79 research outputs found
a intervenção especializada de enfermagem nos cuidados pós-reanimação
A mortalidade por paragem cardiorrespiratória súbita é um problema de saúde pública
que afeta a população à escala global. Segundo dados de 2017, a incidência de paragem
cardiorrespiratória fora do hospital foi de 67 a 170 casos por 100 mil habitantes (Grasner, 2021).
Em Portugal, em 2020, de todas as situações de paragem cardiorrespiratória fora do
hospital, apenas foram reanimadas com recuperação de sinais de circulação 616 pessoas, o que
equivale a 3% do número total de casos. Destes, apenas 8% irão sobreviver e ter alta hospitalar
(INEM, 2021).
A intervenção especializada de enfermagem no período pós- paragem cardiorrespiratória
é fundamental para influenciar de forma positiva o outcome da pessoa, pelo que é de extrema
importância compreender a intervenção do enfermeiro especialista na prestação de cuidados de
monitorização, vigilância e terapêutica avançados.
Com o objetivo de desenvolver competências especializadas de enfermagem nos cuidados
de enfermagem à pessoa vítima de paragem cardiorrespiratória recuperada, foi planeado e
executado um percurso com vista à construção e solidificação de competências especializadas,
recorrendo aos referenciais teóricos do Nursing as Caring e Technological Nursing as Caring.
O percurso foi dividido em dois contextos clínicos, primeiro em unidade de cuidados
intensivos e posteriormente em serviço de urgência e visaram sobretudo o desenvolver e a
aquisição de novas competências especializadas de enfermagem no cuidado da pessoa vítima de
paragem cardiorrespiratória. Através da elaboração de documentos como estudo de caso ou
jornais de aprendizagem foi possível uma análise reflexiva da atividade exercida. Também a
elaboração de uma revisão integrativa da literatura permitiu uma abordagem sistemática e
reflexiva do tema em estudo.
Como resultado deste percurso, houve um aprofundar de conhecimentos, assim como um
incremento de competências especializadas de enfermagem no campo em estudo, assim como
inerentemente na gestão de cuidados.
O cuidado especializado de enfermagem à pessoa vítima de paragem cardiorrespiratória
recuperada assenta acima da tudo na vigilância, monitorização e neuroprotecção enquanto
medidas que promovem a qualidade dos cuidados e um melhor outcome para a pessoa.Mortality from sudden cardiac arrest is a public health problem that affects the population
on a global scale. According to 2017 data, the incidence of cardiorespiratory arrest outside the
hospital ranged from 67 to 170 cases per 100,000 inhabitants.
In Portugal, in 2020, of all situations of cardiorespiratory arrest outside the hospital, only
616 people were resuscitated with return of spontaneous circulation, which is equivalent to 3% of
the total number of cases. Of these, only 8% will survive and be discharged from the hospital.
Specialized nursing intervention in the post-cardiac arrest period is essential to positively
influence the outcome of the person, so it is extremely important to understand the role of the
nurse specialist in providing advanced monitoring, surveillance and therapeutic care.
With the purpose of developing specialized nursing skills in nursing care for the victim of
recovered cardiorespiratory arrest, a course was planned and executed in order to build and
solidify specialized skills, using the theoretical frameworks of Nursing as Caring and Technological
Nursing as Caring.
The course was divided into two clinical contexts, first in an intensive care unit and later in
an emergency department and aimed above all at developing and acquiring new specialized
nursing skills in the care for the person suffering from cardiorespiratory arrest. Through the
elaboration of documents such as a case study or learning journals, a reflective analysis of the
activity performed was possible. The elaboration of an integrative literature review also allowed a
systematic and reflective approach to the topic under study.
As a result, there was a deepening in this field of knowledge, as well as an increase in
specialized nursing skills in the field under study, as well as inherently in care management.
Specialized nursing care for the person who has recovered from cardiac arrest is based
above all on surveillance, monitoring and neuroprotection as measures that promote the quality
of care and a better outcome for the person
On-chip system call tracing: A feasibility study and open prototype
Several tools for program tracing and introspection exist. These tools can be used to analyze potentially malicious or untrusted programs. In this setting, it is important to prevent that the target program determines whether it is being traced or not. This is typically achieved by minimizing the code of the introspection routines and any artifact or side-effect that the program can leverage. Indeed, the most recent approaches consist of lightly instrumented operating systems or thin hypervisors running directly on bare metal. Following this research trend, we investigate the feasibility of transparently tracing a Linux/ARM program without modifying the software stack, while keeping the analysis cost and flexibility compatible with state of the art emulation- or baremetal- based approaches. As for the typical program tracing task, our goal is to reconstruct the stream of system call invocations along with the respective un-marshalled arguments. We propose to leverage the availability of on-chip debugging interfaces of modern ARM systems, which are accessible via JTAG. More precisely, we developed OpenST, an open-source prototype tracer that allowed us to analyze the performance overhead and to assess the transparency with respect to evasive, real-world malicious programs. OpenST has two tracing modes: In-kernel dynamic tracing and external tracing. The in-kernel dynamic tracing mode uses the JTAG interface to \u201chot-patch\u201d the system calls at runtime, injecting introspection code. This mode is more transparent than emulator based approaches, but assumes that the traced program does not have access to the kernel memory\u2014where the introspection code is loaded. The external tracing mode removes this assumption by using the JTAG interface to manage hardware breakpoints. Our tests show that OpenST\u2019s greater transparency comes at the price of a steep performance penalty. However, with a cost model, we show that OpenST scales better than the state of the art, bare-metal-based approach, while remaining equally stealthy to evasive malware
Security and privacy issues of physical objects in the IoT: Challenges and opportunities
In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out
Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection
It is well recognized that security will play a major role in enabling most of the applications envisioned for the Internet of Things (IoT). We must also note that most of such applications will employ sensing and actuating devices integrated with the Internet communications infrastructure and, from the minute such devices start to support end-to-end communications with external (Internet) hosts, they will be exposed to all kinds of threats and attacks. With this in mind, we propose an IDS framework for the detection and prevention of attacks in the context of Internet-integrated CoAP communication environments and, in the context of this framework, we implement and experimentally evaluate the effectiveness of anomaly-based intrusion detection, with the goal of detecting Denial of Service (DoS) attacks and attacks against the 6LoWPAN and CoAP communication protocols. From the results obtained in our experimental evaluation we observe that the proposed approach may viably protect devices against the considered attacks. We are able to achieve an accuracy of 93% considering the multi-class problem, thus when the pattern of specific intrusions is known. Considering the binary class problem, which allows us to recognize compromised devices, and though a lower accuracy of 92% is observed, a recall and an F_Measure of 98% were achieved. As far as our knowledge goes, ours is the first proposal targeting the usage of anomaly detection and prevention approaches to deal with application-layer and DoS attacks in 6LoWPAN and CoAP communication environments
Energy-Aware Security Adaptation for Low-Power IoT Applications
The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power and Wide-Area Networks (LPWAN) communication technologies. This applies to many critical environments, such as industrial control and healthcare, where wireless communications are yet to be broadly adopted. Two fundamental requirements to effectively support upcoming critical IoT applications are those of energy management and security. We may note that those are, in fact, contradictory goals. On the one hand, many IoT devices depend on the usage of batteries while, on the other hand, adequate security mechanisms need to be in place to protect devices and communications from threats against their stability and security. With thismotivation in mind, we propose a solution to address the management, in tandem, of security and energy in LoRaWAN IoT communication environments. We propose and evaluate an architecture in the context of which adaptation logic is used to manage security and energy dynamically, with the goal of guaranteeing appropriate security, while promoting the lifetime of constrained sensing devices. The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy. Security and energy are managed in line with the requirements of the application at hand, the characteristics of the constrained sensing devices employed and the detection, as well as the threat, of particular types of attacks
Energy-Aware Security Adaptation for Low-Power IoT Applications
The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power and Wide-Area Networks (LPWAN) communication technologies. This applies to many critical environments, such as industrial control and healthcare, where wireless communications are yet to be broadly adopted. Two fundamental requirements to effectively support upcoming critical IoT applications are those of energy management and security. We may note that those are, in fact, contradictory goals. On the one hand, many IoT devices depend on the usage of batteries while, on the other hand, adequate security mechanisms need to be in place to protect devices and communications from threats against their stability and security. With thismotivation in mind, we propose a solution to address the management, in tandem, of security and energy in LoRaWAN IoT communication environments. We propose and evaluate an architecture in the context of which adaptation logic is used to manage security and energy dynamically, with the goal of guaranteeing appropriate security, while promoting the lifetime of constrained sensing devices. The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy. Security and energy are managed in line with the requirements of the application at hand, the characteristics of the constrained sensing devices employed and the detection, as well as the threat, of particular types of attacks
- …