نتایج جستجو برای: root detection

تعداد نتایج: 700951  

2002
Wei Zha Steven D. Blostein

We propose a stable and reduced-complexity detection method for the Bell Labs layered Space-Time (BLAST) coding system. The existing iterative nulling and cancellation algorithm for BLAST has high computational complexity and requires repeated matrix pseudoinverse calculation which may lead to numerical instability. A square-root algorithm was proposed by other researchers to reduce complexity ...

Journal: :Polish journal of radiology 2016
Smita Kamtane Monali Ghodke

BACKGROUND The aim of the study was to identify the number of root canals and examine root canal morphology of permanent mandibular incisors in an Indian sub-population of Pune, Maharashtra, India using cone-beam computed tomography (CBCT). MATERIAL/METHODS This study was conducted at Elite CBCT & Dental Diagnostics, Pune. One hundred mandibular incisors were evaluated for the number of root,...

Journal: :iranian endodontic journal 0
solmaz valiozadeh shahid beheshti university of medical sciences maryam khosravi shahid beheshti university of medical sciences zeynab azizi shahid beheshti university of medical sciences

introduction: vertical root fracture (vrf) is a common failure in endodontically treated teeth. due to vrf’s poor prognosis, a reliable and valid detection method is critical for treatment planning. conventional and digital radiographs are limited in vrf detection. recently, cone beam ct (cbct) system has been introduced. this study aimed to compare the diagnostic accuracy of these three imagin...

Journal: :Optics letters 2004
Golo von Basum Daniel Halmer Peter Hering Manfred Mürtz Stephan Schiller Frank Müller Alexander Popp Frank Kühnemann

Spectroscopic detection of ethane in the 3-microm wavelength region was performed by means of a cw optical parametric oscillator and cavity leak-out. We achieved a minimum detectable absorption coefficient of 1.6 x 10(-10) cm 1/square root of Hz, corresponding to an ethane detection limit of 6 parts per trillion/square root of Hz. For 3-min integration time the detection limit was 0.5 parts per...

2013
Marney E Isaac Luke C N Anglaaere

Tree root distribution and activity are determinants of belowground competition. However, studying root response to environmental and management conditions remains logistically challenging. Methodologically, nondestructive in situ tree root ecology analysis has lagged. In this study, we tested a nondestructive approach to determine tree coarse root architecture and function of a perennial tree ...

Journal: :Journal of endodontics 2002
Asako Oishi Takatomo Yoshioka Chihiro Kobayashi Hideaki Suda

The aim of this study was to investigate the possibility of detecting root canal constrictions by using an apex locator. Seventy impenetrable canals in extracted human teeth were used. Based on contact microradiographic findings, they were divided into three groups: group A (constricted within 3 mm of the radiographic apex, 23 canals), group B (nonconstricted within 3 mm of the radiographic ape...

Journal: :iranian endodontic journal 0
yaser safi sepanta hosseinpour alireza aziz masoud bamedi mahsa malekashtari zahra vasegh

introduction: this study sought to assess the effects of amperage (ma) and field of view (fov) on intracanal metal post artifacts and the diagnostic parameters for detection of vertical root fracture (vrf) in teeth with intracanal posts. methods and materials: in this diagnostic study, 80 human single-canal teeth were evaluated by cone-beam computed tomography (cbct). nickel chrome cast posts w...

2016
Zhihao Li Dave Levin Bobby Bhattacharjee Neil Spring

DNS root name servers play a crucial role in the Internet operation. Detecting and identifying anomalous activities around root servers is a critical task for network operators. It is not hard to “detect” the huge attacks [1], but how do we detect more than just the strongest, most extreme signals? How can we go about extracting, studying and understanding the smaller (but still nontrivial) ano...

2013
You Joung Ham Won-Bin Choi Hyung-Woo Lee

Recently, the number of attacks by malicious application has significantly increased, targeting Android-platform mobile terminal such as Samsung Galaxy Note I/II and Galaxy Tab 10.1, etc. The malicious application can be distributed and installed on user’s mobile devices through open market after masquerading as a common normal application. An attacker inserts malicious code into an application...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید