Academic literature on the topic 'Intentional heat treatment (IHT) method'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intentional heat treatment (IHT) method.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intentional heat treatment (IHT) method"

1

Gungormus, Mustafa, and Guzin Neda Hasanoglu Erbasar. "Transient Heat Transfer in Dental Implants for Thermal Necrosis-Aided Implant Removal: A 3D Finite Element Analysis." Journal of Oral Implantology 45, no. 3 (2019): 196–201. http://dx.doi.org/10.1563/aaid-joi-d-18-00210.

Full text
Abstract:
Removal of osseointegrated but otherwise failed (mechanical failure, mispositioning, esthetics, etc) dental implants is a traumatic process resulting in loss of healthy bone and complicating the treatment process. The traumatic effects of implant removal can be reduced by weakening the implant-bone attachment. Thermal necrosis-aided implant removal has been proposed as a minimally invasive method toward this end. In this method, an electrocautery tip is contacted to the implant to increase the temperature to 47°C and generate a limited and controlled thermal necrosis at the bone-implant interf
APA, Harvard, Vancouver, ISO, and other styles
2

Vertrees, Roger A., Angela Leeth, Mark Girouard, John D. Roach, and Joseph B. Zwischenberger. "Whole-body hyperthermia: a review of theory, design and application." Perfusion 17, no. 4 (2002): 279–90. http://dx.doi.org/10.1191/0267659102pf588oa.

Full text
Abstract:
The intentional induction of elevated body temperature to treat malignant lesions has its origins in the 18th century. The mechanism of heat-induced cell death is not clear; however, heat induces a variety of cellular changes. For heat to exert a therapeutic effect, pathogens (bacteria, viruses, or neoplastic tissues) need to be susceptible within temperature ranges that do not exert deleterious effects on normal tissues. Hyperthermia has been used successfully to treat isolated neoplastic lesions of the head and neck, regional tumors such as melanoma of the limb, and is under investigation as
APA, Harvard, Vancouver, ISO, and other styles
3

"Prior Solutionising Deformation Consequence on the Aging Characteristics of Steel Powder Reinforced Al 7075 Composites." International Journal of Recent Technology and Engineering 8, no. 2S11 (2019): 2256–61. http://dx.doi.org/10.35940/ijrte.b1248.0982s1119.

Full text
Abstract:
Globally, in the application of structural materials, aluminum composites are emerging as pioneer materials due to balanced properties like ductility, strength, hardness and weight to volume ratio. It is obvious that addition of harder steel powder reinforcements to the softer aluminum alloy matrix will yield in larger benefits as energy efficient method, durability and recyclability for the composite. Infact, improvement in hardness levels at low temperatures in softer matrix aluminium alloys is the order of the day for wear related applications. Aluminum alloy composites especially Al 7075 m
APA, Harvard, Vancouver, ISO, and other styles
4

Al Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.

Full text
Abstract:
Few epidemiological studies have discussed the gender-specific prevalence of ischemic heart disease (IHD). We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension. Three hundred patients were recruited from Prince Sultan Cardiac Center in Al Ahsa, KSA. Hypertension was identified as systolic pressure equal to or more than 140 mmHg and/or diastolic pressure equal to or more than 90 mmHg or by the patient currently being on antihypertensive medication, and coronary artery d
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intentional heat treatment (IHT) method"

1

Eremeev, Anatoly, Sergei Egorov, and Vladislav Kholoptsev. "MILLIMETER WAVE ABSORPTION IN HYDROXYAPATITE AND 3YSZ CERAMICS IN WIDE TEMPERATURE RANGE." In Ampere 2019. Universitat Politècnica de València, 2019. http://dx.doi.org/10.4995/ampere2019.2019.9754.

Full text
Abstract:
In the field of ceramic-based materials processing the last three decades has been marked by significant academic and industry interest in Additive Manufacturing (AM) technology due to its capability to produce ceramic parts with complex geometry and customizable materials properties. Conceptually, AM technology is a layer-by-layer fabrication of three dimensional physical parts directly from computer-aided design [1]. Solidification of the parts prepared from substances containing ceramic powder may be performed either by conventional heat treatment of a part as whole or by directed energy de
APA, Harvard, Vancouver, ISO, and other styles
2

Hurrell, P., C. Watson, J. Bouchard, et al. "Development of Weld Modelling Guidelines in the UK." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77540.

Full text
Abstract:
This paper describes the development of finite element modelling guidelines for the calculation of welding residual stresses. These guidelines form a new section in the R6 procedure, used in the UK nuclear power industry for the assessment of integrity structures containing defects. The intention is to improve the consistency of weld modelling procedures, the accuracy of predicted residual stress profiles and confidence in their use for defect tolerance assessments. The first issue of these guidelines is applicable to austenitic stainless steel joints produced using arc welding processes. The
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!