• Title/Summary/Keyword: leaks

Search Result 461, Processing Time 0.026 seconds

Lymphatic Intervention, the Frontline of Modern Lymphatic Medicine: Part II. Classification and Treatment of the Lymphatic Disorders

  • Saebeom Hur;Jinoo Kim;Lakshmi Ratnam;Maxim Itkin
    • Korean Journal of Radiology
    • /
    • v.24 no.2
    • /
    • pp.109-132
    • /
    • 2023
  • Lymphatic disorders encompass a broad spectrum of diseases involving the lymphatic system, ranging from traumatic lymphatic leaks to lymphatic malformations. Lymphatic disorders can be categorized into traumatic and non-traumatic disorders according to their etiology. These two categories may be further divided into subgroups depending on the anatomical location of the lymphatic pathology and their association with clinical syndromes. Thoracic duct embolization was a milestone in the field of lymphatic intervention that encouraged the application of percutaneous embolization techniques to treat leaks and reflux disorders in the lymphatic system. Additional access routes for embolization, including retrograde thoracic duct and transhepatic lymphatic access, have also been developed. This article comprehensively reviews a variety of options for the treatment of lymphatic disorders, from conservative management to the most recent embolization techniques.

A Study on the Consultation for Technology Leakage Victim Using NLP

  • KANG, In-Seok;LIM, Heon-Wook
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.33-39
    • /
    • 2020
  • Purpose: The purpose of this study is that victims of technology leaks and people concerned about leaks complain of stress over security concerns. However, there are no psychological treatments among the government's comprehensive plans to prevent technology leaks. Therefore, the government intends to present education methods using the NLP (Neuro Linguistic Program), a collective counseling technique, to heal the psychological injury of the victims. Psychological counseling methods include cognitive behavioral therapy, psychoanalytic behavioral therapy, humanism therapy, art therapy, and other psychological therapies. Among them, NLP (Neuro Linguistic Programming) method was used. NLP has three concepts: neuron, language, and programming, and is used as a general method for group counseling. Research design, data and methodology: In relation to composition, Chapter 1 explained the purpose and necessity of the study, Chapter 2 explained the types of psychological counseling and NLPs to help understand the study, introduced the prior study related to the development of collective counseling programs through NLP, and Chapter 3 developed a security psychological counseling education program. In addition, FGI(Focus Group Interview) was conducted for professionals. Results: Corporate counseling considered most in this study should satisfy client, counselor and manager differently from individual counseling. For this purpose, the result was composed of 11 times. In order to derive personal problems for clients, they consisted of finding, loving, expressing, and emancipating self. And, It solved the leakage anxiety to suggest a professional solution for the counselor. In addition, this course helps them become familiar with counseling techniques for becoming a good security administrator. Lastly, it was configured to leave the result for the manager to suggest the organizational development method through this training. The implication of this study is to derive psychological counseling methods for security officers. Most companies in the field of security counseling complain about technology leakage stress. There is currently no psychotherapy support project under the policy. And It was developed because it can expect sales improvement from security consultation. Conclusions: In conclusion, the results were organized to be left to the manager so that he could suggest how to develop the organization through this time.

Modified Graded Repair of Cerebrospinal Fluid Leaks in Endoscopic Endonasal Transsphenoidal Surgery

  • Park, Jae-Hyun;Choi, Jai Ho;Kim, Young-Il;Kim, Sung Won;Hong, Yong-Kil
    • Journal of Korean Neurosurgical Society
    • /
    • v.58 no.1
    • /
    • pp.36-42
    • /
    • 2015
  • Objective : Complete sellar floor reconstruction is critical to avoid postoperative cerebrospinal fluid (CSF) leakage during transsphenoidal surgery. Recently, the pedicled nasoseptal flap has undergone many modifications and eventually proved to be valuable and efficient. However, using these nasoseptal flaps in all patients who undergo transsphenoidal surgery, including those who had none or only minor CSF leakage, appears to be overly invasive and time-consuming. Methods : Patients undergoing endoscopic endonasal transsphenoidal tumor surgery within a 5 year-period were reviewed. Since 2009, we classified the intraoperative CSF leakage into grades from 0 to 3. Sellar floor reconstruction was tailored to each leak grade. We did not use any tissue grafts such as abdominal fat and did not include any procedures of CSF diversions such as lumbar drainage. Results : Among 200 cases in 188 patients (147 pituitary adenoma and 41 other pathologies), intraoperative CSF leakage was observed in 27.4% of 197 cases : 14.7% Grade 1, 4.6% Grade 2a, 3.0% Grade 2b, and 5.1% Grade 3. Postoperative CSF leakage was observed in none of the cases. Septal bone buttress was used for Grade 1 to 3 leakages instead of any other foreign materials. Pedicled nasoseptal flap was used for Grades 2b and 3 leakages. Unused septal bones and nasoseptal flaps were repositioned. Conclusion : Modified classification of intraoperative CSF leaks and tailored repair technique in a multilayered fashion using an en-bloc harvested septal bone and vascularized nasoseptal flaps is an effective and reliable method for the prevention of postoperative CSF leaks.

Percutaneous Vertebroplasty in the Treatment of Vertebral Body Compression Fracture with Osteoporosis - Preliminary Report - (골다공증을 동반한 척추체 압박골절에 대한 경피적 척추 성형술 - 예비보고 -)

  • Lee, Sang-Gu;Yoo, Chan-Jong
    • Journal of Korean Neurosurgical Society
    • /
    • v.29 no.5
    • /
    • pp.615-622
    • /
    • 2000
  • Objective : Percutaneous vertebroplasty is an effective and minimally invasive procedure consisting of the injection of a PMMA(polymethyl methacrylate) into the vertebral body compression fracture with osteoporosis. Matherials and Methods : Twenty-eight procedures were performed for vertebral body compression fractures with osteoporosis in 25 patients(22 women, 3 men). The mean age was 65.9 years old. The inclusion criteria for percutaneous vertebroplasty were 1) acute vertebral body compression fracture with osteoporosis, 2) expected high operative morbidity in old age, 3) no neurologic deficits, 4) no or minimal canal enchroachment, 5) patient refusal of invasive surgery. All patients underwent MR images before the procedure. Under local anesthesia, after the percutaneous needle puncture of the involved vertebra via a transpedicular approach and venography using the water soluble contrast material, PMMA injection was introduced into the fractured vertebral body. Results : The procedure was technically successful in all patients. All patients experienced excellent pain relief (complete pain relief ; 10, marked pain relief ; 14). One patient experienced marked pain relief, however, the patient died during the follow-up period due to stomach cancer. There were twelve paravertebral tissue leaks, twelve paravertebral venous plexus leaks, four epidural leaks and one intradiskal leak, but no clinically significant complications occurred in all patients. Conclusion : Percutaneous vertebraoplasty is a valuable procedure in the treatment of vertebral body compression fracture with osteoporosis, providing immediate pain relief and early mobilization. MRI is the most reliable diagnostic tool for identifying painful fractured vertebral body.

  • PDF

GIS based Effective Methodology for GAS Accident Management (GIS를 이용한 효율적인 가스사고관리 방법에 관한 연구)

  • 김태일;김계현;전방진;곽태식
    • Spatial Information Research
    • /
    • v.12 no.1
    • /
    • pp.89-100
    • /
    • 2004
  • Nowadays, the gas utilities have been increasing constantly due to the expansion of the urban areas. Using computerized information database, the gas companies have developed a gas management system in order to maintain the current status. However, this system can only give basic functions of the maintenance and management of the gas facilities and it has no proper utilities to provide information against accidents from gas leaks. Therefore, a gas accident management system has been developed in this study. Through primary and secondary pipe searching algorithm realtime based management system was devised against gas leaks to propose proper actions. In addition, supporting decision making has been enabled providing estimated maximum amount of gas leaks. Furthermore, all the residential units could be identified thereby minimizing damages through early warning. This system can be expected to contribute to enhance the efficiency of the gas management not to mention of protecting human lives and properties of the nation.

  • PDF

Clinical Evaluation and Prevention of Complications of Esophagojejunal Anastomotic Site after Total Gastrectomy (위 전절제술 후 식도 공장 문합부 합병증에 관한 연구)

  • Park, Ki-Ho;Jung, Soon-Jai
    • Journal of Gastric Cancer
    • /
    • v.4 no.2
    • /
    • pp.121-125
    • /
    • 2004
  • Purpose: Esophagojejunal anastomotic complications after a total gastrectomy include leakage, stenosis, bleeding, and abscess formation. Especially, the mortality rate for esophagojejunal anastomotic leakage is $80\%$. Although these complications hare been reduced by the usage of the EEA stapler, they are still serious and depend on various factors: the surgeon's experience, the stage of disease, the extent of surgical intervention, the method of operation, and the patient. Some local factors, such as vascularization of the graft, traction on the anastomosis suture line, and local infections, have been implicated as contributing to these complications. Materials and Methods: During the period $1995\∼2003$, of the 850 gastrectomies for gastric carcinomas, 171 were intra-abdominal total gastrectomies. All of these 171 operations were performed by one surgeon using a routine D2 lymph-node dissection and a 25-mm EEA stapler on an antecolic end-to-side esophagojejunostomy. In the 77 cases a seromuscular reinforced suture at the esophagojejunostomy site was performed, and in 94 cases, a whole layer reinforced suture with absorbible materials was used. We evaluated the incidence of complications according to age, sex, stage of patients, and combined resection. Also, we compared the incidences of complications for seromuscular and whole layer reinforced sutures. Results: The complications are major leaks ($2.9\%$), minor leaks ($3.5\%$), stenosis, bleeding ($1.8\%$), and abscess formation formation ($1.8\%$). In the five cases of major leaks, there were four mortalities with operative methods. The other patients with stenosis, bleeding, and abscess formation were treated conservatively with success. The incidences of complications were not related with age, sex, stages, and combined resection. The incidences of complications for the whole layer reinforced suture group ($2.9\%$) were less than those for the seromuscular reinforced group ($8.8\%$, P=0.04). Conclusion: The most serious complication of esophagojejunal anastomosis is major leakage with an $80\%$ mortality. The other complications are stenosis, bleeding, and abscess formation, for which no mortalities occurred during this study. Whole layer suture of the esophagojejunal anastomotic site is an important method for preventing leakage.

  • PDF

Probabilistic Neural Network for Prediction of Leakage in Water Distribution Network (급배수관망 누수예측을 위한 확률신경망)

  • Ha, Sung-Ryong;Ryu, Youn-Hee;Park, Sang-Young
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.20 no.6
    • /
    • pp.799-811
    • /
    • 2006
  • As an alternative measure to replace reactive stance with proactive one, a risk based management scheme has been commonly applied to enhance public satisfaction on water service by providing a higher creditable solution to handle a rehabilitation problem of pipe having high potential risk of leaks. This study intended to examine the feasibility of a simulation model to predict a recurrence probability of pipe leaks. As a branch of the data mining technique, probabilistic neural network (PNN) algorithm was applied to infer the extent of leaking recurrence probability of water network. PNN model could classify the leaking level of each unit segment of the pipe network. Pipe material, diameter, C value, road width, pressure, installation age as input variable and 5 classes by pipe leaking probability as output variable were built in PNN model. The study results indicated that it is important to pay higher attention to the pipe segment with the leak record. By increase the hydraulic pipe pressure to meet the required water demand from each node, simulation results indicated that about 6.9% of total number of pipe would additionally be classified into higher class of recurrence risk than present as the reference year. Consequently, it was convinced that the application of PNN model incorporated with a data base management system of pipe network to manage municipal water distribution network could make a promise to enhance the management efficiency by providing the essential knowledge for decision making rehabilitation of network.

Feasibility Study of Beta Detector for Small Leak Detection inside the Reactor Containment

  • Jang, JaeYeong;Schaarschmidt, Thomas;Kim, Yong Kyun
    • Journal of Radiation Protection and Research
    • /
    • v.43 no.4
    • /
    • pp.154-159
    • /
    • 2018
  • Background: To prevent small leakage accidents, a real-time and direct detection system for small leaks with a detection limit below that of existing systems, e.g. $0.5gpm{\cdot}hr^{-1}$, is required. In this study, a small-size beta detector, which can be installed inside the reactor containment (CT) building and detect small leaks directly, was suggested and its feasibility was evaluated using MCNPX simulation. Materials and Methods: A target nuclide was selected through analysis of radiation from radionuclides in the reactor coolant system (RCS) and the spectrum was obtained via a silicon detector simulated in MCNPX. A window was designed to reduce the background signal caused by other nuclides. The sensitivity of the detector was also estimated, and its shielding designed for installation inside the reactor CT. Results and Discussion: The beta and gamma spectrum of the silicon detector showed a negligible gamma signal but it also contained an undesired peak at 0.22 MeV due to other nuclides, not the $^{16}N$ target nuclide. Window to remove the peak was derived as 0.4 mm for beryllium. The sensitivity of silicon beta detector with a beryllium window of 1.7 mm thickness was derived as $5.172{\times}10^{-6}{\mu}Ci{\cdot}cc^{-1}$. In addition, the specification of the shielding was evaluated through simulations, and the results showed that the integrity of the silicon detector can be maintained with lead shielding of 3 cm (<15 kg). This is a very small amount compared to the specifications of the lead shielding (600 kg) required for installation of $^{16}N$ gamma detector in inside reactor CT, it was determined that beta detector would have a distinct advantage in terms of miniaturization. Conclusion: The feasibility of the beta detector was evaluated for installation inside the reactor CT to detect small leaks below $0.5gpm{\cdot}hr^{-1}$. In future, the design will be optimized on specific data.

Security and Trust of Mobile Payment Apps : Focus on Personal Predisposition and Security Signal (모바일 결제 앱에서의 보안과 신뢰 : 개인의 성향과 보안 신호를 중심으로)

  • Kim, Min-Gyung;Choi, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.194-204
    • /
    • 2019
  • The mobile payment app market has been expanding recently. However, the usage rate of mobile payment apps is not meeting service providers' expectations due to concerns about security and privacy. This study investigated how personal predisposition and how the security signals of the payment app affect users' perceived privacy and security risks, and how these factors ultimately affect the trust of mobile payment apps. The results showed that privacy concerns increase the risk of perceived personal information leaks and reduce perceived mobile system security, while familiarity, perceived reputation, and assurance seal reduce the risk of perceived personal information leaks and increase perceived mobile system security. Finally, it revealed that the reduced risk of perceived personal information leaks and the increased security of mobile systems had a positive impact on the reliability of mobile payment apps.

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.