The Psychological Emergency Service(PES)at psychology school clinics is an unscheduled and free psychological service to meet urgent demands.From this service,some patients whose complaints require more time for clini...The Psychological Emergency Service(PES)at psychology school clinics is an unscheduled and free psychological service to meet urgent demands.From this service,some patients whose complaints require more time for clinical work are referred to the Extended Screening(ES),a modality composed of six extra appointments.This study aims to analyze the sociodemographic profile of patients seen on PES in a Brazilian Psychology School Clinic,and to identify the demands that motivated referral to the ES,for better qualification of the care offered.This is a descriptive analysis research,carried out based on data from the medical records of 46 patients who went through the PES and were referred to the ES at the institution,between the years 2019 and 2021.Sociodemographic data were collected and,from the session reports,a content analysis of the thematic analysis modality was performed to identify the complaints.The participants’age ranged from 18 to 65 years,with a mean of 32.28 years(sd=10.95).There was a predominance of female participants(71.74%),that completed High School(39.14%)and had an income from one to two Brazilian minimum wages(32.61%).The most frequent complaints were depressive symptoms(56.52%)and difficulties in interpersonal relationships(32.61%).The results obtained,besides allowing the survey of the social and demographic profile of the clientele of the PES at the Psychology School Clinic,and demonstrating its social relevance by providing free psychological care,also show to be of great importance for the definition of more accurate criteria for referral to the ES of patients seen on PES.展开更多
The mobile ad hoc network (MANET) with infrastructure networks (hybrid networks) has several practical uses. The utility of hybrid network is increased in real time applications by providing some suitable quality of s...The mobile ad hoc network (MANET) with infrastructure networks (hybrid networks) has several practical uses. The utility of hybrid network is increased in real time applications by providing some suitable quality of service. The quality thresholds are imposed on parameters like end-to-end delay (EED), jitter, packet delivery ratio (PDR) and throughput. This paper utilizes the extended ad hoc on-demand distance vector (AODV) routing protocol for communication between ad hoc network and fixed wired network. This paper also uses the IEEE 802.11e medium access control (MAC) function HCF Controlled Channel Access (HCCA) to support quality of service (QoS) in hybrid network. In this paper two simulation scenarios are analyzed for hybrid networks. The nodes in wireless ad hoc networks are mobile in one scenario and static in the other scenario. Both simulation scenarios are used to compare the performance of extended AODV with HCCA (IEEE 802.11e) and without HCCA (IEEE802.11) for real time voice over IP (VoIP) traffic. The extensive set of simulations results show that the performance of extended AODV with HCCA (IEEE 802.11e) improves QoS in hybrid network and it is unaffected whether the nodes in wireless ad hoc networks are mobile or static.展开更多
With the rapid development of network technology, it is increasingly important to dynamically upgrade router’s software. In this paper, the authors present new software architecture to be applied to extensible servic...With the rapid development of network technology, it is increasingly important to dynamically upgrade router’s software. In this paper, the authors present new software architecture to be applied to extensible services router. The novel feature of the architecture is the ability to dynamically load and configure extensible components at run time. Each component implements one function such as packets classification, packets scheduling and routing protocol. We design a simple configuration language (ESRCL) to configure and manage the router. The architecture can be configured according to the packet flows. At present, a prototype system based on highly efficient router operating system (HEROS) has been finished.展开更多
Oracle and ZTE announced on April 21, 2008 that they have extended their alliance in connection with the marketing and development of Service Delivery Platform offerings in China and globally.
After-school service is an effective arrangement of time and space for students after school hours.Its demand and value are under the strong advocacy and implementation of national policies to establish a“people-orie...After-school service is an effective arrangement of time and space for students after school hours.Its demand and value are under the strong advocacy and implementation of national policies to establish a“people-oriented”concept while focusing on students’development and pursuing educational equity.展开更多
Traumatic rupture of the ascending aorta is rare. We report the case of a 23-year-old man who suffered a service accident by crushing the thorax between two tanks during army maneuvers that resulted in an adventitial ...Traumatic rupture of the ascending aorta is rare. We report the case of a 23-year-old man who suffered a service accident by crushing the thorax between two tanks during army maneuvers that resulted in an adventitial rupture of the ascending thoracic aorta extending to the Crosse. Treatment consisted of replacement of the ascending aorta with a 24 mm Hemashield straight tube and re-implantation of supra-aortic vessels at the dome of the prosthesis.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
文摘The Psychological Emergency Service(PES)at psychology school clinics is an unscheduled and free psychological service to meet urgent demands.From this service,some patients whose complaints require more time for clinical work are referred to the Extended Screening(ES),a modality composed of six extra appointments.This study aims to analyze the sociodemographic profile of patients seen on PES in a Brazilian Psychology School Clinic,and to identify the demands that motivated referral to the ES,for better qualification of the care offered.This is a descriptive analysis research,carried out based on data from the medical records of 46 patients who went through the PES and were referred to the ES at the institution,between the years 2019 and 2021.Sociodemographic data were collected and,from the session reports,a content analysis of the thematic analysis modality was performed to identify the complaints.The participants’age ranged from 18 to 65 years,with a mean of 32.28 years(sd=10.95).There was a predominance of female participants(71.74%),that completed High School(39.14%)and had an income from one to two Brazilian minimum wages(32.61%).The most frequent complaints were depressive symptoms(56.52%)and difficulties in interpersonal relationships(32.61%).The results obtained,besides allowing the survey of the social and demographic profile of the clientele of the PES at the Psychology School Clinic,and demonstrating its social relevance by providing free psychological care,also show to be of great importance for the definition of more accurate criteria for referral to the ES of patients seen on PES.
文摘The mobile ad hoc network (MANET) with infrastructure networks (hybrid networks) has several practical uses. The utility of hybrid network is increased in real time applications by providing some suitable quality of service. The quality thresholds are imposed on parameters like end-to-end delay (EED), jitter, packet delivery ratio (PDR) and throughput. This paper utilizes the extended ad hoc on-demand distance vector (AODV) routing protocol for communication between ad hoc network and fixed wired network. This paper also uses the IEEE 802.11e medium access control (MAC) function HCF Controlled Channel Access (HCCA) to support quality of service (QoS) in hybrid network. In this paper two simulation scenarios are analyzed for hybrid networks. The nodes in wireless ad hoc networks are mobile in one scenario and static in the other scenario. Both simulation scenarios are used to compare the performance of extended AODV with HCCA (IEEE 802.11e) and without HCCA (IEEE802.11) for real time voice over IP (VoIP) traffic. The extensive set of simulations results show that the performance of extended AODV with HCCA (IEEE 802.11e) improves QoS in hybrid network and it is unaffected whether the nodes in wireless ad hoc networks are mobile or static.
文摘With the rapid development of network technology, it is increasingly important to dynamically upgrade router’s software. In this paper, the authors present new software architecture to be applied to extensible services router. The novel feature of the architecture is the ability to dynamically load and configure extensible components at run time. Each component implements one function such as packets classification, packets scheduling and routing protocol. We design a simple configuration language (ESRCL) to configure and manage the router. The architecture can be configured according to the packet flows. At present, a prototype system based on highly efficient router operating system (HEROS) has been finished.
文摘Oracle and ZTE announced on April 21, 2008 that they have extended their alliance in connection with the marketing and development of Service Delivery Platform offerings in China and globally.
文摘After-school service is an effective arrangement of time and space for students after school hours.Its demand and value are under the strong advocacy and implementation of national policies to establish a“people-oriented”concept while focusing on students’development and pursuing educational equity.
文摘Traumatic rupture of the ascending aorta is rare. We report the case of a 23-year-old man who suffered a service accident by crushing the thorax between two tanks during army maneuvers that resulted in an adventitial rupture of the ascending thoracic aorta extending to the Crosse. Treatment consisted of replacement of the ascending aorta with a 24 mm Hemashield straight tube and re-implantation of supra-aortic vessels at the dome of the prosthesis.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.