Search results for: periodontal packet
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 206

Search results for: periodontal packet

146 Video-On-Demand QoE Evaluation across Different Age-Groups and Its Significance for Network Capacity

Authors: Mujtaba Roshan, John A. Schormans

Abstract:

Quality of Experience (QoE) drives churn in the broadband networks industry, and good QoE plays a large part in the retention of customers. QoE is known to be affected by the Quality of Service (QoS) factors packet loss probability (PLP), delay and delay jitter caused by the network. Earlier results have shown that the relationship between these QoS factors and QoE is non-linear, and may vary from application to application. We use the network emulator Netem as the basis for experimentation, and evaluate how QoE varies as we change the emulated QoS metrics. Focusing on Video-on-Demand, we discovered that the reported QoE may differ widely for users of different age groups, and that the most demanding age group (the youngest) can require an order of magnitude lower PLP to achieve the same QoE than is required by the most widely studied age group of users. We then used a bottleneck TCP model to evaluate the capacity cost of achieving an order of magnitude decrease in PLP, and found it be (almost always) a 3-fold increase in link capacity that was required.

Keywords: network capacity, packet loss probability, quality of experience, quality of service

Procedia PDF Downloads 244
145 Formulation and Characterization of Antimicrobial Herbal Mouthwash from Some Herbal Extracts for Treatment of Periodontal Diseases

Authors: Reenu Yadav, Abhay Asthana, S. K. Yadav

Abstract:

Purpose: The aim of the present work was to develop an oral gel for brushing with an antimicrobial activity which will cure/protect from various periodontal diseases such as periodontitis, gingivitis, and pyorrhea. Methods: Plant materials procured from local suppliers, extracted and standardized. Screening of antimicrobial activity was carried out with the help of disk diffusion method. The gel was formulated by dried extracts of Beautea monosperma and Cordia obliquus. Gels were evaluated on various parameters and standardization of the formulation was performed. The release of drugs was studied in pH 6.8 using a mastication device.Total phenolic and flavonoid contents were estimated by folin-Ciocalteu and aluminium chloride method, and stability studies were performed (40°C and RH 75% ± 5% for 90 days) to assess the effect of temperature and humidity on the concentration of phenolic and flavonoid contents. The results of accelerated stability conditions were compared with that of samples kept at controlled conditions (RT). The control samples were kept at room temperature (25°C, 35% RH for 180 days). Results: Results are encouraging; extracts possess significant antimicrobial activity at very low concentration (15µg/disc, 20µg/disc and 15 µg/ disc) on oral pathogenic bacteria. The formulation has optimal characteristics, as well as has a pleasant appearance, fragrance, texture, and taste, is highly acceptable by the volunteers. The diffusion coefficient values ranged from 0.6655 to 0.9164. Since the R values of korsmayer papas were close to 1, Drug release from formulation follows matrix diffusion kinetics. Hence, diffusion was the mechanism of the drug release. Formulation follows non-Fickian transport mechanism. Most Formulations released 50 % of their contents within 25-30 minutes. Results obtained from the accelerated stability studies are indicative of a slight reduction in flavonoids and phenolic contents with time on long time storage. When measured degradation under ambient conditions, degradation was significantly lower than in accelerated stability study. Conclusion: Plant extracts possess compounds with antimicrobial properties can be used as. Developed formulation will cure/protect from various periodontal diseases. Further development and evaluations oral gel including the isolated compounds on the commercial scale and their clinical and toxicological studies are the future challenges.

Keywords: herbal gel, dental care, ambient conditions, commercial scale

Procedia PDF Downloads 417
144 Level of IGF-I and IGFBP-3 in Gingival Crevicular Fluid and Plasma in Patients with Aggressive Periodontitis

Authors: Youjeong Hwang

Abstract:

Purpose: Insulin-like growth factor-I (IGF-I) promotes B-cell development, immunoglobulin formation, and interleukin-6 (IL-6) production, then regulate the immune response and inflammation. As IGF-I and their receptor also exist in the periodontal tissue, they may affect the immune response caused by periodontal pathogens in aggressive periodontitis (AgP) patients. The function of IGF is regulated by IGF binding proteins (IGFBPs), and IGFBP-3 is known to most abundant in plasma. The aim of the present study was to assess the concentration of IGF-I and IGFBP-3 in plasma and gingival crevicular fluid (GCF) in AgP patients and to find out their association. Methods: Nine patients with AgP (test group) and nine healthy subjects (control group) were included in this study. None of the subjects had a history of systemic disease, smoking or steroids medication. GCF samples were collected by microcapillary pipettes and plasma samples were obtained by venipuncture. Probing pocket depth (PD), clinical attachment level (CAL) and bleeding on probing (BOP) were recorded. Samples were assayed for IGF-I and IGFBP-3 levels using ELISA. Results: Mean IGF-I level in GCF was higher in the test group than control. Mean IGF-I level in plasma and IGFBP-3 level in GCF and plasma in control group were higher than that of the test group. However, there was no statistical significance (p > 0.05). The mean level of IGF-I and IGFBP-3 in GCF was lower than those in plasma. Mean IGF-I level in plasma showed a negative correlation with PD and CAL (p < 0.05) in both groups. The levels of IGF-I and IGFBP-3 in GCF seemed to be negatively correlated with BOP in the test group (p < 0.05). Conclusions: The difference in the level of IGF-I and IGFBP-3 between AgP and healthy subjects was not significant. Further studies that explain the mechanism of the protective role of IGF-I with more samples are needed.

Keywords: aggressive periodontitis, pathogenesis, insulin-like growth factor, insulin-like growth factor binding protein

Procedia PDF Downloads 183
143 A 5G Architecture Based to Dynamic Vehicular Clustering Enhancing VoD Services Over Vehicular Ad hoc Networks

Authors: Lamaa Sellami, Bechir Alaya

Abstract:

Nowadays, video-on-demand (VoD) applications are becoming one of the tendencies driving vehicular network users. In this paper, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different cars included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over VANET. The proposed algorithm takes advantage of the concept of small cells and the introduction of wireless backhauls, inspired by the different features and the performance of the Long Term Evolution (LTE)- Advanced network. The proposed clustering algorithm considers multiple characteristics such as the vehicle’s position and acceleration to reduce latency and packet loss. Therefore, each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.

Keywords: video-on-demand, vehicular ad-hoc network, mobility, vehicular traffic load, small cell, wireless backhaul, LTE-advanced, latency, packet loss

Procedia PDF Downloads 113
142 An Enhanced AODV Routing Protocol for Wireless Sensor and Actuator Networks

Authors: Apidet Booranawong, Wiklom Teerapabkajorndet

Abstract:

An enhanced ad-hoc on-demand distance vector routing (E-AODV) protocol for control system applications in wireless sensor and actuator networks (WSANs) is proposed. Our routing algorithm is designed by considering both wireless network communication and the control system aspects. Control system error and network delay are the main selection criteria in our routing protocol. The control and communication performance is evaluated on multi-hop IEEE 802.15.4 networks for building-temperature control systems. The Gilbert-Elliott error model is employed to simulate packet loss in wireless networks. The simulation results demonstrate that the E-AODV routing approach can significantly improve the communication performance better than an original AODV routing under various packet loss rates. However, the control performance result by our approach is not much improved compared with the AODV routing solution.

Keywords: WSANs, building temperature control, AODV routing protocol, control system error, settling time, delay, delivery ratio

Procedia PDF Downloads 310
141 Quality of Service Based Routing Algorithm for Real Time Applications in MANETs Using Ant Colony and Fuzzy Logic

Authors: Farahnaz Karami

Abstract:

Routing is an important, challenging task in mobile ad hoc networks due to node mobility, lack of central control, unstable links, and limited resources. An ant colony has been found to be an attractive technique for routing in Mobile Ad Hoc Networks (MANETs). However, existing swarm intelligence based routing protocols find an optimal path by considering only one or two route selection metrics without considering correlations among such parameters making them unsuitable lonely for routing real time applications. Fuzzy logic combines multiple route selection parameters containing uncertain information or imprecise data in nature, but does not have multipath routing property naturally in order to provide load balancing. The objective of this paper is to design a routing algorithm using fuzzy logic and ant colony that can solve some of routing problems in mobile ad hoc networks, such as nodes energy consumption optimization to increase network lifetime, link failures rate reduction to increase packet delivery reliability and providing load balancing to optimize available bandwidth. In proposed algorithm, the path information will be given to fuzzy inference system by ants. Based on the available path information and considering the parameters required for quality of service (QoS), the fuzzy cost of each path is calculated and the optimal paths will be selected. NS2.35 simulation tools are used for simulation and the results are compared and evaluated with the newest QoS based algorithms in MANETs according to packet delivery ratio, end-to-end delay and routing overhead ratio criterions. The simulation results show significant improvement in the performance of these networks in terms of decreasing end-to-end delay, and routing overhead ratio, and also increasing packet delivery ratio.

Keywords: mobile ad hoc networks, routing, quality of service, ant colony, fuzzy logic

Procedia PDF Downloads 36
140 Periodontal Soft Tissue Sculpturing and Use of Interim Appliance for Rehabilitation of Anterior Edentulousness: Case Report

Authors: Hande Yesil, Seda Aycan Altan, M. Vehbi Bal, Alper Uyar, O. Cumhur Sipahi

Abstract:

Purpose: Fixed partial dentures (FPDs) must fulfill functional requirements such as phonetics, chewing efficiency and esthetics especially in the anterior region. A convex type tissue surface is usually recommended for pontics of FPDs. That pontic design also provides suitable oral hygiene and ease of cleaning. However, high esthetic requirements and correct emergence profile are not always achievable because of the convex shape of adjacent soft tissues. Therefore, the ovate type pontic which fulfills the high esthetic demands of the patients may be a good alternative to the modified ridge lap pontic design. Clinical Report: A female patient referred with the complaint of anterior upper edentulousness. In the oral examination it was determined that teeth 11, 12, 21, 22 were deficient. A thick and convex gingival tissue that may cause aesthetic problems was also observed.. Periodontal augmentation surgery was performed to ensure proper papillary configuration and gingival contour. An interim removable partial denture (IRPD) which applied pressure to operated gingival tissues was fabricated postoperatively. The IRPD was used for 4 weeks and after completion of tissue sculpting, the permanent FPD with an ovate pontic was fabricated and cemented. After a follow-up period of 6 months, not any esthetical and hygienic problem was detected and the patient was satisfied with her prosthesis. Conclusion: It was concluded that shaping of gingival contours with IRPD and use of a FPD with ovate pontic fulfills all esthetic and hygienic requirements.

Keywords: interim appliance, ovate pontic, tissue sculpturing, fixed partial denture

Procedia PDF Downloads 255
139 On the Network Packet Loss Tolerance of SVM Based Activity Recognition

Authors: Gamze Uslu, Sebnem Baydere, Alper K. Demir

Abstract:

In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.

Keywords: activity recognition, support vector machines, acceleration sensor, wireless sensor networks, packet loss

Procedia PDF Downloads 447
138 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 322
137 Effect of Crystallographic Characteristics on Toughness of Coarse Grain Heat Affected Zone for Different Heat Inputs

Authors: Trishita Ray, Ashok Perka, Arnab Karani, M. Shome, Saurabh Kundu

Abstract:

Line pipe steels are used for long distance transportation of crude oil and gas under extreme environmental conditions. Welding is necessary to lay large scale pipelines. Coarse Grain Heat Affected Zone (CGHAZ) of a welded joint exhibits worst toughness because of excessive grain growth and brittle microstructures like bainite and martensite, leading to early failure. Therefore, it is necessary to investigate microstructures and properties of the CGHAZ for different welding heat inputs. In the present study, CGHAZ for two heat inputs of 10 kJ/cm and 50 kJ/cm were simulated in Gleeble 3800, and the microstructures were investigated in detail by means of Scanning Electron Microscopy (SEM) and Electron Backscattered Diffraction (EBSD). Charpy Impact Tests were also done to evaluate the impact properties. High heat input was characterized with very low toughness and massive prior austenite grains. With the crystallographic information from EBSD, the area of a single prior austenite grain was traced out for both the welding conditions. Analysis of the prior austenite grains showed the formation of high angle boundaries between the crystallographic packets. Effect of these packet boundaries on secondary cleavage crack propagation was discussed. It was observed that in the low heat input condition, formation of finer packets with a criss-cross morphology inside prior austenite grains was effective in crack arrest whereas, in the high heat input condition, formation of larger packets with higher volume of low angle boundaries failed to resist crack propagation resulting in a brittle fracture. Thus, the characteristics in a crystallographic packet and impact properties are related and should be controlled to obtain optimum properties.

Keywords: coarse grain heat affected zone, crystallographic packet, toughness, line pipe steel

Procedia PDF Downloads 225
136 Wireless Sensor Network Energy Efficient and QoS-Aware MAC Protocols: A Survey

Authors: Bashir Abdu Muzakkari, Mohamad Afendee Mohamad, Mohd Fadzil Abdul Kadir

Abstract:

Wireless Sensor Networks (WSNs) is an aggregation of several tiny, low-cost sensor nodes, spatially distributed to monitor physical or environmental status. WSN is constantly changing because of the rapid technological advancements in sensor elements such as radio, battery and operating systems. The Medium Access Control (MAC) protocols remain very vital in the WSN because of its role in coordinating communication amongst the sensors. Other than battery consumption, packet collision, network lifetime and latency are factors that largely depend on WSN MAC protocol and these factors have been widely treated in recent days. In this paper, we survey some latest proposed WSN Contention-based, Scheduling-based and Hybrid MAC protocols while presenting an examination, correlation of advantages and limitations of each protocol. Concentration is directed towards investigating the treatment of Quality of Service (QoS) performance metrics within these particular protocols. The result shows that majority of the protocols leaned towards energy conservation. We, therefore, believe that other performance metrics of guaranteed QoS such as latency, throughput, packet loss, network and bandwidth availability may play a critical role in the design of future MAC protocols for WSNs.

Keywords: WSN, QoS, energy consumption, MAC protocol

Procedia PDF Downloads 370
135 Analysis of Cross-Sectional and Retrograde Data on the Prevalence of Marginal Gingivitis

Authors: Ilma Robo, Saimir Heta, Nedja Hysi, Vera Ostreni

Abstract:

Introduction: Marginal gingivitis is a disease with considerable frequency among patients who present routinely for periodontal control and treatment. In fact, this disease may not have alarming symptoms in patients and may go unnoticed by themselves when personal hygiene conditions are optimal. The aim of this study was to collect retrograde data on the prevalence of marginal gingiva in the respective group of patients, evaluated according to specific periodontal diagnostic tools. Materials and methods: The study was conducted in two patient groups. The first group was with 34 patients, during December 2019-January 2020, and the second group was with 64 patients during 2010-2018 (each year in the mentioned monthly period). Bacterial plaque index, hemorrhage index, amount of gingival fluid, presence of xerostomia and candidiasis were recorded in patients. Results: Analysis of the collected data showed that susceptibility to marginal gingivitis shows higher values according to retrograde data, compared to cross-sectional ones. Susceptibility to candidiasis and the occurrence of xerostomia, even in the combination of both pathologies, as risk factors for the occurrence of marginal gingivitis, show higher values ​​according to retrograde data. The female are presented with a reduced bacterial plaque index than the males, but more importantly, this index in the females is also associated with a reduced index of gingival hemorrhage, in contrast to the males. Conclusions: Cross-sectional data show that the prevalence of marginal gingivitis is more reduced, compared to retrograde data, based on the hemorrhage index and the bacterial plaque index together. Changes in production in the amount of gingival fluid show a higher prevalence of marginal gingivitis in cross-sectional data than in retrograde data; this is based on the sophistication of the way data are recorded, which evolves over time and also based on professional sensitivity to this phenomenon.

Keywords: marginal gingivitis, cross-sectional, retrograde, prevalence

Procedia PDF Downloads 135
134 Age Estimation from Teeth among North Indian Population: Comparison and Reliability of Qualitative and Quantitative Methods

Authors: Jasbir Arora, Indu Talwar, Daisy Sahni, Vidya Rattan

Abstract:

Introduction: Age estimation is a crucial step to build the identity of a person, both in case of deceased and alive. In adults, age can be estimated on the basis of six regressive (Attrition, Secondary dentine, Dentine transparency, Root resorption, Cementum apposition and Periodontal Disease) changes in teeth qualitatively using scoring system and quantitatively by micrometric method. The present research was designed to establish the reliability of qualitative (method 1) and quantitative (method 2) of age estimation among North Indians and to compare the efficacy of these two methods. Method: 250 single-rooted extracted teeth (18-75 yrs.) were collected from Department of Oral Health Sciences, PGIMER, Chandigarh. Before extraction, periodontal score of each tooth was noted. Labiolingual sections were prepared and examined under light microscope for regressive changes. Each parameter was scored using Gustafson’s 0-3 point score system (qualitative), and total score was calculated. For quantitative method, each regressive change was measured quantitatively in form of 18 micrometric parameters under microscope with the help of measuring eyepiece. Age was estimated using linear and multiple regression analysis in Gustafson’s method and Kedici’s method respectively. Estimated age was compared with actual age on the basis of absolute mean error. Results: In pooled data, by Gustafson’s method, significant correlation (r= 0.8) was observed between total score and actual age. Total score generated an absolute mean error of ±7.8 years. Whereas, for Kedici’s method, a value of correlation coefficient of r=0.5 (p<0.01) was observed between all the eighteen micrometric parameters and known age. Using multiple regression equation, age was estimated, and an absolute mean error of age was found to be ±12.18 years. Conclusion: Gustafson’s (qualitative) method was found to be a better predictor for age estimation among North Indians.

Keywords: forensic odontology, age estimation, North India, teeth

Procedia PDF Downloads 220
133 Impact of Capture Effect on Receiver Initiated Collision Detection with Sequential Resolution in WLAN

Authors: Sethu Lekshmi, Shahanas, Prettha P.

Abstract:

All existing protocols in wireless networks are mainly based on Carrier Sense Multiple Access with Collision avoidance. By applying collision detection in wireless networks, the time spent on collision can be reduced and thus improves system throughput. However in a real WLAN scenario due to the use of nonlinear modulation techniques only receiver can decided whether a packet loss take place, even there are multiple transmissions. In this proposed method, the receiver or Access Point detects the collision when multiple data packets are transmitted from different wireless stations. Whenever the receiver detects a collision, it transmits a jamming signal to all the transmitting stations so that they can immediately stop their on-going transmissions. We also provide preferential access to all collided packet to reduce unfairness and to increase system throughput by reducing contention. However, this preferential access will not block the channel for the long time. Here, an in-band transmission is considered in which both the data frames and control frames are transmitted in the same channel. We also provide a simple mathematical model for the proposed protocol and give the simulation result of WLAN scenario under various capture thresholds.

Keywords: 802.11, WLAN, capture effect, collision detection, collision resolution, receiver initiated

Procedia PDF Downloads 333
132 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol

Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani

Abstract:

Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.

Keywords: heuristics routing, intelligent routing, VANET, route optimization

Procedia PDF Downloads 150
131 GPRS Based Automatic Metering System

Authors: Constant Akama, Frank Kulor, Frederick Agyemang

Abstract:

All over the world, due to increasing population, electric power distribution companies are looking for more efficient ways of reading electricity meters. In Ghana, the prepaid metering system was introduced in 2007 to replace the manual system of reading which was fraught with inefficiencies. However, the prepaid system in Ghana is not capable of integration with online systems such as e-commerce platforms and remote monitoring systems. In this paper, we present a design framework for an automatic metering system that can be integrated with e-commerce platforms and remote monitoring systems. The meter was designed using ADE 7755 which reads the energy consumption and the reading is processed by a microcontroller connected to Sim900 General Packet Radio Service module containing a GSM chip provisioned with an Access Point Name. The system also has a billing server and a management server located at the premises of the utility company which communicate with the meter over a Virtual Private Network and GPRS. With this system, customers can buy credit online and the credit will be transferred securely to the meter. Also, when a fault is reported, the utility company can log into the meter remotely through the management server to troubleshoot the problem.

Keywords: access point name, general packet radio service, GSM, virtual private network

Procedia PDF Downloads 271
130 An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks

Authors: A. Khan, H. Mahmood

Abstract:

In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique.

Keywords: energy holes, interference, routing, underwater

Procedia PDF Downloads 385
129 The Pro-Reparative Effect of Vasoactive Intestinal Peptide in Chronic Inflammatory Osteolytic Periapical Lesions

Authors: Michelle C. S. Azevedo, Priscila M. Colavite, Carolina F. Francisconi, Ana P. Trombone, Gustavo P. Garlet

Abstract:

VIP (vasoactive intestinal peptide) know as a potential protective factor in the view of its marked immunosuppressive properties. In this work, we investigated a possible association of VIP with the clinical status of experimental periapical granulomas and the association with expression markers in the lesions potentially associated with periapical lesions pathogenesis. C57BL/6WT mice were treated or not with recombinant VIP. Animals with active/progressive (N=40), inactive/stable (N=70) periapical granulomas and controls (N=50) were anesthetized and the right mandibular first molar was surgically opened, allowing exposure of dental pulp. Endodontic pathogenic bacterial strains were inoculated: Porphyromonas gingivalis, Prevotella nigrescens, Actinomyces viscosus, and Fusobacterium nucleatum subsp. polymorphum. The cavity was not sealed after bacterial inoculation. During lesion development, animals were treated or not with recombinant VIP 3 days post infection. Animals were killed after 3, 7, 14, and 21 days of infection and the jaws were dissected. The extraction of total RNA from periodontal tissues was performed and the integrity of samples was checked. qPCR reaction using TaqMan chemistry with inventoried primers were performed in ViiA7 equipment. The results, depicted as the relative levels of gene expression, were calculated in reference to GAPDH and β-actin expression. Periodontal tissues from upper molars were vested and incubated supplemented RPMI, followed by processing with 0.05% DNase. Cell viability and couting were determined by Neubauer chamber analysis. For flow cytometry analysis, after cell counting the cells were stained with the optimal dilution of each antibody; (PE)-conjugated and (FITC)-conjugated antibodies against CD4, CD25, FOXP3, IL-4, IL-17 and IFN-γ antibodies, as well their respective isotype controls. Cells were analyzed by FACScan and CellQuest software. Results are presented as the number of cells in the periodontal tissues or the number of positive cells for each marker in the CD4+FOXp3+, CD4+IL-4+, CD4+IFNg+ and CD4+IL-17+ subpopulations. The levels mRNA were measured by qPCR. The VIP expression was predominated in inactive lesions, as well part of the clusters of cytokine/Th markers identified as protective factors and a negative correlation between VIP expression and lesion evolution was observed. A quantitative analysis of IL1β, IL17, TNF, IFN, MMP2, RANKL, OPG, IL10, TGFβ, CTLA4, COL5A1, CTGF, CXCL11, FGF7, ITGA4, ITGA5, SERP1 and VTN expression was measured in experimental periapical lesions treated with VIP 7 and 14 days after lesion induction and healthy animals. After 7 days, all targets presented a significate increase in comparison to untreated animals. About migration kinetics, profile of chemokine receptors expression of TCD4+ subsets and phenotypic analysis of Tregs, Th1, Th2 and Th17 cells during the course of experimental periodontal disease evaluated by flow cytometry and depicted as the number of positive cells for each marker. CD4+IFNg+ and CD4+FOXp3+ cells migration were significate increased 7 days post VIP treatment. CD4+IL17+ cells migration were significate increased 7 and 14 days post VIP treatment, CD4+IL4+ cells migration were significate increased 14 and 21 days post VIP treatment compared to the control group. In conclusion, our experimental data support VIP involvement in determining the inactivity of periapical lesions. Financial support: FAPESP #2015/25618-2.

Keywords: chronic inflammation, cytokines, osteolytic lesions, VIP (Vasoactive Intestinal Peptide)

Procedia PDF Downloads 166
128 Methods for Restricting Unwanted Access on the Networks Using Firewall

Authors: Bhagwant Singh, Sikander Singh Cheema

Abstract:

This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.

Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques

Procedia PDF Downloads 78
127 Comparison with Mechanical Behaviors of Mastication in Teeth Movement Cases

Authors: Jae-Yong Park, Yeo-Kyeong Lee, Hee-Sun Kim

Abstract:

Purpose: This study aims at investigating the mechanical behaviors of mastication, according to various teeth movement. There are three masticatory cases which are general case and 2 cases of teeth movement. General case includes the common arrange of all teeth and 2 cases of teeth movement are that one is the half movement location case of molar teeth in no. 14 tooth seat after extraction of no. 14 tooth and the other is no. 14 tooth seat location case of molar teeth after extraction in the same case before. Materials and Methods: In order to analyze these cases, 3 dimensional finite element (FE) model of the skull were generated based on computed tomography images, 964 dicom files of 38 year old male having normal occlusion status. An FE model in general occlusal case was used to develop CAE procedure. This procedure was applied to FE models in other occlusal cases. The displacement controls according to loading condition were applied effectively to simulate occlusal behaviors in all cases. From the FE analyses, von Mises stress distribution of skull and teeth was observed. The von Mises stress, effective stress, had been widely used to determine the absolute stress value, regardless of stress direction and yield characteristics of materials. Results: High stress was distributed over the periodontal area of mandible under molar teeth when the mandible was transmitted to the coronal-apical direction in the general occlusal case. According to the stress propagation from teeth to cranium, stress distribution decreased as the distribution propagated from molar teeth to infratemporal crest of the greater wing of the sphenoid bone and lateral pterygoid plate in general case. In 2 cases of teeth movement, there were observed that high stresses were distributed over the periodontal area of mandible under teeth where they are located under the moved molar teeth in cranium. Conclusion: The predictions of the mechanical behaviors of general case and 2 cases of teeth movement during the masticatory process were investigated including qualitative validation. The displacement controls as the loading condition were applied effectively to simulate occlusal behaviors in 2 cases of teeth movement of molar teeth.

Keywords: cranium, finite element analysis, mandible, masticatory action, occlusal force

Procedia PDF Downloads 371
126 Node Optimization in Wireless Sensor Network: An Energy Approach

Authors: Y. B. Kirankumar, J. D. Mallapur

Abstract:

Wireless Sensor Network (WSN) is an emerging technology, which has great invention for various low cost applications both for mass public as well as for defence. The wireless sensor communication technology allows random participation of sensor nodes with particular applications to take part in the network, which results in most of the uncovered simulation area, where fewer nodes are located at far distances. The drawback of such network would be that the additional energy is spent by the nodes located in a pattern of dense location, using more number of nodes for a smaller distance of communication adversely in a region with less number of nodes and additional energy is again spent by the source node in order to transmit a packet to neighbours, thereby transmitting the packet to reach the destination. The proposed work is intended to develop Energy Efficient Node Placement Algorithm (EENPA) in order to place the sensor node efficiently in simulated area, where all the nodes are equally located on a radial path to cover maximum area at equidistance. The total energy consumed by each node compared to random placement of nodes is less by having equal burden on fewer nodes of far location, having distributed the nodes in whole of the simulation area. Calculating the network lifetime also proves to be efficient as compared to random placement of nodes, hence increasing the network lifetime, too. Simulation is been carried out in a qualnet simulator, results are obtained on par with random placement of nodes with EENP algorithm.

Keywords: energy, WSN, wireless sensor network, energy approach

Procedia PDF Downloads 287
125 WILCKO-PERIO, Periodontally Accelerated Orthodontics

Authors: Kruttika Bhuse

Abstract:

Aim: Synergism between periodontists and orthodontists (periodontal accelerated osteogenic orthodontics- PAOO) creates crucial opportunities to enhance clinical outcomes of combined therapies regarding both disciplines and has made adult orthodontics a reality. Thus, understanding the biomechanics of bone remodelling may increase the clinical applications of corticotomy facilitated orthodontics with or without alveolar augmentation. Wilckodontics can be an attractive treatment option and be a “win-win” situation for both the dental surgeon and patient by reducing the orthodontic treatment time in adults. Materials and methods: In this review, data related to the clinical aspects, steps of procedure, biomechanics of bone, indications and contraindications and final outcome of wilckodontic shall be discussed. 50 supporting articles from various international journals and 70 clinical cases were reviewed to get a better understanding to design this wilckodontic - meta analysis. Various journals like the Journal Of Clinical And Diagnostic Research, Journal Of Indian Society Of Periodontology, Journal Of Periodontology, Pubmed, Boston Orthodontic University Journal, Good Practice Orthodontics Volume 2, have been referred to attain valuable information on wilckodontics which was then compiled in this single review study. Result: As a promising adjuvant technique based on the transient nature of demineralization-remineralisation process in healthy tissues, wilckodontics consists of regional acceleratory phenomenon by alveolar corticotomy and bone grafting of labial and palatal/lingual surfaces, followed by orthodontic force. The surgical wounding of alveolar bone potentiates tissue reorganization and healing by a way of transient burst of localized hard and soft tissue remodelling.This phenomenon causes bone healing to occur 10-50 times faster than normal bone turnover. Conclusion: This meta analysis helps understanding that the biomechanics of bone remodelling may increase the clinical applications of corticotomy facilitated orthodontics with or without alveolar augmentation. The main benefits being reduced orthodontic treatment time, increased bone volume and post-orthodontic stability.

Keywords: periodontal osteogenic accelerated orthodontics, alveolar corticotomy, bone augmentation, win-win situation

Procedia PDF Downloads 358
124 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things

Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin

Abstract:

With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.

Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)

Procedia PDF Downloads 134
123 Quality-Of-Service-Aware Green Bandwidth Allocation in Ethernet Passive Optical Network

Authors: Tzu-Yang Lin, Chuan-Ching Sue

Abstract:

Sleep mechanisms are commonly used to ensure the energy efficiency of each optical network unit (ONU) that concerns a single class delay constraint in the Ethernet Passive Optical Network (EPON). How long the ONUs can sleep without violating the delay constraint has become a research problem. Particularly, we can derive an analytical model to determine the optimal sleep time of ONUs in every cycle without violating the maximum class delay constraint. The bandwidth allocation considering such optimal sleep time is called Green Bandwidth Allocation (GBA). Although the GBA mechanism guarantees that the different class delay constraints do not violate the maximum class delay constraint, packets with a more relaxed delay constraint will be treated as those with the most stringent delay constraint and may be sent early. This means that the ONU will waste energy in active mode to send packets in advance which did not need to be sent at the current time. Accordingly, we proposed a QoS-aware GBA using a novel intra-ONU scheduling to control the packets to be sent according to their respective delay constraints, thereby enhancing energy efficiency without deteriorating delay performance. If packets are not explicitly classified but with different packet delay constraints, we can modify the intra-ONU scheduling to classify packets according to their packet delay constraints rather than their classes. Moreover, we propose the switchable ONU architecture in which the ONU can switch the architecture according to the sleep time length, thus improving energy efficiency in the QoS-aware GBA. The simulation results show that the QoS-aware GBA ensures that packets in different classes or with different delay constraints do not violate their respective delay constraints and consume less power than the original GBA.

Keywords: Passive Optical Networks, PONs, Optical Network Unit, ONU, energy efficiency, delay constraint

Procedia PDF Downloads 261
122 3D Simulation of Orthodontic Tooth Movement in the Presence of Horizontal Bone Loss

Authors: Azin Zargham, Gholamreza Rouhi, Allahyar Geramy

Abstract:

One of the most prevalent types of alveolar bone loss is horizontal bone loss (HBL) in which the bone height around teeth is reduced homogenously. In the presence of HBL the magnitudes of forces during orthodontic treatment should be altered according to the degree of HBL, in a way that without further bone loss, desired tooth movement can be obtained. In order to investigate the appropriate orthodontic force system in the presence of HBL, a three-dimensional numerical model capable of the simulation of orthodontic tooth movement was developed. The main goal of this research was to evaluate the effect of different degrees of HBL on a long-term orthodontic tooth movement. Moreover, the effect of different force magnitudes on orthodontic tooth movement in the presence of HBL was studied. Five three-dimensional finite element models of a maxillary lateral incisor with 0 mm, 1.5 mm, 3 mm, 4.5 mm and 6 mm of HBL were constructed. The long-term orthodontic tooth tipping movements were attained during a 4-weeks period in an iterative process through the external remodeling of the alveolar bone based on strains in periodontal ligament as the bone remodeling mechanical stimulus. To obtain long-term orthodontic tooth movement in each iteration, first the strains in periodontal ligament under a 1-N tipping force were calculated using finite element analysis. Then, bone remodeling and the subsequent tooth movement were computed in a post-processing software using a custom written program. Incisal edge, cervical, and apical area displacement in the models with different alveolar bone heights (0, 1.5, 3, 4.5, 6 mm bone loss) in response to a 1-N tipping force were calculated. Maximum tooth displacement was found to be 2.65 mm at the top of the crown of the model with a 6 mm bone loss. Minimum tooth displacement was 0.45 mm at the cervical level of the model with a normal bone support. Tooth tipping degrees of models in response to different tipping force magnitudes were also calculated for models with different degrees of HBL. Degrees of tipping tooth movement increased as force level was increased. This increase was more prominent in the models with smaller degrees of HBL. By using finite element method and bone remodeling theories, this study indicated that in the presence of HBL, under the same load, long-term orthodontic tooth movement will increase. The simulation also revealed that even though tooth movement increases with increasing the force, this increase was only prominent in the models with smaller degrees of HBL, and tooth models with greater degrees of HBL will be less affected by the magnitude of an orthodontic force. Based on our results, the applied force magnitude must be reduced in proportion of degree of HBL.

Keywords: bone remodeling, finite element method, horizontal bone loss, orthodontic tooth movement.

Procedia PDF Downloads 318
121 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 136
120 A Linearly Scalable Family of Swapped Networks

Authors: Richard Draper

Abstract:

A supercomputer can be constructed from identical building blocks which are small parallel processors connected by a network referred to as the local network. The routers have unused ports which are used to interconnect the building blocks. These connections are referred to as the global network. The address space has a global and a local component (g, l). The conventional way to connect the building blocks is to connect (g, l) to (g’,l). If there are K blocks, this requires K global ports in each router. If a block is of size M, the result is a machine with KM routers having diameter two. To increase the size of the machine to 2K blocks, each router connects to only half of the other blocks. The result is a larger machine but also one with greater diameter. This is a crude description of how the network of the CRAY XC® is designed. In this paper, a family of interconnection networks using routers with K global and M local ports is defined. Coordinates are (c,d, p) and the global connections are (c,d,p)↔(c’,p,d) which swaps p and d. The network is denoted D3(K,M) and is called a Swapped Dragonfly. D3(K,M) has KM2 routers and has diameter three, regardless of the size of K. To produce a network of size KM2 conventionally, diameter would be an increasing function of K. The family of Swapped Dragonflies has other desirable properties: 1) D3(K,M) scales linearly in K and quadratically in M. 2) If L < K, D3(K,M) contains many copies of D3(L,M). 3) If L < M, D3(K,M) contains many copies of D3(K,L). 4) D3(K,M) can perform an all-to-all exchange in KM2+KM time which is only slightly more than the time to do a one-to-all. This paper makes several contributions. It is the first time that a swap has been used to define a linearly scalable family of networks. Structural properties of this new family of networks are thoroughly examined. A synchronizing packet header is introduced. It specifies the path to be followed and it makes it possible to define highly parallel communication algorithm on the network. Among these is an all-to-all exchange in time KM2+KM. To demonstrate the effectiveness of the swap properties of the network of the CRAY XC® and D3(K,16) are compared.

Keywords: all-to-all exchange, CRAY XC®, Dragonfly, interconnection network, packet switching, swapped network, topology

Procedia PDF Downloads 98
119 Comparative Analysis of Data Gathering Protocols with Multiple Mobile Elements for Wireless Sensor Network

Authors: Bhat Geetalaxmi Jairam, D. V. Ashoka

Abstract:

Wireless Sensor Networks are used in many applications to collect sensed data from different sources. Sensed data has to be delivered through sensors wireless interface using multi-hop communication towards the sink. The data collection in wireless sensor networks consumes energy. Energy consumption is the major constraints in WSN .Reducing the energy consumption while increasing the amount of generated data is a great challenge. In this paper, we have implemented two data gathering protocols with multiple mobile sinks/elements to collect data from sensor nodes. First, is Energy-Efficient Data Gathering with Tour Length-Constrained Mobile Elements in Wireless Sensor Networks (EEDG), in which mobile sinks uses vehicle routing protocol to collect data. Second is An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs (IAR), in which mobile sinks uses prim’s algorithm to collect data. Authors have implemented concepts which are common to both protocols like deployment of mobile sinks, generating visiting schedule, collecting data from the cluster member. Authors have compared the performance of both protocols by taking statistics based on performance parameters like Delay, Packet Drop, Packet Delivery Ratio, Energy Available, Control Overhead. Authors have concluded this paper by proving EEDG is more efficient than IAR protocol but with few limitations which include unaddressed issues likes Redundancy removal, Idle listening, Mobile Sink’s pause/wait state at the node. In future work, we plan to concentrate more on these limitations to avail a new energy efficient protocol which will help in improving the life time of the WSN.

Keywords: aggregation, consumption, data gathering, efficiency

Procedia PDF Downloads 471
118 Sensor and Actuator Fault Detection in Connected Vehicles under a Packet Dropping Network

Authors: Z. Abdollahi Biron, P. Pisu

Abstract:

Connected vehicles are one of the promising technologies for future Intelligent Transportation Systems (ITS). A connected vehicle system is essentially a set of vehicles communicating through a network to exchange their information with each other and the infrastructure. Although this interconnection of the vehicles can be potentially beneficial in creating an efficient, sustainable, and green transportation system, a set of safety and reliability challenges come out with this technology. The first challenge arises from the information loss due to unreliable communication network which affects the control/management system of the individual vehicles and the overall system. Such scenario may lead to degraded or even unsafe operation which could be potentially catastrophic. Secondly, faulty sensors and actuators can affect the individual vehicle’s safe operation and in turn will create a potentially unsafe node in the vehicular network. Further, sending that faulty sensor information to other vehicles and failure in actuators may significantly affect the safe operation of the overall vehicular network. Therefore, it is of utmost importance to take these issues into consideration while designing the control/management algorithms of the individual vehicles as a part of connected vehicle system. In this paper, we consider a connected vehicle system under Co-operative Adaptive Cruise Control (CACC) and propose a fault diagnosis scheme that deals with these aforementioned challenges. Specifically, the conventional CACC algorithm is modified by adding a Kalman filter-based estimation algorithm to suppress the effect of lost information under unreliable network. Further, a sliding mode observer-based algorithm is used to improve the sensor reliability under faults. The effectiveness of the overall diagnostic scheme is verified via simulation studies.

Keywords: fault diagnostics, communication network, connected vehicles, packet drop out, platoon

Procedia PDF Downloads 214
117 Dealing with the Spaces: Ultra Conservative Approach from Childhood to Adulthood

Authors: Maryam Firouzmandi, Moosa Miri

Abstract:

Common reasons for early tooth loss are trauma, extraction due to caries or periodontal disease and congenital missing. The remaining space after tooth loss may cause functional and esthetic problems. Therefore restorative dentists should attempt to manage these spaces using conservative methods. The goal is to restore the lost esthetic and function, prevent phonetic, self-esteem and personality problems and tongue habits. Preserving alveolar bone is also of great importance during the growth stage. Purpose: When deciding about the management of the missing tooth, space implants are contradicted until the completion of dentoalveolar development. Even in adulthood, due to systemic or periodontal problems or biological and economic issues, the implant might not be indicated. In this article, the alternative conservative restorative methods of space maintenance are going to be discussed. Essix retainers are made chair-side as easy as forming a custom bleaching tray with some modifications. They are esthetically acceptable and not expensive. These temporaries provide support for the lips but could not be used during function. Mini-screw-supported temporaries are another option for maintaining the space, especially after orthodontic treatment when there is a time lag between the termination of orthodontic treatment and definitive restoration. Two techniques will be presented for this kind of restoration: Denture tooth pontic or a composite crown. The benefits are alveolar bone preservation, Physiologic pressure on the alveolar ridge to increase its density and even can be retained until the completion of the definitive treatment. Bonded fixed partial denture includes Maryland bridge, fiber-reinforced composite bridge, resin-bonded bridge, and ceramic bonded bridge. These types of bridges are recommended to be used after a pubertal growth spurt and a recent meta-analysis considered their clinical success similar to conventional FDPs and implant-supported crowns. However, they have several advantages that are going to be discussed by presenting some clinical examples. Practical instruction on how to construct an FRC bridge and a novel chair-side Maryland bridge will be given by means of clinical cases. Clinical relevance: minimally invasive options should always be considered and destruction of healthy enamel and dentin during the preparation phase should be avoided as much as possible.

Keywords: tooth missing, fiber-reinforced composite, Maryland, Essix retainers, screw-retained restoration

Procedia PDF Downloads 174