期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
论网络环境下会计信息系统安全技术性控制的实现 被引量:3
1
作者 程琳 《经济师》 2006年第1期220-221,共2页
文章探讨了网络环境下会计信息系统安全技术控制方面的问题,指出要保证互联网网上会计信息系统的安全,必须建立七个方面的控制。
关键词 网络环境 会计信息系统 安全技术性控制
下载PDF
节能降耗视角下石油化工工艺技术性安全策略分析
2
作者 房国栋 刘书玉 《当代化工研究》 CAS 2024年第4期145-147,共3页
石油化工行业在进行生产工作时,需要应用到多项复杂技术,并且其中存在的隐患问题比较多,如果没有及时发现隐患,所造成的安全事故会严重威胁到企业的正常发展以及现场工作人员的人身安全。所以在节能降耗视角下,针对石油化工工艺技术安... 石油化工行业在进行生产工作时,需要应用到多项复杂技术,并且其中存在的隐患问题比较多,如果没有及时发现隐患,所造成的安全事故会严重威胁到企业的正常发展以及现场工作人员的人身安全。所以在节能降耗视角下,针对石油化工工艺技术安全开展研究是非常必要的事情。对此本文通过分析石油化工工艺流程中技术性安全问题,并基于节能降耗的视角下提出石油化工生产技术安全的控制策略,希望能够为石油化工行业的工作人员在开展工作方面提供参考。 展开更多
关键词 节能降耗 石油化工工艺 技术性安全 策略
下载PDF
关于石油化工工艺技术性的安全探讨
3
作者 邓存瑞 邵梅梅 +2 位作者 马占佳 黄邦勇 吴海超 《石油石化物资采购》 2023年第16期101-103,共3页
随着我国石油化工技术的不断发展,其对环境造成了严重污染,因此,加强安全管理是非常关键的。在这种情况下就需要采取措施来进行预防,针对当前石化工艺中存在的很多问题和不足之处加以改进和完善也具有重要意义。因此,需要对化工工艺技... 随着我国石油化工技术的不断发展,其对环境造成了严重污染,因此,加强安全管理是非常关键的。在这种情况下就需要采取措施来进行预防,针对当前石化工艺中存在的很多问题和不足之处加以改进和完善也具有重要意义。因此,需要对化工工艺技术性的安全进行深入研究,从而为石油化工生产提供保障,为我国的经济发展提供良好环境。 展开更多
关键词 石油化工工艺 技术性安全 策略
下载PDF
石油化工工艺技术性安全的探究 被引量:6
4
作者 宋镇 《化工管理》 2021年第2期173-174,共2页
石油化工行业对当今社会的发展起到举足轻重的影响,由于石油化工生产过程中所涉及到的技术十分复杂,同时涉及到很多安全隐患,一旦隐患造成安全事故的发生,对企业和工作人员的生命财产安全都会带来严重的影响,所以对其工艺技术的安全进... 石油化工行业对当今社会的发展起到举足轻重的影响,由于石油化工生产过程中所涉及到的技术十分复杂,同时涉及到很多安全隐患,一旦隐患造成安全事故的发生,对企业和工作人员的生命财产安全都会带来严重的影响,所以对其工艺技术的安全进行研究有着重要的意义。文章首先分析了石油化工工艺流程中技术性安全所存在的问题,其次基于上述问题,提出几点提高石油化工工艺基础性安全的措施,主要围绕石油化工的原料、管道和技术路线等方面展开论述,旨在对相关工程技术人员提供一定的参考。 展开更多
关键词 石油化工工艺 技术性安全 策略
下载PDF
石油化工工艺技术性安全的探究 被引量:1
5
作者 陈树鹏 李文娟 +1 位作者 曾勇 孙广辉 《中国石油和化工标准与质量》 2023年第15期113-115,共3页
石油作为一种石化燃料,具有易燃、易爆和毒性较大的特点,所以石油化工产业以石油为原材料的加工过程较为危险,极易出现安全问题。在石油化工生产过程中缺乏对其安全性的重视,极有可能会对工作人员身体健康造成极大的威胁,甚至会因为泄... 石油作为一种石化燃料,具有易燃、易爆和毒性较大的特点,所以石油化工产业以石油为原材料的加工过程较为危险,极易出现安全问题。在石油化工生产过程中缺乏对其安全性的重视,极有可能会对工作人员身体健康造成极大的威胁,甚至会因为泄漏破坏周围环境。所以石油化工产业不断优化工艺技术的安全性十分重要。石油化工企业领导者要重视安全生产,将石化工艺技术的先进性和安全性作为重点发展方向。本文从石油化工安全风险的影响因素入手,对石油化工工艺技术安全性进行探究,提出可行性对策。 展开更多
关键词 石油 化工工艺 技术性安全
原文传递
浅谈地铁盾构施工设备的管理及维保 被引量:1
6
作者 马弘达 《中文科技期刊数据库(全文版)工程技术》 2022年第8期4-7,共4页
伴随着中国经济实力逐渐提高,高新科技与时俱进。盾构施工技术广泛用于地铁工程,有效的解决了地铁站工程施的部分问题。在地铁建设中,盾构施工具有一定的市场优势。在这样的一个施工过程中,机械设备是主要因素,机械设备是否正常运作决... 伴随着中国经济实力逐渐提高,高新科技与时俱进。盾构施工技术广泛用于地铁工程,有效的解决了地铁站工程施的部分问题。在地铁建设中,盾构施工具有一定的市场优势。在这样的一个施工过程中,机械设备是主要因素,机械设备是否正常运作决定了工程项目能不能顺利开展。因而,在地铁盾构施工中,建筑企业需要进一步加强施工机械设备的监管。依据工程项目规定,分组管理各种机械设备设备,搞好日常管理与维护,防止地铁站盾构施工中机械设备造成质量以及安全隐患,充分运用地铁站盾构施工整体的品质、机械设备在盾构施工中的重要性,增加设备使用期限。但是目前地铁工程盾构施工中,设备管理方法还存在一些不够,难以保证工作效能和水平。 展开更多
关键词 地铁站盾构 工程施工设备管理方法 安全技术性
下载PDF
Assessing performance of collision mitigation brake system in Chinese traffic environment 被引量:5
7
作者 ZHAO Zhi-guo ZHENG Xun-jia +2 位作者 WANG Jian-qiang XU Qing KODAKA Kenji 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第10期2854-2869,共16页
Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to bette... Advanced driver-assistance systems such as Honda’s collision mitigation brake system(CMBS)can help achieve traffic safety.In this paper,the naturalistic driving study and a series of simulations are combined to better evaluate the performance of the CMBS in the Chinese traffic environment.First,because safety-critical situations can be diverse especially in the Chinese environment,the Chinese traffic-accident characteristics are analyzed according to accident statistics over the past 17 years.Next,10 Chinese traffic-accident scenarios accounting for more than 80%of traffic accidents are selected.For each typical scenario,353 representative cases are collected from the traffic-management department of Beijing.These real-world accident cases are then reconstructed by the traffic-accident-reconstruction software PC-Crash on the basis of accident-scene diagrams.This study also proposes a systematic analytical process for estimating the effectiveness of the technology using the co-simulation platform of PC-Crash and rateEFFECT,in which 176 simulations are analyzed in detail to assess the accident-avoidance performance of the CMBS.The overall collision-avoidance effectiveness reaches 82.4%,showing that the proposed approach is efficient for avoiding collisions,thereby enhancing traffic safety and improving traffic management. 展开更多
关键词 active-safety technology effectiveness assessment accident reconstruction autonomous emergency braking PC-CRASH
下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
8
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 secret sharing verifiable secret redistribution proactive secret sharing
下载PDF
Safety and success of precut biliary sphincterotomy: Is it linked to experience or expertise? 被引量:10
9
作者 Lindsay S Robison Shyam Varadarajulu C Mel Wilcox 《World Journal of Gastroenterology》 SCIE CAS CSCD 2007年第15期2183-2186,共4页
AIM: To determine the rates of success and complications of precut biliary sphincterotomy (PBS) based on prior experience and to compare the complication rates between PBS and standard endoscopic sphincterotomy (E... AIM: To determine the rates of success and complications of precut biliary sphincterotomy (PBS) based on prior experience and to compare the complication rates between PBS and standard endoscopic sphincterotomy (ES). METHODS: A retrospective evaluation of prospectively collected non-randomized data at an academic tertiary referral center, The study included all patients in an eight-year period who underwent PBS and ES by a single endoscopist who had no formal training in PBS. The main outcorne measures of the study were success and complications of PBS with a comparison to complications of ES.RESULTS: A total of 2939 endoscopic retrograde chola ngiopancreatographies (ERCPs) were performed during the study period, including 818 (28%) ES and 150 (5%) PBS procedures. Selective biliary cannulation via PBS was successful at the first attempt in 75% of the patients. Cannulation was achieved in an additional 13% of the patients at a subsequent attempt (total 87%). Complication rate from PBS was 45% higher than ES, but did not differ significantly [7% (10/50) vs 5% (38/818), P = 0.29]. None of the complications from PBS was severe. A significant trend towards increasing success existed with regard to the endoscopist's first attempt at precut (P = 0.0393, Cochran-Armitage exact test for trend, Z = -1.7588). CONCLUSION: Despite the lack of specific training in this technique, PBS was performed with a high success rate and a complication rate similar to or less than reports from other experienced centers. These results suggest that endoscopic experience and perhaps innate endoscopic skill may play an important role in the outcome of this procedure. 展开更多
关键词 Biliary sphincterotomy Precut sphincterotomy Complication rate Endoscopic skill
下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
10
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
下载PDF
SATVPC:Secure-agent-based trustworthy virtual private cloud model in open computing environments 被引量:2
11
作者 徐小龙 涂群 +2 位作者 BESSIS Nik 杨庚 王新珩 《Journal of Central South University》 SCIE EI CAS 2014年第8期3186-3196,共11页
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft... Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally. 展开更多
关键词 cloud computing trustworthy computing VIRTUALIZATION agent
下载PDF
A New Anonymity Model for Privacy-Preserving Data Publishing 被引量:5
12
作者 HUANG Xuezhen LIU Jiqiang HAN Zhen YANG Jun 《China Communications》 SCIE CSCD 2014年第9期47-59,共13页
Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity atta... Privacy-preserving data publishing (PPDP) is one of the hot issues in the field of the network security. The existing PPDP technique cannot deal with generality attacks, which explicitly contain the sensitivity attack and the similarity attack. This paper proposes a novel model, (w,γ, k)-anonymity, to avoid generality attacks on both cases of numeric and categorical attributes. We show that the optimal (w, γ, k)-anonymity problem is NP-hard and conduct the Top-down Local recoding (TDL) algorithm to implement the model. Our experiments validate the improvement of our model with real data. 展开更多
关键词 data security privacy protection ANONYMITY data publishing
下载PDF
Safety and Efficacy of Frameless Stereotactic Brain Biopsy Techniques 被引量:3
13
作者 Qiu-jian Zhang Wen-hao Wang +1 位作者 Xiang-pin Wei Yi-gang Yu 《Chinese Medical Sciences Journal》 CAS CSCD 2013年第2期113-116,共4页
Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frame... Objective To explore the safety and efficacy of frameless stereotactic brain biopsy.Methods Diagnostic accuracy was calculated by comparing biopsy diagnosis with definitive pathology in 62 patients who underwent frameless stereotactic brain biopsy between January 2008 and December 2010 in Xiamen University Southeast Hospital.Preoperative characteristics and histological diagnosis were reviewed and then information was analysed to identify factors associated with the biopsy not yielding a diagnosis and complications.Results Diagnostic yield was 93.5%.No differences were found between pathological diagnosis and frozen pathological diagnosis.The most common lesions were astrocytic lesions,included 16 cases of low-grade glioma and 12 cases of malignant glioma.Remote hemorrhage,metastasis,and lymphoma were following in incidence.Multiple brain lesions were found in 17 cases (27.4%).Eleven cases were frontal lesions (17.7%),8 were frontotemporal (12.9%),6 were frontoparietal (9.7%),and 5 each were temporal,parietal,and parietotemporal lesions (8.1%).Postoperative complications occurred in 21.0% of the patients after biopsies,including 10 haemorrhages (16.1%) and 3 temporary neurological deficits (1 epilepsy,1 headache,and 1 partial hemiparesis).No patient required operation for hematoma evacuation.Conclusion Frameless stereotactic biopsy is an effective and safe technique for histologic diagnosis of brain lesions,particularly for multifocal and frontal lesions. 展开更多
关键词 STEREOTAXIS FRAMELESS BIOPSY HISTOLOGY
下载PDF
Technical Progress on Researches for the Safety of High Concrete-Faced Rockfill Dams 被引量:24
14
作者 Hongqi Ma Fudong Chi 《Engineering》 SCIE EI 2016年第3期332-339,共8页
The concrete-faced rockfill dam(CFRD) is an important dam type in the selection of high dams to be constructed in Western China,owing to its direct utilization of local materials,good adaptability,and distinct economi... The concrete-faced rockfill dam(CFRD) is an important dam type in the selection of high dams to be constructed in Western China,owing to its direct utilization of local materials,good adaptability,and distinct economic advantages.Over the past decades,China has gained successful experience in the construction of 200 m CFRDs,providing the necessary technical accumulation for the development of 250–300 m ultra-high CFRDs.This paper summarizes these successful experiences and analyzes the problems of a number of major 200 m CFRDs around the world.In addition,it discusses the key technologies and latest research progress regarding safety in the construction of 250–300 m ultra-high CFRDs,and suggests focuses and general ideas for future research. 展开更多
关键词 High concrete-faced rockfill dam SAFETY Technical progress
下载PDF
Cluster Based Secure Dynamic Keying Technique for Heterogeneous Mobile Wireless Sensor Networks 被引量:1
15
作者 Thiruppathy Kesavan.V Radhakrishnan.S 《China Communications》 SCIE CSCD 2016年第6期178-194,共17页
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or... In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility. 展开更多
关键词 CLUSTER dynamic key HETEROGENEOUS MOBILITY wireless sensor network WEIGHT
下载PDF
Local mine production safety supervision game analysis based on incomplete information
16
作者 李兴东 李英 +1 位作者 任大伟 刘兆霞 《Journal of Coal Science & Engineering(China)》 2007年第4期516-519,共4页
Utilized fundamental theory and analysis method of Incomplete Information repeated games, introduced Incomplete Information into repeated games, and established two stages dynamic games model of the local authority an... Utilized fundamental theory and analysis method of Incomplete Information repeated games, introduced Incomplete Information into repeated games, and established two stages dynamic games model of the local authority and the coal mine owner. The analytic result indicates that: so long as the country established the corresponding rewards and punishments incentive mechanism to the local authority departments responsible for the work, it reports the safety accident in the coal mine on time. The conclusion that the local government displays right and wrong cooperation behavior will be changed with the introduction of the Incomplete Information. Only has the local authority fulfill their responsibility, can the unsafe accident be controlled effectively. Once this kind of cooperation of local government appears, the costs of the country on the safe supervise and the difficulty will be able to decrease greatly. 展开更多
关键词 incomplete information local coal mine local government repeated games safe supervise
下载PDF
Cryptanalysis of an image encryption scheme based on the Hill cipher
17
作者 Cheng-qing Dan ZHANG Guan-rong CHEN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1118-1123,共6页
This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a nu... This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al., 2006) and reports its following problems: (1) There is a simple necessary and sufficient condition that makes a number of secret keys invalid; (2) It is insensitive to the change of the secret key; (3) It is insensitive to the change of the plain-image; (4) It can be broken with only one known/chosen plaintext; (5) It has some other minor defects. The proposed cryptanalysis discourages any use of the scheme in practice. 展开更多
关键词 CRYPTANALYSIS ENCRYPTION Hill cipher Known-plaintext attack Chosen-plahltext attack
下载PDF
Longwall automation: Delivering enabling technology to achieve safer and more productive underground mining 被引量:30
18
作者 Ralston Jonathon C. Reid David C. +1 位作者 Dunn Mark T. Hainsworth David W. 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2015年第6期865-876,共12页
The ongoing need to deliver improved safety, productivity and environmental benefit in coal mining presents an open challenge as well as a powerful incentive to develop new and improved solutions. This paper assesses ... The ongoing need to deliver improved safety, productivity and environmental benefit in coal mining presents an open challenge as well as a powerful incentive to develop new and improved solutions. This paper assesses the critical role that enabling technologies have played in the delivery of remote and automated capability for longwall mining. A brief historical account is given to highlight key technical contributions which have influenced the direction and development of present-day longwall technology. The current state of longwall automation is discussed with particular attention drawn to the technologies that enable automated capability. Outcomes are presented from an independently conducted case study that assessed the impact that CSIRO's LASC longwall automation research has made to the longwall mining industry in Australia. Importantly, this study reveals how uptake of this innova- tive technology has significantly benefitted coal mine productivity, improved working conditions for personnel and enhanced environmental outcomes. These benefits have been widely adopted with CSIRO automation technology being used in 60 per cent of all Australian underground operations. International deployment of the technology is also emerging. The paper concludes with future challenges and opportunities to highfight the ongoing scope for longwall automation research and development. 展开更多
关键词 Safety Productivity Environment Mining automation Longwall mining Remote mining
下载PDF
ESSA: An Efficient and Secure Splitting Algorithm for Distributed Storage Systems
19
作者 CHEN Zhao YAO Wenbin XIAO Da WU Chunhua LIU Jianyi WANG Cong 《China Communications》 SCIE CSCD 2010年第4期89-95,共7页
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente... The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing. 展开更多
关键词 Distributed System Secure Storage Information Dispersal knight's tour problem
下载PDF
Effectiveness and Safety of Computer-controlled Periodontal Ligament Injection System in Endodontic Access to the Mandibular Posterior Teeth 被引量:3
20
作者 Quan Jing Kuo Wan +1 位作者 Xiao-jun Wang Lin Ma 《Chinese Medical Sciences Journal》 CAS CSCD 2014年第1期23-27,共5页
Objective To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posteri... Objective To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posterior teeth in patients with irreversible pulpitis. Methods A total of 162 Chinese patients who had been diagnosed with irreversible pulpitis in their mandibular posterior teeth without acute infection or inflammation in the periodontal tissues were enrolled in this clinical study. The patients were divided into 3 groups according to the position of the involved tooth: the premolar group (PM, z2=38), first molar group (FM, n=66), and second molar group (SM, n=58). All the patients received computer-controlled PDL injection with 4% articaine and 1 ' 100 000 epinephrine. Immediately after the injection, endodontic access was performed, and the degree of pain during the treatment was evaluated by the patients using Visual Analogue Scale for pain. The success rates were compared among the 3 groups. The responses of local soft tissues were evaluated 3-8 days and 3 weeks after the procedure. Results The overall success rate was 76.5%. There was a significant difference in success rates among the PM, FM, and SM groups (92.1%, 53.0%, 93.1%, respectively; 2 X =34.3, P〈0.01). Both the PM and SM groups showed higher success rates than that of the FM group (v=l, f=16.73, P〈0.01, v=l, Z = 4.5, X2 2 P〈0.01). No irreversible adverse effects on the periodontal soft tissues at the injection sites were observed in the follow-up visits in any of the groups. Conclusion The computer-controlled PDL injection system demonstrates both satisfactory anesthetic effects and safety in local soft tissues as primary anesthetic technique in endodontic access to the mandibular posterior teeth in patients with irreversible pulpitis. 展开更多
关键词 periodontal ligament injection endodontic access irreversible pulpitis
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部