2,503 research outputs found

    Accuracy and precision of an intraoral scanner in complex prosthetic rehabilitations: an in vitro study

    Get PDF
    The main purpose of this study is to measure the accuracy and the precision of the intraoral optical scanner CS3500® (Carestream Dental LLC, Atlanta, USA) in complex clinical situations as full arch rehabilitations on impl ants. 50 scans of the acrylic resin model were performed by using CS3500® (Carestream Dental LLC, Atlanta, USA) scanner. Each scan was compared with the virtual model derived from scanning with the laboratory scanner Dscan3® (Enhanced Geometry Soluti on, Bologna, Italy) to measure a possible misalignment. The alignment error was found to be 79,6 ( ± 12,87)  m. The measurement was taken at the level of 2 distal scan - abutments. The scanner's precision ranges from 24 to 52  m , depending on the dist ance between scan - abutment. CS3500® (Carestream Dental LLC, Atlanta, USA) intraoral scanner has detected a valid device in the execution of complex rehabilitations on implants. His accuracy and precision values fall within the range established in li terature to define acceptable the prosthetic fitting on full arch implant rehabilitation

    O tema água em livros didáticos de ciências e questões controversas

    Get PDF
    Entre os temas relacionados à temática ambiental o tema água tem sido enfatizado nos currículos escolares e tem sido explorado pelos livros didáticos. A água tem inúmeros significados tanto em relação a sua importância como um elemento natural quanto em seus sentidos simbólicos para diferentes sociedades. Essa multiplicidade de contextos e significados caracterizam este tema como controverso. Os temas controversos são apontados como possibilidades instigantes para o trabalho em sala de aula. Partindo desses pressupostos, o objetivo dessa investigação foi o de procurar identificar se estes materiais didáticos abordam controvérsias relacionadas com este tema. A análise temática realizada nos indicou que dentre todos os temas relacionados à água, somente os conteúdos ligados a construção de barragens eram abordados a partir da perspectiva dos temas controversos

    Polynomial multiplication over binary finite fields : new upper bounds

    Get PDF
    When implementing a cryptographic algorithm, efficient operations have high relevance both in hardware and in software. Since a number of operations can be performed via polynomial multiplication, the arithmetic of polynomials over finite fields plays a key role in real-life implementations\u2014e.g., accelerating cryptographic and cryptanalytic software (pre- and post-quantum) (Chou in Accelerating pre-and post-quantum cryptography. Ph.D. thesis, Technische Universiteit Eindhoven, 2016). One of the most interesting papers that addressed the problem has been published in 2009. In Bernstein (in: Halevi (ed) Advances in Cryptology\u2014CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16\u201320, 2009. Proceedings, pp 317\u2013336. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009), Bernstein suggests to split polynomials into parts and presents a new recursive multiplication technique which is faster than those commonly used. In order to further reduce the number of bit operations (Bernstein in High-speed cryptography in characteristic 2: minimum number of bit operations for multiplication, 2009. http://binary.cr.yp.to/m.html) required to multiply n-bit polynomials, researchers adopt different approaches. In CMT: Circuit minimization work. http://www.cs.yale.edu/homes/peralta/CircuitStuff/CMT.html a greedy heuristic has been applied to linear straight-line sequences listed in Bernstein (High-speed cryptography in characteristic 2: minimum number of bit operations for multiplication, 2009. http://binary.cr.yp.to/m.html). In 2013, D\u2019angella et al. (Applied computing conference, 2013. ACC\u201913. WEAS. pp. 31\u201337. WEAS, 2013) skip some redundant operations of the multiplication algorithms described in Bernstein (in: Halevi (ed) Advances in Cryptology\u2014CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16\u201320, 2009. Proceedings, pp 317\u2013336. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009). In 2015, Cenk et al. (J Cryptogr Eng 5(4):289\u2013303, 2015) suggest new multiplication algorithms. In this paper, (a) we present a \u201ck-1\u201d-level recursion algorithm that can be used to reduce the effective number of bit operations required to multiply n-bit polynomials, and (b) we use algebraic extensions of F 2 combined with Lagrange interpolation to improve the asymptotic complexity
    corecore