• Title/Summary/Keyword: 이식부 거부

Search Result 4, Processing Time 0.025 seconds

Compamative Study of Tracheal Anastomotic Techniques. (기관 문합 수기의 비교 실험)

  • 송원영;이연재
    • Journal of Chest Surgery
    • /
    • v.30 no.12
    • /
    • pp.1219-1224
    • /
    • 1997
  • Although several reports were presented recently about bronchial arterial revascularization in clinical lung transplantation, one factor peculiar to the lung transplantation is the ischemia of the donor bronchus. Poor bronchial healing occurs frequently following clinical lung transplantation and this has been major cause of mortality and morbidity. There have been many attempts to solve bronchial anastomotic complications. Telescoping technique, one of those attempts, was advocated by San Antonio Group recently. This experiment was per(armed to evaluate the effect of telescoping anastomotic technique upon th healing of the tracheo-bronchial anastomosis. We used rabbits(weighing about 800 g) as experimental animal. Method: Resection of middle one third of cervical trachea and reanastomosis was performed by simple interrupted anastomotic technique in Group 1(n=15) and by telescoping anastomotic technique in Group 2(n= 15). Result: Anastomotic sites in the telescoping technique group showed significant increase of fibrosis in the early postoperative days(< Sdays) and remarkable band-like fibrous union compared to the simple interrupted group.

  • PDF

Successful Bilateral Lung Retransplantation in a Patient with Primary Graft Failure Following a Single Lung Transplantation (일측 폐 이식 후 발생한 이식편 부전으로 양측 폐 재이식을 시행한 1예 보고)

  • Hwang Jung-Joo;Joung Eun-Kyu;Kim Jae-Ho;Lee Doo-Yun;Paik Hyo-Chae
    • Journal of Chest Surgery
    • /
    • v.39 no.6 s.263
    • /
    • pp.490-494
    • /
    • 2006
  • Lung transplantation is the choice of treatment for selected patients with end-stage pulmonary disease. However, retransplantation of the lung due to primary graft failure carries a high risk of morbidity and mortality. This is a case of a 52 year old male with emphysema who continuously needed a ventilator care and a tracheostomy. He underwent a left single lung transplantation but were not able to wean from the ventilator due to primary graft failure, and therefore we decided to do a retransplantation. Bilateral sequential single lung transplantation was performed under the cardiopulmonary bypass. The patient recovered quite well and was discharged and fully active with his work. Retransplantation although it carries a high risk, is a very effective treatment in patients with primary graft failure.

Allograft Immune Reaction of Kidney Transplantation Part 1. Mechanism of Allograft Rejection (신이식 후 면역반응의 이해 - 1부. 이식 거부 반응의 기전 -)

  • Kang, Hee-Gyung
    • Childhood Kidney Diseases
    • /
    • v.12 no.1
    • /
    • pp.23-29
    • /
    • 2008
  • Kidney allograft transplantation is the most effective method of renal replacement for end stage renal disease patients. Still, it is another kind of 'disease', requiring immunosuppression to keep the allograft from rejection(allograft immune reaction). Immune system of the allograft recipient recognizes the graft as a 'pathogen (foreign or danger)', and the allograft-recognizing commanderin-chief of adaptive immune system, T cell, recruits all the components of immune system for attacking the graft. Proper activation and proliferation of T cell require signals from recognizing proper epitope(processed antigen by antigen presenting cell) via T cell receptor, costimulatory stimuli, and cytokines(IL-2). Thus, most of the immunosuppressive agents suppress the process of T cell activation and proliferation.

  • PDF

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.