Dose calculation with brief-pulse ECT demystified
نویسندگان
چکیده
منابع مشابه
Speed of response in ultrabrief and brief pulse width right unilateral ECT.
Ultrabrief pulse width stimulation electroconvulsive therapy (ECT) results in less cognitive side-effects than brief pulse ECT, but recent work suggests that more treatment sessions may be required to achieve similar efficacy. In this retrospective analysis of subjects pooled from three research studies, time to improvement was analysed in 150 depressed subjects who received right unilateral EC...
متن کاملA Profile of Subjective Memory Impairments during Brief-pulse Bilateral Modified Ect in Patients with Severe Depression
Objective: To examine the short term subjective and objective memory impairments in depressed patients during the course of ECT. Design: prospective and cross sectional design. Place & duration of study: The patients were recruited at the Department of Psychiatry, PGIMER, Chandigarh, for a period of 2 years and followed up for 1 month after treatment with ECT. Subjects & Methods: Patients with ...
متن کاملA brief look at model-based dose calculation principles, practicalities, and promise
Model-based dose calculation algorithms (MBDCAs) have recently emerged as potential successors to the highly practical, but sometimes inaccurate TG-43 formalism for brachytherapy treatment planning. So named for their capacity to more accurately calculate dose deposition in a patient using information from medical images, these approaches to solve the linear Boltzmann radiation transport equati...
متن کاملSimulation of FEL pulse length calculation with THz streaking method
Having accurate and comprehensive photon diagnostics for the X-ray pulses delivered by free-electron laser (FEL) facilities is of utmost importance. Along with various parameters of the photon beam (such as photon energy, beam intensity, etc.), the pulse length measurements are particularly useful both for the machine operators to measure the beam parameters and monitor the stability of the mac...
متن کاملSetuid Demystified
Access control in Unix systems is mainly based on user IDs, yet the system calls that modify user IDs (uid-setting system calls), such as setuid, are poorly designed, insufficiently documented, and widely misunderstood and misused. This has caused many security vulnerabilities in application programs. We propose to make progress on the setuid mystery through two approaches. First, we study kern...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Psychiatry
سال: 2010
ISSN: 0019-5545
DOI: 10.4103/0019-5545.70995