Objective: To study the feasibility of radionuclide colloid 32P used for the treatment of stage II lung cancer by video enhanced minimal access muscle sparing thoracotomy (VEMAST). Methods: Video assisted thoracosc...Objective: To study the feasibility of radionuclide colloid 32P used for the treatment of stage II lung cancer by video enhanced minimal access muscle sparing thoracotomy (VEMAST). Methods: Video assisted thoracoscopic surgery (VATS) was carried out under general anesthesia. A double lumen endobronchial tube was intubated into trachea. One lung ventilation of the healthy side was done during operation. An incision of 8–10 cm long was made along the 4th or 5th intercostals. The lobectomy could be performed under VATS. Radionuclide colloid 32P was injected locally into the area where surgical cleaning of lymph node around was considered to be unsatisfactory or desection of the tumor was not completed. Results: The operation with VEMAST was successful in 29 patients. A conventional lobectomy by thoracotomy had to be done due to unusual bleeding from the pulmonary artery involved during VEMAST in one case and the procedure was interrupted because the pulmonary artery cloud not be separated from the tumor in another patient. There was no dead case or the patient who had any severe complication or adverse response to the radiant. Conclusion: Radionuclide therapy was performed to the treatment of stage II lung cancer with VEMAST in case that surgical resection was considered not to be satisfactory. Minithoractomy assisted with VATS lobectomy and radionuclide colloid 32P therapy is a safe and e?ective technique for some selected stage II lung cancer.展开更多
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct...Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.展开更多
Diaphragm eventration is the permanent elevation of a hemidiaphragm and can be due to congenital or acquired causes.It is a rather uncommon condition in adults and causes a spectrum of symptoms,ranging from asymptomat...Diaphragm eventration is the permanent elevation of a hemidiaphragm and can be due to congenital or acquired causes.It is a rather uncommon condition in adults and causes a spectrum of symptoms,ranging from asymptomatic incidental findings on imaging to life-threatening respiratory distress.Asymptomatic patients do not require any treatment,but plication is the conventional,well-known method for treating symptomatic patients.Management varies depending on the symptoms.In this article,we discuss two rare cases of diaphragmatic eventration that were treated with minimal access surgery.展开更多
BACKGROUND Single port laparoscopic surgery allows total colectomy and end ileostomy for medically uncontrolled ulcerative colitis solely via the stoma site incision.While intuitively appealing,there is sparse evidenc...BACKGROUND Single port laparoscopic surgery allows total colectomy and end ileostomy for medically uncontrolled ulcerative colitis solely via the stoma site incision.While intuitively appealing,there is sparse evidence for its use beyond feasibility.AIM To examine the usefulness of single access laparoscopy(SAL)in a general series experience of patients sick with ulcerative colitis.METHODS All patients presenting electively,urgently or emergently over a three-year period under a colorectal specialist team were studied.SAL was performed via the stoma site on a near-consecutive basis by one surgical team using a“surgical glove port”allowing group-comparative and case-control analysis with a contemporary cohort undergoing conventional multiport surgery.Standard,straight rigid laparoscopic instrumentation were used without additional resource.RESULTS Of 46 consecutive patients requiring surgery,39(85%)had their procedure begun laparoscopically.27(69%)of these were commenced by single port access with an 89%completion rate thereafter(three were concluded by multi-trocar laparoscopy).SAL proved effective in comparison to multiport access regardless of disease severity providing significantly reduced operative access costs(>100€case)and postoperative hospital stay(median 5 d vs 7.5 d,P=0.045)without increasing operative time.It proved especially efficient in those with preoperative albumin>30 g/dL(n=20).Its comparative advantages were further confirmed in ten pairs case-matched for gender,body mass index and preoperative albumin.SAL outcomes proved durable in the intermediate term(median follow-up=20 mo).CONCLUSION Single port total colectomy proved useful in planned and acute settings for patients with medically refractory colitis.Assumptions regarding duration and cost should not be barriers to its implementation.展开更多
In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the...In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the nonzero codewords of C are 2 minimal. Therefore, we obtain a corollary.展开更多
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin...Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme.展开更多
Background Cochlear implant surgery is widely practiced.Minimal incision cochlear implant surgery has been developed with the aims of reducing the impact of surgery on the patient and improving cosmesis while maintain...Background Cochlear implant surgery is widely practiced.Minimal incision cochlear implant surgery has been developed with the aims of reducing the impact of surgery on the patient and improving cosmesis while maintaining the low morbidity of conventional wider access approaches.This study aimed to assess the surgical technique and complication rate of minimal incision cochlear implantation (MICI) for children and adults.Methods Data for this study were obtained via a retrospective analysis.Totally 378 patients were included in the study.All patients received minimal incision cochlear implantation,using the skin protector during the process of the operation.The surgical complications of MICI were recorded in a spreadsheet format.The incidence of major and minor complication were analyzed,and appropriate treatment was provided.Results A total of 40 (10.5%) complications were noted in the study.There were 0 life-threatening,9 major,and 31 minor complications.Of the nine major complications,five were device failures,one developed infection and extrusion,and three required receiver-stimulator repositioning.Conclusions MICI is as safe as standard cochlear implantation (SCI) and affords with it other benefits.Eliminating the scalp flap avoids devascularization and minimizes the opportunity of flap infection or necrosis.Complications not related to the flap are similar to SCI.展开更多
For a binary linear code,a new relation between the intersection and(2,2)-separating property is addressed,and a relation between the intersection and the trellis complexity is also given.Using above relations,the aut...For a binary linear code,a new relation between the intersection and(2,2)-separating property is addressed,and a relation between the intersection and the trellis complexity is also given.Using above relations,the authors will apply several classes of binary codes to secret sharing scheme and determine their trellis complexity and separating properties.The authors also present the properties of the intersection of certain kinds of two-weight binary codes.By using the concept of value function,the intersecting properties of general binary codes are described.展开更多
文摘Objective: To study the feasibility of radionuclide colloid 32P used for the treatment of stage II lung cancer by video enhanced minimal access muscle sparing thoracotomy (VEMAST). Methods: Video assisted thoracoscopic surgery (VATS) was carried out under general anesthesia. A double lumen endobronchial tube was intubated into trachea. One lung ventilation of the healthy side was done during operation. An incision of 8–10 cm long was made along the 4th or 5th intercostals. The lobectomy could be performed under VATS. Radionuclide colloid 32P was injected locally into the area where surgical cleaning of lymph node around was considered to be unsatisfactory or desection of the tumor was not completed. Results: The operation with VEMAST was successful in 29 patients. A conventional lobectomy by thoracotomy had to be done due to unusual bleeding from the pulmonary artery involved during VEMAST in one case and the procedure was interrupted because the pulmonary artery cloud not be separated from the tumor in another patient. There was no dead case or the patient who had any severe complication or adverse response to the radiant. Conclusion: Radionuclide therapy was performed to the treatment of stage II lung cancer with VEMAST in case that surgical resection was considered not to be satisfactory. Minithoractomy assisted with VATS lobectomy and radionuclide colloid 32P therapy is a safe and e?ective technique for some selected stage II lung cancer.
文摘Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.
文摘Diaphragm eventration is the permanent elevation of a hemidiaphragm and can be due to congenital or acquired causes.It is a rather uncommon condition in adults and causes a spectrum of symptoms,ranging from asymptomatic incidental findings on imaging to life-threatening respiratory distress.Asymptomatic patients do not require any treatment,but plication is the conventional,well-known method for treating symptomatic patients.Management varies depending on the symptoms.In this article,we discuss two rare cases of diaphragmatic eventration that were treated with minimal access surgery.
文摘BACKGROUND Single port laparoscopic surgery allows total colectomy and end ileostomy for medically uncontrolled ulcerative colitis solely via the stoma site incision.While intuitively appealing,there is sparse evidence for its use beyond feasibility.AIM To examine the usefulness of single access laparoscopy(SAL)in a general series experience of patients sick with ulcerative colitis.METHODS All patients presenting electively,urgently or emergently over a three-year period under a colorectal specialist team were studied.SAL was performed via the stoma site on a near-consecutive basis by one surgical team using a“surgical glove port”allowing group-comparative and case-control analysis with a contemporary cohort undergoing conventional multiport surgery.Standard,straight rigid laparoscopic instrumentation were used without additional resource.RESULTS Of 46 consecutive patients requiring surgery,39(85%)had their procedure begun laparoscopically.27(69%)of these were commenced by single port access with an 89%completion rate thereafter(three were concluded by multi-trocar laparoscopy).SAL proved effective in comparison to multiport access regardless of disease severity providing significantly reduced operative access costs(>100€case)and postoperative hospital stay(median 5 d vs 7.5 d,P=0.045)without increasing operative time.It proved especially efficient in those with preoperative albumin>30 g/dL(n=20).Its comparative advantages were further confirmed in ten pairs case-matched for gender,body mass index and preoperative albumin.SAL outcomes proved durable in the intermediate term(median follow-up=20 mo).CONCLUSION Single port total colectomy proved useful in planned and acute settings for patients with medically refractory colitis.Assumptions regarding duration and cost should not be barriers to its implementation.
文摘In this paper using the weight enumerators of a linear [n, k]--code, we give a theorem about minimal codewords. In this n context, we show that while 1 E C if Wmin〉 n/2 in the binary [n, k] --code C, then all of the nonzero codewords of C are 2 minimal. Therefore, we obtain a corollary.
文摘Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme.
基金This study was Supported by grants from the National Nature Science Foundation of China (No. 81170915) and the Research Special Fund for Public Welfare Industry of Health (No. 201202005).
文摘Background Cochlear implant surgery is widely practiced.Minimal incision cochlear implant surgery has been developed with the aims of reducing the impact of surgery on the patient and improving cosmesis while maintaining the low morbidity of conventional wider access approaches.This study aimed to assess the surgical technique and complication rate of minimal incision cochlear implantation (MICI) for children and adults.Methods Data for this study were obtained via a retrospective analysis.Totally 378 patients were included in the study.All patients received minimal incision cochlear implantation,using the skin protector during the process of the operation.The surgical complications of MICI were recorded in a spreadsheet format.The incidence of major and minor complication were analyzed,and appropriate treatment was provided.Results A total of 40 (10.5%) complications were noted in the study.There were 0 life-threatening,9 major,and 31 minor complications.Of the nine major complications,five were device failures,one developed infection and extrusion,and three required receiver-stimulator repositioning.Conclusions MICI is as safe as standard cochlear implantation (SCI) and affords with it other benefits.Eliminating the scalp flap avoids devascularization and minimizes the opportunity of flap infection or necrosis.Complications not related to the flap are similar to SCI.
基金supported by the National Science Foundation of China under Grant Nos.11171366 and 61170257
文摘For a binary linear code,a new relation between the intersection and(2,2)-separating property is addressed,and a relation between the intersection and the trellis complexity is also given.Using above relations,the authors will apply several classes of binary codes to secret sharing scheme and determine their trellis complexity and separating properties.The authors also present the properties of the intersection of certain kinds of two-weight binary codes.By using the concept of value function,the intersecting properties of general binary codes are described.