期刊文献+

鼠脑缺血性损伤程度与缺血时间的关系研究 被引量:21

Study on the relationship between ischemic time and extent of cerebral ischemic injury in rats
下载PDF
导出
摘要 目的 探讨大脑中动脉 (MCA)闭塞时缺血侧不同部位的病理演变特征 ,研究缺血性损伤程度与缺血时间的关系。方法 利用线栓法 MCA闭塞模型 ,采取 HE染色 ,光镜电镜观察 MCA闭塞不同时相点缺血侧基底节区、皮质和海马的损伤特征 ,并直接对坏死和暗神经元计数 ,运用对数方程作出脑损伤程度 -缺血时间关系曲线 ,运算 ET5 0 值。结果 缺血 30分钟 ,坏死神经元首先出现在缺血侧基底节区 ,以后逐渐扩展到皮质 ,至缺血 2 4小时后 ,缺血中心逐步出现盘状坏死。缺血时间依赖性病理变化完全符合剂量反应曲线的S-形分布。结论  MCA闭塞后 ,MCA分布区的病理变化可分为组织水肿期、神经元急剧损伤期和盘状坏死期三个阶段。治疗窗因阻塞血管和缺血部位及组织可逆的期望值不同而异。主张治疗窗应“个体化” Objective To explore the pathologic feature on different parts of ischemia during the middle cerebral artery occlusion (MCAO),and study the relationship between ischemic time and extent of cerebral injury.Methods A model of MCAO with the suture mothod was set up in rats,using HE staining, light and electronic microscope, the injury feature of ischemic basal ganglion area,cortex and hippocampus were observed in different time,and counted necrotic and dark neruons.Using a logistic equation to calculate the relationship between the duration of ischemia and the extent of injury.Results 30 min after cerebral ischemia onset,necrosis neurons appeared in ischemic basal ganglion area, and then progressively developed to cortex. Pannecrosis was observed after 24 h. Ischemia dependenced pathologic change completely fitted S shape distribution of dose response curves.Conclusions The pathologic changes induced by MCA occlusion had three periods: tissue edema period,neuron rapid injury period and pannecrosis period. Different vessels occlusion, different ischemic position and different expectation had different therapeutic window.This paper emphasized “individuation” of therapeutic window.
出处 《临床神经病学杂志》 CAS 2000年第1期13-15,共3页 Journal of Clinical Neurology
关键词 脑缺血 病理学 治疗窗 Cerebral ischemia Pathology Therapeutic window
  • 相关文献

参考文献3

二级参考文献51

  • 1邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 2MILLER B P, FREDRIKSON L, SO B. An empirical study of the reliablity of UNIX utilities[ J]. Communications of the ACM, 1990, 33(2) :32.
  • 3AITEL D. The advantages of block-based protocol analysis for security testing[ R]. New York: Immunity Inc, 2002.
  • 4SPIKE [ EB/OL ]. ( 2009- 06 ). http ://www. immunitysec, com/resources-freesoftware, shtml.
  • 5GODEFROID P, LEVIN M, MOLNAR D. Active property checking [ C]//Proc of the 8th ACM International Conference on Embedeling Software. 2008 : 19-24.
  • 6GODEFROID P, LEVIN M, MOLNAR D. Automated whitebox fuzz testing[ C ]//Proc of Network Distributed Security Symposium. 2005.
  • 7MILLER B P, KOSKI D, LEE C P,et al. Fuzzing revisted: a reexamination of the reliability of UNIX utilities and services [ R]. Madison: University of Wisconsin Madison, 1995.
  • 8SUTTON M, GREENE A, AMINI P. Fuzzing: brute vulnerability discovery[ M]. [ S. l. ] : Pearson Education Inc, 2007 : 16.
  • 9ANDREA L, LORENZO M, MATTIA M,et al. A smart fuzzer for x86 executables[ C ]//Proc of the 3rd International Workshop on Software Engineering for Secure Systems. [ S. l. ] : IEEE Computer Society, 2007:7.
  • 10OEHLERT P. Violating assumption with fuzzing[ J]. IEEE Security and Privacy,2005,3(2) :58-62.

共引文献38

同被引文献187

引证文献21

二级引证文献141

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部