39 resultados para Monitoramento de pacientes. Wi-Bio. IEEE 802.11. Redes de Petri e Network Simulator 2 (NS2)
Resumo:
OBJECTIVE: The aim of this work was to analyse some oxidative stress parameters in patients of Systemic Lúpus Erythematosus. PATIENTS AND METHODS: Determinations of reduced glutathione content in whole blood were carried out. The activity of superoxide dismutase, gluthatione peroxidase and catalase in erythrocytes and the concentration of reactive substances of acid thiobarbituric in plasma of patients female (n =19) with SLE no activity of disease (Mex-SLEDAI < 2), with average ages of 32 ± 11 years, through the spectrophotometrical methods and from healthy individuals (n =30). Statistical data were analyzed by student t-test, p<0,05. RESULTS: Our data indicated a significant decrease on the activity of catalase and significant increase on the concentration of reactive substances of acid thiobarbituric in patients with SLE comparing with healthy individuals. There was no significant difference in other parameters. CONCLUSION: The results showed that oxidative stress has a role in the pathogenesis of the disease in SLE, even in patients without active disease.
Resumo:
Wireless sensors and actuators Networks specified by IEEE 802.15.4, are becoming increasingly being applied to instrumentation, as in instrumentation of oil wells with completion Plunger Lift type. Due to specific characteristics of the environment being installed, it s find the risk of compromising network security, and presenting several attack scenarios and the potential damage from them. It`s found the need for a more detailed security study of these networks, which calls for use of encryption algorithms, like AES-128 bits and RC6. So then it was implement the algorithms RC6 and AES-128, in an 8 bits microcontroller, and study its performance characteristics, critical for embedded applications. From these results it was developed a Hybrid Algorithm Cryptographic, ACH, which showed intermediate characteristics between the AES and RC6, more appropriate for use in applications with limitations of power consumption and memory. Also was present a comparative study of quality of security among the three algorithms, proving ACH cryptographic capability.
Resumo:
This work aims at modeling power consumption at the nodes of a Wireless Sensor Network (WSN). For doing so, a finite state machine was implemented by means of SystemC-AMS and Stateflow modeling and simulation tools. In order to achieve this goal, communication data in a WSN were collected. Based on the collected data, a simulation environment for power consumption characterization, which aimed at describing the network operation, was developed. Other than performing power consumption simulation, this environment also takes into account a discharging model as to analyze the battery charge level at any given moment. Such analysis result in a graph illustrating the battery voltage variations as well as its state of charge (SOC). Finally, a case study of the WSN power consumption aims to analyze the acquisition mode and network data communication. With this analysis, it is possible make adjustments in node-sensors to reduce the total power consumption of the network.
Resumo:
The spread of wireless networks and growing proliferation of mobile devices require the development of mobility control mechanisms to support the different demands of traffic in different network conditions. A major obstacle to developing this kind of technology is the complexity involved in handling all the information about the large number of Moving Objects (MO), as well as the entire signaling overhead required to manage these procedures in the network. Despite several initiatives have been proposed by the scientific community to address this issue they have not proved to be effective since they depend on the particular request of the MO that is responsible for triggering the mobility process. Moreover, they are often only guided by wireless medium statistics, such as Received Signal Strength Indicator (RSSI) of the candidate Point of Attachment (PoA). Thus, this work seeks to develop, evaluate and validate a sophisticated communication infrastructure for Wireless Networking for Moving Objects (WiNeMO) systems by making use of the flexibility provided by the Software-Defined Networking (SDN) paradigm, where network functions are easily and efficiently deployed by integrating OpenFlow and IEEE 802.21 standards. For purposes of benchmarking, the analysis was conducted in the control and data planes aspects, which demonstrate that the proposal significantly outperforms typical IPbased SDN and QoS-enabled capabilities, by allowing the network to handle the multimedia traffic with optimal Quality of Service (QoS) transport and acceptable Quality of Experience (QoE) over time.
Resumo:
Cryptography is the main form to obtain security in any network. Even in networks with great energy consumption restrictions, processing and memory limitations, as the Wireless Sensors Networks (WSN), this is no different. Aiming to improve the cryptography performance, security and the lifetime of these networks, we propose a new cryptographic algorithm developed through the Genetic Programming (GP) techniques. For the development of the cryptographic algorithm’s fitness criteria, established by the genetic GP, nine new cryptographic algorithms were tested: AES, Blowfish, DES, RC6, Skipjack, Twofish, T-DES, XTEA and XXTEA. Starting from these tests, fitness functions was build taking into account the execution time, occupied memory space, maximum deviation, irregular deviation and correlation coefficient. After obtaining the genetic GP, the CRYSEED and CRYSEED2 was created, algorithms for the 8-bits devices, optimized for WSNs, i.e., with low complexity, few memory consumption and good security for sensing and instrumentation applications.
Resumo:
Cryptography is the main form to obtain security in any network. Even in networks with great energy consumption restrictions, processing and memory limitations, as the Wireless Sensors Networks (WSN), this is no different. Aiming to improve the cryptography performance, security and the lifetime of these networks, we propose a new cryptographic algorithm developed through the Genetic Programming (GP) techniques. For the development of the cryptographic algorithm’s fitness criteria, established by the genetic GP, nine new cryptographic algorithms were tested: AES, Blowfish, DES, RC6, Skipjack, Twofish, T-DES, XTEA and XXTEA. Starting from these tests, fitness functions was build taking into account the execution time, occupied memory space, maximum deviation, irregular deviation and correlation coefficient. After obtaining the genetic GP, the CRYSEED and CRYSEED2 was created, algorithms for the 8-bits devices, optimized for WSNs, i.e., with low complexity, few memory consumption and good security for sensing and instrumentation applications.
Resumo:
Background: Cardiac Rehabilitation (CR) has effect on mortality in patients with heart failure (HF) chronic, and the exercise of the treatment of this patient. The most common exercise is ongoing training. Recently we have been studying the effects of interval training, but there is no consensus on the optimal dose of exercise. Objective: To evaluate the effects of interval aerobic training are superior to continuous aerobic training in patients with chronic HF. Methods: The clinical trial evaluated patients through cardiopulmonary test (CPX) and quality of life before and after the RC (3 times / 12 weeks). Patients were randomized into Group Interval Training (GTI - 85% of heart rate reserve - FCR), Continuous Training Group (GTC - 60% of HRR) and control group (CG) who received guidelines. Results: 18 patients were evaluated (mean age 44.7 ± 13.2 years and 35.2 ± 8.9% of left ventricular ejection fraction [LVEF]). Both groups were efficient to increase the peak VO2 and 15.1% (P = 0.02) in GTI and 16.1% (P = 0.01) GTC. As for the quality of life the GTI GTC showed improvement compared to the control group (P = 0.006). Hemodynamic mismatch events during the CPX were reduced after training in more GTC (patients 1 to 4) than in the GTI (5 to 3). Cardiac risk also decreased in the GTC (3 patients left the severe risk to take after training). Conclusion: Continuous training becomes more appropriate for improving fitness with little chance of developing cardiac event patients with chronic HF.
Resumo:
From the 70`s, with the publication of the Manifesto for Environment UN Conference, held in Stockholm, in Sweden (1972), defend and improve the environment became part of our daily lives. Thus, several studies have emerged in several segments in order to reuse the waste. Some examples of waste incorporated in portland cement concrete are: rice husk ash, bagasse ash of cane sugar, powder-stone, microsilica, tire rubber, among others. This research used the residue of the mining industry Scheelite, to evaluate the incorporation of the residue composition of Portland cement concrete, replacing the natural sand. The percentage of residue were incorporated from 0% to 100%, with a variation of 10%, 11 being produced concrete mix in the ratio 1:2:3:0.60, by mass. We evaluated the following characteristics of concrete: slump test, compressive strength, tensile strength by diametral compression, water absorption, porosity and density, based on the ABNT, through tests performed in the Laboratory of Civil Construction, UFRN. The trace with the addition of 60% scheelite residue was obtained which better performance. Therefore, the use of the waste from the production of Scheelite is feasible due to the durability parameters (water absorption and porosity), sustainability, and the good results of the resistance of the concrete
Resumo:
This work proposes a computer simulator for sucker rod pumped vertical wells. The simulator is able to represent the dynamic behavior of the systems and the computation of several important parameters, allowing the easy visualization of several pertinent phenomena. The use of the simulator allows the execution of several tests at lower costs and shorter times, than real wells experiments. The simulation uses a model based on the dynamic behavior of the rod string. This dynamic model is represented by a second order partial differencial equation. Through this model, several common field situations can be verified. Moreover, the simulation includes 3D animations, facilitating the physical understanding of the process, due to a better visual interpretation of the phenomena. Another important characteristic is the emulation of the main sensors used in sucker rod pumping automation. The emulation of the sensors is implemented through a microcontrolled interface between the simulator and the industrial controllers. By means of this interface, the controllers interpret the simulator as a real well. A "fault module" was included in the simulator. This module incorporates the six more important faults found in sucker rod pumping. Therefore, the analysis and verification of these problems through the simulator, allows the user to identify such situations that otherwise could be observed only in the field. The simulation of these faults receives a different treatment due to the different boundary conditions imposed to the numeric solution of the problem. Possible applications of the simulator are: the design and analysis of wells, training of technicians and engineers, execution of tests in controllers and supervisory systems, and validation of control algorithms