Search results for: endodontic files
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 261

Search results for: endodontic files

261 Nickel-Titanium Endodontic Instruments: The Evolution

Authors: Fadwa Chtioui

Abstract:

The field of endodontics has witnessed constant advancements in treatment methods and instrument design, particularly for nickel-titanium (NiTi) files. Despite these developments, it remains crucial for clinicians to have a thorough understanding of their characteristics and behavior to choose the appropriate instruments for different clinical and anatomical situations. Research Aim: The aim of this work is to study and discuss the impact of heat treatment developments on the properties of endodontic NiTi files, with the ultimate goal of providing ways to adapt these files to the anatomical features of dental roots. Methodology: This study involves both clinical cases and extensive bibliographic research. Findings: The study highlights the importance of heat treatment in the design and manufacture of NiTi files, as it significantly affects their physical and mechanical properties. It also provides insights into the ways in which NiTi files can be adapted to the complex geometries of dental roots for more effective endodontic treatments. Theoretical Importance: Theoretical implications of this study include a better understanding of the relationship between heat treatment and the properties of NiTi files, leading to improvements in both their manufacturing methods and clinical applications. Data Collection and Analysis Procedures: The data for this study was collected through clinical cases and an extensive review of relevant literature. Analysis was performed through qualitative and quantitative methods, examining the impact of heat treatment on the physical and mechanical properties of NiTi files. Questions Addressed: This study aims to answer questions concerning the properties of NiTi files and the impact of heat treatment on their behavior. It also seeks to examine ways in which these files can be adapted to complex dental root geometries for more effective endodontic treatments. Conclusion: In conclusion, this study emphasizes the importance of heat treatment in the design and manufacture of NiTi files, as it significantly impacts their physical and mechanical properties. Further research is necessary to explore additional methods for adapting NiTi files to the unique anatomies of dental roots to improve endodontic treatments further. Ultimately, this study provides valuable insights into the continued evolution of endodontic treatment and instrument design.

Keywords: endodontic files, nickel-titanium, tooth anatomy, heat treatment

Procedia PDF Downloads 70
260 Persistent Bacteremia in Cases of Endodontic Re-Treatments

Authors: Ilma Robo, Manola Kelmendi, Kleves Elezi, Nevila Alliu

Abstract:

The most important stage in deciding whether to re-treat or not endodontically is to find the reason for the clinical in-success. Therefore, endodontic re-treatment aims to eliminate the etiology of the pathology, where the main ones are the bacteria remaining in the inter-radicular spaces or the presence of other irritants that can be not only bacterial toxins but also the elements that keep the batteries fixed or extra-canal toxins such as extraction outside the apex of the canal filling. Shortcomings of endodontic treatment can be corrected, if possible, only with endodontic re-treatment that is initially attempted orthograde, and if clinical endodontic success is not achieved again, it can be performed retrograde or surgically. The elements that do not help in this direction are the anatomical deformations in the canal network of the tooth roots, in the presence of the delta at the apex of the tooth root, in the isthmuses present, all of which can be explained by the endodontic canal anatomical morphology. Actually, even if the causative endodontic bacteria remains isolated and without an exit in the healthy periodontal tissues, then this can also be a clinical endodontic success, regardless of the fact that the endodontic isolation occurred only in the exits such as the apex or the accessory canals. Clinical endodontic in-success occurs only when bacterial residues emerge or provide an exit in the healthy periradicular tissues or along the entire length of the canal where the accessory canals exit.

Keywords: endodontic success, E. foecalis, nanoparticles, laser diode, antibacterial, antiseptic

Procedia PDF Downloads 49
259 Endodontic Pretreatments, Clinical Opportunities and Challenges

Authors: Ilma Robo, Manola Kelmendi, Saimir Heta, Megi Tafa, Vera Ostreni

Abstract:

Preservation of a natural tooth, even if endodontically treated, is more indicated than its replacement with an artificial tooth placed in prosthetic ways or with implant treatment. It is known how technology and endodontic treatment procedures have evolved significantly. It is also known that significant developments have been made in both dental prostheses and implant treatments, and again, in both specialties, it is emphasized that both the tooth placed with dental prostheses and the tooth placed with implant treatment cannot replace the natural tooth. The issue is whether long-term periapical tissue healing is achieved after a successful endodontic treatment, and for this, clinical data should be collected. In the cases when the apical closure or "apical filling" with the endodontic filling was carried out correctly clinically, but for various reasons, the healing of the periapical tissues did not occur, but also for those cases when the endodontic treatment did not reach the "apical filling" of the root canal. Teeth Endodontic retreatments have their clinical difficulty, but knowing the reason why endodontic treatment success has not been achieved clinically, the clinical endodontic approach is easier. In this process, it is important for the dentist to recognize the clinical and radiographic signs of persistent apical periodontitis or renewed apical periodontitis. After this initial procedure, dentists must know and evaluate the possibility of clinical endodontic retreatment by reporting, not precisely, but with very approximate values, the percentage of clinical success of endodontic retreatment. Depending on the reason for the performance, endodontic re-treatment may also need more specialized equipment or tools, for which even the professional who undertakes the re-treatment must be equipped with the relevant knowledge of their use and clinical application. Evaluating the clinical success of endodontic re-treatment is actually a more difficult process and requires more clinical responsibility since it must be considered that the initial treatment was performed by the same specialist as the specialist who undertakes the same endodontic re-treatment. Tooth So, the clinical endodontic re-treatment of a tooth should not be seen as a fund of clinical practice only of a good successful endodontist, but as part of routine endodontic treatments, nor should it be seen as a typical case where the tools and the most advanced technological devices in the endodontic field. So, the clinical picture of endodontic re-treatments offers the possibility of finding endodontic malpractice, the possibility of more accurate assessment of dental morphological anomalies, and above all, the cognitive and professional possibilities of the diagnosis of persistent apical periodontitis. This study offers the possibility of evaluating these three directions by presenting in numbers and in percentage the frequency of the reasons why the endodontic success of the root canal treatment is not always achieved.

Keywords: apical periodontitis, clinical susccess, endodontics, E.faecalis

Procedia PDF Downloads 6
258 Dental Students’ Self-Assessment of Their Performance in a Preclinical Endodontic Practice

Authors: Minseock Seo

Abstract:

Dental education consists of both theoretical and practical learning for students. When dental students encounter practical courses as a new educational experience, they must also learn to evaluate themselves. The aim of this study was to investigate the self-assessment scores of third-year dental students and compare with the scores graded by the faculty in preclinical endodontic practice in a dental school in Korea. Faculty- and student-assigned scores were calculated from preclinical endodontic practice performed on phantom patients. The students were formally instructed on grading procedures for endodontic treatment. After each step, each item was assessed by the student. The students’ self-assessment score was then compared to the score by the faculty. The students were divided into 4 groups by analyzing the scores of self-assessment and faculty-assessment and statistically analyzed by summing the theoretical and practical examination scores. In the theoretical exam score, the group who over-estimated their performance (H group) was lower than the group with lower evaluation (L group). When comparing the first and last score determined by the faculty, H groups didn’t show any improvement, while the other group did. In H group, the less improvement of the self-assessment, the higher the theoretical exam score. In L group, the higher improvement of the self-assessment, the better the theoretical exam score. The results point to the need to develop students’ self-insight with more exercises and practical training.

Keywords: dental students, endodontic, preclinical practice, self-assessment

Procedia PDF Downloads 253
257 Comparative Evaluation of a Dynamic Navigation System Versus a Three-Dimensional Microscope in Retrieving Separated Endodontic Files: An in Vitro Study

Authors: Mohammed H. Karim, Bestoon M. Faraj

Abstract:

Introduction: instrument separation is a common challenge in the endodontic field. Various techniques and technologies have been developed to improve the retrieval success rate. This study aimed to compare the effectiveness of a Dynamic Navigation System (DNS) and a three-dimensional microscope in retrieving broken rotary NiTi files when using trepan burs and the extractor system. Materials and Methods: Thirty maxillary first bicuspids with sixty separate roots were split into two comparable groups based on a comprehensive Cone-Beam Computed Tomography (CBCT) analysis of the root length and curvature. After standardised access opening, glide paths, and patency attainment with the K file (sizes 10 and 15), the teeth were arranged on 3D models (three per quadrant, six per model). Subsequently, controlled-memory heat-treated NiTi rotary files (#25/0.04) were notched 4 mm from the tips and fractured at the apical third of the roots. The C-FR1 Endo file removal system was employed under both guidance to retrieve the fragments, and the success rate, canal aberration, treatment time and volumetric changes were measured. The statistical analysis was performed using IBM SPSS software at a significance level of 0.05. Results: The microscope-guided group had a higher success rate than the DNS guidance, but the difference was insignificant (p > 0.05). In addition, the microscope-guided drills resulted in a substantially lower proportion of canal aberration, required less time to retrieve the fragments and caused a minor change in the root canal volume (p < 0.05). Conclusion: Although dynamically guided trephining with the extractor can retrieve separated instruments, it is inferior to three-dimensional microscope guidance regarding treatment time, procedural errors, and volume change.

Keywords: dynamic navigation system, separated instruments retrieval, trephine burs and extractor system, three-dimensional video microscope

Procedia PDF Downloads 98
256 Endodontics Flare-Up

Authors: Khalid Mohammed Idrees

Abstract:

Endodontic treatment aims to reverse the disease process and thereby eliminate the associated signs of symptoms. When the treatment itself appears to initiate the onset of pain and /or swelling (endodontic flare-up), the result can be distressing to both the patient and the operator. Patient might even consider postoperative symptoms as a bench mark against which the clinician’s skills are measured. Obviously the treatment with the lowest prevalence of postoperative pain is usually the treatment of choice as long as effectiveness and cost are not compromised. Knowledge of the cause and mechanism behind intra appointment flare-up is of utmost importance for the clinician to properly prevent or manage this undesirable condition. This review lecture will discuss the causative factors of flare-up with special attention to the microorganism role, various modalities of preventive measures would be discussed. Those measures are based on scientific evidence combined with the long clinical experience of the lecturer.

Keywords: endodontic flare-up, causative factors, inflammatory mediators, preventive measures

Procedia PDF Downloads 134
255 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 414
254 A Novel Co-Culture System for the Cementoblastic Differentiation of SHED

Authors: Manal Farea, Adam Husein, Ahmad S. Halim, Zurairah Berahim, Nurul A. Abdullah, Khairani I. Mokhtar, Kasmawati Mokhtar

Abstract:

Endodontic furcal perforation remains both an endodontic and a periodontal problem. Regeneration of cementum is very essential for the perforation repair. The aim of this study was to investigate the role of Hertwig's epithelial root sheath (HERS) cells on the cementogenic differentiation of stem cells derived from human exfoliated deciduous teeth (SHED) in the presence of chitosan scaffold-TGFβ1. HERS cells were isolated and characterized then co-cultured with SHED with/without chitosan scaffold-TGFβ1. SHED proliferation was assessed by PrestoBlue. Alkaline phosphatase activity, mineralization behaviour and gene/protein expression of cemento/osteoblast phenotype of SHED were evaluated. Results of the present study showed that HERS cells in association with chitosan-TGFβ1 enhanced proliferation and cemento/osteogenic differentiation of SHED. Our novel co-culture system confirmed the potential effect of HERS cells to stimulate the differentiation of SHED along the cementoblastic lineage which was triggered in the presence of chitosan-TGFβ1. This approach possesses a novel therapeutic strategy for future endodontic perforation and periodontitis.

Keywords: cementogenesis, co-culture system, HERS, SHED

Procedia PDF Downloads 542
253 Comparative Evaluation of a Dynamic Navigation System Versus a Three-Dimensional Microscope in Retrieving Separated Endodontic Files: An in Vitro Study

Authors: Mohammed H. Karim, Bestoon M. Faraj

Abstract:

Introduction: This study aimed to compare the effectiveness of a Dynamic Navigation System (DNS) and a three-dimensional microscope in retrieving broken rotary NiTi files when using trepan burs and the extractor system. Materials and Methods: Thirty maxillary first bicuspids with sixty separate roots were split into two comparable groups based on a comprehensive Cone-Beam Computed Tomography (CBCT) analysis of the root length and curvature. After standardized access opening, glide paths, and patency attainment with the K file (sizes 10 and 15), the teeth were arranged on 3D models (three per quadrant, six per model). Subsequently, controlled-memory heat-treated NiTi rotary files (#25/0.04) were notched 4 mm from the tips and fractured at the apical third of the roots. The C-FR1 Endo file removal system was employed under both guidance to retrieve the fragments, and the success rate, canal aberration, treatment time and volumetric changes were measured. The statistical analysis was performed using IBM SPSS software at a significance level of 0.05. Results: The microscope-guided group had a higher success rate than the DNS guidance, but the difference was insignificant (p > 0.05). In addition, the microscope-guided drills resulted in a substantially lower proportion of canal aberration, required less time to retrieve the fragments and caused minimal change in the root canal volume (p < 0.05). Conclusion: Although dynamically guided trephining with the extractor can retrieve separated instruments, it is inferior to three-dimensional microscope guidance regarding treatment time, procedural errors, and volume change.

Keywords: separated instruments retrieval, dynamic navigation system, 3D video microscope, trephine burs, extractor

Procedia PDF Downloads 69
252 A Comprehensive Methodology for Voice Segmentation of Large Sets of Speech Files Recorded in Naturalistic Environments

Authors: Ana Londral, Burcu Demiray, Marcus Cheetham

Abstract:

Speech recording is a methodology used in many different studies related to cognitive and behaviour research. Modern advances in digital equipment brought the possibility of continuously recording hours of speech in naturalistic environments and building rich sets of sound files. Speech analysis can then extract from these files multiple features for different scopes of research in Language and Communication. However, tools for analysing a large set of sound files and automatically extract relevant features from these files are often inaccessible to researchers that are not familiar with programming languages. Manual analysis is a common alternative, with a high time and efficiency cost. In the analysis of long sound files, the first step is the voice segmentation, i.e. to detect and label segments containing speech. We present a comprehensive methodology aiming to support researchers on voice segmentation, as the first step for data analysis of a big set of sound files. Praat, an open source software, is suggested as a tool to run a voice detection algorithm, label segments and files and extract other quantitative features on a structure of folders containing a large number of sound files. We present the validation of our methodology with a set of 5000 sound files that were collected in the daily life of a group of voluntary participants with age over 65. A smartphone device was used to collect sound using the Electronically Activated Recorder (EAR): an app programmed to record 30-second sound samples that were randomly distributed throughout the day. Results demonstrated that automatic segmentation and labelling of files containing speech segments was 74% faster when compared to a manual analysis performed with two independent coders. Furthermore, the methodology presented allows manual adjustments of voiced segments with visualisation of the sound signal and the automatic extraction of quantitative information on speech. In conclusion, we propose a comprehensive methodology for voice segmentation, to be used by researchers that have to work with large sets of sound files and are not familiar with programming tools.

Keywords: automatic speech analysis, behavior analysis, naturalistic environments, voice segmentation

Procedia PDF Downloads 281
251 Antibiotic Treatment of Apical Periodontitis

Authors: Ilma Robo, Saimir Heta, Gerhard Nokaj

Abstract:

Introduction: The method of treatment and the treatment protocols of apical periodontitis are now known, but the ongoing debate remains on whether or not prescription antibiotics should be given to patients suffering from this type of pathology. In fact, as an indication for prescribing antibiotics, this type of pathology remains between clinical indication and contraindication. Material and Methods: This article is of the short-communication type and has the sole purpose of analyzing the clinical picture of apical periodontitis and the fact that the appearance and extent of this pathology in the periapex area passes the stage when the host or the immune cells of the organism of the affected individual, react against bacterial factors. Results: Determining whether or not to prescribe systemic antibiotics according to literature sources can be avoided. In some cases, research in this field about this pathology even indicates endodontic rinsers or irrigants, such as chlorhexidine, in typical cases, mainly in persistent apical periodontitis. Conclusions: In times when bacterial resistance is a hot topic in some fields of scientific research, it is important to divide dental pathologies of bacterial origin into those when systemic antibiotic prescriptions must be given and those when every clinical issue is resolved only with endodontic root canal treatment. Even certain sources of published literature show the specifics of the most effective antibiotics against the bacterial flora causing the pathology of apical periodontitis.

Keywords: endodontic treatment, apical periodontitis, antibiotics, chlorhexidine

Procedia PDF Downloads 69
250 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 383
249 Accuracy of Small Field of View CBCT in Determining Endodontic Working Length

Authors: N. L. S. Ahmad, Y. L. Thong, P. Nambiar

Abstract:

An in vitro study was carried out to evaluate the feasibility of small field of view (FOV) cone beam computed tomography (CBCT) in determining endodontic working length. The objectives were to determine the accuracy of CBCT in measuring the estimated preoperative working lengths (EPWL), endodontic working lengths (EWL) and file lengths. Access cavities were prepared in 27 molars. For each root canal, the baseline electronic working length was determined using an EAL (Raypex 5). The teeth were then divided into overextended, non-modified and underextended groups and the lengths were adjusted accordingly. Imaging and measurements were made using the respective software of the RVG (Kodak RVG 6100) and CBCT units (Kodak 9000 3D). Root apices were then shaved and the apical constrictions viewed under magnification to measure the control working lengths. The paired t-test showed a statistically significant difference between CBCT EPWL and control length but the difference was too small to be clinically significant. From the Bland Altman analysis, the CBCT method had the widest range of 95% limits of agreement, reflecting its greater potential of error. In measuring file lengths, RVG had a bigger window of 95% limits of agreement compared to CBCT. Conclusions: (1) The clinically insignificant underestimation of the preoperative working length using small FOV CBCT showed that it is acceptable for use in the estimation of preoperative working length. (2) Small FOV CBCT may be used in working length determination but it is not as accurate as the currently practiced method of using the EAL. (3) It is also more accurate than RVG in measuring file lengths.

Keywords: accuracy, CBCT, endodontics, measurement

Procedia PDF Downloads 308
248 Python Implementation for S1000D Applicability Depended Processing Model - SALERNO

Authors: Theresia El Khoury, Georges Badr, Amir Hajjam El Hassani, Stéphane N’Guyen Van Ky

Abstract:

The widespread adoption of machine learning and artificial intelligence across different domains can be attributed to the digitization of data over several decades, resulting in vast amounts of data, types, and structures. Thus, data processing and preparation turn out to be a crucial stage. However, applying these techniques to S1000D standard-based data poses a challenge due to its complexity and the need to preserve logical information. This paper describes SALERNO, an S1000d AppLicability dEpended pRocessiNg mOdel. This python-based model analyzes and converts the XML S1000D-based files into an easier data format that can be used in machine learning techniques while preserving the different logic and relationships in files. The model parses the files in the given folder, filters them, and extracts the required information to be saved in appropriate data frames and Excel sheets. Its main idea is to group the extracted information by applicability. In addition, it extracts the full text by replacing internal and external references while maintaining the relationships between files, as well as the necessary requirements. The resulting files can then be saved in databases and used in different models. Documents in both English and French languages were tested, and special characters were decoded. Updates on the technical manuals were taken into consideration as well. The model was tested on different versions of the S1000D, and the results demonstrated its ability to effectively handle the applicability, requirements, references, and relationships across all files and on different levels.

Keywords: aeronautics, big data, data processing, machine learning, S1000D

Procedia PDF Downloads 156
247 Evaluation of Dynamic Log Files for Different Dose Rates in IMRT Plans

Authors: Saad Bin Saeed, Fayzan Ahmed, Shahbaz Ahmed, Amjad Hussain

Abstract:

The aim of this study is to evaluate dynamic log files (Dynalogs) at different dose rates by dose-volume histograms (DVH) and used as a (QA) procedure of IMRT. Seven patients of phase one head and neck cancer with similar OAR`s are selected randomly. Reference plans of dose rate 300 and 600 MU/Min with prescribed dose of 50Gy in 25 fractions for each patient is made. Dynalogs produced by delivery of reference plans processed by in-house MATLAB program which produces new field files contain actual positions of multi-leaf collimators (MLC`s) instead of planned positions in reference plans. Copies of reference plans are used to import new field files generated by MATLAB program and renamed as Dyn.plan. After dose calculations of Dyn.plans for different dose rates, DVH, and multiple linear regression tools are used to evaluate reference and Dyn.plans. The results indicate good agreement of correlation between different dose rate plans. The maximum dose difference among PTV and OAR`s are found to be less than 5% and 9% respectively. The study indicates the potential of dynalogs to be used as patient-specific QA of IMRT at different dose rate.

Keywords: IMRT, dynalogs, dose rate, DVH

Procedia PDF Downloads 535
246 Barnard Feature Point Detector for Low-Contractperiapical Radiography Image

Authors: Chih-Yi Ho, Tzu-Fang Chang, Chih-Chia Huang, Chia-Yen Lee

Abstract:

In dental clinics, the dentists use the periapical radiography image to assess the effectiveness of endodontic treatment of teeth with chronic apical periodontitis. Periapical radiography images are taken at different times to assess alveolar bone variation before and after the root canal treatment, and furthermore to judge whether the treatment was successful. Current clinical assessment of apical tissue recovery relies only on dentist personal experience. It is difficult to have the same standard and objective interpretations due to the dentist or radiologist personal background and knowledge. If periapical radiography images at the different time could be registered well, the endodontic treatment could be evaluated. In the image registration area, it is necessary to assign representative control points to the transformation model for good performances of registration results. However, detection of representative control points (feature points) on periapical radiography images is generally very difficult. Regardless of which traditional detection methods are practiced, sufficient feature points may not be detected due to the low-contrast characteristics of the x-ray image. Barnard detector is an algorithm for feature point detection based on grayscale value gradients, which can obtain sufficient feature points in the case of gray-scale contrast is not obvious. However, the Barnard detector would detect too many feature points, and they would be too clustered. This study uses the local extrema of clustering feature points and the suppression radius to overcome the problem, and compared different feature point detection methods. In the preliminary result, the feature points could be detected as representative control points by the proposed method.

Keywords: feature detection, Barnard detector, registration, periapical radiography image, endodontic treatment

Procedia PDF Downloads 442
245 Unstructured-Data Content Search Based on Optimized EEG Signal Processing and Multi-Objective Feature Extraction

Authors: Qais M. Yousef, Yasmeen A. Alshaer

Abstract:

Over the last few years, the amount of data available on the globe has been increased rapidly. This came up with the emergence of recent concepts, such as the big data and the Internet of Things, which have furnished a suitable solution for the availability of data all over the world. However, managing this massive amount of data remains a challenge due to their large verity of types and distribution. Therefore, locating the required file particularly from the first trial turned to be a not easy task, due to the large similarities of names for different files distributed on the web. Consequently, the accuracy and speed of search have been negatively affected. This work presents a method using Electroencephalography signals to locate the files based on their contents. Giving the concept of natural mind waves processing, this work analyses the mind wave signals of different people, analyzing them and extracting their most appropriate features using multi-objective metaheuristic algorithm, and then classifying them using artificial neural network to distinguish among files with similar names. The aim of this work is to provide the ability to find the files based on their contents using human thoughts only. Implementing this approach and testing it on real people proved its ability to find the desired files accurately within noticeably shorter time and retrieve them as a first choice for the user.

Keywords: artificial intelligence, data contents search, human active memory, mind wave, multi-objective optimization

Procedia PDF Downloads 175
244 A Machine Learning Approach to Detecting Evasive PDF Malware

Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran

Abstract:

The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.

Keywords: PDF, PDF malware, decision tree classifier, random forest classifier

Procedia PDF Downloads 91
243 Design of Bacterial Pathogens Identification System Based on Scattering of Laser Beam Light and Classification of Binned Plots

Authors: Mubashir Hussain, Mu Lv, Xiaohan Dong, Zhiyang Li, Bin Liu, Nongyue He

Abstract:

Detection and classification of microbes have a vast range of applications in biomedical engineering especially in detection, characterization, and quantification of bacterial contaminants. For identification of pathogens, different techniques are emerging in the field of biomedical engineering. Latest technology uses light scattering, capable of identifying different pathogens without any need for biochemical processing. Bacterial Pathogens Identification System (BPIS) which uses a laser beam, passes through the sample and light scatters off. An assembly of photodetectors surrounded by the sample at different angles to detect the scattering of light. The algorithm of the system consists of two parts: (a) Library files, and (b) Comparator. Library files contain data of known species of bacterial microbes in the form of binned plots, while comparator compares data of unknown sample with library files. Using collected data of unknown bacterial species, highest voltage values stored in the form of peaks and arranged in 3D histograms to find the frequency of occurrence. Resulting data compared with library files of known bacterial species. If sample data matching with any library file of known bacterial species, sample identified as a matched microbe. An experiment performed to identify three different bacteria particles: Enterococcus faecalis, Pseudomonas aeruginosa, and Escherichia coli. By applying algorithm using library files of given samples, results were compromising. This system is potentially applicable to several biomedical areas, especially those related to cell morphology.

Keywords: microbial identification, laser scattering, peak identification, binned plots classification

Procedia PDF Downloads 150
242 A Comparative Study of Malware Detection Techniques Using Machine Learning Methods

Authors: Cristina Vatamanu, Doina Cosovan, Dragos Gavrilut, Henri Luchian

Abstract:

In the past few years, the amount of malicious software increased exponentially and, therefore, machine learning algorithms became instrumental in identifying clean and malware files through semi-automated classification. When working with very large datasets, the major challenge is to reach both a very high malware detection rate and a very low false positive rate. Another challenge is to minimize the time needed for the machine learning algorithm to do so. This paper presents a comparative study between different machine learning techniques such as linear classifiers, ensembles, decision trees or various hybrids thereof. The training dataset consists of approximately 2 million clean files and 200.000 infected files, which is a realistic quantitative mixture. The paper investigates the above mentioned methods with respect to both their performance (detection rate and false positive rate) and their practicability.

Keywords: ensembles, false positives, feature selection, one side class algorithm

Procedia PDF Downloads 292
241 The Integration and Automation of EDA Tools in an Integrated Circuit Design Environment

Authors: Rohaya Abdul Wahab, Raja Mohd Fuad Tengku Aziz, Nazaliza Othman, Sharifah Saleh, Nabihah Razali, Rozaimah Baharim, M. Hanif M. Nasir

Abstract:

This paper will discuss how EDA tools are integrated and automated in an Integrated Circuit Design Environment. Some of the problems face in our current environment is that users need to configure manually on the library paths, start-up files and project directories. Certain manual processes that happen between the users and applications can be automated but they must be transparent to the users. For example, the users can run the applications directly after login without knowing the library paths and start-up files locations. The solution to these problems is to automate the processes using standard configuration files which will benefit the users and EDA support. This paper will discuss how the implementation is done to automate the process using scripting languages such as Perl, Tcl, Scheme and Shell Script. These scripting tools are great assets for design engineers to build a robust and powerful design flow and this technique is widely used to integrate all the tools together.

Keywords: EDA tools, Integrated Circuits, scripting, integration, automation

Procedia PDF Downloads 324
240 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 315
239 Comparative Study of Case Files in the Context of H. P. Grice’s Pragmatic Theory

Authors: Tugce Arslan

Abstract:

For a communicative act to be carried out successfully, the speaker and the listener must consider certain principles in line with the intention–centered “Cooperative Principle” expressed by H. P. Grice. Violation of a communication principle causes the listener to make new inferences called “implicatures”. In this study, focusing on the linguistic use of H. P. Grice’s principles, we aim to find out which principles of conversation are generally followed in case files from different fields and which principles are frequently violated. Three case files were examined, and the violating and the abiding cases of the maxims were classified in terms of four categories (Quality, Quantity, Relevance and Manner). The results of this investigation is reported below (V: Violating, A: Abiding): Quality Quantity Relevance Manner V A V A V A V A Case 1 10 8 5 9 3 15 16 6 Case 2 4 5 11 6 2 11 7 14 Case 3 21 13 7 12 9 14 15 9 Total 35 26 23 27 14 40 38 29 The excerpts were selected from files covering three different areas: the Assize Court, the Family Court and the Commercial Court of First Instance. In this way, the relations between the types of violations and the types of courts are examined. Our main finding is that in the 1st and the 3rd file, as the cases of violation in “Quality” and “Manner” increase, the cases of violation in “Quantity” and “Relevance” decrease. In the second file, on the other hand, as the cases of violation in “Quantity” increase, the cases of violation in “Quality”, “Relevance” and “Manner” decrease. In the talk, we shall compare these results with the results obtained in the study of Tajabadi, Dowlatabadi, and Mehric (2014), which examined various case files in Iran. Our main finding is that in the study conducted in Iran, violations were found only on the principles of “Quantity” and “Relevance”, while violations were found on the principles of “Quality”, “Quantity” and “Manner” in this study. In this case, it shows us that there is a connection between at least two maxims. In both cases, it has been noticed that the “Quantity” maxim is a common denominator. Studies in this field can be enlightening for many areas such as discourse analysis, legal studies, etc. Accordingly, comments will be made about the nature of the violations mentioned in H. P. Grice’s “Cooperation Principle”. We shall also discuss various conversational practices that cannot be analysed with these maxims.

Keywords: comparative analysis, cooperation principle, forensic linguistics, pragmatic.

Procedia PDF Downloads 221
238 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption

Authors: Koyangbo Guere Monguia Michel Alex Emmanuel

Abstract:

In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.

Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization

Procedia PDF Downloads 358
237 Enhanced Thai Character Recognition with Histogram Projection Feature Extraction

Authors: Benjawan Rangsikamol, Chutimet Srinilta

Abstract:

This research paper deals with extraction of Thai character features using the proposed histogram projection so as to improve the recognition performance. The process starts with transformation of image files into binary files before thinning. After character thinning, the skeletons are entered into the proposed extraction using histogram projection (horizontal and vertical) to extract unique features which are inputs of the subsequent recognition step. The recognition rate with the proposed extraction technique is as high as 97 percent since the technique works very well with the idiosyncrasies of Thai characters.

Keywords: character recognition, histogram projection, multilayer perceptron, Thai character features extraction

Procedia PDF Downloads 464
236 Practical Challenges of Tunable Parameters in Matlab/Simulink Code Generation

Authors: Ebrahim Shayesteh, Nikolaos Styliaras, Alin George Raducu, Ozan Sahin, Daniel Pombo VáZquez, Jonas Funkquist, Sotirios Thanopoulos

Abstract:

One of the important requirements in many code generation projects is defining some of the model parameters tunable. This helps to update the model parameters without performing the code generation again. This paper studies the concept of embedded code generation by MATLAB/Simulink coder targeting the TwinCAT Simulink system. The generated runtime modules are then tested and deployed to the TwinCAT 3 engineering environment. However, defining the parameters tunable in MATLAB/Simulink code generation targeting TwinCAT is not very straightforward. This paper focuses on this subject and reviews some of the techniques tested here to make the parameters tunable in generated runtime modules. Three techniques are proposed for this purpose, including normal tunable parameters, callback functions, and mask subsystems. Moreover, some test Simulink models are developed and used to evaluate the results of proposed approaches. A brief summary of the study results is presented in the following. First of all, the parameters defined tunable and used in defining the values of other Simulink elements (e.g., gain value of a gain block) could be changed after the code generation and this value updating will affect the values of all elements defined based on the values of the tunable parameter. For instance, if parameter K=1 is defined as a tunable parameter in the code generation process and this parameter is used to gain a gain block in Simulink, the gain value for the gain block is equal to 1 in the gain block TwinCAT environment after the code generation. But, the value of K can be changed to a new value (e.g., K=2) in TwinCAT (without doing any new code generation in MATLAB). Then, the gain value of the gain block will change to 2. Secondly, adding a callback function in the form of “pre-load function,” “post-load function,” “start function,” and will not help to make the parameters tunable without performing a new code generation. This means that any MATLAB files should be run before performing the code generation. The parameters defined/calculated in this file will be used as fixed values in the generated code. Thus, adding these files as callback functions to the Simulink model will not make these parameters flexible since the MATLAB files will not be attached to the generated code. Therefore, to change the parameters defined/calculated in these files, the code generation should be done again. However, adding these files as callback functions forces MATLAB to run them before the code generation, and there is no need to define the parameters mentioned in these files separately. Finally, using a tunable parameter in defining/calculating the values of other parameters through the mask is an efficient method to change the value of the latter parameters after the code generation. For instance, if tunable parameter K is used in calculating the value of two other parameters K1 and K2 and, after the code generation, the value of K is updated in TwinCAT environment, the value of parameters K1 and K2 will also be updated (without any new code generation).

Keywords: code generation, MATLAB, tunable parameters, TwinCAT

Procedia PDF Downloads 227
235 Encryption Image via Mutual Singular Value Decomposition

Authors: Adil Al-Rammahi

Abstract:

Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

Keywords: image cryptography, singular values decomposition

Procedia PDF Downloads 436
234 Modelling of Passengers Exchange between Trains and Platforms

Authors: Guillaume Craveur

Abstract:

The evaluation of the passenger exchange time is necessary for railway operators in order to optimize and dimension rail traffic. Several influential parameters are identified and studied. Each parameter leads to a modeling completed with the buildingEXODUS software. The objective is the modelling of passenger exchanges measured by passenger counting. Population size is dimensioned using passenger counting files which are a report of the train service and contain following useful informations: number of passengers who get on and leave the train, exchange time. These information are collected by sensors placed at the top of each train door. With passenger counting files it is possible to know how many people are engaged in the exchange and how long is the exchange, but it is not possible to know passenger flow of the door. All the information about observed exchanges are thus not available. For this reason and in order to minimize inaccuracies, only short exchanges (less than 30 seconds) with a maximum of people are performed.

Keywords: passengers exchange, numerical tools, rolling stock, platforms

Procedia PDF Downloads 228
233 Development and Verification of the Idom Shielding Optimization Tool

Authors: Omar Bouhassoun, Cristian Garrido, César Hueso

Abstract:

The radiation shielding design is an optimization problem with multiple -constrained- objective functions (radiation dose, weight, price, etc.) that depend on several parameters (material, thickness, position, etc.). The classical approach for shielding design consists of a brute force trial-and-error process subject to previous designer experience. Therefore, the result is an empirical solution but not optimal, which can degrade the overall performance of the shielding. In order to automate the shielding design procedure, the IDOM Shielding Optimization Tool (ISOT) has been developed. This software combines optimization algorithms with the capabilities to read/write input files, run calculations, as well as parse output files for different radiation transport codes. In the first stage, the software was established to adjust the input files for two well-known Monte Carlo codes (MCNP and Serpent) and optimize the result (weight, volume, price, dose rate) using multi-objective genetic algorithms. Nevertheless, its modular implementation easily allows the inclusion of more radiation transport codes and optimization algorithms. The work related to the development of ISOT and its verification on a simple 3D multi-layer shielding problem using both MCNP and Serpent will be presented. ISOT looks very promising for achieving an optimal solution to complex shielding problems.

Keywords: optimization, shielding, nuclear, genetic algorithm

Procedia PDF Downloads 110
232 Comparison of the Cyclic Fatigue Resistance of Endoart Gold, Endoart Blue, Protaper Universal, and Protaper Gold Files at Body Temperature

Authors: Ayhan Eymirli, Sila N. Usta

Abstract:

The aim of this study is the comparison of the cyclic fatigue resistance of EndoArt Gold (EAG, Inci Dental, Istanbul, Turkey), EndoArt Blue (EAB, Inci Dental, Istanbul, Turkey), ProTaper Universal (PTU, Dentsply Tulsa Dental Specialties), and ProTaper Gold (PTG, Dentsply Tulsa Dental Specialties) files at body temperature. Twelve instruments of each EAG, EAB, PTU, PTG file system were included in this study. All selected files were rotated in the artificial canals, which have a 60° angle and a 5-mm radius of curvature until fracture occurred. The time to fracture (Ttf) was measured in seconds by a chronometer in the control panel that presents in the cyclic fatigue testing device when a fracture was detected visually and/or audibly. The lengths of the fractured fragments (FL) were also measured with a digital microcaliper. The data of Ttf and FL were analyzed using Kruskal-Wallis, one-way ANOVA and post hoc Bonferroni tests at the 5% significance level. There was a statistically significant difference among the file systems (p < 0.05). EAB had the statistically highest fatigue resistance, and PTU had the statistically lowest fatigue resistance (p < 0.05). PTG system had a statistically higher FL means than EAB and PTU file systems (p < 0.05). EAB had the greatest cyclic fatigue resistance amongst the other file systems. It can be stated that heat treatments may be a factor that increases fatigue resistance.

Keywords: cyclic fatigue resistance, Endo art blue, Endo art gold, pro taper gold, pro taper universal

Procedia PDF Downloads 126