scholarly journals P-EGS19 Complete oesophageal transection during thyroidectomy; Successful management of anastomotic leak using endoluminal vacuum therapy (EVT) following failed primary repair

2021 ◽  
Vol 108 (Supplement_9) ◽  
Author(s):  
Zeeshan Afzal ◽  
Stavros Gourgiotis ◽  
Richard Hardwick ◽  
Peter Safranek ◽  
Vijayendran Sujendran ◽  
...  

Abstract Background Perforation of the cervical oesophagus is an extremely rare but recognised complication of thyroidectomy. As with all oesophageal perforations management depends on timing of diagnosis in relation to the timing of injury, the size of the oesophageal wall defect, extent of extraluminal contamination, and how unwell the patient is with respect to sepsis. We report a case of complete transection of the cervical oesophagus during total thyroidectomy and its subsequent management. Methods A previously well 32-year-old female had a complete cervical oesophageal transection during total thyroidectomy and neck dissection for papillary carcinoma of thyroid. This was recognised by her ENT surgeon who repaired the oesophagus primarily. Subsequently, she developed sepsis with cellulitis of her anterior chest wall. Cross-sectional imaging demonstrated a leak at the site of the cervical oesophageal repair. Gastroscopy confirmed a 50% dehiscence of the oesophageal anastomosis. Control and management of her oesophageal leak was achieved with EVT delivered using an ad-hoc endoluminal vacuum device (EVD) constructed from open cell foam sutured around the distal end of a nasogastric tube. Results The patient was managed in the intensive care unit (ICU) with appropriate organ support and antimicrobial cover. A surgical jejunostomy was placed to facilitate enteral feeding. EVT was delivered using the ad-hoc EVD which was placed endoscopically and situated intraluminally across the anastomotic leak site. Continuous negative pressure (125 mmHg) was applied. Six EVD changes were required to heal the leak. Her total length of stay was 41 days, of which 38 days were in ICU. There were no periprocedural complications related to using the EVD or EVT, although the patient subsequently developed an oesophageal stricture which required endoscopic dilatation. Conclusions Accidental complete transection of the cervical oesophagus is extremely rare. This case highlights the importance of a multidisciplinary team approach for managing such cases. EVT is an emerging treatment option for upper gastrointestinal (UGI) leaks and is reported to be safe and effective for leaks from a wide range of causes throughout the UGI tract.  Successful resolution of the oesophageal leak in this unusual case demonstrates the utility of EVT in difficult clinical situations which may otherwise pose a formidable management challenge using traditional treatment strategies.

2021 ◽  
Vol 108 (Supplement_9) ◽  
Author(s):  
Zeeshan Afzal ◽  
Stavros Gourgiotis ◽  
Richard Hardwick ◽  
Peter Safranek ◽  
Vijayendran Sujendran ◽  
...  

Abstract Background Endoluminal vacuum therapy (EVT) is an emerging treatment strategy for UGI leaks. When compared to traditional treatments strategies EVT is reported to reduce morbidity and mortality, especially in patients with delayed presentation and established sepsis. We report the outcomes for patients with UGI leaks and perforations treated with EVT using an ad-hoc endoluminal vacuum device (EVD) in a tertiary UK hospital over a 10-year period. Methods Sixty-seven patients with UGI leaks from disparate causes were treated with EVT between April 2011 and July 2021. The ad-hoc EVD was constructed using a piece of open cell foam sutured around the distal end of a nasogastric tube, and placed endoscopically either through the perforation and into the extra-luminal leak cavity OR intraluminally depending on the morphology of the leak cavity. Continuous negative pressure (125mmHg) was applied. Endoscopic re-evaluation of the leak cavity with change of EVD was performed every 48-120 hours depending on the patients clinical condition. Information related to treatment and outcome was recorded prospectively. Results Patients had a median age of 66 years (range 23-92), and median Apache II score of 21 (range 4-36) at presentation. Fifty-two leaks were oesophageal (78%), 12 gastric (18%), 2 duodenal (3%), and 1 pharangeal (1%). The leak cause was anastomotic in 26 (39%), iatrogenic in 20 (30%), spontaneous in 19 (28%), and traumatic in 2 (3%). The median number of EVD changes required to heal the leak was 6 (range 1-27), and median length of hospital stay was 42 days (range 1-182). Successful resolution of the leak was achieved in 59 patients (88%). Eight (12%) patients died during treatment. There were no complications related to insertion of the EVD. Conclusions EVT is an effective treatment for UGI leaks which can be delivered safely in a tertiary oesophagogastric centre, and used to treat a wide range of leak causes in critically unwell patients. Further studies are required to develop a standardized procedure to improve the ease with which EVT can be delivered. This will enable broader adoption of EVT for this group of patients.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 10
Author(s):  
Niluka Amarasinghe ◽  
Xavier Boyen ◽  
Matthew McKague

The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes. Bitcoin, despite being considered as the most widespread among all, is claimed to have significant lapses in relation to its anonymity. Unfortunately, studies have shown that many cryptocurrency transactions can be traced back to their corresponding participants through the analysis of publicly available data, to which the cryptographic community has responded by proposing new constructions with improved anonymity claims. Nevertheless, the absence of a common metric for evaluating the level of anonymity achieved by these schemes has led to numerous disparate ad hoc anonymity definitions, making comparisons difficult. The multitude of these notions also hints at the surprising complexity of the overall anonymity landscape. In this study, we introduce such a common framework to evaluate the nature and extent of anonymity in (crypto) currencies and distributed transaction systems, thereby enabling one to make meaningful comparisons irrespective of their implementation. Accordingly, our work lays the foundation for formalizing security models and terminology across a wide range of anonymity notions referenced in the literature, while showing how “anonymity” itself is a surprisingly nuanced concept, as opposed to existing claims that are drawn upon at a higher level, thus missing out on the elemental factors underpinning anonymity.


1970 ◽  
Vol 24 (3) ◽  
pp. 479-502 ◽  
Author(s):  
R. L. Friedheim ◽  
J. B. Kadane

International arrangements for the uses of the ocean have been the subject of long debate within the United Nations since a speech made by Ambassador Arvid Pardo of Malta before the General Assembly in 1967. Issues in question include the method of delimiting the outer edge of the legal continental shelf; the spectrum of ocean arms control possibilities; proposals to create a declaration of principles governing the exploration for, and the exploitation of, seabed mineral resources with the promise that exploitation take place only if it “benefits mankind as a whole,” especially the developing states; and consideration of schemes to create international machinery to regulate, license, or own the resources of the seabed and subsoil. The discussions and debates began in the First (Political and Security) Committee of the 22nd General Assembly and proceeded through an ad hoc committee to the 23rd and 24th assembly plenary sessions. The creation of a permanent committee on the seabed as a part of the General Assembly's machinery attests to the importance members of the United Nations attribute to ocean problems. Having established the committee, they will be faced soon with the necessity of reaching decisions. The 24th General Assembly, for example, passed a resolution requesting the Secretary-General to ascertain members' attitudes on the convening of a new international conference to deal with a wide range of law of the sea problems.


Author(s):  
Dr. B. Balakumar

Abstract: Recent advances in software, hardware communication technologies are enabling the design and implementation of whole range of different type of network that are various environments. Vehicular Ad-Hoc network is received a lot of interest in the couple years in the one of the networks. A Vehicular Ad-Hoc Network or VANET is a technology that uses moving cars as nodes in a network to create a mobile network. In VANET improving the driving comfort and safety information message are broadcasted regularly. VANET turns every participating car approximately 100 to 300 meters to connect and turn create network with a wide range. In enable vehicle to communicate which other with roadside units (RSUs). Vehicular network are special types of VANET that supported infrastructure based real time traffic management, including internet access, video streaming and content distribution. Privacy - preserving data Acquisition and forwarding scheme by introducing the novel cryptographic algorithm for key generation and powerful encryption. This paper introduces system that takes Advantages of the RSUs that are the connected to the internet provide various types of information to VANET users. Keywords: VANET, RSU, Ad-Hoc Network, URE, ITS


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Inam Ullah Khan ◽  
Muhammad Abul Hassan ◽  
Mohammad Dahman Alshehri ◽  
Mohammed Abdulaziz Ikram ◽  
Hasan J. Alyamani ◽  
...  

In recent decades, the Internet of flying networks has made significant progress. Several aerial vehicles communicate with one another to form flying ad hoc networks. Unmanned aerial vehicles perform a wide range of tasks that make life easier for humans. However, due to the high frequency of mobile flying vehicles, network problems such as packet loss, latency, and perhaps disrupted channel links arise, affecting data delivery. The use of UAV-enabled IoT in sports has changed the dynamics of tracking and working on player safety. WBAN can be merged with aerial vehicles to collect data regarding health and transfer it to a base station. Furthermore, the unbalanced energy usage of flying things will result in earlier mission failure and a rapid decline in network lifespan. This study describes the use of each UAV’s residual energy level to ensure a high level of safety using an ant-based routing technique called AntHocNet. In health care, the use of IoT-assisted aerial vehicles would increase operational performance, surveillance, and automation optimization to provide a smart application of flying IoT. Apart from that, aerial vehicles can be used in remote communication for treatment, medical equipment distribution, and telementoring. While comparing routing algorithms, simulation findings indicate that the proposed ant-based routing protocol is optimal.


2018 ◽  
Vol 30 (4) ◽  
pp. 356-370 ◽  
Author(s):  
José Álvarez-García ◽  
Amador Durán-Sánchez ◽  
María de la Cruz del Río-Rama

Purpose Since Masaaki Imai coined the term Kaizen in the mid-1980s, it has been seen as a key element for the competitiveness of Japanese companies, and it is currently a widely discussed philosophy and is applied in a wide range of organizations throughout the world. The purpose of this paper is to serve as guidance for researchers who are developing their studies in the field of the Kaizen philosophy, in order to improve their knowledge on the most relevant articles, the most productive authors or the key scientific journals that make up this subject. Design/methodology/approach In order to fulfill the proposed objective, a descriptive bibliometric study was carried out with the analysis of citations from 138 articles included in the multidisciplinary database Scopus (Elsevier) until 2016. For the search of documents, a tracking strategy was chosen that allowed for the development of the ad hoc database required to analyze each of the basic variables of the bibliometric indicators. Findings The results obtained show a growing interest of the scientific community in its study in the last decade, as shown by the significant increase in citations received by articles, despite the reduction in the number of papers published in the last two years. Research limitations/implications The main limitations are derived from the choice of a specific database, as well as the specific search equation. Originality/value The study presents an in-depth analysis of the current state of research regarding the Kaizen philosophy through its bibliometric study, providing useful information for academics and professionals by providing a series of significant indicators to measure the bibliographic material.


2017 ◽  
Vol 2 (2) ◽  
pp. 187-200
Author(s):  
Didik Supriyoko ◽  
Ujang Bahar ◽  
Mul Yadi

The method used in this research is a normative juridical research with comparative law. This study will be a descriptive analysis will provide an overview of the Implementation Program of Bogor City Police Officer Bhabinkamtibmas by virtue Kapolri No.Pol: B / 3022 / XII / 2009Sdeops Date December 14, 2009 on the Handling of Cases Through the Alternative Dispute Resolution (ADR). The program is named after the latest Police Officer Bhabinkamtibmas. The program is a pilot project. This program will be applied in the future to another police station to an extent Polsek.Dengan the Bhabinkamtibmas officers who have members from a wide range of functions is expected to prevent the disruption of security and public order as well as to resolve conflicts early horizontal. The role and function Bhabinkamtibmas members in each region will be further optimized. Bhabinkamtibmas officer team will be down directly in the community to help solve the problems of citizens. Thus, each issue should not be resolved through legal channels, but through mediation and approach officials with the public. The formation of a team of officers Bhayangkara Trustees Public Order and Safety in the City Police Bogor, West Java, a pilot project, particularly for the police station in West Java. The team of eight people who have received training and certification from the National Mediation Centre. The team is a kind of ad hoc team, which is responsible to the Chief of Police and Officer Team members Bhabinkamtibmas of some police functions, not only the function of public guidance. The conclusion from this study is the Program Implementation in Bogor Police Officer Bhabinkamtibmas City and yet not maximum impact on increasing public perception of the police. In terms of implementation, it appears less optimal competence of officers in the police station and police station level. Instructive culture within the police adopted a policy of military norms Officer Program Bhabinkamtibmas seen by officers in the field more as a mere 'implementation of new tasks' rather than the 'improvement of quality of service'.


Author(s):  
Leonardo Lezcano

This chapter presents an approach to translate definitions expressed in openEHR Archetype Definition Language (ADL) to a formal representation using ontology languages. The approach is implemented in the ArchOnt framework, which is also described. The integration of those formal representations with clinical rules is then studied, providing an approach to reuse reasoning on concrete instances of clinical data. Sharing the knowledge expressed in the form of rules is coherent with the philosophy of open sharing underlying clinical archetypes, and it also extends reuse to propositions of declarative knowledge as those encoded for example in clinical guidelines. Thus, this chapter describes the techniques to map archetypes to formal ontologies and how rules can be attached to the resulting representation. In addition, the translation allows specifying logical bindings to equivalent clinical concepts from other knowledge sources. Such bindings encourage reuse as well as ontology reasoning and navigability across different ontologies. Another significant contribution of the chapter is the application of the presented approach as part of two research projects in collaboration with teaching hospitals in Madrid. Examples taken from those cases, such as the development of alerting systems aimed at improving patient safety, are explained. Besides the direct applications described, the automatic translation of archetypes to an ontology language fosters a wide range of semantic and reasoning activities to be designed and implemented on top of a common representation instead of taking an ad-hoc approach.


Author(s):  
Hussein Al-Bahadili ◽  
Alia Sabri

In mobile ad hoc networks (MANETs), broadcasting is widely used in route discovery and other network services. The most widely used broadcasting algorithm is simple flooding, which aggravates a high number of redundant packet retransmissions, causing contention and collisions. Proper use of dynamic probabilistic algorithm significantly reduces the number of retransmissions, which reduces the chance of contention and collisions. In current dynamic probabilistic algorithm, the retransmission probability (pt) is formulated as a linear/non-linear function of a single variable, the number of first-hop neighbors (k). However, such algorithm is suffers in the presence of noise due to increasing packet-loss. In this paper, the authors propose a new dynamic probabilistic algorithm in which ptis determined locally by the retransmitting nodes considering both k and the noise-level. This algorithm is referred to as the dynamic noise-dependent probabilistic (DNDP) algorithm. The performance of the DNDP algorithm is evaluated through simulations using the MANET simulator (MANSim). The simulation results show that the DNDP algorithm presents higher network reachability than the dynamic probabilistic algorithm at a reasonable increase in the number of retransmissions for a wide range of noise-level. The effects of nodes densities and nodes speeds on the performance of the DNDP algorithm are also investigated.


Author(s):  
Abdelaziz Amara Korba ◽  
Mohamed Amine Ferrag

This chapter proposes a new cluster-based secure routing scheme to detect and prevent intrusions in ad hoc networks. The proposed scheme combines both specification and anomaly detection techniques to provide an accurate detection of wide range of routing attacks. The proposed secure scheme provides an adaptive response mechanism to isolate malicious nodes from the network. A key advantage of the proposed secure scheme is its capacity to prevent wormhole and rushing attacks and its real-time detection of both known and unknown attacks which violate specification. The simulation results show that the proposed scheme shows high detection rate and low false positive rate compared to other security mechanisms.


Sign in / Sign up

Export Citation Format

Share Document