Moderator's view: A 'secular' view on vascular access in haemodialysis
نویسندگان
چکیده
منابع مشابه
Vascular access for acute haemodialysis.
Vascular access for acute haemodialysis was required on 29 occasions in 26 children over a six year period. Comparison was made of the forms of vascular access employed, these being the Scribner shunt, the Hickman line, and percutaneous polyvinylchloride cannulae. The Hickman catheter was used to provide vascular access in 17 patients (mean age 8.8 years (range 2.5-16 years) and mean weight 25....
متن کاملA view of vascular stents.
D espite innovative new techniques in percutaneous transluminal coronary angioplasty (PTCA) during the past 10 years, restenosis rates continue to occur at about 30% in subtotal lesions,' about 50% in chronic total occlusions,2 and up to 80% in saphenous vein bypass grafts.3 Although mortality remains acceptably low, urgent bypass surgery after unsuccessful angioplasty continues to be necessary...
متن کاملA critical view on a paper
The paper delth with the effect of presuppositions and theological foundations in perceiving the meaning of Quranic verses, proving the theological tendency in exegeses, using three exegeses including Tebyan, Kashshaf and Kabir as the deputies for Shiites, Mu’tazelites and Asharites respectively and focusing on the theological problem of sighting God, the exalted, referred to in the verse 14...
متن کاملMaintaining Patency of Vascular Access for Haemodialysis
All types of vascular access, a necessity for haemodialysis, are prone to thrombosis and if untreated this results in failure. Thrombosis results from the combination of impaired blood flow, endothelial and vessel wall injury and a propensity towards pro-coagulative states, either intrinsic or aggravated by dialysis or dehydration. The treatment of access thrombosis relies on removal of the clo...
متن کاملA Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been proposed in order to guarantee the security of information like access control, encipherment, data integrity and authentication; however, those security mechanisms have vulnerabilities that are exploited. This paper presen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nephrology Dialysis Transplantation
سال: 2012
ISSN: 0931-0509,1460-2385
DOI: 10.1093/ndt/gfs275