نتایج جستجو برای: preload

تعداد نتایج: 2662  

Journal: :The Annals of Thoracic Surgery 2013

Journal: :Journal of Veterinary Internal Medicine 1987

2010
Moses M. Kitakule Paul Mayo

Determining the appropriate amount of fluid resuscitation to administer to a critically ill patient is a complex decision. Traditional tools for the assessment of preload sensitivity such as central venous pressure (CVP) and pulmonary artery occlusion pressure (PAOP) are inaccurate in predicting whether a patient requires volume resuscitation [1]. Diagnostic ultrasonography in the form of echoc...

Journal: :MATEC web of conferences 2023

transmission towers have been subjected to alternating loads caused by the galloping of iced conductors for a long time, and their fastening bolts are easy loosen or break, which seriously threatens safe operation lines. Through transverse vibration test M20 commonly used in towers, frequency amplitude changed, change law preload bolt joints is studied. The results show that with increase initi...

Journal: :Medicina intensiva 2012
C Sabatier I Monge J Maynar A Ochagavia

Volume expansion is used in patients with hemodynamic insufficiency in an attempt to improve cardiac output. Finding criteria to predict fluid responsiveness would be helpful to guide resuscitation and to avoid excessive volume effects. Static and dynamic indicators have been described to predict fluid responsiveness under certain conditions. In this review we define preload and preload-respons...

2001
Voronov

+*Patwardhan, A (A-VA RR&D); **Carandang, G (A-VA RR&D); *Ghanayem, A (A-VA RR&D); **Voronov, L; **Havey, R (A-VA RR&D); ***Phillips, F; ***Cunningham, B; **Simonds, J (A-VA RR&D); **Meade, K (A-VA RR&D); **Lim, T (A-VA RR&D); **Gavin, T; *Zindrick, M +*Loyola University Medical Center, Maywood, IL. Department of Orthopaedic Surgery, 2160 S. First Avenue, Maywood, IL 60153, 708-202-5804, Fax: 7...

Journal: :Ad Hoc Networks 2009
Wensheng Zhang Sencun Zhu Guohong Cao

When a sensor network is deployed in a hostile environment, an adversary may launch such attacks as eavesdropping the communications and compromising sensor nodes. Using the compromised nodes, he may inject false sensing reports or modify the reports sent by other nodes. To defend against these attacks, researchers have proposed symmetric group key-based schemes. In these schemes, however, if a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید