oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

时间不限

2017 ( 31 )

2016 ( 93 )

2015 ( 593 )

2014 ( 852 )

自定义范围…

匹配条件: “Harkanwal Preet Singh” ,找到相关结果约13913条。
列表显示的所有文章,均可免费获取
第1页/共13913条
每页显示
Prosthodontic management of mandibular deviation using palatal ramp appliance
Prince Kumar,Chandni Jain,Ashish Kumar,Harkanwal Preet Singh
Journal of Medical and Allied Sciences , 2012,
Abstract: Segmental resection of the mandible generally results in deviation of the mandible to the defective side. This loss of continuity of the mandible destroys the balance of the lower face and leads to decreased mandibular function by deviation of the residual segment toward the surgical site. Prosthetic methods advocated to reduce or eliminate mandibular deviation include intermaxillary fixation, removable mandibular guide flange, palatal ramp, implant-supported prosthesis and palatal guidance restorations which may be useful in reducing mandibular deviation and improving masticatory performance and efficiency. These methods and restorations would be combined with a well organized mandibular exercise regimen. This clinical report describes the rehabilitation following segmental mandibulectomy using palatal ramp prosthesis.
Role of Sugar and Sugar Substitutes in Dental Caries: A Review
Prahlad Gupta,Nidhi Gupta,Atish Prakash Pawar,Smita Shrishail Birajdar,Amanpreet Singh Natt,Harkanwal Preet Singh
ISRN Dentistry , 2013, DOI: 10.1155/2013/519421
Abstract: Dental caries is a chronic disease which can affect us at any age. The term “caries” denotes both the disease process and its consequences, that is, the damage caused by the disease process. Dental caries has a multifactorial aetiology in which there is interplay of three principal factors: the host (saliva and teeth), the microflora (plaque), and the substrate (diet), and a fourth factor: time. The role of sugar (and other fermentable carbohydrates such as highly refined flour) as a risk factor in the initiation and progression of dental caries is overwhelming. Whether this initial demineralization proceeds to clinically detectable caries or whether the lesion is remineralized by plaque minerals depends on a number of factors, of which the amount and frequency of further sugars consumption are of utmost importance. This paper reviews the role of sugar and sugar substitutes in dental caries. 1. Introduction To most people the term “sugar” refers to the common household foodstuff table sugar (sucrose). Yet sucrose is only one of many naturally occurring sugars used in the human diet. Technically the term “sugars” applies to two classifications of carbohydrates: free-form monosaccharides (simple sugars) which include the more common glucose, fructose, and galactose and disaccharides (two simple sugar molecules linked together) which include the most common sucrose, lactose, and maltose. Naturally occurring sugars are available in fruits, vegetables, grains, and dairy foods. Sweeteners are added sugars that are used as ingredients to both satisfy our taste and in some cases provide added energy. Grouping sweeteners as “nutritive” or “nonnutritive” acknowledges a difference in the amount of energy provided by the sweetener. Nutritive sweeteners may be referred to as caloric and include sugars and sugar alcohols. Nonnutritive sweeteners offer no energy and can sweeten with little volume. Both sugar alcohols and nonnutritive sweeteners can replace the sugars and are sometimes referred to as sugar substitutes, sugar replacers, or alternative sweeteners [1]. We searched the pertinent literature in PubMed and MEDLINE databases by using key words such as sugar in dental caries, sugar substitute in dental caries, and various types of sugar in dental caries. 2. Sugar and Dental Caries Of the many factors that contribute to the development of dental caries, diet plays an important role. Fifty years ago dietary issues relevant to dental caries were largely concerned with dietary sugars. Although sugars are undoubtedly the most important dietary factors in the
Factors Associated with Orthodontic Tooth Movement in Periodontally Compromised Patients  [PDF]
Devinder Preet Singh
Open Journal of Stomatology (OJST) , 2015, DOI: 10.4236/ojst.2015.511033
Abstract: There is no consistent relationship between malocclusion and periodontal disease but certain characteristics of malocclusion can promote a pathologic environment conducive to periodontal disease. One of the dramatic means available to improve the local environmental factors is through orthodontic tooth movement. The pretreatment periodontal conditions can include excessive tooth mobility, advanced crestal bone loss, infrabony defects, tipped molars, furcation involvement, and hard and soft tissue dehiscences. Movement of teeth in the presence of periodontal inflammation can result in an increased loss of attachment and irreversible crestal loss. Although absolute reduction in bone and attachment levels does not contraindicate orthodontic correction, it does increase the difficulty of delivering controlled orthodontic mechanics that would potentially minimize further bone loss. The present review article discusses the various factors that are associated with orthodontic tooth movement in periodontally compromised patients namely: 1) tooth movement into infrabony pockets; 2) tooth movement into compromised bone areas; 3) tooth movement through cortical bone; 4) extrusion (eruption); 5) intrusion; 6) tipping.
Robust Security System for Critical Computers
Preet Inder Singh
International Journal of Information Technology and Computer Science , 2012,
Abstract: Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used, but this system having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting in physical domain. But all conventional cryptographic based encryption methods are having its own limitations, generally either in terms of complexity, efficiency or in terms of security. In this paper a simple method is developed that provide more secure and efficient means of authentication, at the same time simple in design for critical systems. Apart from protection, a step toward perfect security has taken by adding the feature of intruder detection along with the protection system. This is possible by merging various security systems with each other i.e password based security with keystroke dynamic, thumb impression with retina scan associated with the users. This new method is centrally based on user behavior and users related security system, which provides the robust security to the critical systems with intruder detection facilities.
Digital Image Enhancement with Fuzzy Interface System
Amanpreet Singh,Preet Inder Singh,Prabhpreet Kaur
International Journal of Information Technology and Computer Science , 2012,
Abstract: Present day application requires various version kinds of images and pictures as sources of information for interpretation and analysis. Whenever an image is converted from one form to another, such as, digitizing, scanning, transmitting, storing, etc. Some form of degradation occurs at the output. Hence, the output image has to undergo a process called image enhancement which consist of a collection of techniques that seeks to improve the visual appearances of an image. Image enhancement technique is basically improving the perception of information in images for human viewers and providing 'better' input for other automated image processing techniques. This thesis presents a new approach for image enhancement with fuzzy interface system. Fuzzy techniques can manage the vagueness and ambiguity efficiently (an image can be represented as fuzzy set). Fuzzy logic is a powerful tool to represent and process human knowledge in form of fuzzy if-then rules. Compared to other filtering techniques, fuzzy filter gives the better performance and is able to represent knowledge in a comprehensible way.
Genetic Variability in Germplasm Accessions of Capsicum annuum L  [PDF]
Shrilekha Misra, Raj Kishori Lal, Mahendra Pandurang Darokar, Suman Preet Singh Khanuja
American Journal of Plant Sciences (AJPS) , 2011, DOI: 10.4236/ajps.2011.25074
Abstract: Capsicum annuum is the most widely cultivated species of peppers (chilies) in the world. For culinary purposes, its fruits are used for pungency (capsaicin) and also color (capsanthin). Capsaicin is also used for medicinal purposes particularly in anti-inflammatory formulations. Genetic divergence among 38 accessions collected from diverse locations in India (28 from Uttar Pradesh, 5 from Assam, 3 from Maharashtra and 2 from Uttaranchal), was estimated from the data pooled over 3 consecutive years for 15 morphological, growth and chemotypic characters that included days to first and second flowering, fruit onset, plant height, primary, secondary and tertiary branches, leaf surface area, fruit length and diameter, fruit surface area, fresh and dry fruit weight, capsaicin and capsanthin content. Based on this characterization the plants could be grouped into 7 clusters wherein substantial diversity among accessions was indicated by the wide range of D2 values (752.901 - 1918683.00). Accessions with distinct identity were marked, which are likely to be quite suitable for breeding through hybridization combining desirable traits. The accessions labeled number 38, 27, 26, 14 and 24 to high capsaicin content (%); 35, 23, 3, 16, 29 and 11 for high capsanthin content (%) and 26 and 27 for dual purpose had characteristics desirable. Above accessions could be utilized in hybridization programme for C. annuum crop improvement.
Enhanced Password Based Security System Based on User Behavior using Neural Networks
Preet Inder Singh,Gour Sundar Mitra Thakur
International Journal of Information Engineering and Electronic Business , 2012,
Abstract: There are multiple numbers of security systems are available to protect your computer/resources. Among them, password based systems are the most commonly used system due to its simplicity, applicability and cost effectiveness But these types of systems have higher sensitivity to cyber-attack. Most of the advanced methods for authentication based on password security encrypt the contents of password before storing or transmitting in the physical domain. But all conventional encryption methods are having its own limitations, generally either in terms of complexity or in terms of efficiency.In this paper an enhanced password based security system has been proposed based on user typing behavior, which will attempt to identify authenticity of any user failing to login in first few attempts by analyzing the basic user behaviors/activities and finally training them through neural network and classifying them as genuine or intruder
Value Addition in the Efficacy of Conventional Antibiotics by Nisin against Salmonella
Aman Preet Singh, Vijay Prabha, Praveen Rishi
PLOS ONE , 2013, DOI: 10.1371/journal.pone.0076844
Abstract: Frequent and indiscriminate use of existing battery of antibiotics has led to the development of multi drug resistant (MDR) strains of pathogens. As decreasing the concentration of the antibiotic required to treat Salmonellosis might help in combating the development of resistant strains, the present study was designed to assess the synergistic effects, if any, of nisin, in combination with conventional anti-Salmonella antibiotics against Salmonella enterica serovar Typhimurium. Minimum inhibitory concentrations (MICs) of the selected antimicrobial agents were determined by micro and macro broth dilution assays. In-vitro synergy between the agents was evaluated by radial diffusion assay, fractional inhibitory concentration (FIC) index (checkerboard test) and time-kill assay. Scanning electron microscopy (SEM) was also performed to substantiate the effect of the combinations. In-vivo synergistic efficacy of the combinations selected on the basis of in-vitro results was also evaluated in the murine model, in terms of reduction in the number of Salmonellae in liver, spleen and intestine. Nisin-ampicillin and nisin-EDTA combinations were observed to have additive effects, whereas the combinations of nisin-ceftriaxone and nisin-cefotaxime were found to be highly synergistic against serovar Typhimurium as evident by checkerboard test and time-kill assay. SEM results revealed marked changes on the outer membrane of the bacterial cells treated with various combinations. In-vivo synergy was evident from the larger log unit decreases in all the target organs of mice treated with the combinations than in those treated with drugs alone. This study thus highlights that nisin has the potential to act in conjunction with conventional antibiotics at much lower MICs. These observations seem to be significant, as reducing the therapeutic concentrations of antibiotics may be a valuable strategy for avoiding/reducing the development of emerging antibiotic resistance. Value added potential of nisin in the efficacy of conventional antibiotics may thus be exploited not only against Salmonella but against other Gram-negative infections as well.
Feature Selection for classification of hyperspectral data by minimizing a tight bound on the VC dimension
Phool Preet,Sanjit Singh Batra,Jayadeva
Computer Science , 2015,
Abstract: Hyperspectral data consists of large number of features which require sophisticated analysis to be extracted. A popular approach to reduce computational cost, facilitate information representation and accelerate knowledge discovery is to eliminate bands that do not improve the classification and analysis methods being applied. In particular, algorithms that perform band elimination should be designed to take advantage of the specifics of the classification method being used. This paper employs a recently proposed filter-feature-selection algorithm based on minimizing a tight bound on the VC dimension. We have successfully applied this algorithm to determine a reasonable subset of bands without any user-defined stopping criteria on widely used hyperspectral images and demonstrate that this method outperforms state-of-the-art methods in terms of both sparsity of feature set as well as accuracy of classification.\end{abstract}
OPPORTUNISTIC APPROACH TO EXPLOIT WIRELESS SPECTRUM BY USE OF COGNITIVE RADIO
Tanu Preet Singh Preet,Prof. R.K Singh,Jaspreet Kaur,Vishal Sharma
International Journal of Computers & Technology , 2012,
Abstract: Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. In this paper, intrinsic properties and research on software defined cognitive radio (SDCR) are presented. Firstly brief introduction of Cognitive Radio is given along with its architecture. Then spectrum management of Cognitive Radio ad hoc networks (CRAHNs) and their main features like spectrum sensing, spectrum decision, spectrum selection and spectrum mobility are defined. At the end, Software Defined Cognitive Radio (SDCR), its hardware and software platform, along with research topics on SDCR are defined
第1页/共13913条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.