68 resultados para Protocolos : Difusao confiavel
Resumo:
This is a study descriptive cross-sectional and quantitative approaches, which aimed to analyze the association between hospital infection rate for insertion, maintenance of central venous catheter and the breakdown of protocols (rules and routines) by health professionals assisting patients in the ICU of a university hospital in Natal / RN. The process of data collection was through observation with structured form, refers to medical records and structured questionnaires with health professionals. The results were organized, tabulated, categorized and analyzed using SPSS 14.0. The characterization of the subjects was performed using descriptive and inferential statistics, taking into account the nature of the variables, with analysis of variance (ANOVA) and Spearman correlation test, it was a discussion of the information obtained, considering the mean, standard deviation, coefficient of variance and standard error. The variables that showed a higher level of correlation were treated with the application of significance tests. As the results, 71% of participants were female and 29% male, age ranged from 18 to 85 years (52.6 ± 22.5). The insertion, there was a variation from 0 to 5 errors (1.2 ± 1.4), during maintenance, the average was 2.3 ± 0.9 errors, ranging from 0 to 4. During the insertion and maintenance of CVC, patients who had been an infection ranging from 2 to 9 mistakes (4.2 ± 1.7), since those who did not show the variation goes from 0 to 5 errors (2, 8 ± 1.5). The correlation coefficient between the risk of infection throughout the process and the risk of infection at the insertion showed strong and significant (r = 0.845 p = 0.000) and in relation to risk of infection in maintenance was moderate and significant (r = 0.551 p = 0.001). The mistakes made by professionals in the procedures for insertion and maintenance of the catheter, associated with other conditions, shown as a risk factor for the of IH
Resumo:
The advent of the Internet stimulated the appearance of several services. An example is the communication ones present in the users day-by-day. Services as chat and e-mail reach an increasing number of users. This fact is turning the Net a powerful communication medium. The following work explores the use of communication conventional services into the Net infrastructure. We introduce the concept of communication social protocols applied to a shared virtual environment. We argue that communication tools have to be adapted to the Internet potentialities. To do that, we approach some theories of the Communication area and its applicability in a virtual environment context. We define multi-agent architecture to support the offer of these services, as well as, a software and hardware platform to support the accomplishment of experiments using Mixed Reality. Finally, we present the obtained results, experiments and products
Resumo:
This work presents a packet manipulation tool developed to realize tests in industrial devices that implements TCP/IP-based communication protocols. The tool was developed in Python programming language, as a Scapy extension. This tool, named IndPM- Industrial Packet Manipulator, can realize vulnerability tests in devices of industrial networks, industrial protocol compliance tests, receive server replies and utilize the Python interpreter to build tests. The Modbus/TCP protocol was implemented as proof-of-concept. The DNP3 over TCP protocol was also implemented but tests could not be realized because of the lack of resources. The IndPM results with Modbus/TCP protocol show some implementation faults in a Programmable Logic Controller communication module frequently utilized in automation companies
Resumo:
RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID system is the security of the information. Recently, researchers have demonstrated solutions to security threats in RFID technology. Among these solutions are several key management protocols. This master dissertations presents a performance evaluation of Neural Cryptography and Diffie-Hellman protocols in RFID systems. For this, we measure the processing time inherent in these protocols. The tests was developed on FPGA (Field-Programmable Gate Array) platform with Nios IIr embedded processor. The research methodology is based on the aggregation of knowledge to development of new RFID systems through a comparative analysis between these two protocols. The main contributions of this work are: performance evaluation of protocols (Diffie-Hellman encryption and Neural) on embedded platform and a survey on RFID security threats. According to the results the Diffie-Hellman key agreement protocol is more suitable for RFID systems
Resumo:
The public illumination system of Natal/RN city presents some recurring problems in the aspect of monitoring, since currently is not possible to detect in real time the light bulbs which are on throughout the day, or those which are off or burned out, at night. These factors depreciate the efficiency of the services provided, as well as, the use of energetic resources, because there is energetic waste and, consequently, financial resources that could be applied at the own public system illumination. The purpose of the work is create a prototype in substitution to the currently photoelectric relays used at public illumination, that have the same function, as well others: turn on or off the light bulbs remotely (control flexibility by the use of specifics algorithms supervisory), checking the light bulbs status (on or off) and wireless communication with the system through the ZigBee® protocol. The development steps of this product and the tests carried out are related as a way to validate and justify its use at the public illumination
Resumo:
This thesis was performed in four chapters, at the theoretical level, focused mainly on electronic density. In the first chapter, we have applied an undergraduate minicourse of Diels-Alder reaction in Federal University of Rio Grande do Norte. By using computational chemistry tools students could build the knowledge by themselves and they could associate important aspects of physical-chemistry with Organic Chemistry. In the second chapter, we studied a new type of chemical bond between a pair of identical or similar hydrogen atoms that are close to electrical neutrality, known as hydrogen-hydrogen (H-H) bond. In this study performed with complexed alkanes, provides new and important information about their stability involving this type of interaction. We show that the H-H bond playing a secondary role in the stability of branched alkanes in comparison with linear or less branched isomers. In the third chapter, we study the electronic structure and the stability of tetrahedrane, substituted tetrahedranes and silicon and germanium parents, it was evaluated the substituent effect on the carbon cage in the tetrahedrane derivatives and the results indicate that stronger electron withdrawing groups (EWG) makes the tetrahedrane cage slightly unstable while slight EWG causes a greater instability in the tetrahedrane cage. We showed that the sigma aromaticity EWG and electron donating groups (EDG) results in decrease and increase, respectively, of NICS and D3BIA aromaticity indices. In addition, another factor can be utilized to explain the stability of tetra-tert-butyltetrahedrane as well as HH bond. GVB and ADMP were also used to explain the stability effect of the substituents bonded to the carbon of the tetrahedrane cage. In the fourth chapter, we performed a theoretical investigation of the inhibitory effect of the drug abiraterone (ABE), used in the prostate cancer treatment as CYP17 inhibitor, comparing the interaction energies and electron density of the ABE with the natural substrate, pregnenolone (PREG). Molecular dynamics and docking were used to obtain the CYP1ABE and CYP17-PREG complexes. From molecular dynamics was obtained that the ABE has higher diffusion trend water CYP17 binding site compared to the PREG. With the ONIOM (B3LYP:AMBER) method, we find that the interaction electronic energy of ABE is 21.38 kcal mol-1 more stable than PREG. The results obtained by QTAIM indicate that such stability is due a higher electronic density of interactions between ABE and CYP17
Resumo:
A disponibilidade de cadáveres para estudo e pesquisa vinha sendo feita tradicionalmenteutilizando-se corpos não reclamados sem grandes formalidades. Com a complexidadejurídica, social, ética e moral dos tempos atuais, o simples encaminhamento dessescorpos ao Departamento de Morfologia da Universidade Federal do Rio Grande do Norte,passou a ser temido com o receio de transgredir a legislação penal. Isso desencadeouuma redução no número de cadáveres para as aulas práticas de Anatomia. Essarealidade levou o Departamento de Morfologia da Universidade Federal do Rio Grande doNorte a pesquisar mecanismos legais que solucionassem a escassez de cadáveres parao estudo e pesquisa. A metodologia utilizada constou de reuniões de discussão eapresentação de protocolos de aquisição de cadáveres com base na legislação vigente.Os resultados obtidos foram: (1) Publicação do provimento 093/2012 da CorregedoriaGeral da Justiça do Tribunal de Justiça do Estado do Rio Grande do Norte, que dispõesobre o registro de óbito dos cadáveres destinados às escolas de Medicina para fins deensino e pesquisa; (2) Elaboração de protocolos para aquisição de cadáveres nãoreclamados junto às instituições; (3) Programa de doadores voluntários na UniversidadeFederal do Rio Grande do Norte.Por fim, concluímos que o conhecimento das atribuiçõespor parte das instituições públicas e privada, bem como o programa de doação voluntáriaaumentaram a oferta de cadáveres para o ensino da Anatomia Humana na UniversidadeFederal do Rio Grande do Norte.
Resumo:
The objective of this randomized, blind and prospective clinical trial was to compare the pain, the edema, the mandibular movements, the masticatory efficiency and life quality, in the first 60 days after surgery using 2 different clinical protocols for myofunctional recovery, in patients who underwent orthognathic surgery. A sample of 19 patients was used and divided into 2 groups. The control group (CG) consisted of 10 patients who had postoperative rehabilitation guided by a standard protocol, conducted by the Service of Surgery and Traumatology Oral and Maxillofacial. In other hand, the experimental group (EC) totaled 9 patients who received the speech therapy rehabilitation protocol specialized, by professionals in the area. The variables pain, edema and mandibular movements were analyzed during 48h, 96h, 7 days, 14 days, 30 and 60 days post-surgery. The masticatory efficiency and the quality of life were classified with 60 days after surgery . The data were submitted an analysis of variance, Student's t-test and Fisher's independence, at the level of 5% probability. It was identified that patients of GE have benefited in the first 14 days(p<0,001), as they have had reported less pain than those in the CG. Significant statistics differences between groups for pain parameters (after 14 days) (p=0,065), edema(p=0,063), mandibular movements(p=0,068), masticatory efficiency(p=0,630) and the impact on quality of life (p=0,813) were not observed on this study. The speech therapy protocol for myofunctional recovery (EG), although it has not obtained statistical results superiors than the CG in the general context, presents itself as a viable alternative to conventional therapy assumed by many maxillofacial surgeons, allowing the surgeon to optimize time with patients in the period postoperatively.
Resumo:
ARAÚJO, M. M. ; MEDEIROS, M. D. . AS minundências da Biblioteca Olegário Vale (Caicó - RN, 1918-1920). Educação em Questão, v. 31, p. 186-208, jan./abr. 2008
Resumo:
Com a incorporação de conceitos da automação em ambientes hospitalares surge uma série de novos requisitos pertinentes a área médica. Dentre esses requisitos, um que merece destaque é a necessidade do estabelecimento de uma rede de comunicação segura e eficiente entre os elementos do ambiente hospitalar, visto que, os mesmos encontram-se de maneira distribuída. Nesse sentido, existe uma série de protocolos que podem ser utilizados no estabelecimento dessa rede, dentre os quais, um que merece destaque é o PM-AH (Protocolo Multiciclos para Automação Hospitalar) justamente por ser voltado a automatização de ambientes hospitalares tanto no que diz respeito ao cumprimento dos requisitos impostos nesse tipo de ambiente, como pelo fato de ser projetado para funcionar sobre a tecnologia Ethernet, padrão esse que é comumente utilizado pela rede de dados dos hospitais. Em decorrência disso, o presente trabalho aborda uma análise de desempenho comparativa entre redes PM-AH e puramente Ethernet visando atestar a eficiência do primeiro no que diz respeito ao cumprimento dos requisitos impostos pela automação hospitalar
Resumo:
A grande diversidade na arquitetura de dispositivos de hardware, aliada aos seus diferentes protocolos de comunicação, tem dificultado a implementação de sistemas que necessitam realizar o acesso a esses dispositivos. Diante dessas diferenças, surge a necessidade de prover o acesso a esses dispositivos de forma transparente. Neste sentido, o presente trabalho propõe um middleware mult entrada e saída para acesso a dispositivos, como forma de abstrair o mecanismo de escrita e leitura de dados em dispositivos de hardware, contribuindo desta forma, para o aumento na produtividade dos sistemas, uma vez que os desenvolvedores estão focados apenas nos seus requisitos funcionais
Resumo:
The power-law size distributions obtained experimentally for neuronal avalanches are an important evidence of criticality in the brain. This evidence is supported by the fact that a critical branching process exhibits the same exponent t~3=2. Models at criticality have been employed to mimic avalanche propagation and explain the statistics observed experimentally. However, a crucial aspect of neuronal recordings has been almost completely neglected in the models: undersampling. While in a typical multielectrode array hundreds of neurons are recorded, in the same area of neuronal tissue tens of thousands of neurons can be found. Here we investigate the consequences of undersampling in models with three different topologies (two-dimensional, small-world and random network) and three different dynamical regimes (subcritical, critical and supercritical). We found that undersampling modifies avalanche size distributions, extinguishing the power laws observed in critical systems. Distributions from subcritical systems are also modified, but the shape of the undersampled distributions is more similar to that of a fully sampled system. Undersampled supercritical systems can recover the general characteristics of the fully sampled version, provided that enough neurons are measured. Undersampling in two-dimensional and small-world networks leads to similar effects, while the random network is insensitive to sampling density due to the lack of a well-defined neighborhood. We conjecture that neuronal avalanches recorded from local field potentials avoid undersampling effects due to the nature of this signal, but the same does not hold for spike avalanches. We conclude that undersampled branching-process-like models in these topologies fail to reproduce the statistics of spike avalanches.
Resumo:
The research aimed to understand the challenges for the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP. This study aimed to explore the gap with regard to the deepening of the possible causes that may hinder the implementation of integrated working between the police in public security, through a specific analysis on the state of Rio Grande do Norte. Was based on a theoretical framework that includes policies: general concepts, the steps of a public policy, the implementation stage , public security : conceptual definitions, policies on security in Brazil, the structure of public security in Brazil and systems police, Military Police x Civil Police: Roles and conflicts , integrating public security: the challenges to be overcome, the Unified public Safety (SUSP) and the main difficulties in the integration of the police. Being classified as to the purposes as an exploratory research on how to approach ranks as qualitative. The research unit was the Center for Integrated Operations Public Safety (CIOSP) through three subjects who were the chief CIOSP, the representative of the military police acting with the CIOSP, and representative civil police also active with the CIOSP. These subjects were chosen because of the understanding that individuals occupying senior positions would have more ability to respond to questions that guide the research problem. Data were collected through a set of interviews, qualitative data analysis was performed based content analysis, based on the definition of categories of analysis, gated time cross. With the results, it was revealed that the main problems of integration between the state police are treatment protocols, lack of political will and lack of infrastructure. The relationship between the Military Police and Civil Police in Rio Grande do Norte has differing cultural aspect, but can be considered as good value, professionalism and integrated operations. The implementation of CIOSP-RN followed the characteristics of the top-down model, the main difficulties in implementing the proposals of the SUSP, lack of own resources, the lack of standardization in public safety and the lack of professional training of public safety. It was concluded that with respect to the challenges to the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP, the actions follow the characteristics of the top-down model, with no autonomy of administrators public to say in decisions, which restricts the view of the public safety of the state
Resumo:
Worldwide, families Carangidae and Rachycentridae represent one of the groups most important commercial fish, used for food, and great potential for marine aquaculture. However, the genetic bases that can underpin the future cultivation of these species, cytogenetic between these aspects are very weak. The chromosomal patterns have provided basic data for the exploration of biotechnological processes aimed at handling chromosomal genetic improvement, such as induction of polyploidy, androgenesis and ginogenesis, as well as obtaining monosex stocks and interspecific hybridizations. This paper presents a comprehensive cytogenetic survey in 10 species, seven of the family Carangidae and the monotypic family Rachycentridae. Classical cytogenetic analysis and in situ mapping of multigene sequences were employed, and additionally for the genus Selene and morphotypes of Caranx lugubris, comparisons were made using geometric morphometrics. In general, conservative species exhibit a marked chromosome number (2n=48). Although present in large part, different karyotypic form, retain many characteristics typical of chromosomal Order Perciformes, the high number of elements monobrachyal, Ag-NORs/18S rDNA sites and heterochromatin simply reduced, preferably centromeric. The main mechanisms involved in karyotypic diversification are the pericentric inversions, with secondary action of centric fusions. In addition to physical mapping and chromosome detail for the species are presented and discussed patterns of intra-and interspecific diversity, cytotaxonomic markers. This data set provides a better understanding of these patterns caryoevolutyonary groups and conditions for the development of protocols based on Biotechnology for chromosomal manipulation Atlantic these species
Resumo:
without practical results so far. Protocols used in biotechnological cultured aquatic organisms aimed at increasing growth rates and disease resistance, have been studied and perfected. Among the available techniques, the application of chromosomal manipulation, although still nascent, is presented as a tool aimed at mitigating ecological and economical issues in shrimp farming. The polyploidization artificial method already employed in fish and shellfish, has been widely researched for use in farmed shrimp. Some limitations of this method of expansion in shrimp refer to a better knowledge of cytogenetic aspects, the level of sexual dimorphism and performance in growing conditions. To contribute on some of these issues, the present study aimed to characterize cytogenetic species Litopenaeus vannamei (Decapoda) and Artemia franciscana (Anostraca), analyze the effectiveness of methods for detection of ploidy, through the use of flow cytometry in processes of induction polyploidy cold thermal shock at different stages of development of newly fertilized eggs. Additionally, aimed also the qualitative and quantitative comparison of larval development between diploid and polyploid organisms, besides the identification of sexual dimorphism in L. vannamei, through geometric morphometrics. The results provide information relevant to the improvement and widespread use of biotechnological methods applied toward national productivity in shrimp farming