Search results for: Panama leaks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 72

Search results for: Panama leaks

72 Metaphorical Devices in Political Cartoons with Reference to Political Confrontation in Pakistan after Panama Leaks

Authors: Ayesha Ashfaq, Muhammad Ajmal Ashfaq

Abstract:

It has been assumed that metaphorical and symbolic contests are waged with metaphors, captions, and signs in political cartoons that play a significant role in image construction of political actors, situations or events in the political arena. This paper is an effort to explore the metaphorical devices in political cartoons related to the political confrontation in Pakistan between the ruling party Pakistan Muslim League Nawaz (PMLN) and opposition parties especially after Panama leaks. For this purpose, political cartoons sketched by five renowned political cartoonists on the basis of their belongings to the most highly circulated mainstream English newspapers of Pakistan and their professional experiences in their genre, were selected. The cartoons were analyzed through the Barthes’s model of Semiotics under the umbrella of the first level of agenda setting theory ‘framing’. It was observed that metaphorical devices in political cartoons are one of the key weapons of cartoonists’ armory. These devices are used to attack the candidates and contribute to the image and character building. It was found that all the selected political cartoonists used different forms of metaphors including situational metaphors and embodying metaphors. Not only the physical stature but also the debates and their activities were depicted metaphorically in the cartoons that create the scenario of comparison between the cartoons and their real political confrontation. It was examined that both forms of metaphors shed light on cartoonist’s perception and newspaper’s policy about political candidates, political parties and particular events. In addition, it was found that zoomorphic metaphors and metaphors of diminishments were also predominantly used to depict the conflict between two said political actors.

Keywords: metaphor, Panama leaks, political cartoons, political communication

Procedia PDF Downloads 256
71 Assessment of Korea's Natural Gas Portfolio Considering Panama Canal Expansion

Authors: Juhan Kim, Jinsoo Kim

Abstract:

South Korea cannot import natural gas in any form other than LNG because of the division of South and North Korea. Further, the high proportion of natural gas in the national energy mix makes this resource crucial for energy security in Korea. Expansion of Panama Canal will allow for reducing the cost of shipping between the Far East and U.S East. Panama Canal expansion can have significant impacts on South Korea. Due to this situation, we review the natural gas optimal portfolio by considering the uniqueness of the Korean Natural gas market and expansion of Panama Canal. In order to assess Korea’s natural gas optimal portfolio, we developed natural gas portfolio model. The model comprises two steps. First, to obtain the optimal long-term spot contract ratio, the study examines the price level and the correlation between spot and long-term contracts by using the Markowitz, portfolio model. The optimal long-term spot contract ratio follows the efficient frontier of the cost/risk level related to this price level and degree of correlation. Second, by applying the obtained long-term contract purchase ratio as the constraint in the linear programming portfolio model, we determined the natural gas optimal import portfolio that minimizes total intangible and tangible costs. Using this model, we derived the optimal natural gas portfolio considering the expansion of Panama Canal. Based on these results, we assess the portfolio for natural gas import to Korea from the perspective of energy security and present some relevant policy proposals.

Keywords: natural gas, Panama Canal, portfolio analysis, South Korea

Procedia PDF Downloads 264
70 Migration Law in Republic of Panama

Authors: Ronel Solis, Leonardo Collado

Abstract:

Migration law in the Republic of Panama has been regulated mainly by the executive branch. This has created a crisis not only institutional but also social because the evolution of these norms has rested greatly from the discretion of the government in office. This has created instability in immigration regulation and more now, with the migration crisis of which Panama is also part. Different migration policies have been established. The most recent is that of the controlled migration flow, in which, for humanitarian reasons, migrants move from the border with Colombia to the border with Costa Rica. Unfortunately, such control is not enough, and in some cases, unprotected migrants have been confined for months, their passports have been withheld, and no recognition of their rights is offered. The Inter-American Court of Human Rights has condemned Panama for the unfair detention of an irregular migrant, who was detained for two years in Panamanian prisons, without having committed a crime and without accessing a just defense. This is the case Vélez Loor vs. the Republic of Panama. Uncontrollable migration has been putting pressure on Panamanian public health services. The recent denunciation of HIV-related NGOs that warns that there are hundreds of foreigners who receive expensive antiretroviral therapy in Panama is serious, and several of them are irregular migrants. On the other hand, there are no border control posts with the Republic of Colombia, because it is a jungle area and migrants are exposed to arms and drug trafficking, and unfortunately, also to prostitution. Government entities such as the border police service have provided humanitarian support to migrants on the border with Colombia, although it is not their administrative function, and various entities discuss who should address this crisis. However, few economic resources are allocated by the government to solve this problem, especially with the recent mass migration of Venezuelans who have fled their country. The establishment of a migratory normative code is necessary to establish uniformity in the recognition and application of migratory rights. In this way, dependence on the changing migration policies of the different Panamanian governments would be eliminated, and the rights of migrants and nationals would be guaranteed.

Keywords: executive branch, irregular migration, migration code, Republic of Panama

Procedia PDF Downloads 100
69 Managing City Pipe Leaks through Community Participation Using a Web and Mobile Application in South Africa

Authors: Mpai Mokoena, Nsenda Lukumwena

Abstract:

South Africa is one of the driest countries in the world and is facing a water crisis. In addition to inadequate infrastructure and poor planning, the country is experiencing high rates of water wastage due to pipe leaks. This study outlines the level of water wastage and develops a smart solution to efficiently manage and reduce the effects of pipe leaks, while monitoring the situation before and after fixing the pipe leaks. To understand the issue in depth, a literature review of journal papers and government reports was conducted. A questionnaire was designed and distributed to the general public. Additionally, the municipality office was contacted from a managerial perspective. The analysis from the study indicated that the majority of the citizens are aware of the water crisis and are willing to participate positively to decrease the level of water wasted. Furthermore, the response from the municipality acknowledged that more practical solutions are needed to reduce water wastage, and resources to attend to pipe leaks swiftly. Therefore, this paper proposes a specific solution for municipalities, local plumbers and citizens to minimize the effects of pipe leaks. The solution provides web and mobile application platforms to report and manage leaks swiftly. The solution is beneficial to the country in achieving water security and would promote a culture of responsibility toward water usage.

Keywords: urban distribution networks, leak management, mobile application, responsible citizens, water crisis, water security

Procedia PDF Downloads 110
68 Carlos Guillermo 'Cubena' Wilson's Literary Texts as Platforms for Social Commentary and Critique of Panamanian Society

Authors: Laverne Seales

Abstract:

When most people think of Panama, they immediately think of the Canal; however, the construction and the people who made it possible are often omitted and seldom acknowledged. The reality is that the construction of this waterway was achieved through forced migration and discriminatory practices toward people of African descent, specifically black people from the Caribbean. From the colonial period to the opening and subsequent operation of the Panama Canal by the United States, this paper goes through the rich layers of Panamanian history to examine the life of Afro-Caribbeans and their descendants in Panama. It also considers the role of the United States in Panama; it explores how the United States in Panama forged a racially complex country that made the integration of Afro-Caribbeans and their descendants difficult. After laying a historical foundation, the exploration of Afro-Caribbean people and Panamanians of Afro-Caribbean descent are analyzed through Afro-Panamanian writer Carlos Guillermo ‘Cubena’ Wilson's novels, short stories, and poetry. This study focuses on how Cubena addresses racism, discrimination, inequality, and social justice issues towards Afro-Caribbeans and their descendants who traveled to Panama to construct the Canal. Content analysis methodology can yield several significant contributions, and analyzing Carlos Guillermo Wilson's literature under this framework allows us to consider social commentary and critique of Panamanian society. It identifies the social issues and concerns of Afro-Caribbeans and people of Afro-Caribbean descent, such as inequality, corruption, racism, political oppression, and cultural identity. Analysis methodology allows us to explore how Cubena's literature engages with questions of cultural identity and belonging in Panamanian society. By examining themes related to race, ethnicity, language, and heritage, this research uncovers the complexities of Panamanian cultural identity, allowing us to interrogate power dynamics and social hierarchies in Panamanian society. Analyzing the portrayal of different social groups, institutions, and power structures helps uncover how power is wielded, contested, and resisted; Cubena's fictional world allows us to see how it functions in Panama. Content analysis methodology also provides for critiquing political systems and governance in Panama. By examining the representation and presentation of political figures, institutions, and events in Cubena's literature, we uncover his commentary on corruption, authoritarianism, governance, and the role of the United States in Panama. Content analysis highlights how Wilson's literature amplifies the voices and experiences of marginalized individuals and communities in Panamanian society. By centering the narratives of Afro-Panamanians and other marginalized groups, this researcher uncovers Cubena's commitment to social justice and inclusion in his writing and helps the reader engage with historical narratives and collective memory in Panama. Overall, analyzing Carlos Guillermo ‘Cubena’ Wilson's literature as a platform for social commentary and critique of Panamanian society using content analysis methodology provides valuable insights into the cultural, social, and political dimensions of Afro-Panamanians during and after the construction of the Panama Canal.

Keywords: Afro-Caribbean, Panama Canal, race, Afro-Panamanian, identity, history

Procedia PDF Downloads 12
67 Effect of Leaks in Solid Oxide Electrolysis Cells Tested for Durability under Co-Electrolysis Conditions

Authors: Megha Rao, Søren H. Jensen, Xiufu Sun, Anke Hagen, Mogens B. Mogensen

Abstract:

Solid oxide electrolysis cells have an immense potential in converting CO2 and H2O into syngas during co-electrolysis operation. The produced syngas can be further converted into hydrocarbons. This kind of technology is called power-to-gas or power-to-liquid. To produce hydrocarbons via this route, durability of the cells is still a challenge, which needs to be further investigated in order to improve the cells. In this work, various nickel-yttria stabilized zirconia (Ni-YSZ) fuel electrode supported or YSZ electrolyte supported cells, cerium gadolinium oxide (CGO) barrier layer, and an oxygen electrode are investigated for durability under co-electrolysis conditions in both galvanostatic and potentiostatic conditions. While changing the gas on the oxygen electrode, keeping the fuel electrode gas composition constant, a change in the gas concentration arc was observed by impedance spectroscopy. Measurements of open circuit potential revealed the presence of leaks in the setup. It is speculated that the change in concentration impedance may be related to the leaks. Furthermore, the cells were also tested under pressurized conditions to find an inter-play between the leak rate and the pressure. A mathematical modeling together with electrochemical and microscopy analysis is presented.

Keywords: co-electrolysis, durability, leaks, gas concentration arc

Procedia PDF Downloads 121
66 Modeling of Leaks Effects on Transient Dispersed Bubbly Flow

Authors: Mohand Kessal, Rachid Boucetta, Mourad Tikobaini, Mohammed Zamoum

Abstract:

Leakage problem of two-component fluids flow is modeled for a transient one-dimensional homogeneous bubbly flow and developed by taking into account the effect of a leak located at the middle point of the pipeline. The corresponding three conservation equations are numerically resolved by an improved characteristic method. The obtained results are explained and commented in terms of physical impact on the flow parameters.

Keywords: fluid transients, pipelines leaks, method of characteristics, leakage problem

Procedia PDF Downloads 445
65 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 221
64 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 297
63 Risk Analysis of Leaks from a Subsea Oil Facility Based on Fuzzy Logic Techniques

Authors: Belén Vinaixa Kinnear, Arturo Hidalgo López, Bernardo Elembo Wilasi, Pablo Fernández Pérez, Cecilia Hernández Fuentealba

Abstract:

The expanded use of risk assessment in legislative and corporate decision-making has increased the role of expert judgement in giving data for security-related decision-making. Expert judgements are required in most steps of risk assessment: danger recognizable proof, hazard estimation, risk evaluation, and examination of choices. This paper presents a fault tree analysis (FTA), which implies a probabilistic failure analysis applied to leakage of oil in a subsea production system. In standard FTA, the failure probabilities of items of a framework are treated as exact values while evaluating the failure probability of the top event. There is continuously insufficiency of data for calculating the failure estimation of components within the drilling industry. Therefore, fuzzy hypothesis can be used as a solution to solve the issue. The aim of this paper is to examine the leaks from the Zafiro West subsea oil facility by using fuzzy fault tree analysis (FFTA). As a result, the research has given theoretical and practical contributions to maritime safety and environmental protection. It has been also an effective strategy used traditionally in identifying hazards in nuclear installations and power industries.

Keywords: expert judgment, probability assessment, fault tree analysis, risk analysis, oil pipelines, subsea production system, drilling, quantitative risk analysis, leakage failure, top event, off-shore industry

Procedia PDF Downloads 160
62 Genomic Evidence for Ancient Human Migrations Along South America's East Coast

Authors: Andre Luiz Campelo dos Santos, Amanda Owings, Henry Socrates Lavalle Sullasi, Omer Gokcumen, Michael DeGiorgio, John Lindo

Abstract:

An increasing body of archaeological and genomic evidence have indicated a complex settlement process of the Americas. Here, four newly sequenced ancient genomes from Northeast Brazil and Uruguay are reported to share strong relationships with previously published samples from Panama and Southeast Brazil. Moreover, an unexpected high genomic affinity with present-day Onge is found in ancient individuals unearthed along the northern portion of South America’s Atlantic coast. These results provide genomic evidence for ancient migrations along South America’s Atlantic coast.

Keywords: archaeogenomics, atlantic coast, paleomigrations, South America

Procedia PDF Downloads 201
61 Effect of Discharge Pressure Conditions on Flow Characteristics in Axial Piston Pump

Authors: Jonghyuk Yoon, Jongil Yoon, Seong-Gyo Chung

Abstract:

In many kinds of industries which usually need a large amount of power, an axial piston pump has been widely used as a main power source of a hydraulic system. The axial piston pump is a type of positive displacement pump that has several pistons in a circular array within a cylinder block. As the cylinder block and pistons start to rotate, since the exposed ends of the pistons are constrained to follow the surface of the swashed plate, the pistons are driven to reciprocate axially and then a hydraulic power is produced. In the present study, a numerical simulation which has three dimensional full model of the axial piston pump was carried out using a commercial CFD code (Ansys CFX 14.5). In order to take into consideration motion of compression and extension by the reciprocating pistons, the moving boundary conditions were applied as a function of the rotation angle to that region. In addition, this pump using hydraulic oil as working fluid is intentionally designed as a small amount of oil leaks out in order to lubricate moving parts. Since leakage could directly affect the pump efficiency, evaluation of effect of oil-leakage is very important. In order to predict the effect of the oil leakage on the pump efficiency, we considered the leakage between piston-shoe and swash-plate by modeling cylindrical shaped-feature at the end of the cylinder. In order to validate the numerical method used in this study, the numerical results of the flow rate at the discharge port are compared with the experimental data, and good agreement between them was shown. Using the validated numerical method, the effect of the discharge pressure was also investigated. The result of the present study can be useful information of small axial piston pump used in many different manufacturing industries. Acknowledgement: This research was financially supported by the “Next-generation construction machinery component specialization complex development program” through the Ministry of Trade, Industry and Energy (MOTIE) and Korea Institute for Advancement of Technology (KIAT).

Keywords: axial piston pump, CFD, discharge pressure, hydraulic system, moving boundary condition, oil leaks

Procedia PDF Downloads 225
60 Chemical-Induced Mutation for Development of Resistance in Banana cv. Nanjangud rasabale

Authors: H. Kishor, G. Prabhuling, D. S. Ambika, D. P. Prakash

Abstract:

The chemical mutagens have become important tool to enhance agronomic traits of banana crop. It is being used to develop fusarium resistance lines in various susceptible banana cultivars. There are several mutagens like EMS and NaN3 available for banana crop improvement and each mutagen has its own important role as positive or negative effects on growth and development of banana plants. Explants from shoot tip culture were treated with various EMS (0.30, 0.60, 0.90 and 0.12%) and NaN3 (0.01, 0.02 and 0.03%) concentrations. The putative mutants obtained after in vitro rooting were subjected for artificial inoculation of Fusarium oxysporum f.sp. cubense. Screening putative mutants resistance to Panama disease was carried out by using syringe method of inoculation. It was observed that, EMS treated mutants were more susceptible compared to NaN3 treatment. Among the NaN3 doses 0.01% found to produce 3 resistant lines during preliminary screening under greenhouse conditions.

Keywords: Nanjangud rasabale, EMS, NaN3, putative mutants

Procedia PDF Downloads 159
59 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 323
58 Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Authors: Kyunghee Oh, Dooho Choi

Abstract:

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.

Keywords: DPA, distributed computing, parallelized processing, side channel analysis

Procedia PDF Downloads 395
57 Non-Destructive Visual-Statistical Approach to Detect Leaks in Water Mains

Authors: Alaa Al Hawari, Mohammad Khader, Tarek Zayed, Osama Moselhi

Abstract:

In this paper, an effective non-destructive, non-invasive approach for leak detection was proposed. The process relies on analyzing thermal images collected by an IR viewer device that captures thermo-grams. In this study a statistical analysis of the collected thermal images of the ground surface along the expected leak location followed by a visual inspection of the thermo-grams was performed in order to locate the leak. In order to verify the applicability of the proposed approach the predicted leak location from the developed approach was compared with the real leak location. The results showed that the expected leak location was successfully identified with an accuracy of more than 95%.

Keywords: thermography, leakage, water pipelines, thermograms

Procedia PDF Downloads 321
56 Identifying the Needs for Renewal of Urban Water Infrastructure Systems: Analysis of Material, Age, Types and Areas: Case Study of Linköping in Sweden

Authors: Eman Hegazy, Stefan Anderberg, Joakim Krook

Abstract:

Urban water infrastructure is crucial for efficient and reliable water supply in growing cities. With the growth of cities, the need for maintenance and renewal of these systems increases but often goes unfulfilled due to a variety of reasons, such as limited funding, political priorities, or lack of public awareness. Neglecting the renewal needs of these systems can lead to frequent malfunctions and reduced quality and reliability of water supply, as well as increased costs and health and environmental hazards. It is important for cities to prioritize investment in water infrastructure and develop long-term plans to address renewal needs. Drawing general conclusions about the rate of renewal of urban water infrastructure systems at an international or national level can be challenging due to the influence of local management decisions. In many countries, the responsibility for water infrastructure management lies with the municipal authorities, who are responsible for making decisions about the allocation of resources for repair, maintenance, and renewal. These decisions can vary widely based on factors such as local finances, political priorities, and public perception of the importance of water infrastructure. As a result, it is difficult to make generalizations about the rate of renewal across different countries or regions. In Sweden, the situation is not different, and the information from Svenskt Vatten indicates that the rate of renewal varies across municipalities and can be insufficient, leading to a buildup of maintenance and renewal needs. This study aims to examine the adequacy of the rate of renewal of urban water infrastructure in Linköping case city in Sweden. Using a case study framework, the study will assess the current status of the urban water system and the need for renewal. The study will also consider the role of factors such as proper identification processes, limited funding, competing for political priorities, and local management decisions in contributing to insufficient renewal. The study investigates the following questions: (1) What is the current status of water and sewerage networks in terms of length, age distribution, and material composition, estimated total water leakage in the network per year, damages, leaks, and outages occur per year, both overall and by district? (2) What are the main causes of these damages, leaks, and interruptions, and how are they related to lack of maintenance and renewal? (3) What is the current status of renewal work for the water and sewerage networks, including the renewal rate and changes over time, recent renewal material composition, and the budget allocation for renewal and emergency repairs? (4) What factors influence the need for renewal and what conditions should be considered in the assessment? The findings of the study provide insights into the challenges facing urban water infrastructure and identify strategies for improving the rate of renewal to ensure a reliable and sustainable water supply.

Keywords: case study, infrastructure, management, renewal need, Sweden

Procedia PDF Downloads 68
55 Electromagnetic Interference Shielding Effectiveness of a Corrugated Rectangular Waveguide for a Microwave Conveyor-Belt Drier

Authors: Sang-Hyeon Bae, Sung-Yeon Kim, Min-Gyo Jeong, Ji-Hong Kim, Wang-Sang Lee

Abstract:

Traditional heating methods such as electric ovens or steam heating are slow and not very efficient. For continuously heating the objects, a microwave conveyor-belt drier is widely used in the industrial microwave heating systems. However, there is a problem in which electromagnetic wave leaks toward outside of the heating cavity through the insertion opening. To achieve the prevention of the leakage of microwaves and improved heating characteristics, the corrugated rectangular waveguide at the entrance and exit openings of a microwave conveyor-belt drier is proposed and its electromagnetic interference (EMI) shielding effectiveness is analyzed and verified. The corrugated waveguides in the proposed microwave heating system achieve at least 20 dB shielding effectiveness while ensuring a sufficient height of the openings.

Keywords: corrugated, electromagnetic wave, microwave conveyor-belt drier, rectangular waveguide, shielding effectiveness

Procedia PDF Downloads 489
54 The Technique of Mobilization of the Colon for Pull-Through Procedure in Hirschsprung's Disease

Authors: Medet K. Khamitov, Marat M. Ospanov, Vasiliy M. Lozovoy, Zhenis N. Sakuov, Dastan Z. Rustemov

Abstract:

With a high rectosigmoid transitional zone in children with Hirschsprung’s disease, the upper rectal, sigmoid, left colon arteries are ligated during the pull-through of the descending part of the colon. As a result, the inferior mesenteric artery ceases to participate in the blood supply to the descending part of the colon. As a result, the reduced colon is supplied with blood only by the middle colon artery, which originates from the superior mesenteric artery. Insufficiency of blood supply to the reduced colon is the cause of the development of chronic hypoxia of the intestinal wall or necrosis of the reduced descending colon. Some surgeons prefer to preserve the left colon artery. However, it is possible to stretch the mesentery, which can lead to bowel retraction to anastomotic leaks and stenosis. Chronic hypoxia of the reduced colon, in turn, is the cause of acquired (secondary) aganglionosis. The highest frequency of anastomotic leaks is observed in children older than five years. The purpose is to reduce the risk of complications in the pull-through procedure of the descending part of the colon in patients with Hirschsprung’s disease by ensuring its sufficient mobility and maintaining blood supply to the lower mesenteric artery. Methodology and events. Two children aged 5 and 7 years with Hirschsprung’s disease were operated under the conditions of the hospital in Nur-Sultan. The diagnosis was made using x-ray contrast enema and histological examination. Operational technique. After revision of the left part of the colon and assessment of the architectonics of its blood vessels, parietal mobilization of the affected sigmoid and rectum was performed on laparotomy access, while maintaining the arterial and venous terminal arcades of the sigmoid vessels. Then, the descending branch of the left colon artery was crossed (if there is an insufficient length of the reduced intestine, the left colonic artery itself may also be crossed). This manipulation provides additional mobility of the pull-through descending part of the colon. The resulting "windows" in the mesentery of the reduced intestine were sutured to prevent the development of an internal hernia. Formed a full-blooded, sufficiently long transplant from the transverse loops of the splenic angle and the descending parts of the colon with blood supply from the upper and lower mesenteric artery, freely, without tension, is reduced to the rectal zone with the coloanal anastomosis 1.5 cm above the dentate line. Results. The postoperative period was uneventful. Patients were discharged on the 7th day. The observation was carried out for six months. In no case, there was a bowel retraction, anastomotic leak, anastomotic stenosis, or other complications. Conclusion. The presented technique of mobilization of the colon for the pull-through procedure in a high transitional rectosigmoid zone of Hirschsprung’s disease allows to maintain normal blood supply to the distal part of the colon and to avoid the tension of the colon. The technique allows reducing the risk of anastomotic leak, bowel necrosis, chronic ischemia, to exclude colon retraction and anastomotic stenosis.

Keywords: blood supply, children, colon mobilization, Hirschsprung's disease, pull-through

Procedia PDF Downloads 122
53 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 53
52 Cooperative Jamming for Implantable Medical Device Security

Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed

Abstract:

Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.

Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing

Procedia PDF Downloads 72
51 Automation Test Method and HILS Environment Configuration for Hydrogen Storage System Management Unit Verification

Authors: Jaejeogn Kim, Jeongmin Hong, Jungin Lee

Abstract:

The Hydrogen Storage System Management Unit (HMU) is a controller that manages hydrogen charging and storage. It detects hydrogen leaks and tank pressure and temperature, calculates the charging concentration and remaining amount, and controls the opening and closing of the hydrogen tank valve. Since this role is an important part of the vehicle behavior and stability of Fuel Cell Electric Vehicles (FCEV), verifying the HMU controller is an essential part. To perform verification under various conditions, it is necessary to increase time efficiency based on an automated verification environment and increase the reliability of the controller by applying numerous test cases. To this end, we introduce the HMU controller automation verification method by applying the HILS environment and an automation test program with the ASAM XIL standard.

Keywords: HILS, ASAM, fuel cell electric vehicle, automation test, hydrogen storage system

Procedia PDF Downloads 24
50 A Predictive MOC Solver for Water Hammer Waves Distribution in Network

Authors: A. Bayle, F. Plouraboué

Abstract:

Water Distribution Network (WDN) still suffers from a lack of knowledge about fast pressure transient events prediction, although the latter may considerably impact their durability. Accidental or planned operating activities indeed give rise to complex pressure interactions and may drastically modified the local pressure value generating leaks and, in rare cases, pipe’s break. In this context, a numerical predictive analysis is conducted to prevent such event and optimize network management. A couple of Python/FORTRAN 90, home-made software, has been developed using Method Of Characteristic (MOC) solving for water-hammer equations. The solver is validated by direct comparison with theoretical and experimental measurement in simple configurations whilst afterward extended to network analysis. The algorithm's most costly steps are designed for parallel computation. A various set of boundary conditions and energetic losses models are considered for the network simulations. The results are analyzed in both real and frequencies domain and provide crucial information on the pressure distribution behavior within the network.

Keywords: energetic losses models, method of characteristic, numerical predictive analysis, water distribution network, water hammer

Procedia PDF Downloads 191
49 Microbial Corrosion on Oil and Gas Facilities: A Case Study of Oil and Gas Facilities in the Niger-Delta

Authors: Frederick Otite Ighovojah

Abstract:

Corrosion in the oil and gas industries is one of the most common causes of failure. Such failure includes leaks in above-ground storage tanks (AGST). The involvement of microorganisms in the corrosion process in AGST systems is often ignored, and this outlines the need to investigate the effect of microbial corrosion in oil and gas facilities. This study's methodology comprised gathering generated water samples from a nearby AGST oil facility that was operating, which were then equally divided into two batch reactors, 1 and 2. Each batch reactor was filled with five prepared X60 coupons using sterilized forceps. To provide nutrients for the microorganisms in batch reactor 1 during the test period, 2g of NPK 15- 15-15 fertilizer was added on a weekly basis. To kill the microorganisms and significantly lower their concentration in the generated water, 5ml of dissolved ozone (a biocide) with a 0.5ppm concentration was added to batch reactor 2. The weight loss measurement (WLM) was used to evaluate for corrosion. Coupons were removed from each batch reactor, and weight loss was measured at every interval of 336 hrs for 2016 hrs. The overall results obtained indicated that coupons from the batch 1 reactor showed a higher corrosion rate and higher mass loss, and this was due to the metabolic production of an aggressive compound in the medium.

Keywords: AGST, microbial corrosion, reactor, X60 steel

Procedia PDF Downloads 52
48 Imputing Missing Data in Electronic Health Records: A Comparison of Linear and Non-Linear Imputation Models

Authors: Alireza Vafaei Sadr, Vida Abedi, Jiang Li, Ramin Zand

Abstract:

Missing data is a common challenge in medical research and can lead to biased or incomplete results. When the data bias leaks into models, it further exacerbates health disparities; biased algorithms can lead to misclassification and reduced resource allocation and monitoring as part of prevention strategies for certain minorities and vulnerable segments of patient populations, which in turn further reduce data footprint from the same population – thus, a vicious cycle. This study compares the performance of six imputation techniques grouped into Linear and Non-Linear models on two different realworld electronic health records (EHRs) datasets, representing 17864 patient records. The mean absolute percentage error (MAPE) and root mean squared error (RMSE) are used as performance metrics, and the results show that the Linear models outperformed the Non-Linear models in terms of both metrics. These results suggest that sometimes Linear models might be an optimal choice for imputation in laboratory variables in terms of imputation efficiency and uncertainty of predicted values.

Keywords: EHR, machine learning, imputation, laboratory variables, algorithmic bias

Procedia PDF Downloads 51
47 Support for and Participation in 'Spontaneous' Mass Protest in Iceland: The Moderating Effects of Biographical Availability, Critical Mass, and Social Embeddedness

Authors: Jon Gunnar Bernburg

Abstract:

The present study addresses a topic that is fundamental to social movement theory, namely, the contingent link between movement support and movement participation. Usually, only a small fraction of those who agree with the cause of a social movement is mobilized into participating in it (a pattern sometimes referred to as 'the collective action problem'). However, historical moments sometimes emerge when many supporters become mobilized to participate in the movement, greatly enhancing the chance of movement success. By studying a case in point, this paper addresses the limited work on how support and participation are related at such critical moments. Specifically, the paper examines the association between supporting and participating in a huge 'pro-democracy' protest in Iceland in April 2016, in the wake of the global Panama Papers scandal. Organized via social media by only a handful of activists, but supported by a majority of Icelanders, the protest attracted about a fourth of the urban population, leading to a snap election and government change. Surveying Iceland’s urban population, this paper tests hypotheses about the processes mobilizing supporters to participate in the protest. The findings reveal how variables derived from the theories of biographical availability (males vs. females, working class vs. professionals), critical mass (expectations, prior protest success), and social embeddedness (close ties with protesters) moderate the association between protest support and participation. The study helps to account for one of the largest protests in Iceland’s history while contributing to the theory about how historical contexts shape the behavior of movement supporters.

Keywords: Iceland, crisis, protest support vs. participation, theories of mass mobilization

Procedia PDF Downloads 209
46 Aspects Regarding the Structural Behaviour of Autonomous Underwater Vehicle for Emergency Response

Authors: Lucian Stefanita Grigore, Damian Gorgoteanu, Cristian Molder, Amado Stefan, Daniel Constantin

Abstract:

The purpose of this article is to present an analytical-numerical study on the structural behavior of a sunken autonomous underwater vehicle (AUV) for emergency intervention. The need for such a study was generated by the key objective of the ERL-Emergency project. The project aims to develop a system of collaborative robots for emergency response. The system consists of two robots: unmanned ground vehicles (UGV) on tracks and the second is an AUV. The system of collaborative robots, AUV and UGV, will be used to perform missions of monitoring, intervention, and rescue. The main mission of the AUV is to dive into the maritime space of an industrial port to detect possible leaks in a pipeline transporting petroleum products. Another mission is to close and open the valves with which the pipes are provided. Finally, you will need to be able to lift a manikin to the surface, which you can take to land. Numerical analysis was performed by the finite element method (FEM). The conditions for immersing the AUV at 100 m depth were simulated, and the calculations for different fluid flow rates were repeated. From a structural point of view, the stiffening areas and the enclosures in which the command-and-control elements and the accumulators are located have been especially analyzed. The conclusion of this research is that the AUV meets very well the established requirements.

Keywords: analytical-numerical, emergency, FEM, robotics, underwater

Procedia PDF Downloads 125
45 Technological Measures to Reduce the Environmental Impact of Swimming Pools

Authors: Fátima Farinha, Miguel J. Oliveira, Gina Matias, Armando Inverno, Jânio Monteiro, Cristiano Cabrita

Abstract:

In the last decades, the construction of swimming pools for recreational activities has grown exponentially in southern Europe. Swimming pools are used both for private use in villas and for collective use in hotels or condominiums. However, they have a high environmental impact, mainly in terms of water and energy consumption, being used for a short period of time, depending significantly on favorable atmospheric conditions. Contrary to what would be expected, not enough research has been conducted to reduce the negative impact of this equipment. In this context, this work proposes and analyses technological measures to reduce the environmental impacts of swimming pools, such as thermal insulation of the tank, water balance in order to detect leaks and optimize the backwash process, integration of renewable energy generation, and a smart control system that meets the requirements of the user. The work was developed within the scope of the Ecopool+++ project, which aims to create innovative heated pools with reduced thermal losses and integration of SMART energy plus water management systems. The project is in the final phase of its development, with very encouraging results.

Keywords: swimming pools, sustainability, thermal losses, water management system

Procedia PDF Downloads 68
44 Process Safety Evaluation of a Nuclear Power Plant through Virtual Process Hazard Analysis Using Hazard and Operability Technique

Authors: Elysa V. Largo, Lormaine Anne A. Branzuela, Julie Marisol D. Pagalilauan, Neil C. Concibido, Monet Concepcion M. Detras

Abstract:

The energy demand in the country is increasing; thus, nuclear energy is recently mandated to add to the energy mix. The Philippines has the Bataan Nuclear Power Plant (BNPP), which can be a source of nuclear energy; however, it has not been operated since the completion of its construction. Thus, evaluating the safety of BNPP is vital. This study explored the possible deviations that may occur in the operation of a nuclear power plant with a pressurized water reactor, which is similar to BNPP, through a virtual process hazard analysis (PHA) using the hazard and operability (HAZOP) technique. Temperature, pressure, and flow were used as parameters. A total of 86 causes of various deviations were identified, wherein the primary system and line from reactor coolant pump to reactor vessel are the most critical system and node, respectively. A total of 348 scenarios were determined. The critical events are radioactive leaks due to nuclear meltdown and sump overflow that could lead to multiple worker fatalities, one or more public fatalities, and environmental remediation. There were existing safeguards identified; however, further recommendations were provided to have additional and supplemental barriers to reduce the risk.

Keywords: PSM, PHA, HAZOP, nuclear power plant

Procedia PDF Downloads 116
43 A Smart Monitoring System for Preventing Gas Risks in Indoor

Authors: Gyoutae Park, Geunjun Lyu, Yeonjae Lee, Jaheon Gu, Sanguk Ahn, Hiesik Kim

Abstract:

In this paper, we propose a system for preventing gas risks through the use of wireless communication modules and intelligent gas safety appliances. Our system configuration consists of an automatic extinguishing system, detectors, a wall-pad, and a microcomputer controlled micom gas meter to monitor gas flow and pressure as well as the occurrence of earthquakes. The automatic fire extinguishing system checks for both combustible gaseous leaks and monitors the environmental temperature, while the detector array measures smoke and CO gas concentrations. Depending on detected conditions, the micom gas meter cuts off an inner valve and generates a warning, the automatic fire-extinguishing system cuts off an external valve and sprays extinguishing materials, or the sensors generate signals and take further action when smoke or CO are detected. Information on intelligent measures taken by the gas safety appliances and sensors are transmitted to the wall-pad, which in turn relays this as real time data to a server that can be monitored via an external network (BcN) connection to a web or mobile application for the management of gas safety. To validate this smart-home gas management system, we field-tested its suitability for use in Korean apartments under several scenarios.

Keywords: gas sensor, leak, gas safety, gas meter, gas risk, wireless communication

Procedia PDF Downloads 396