877 resultados para Protocolo de autenticação
Resumo:
Pós-graduação em Fisioterapia - FCT
Resumo:
Pós-graduação em Patologia - FMB
Resumo:
The documentary representation in indexing is carried out, at first, in the analysis of subjects to establish the intrinsic and extrinsic aboutness, and then, in the translation stage using the documentary language. The representation by concepts for determining the intrinsic aboutness during the subject analysis is shown by the Documentary Reading Model for indexing of scientific texts and books, Therefore, it was carried out a search on documentary reading for cataloguers for indexing books in academic libraries. A research on catalogers’ documentary reading for indexing books was carried out in nine university libraries. The application of the introspective technique of Individual Verbal Protocol with the catalogers allowed an analysis of subject cataloguing procedures, which made it possible to verify the textual structure parts of a book, as well as to locate the terms identified and selected. The results led to an adaptation of the Documentary Reading Model to book indexing.
Resumo:
The indexing policy must be represented by means of a philosophy that reflects the system's aims. One of the aspects concerning the indexing policy is relating to the data retrospective conversion. The general aim is to discuss and make a profound study on indexing policy guidelines and to analyze the elements to set up an indexing policy, that should direct the indexing procedures carried out in university libraries using the methodology of verbal protocol. The results demonstrate that the indexing policy serves as a support for the knowledge organization in the catalog, acting as a guide for the librarian when determining the subjects of the documents described in the records. It is concluded that the indexing only will be carried out in the university library during the documentary information treatment by means of a well determined policy.
Resumo:
Evaluate the effects of a modifi ed ConstraintInduced Therapy intervention protocol regarding movement quality and frequency of use of the affected upper extremity on children with hemiplegic cerebral palsy. Longitudinal study of a single case, performed with a four year old submitted to intervention during three hours daily, for ten days, restricting the non-affected upper extremity for eight hours daily. Data were collected using the Pediatric Upper Extremity Motor Activity Log and analyzed using the arithmetic mean. Signifi cant improvement in quality of movement and frequency of use of the upper limb from pre to post-intervention were noted, maintaining the result in later data collection, besides the acquisition of functional motor skills. The modifi ed constraint-induced movement therapy protocol of this study was effective in treating the child with hemiplegic cerebral palsy, the results may be useful for professionals working with this clientele, assisting them in the intervention process.
Resumo:
The discussions that underpin the process of bibliographic classification in documentaries systems should be designed with scientific basis and theoretical, rather than only be based on professional practice. The theoretical approaches, however, attention should also be involved in professional practice. From this, the present study seeks to demonstrate through the perception of catalogers professional, the importance of reflections on the activity of Thematic Treatment of Information, especially the bibliographic classification in order to engender the strengthening of the area and improvements in product quality and services resulting from libraries. In this context, was carried out a study in the libraries of two Federal Institutes of Education, Science and Technology (IF’s) located in two different states of southeastern Brazil. Technique was employed introspective data collection Verbal Protocol in Individual mode, having qualitative character.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
A técnica radioterápica Total Skin Irradiation (TSI), utilizada para tratamento de Micose Fungóide e doenças similares, apresenta grande complexidade na sua dosimetria e implementação nos Serviços de Radioterapia. No SUS – Sistema Único de Saúde - do Brasil, só há esse tratamento no Serviço de Radioterapia do Hospital das Clínicas da UNICAMP (Campinas) e no Instituto Nacional do Câncer (INCA) (Rio de Janeiro). O objetivo deste trabalho é o estudo e o desenvolvimento de um protocolo de controle de qualidade e dosimetria a ser implementado na técnica utilizada no Serviço de Radioterapia do Hospital de Clínicas da Universidade Estadual de Campinas (HC - UNICAMP). Todos os estudos e análises para a elaboração do protocolo foram baseados no Report 23[1] da AAPM – American Association of Physicists in Medicine - e no TRS-398[3] da IAEA – International Atomic Energy Agency. A metodologia e os resultados obtidos apresentam-se descritos neste relatório
Resumo:
Experimental models composed by human and animal cell lines are simplified and informative, allowing them to be widely used for biomedical research. Most laboratories that use in vitro cultivated cells maintain a variation of cell lines stored and cultivated. Therefore, misidentification and cross-contamination events can happen during cell lines handling. This problem can generate a repertoire of dubious results and papers, which may prejudice biomedical research. Recently it was created the International Cell Line Authentication Committee (ICLAC), which aims to spread knowledge about cross-contamination and misidentification of in vitro cell lines. Despite of the efforts spent trying to aware scientific community about the importance of the correct identification of cells, the number of papers based on misidentified cell lines it´s still worrying, compromising the reliability of out coming results and conclusions regarding them. The present study aims to analyze and discuss the main advantages and limitations of eukaryote in vitro cell lines use, characterizing the cell lines authentication problems. Therefore, compilation and critical analyses of literature data was realized, aiming to improve the understanding about this subject. Based on information about 445 cell lines with issues published by ICLAC it´s clear that contamination in human cell lines represented 89,2 % of mentioned problems. HeLa cell line was the responsible for most contamination, especially in 92 normal tissue cell lines, representing 44,6% of the contamination. These results reinforce the importance of periodic maintenance of cell lines cultures by labs and implementation of authentication methods as polymorphic STRs, besides obtaining cell lines from reliable sources and cell banks
Resumo:
The main objective of this study was to analyze the reliability of blood lactate concentration ([La]), oxygen uptake (VO2) and heart rate (FC) in an intermittent protoco, performed at 95%VO2max with passive or active recovery in untrained subjects. Participated of this study, active healthy males with 20 to 25 years, which were doing aerobic exercises witha weekly frequency of 3 sessions at least. The individulas performed, in different days, the following protocols in a cyclergometer: 1) An incremental test until exhaustion to determine maximal oxygen uptake (VO2max) and the intensity at VO2max; b) Two transitions at 95%VO2max for the determination of the VO2 kinetics parameters and; c) Two intermittent tests until exhaustion, with repetitions at 95% IVO2max and with durantion defined as being half of the duration of the slow component. The duration of the recovery was half of the duration of the effort (effort:pause of 2:1). This test was performed with passive (GP) and active recovery (GA). The VO2 and FC were measured continulously in both tests. Blood collections were performed for the determination of the [La]. There was significant correlação in both groups for VO2 (ATIVA - 0.94, PASSIVA - 0.75), [La] (ATIVA - 0.83, PASSIVA - 0.90) and FC (0.93) only for the passive group. Thus, it can be concluded that the cardiorrespiratory and metabolic responses present good realiability in an intermittent exercise with active or passive recovery
Resumo:
The present study aimed to analyze the effects of exercise performed at aerobic/anaerobic transition on non-alcoholic hepatic steatosis (NAHS) markers in diabetic rats. Adult (60 days) male Wistar rats were divided into 4 groups: sedentary control (SC), trained control (TC), sedentary diabetic (i.v. alloxan injection) (SD) and trained diabetic (TD). At the beginning of the experiment, all the animals were submitted to maximal lactate steady state test (MLSS) in order to identify the aerobic/anaerobic metabolic transition during swimming exercise. The trained groups were submitted to swimming, supporting overloads (% of body weight – b.w.) equivalent to MLSS intensity, 1h/day, 5 days/week, during 8 weeks. We analyzed: serum ALT, AST, albumin, glucose and free fat acids (FFA), body weight and total lipid concentrations in the liver. The diabetic groups showed higher (ANOVA two-way, p<0.05) serum glucose (SD=200% and TD= 150%) and weight loss (SD= 15.0% and TD= 8.5%) compared to controls and the SD showed higher glucose concentration and weight loss when compared to TD. The work load (% b.w.) equivalent to the MLSS was lower in TD (4.7%) than in TC (5.6%) group. The NAHS markers (U/L) did not show... (Complete abstract click electronic access below)
Resumo:
Distributed Virtual Environments (DVE) allow multiple users interact with a virtual world by sharing, manipulating objects. Each user has his/her own vision of this world and every changes of state of the environment are distributed among other users. Due to technological constraints, most systems for distributed virtual environments support a limited number of users. The major limitation for development of DVE scale are imposed by the communication system. As the number of users grows, the amount of bandwidth required to exchange information in real time among stations to upgrade the environment and keep it in a consistent state for all connected users. Based on this situation is proposed a framework that uses the protocol anycast in the application layer that provides a load balancing among servers in the region and aims at reducing the latency of message delivery between participants selecting the DVE server best suited for the region participant to connect to the environment
Resumo:
Muscle fatigue is described as a cause of injuries among the many related to the running practice. Therefore, the purpose of this study was to analyze the behavior of the amplitude (RMS) and median frequency (MF) of EMG signal of the iliocostalis (CI), rectus femoris (RF), vastus lateralis (VL), vastus medialis (VM) biceps femoris (long head) (BFCL), tibialis anterior (TA) and gastrocnemius (lateral) (LNG) from the right lower limb, and the behavior of the parameters of amplitude (AP) and frequency (PF) spent in different percentages of the maximum speed during incremental protocol of treadmill running. 10 volunteers participated in this study, athletes, male, aged between 18 and 30 years with no history of injury in lower limbs and similar anthropometry. The protocol consisted of a treadmill test with initial velocity of 10 km.h-¹ and increments of 1 km.h-¹ each three minutes until volitional exhaustion, without rest interval. Synchronized collections were made of electromyographic and kinematic data. The signals were obtained through an acquisition module of biological signals (Telemyo 900 - Noraxon - USA) and software (Myoresearch - Noraxon - USA) calibrated with a sampling frequency of 1000 Hz, gain 2000 times. The raw data were filtered with a 60Hz notch filter, high pass and low pass 20Hz to 500Hz. To capture the image was used a digital video recorder (model NV-GS320, PANASONIC brand), and for image scanning and kinematic data collection was used the software Peak Motus 9.0 (ViconPeak). To obtain the values of RMS and FM analyzed the last ten passes of each speed through a specific routine (Matlab). To obtain these variables AP (m) and FP (stride I min) were analyzed for the last ten past each speed, using specific software (Peak Motus 9.0). After verification of data normality (Shapiro-Wilk) and homogeneity of the data (Levene), the comparison ...(Complete abstract click electronic access below)
Resumo:
The purpose of this study was to investigate the validity of critical force test from maximal lactate steady state (MLSS) during resistance test using straight bench press. Five healthy male volunteers aged (22.6 ± 2.88 years), weight (76.3 ± 11.49 kg) e height (182.6 ± 7.54cm), trained in resistance exercise, and performed four diferent test to determine: one maximal effort (1RM), critical force using the critical power model (force vs 1/time limit - 20, 25 and 30% 1RM). The CF was the linear coefficient and the anaerobic impulse capacity (CIA) was the angular. MLSS was determined using loads of 80, 90, 100 and 110% of critical force. Blood lactate samples were abtained at each 300sec between each stage of total 1200sec. Maximal 30s test (M30) was accomplished with load of 25% of body weight in SBP. The results showed that the 1 RM was 79.4 Kgf (± 16.98), CF 10.1N (± 2.25), CIA 1756.82 N.s (± 546.96) and the R² 0.984 (± 0,02). The MLSS occurs at 100% CF load. The lactate concentration at the MLSS was 2.2 mmol/L (± 0.77). Significant correlation was observed between MLSS and CF on SBP (r = 0.88 p = 0.05). In M30 the minimum, mean and peak power were (25.0 ± 4.9, 28.0 ± 4.9, and 30.0 ± 4.6 kgf.rps, respectively). The fatigue index was 18.0% (± 6,8). The M30 was significantly correlated with Ppeak and Pmean (r = 0.98 for both, p = 0.003). The CF means has been validated to predict the resistance training and the CIA show to be a representative anaerobic parameter in straight bench press.
Resumo:
Given the exponential growth in the spread of the virus world wide web (Internet) and its increasing complexity, it is necessary to adopt more complex systems for the extraction of malware finger-prints (malware fingerprints - malicious software; is the name given to extracting unique information leading to identification of the virus, equivalent to humans, the fingerprint). The architecture and protocol proposed here aim to achieve more efficient fingerprints, using techniques that make a single fingerprint enough to compromise an entire group of viruses. This efficiency is given by the use of a hybrid approach of extracting fingerprints, taking into account the analysis of the code and the behavior of the sample, so called viruses. The main targets of this proposed system are Polymorphics and Metamorphics Malwares, given the difficulty in creating fingerprints that identify an entire family from these viruses. This difficulty is created by the use of techniques that have as their main objective compromise analysis by experts. The parameters chosen for the behavioral analysis are: File System; Records Windows; RAM Dump and API calls. As for the analysis of the code, the objective is to create, in binary virus, divisions in blocks, where it is possible to extract hashes. This technique considers the instruction there and its neighborhood, characterized as being accurate. In short, with this information is intended to predict and draw a profile of action of the virus and then create a fingerprint based on the degree of kinship between them (threshold), whose goal is to increase the ability to detect viruses that do not make part of the same family