923 resultados para Algebraic attacks
Resumo:
Outbreaks of attacks upon human beings by vampire bats seems to be a common phenomenon in several regions of Latin America, but the occurrence of rabies infection among humans bled by vampires, is relatively low. In the present study, two outbreaks of human rabies transmitted by common vampire bats (Desmodus rotundus) are described from Bahia State, Northeasthern Brazil, in 1991 and 1992. The first was recorded in Aporá where 308 people were bled by vampire bats and three of these die from this zoonosis. The 2nd outbreak occurred in Conde where only five people were bled by vampires, and two deaths by rabies were registered. Our data suggest that rabies transmitted by bats basically depends on the presence of virus in the vampire bat population and not on the number of humans bled by them.
Resumo:
The aim of the present study was to evaluate the data on human exposure to potential rabies virus transmitters in Olinda, State of Pernambuco, Brazil. Data from 7,062 patients who underwent antirabies prophylactic treatment in Olinda between 2002 and 2006 were analyzed. As expected, dogs and cats were involved in most of the cases; i.e. 82.3 and 16.3%, respectively. Attacks by nonhuman primates, bats and other species (unspecified) were also reported. Among the 7,062 patients who underwent antirabies treatment, 582 patients abandoned the treatment, either by indication from the health unit (195) or by their own decision (387). In conclusion, this study has indicated that prophylaxis for human rabies in this urban area will require a multifaceted approach, including health education, post-exposure prophylaxis, systematic vaccination for dogs and cats, and possibly selective control over wild animals such as hematophagous bats.
Resumo:
Conventionally the problem of the best path in a network refers to the shortest path problem. However, for the vast majority of networks present nowadays this solution has some limitations which directly affect their proper functioning, as well as an inefficient use of their potentialities. Problems at the level of large networks where graphs of high complexity are commonly present as well as the appearing of new services and their respective requirements, are intrinsically related to the inability of this solution. In order to overcome the needs present in these networks, a new approach to the problem of the best path must be explored. One solution that has aroused more interest in the scientific community considers the use of multiple paths between two network nodes, where they can all now be considered as the best path between those nodes. Therefore, the routing will be discontinued only by minimizing one metric, where only one path between nodes is chosen, and shall be made by the selection of one of many paths, thereby allowing the use of a greater diversity of the present paths (obviously, if the network consents). The establishment of multi-path routing in a given network has several advantages for its operation. Its use may well improve the distribution of network traffic, improve recovery time to failure, or it can still offer a greater control of the network by its administrator. These factors still have greater relevance when networks have large dimensions, as well as when their constitution is of high complexity, such as the Internet, where multiple networks managed by different entities are interconnected. A large part of the growing need to use multipath protocols is associated to the routing made based on policies. Therefore, paths with different characteristics can be considered with equal level of preference, and thus be part of the solution for the best way problem. To perform multi-path routing using protocols based only on the destination address has some limitations but it is possible. Concepts of graph theory of algebraic structures can be used to describe how the routes are calculated and classified, enabling to model the routing problem. This thesis studies and analyzes multi-path routing protocols from the known literature and derives a new algebraic condition which allows the correct operation of these protocols without any network restriction. It also develops a range of software tools that allows the planning and the respective verification/validation of new protocols models according to the study made.
Resumo:
Cysticercosis is an infection caused by the larval stage of the tapeworm Taenia solium. The parasite may infect the central nervous system, causing neurocysticercosis (NCC). The clinical manifestations depend on load, type, size, location, stage of development of the cysticerci, and the host's immune response against the parasite. The racemose variety occurs in the ventricles or basal cisterns and is a malignant form. Mobile ventricular mass can produce episodic hydrocephalus on changing head posture with attacks of headache, vomiting, and vertigo, triggered by abrupt movement of the head, a phenomenon called Bruns' syndrome (BS). We report a patient with racemose NCC and BS.
Resumo:
Dissertação de Mestrado realizada sob a apresentada no Instituto Superior de Psicologia Aplicada para obtenção de grau de Mestre na especialidade de Psicologia Clínica.
Resumo:
The Strait of Melaka is the longest strait in the world, stretching for about 800 km from the northern tip of Sumatra to Singapore. It exhibits a dual character like no other, being simultaneously a privileged linking passage of two seas and two knots of human civilization – India and China – and a »bottleneck« that constrains the maritime connections between them. Today, the latter aspect is globally dominant. The strait is considered and analysed mostly as an obstacle rather than a linking point: how to reach China from the West or elsewhere is no longer an issue, but securing the vital flows that pass into the strait on a daily basis undoubtedly is. Accidents, natural catastrophes, political local crises or terrorist attacks are permanent dangers that could cut this umbilical cord of world trade and jeopardize a particularly sensitive and vulnerable area; piracy and pollution are the most common local threats and vulnerabilities.
Resumo:
Rheumatic fever is still the most commonly seen rheumatic disease in Brazilian pediatric rheumatology clinics. It remains a significant health problem since subsequent cardiac sequelae represent one of the most important causes of chronic heart disease in children. We reviewed the clinical manifestations of rheumatic fever in 786 patients, followed at seven pediatric rheumatology clinics in the state of São Paulo, Brazil. All patients were diagnosed according to revised Jones' criteria. Regarding major criteria, 396 (50.4%) children exhibited carditis, 453 (57.6%) polyarthritis, 274 (34.8%) chorea, 13 (1.6%) erythema marginatum, and 12 (1.5%) subcutaneous nodules. Valvular lesions documented by echocardiography in the absence of accompanying auscultatory findings were found in 144 (18.3%) patients. Migratory polyarthritis was observed in 290 (64.0%) patients with articular involvement. Documented previous streptococcal infection assessed by serum antistreptolysin (ASO) titers occurred in 531 (67.5%) patients. Even though prophylaxis with benzathine penicillin was recommended to all patients, recurrent attacks were observed in 147 (18.7%). We emphasize the high frequency of chorea, silent carditis and recurrences in our series as well as the variable clinical presentation of arthritis in rheumatic fever. Multicenter studies should be encouraged to improve our understanding of the clinical features of rheumatic diseases in children and adolescents.
Resumo:
A 7-year-old white boy was referred to us with a history of 3 attacks of hypogastric pain over the previous 2 years and persistently elevated serum amylase concentrations. At physical examination, he was well with no evidence of clinical abnormalities. His weight and height were normal. Laboratory diagnostic investigations were all normal except for the presence of Ascaris lumbricoides in the feces and persistently elevated serum amylase levels. Serum amylase determinations in the family members were normal in his father and maternal grandmother but elevated in his mother, sister, maternal aunt, and uncle, all of whom asymptomatic. Macroamylasemia was excluded in the child and in the mother. The finding of persistently elevated amylasemia in the child and in the other family members spanning 3 generations, and the exclusion of diseases that lead to hyperamilasemia are consistent with the diagnosis of familial hyperamylasemia. Until now, only 1 similar case has been reported. Familial hyperamylasemia must be considered in the differential diagnosis of hyperamylasemias in childhood.
Resumo:
BACKGROUND: The pharmacological treatment of migraine may be acute or preventive. Frequent, severe and long-lasting migraine attacks require prophylaxis. Multiple threads of research over the last 15 years have led to the concept that migraine is generated from a hyperexcitable brain. A variety of causes for hyperexcitability of the brain in migraine have been suggested. These causes include low cerebral magnesium levels, mitochondrial abnormalities, dysfunctions related to increased nitric oxide or the existence of a P/Q type calcium channelopathy. The better knowledge about migraine pathophisiology led us to discuss new treatment options. OBJECTIVES: The aim of the present study is to present an evidence-based review of some new drugs or some agents that even though available for a long time, are not frequently used. METHODS/RESULTS: We present a review of anticonvulsants with various mechanisms of action such as lamotrigine, gabapentin, topiramate, tiagabine, levetiracetam and zonisamide. We also review natural products, like riboflavin and magnesium, botulinum toxin A, a specific CGRP antagonist and the anti-asthma medication montelukast, with pathophysiological discussion. CONCLUSIONS: We aimed to present an update of newer or less frequently used preventive migraine therapies, drugs that might reduce the burden and the costs of a disease that should be considered as a public health problem all around the world.
Resumo:
PURPOSE: To investigate the impact of alcohol intoxication and withdrawal on the course of social phobia and panic disorder. METHOD: A group of 41 alcoholic inpatients undergoing detoxification therapy were interviewed using the SCID-I (DSM-IV) and questions to detect fluctuations in the course of social phobia and panic disorder as a function of the different phases in alcohol dependence (intoxication, withdrawal, and lucid interval). RESULTS: Only 1 (2.4%) patient presented panic disorder throughout life, and 9 (21.9%) had panic attacks during alcohol intoxication or during the withdrawal syndrome. Sixteen (39%) alcoholic patients showed social phobia with onset prior to drug use. However, drinking eventually became unable to alleviate social phobia symptoms or worsened such symptoms in 31.2% of social-phobic patients. While patients with social phobia reported a significant improvement in psychiatric symptoms during alcohol intoxication, patients experiencing panic attacks worsened significantly during intoxication. In the withdrawal phase, patients with social phobia tended to have more and more intense phobic symptoms. CONCLUSION: Our findings indicate that the impact of alcohol intoxication is different for social phobia as compared to panic disorder, at first decreasing the social-phobic symptoms but later aggravating them. In panic disorder, the impact of intoxication by alcohol is more harmful, at least in the short term.
Resumo:
Research literature and clinical experience shows that panic patients are often able to identify stressors that preceded the onset of their first attacks. In this study we investigated the relation between life events, coping skills, and panic disorder. METHODS: Forty-tree panic patients were compared with 29 control subjects regarding the occurrence and the impact of stressful life events in a 1-year period preceding the onset of panic attacks using the Social Readjustment Rating Scale and London Life Event and Difficulty Schedule. Coping skills were measured using the Ways of Coping Questionnaire. RESULTS: No differences were observed between panic patients and controls regarding the number of reported stressful life events in the previous year. Panic patients compared to controls reported loss of social support as the most meaningful class of events significantly more often. In response to stressful situations, panic patients more often used coping skills judged as ineffective. CONCLUSIONS: The present study suggests that the type of life event and the coping skills used in response to them, more than the occurrence of stressful events itself, may be associated with the onset of panic disorder.
Resumo:
We intend to study the algebraic structure of the simple orthogonal models to use them, through binary operations as building blocks in the construction of more complex orthogonal models. We start by presenting some matrix results considering Commutative Jordan Algebras of symmetric matrices, CJAs. Next, we use these results to study the algebraic structure of orthogonal models, obtained by crossing and nesting simpler ones. Then, we study the normal models with OBS, which can also be orthogonal models. We intend to study normal models with OBS (Orthogonal Block Structure), NOBS (Normal Orthogonal Block Structure), obtaining condition for having complete and suffcient statistics, having UMVUE, is unbiased estimators with minimal covariance matrices whatever the variance components. Lastly, see ([Pereira et al. (2014)]), we study the algebraic structure of orthogonal models, mixed models whose variance covariance matrices are all positive semi definite, linear combinations of known orthogonal pairwise orthogonal projection matrices, OPOPM, and whose least square estimators, LSE, of estimable vectors are best linear unbiased estimator, BLUE, whatever the variance components, so they are uniformly BLUE, UBLUE. From the results of the algebraic structure we will get explicit expressions for the LSE of these models.
Resumo:
O fim da Guerra Fria é um caso inédito de mudança pacífica da estrutura internacional, em que os Estados Unidos e a União Soviética transcendem a divisão bipolar para decidir os termos da paz no quadro das instituições que definem o modelo de ordenamento multilateral, consolidando a sua legitimidade. Nesse contexto, ao contrário dos casos precedentes de reconstrução internacional no fim de uma guerra hegemónica, o novo sistema do post-Guerra Fria, caracterizado pela unipolaridade, pela regionalização e pela homogeneização, forma-se num quadro de continuidade institucional. A ordem política do post-Guerra Fria é um sistema misto em que as tensões entre a hierarquia unipolar e a anarquia multipolar, a integração global e a fragmentação regional e a homogeneidade e a heterogeneidade política, ideológica e cultural condicionam as estratégias das potências. As crises internacionais vão pôr à prova a estabilidade da nova ordem e a sua capacidade para garantir mudanças pacíficas. A primeira década do post-Guerra Fria mostra a preponderância dos Estados Unidos e a sua confiança crescente, patente nas Guerras do Golfo Pérsico e dos Balcãs, bem como na crise dos Estreitos da Formosa. A reacção aos atentados do "11 de Setembro" revela uma tentação imperial da potência unipolar, nomeadamente com a invasão do Iraque, que provoca uma crise profunda da comunidade de segurança ocidental. A vulnerabilidade do centro da ordem internacional é confirmada pela crise constitucional europeia e pela crise financeira global. Essas crises não alteram a estrutura de poder mas aceleram a erosão da ordem multilateral e criam um novo quadro de possibilidades para a evolução internacional, que inclui uma escalada dos conflitos num quadro de multipolaridade regional, uma nova polarização entre as potências democráticas conservadoras e uma coligação revisionista autoritária, bem como a restauração de um concerto entre as principais potências internacionais.
Resumo:
Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.