666 resultados para panic attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigated the association of eye color with the dominant-subordinate relationship in the fish Nile tilapia, Oreochromis niloticus. Eye color pattern was also examined in relation to the intensity of attacks. We paired 20 size-matched fish (intruder: 73.69 ± 11.49 g; resident: 75.42 ± 8.83 g) and evaluated eye color and fights. These fish were isolated in individual aquaria for 10 days and then their eye color was measured 5 min before pairing (basal values). Twenty minutes after pairing, eye color and fights were quantified for 10 min. Clear establishment of social hierarchy was observed in 7 of 10 pairs of fish. Number of attacks ranged from 1 to 168 among pairs. The quartile was calculated for these data and the pairs were then divided into two classes: low-attack (1 to 111 attacks - 2 lower quartiles) or high-attack (112 to 168 attacks - 2 higher quartiles). Dominance decreased the eye-darkening patterns of the fish after pairing, while subordinance increased darkening compared to dominance. Subordinate fish in low-attack confrontations presented a darker eye compared to dominant fish and to the basal condition. We also observed a paler eye pattern in dominants that shared low-attack interactions after pairing compared to the subordinates and within the group. However, we found no differences in the darkening pattern between dominants and subordinates from the high-attack groups. We conclude that eye color is associated with social rank in this species. Moreover, the association between eye color and social rank in the low-attack pairs may function to reduce aggression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We studied the ability of patients not experienced in the use of peak expiratory flow meters to assess the severity of their asthma exacerbations and compared it to the assessment of experienced clinicians. We also evaluated which data of physical examination and medical history are used by physicians to subjectively evaluate the severity of asthma attacks. Fifty-seven adult patients (15 men and 42 women, with a mean (± SD) age of 37.3 ± 14.5 years and 24.0 ± 17.9 years of asthma symptoms) with asthma exacerbations were evaluated in a University Hospital Emergency Department. Patients and physicians independently evaluated the severity of the asthma attack using a linear scale. Patient score, physician score and forced expiratory volume at the first second (FEV1) were correlated with history and physical examination variables, and were also considered as dependent variables in multiple linear regression models. FEV1 correlated significantly with the physician score (rho = 0.42, P = 0.001), but not with patient score (rho = 0.03; P = 0.77). Use of neck accessory muscles, expiratory time and wheezing intensity were the explanatory variables in the FEV1 regression model and were also present in the physician score model. We conclude that physicians evaluate asthma exacerbation severity better than patients and that physician's scoring of asthma severity correlated significantly with objective measures of airway obstruction (FEV1). Some variables (the use of neck accessory muscles, expiratory time and wheezing intensity) persisted as explanatory variables in physician score and FEV1 regression models, and should be emphasized in medical schools and emergency settings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of the present study was to assess the role of the 5-HT2A/2C receptor at two specific brain sites, i.e., the dorsal periaqueductal gray matter (DPAG) and the medial septal (MS) area, in maternal aggressive behavior after the microinjection of either a 5-HT2A/2C receptor agonist or antagonist. Female Wistar rats were microinjected on the 7th postpartum day with the selective agonist alpha-methyl-5-hydroxytryptamine maleate (5-HT2A/2C) or the antagonist 5-HT2A/2C, ketanserin. The agonist was injected into the DPAG at 0.2 (N = 9), 0.5 (N = 10), and 1.0 µg/0.2 µl (N = 9), and the antagonist was injected at 1.0 µg/0.2 µl (N = 9). The agonist was injected into the medial septal area (MS) at 0.2 (N = 9), 0.5 (N = 7), and 1.0 µg/0.2 µl (N = 6) and the antagonist was injected at 1.0 µg/0.2 µl (N = 5). For the control, saline was injected into the DPAG (N = 7) and the MS (N = 12). Both areas are related to aggressive behavior and contain a high density of 5-HT receptors. Non-aggressive behaviors such as horizontal locomotion (walking) and social investigation and aggressive behaviors such as lateral threat (aggressive posture), attacks (frontal and lateral), and biting the intruder were analyzed when a male intruder was placed into the female resident's cage. For each brain area studied, the frequency of the behaviors was compared among the various treatments by analysis of variance. The results showed a decrease in maternal aggressive behavior (number of bites directed at the intruder) after microinjection of the agonist at 0.2 and 1.0 µg/0.2 µl (1.6 ± 0.7 and 0.9 ± 0.3) into the DPAG compared to the saline group (5.5 ± 1.1). There was no dose-response relationship with the agonist. The present findings suggest that the 5-HT2A/2C receptor agonist has an inhibitory effect on maternal aggressive behavior when microinjected into the DPAG and no effect when microinjected into the MS. Ketanserin (1.0 µg/0.2 µl) decreased locomotion when microinjected into the DPAG and MS, but did not affect aggressive behavior. We interpret these findings as evidence for a specific role of 5-HT2A/2C receptors in the DPAG in the inhibition of female aggressive behavior, dissociated from those on motor activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pharmacological evidence indicates that the basolateral nucleus of the amygdala (BLA) is involved in the mediation of inhibitory avoidance but not of escape behavior in the elevated T-maze test. These defensive responses have been associated with generalized anxiety disorder (GAD) and panic disorder, respectively. In the present study, we determined whether the BLA plays a differential role in the control of inhibitory avoidance and escape responses in the elevated T-maze. Male Wistar rats (250-280 g, N = 9-10 in each treatment group) were pre-exposed to one of the open arms of the maze for 30 min and 24 h later tested in the model after inactivation of the BLA by a local injection of the GABA A receptor agonist muscimol (8 nmol in 0.2 µL). It has been shown that a prior forced exposure to one of the open arms of the maze, by shortening latencies to withdrawal from the open arm during the test, improves the escape task as a behavioral index of panic. The effects of muscimol in the elevated T-maze were compared to those caused by this GABA agonist in the avoidance reaction generated in the light/dark transition test. This defensive behavior has also been associated with GAD. In the elevated T-maze, intra-BLA injection of muscimol impaired inhibitory avoidance (control: 187.70 ± 14.90 s, muscimol: 37.10 ± 2.63 s), indicating an anxiolytic effect, without interfering with escape performance. The drug also showed an anxiolytic effect in the light/dark transition test as indicated by the increase in the time spent in the lighted compartment (control: 23.50 ± 2.45 s, muscimol: 47.30 ± 4.48 s). The present findings point to involvement of the BLA in the modulation of defensive responses that have been associated with GAD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Erythrina velutina (EV) and Erythrina mulungu (EM), popularly used in Brazil as tranquilizing agents, were studied. The effects of acute and chronic oral treatment with a water:alcohol extract of EV (7:3, plant grounded stem bark; acute = 100, 200, 400 mg/kg; chronic = 50, 100, 200 mg/kg) were evaluated in rats (N = 11-12) submitted to the elevated T-maze (for avoidance and escape measurements) model of anxiety. This model was selected for its presumed capacity to elicit specific subtypes of anxiety disorders recognized in clinical practice: avoidance has been related to generalized anxiety and escape to panic. Additionally, animals were treated with the same doses of EV and EM (water:alcohol 7:3, inflorescence extract) and submitted to the forced swim test for the evaluation of antidepressant activity (N = 7-10). Both treatment regimens with EV impaired elevated T-maze avoidance latencies, without altering escape, in a way similar to the reference drug diazepam (avoidance 1, mean ± SEM, acute study: 131.1 ± 45.5 (control), 9.0 ± 3.3 (diazepam), 12.7 ± 2.9 (200 mg/kg), 28.8 ± 15.3 (400 mg/kg); chronic study: 131.7 ± 46.9 (control), 35.8 ± 29.7 (diazepam), 24.4 ± 10.4 (50 mg/kg), 29.7 ± 11.5 (200 mg/kg)). Neither EV nor EM altered measurements performed in the forced swim test, in contrast to the reference drug imipramine that significantly decreased immobility time after chronic treatment. These results were not due to motor alterations since no significant effects were detected in an open field. These observations suggest that EV exerts anxiolytic-like effects on a specific subset of defensive behaviors which have been associated with generalized anxiety disorder.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Serotonin (5-HT1B) receptors play an essential role in the inhibition of aggressive behavior in rodents. CP-94,253, a 5-HT1B receptor agonist, can reduce aggression in male mice when administered directly into the ventro-orbitofrontal (VO) prefrontal cortex (PFC). The objective of the current study was to assess the effects of two selective 5-HT1B receptor agonists (CP-94,253 and CP-93,129), microinjected into the VO PFC, on maternal aggressive behavior after social instigation in rats. CP-94,253 (0.56 µg/0.2 µL, N = 8, and 1.0 µg/0.2 µL, N = 8) or CP-93,129 (1.0 µg/0.2 µL, N = 9) was microinjected into the VO PFC of Wistar rats on the 9th day postpartum and 15 min thereafter the aggressive behavior by the resident female against a male intruder was recorded for 10 min. The frequency and duration of aggressive and non-aggressive behaviors were analyzed using ANOVA and post hoc tests. CP-93,129 significantly decreased maternal aggression. The frequency of lateral attacks, bites and pinnings was reduced compared to control, while the non-aggressive behaviors and maternal care were largely unaffected by this treatment. CP-94,253 had no significant effects on aggressive or non-aggressive behaviors when microinjected into the same area of female rats. CP-93,129, a specific 5-HT1B receptor agonist, administered into the VO PFC reduced maternal aggressive behavior, while the CP-94,253 agonist did not significantly affect this behavior after social instigation in female rats. We conclude that only the 5-HT1B receptor agonist CP-93,129 administered into the VO PFC decreased aggression in female rats postpartum after social instigation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study compares the prevalence of complaints of insomnia, excessive diurnal sleepiness, parasomnias, and sleep habits of the adult population in the city of São Paulo, Brazil, estimated in surveys carried out in 1987 and 1995. Representative samples of 1000 adult residents per survey were interviewed using a validated structured sleep questionnaire, the "UNIFESP Sleep Questionnaire". Difficulty maintaining sleep, difficulty initiating sleep and early morning awakening, occurring at least three times a week, were reported in 1987 and 1995, by 15.8/27.6, 13.9/19.1, and 10.6/14.2% of the interviewees, respectively, significantly increasing throughout time. These sleep problems were more often found among women. Frequencies of excessive diurnal sleepiness and sleep attacks were unchanged comparing 1987 with 1995 (4.5 vs 3.8 and 3.1 vs 3.0%, respectively). Parasomnia complaints remained unchanged, with the exception of leg cramps, which doubled in prevalence from 1987 to 1995 (2.6 to 5.8%). Snoring was the most common parasomnia (21.5% in 1995), reported more often by men than by women, and somnambulism was the least common (approximately 1%). Besides sleeping slightly less, interviewees went to bed and woke up later in 1995. Approximately 12% of the subjects in both surveys had consulted a physician due to sleep problems and 3.0% reported habitual use of sleep-promoting substances in 1995. Overall, there was a significant increase in insomnia complaints from 1987 to 1995 in the general population of the city of São Paulo. This major change over a little under a decade should be considered as an important public health issue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lippia alba (Mill.) N.E. Brown (Verbenaceae) is widely used in different regions of Central and South America as a tranquilizer. The plant’s anxiolytic properties, however, merit investigation. The present study evaluated the effects of repeated daily (14 days) intraperitoneal (ip) treatment with an essential oil (EO) from a chemotype of L. alba (LA, chemotype II, 12.5 and 25 mg/kg; N = 6-8) and (R)-(-)-carvone (25 mg/kg; N = 8-12), the main constituent of this chemotype, on male Wistar rats (weighing 250 g at the beginning of the experiments) submitted to the elevated T-maze (ETM). The ETM allows the measurement of two defensive responses: inhibitory avoidance and one-way escape. In terms of psychopathology, these responses have been related to generalized anxiety and panic disorder, respectively. Treatment with the EO impaired ETM avoidance latencies, without altering escape, in a way similar to the reference drug diazepam (P < 0.05) (avoidance 2: control = 84.6 ± 35.2; EO 12.5 mg/kg = 11.8 ± 3.8; EO 25 mg/kg = 14.6 ± 2.7; diazepam = 7 ± 2.1). (R)-(-)-carvone also significantly altered this same response (P < 0.05; avoidance 1: control = 91.9 ± 31.5; carvone = 11.6 ± 1.8; diazepam = 8.1 ± 3.3). These results were not due to motor changes since no significant effects were detected in an open field. These observations suggest that LA exerts anxiolytic-like effects on a specific subset of defensive behaviors that have been implicated in generalized anxiety disorder, and suggest that carvone is one of the constituents of LA responsible for its action as a tranquilizer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intracutaneous sterile water injection (ISWI) is used for relief of low back pain during labor, acute attacks of urolithiasis, chronic neck and shoulder pain following whiplash injuries, and chronic myofascial pain syndrome. We conducted a randomized, double-blinded, placebo-controlled trial to evaluate the effect of ISWI for relief of acute low back pain (aLBP). A total of 68 patients (41 females and 27 males) between 18 and 55 years old experiencing aLBP with moderate to severe pain (scores ≥5 on an 11-point visual analogue scale [VAS]) were recruited and randomly assigned to receive either ISWIs (n=34) or intracutaneous isotonic saline injections (placebo treatment; n=34). The primary outcome was improvement in pain intensity using the VAS at 10, 45, and 90 min and 1 day after treatment. The secondary outcome was functional improvement, which was assessed using the Patient-Specific Functional Scale (PSFS) 1 day after treatment. The mean VAS score was significantly lower in the ISWI group than in the control group at 10, 45, and 90 min, and 1 day after injection (P<0.05, t-test). The mean increment in PSFS score of the ISWI group was 2.9±2.2 1 day after treatment, while that in the control group was 0.9±2.2. Our study showed that ISWI was effective for relieving pain and improving function in aLBP patients at short-term follow-up. ISWI might be an alternative treatment for aLBP patients, especially in areas where medications are not available, as well as in specific patients (e.g., those who are pregnant or have asthma), who are unable to receive medications or other forms of analgesia because of side effects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract The storage susceptibility of Bambara groundnut (B. G.) (Voandzeia Subterranean (L.) Thouars) to Callosobruchus maculatus and chemical and functional properties of 11 varieties form Far-North of Cameroon were investigate using standard analytical methods. Storage susceptibility shown that, after five months within treatment, C. maculatus destroy 10 to 50% of grains. The chemical characteristics of none attack grains of 11 varieties were range to 18.64 at 21.08%, 6.85 at 7.44%, 49.75 at 52.68% and to 6.05 at 7.55% respectively for protein, fat, starch and free carbohydrate. These chemical characteristics significantly (p < 0.05) decreases form attacks varieties. For the functional parameters, the none attacks grains was range of 130 at 135%, 19.15 at 20.91%, 18.20 at 21.13%, 2.76 at 3.21% and of 8.54 at 10.14% respectively for water capacity absorption, solubility index, gel length, ash and humidity. The results of this study indicated that storage susceptibility, chemical and functional properties of B. G. be dependant to the varieties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Leveraging cloud services, companies and organizations can significantly improve their efficiency, as well as building novel business opportunities. Cloud computing offers various advantages to companies while having some risks for them too. Advantages offered by service providers are mostly about efficiency and reliability while risks of cloud computing are mostly about security problems. Problems with security of the cloud still demand significant attention in order to tackle the potential problems. Security problems in the cloud as security problems in any area of computing, can not be fully tackled. However creating novel and new solutions can be used by service providers to mitigate the potential threats to a large extent. Looking at the security problem from a very high perspective, there are two focus directions. Security problems that threaten service user’s security and privacy are at one side. On the other hand, security problems that threaten service provider’s security and privacy are on the other side. Both kinds of threats should mostly be detected and mitigated by service providers. Looking a bit closer to the problem, mitigating security problems that target providers can protect both service provider and the user. However, the focus of research community mostly is to provide solutions to protect cloud users. A significant research effort has been put in protecting cloud tenants against external attacks. However, attacks that are originated from elastic, on-demand and legitimate cloud resources should still be considered seriously. The cloud-based botnet or botcloud is one of the prevalent cases of cloud resource misuses. Unfortunately, some of the cloud’s essential characteristics enable criminals to form reliable and low cost botclouds in a short time. In this paper, we present a system that helps to detect distributed infected Virtual Machines (VMs) acting as elements of botclouds. Based on a set of botnet related system level symptoms, our system groups VMs. Grouping VMs helps to separate infected VMs from others and narrows down the target group under inspection. Our system takes advantages of Virtual Machine Introspection (VMI) and data mining techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IoT consists of essentially thousands of tiny sensor nodes interconnected to the internet, each one of which executes the programmed functions under memory and power limita- tions. The sensor nodes are distributed mainly for gathering data in various situations. IoT envisions the future technologies such as e-health, smart city, auto-mobiles automa- tion, construction sites automation, and smart home. Secure communication of data under memory and energy constraints is major challenge in IoT. Authentication is the first and important phase of secure communication. This study presents a protocol to authenticate resource constraint devices in physical proximity by solely using the shared wireless communication interfaces. This model of authentication only relies on the abundance of ambient radio signals to authenticate in less than a second. To evaluate the designed protocol, SkyMotes are emulated in a network environment simulated by Contiki/COOJA. Results presented during this study proves that this approach is immune against passive and active attacks. An adversary located as near as two meters can be identified in less than a second with minimal expense of energy. Since, only radio device is used as required hardware for the authentication, this technique is scalable and interoperable to heterogeneous nature of IoT.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Karl Popper versus Theodor Adorno: Lessons from a historical confrontation. In 1961, during the Congress of the German Society of Sociology, two great theoretical references of the XX century faced in a historical debate about the logic of the social sciences. In addition to methodological issues strict sense, the confrontation became known as a debate between positivism and dialectic. The article first deals with the theoretical trajectories of Popper and Adorno and the relation of their theories with their political and ideological certainties. On one hand, the trajectory of the Popperian epistemology is examined, its contributions and vigorous attacks on Marx in what he called 'poverty of historicism" and false predictive Marxist world, and, on the other hand, the role of Adorno in the Frankfurt School, his criticism of totalitarianism and the defense of a critical emancipatory reason. The article also deals with the confrontation itself, the exposure of Popper's twenty-seven theses that culminate with the situation logic and the method of the economy as exemplary for the social sciences and Adorno's critical perspective of sociology and society as non-separable objects. In conclusion we show how the articulation of theory with the weltanschauung of each author helps to clarify the terms of the debate and how the confrontation contributed unequivocally to the dynamics of scientific progress and for the critical history of the ideas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internetin yhteisöpalveluiden käyttäjien avoimuus ja sosiaalisuus altistavat heidät monenlaisille riskeille. “Social engineering” eli käyttäjien manipulointi on uhka, joka liittyy informaation hankkimiseen perinteisen kanssakäymisen kautta, mutta yhä enenevissä määrin myös internetissä. Kun kanssakäyminen tapahtuu internetin välityksellä, käyttäjien manipuloijat hyödyntävät yhteisöpalveluita yhteydenpitoon uhrien kanssa sekä paljon käyttäjäinformaatiota sisältävänä alustana. Tämän tutkielman tarkoitus on löytää internetin yhteisöpalveluiden ja käyttäjien manipuloinnin välinen yhteys. Tämä päämäärä saavutettiin etsimällä vastauksia kysymyksiin kuten: Mitkä ovat tyypilliset hyökkäystyypit? Miksi informaatiolla on niin suuri rooli? Mitä seurauksia ilmiöllä on ja miten hyökkäyksiltä on mahdollista suojautua? Vastaukset kysymyksiin löydettiin toteuttamalla systemaattinen kirjallisuuskatsaus. Katsaus muodostui yhdistämällä tärkeimmät löydökset 60 tarkoin valitusta ilmiötä käsittelevästä artikkelista. Käyttäjien manipuloinnin huomattiin olevan hyvin laaja ja monimutkainen ilmiö internetin yhteisöpalveluissa. Huomattiin, että manipulointia ilmenee sivustoilla useissa erilaisissa muodoissa, joita ovat muun muassa tietojen kalastelu, profiilien yhdistäminen, sosiaaliset sovellukset, roskaposti, haitalliset linkit, identiteettivarkaudet, tietovuodot ja erilaiset huijaukset, jotka hyödyntävät sekä ihmisluonnon että sivustojen perusominaisuuksia. Haavoittuvuus ja luottamus havaittiin myös tärkeiksi aspekteiksi, sillä ne yhdistävät informaation merkityksen ja ihmisluonnon, jotka molemmat ovat avaintekijöitä sekä manipuloinnissa että yhteisöpalvelusivustoilla. Vaikka ilmiön seurausten huomattiin olevan negatiivisia niin käyttäjien olemukselle internetissä kuin todellisessakin elämässä, havaittiin myös, että ilmiön ymmärtäminen ja tunnistaminen helpottaa siltä suojautumista