• Nenhum resultado encontrado

panic attack

Rev. Bras. Psiquiatr.  vol.29 suppl.1 en a02v20s1

Rev. Bras. Psiquiatr. vol.29 suppl.1 en a02v20s1

... real-life panic attacks, as well as those induced by selective panicogenic agents such as lactate and carbon dioxide, do not activate the hypothalamic-pituitary-adrenal ...a panic attack and, thus, ...

4

J. bras. pneumol.  vol.35 número7

J. bras. pneumol. vol.35 número7

... spontaneous panic attacks, as well as with spontaneous panic attacks in panic disorder patients not sensitive to the hyperventilation challenge ...88 panic disorder patients evaluated, 45 ...

11

Arq. NeuroPsiquiatr.  vol.57 número2B

Arq. NeuroPsiquiatr. vol.57 número2B

... with panic disorder and phobic avoidance who responded partially to treatment with alprazolam but recovered fully while receiving ...spontaneous panic attacks but not after a 8-weeks treatment with ...no ...

5

Clinical features of panic patients sensitive to hyperventilation or breath-holding methods for inducing panic attacks

Clinical features of panic patients sensitive to hyperventilation or breath-holding methods for inducing panic attacks

... a panic attack after a hyperventilation chal- lenge test with those of patients who had an attack after a breath-holding ...vere panic attack of 1108 PD patients, which were divided ...

7

Arq. NeuroPsiquiatr.  vol.61 número3B

Arq. NeuroPsiquiatr. vol.61 número3B

... three panic attacks in the two weeks before the challenge test day just for PD patients, no use of any psychotropic drugs for at least five-week by any subject, and a negative urine test for benzodiazepines and ...

5

Hyperventilation in panic disorder patients and healthy first-degree relatives

Hyperventilation in panic disorder patients and healthy first-degree relatives

... the panic attack by decreasing the hyperventila- tory response ...of panic, uneasiness, fatigue, crying spells, paresthesias) are similar to the clinical find- ings of panic disorder, and many ...

7

Arq. NeuroPsiquiatr.  vol.60 número3B

Arq. NeuroPsiquiatr. vol.60 número3B

... of panic disorder patients conduc- ting a respiratory polisomnography on 14 patients with panic disorder and 14 healthy control ...sleep panic attacks had microapnea/ microhypopnea index scores ...

4

Rev. Bras. Psiquiatr.  vol.35 número3

Rev. Bras. Psiquiatr. vol.35 número3

... DSM-IV, panic attack is defined ‘‘as a discrete period of intense fear or discomfort, in which four or more of the following symptoms developed abruptly and reached a peak within 10 ...of panic used ...

2

Arq. NeuroPsiquiatr.  vol.57 número4

Arq. NeuroPsiquiatr. vol.57 número4

... to panic disorder. Panic disorder patients exhibit both behaviorally and physiologically abnormal responses to respiratory challenges ...of panic attacks by hyperventilation in a group of ...

5

Panic-like defensive behavior but not fear-induced antinociception is differently organized by dorsomedial and posterior hypothalamic nuclei of Rattus norvegicus (Rodentia, Muridae)

Panic-like defensive behavior but not fear-induced antinociception is differently organized by dorsomedial and posterior hypothalamic nuclei of Rattus norvegicus (Rodentia, Muridae)

... of panic-like defensive behavior, as well as in pain ...elicit panic attack-like defensive responses followed by fear-induced antinociception, although the innate fear-induced behavior originates ...

10

Cloud Computing Security Case Studies and Research

Cloud Computing Security Case Studies and Research

... engineering attack to completely destroy technical writer Mat Honan’s digital life by remotely deleting the information from his iPad, MacBook, and iPod ...

5

Mathematical Attacks on RSA Cryptosystem

Mathematical Attacks on RSA Cryptosystem

... only attack. In order to describe this attack, we need to explain how Square-and-Multiply exponentiation is carried ...Timing attack uses the fact that when d[i]=1, an additional multiplication takes ...

7

Attack Penetration System for SQL Injection

Attack Penetration System for SQL Injection

... (CBR) engine which is equipped with learning and adaptation capabilities for the classification of SQL queries and detection of malicious user requests. To carry out the tasks of attack classification and ...

9

Attack-tolerant communication in a siem tool

Attack-tolerant communication in a siem tool

... the attack surface that might be exploited by an ...the attack is once again the delay of the certain event packets, or eventually the temporary disconnection of one of the ...

89

Mirtazapine versus fluoxetine in the treatment of panic disorder

Mirtazapine versus fluoxetine in the treatment of panic disorder

... The patients were seen for evaluation at the end of weeks 0, 1, 2, 4, 6 and 8. Baseline assessment took place at the end of week 0. Two psychiatrists were responsible for ap- plying the standardized interviews. Each pa- ...

5

“Brand play” versus “Brand attack”

“Brand play” versus “Brand attack”

... to attack the brand by distorting those elements in one of the two ways shown in Appendix, rather than simply playing with ...brand attack alternative (artist co-creator against consumer co-creator), in ...

15

Security protection across network based attacks in mesh networks

Security protection across network based attacks in mesh networks

... of attack will be discussed and the solution to overcome these attacks will be ...(DDoS) attack is the most vital attack and these attacks will be taken ...this attack hits on the ...

9

Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol

Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol

... synchronization attack and a full-disclosure attack, against this ...de-synchronization attack can be carried out in three round of interaction in SSL-MAP while the full-disclosure attack is ...

9

Rev. bras. cineantropom. desempenho hum.  vol.18 número3

Rev. bras. cineantropom. desempenho hum. vol.18 número3

... of attack is related to the higher incidence of score a point, by hindering the defensive opponent’s ...frequent attack scoring point as well as the most powerful ...the attack efect. herefore, the ...

9

Towards Protection Against Low-Rate Distributed Denial of Service Attacks in Platform-as-a-Service Cloud Services

Towards Protection Against Low-Rate Distributed Denial of Service Attacks in Platform-as-a-Service Cloud Services

... Xiang, Li and Zhou [22] suggests a different method using Generalized Entropy and Information Distance. The approach consists in detect Low-Rate attacks earlier and more accurately which are two important criteria for ...

106

Show all 363 documents...

temas relacionados