Unexpected Stealing From the Heart.
نویسندگان
چکیده
BACKGROUND Coronary subclavian steal syndrome (CSSS) is defined as retrograde flow in the internal mammary artery graft, after coronary artery bypass surgery, resulting in anterior wall myocardial ischemia. If undiagnosed, it may lead to significant infarction. Its incidence has been under-reported. CASE REPORT A 74-year-old woman presented with sudden onset of typical angina, which was associated with dyspnea, nausea, and vomiting. Her medical history was significant for coronary artery disease, with prior coronary artery bypass surgery (CABG), chronic obstructive pulmonary disease (COPD), hypertension, diabetes type 2, dyslipidemia, hypothyroidism, and depression. Physical examination demonstrated a weak left radial pulse, and a differential blood pressure reading in her arms. She developed massive hematochezia that resulted in electrocardiogram changes: ST segment depression in the inferior and lateral leads with isolated ST segment elevation of aVR. Cardiac catheterization demonstrated retrograde flow through the left internal mammary artery (LIMA), resulting in CSSS. CONCLUSIONS This case highlights the diagnostic challenge of CSSS as the underlying etiology for ischemia in a patient with remote coronary artery bypass surgery (CABG). It underscores the importance of thorough physical examination in patients who are at high risk for coronary atherosclerosis and remote complications after CABG. It also highlights optimal strategies for management of CSSS with percutaneous transluminal angioplasty.
منابع مشابه
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing not only allows for dynamic load balancing, but also determines which parts of the search tree are searched next. Thus the place from where work is stolen has a dramatic effect on the efficiency of a parallel search a...
متن کاملEfficient Work Stealing for Portability of Nested Parallelism and Composability of Multithreaded Program
We present performance evaluations of parallel-for loop with work stealing technique. The parallel-for by work stealing transforms the parallel-loop into a form of binary tree by making use of method of divide-and-conquer. Iterations are distributed in the leaves procedures of the binary tree, and the parallel executions are performed by stealing subtrees from the bottom of the tree. The work s...
متن کاملNondelinquent youths' stealing behavior and their perceptions of parents, school, and peers.
Correlates of stealing behavior were investigated in a sample of 167 nondelinquent 10- to 15-year-olds. Stealing was related to youths' attitudes toward parents and school, as well as reasons for stealing. Stealing was most frequent among older males. Attitude toward school was most consistently related to stealing behavior, though perceptions of family's values and the consequences of stealing...
متن کاملFaster Work Stealing With Return Barriers
Work-stealing is a promising approach for effectively exploiting software parallelism on parallel hardware. A programmer who uses work-stealing explicitly identifies potential parallelism and the runtime then schedules work, keeping otherwise idle hardware busy while relieving overloaded hardware of its burden. However, work-stealing comes with substantial overheads. Our prior work demonstrates...
متن کاملEquipment for Anti - Electricity Stealing with Remote Monitoring
The power theft monitoring is an important research in electric power system, and electricity-stealing prevention became a big problem to the electricity board. based on the kind of electricity-stealing and actual demand of prevention of stealing electricity, the equipment of electricity-stealing with remote monitoring is designed, with PIC microcontroller as the control core. In this the stand...
متن کاملTransposition Table Driven Work Scheduling in Distributed Search
This paper introduces a new scheduling algorithm for parallel single-agent search, transposition table driven work scheduling, that places the transposition table at the heart of the parallel work scheduling. The scheme results in less synchronization overhead, less processor idle time, and less redundant search effort. Measurements on a 128-processor parallel machine show that the scheme achie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- The American journal of case reports
دوره 17 شماره
صفحات -
تاریخ انتشار 2016