scholarly journals Seismic Vulnerability Due to Construction Defects

2021 ◽  
Vol 1203 (3) ◽  
pp. 032125
Author(s):  
Juan Diego Ordoñez Maldonado ◽  
Juan Sebastián Maldonado Noboa

Abstract In Ecuador, informal construction is a recurrent problem, especially in low-span constructions, as well as in medium-size constructions, in which there is no strict control during their construction and design. This leads to deficient constructions, which diminishes the resilience of the elements, even though they are designed by a professional with experience in structural design, who follows at least all the guidelines of the current standards, and uses the appropriate tools for their conception and design. This generates a false sense of security in the occupants of the building. Failures do not usually occur in the short term, no matter how pitiful the construction method was. In case of anomalies, it is considered something futile, easy to cover up, which only has aesthetic implications. This causes even the most experienced of technicians to trust, making crass mistakes that can lead to the collapse of the structure. Given these problems, the degree of vulnerability due to defects in the building was evaluated.

Author(s):  
Ragan Glover-Rijkse ◽  
Melissa Stone ◽  
Megan Alyssa Fletcher ◽  
Gayas Eapen

This panel analyzes the use of mobile apps to mediate experiences of precarity—that is threats to life and livelihood itself. While we acknowledge that mobile apps offer opportunities to form networks of resistance, many apps also pose substantial risks to users. To begin to articulate these risks, the presentations in this panel consider case studies of several apps targeted at mediating experiences of precarity. First, we offer an analysis of “safety-oriented mobility” apps, which help users to avoid location-specific instances of harassment and violence. This presentation argues that that these apps can reinforce harmful homogeneity in spaces, enable surveillance of marginalized populations, and provide a false sense of security to users. Following this, we examine apps that have responded to intimate partner violence. In this presentation, we suggest that these mobile apps do very little to protect their users from harm and, instead, provide a short-term distraction from underlying issues. Finally, we look to LBGTQ+ apps aimed at finding romantic partners or coordinating sexual encounters through location sharing. In this presentation, we suggest that these apps pose risks of unwanted exposure and discrimination, particularly due to an uptick in data breaches and leaks. We conclude this panel by offering a collective statement that argues for systemic intervention addressing the inequalities within society but, until that time comes, we argue for measures that secure these mobile apps (and the data contained therein) and protect their users.


Author(s):  
Laurie Essig

In Love, Inc., Laurie Essig argues that love is not all we need. As the future became less secure—with global climate change and the transfer of wealth to the few—Americans became more romantic. Romance is not just what lovers do but also what lovers learn through ideology. As an ideology, romance allowed us to privatize our futures, to imagine ourselves as safe and secure tomorrow if only we could find our "one true love" today. But the fairy dust of romance blinded us to what we really need: global movements and structural changes. By traveling through dating apps and spectacular engagements, white weddings and Disney honeymoons, Essig shows us how romance was sold to us and why we bought it. Love, Inc. seduced so many of us into a false sense of security, but it also, paradoxically, gives us hope in hopeless times. This book explores the struggle between our inner cynics and our inner romantic.


2019 ◽  
Vol 3 (Special Issue on First SACEE'19) ◽  
pp. 199-206
Author(s):  
Bertha Olmos ◽  
José Jara ◽  
José Luis Fabián

This paper investigates the effects of the nonlinear behaviour of isolation pads on the seismic capacity of bridges to identify the parameters of base isolation systems that can be used to improve seismic performance of bridges. A parametric study was conducted by designing a set of bridges for three different soil types and varying the number of spans, span lengths, and pier heights. The seismic responses (acceleration, displacement and pier seismic forces) were evaluated for two structural models. The first model corresponded to the bridges supported on elastomeric bearings with linear elastic behaviour and the second model simulated a base isolated bridge that accounts for the nonlinear behaviour of the system. The seismic demand was represented with a group of twelve real accelerograms recorded on the subduction zone on the Pacific Coast of Mexico. The nonlinear responses under different damage scenarios for the bridges included in the presented study were estimated. These results allow determining the seismic capacity of the bridges with and without base isolation. Results show clearly the importance of considering the nonlinear behaviour on the seismic performance of bridges and the influence of base isolation on the seismic vulnerability of medium size bridges.


Author(s):  
Katarzyna Ledwoch ◽  
Maddalena Magoga ◽  
Dulcie Williams ◽  
Stefania Fabbri ◽  
James Walsh ◽  
...  

Abstract Objective: The abundance and prevalence of dry-surface biofilms (DSBs) in hospitals constitute an emerging problem, yet studies rarely report the cleaning and disinfection efficacy against DSBs. Here, the combined impact of treatments on viability, transferability, and recovery of bacteria from DSBs has been investigated for the first time. Methods: Staphylococcus aureus DSBs were produced in alternating 48-hour wet–dry cycles for 12 days on AISI 430 stainless steel discs. The efficacy of 11 commercially available disinfectants, 4 detergents, and 2 contactless interventions were tested using a modified standardized product test. Reduction in viability, direct transferability, cross transmission (via glove intermediate), and DSB recovery after treatment were measured. Results: Of 11 disinfectants, 9 were effective in killing and removing bacteria from S. aureus DSBs with >4 log10 reduction. Only 2 disinfectants, sodium dichloroisocyanurate 1,000 ppm and peracetic acid 3,500 ppm, were able to lower both direct and cross transmission of bacteria (<2 compression contacts positive for bacterial growth). Of 11 disinfectants, 8 could not prevent DSB recovery for >2 days. Treatments not involving mechanical action (vaporized hydrogen peroxide and cold atmospheric plasma) were ineffective, producing <1 log10 reduction in viability, DSB regrowth within 1 day, and 100% transferability of DSB after treatment. Conclusions: Reduction in bacterial viability alone does not determine product performance against biofilm and might give a false sense of security to consumers, manufacturers and regulators. The ability to prevent bacterial transfer and biofilm recovery after treatment requires a better understanding of the effectiveness of biocidal products.


2008 ◽  
Vol 183 (7) ◽  
pp. 1317-1317
Author(s):  
Mike Rossner

Author(s):  
David J Marlin ◽  
Kirstie Pickles ◽  
Roberta Ferro de Godoy ◽  
Jane M Williams

A recent survey by the authors of the present study indicated that headcollar (halter, USA) related incidents resulting in horse injuries may be common. From the survey, 134 incidents involving horse fractures and 167 fatalities were reported. Headcollar design and materials vary markedly from traditional leather to “safety” headcollars and safety devices. Despite their almost universal use, there has been minimal study as to how these items function or specifications for performance. The aim of the present study was to select a range of commercially available standard headcollars and a number of safety devices, to test the force required to break or release them. Safety devices selected included baler twine, which is widely used by equestrians to attach a horse by a headcollar to a lead rope and in turn to a fixture. This system practice is perceived to increase safety. Devices were subjected to increasing load in the poll to lead-rope attachment axis (i.e. to simulate a horse pulling backward) using a custom-made steel rig incorporating an electric 1000 kg winch. The force was increased incrementally until either the headcollar or device opened or failed. The lowest mean opening force of 357 ± 50 N was for a safety headcollar, which is equivalent to a load of approximately 36 kg. The highest breaking force was 5798 ± 265 N for one of the eight different webbing headcollars tested. Breaking for safety devices ranged from 354 ± 121 N for “fine” baler twine to 1348 ± 307 N for a “heavy duty” baler twine. Variability in opening force was lowest in two of the webbing headcollars (CV < 5%) despite these having very high breaking points (>3500 N). The greatest variability was found for fine baler twine (CV = 34%) and one of the commercial safety devices (CV = 38%). The range of opening forces and variability in opening forces for standard headcollars, safety headcollars and safety devices is a cause for concern and may give horse owners/handlers a false sense of security with regards to safety, and actually predispose horses and handlers to an increased risk of injury.


1974 ◽  
Vol 12 (18) ◽  
pp. 69-72

The practice of performing regular blood counts during therapy with drugs known to cause dyscrasias has varied over the years. For a time they were thought essential during treatment with drugs like thiouracil and phenylbutazone, but they were abandoned when it was realised that blood changes can develop so quickly that a normal count might give only a false sense of security. It seemed better to take a preliminary count to exclude prior abnormality and to warn patients to stop the drug and report at once if they developed symptoms such as sore throat or mouth ulceration, so that a count could be done and the treatment changed if necessary. However, this approach is not satisfactory when either gold or cytotoxic drugs are used because potentially fatal irreversible aplasia may occur before symptoms are noticed. Recent advances in knowledge of the mechanisms of drug-induced blood dyscrasias1 allow a more rational approach to their detection and avoidance. These dyscrasias may be divided into five types.


2015 ◽  
Vol 5 (2) ◽  
pp. 17 ◽  
Author(s):  
Servaas Van der Berg ◽  
Debra Shepherd

<p>This study analyses information and feedback from matriculation level continuous assessment in the South African education system. Continuous assessment (CASS) at the time carried a 25% weight in the final matriculation (Grade 12) mark, and it provides feedback that affects examination preparation and effort. Weak assessment in schools sends wrong signals to students that may have important consequences for the way they approach the final examination. Moreover, similarly wrong signals earlier in their school careers may also have affected their subject choice and career planning.<br />This study compares CASS data to the externally assessed matric exam marks for a number of subjects. There are two signalling dimensions to inaccurate assessments: (i) Inflated CASS marks can give students a false sense of security and lead to diminished exam effort. (ii) A weak correlation between CASS and the exam marks could mean poor signalling in another dimension: Relatively good students may get relatively low CASS marks. Such low correlations indicate poor assessment reliability, as the examination and continuous assessment should both be testing mastery of the same national curriculum. The paper analyses the extent of each of these dimensions of weak signalling in South African schools and draws disturbing conclusions for a large part of the school system.</p>


2021 ◽  
Vol 23 (06) ◽  
pp. 868-873
Author(s):  
Sonali Karki ◽  
◽  
Dr. Kiran V ◽  

The business industry is evolving. Enterprises have begun a digital transformation path, adopting innovative technologies that enable them to move quickly and change how they cooperate, lowering costs and improving productivity. However, as a result of these technologies, the conventional perimeter has evaporated, and identification has become the new line of defense. New security concerns necessitate modern security measures. Passwords are no longer appropriate for authenticating privileged access to mission-critical assets. Passwords are notorious for being insecure, causing weariness, and giving the user a false sense of security. Enterprises must use password-less solutions, which is where SSH key-based authentication comes in. The Python language’s numerous applications are the consequence of a mixture of traits that offer this language advantage over others. Some of the advantages of programming with Python are as follows: To enable easy communication between Python and other systems, Python Package Index (PyPI) is used. The package consists of a variety of modules developed by third-party developers. It also has the benefit of being an Open Source and Community Development language, as well as having substantial Support Libraries. There are multiple SSH libraries in python and this paper focuses on each of their pros and cons as well as the time it has taken for each of them to perform.


Sign in / Sign up

Export Citation Format

Share Document