Computer Virus
Mostrando 1-12 de 258 artigos, teses e dissertações.
-
1. Clinical and epidemiological aspects of microcephaly in the state of Piauí, northeastern Brazil, 2015-20166
Resumo Objetivos: Descrever os aspectos da epidemia de microcefalia no Estado do Piauí. Métodos: Foram incluídos todos os casos de microcefalia congênita confirmados no estado entre 2015-2016 (n = 100). Os formulários de investigação do Centro Regional de Referência em Microcefalia foram analisados. Os casos descartados (n = 63) foram usados como g
J. Pediatr. (Rio J.). Publicado em: 12/09/2019
-
2. Computational drug design strategies applied to the modelling of human immunodeficiency virus-1 reverse transcriptase inhibitors
Reverse transcriptase (RT) is a multifunctional enzyme in the human immunodeficiency virus (HIV)-1 life cycle and represents a primary target for drug discovery efforts against HIV-1 infection. Two classes of RT inhibitors, the nucleoside RT inhibitors (NRTIs) and the nonnucleoside transcriptase inhibitors are prominently used in the highly active antiretrov
Mem. Inst. Oswaldo Cruz. Publicado em: 2015-11
-
3. Non-alcoholic steatohepatitis-related liver cirrhosis is increasing in China: A ten-year retrospective study
OBJECTIVE:Little is known about metabolic factors in cirrhotic patients in China. Therefore, we aimed to quantify the prevalence of both metabolic factors and non-alcoholic steatohepatitis-related liver cirrhosis in China.METHODS:The medical records of 1,582 patients diagnosed with liver cirrhosis from June 2003 to July 2013 at Daping Hospital (Chongqing, Ch
Clinics. Publicado em: 2015-08
-
4. A literature review on cardiovascular risk in human immunodeficiency virus-infected patients: implications for clinical management
INTRODUCTION: In recent years, there has been growing concern about an increasing rate of cardiovascular diseases in human immunodeficiency virus-infected patients, which could be associated with side effects of highly active antiretroviral therapy. It is likely that the metabolic disorders related to anti-human immunodeficiency virus treatment will eventual
Braz J Infect Dis. Publicado em: 2013-12
-
5. Prevalence of human T-cell lymphotropic virus types 1 and 2 in blood donors of the Caruaru Blood Center (Hemope)
BACKGROUND: There is difficulty in gathering data on the prevalence of human T-cell lymphotropic virus in blood donors as confirmatory testing is not mandatory in Brazil. This suggests there may be an underreporting of the prevalence. OBJECTIVE: To estimate the prevalence of human T-cell lymphotropic virus types 1 and 2 in donors of a blood bank in Car
Rev. Bras. Hematol. Hemoter.. Publicado em: 2013
-
6. Métodos formais algébricos para geração de invariantes / Algebraic formal methods for invariant generation
É bem sabido que a automação e a eficácia de métodos de verificação formal de softwares, sistemas embarcados ou sistemas híbridos, depende da facilidade com que invariantes precisas possam ser geradas automaticamente a partir do código fonte. Uma invariante é uma propriedade, especificada sobre um local específico do código fonte, e que sempre se
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 12/08/2011
-
7. Simulação Computacional e Análise de um Modelo Fenotípico de Evolução Viral. / Computer Simulation and Analysis of a Phenotypic Model of Viral Evolution
A large amount of viruses of medical importance such as HIV, respiratory syncytial virus, the hepatitis C virus, influenza A (H1N1) and polio virus, has RNA genome. These viruses exhibit extremely high mutational rate, fast replicative kinetics, large population of particles and high genetic diversity. Manifested during the infectious process, these features
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 26/01/2011
-
8. Computer simulation applied to the biological control of the insect aphis gossypii for the parasitoid Lysiphlebus testaceipes.
In integrated pest management (IPM), biological control is one of the possible options for the prevention or remediation of an unacceptable pest activity or damage. The success of forecast models in IPM depends, among other factors, on the knowledge of temperature effect over pests and its natural enemies. In this work, we simulated the effects of parasitism
In.: ECOLOGICAL MODELLING. Publicado em: 2011
-
9. Computer simulation applied to the biological control of the insect aphis gossypii for the parasitoid Lysiphlebus testaceipes.
In integrated pest management (IPM), biological control is one of the possible options for the prevention or remediation of an unacceptable pest activity or damage. The success of forecast models in IPM depends, among other factors, on the knowledge of temperature effect over pests and its natural enemies. In this work, we simulated the effects of parasitism
In.: ECOLOGICAL MODELLING. Publicado em: 2011
-
10. ASAT: Uma ferramenta para detecÃÃo de novos vÃrus
The term malware can be used to define in general any computer program that has malevolent intentions. It is desirable for large companies as much as for domestic users there exists protection against such virtual threats. Information nowadays is seen as a very precious asset. There have been many cases in which damage was caused by information loss in compa
Publicado em: 2008
-
11. NUMERICAL MODELING OF VIRUS TRANSPORT IN FRACTURED-POROUS MEDIA / MODELAGEM NUMÉRICA DO TRANSPORTE DE VÍRUS EM AQÜÍFEROS FRATURADOS - POROSOS
Setback distances of wellhead and catchments from septic tanks are establised by three aproaches: methods based on fixed setback distances or fixed travel times; methods based on vulnerability analysis and methods based on infection risk. In Costa Rica, the determination of setback distances is based on fixed travel times. This approach considers that during
Publicado em: 2008
-
12. Um sistema de correio eletrônico baseado no paradigma peer-to-peer
O sistema de correio eletrônico é um dos serviços mais utilizados na Internet. O sistema convencional é baseado no paradigma cliente/servidor: no servidor ficam as mensagens e os dados para autenticação. Esta centralização causa alguns problemas como ponto único de falha e a exigência de grande capacidade de armazenamento em disco. Além disso, o s
Publicado em: 2008