纤维喉镜治疗咽部异物的优缺点

来源 :武警医学 | 被引量 : 0次 | 上传用户:MyraChen
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
目的探讨纤维喉镜检查和治疗咽部异物的优点和缺点。方法用纤维喉镜检查和治疗88例疑难性咽部异物,分析临床资料。结果88例中发现并取出异物60例,未发现异物28例,随访1~4周无咽部异物。一次成功钳取异物57例(95%);行二次手术取出3例(5%),所有病例无手术并发症发生。结论纤维喉镜检查及钳取咽部疑难性异物较间接喉镜有明显优势,但应克服其缺点。 Objective To investigate the advantages and disadvantages of fiberopharyngoscopy in the treatment of throat foreign bodies. Methods Fetal laryngoscope examination and treatment of 88 cases of intractable throat foreign body, analysis of clinical data. Results Of 88 cases, 60 cases of foreign bodies were found and removed, 28 cases of foreign bodies were not found. No foreign body was observed in 1 to 4 weeks follow-up. Fifty-seven (95%) foreign bodies were successfully grasped by a successful clamp and three cases (5%) were removed by two surgeries. No complications occurred in all the cases. Conclusions Fibrolaryngoscopy and pliers extraction of difficult throat foreign body than the indirect laryngoscope has obvious advantages, but should overcome its shortcomings.
其他文献
To address cross-ISP traffic problem caused by BitTorrent, we present our design and evaluation of a proximity-aware BitTorrent system. In our approach, clients
IPTV中间件技术依然存在关键问题IPTV的中间件作为在IPTV业务发展中长期的热点问题,一直受到各方关注,并且取得了一定的进展。中国电信和中国网通在实际业务推广过程中,已 I
2007即将在新年的钟声中远去,要盘点这一年的热门话题,雅虎与谷歌是不可绕过的。12月中旬,两大搜索巨头先后公布各自平台的2007年十大搜索关键词,其中雅虎还特别推出了10大IT
心血管疾病患者有发生猝死的潜在危险性,寻求有效的高危预测指标为患者进行危险分层和预后判断,对延长患者的生存时间有重要的意义。目前运用的无创方法如左室射血分数、心率
小学三年级是作文教学的起步阶段,从一二年级的写话,到中高年级的习作,是从“句段”到“篇章”的过渡,写作上难度的加大,使得很多学生无从下手.表现为:很多学生不知道如何布
期刊
在不断探索和实践新课改的理念中,提高英语课堂教学的有效性可以通过好的教学方法,好的教学方法是教师开展教学活动的基本保证。激发学生的学习动机、调动学生学习的积极性,
This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model, this paper implements a mandatory acce
本文通过对荣华二采区10
期刊
目的了解大连市农贸市场、餐饮外环境、绿化带和居民区等不同生态环境蝇类种群构成及其季节变化规律,为蝇类防制提供科学依据。方法 2013年4—11月采用捕蝇笼法调查不同环境
Canetti and Herzog have already proposed universally composable symbolic analysis (UCSA) to analyze mutual authentication and key exchange protocols. However, t