4 research outputs found

    Inside-Out Transcanal Endoscopic Mastoidectomy: Literature Revision

    No full text
    Introduction Recently, there have been significant advancements in transcanal endoscopic ear surgery (TEES). The combination of rigid and thin otoendoscopes with high-definition cameras enabled a less invasive transcanal access to the middle ear and a clearer view of the surgical field. Several surgeons have recently published studies about cholesteatoma resection via transcanal endoscopic surgery, even in cases where the disease has extended to the mastoid, requiring transcanal endoscopic mastoidectomy. Objectives To analyze the currently available literature on transcanal endoscopic inside-out mastoidectomy, and to determine its efficacy as a surgical technique by evaluating the disease's relapse/recurrence rate. Data Synthesis Initially, the titles and abstracts of articles identified were analyzed. At this stage, 117 articles were analyzed, 97 of which were excluded for not meeting the inclusion criteria. The 20 remaining articles were further evaluated. The articles were classified on the basis of five levels of scientific evidence. Final Comments The analysis of the studies showed that the transcanal endoscopic approach is effective in providing access to the attic or antrum, especially in cases of sclerotic mastoids. There was only one study with grade A recommendation, which showed the efficacy of endoscopic ear surgery in the treatment of cholesteatoma. Furthermore, there were three studies with grade B recommendation, showing less relapse/recurrence after TEES. More studies with grade A and B recommendations are needed to better evaluate the effectiveness of TEES, especially compared with that of traditional microscopic surgery

    Proposed control of level of access for the MQTT protocol on the communication of devices from a network based on the Internet of Things

    No full text
    Trabalho de Conclusão de Curso (graduação)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2017.Com a evolução da internet e grandes avanços nas áreas de comunicação e microeletrônica, o conceito de computação ubíqua vem chegando cada vez mais próximo da realidade. Está cada vez mais visível, objetos que, costumeiramente se utilizam estão ganhando a capacidade de se conectarem a internet e modificando a forma de interação entre homem e objeto. Relógios possuem funções que vão além de marcar as horas, uma simples pulseira, antes utilizada como acessório de moda, torna-se seu enfermeiro pessoal. A Internet das Coisas oferece enormes oportunidades para revolucionar o modo de realização das nossas atividades em diversas áreas, como assistência médica, logística ou automação. O fato é que as aplicações desenvolvidas manipulam dados sensíveis, e qualquer intromissão pode gerar grandes perdas financeiras ou até mesmo atentar contra a integridade física dos usuários. Dessa forma, um dos grandes desafios para quem trabalha na construção de serviços nessa área é desenvolver aplicações suficientemente seguras para evitar, vazamento de informações, ou comprometimento dos serviços. Já temos uma série de relatos sobre as violações de segurança em soluções para Internet das Coisas, por isso neste trabalho iremos abordar o funcionamento do protocolo MQTT, que vem sendo adotado em inúmeras soluções e pode tornar-se o padrão vigente para a comunicação entre dispositivos e deles com serviços, e modificá-lo para que seja capaz de fornecer a funcionalidade de controle de acesso, permitindo que o gerente da rede limite as permissões de cada usuário, baseado no princípio publish/subscribe do MQTT, afim de obter um grau maior de segurança e contribuir para um ambiente mais estável e menos suscetível a ataques para a Internet das Coisas.With the evolution of the internet and great improvement in the communication and microelectronics area, the concept of Ubiquitous Computing is getting closer to reality. It’s increasingly visible that the objects which we use customarily are gaining capability of being connected to the internet and modifying the relationship between man and object. Watches are exhibiting functions that go beyond telling the time or being a a simple bracelet that was once seen as a fashion accessory, they are now personal nurses. The Internet of Things offers tremendous opportunities to revolutionize the way of accomplishing our tasks in many different areas, like medical assistance, logistics or automation. The fact is that the applications developed manipulate sensitive data, and any intrusion may generate great financial losses or even attack the physical inegrity of its users. As a result, one of the biggest challenges for those who work in this area’s construction services is to develop applications which are sufficiently safe in order to avoid the leakage of information or damages to the services. We already have a series of reports on safety violations of the Internet of Things, therefore, in this essay, we will debate the functioning of the MQTT protocol, which is being chosen in several solutions and may become the standard in force for the communication between gadgets and between them and the services, and modify it to reach the capability of providing the functionality of access control, allowing the network manager to limit the permissions of each user, based on the MQTT’s publish/subscribe principle, in order to obtain greater safety and contribute to the achievement of a more stable and less susceptible to attacks environment for the Internet of Things

    NEOTROPICAL CARNIVORES: a data set on carnivore distribution in the Neotropics

    No full text
    Mammalian carnivores are considered a key group in maintaining ecological health and can indicate potential ecological integrity in landscapes where they occur. Carnivores also hold high conservation value and their habitat requirements can guide management and conservation plans. The order Carnivora has 84 species from 8 families in the Neotropical region: Canidae; Felidae; Mephitidae; Mustelidae; Otariidae; Phocidae; Procyonidae; and Ursidae. Herein, we include published and unpublished data on native terrestrial Neotropical carnivores (Canidae; Felidae; Mephitidae; Mustelidae; Procyonidae; and Ursidae). NEOTROPICAL CARNIVORES is a publicly available data set that includes 99,605 data entries from 35,511 unique georeferenced coordinates. Detection/non-detection and quantitative data were obtained from 1818 to 2018 by researchers, governmental agencies, non-governmental organizations, and private consultants. Data were collected using several methods including camera trapping, museum collections, roadkill, line transect, and opportunistic records. Literature (peer-reviewed and grey literature) from Portuguese, Spanish and English were incorporated in this compilation. Most of the data set consists of detection data entries (n = 79,343; 79.7%) but also includes non-detection data (n = 20,262; 20.3%). Of those, 43.3% also include count data (n = 43,151). The information available in NEOTROPICAL CARNIVORES will contribute to macroecological, ecological, and conservation questions in multiple spatio-temporal perspectives. As carnivores play key roles in trophic interactions, a better understanding of their distribution and habitat requirements are essential to establish conservation management plans and safeguard the future ecological health of Neotropical ecosystems. Our data paper, combined with other large-scale data sets, has great potential to clarify species distribution and related ecological processes within the Neotropics. There are no copyright restrictions and no restriction for using data from this data paper, as long as the data paper is cited as the source of the information used. We also request that users inform us of how they intend to use the data

    NEOTROPICAL ALIEN MAMMALS: a data set of occurrence and abundance of alien mammals in the Neotropics

    No full text
    Biological invasion is one of the main threats to native biodiversity. For a species to become invasive, it must be voluntarily or involuntarily introduced by humans into a nonnative habitat. Mammals were among first taxa to be introduced worldwide for game, meat, and labor, yet the number of species introduced in the Neotropics remains unknown. In this data set, we make available occurrence and abundance data on mammal species that (1) transposed a geographical barrier and (2) were voluntarily or involuntarily introduced by humans into the Neotropics. Our data set is composed of 73,738 historical and current georeferenced records on alien mammal species of which around 96% correspond to occurrence data on 77 species belonging to eight orders and 26 families. Data cover 26 continental countries in the Neotropics, ranging from Mexico and its frontier regions (southern Florida and coastal-central Florida in the southeast United States) to Argentina, Paraguay, Chile, and Uruguay, and the 13 countries of Caribbean islands. Our data set also includes neotropical species (e.g., Callithrix sp., Myocastor coypus, Nasua nasua) considered alien in particular areas of Neotropics. The most numerous species in terms of records are from Bos sp. (n = 37,782), Sus scrofa (n = 6,730), and Canis familiaris (n = 10,084); 17 species were represented by only one record (e.g., Syncerus caffer, Cervus timorensis, Cervus unicolor, Canis latrans). Primates have the highest number of species in the data set (n = 20 species), partly because of uncertainties regarding taxonomic identification of the genera Callithrix, which includes the species Callithrix aurita, Callithrix flaviceps, Callithrix geoffroyi, Callithrix jacchus, Callithrix kuhlii, Callithrix penicillata, and their hybrids. This unique data set will be a valuable source of information on invasion risk assessments, biodiversity redistribution and conservation-related research. There are no copyright restrictions. Please cite this data paper when using the data in publications. We also request that researchers and teachers inform us on how they are using the data
    corecore