801 resultados para Halitosis protocol


Relevância:

60.00% 60.00%

Publicador:

Resumo:

A halitose é uma condição ou alteração do hálito, sendo caracterizada por um hálito desagradável emitido pela expiração. Segundo a Organização Mundial de Saúde (OMS), é considerado um problema de saúde, visto que afeta cerca de 40% da população mundial. Este problema causa desconforto e constrangimento social, sendo assim um limitador da qualidade de vida e da autoestima de quem a padece. Atualmente sabe-se que a halitose pode ser caracterizada como verdadeira, pseudo-halitose ou halitofobia. A halitose verdadeira pode ser uma halitose patológica ou fisiológica. A sua etiologia é multifatorial e o seu tratamento é multidisciplinar. Por outro lado, tanto a pseudo-halitose como a halitofobia provêm do foro psicológico, sendo necessário a ajuda de um psicólogo ou psiquiatra. Existem vários testes de diagnóstico (halímetro, cromatografia gasosa, BANA, entre outros) para avaliar a presença e a severidade desta patologia. O tratamento desta patologia consiste na eliminação das cáries e doenças periodontais, dando instruções de higiene oral para reforçar a escovagem dentária, o uso do fio dentário e a higiene das próteses. O aconselhamento dietético e a limpeza da língua também são essenciais, como também o controlo do biofilme com anti-séticos orais (Abreu et alii., 2011; Machado et alii., 2008). O objetivo desta revisão bibliográfica assenta na determinação de diversas possibilidades de prevenção e tratamento bem como a sua eficácia, sendo esta fundamental para o reconhecimento e correta interpretação da halitose. A pesquisa bibliográfica sobre o tema “Halitose: da etiologia ao tratamento” foi realizada essencialmente em motores de busca como o Pubmed e a Scielo, em três idiomas, Português, Inglês e Espanhol. selecionando artigos na sua maioria entre os anos 2006-2016. O médico médico dentista tem como função, na maioria dos casos, de tratar esta patologia ou então, quando não está associada à cavidade oral, reencaminhar o paciente para a especialidade médica adequada. Contudo, é de salientar que o paciente também possui um papel ativo no tratamento e na manutenção da halitose.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a secure communication protocol which can be used as the framework for an e-tendering scheme. This protocol is focused on securing the integrity of tendering documents and ensuring that a secure record of document generation is kept. Our protocol provides a mechanism to manage e-tendering contract evidence as a legal record in a unique and effective manner. It is the starting point of reliable record keeping. To a certain extent, it also addresses existing security problems in the traditional tendering processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We aim to assess the effects of end-of-life care pathways, compared with usual care or with care guided by another end-of-life care pathway across all healthcare settings (hospitals, residential aged care facilities, community). In particular, we aim to assess the effects on symptom severity and quality of life of people who are dying and/or those related to the care such as families, caregivers and health professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The term self-selected (i.e., individual or comfortable walking pace or speed) is commonly used in the literature (Frost, Dowling, Bar-Or, & Dyson, 1997; Jeng, Liao, Lai, & Hou, 1997; Wergel-Kolmert & Wohlfart, 1999; Maltais, Bar-Or, Pienynowski, & Galea, 2003; Browning & Kram, 2005; Browning, Baker, Herron, & Kram, 2006; Hills, Byrne, Wearing, & Armstrong, 2006) and is identified as the most efficient walking speed, with increased efficiency defined by lower oxygen uptake (VO^sub 2^) per unit mechanical work (Hoyt & Taylor, 1981; Taylor, Heglund, & Maloiy, 1982; Hreljac, 1993). [...] assessing individual and group differences in metabolic energy expenditure using oxygen uptake requires individuals to be comfortable with, and able to accommodate to, the equipment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To assess the effects of information interventions which orient patients and their carers/family to a cancer care facility and the services available in the facility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To assess the effects of any interventions which aim to prevent or manage radiation-induced skin reactions in people with cancer.