Search Results

1 - 5 of 5 items

  • Author: Monica Borda x
Clear All Modify Search

Abstract

The spectacular growth in the use of mobile devices is a natural consequence of the benefits they offer. However, most mobile users grant little importance to the security of information stored, processed and transmitted. Even more, the last two years can be considered years of reference for the mobile security industry - ranging from virulent mobile ransomware attacks to mobile IoT botnets and mobile security breaches through mobile malware, that have redefined security paradigms. It is clear that we are at a point of inflection and transition to another generation of cyber attacks and the tendency is that attacks on mobile devices will expand. The security of mobile devices is a topical issue and the main objective is to educate the user to know the risks to which he/she is exposed to and to offer him/her viable security solutions in order to protect himself/herself against mobile threats. In this article we are going to present some protection and mitigation strategies with recommendations for improvement.

Abstract

Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the growing importance of smartphones, it is important to assess the privacy and security risks of these devices in order to mitigate them. However, as we know, in modern mobile security architecture, applications represent the most critical elements. In this paper we review common mobile applications flaws involving network communications, data storage, user input handling and also exploring a number of vulnerabilities. While applications provide amazing features and benefits for users, they also represent the main attraction for cyber criminals. In order to have a true picture of the mobile security threat spectrum, this article presents the means of how mobile applications can impact systems security, stability and compromise personal data if they are not handled properly.

Abstract

This paper describes the particularities of satellite navigation on the territory of Romania in search of solutions to improve the accuracy of these systems. The performance of a Global Navigation Satellite System (GNSS) is influenced by many factors, including distortion of the signal, the influence of the ionosphere and the troposphere, multipath propagation. Some of these factors depend on the geographical position and the environment in which the navigation system is used. Moreover, Romania is located at the border of coverage of two Satellite Based Augmentation Systems (SBAS) – European Geostationary Navigation Overlay Service (EGNOS) and System for Differential Corrections and Monitoring (SDCM) which leads to some peculiarities regarding satellite navigation.

Abstract

The purpose of this study was to determine the prevalence of rubber dam usage among endodontists, other specialized practitioners, general practitioners and undergraduate final year students in Tirgu-Mures, Romania.

Material and method: A questionnaire was distributed among 250 subjects. Final year students and dentists were surveyed in relation to their prevalence of rubber dam usage.

Results: Overall response rate was 72,4. While 84,07% of the subjects knew about the advantages, only 49,72% used it during their practice, mostly endodontist (90%) and other specialized practitioners (53,84%). The use of this system on pediatric patients was lower compared to adult patients. The frequency of the rubber dam usage during endodontic treatment was higher (71,11 %) compared to dental restorations (35,55%), and 84,49% of the subjects were are willing to gain further knowledge about this system.

Conclusions: The results were similar to other reports originally from Eastern-European countries. The low percentage of the rubber dam usage presents quality issues, safety and medico-legal concerns for both the patient and the dentist. Greater emphasis should be placed on the advantages of rubber dam. Perception of final year dental students needs to be improved and continuing dental education for practitioners should be necessary to update their knowledge.

Abstract

Crown or root perforation, ledge formation, fractured instruments and perforation of the roots are the most important accidents which appear during endodontic therapy. Our objective was to evaluate the value of digital intraoral periapical radiographs compared to cone beam computed tomography images (CBCT) used to diagnose some procedural accidents. Material and methods: Eleven extracted molars were used in this study. A total of 18 perforations and 13 ledges were created artifically and 10 instruments were fractured in the root canals. Digital intraoral periapical radiographs from two angles and CBCT scans were made with the teeth fixed in position. The images were evaluated and the number of detected accidents were stated in percentages. Statistical analysis was performed using the chi square-test. Results: On digital periapical radiographs the evaluators identified 12 (66.66%) perforations, 10 (100 %) separated instruments and 10 (76.9%) created ledges. The CBCT scans made possible the recognition of 17 (94.66 %) perforations, 9 (90 %) separated instruments and 13 (100%) ledges. The totally recognized accidental procedures showed significant differences between the two groups. (p<0.05) Conclusion: Digital periapical radiographs are the most common imaging modalities used during endodontic treatments. Though, the CBCT allows a better identification of the procedural accidents.