999 resultados para Site security
Resumo:
Background: An accurate percutaneous puncture is essential for disintegration and removal of renal stones. Although this procedure has proven to be safe, some organs surrounding the renal target might be accidentally perforated. This work describes a new intraoperative framework where tracked surgical tools are superimposed within 4D ultrasound imaging for security assessment of the percutaneous puncture trajectory (PPT). Methods: A PPT is first generated from the skin puncture site towards an anatomical target, using the information retrieved by electromagnetic motion tracking sensors coupled to surgical tools. Then, 2D ultrasound images acquired with a tracked probe are used to reconstruct a 4D ultrasound around the PPT under GPU processing. Volume hole-filling was performed in different processing time intervals by a tri-linear interpolation method. At spaced time intervals, the volume of the anatomical structures was segmented to ascertain if any vital structure is in between PPT and might compromise the surgical success. To enhance the volume visualization of the reconstructed structures, different render transfer functions were used. Results: Real-time US volume reconstruction and rendering with more than 25 frames/s was only possible when rendering only three orthogonal slice views. When using the whole reconstructed volume one achieved 8-15 frames/s. 3 frames/s were reached when one introduce the segmentation and detection if some structure intersected the PPT. Conclusions: The proposed framework creates a virtual and intuitive platform that can be used to identify and validate a PPT to safely and accurately perform the puncture in percutaneous nephrolithotomy.
Resumo:
A fast and direct surface plasmon resonance (SPR) method for the kinetic analysis of the interactions between peptide antigens and immobilised monoclonal antibodies (mAb) has been established. Protocols have been developed to overcome the problems posed by the small size of the analytes (< 1600 Da). The interactions were well described by a simple 1:1 bimolecular interaction and the rate constants were self-consistent and reproducible. The key features for the accuracy of the kinetic constants measured were high buffer flow rates, medium antibody surface densities and high peptide concentrations. The method was applied to an extensive analysis of over 40 peptide analogues towards two distinct anti-FMDV antibodies, providing data in total agreement with previous competition ELISA experiments. Eleven linear 15-residue synthetic peptides, reproducing all possible combinations of the four replacements found in foot-and-mouth disease virus (FMDV) field isolate C-S30, were evaluated. The direct kinetic SPR analysis of the interactions between these peptides and three anti-site A mAbs suggested additivity in all combinations of the four relevant mutations, which was confirmed by parallel ELISA analysis. The four-point mutant peptide (A15S30) reproducing site A from the C-S30 strain was the least antigenic of the set, in disagreement with previously reported studies with the virus isolate. Increasing peptide size from 15 to 21 residues did not significantly improve antigenicity. Overnight incubation of A15S30 with mAb 4C4 in solution showed a marked increase in peptide antigenicity not observed for other peptide analogues, suggesting that conformational rearrangement could lead to a stable peptide-antibody complex. In fact, peptide cyclization clearly improved antigenicity, confirming an antigenic reversion in a multiply substituted peptide. Solution NMR studies of both linear and cyclic versions of the antigenic loop of FMDV C-S30 showed that structural features previously correlated with antigenicity were more pronounced in the cyclic peptide. Twenty-six synthetic peptides, corresponding to all possible combinations of five single-point antigenicity-enhancing replacements in the GH loop of FMDV C-S8c1, were also studied. SPR kinetic screening of these peptides was not possible due to problems mainly related to the high mAb affinities displayed by these synthetic antigens. Solution affinity SPR analysis was employed and affinities displayed were generally comparable to or even higher than those corresponding to the C-S8c1 reference peptide A15. The NMR characterisation of one of these multiple mutants in solution showed that it had a conformational behaviour quite similar to that of the native sequence A15 and the X-ray diffraction crystallographic analysis of the peptide ? mAb 4C4 complex showed paratope ? epitope interactions identical to all FMDV peptide ? mAb complexes studied so far. Key residues for these interactions are those directly involved in epitope ? paratope contacts (141Arg, 143Asp, 146His) as well as residues able to stabilise a particular peptide global folding. A quasi-cyclic conformation is held up by a hydrophobic cavity defined by residues 138, 144 and 147 and by other key intrapeptide hydrogen bonds, delineating an open turn at positions 141, 142 and 143 (corresponding to the Arg-Gly-Asp motif).
Resumo:
Revista Lusófona de Educação
Resumo:
A Organização Mundial de Saúde estima que nos países mais industrializados uma em cada três pessoas sofra, por ano, de uma doença de origem alimentar. De acordo com os dados da Agência Europeia para a Segurança Alimentar foram relatados pelos 27 Estados Membros da União Europeia, no ano 2012, um total de 5.363 surtos de origem alimentar, assistindo-se a uma prevalência do setor da restauração, como o local de maior ocorrência dos surtos de doenças de origem alimentar. Para o mesmo ano, Portugal reportou 7 surtos de origem alimentar, envolvendo 135 pessoas com 42 hospitalizações. Neste contexto, a aplicação de boas práticas de higiene, nomeadamente no setor da restauração, é essencial para proteger o consumidor das doenças de origem alimentar. Neste estudo, pretendeu-se identificar os constructos do modelo da Teoria do Comportamento Planeado (Theory of Planned Behaviour – TPB, segundo a terminologia anglo-saxónica), de Icek Ajzen, que melhor explicam a intenção dos operadores de alimentos em adotarem os comportamentos de higiene, a saber: i) utilização de luvas e touca de proteção de cabelos, e ii) remoção de adornos pessoais, durante a manipulação de alimentos. Para o efeito, foi aplicado um questionário tendo por base a Teoria do Comportamento Planeado, a uma amostra de cento e vinte e três operadores dos vários refeitórios de uma universidade portuguesa, na sua grande maioria do sexo feminino (91,1%) e que manipulam alimentos numa base diária, recorrendo-se primeiramente a uma fase preliminar de estudo qualitativo, ou pré-inquérito, para melhor selecionar os temas essenciais e as principais categorias a considerar na construção deste inquérito. Os inquéritos foram tratados estatisticamente recorrendo-se à estatística descritiva, à análise fatorial e avaliação da consistência interna dos fatores resultantes, seguido da aplicação de regressão linear e metodologia de análise de trajetórias (path modeling) com vista à validação do TPB. Os resultados obtidos apontam para o fato de a Atitude ser o melhor preditor da Intenção em adotar os comportamentos em estudo. Verificou-se também que a motivação de cumprir resulta da pressão exercida pelos superiores hierárquicos ou colegas, influenciando positivamente a intenção, na medida em que as crenças normativas assumiram-se como sendo o segundo preditor que melhor previu a intenção.
Resumo:
One hundred and twenty subjects with Chagas' cardiopathy and 120 non-infected subjects were randomly selected from first time claimants of sickness benefits in the National Institute of Social Security (INPS) in Goiás. Cases of Chagas' cardiopathy were defined based on serological test, history of residence in an endemic area and, clinical and/or electrocardiogram (ECG) alterations suggestive of Chagas' cardiomyopathy. Controls were defined as subjects with at least two negative serological tests. Case and controls were compared in the analysis for age, sex, place of birth, migration history, socio-economic level, occupation, physical exertion at work, age at affiliation and years of contribution to the social security scheme, clinical course of their disease and ECG abnormalities. Chagas' disease patients were younger than other subjects and predominantly of rural origin. Non-infected subjects presented a better socio-economic level, were performing more skilled activities and had less changes of job than cases. No important difference was observed in relation to age at affiliation to INPS. About 60% of cases have claimed for benefits within the first four years of contribution while among controls this proportion was 38.5%. Cases were involved, proportionally more than controls, in "heavy" activities. A risk of 2.3 (95%CL 1.5 - 4.6) and 1.8 (95%CL 1.2- 3.5) was obtained comparing respectively "heavy" and "moderate" physical activity against "light". A relative risk of 8.5 (95%CL 4.9 - 14.8) associated with the presence of cardiopathy was estimated comparing the initial sample of seropositive subjects and controls. A high relative risk was observed in relation to right bundle branch block (RR = 37.1 95%CL = 8.8 - 155.6) and left anterior hemiblock (RR = 4.4, 95%CL = 2.1 - 9.1).
Resumo:
A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.
Resumo:
Reclaimed water from small wastewater treatment facilities in the rural areas of the Beira Interior region (Portugal) may constitute an alternative water source for aquifer recharge. A 21-month monitoring period in a constructed wetland treatment system has shown that 21,500 m(3) year(-1) of treated wastewater (reclaimed water) could be used for aquifer recharge. A GIS-based multi-criteria analysis was performed, combining ten thematic maps and economic, environmental and technical criteria, in order to produce a suitability map for the location of sites for reclaimed water infiltration. The areas chosen for aquifer recharge with infiltration basins are mainly composed of anthrosol with more than 1 m deep and fine sand texture, which allows an average infiltration velocity of up to 1 m d(-1). These characteristics will provide a final polishing treatment of the reclaimed water after infiltration (soil aquifer treatment (SAT)), suitable for the removal of the residual load (trace organics, nutrients, heavy metals and pathogens). The risk of groundwater contamination is low since the water table in the anthrosol areas ranges from 10 m to 50 m. Oil the other hand, these depths allow a guaranteed unsaturated area suitable for SAT. An area of 13,944 ha was selected for study, but only 1607 ha are suitable for reclaimed water infiltration. Approximately 1280 m(2) were considered enough to set up 4 infiltration basins to work in flooding and drying cycles.
Resumo:
Dissertação apresentada ao Instituto Superior de Contabilidade para a obtenção do Grau de Mestre em Assessoria de Administração
Resumo:
Distribution systems are the first volunteers experiencing the benefits of smart grids. The smart grid concept impacts the internal legislation and standards in grid-connected and isolated distribution systems. Demand side management, the main feature of smart grids, acquires clear meaning in low voltage distribution systems. In these networks, various coordination procedures are required between domestic, commercial and industrial consumers, producers and the system operator. Obviously, the technical basis for bidirectional communication is the prerequisite of developing such a coordination procedure. The main coordination is required when the operator tries to dispatch the producers according to their own preferences without neglecting its inherent responsibility. Maintenance decisions are first determined by generating companies, and then the operator has to check and probably modify them for final approval. In this paper the generation scheduling from the viewpoint of a distribution system operator (DSO) is formulated. The traditional task of the DSO is securing network reliability and quality. The effectiveness of the proposed method is assessed by applying it to a 6-bus and 9-bus distribution system.
Resumo:
Urban Computing (UrC) provides users with the situation-proper information by considering context of users, devices, and social and physical environment in urban life. With social network services, UrC makes it possible for people with common interests to organize a virtual-society through exchange of context information among them. In these cases, people and personal devices are vulnerable to fake and misleading context information which is transferred from unauthorized and unauthenticated servers by attackers. So called smart devices which run automatically on some context events are more vulnerable if they are not prepared for attacks. In this paper, we illustrate some UrC service scenarios, and show important context information, possible threats, protection method, and secure context management for people.
Resumo:
Mestrado em Engenharia Electrotécnica e de Computadores
Resumo:
The remediation of contaminated sites supports the goal of sustainable development but may also have environmental impacts at a local, regional and global scale. Life cycle assessment (LCA) has increasingly been used in order to support site remediation decision-making. This review article discusses existing LCA methods and proposed models focusing on critical decisions and assumptions of the LCA application to site remediation activities. It is concluded that LCA has limitations as an adequate holistic decisionmaking tool since spatial and temporal differentiation of non-global impacts assessment is a major hurdle in site remediation LCA. Moreover, a consequential LCA perspective should be adopted when the different remediation services to be compared generate different site’s physical states, displacing alternative post-remediation scenarios. The environmental effects of the post-remediation stage of the site is generally disregarded in the past site remediation LCA studies and such exclusion may produce misleading conclusions and misdirected decision-making. In addition, clear guidance accepted by all stakeholders on remediation capital equipment exclusion and on dealing with multifunctional processes should be developed for site remediation LCA applications.
Resumo:
Relatório de Estágio para obtenção do grau de Mestre em Engenharia Civil na Área de Especialização de Edificações
Resumo:
The relation between the information/knowledge expression and the physical expression can be involved as one of items for an ambient intelligent computing [2],[3]. Moreover, because there are so many contexts around user/spaces during a user movement, all appplcation which are using AmI for users are based on the relation between user devices and environments. In these situations, it is possible that the AmI may output the wrong result from unreliable contexts by attackers. Recently, establishing a server have been utilizes, so finding secure contexts and make contexts of higher security level for save communication have been given importance. Attackers try to put their devices on the expected path of all users in order to obtain users informationillegally or they may try to broadcast their SPAMS to users. This paper is an extensionof [11] which studies the Security Grade Assignment Model (SGAM) to set Cyber-Society Organization (CSO).
Resumo:
Dissertação apresentada à Escola Superior de Comunicação Social como parte dos requisitos para obtenção de grau de mestre em Audiovisual e Multimédia.