790 resultados para computer network security
Resumo:
Mother and infant mortality has been the scope of analysis throughout the history of public health in Brazil and various strategies to tackle the issue have been proposed to date. The Ministry of Health has been working on this and the Rede Cegonha strategy is the most recent policy in this context. Given the principle of comprehensive health care and the structure of the Unified Health System in care networks, it is necessary to ensure the integration of health care practices, among which are the sanitary surveillance actions (SSA). Considering that the integration of health care practices and SSA can contribute to reduce mother and infant mortality rates, this article is a result of qualitative research that analyzed the integration of these actions in four cities in the State of São Paulo/Brazil: Campinas, Indaiatuba, Jaguariúna and Santa Bárbara D'Oeste. The research was conducted through interviews with SSA and maternal health managers, and the data were evaluated using thematic analysis. The results converge with other studies, identifying the isolation of health care practices and SSA. The insertion of SSA in collectively-managed areas appears to be a potential strategy for health planning and implementation of actions in the context under scrutiny.
Resumo:
The scope of this study is to identify the prevalence of access to information about how to prevent oral problems among schoolchildren in the public school network, as well as the factors associated with such access. This is a cross-sectional and analytical study conducted among 12-year-old schoolchildren in a Brazilian municipality with a large population. The examinations were performed by 24 trained dentists and calibrated with the aid of 24 recorders. Data collection occurred in 36 public schools selected from the 89 public schools of the city. Descriptive, univariate and multiple analyses were conducted. Of the 2510 schoolchildren included in the study, 2211 reported having received information about how to prevent oral problems. Access to such information was greater among those who used private dental services; and lower among those who used the service for treatment, who evaluated the service as regular or bad/awful. The latter use toothbrush only or toothbrush and tongue scrubbing as a means of oral hygiene and who reported not being satisfied with the appearance of their teeth. The conclusion drawn is that the majority of schoolchildren had access to information about how to prevent oral problems, though access was associated with the characteristics of health services, health behavior and outcomes.
Resumo:
The experiences induced by psychedelics share a wide variety of subjective features, related to the complex changes in perception and cognition induced by this class of drugs. A remarkable increase in introspection is at the core of these altered states of consciousness. Self-oriented mental activity has been consistently linked to the Default Mode Network (DMN), a set of brain regions more active during rest than during the execution of a goal-directed task. Here we used fMRI technique to inspect the DMN during the psychedelic state induced by Ayahuasca in ten experienced subjects. Ayahuasca is a potion traditionally used by Amazonian Amerindians composed by a mixture of compounds that increase monoaminergic transmission. In particular, we examined whether Ayahuasca changes the activity and connectivity of the DMN and the connection between the DMN and the task-positive network (TPN). Ayahuasca caused a significant decrease in activity through most parts of the DMN, including its most consistent hubs: the Posterior Cingulate Cortex (PCC)/Precuneus and the medial Prefrontal Cortex (mPFC). Functional connectivity within the PCC/Precuneus decreased after Ayahuasca intake. No significant change was observed in the DMN-TPN orthogonality. Altogether, our results support the notion that the altered state of consciousness induced by Ayahuasca, like those induced by psilocybin (another serotonergic psychedelic), meditation and sleep, is linked to the modulation of the activity and the connectivity of the DMN.
Resumo:
Plants are sessile organisms and have evolved to tolerate a constantly changing environment. After the onset of different stress conditions, calcineurin B-like (CBL) proteins can sense calcium signals and activate CBL-interacting protein kinase (CIPK) proteins, which can phosphorylate downstream proteins to reestablish plant homeostasis. Previous studies in the bioenergy crop sugarcane showed that the ScCIPK8 gene is induced by drought stress and is also related to sucrose content. Here, we have characterized the protein-protein interactions of ScCIPK8 with six CBL proteins (ScCBL1, ScCBL2, ScCBL3, ScCBL6, ScCBL9, and ScCBL10). Yeast two-hybrid assays showed that ScCIPK8 interacts with ScCBL1, ScCBL3, and ScCBL6. Bimolecular fluorescence complementation assays confirmed in planta the interactions that were observed in yeast cells. These findings give insights on the regulatory networks related to sugar accumulation and drought stress responses in sugarcane.
Resumo:
Interactions between flowers and their visitors span the spectrum from mutualism to antagonism. The literature is rich in studies focusing on mutualism, but nectar robbery has mostly been investigated using phytocentric approaches focused on only a few plant species. To fill this gap, we studied the interactions between a nectar-robbing hermit hummingbird, Phaethornis ruber, and the array of flowers it visits. First, based on a literature review of the interactions involving P. ruber, we characterized the association of floral larceny to floral phenotype. We then experimentally examined the effects of nectar robbing on nectar standing crop and number of visits of the pollinators to the flowers of Canna paniculata. Finally, we asked whether the incorporation of illegitimate interactions into the analysis affects plant-hummingbird network structure. We identified 97 plant species visited by P. ruber and found that P. ruber engaged in floral larceny in almost 30 % of these species. Nectar robbery was especially common in flowers with longer corolla. In terms of the effect on C. paniculata, the depletion of nectar due to robbery by P. ruber was associated with decreased visitation rates of legitimate pollinators. At the community level, the inclusion of the illegitimate visits of P. ruber resulted in modifications of how modules within the network were organized, notably giving rise to a new module consisting of P. ruber and mostly robbed flowers. However, although illegitimate visits constituted approximately 9 % of all interactions in the network, changes in nestedness, modularity, and network-level specialization were minor. Our results indicate that although a flower robber may have a strong effect on the pollination of a particular plant species, the inclusion of its illegitimate interactions has limited capacity to change overall network structure.
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física
Resumo:
PURPOSE: The main goal of this study was to develop and compare two different techniques for classification of specific types of corneal shapes when Zernike coefficients are used as inputs. A feed-forward artificial Neural Network (NN) and discriminant analysis (DA) techniques were used. METHODS: The inputs both for the NN and DA were the first 15 standard Zernike coefficients for 80 previously classified corneal elevation data files from an Eyesys System 2000 Videokeratograph (VK), installed at the Departamento de Oftalmologia of the Escola Paulista de Medicina, São Paulo. The NN had 5 output neurons which were associated with 5 typical corneal shapes: keratoconus, with-the-rule astigmatism, against-the-rule astigmatism, "regular" or "normal" shape and post-PRK. RESULTS: The NN and DA responses were statistically analyzed in terms of precision ([true positive+true negative]/total number of cases). Mean overall results for all cases for the NN and DA techniques were, respectively, 94% and 84.8%. CONCLUSION: Although we used a relatively small database, results obtained in the present study indicate that Zernike polynomials as descriptors of corneal shape may be a reliable parameter as input data for diagnostic automation of VK maps, using either NN or DA.
Resumo:
Understanding the emergence of extreme opinions and in what kind of environment they might become less extreme is a central theme in our modern globalized society. A model combining continuous opinions and observed discrete actions (CODA) capable of addressing the important issue of measuring how extreme opinions might be has been recently proposed. In this paper I show extreme opinions to arise in a ubiquitous manner in the CODA model for a multitude of social network structures. Depending on network details reducing extremism seems to be possible. However, a large number of agents with extreme opinions is always observed. A significant decrease in the number of extremists can be observed by allowing agents to change their positions in the network.
Resumo:
This paper proposes an architecture for machining process and production monitoring to be applied in machine tools with open Computer numerical control (CNC). A brief description of the advantages of using open CNC for machining process and production monitoring is presented with an emphasis on the CNC architecture using a personal computer (PC)-based human-machine interface. The proposed architecture uses the CNC data and sensors to gather information about the machining process and production. It allows the development of different levels of monitoring systems with mininium investment, minimum need for sensor installation, and low intrusiveness to the process. Successful examples of the utilization of this architecture in a laboratory environment are briefly described. As a Conclusion, it is shown that a wide range of monitoring solutions can be implemented in production processes using the proposed architecture.