq.Methods: The study included 117 dogs older than 12 months, none of them had received heartworm vaccinations, and all of them lived in their owners’ houses for at least 9 months. Animal ethics instructions were followed after the owner’s consent was obtained.  Physical and biochemical examinations were conducted including the examination of circulating antigens of microfilaria. The levels of anti-inflammatory IL10 and pro-inflammatory IL17, IL4, and IFN-γ were measured using ELISA tests. Descriptive statistics were used to evaluate the prevalence and the clinical and immunological results of the study.Results: Canine heartworm disease prevalence was 29.05% (34 out of 117). The physical examination showed normal vital signs for both infected and non-infected dogs. A significant elevation in the total WBC count was noticed in the infected group.  On the other hand, a significant decrease in RBCs count and hemoglobin was found in the infected group. There were neither changes in the platelet count nor the liver enzymes concentration between infected and non-infected groups.  A significant increase in anti-inflammatory interleukin 10 level and a significant decrease in pro-inflammatory IL17, IL4, and IFN-γ were noticed in the infected dogs. Conclusion: It is concluded that dirofilariasis infection is considered to be a serious life-threatening disease for dogs in Iraq. Therefore, a periodic test for heartworm infection every six months is recommended to eradicate heartworm infestations. The infected animals must be treated according to the American Heartworm Association recommendations

    Effects of a Neutral Response Option on Occupational Interest Circumplex Fit

    No full text
    Introduction: The purpose of this study was to compare the structural validity of Holland’s circular/hexagonal model in two versions of a commonly used RIASEC occupational interest measure—one that used items with a neutral response option (“unsure”) and one that used items without a neutral response option. Method: These comparisons were made using a sample of 1,025 undergraduate university business majors. A two-group Cosine Function Model (CFM) implemented in standard structural equation modeling (SEM) software was used to investigate the circumplex fit across the two versions of the assessment. Results: CFM analyses suggested a high level of equivalence across versions such that: (1) the correlation matrix of each group shows a good fit to the RIASEC circumplex, and (2) the two correlation matrices are essentially identical
    corecore