1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anon25 [30]
3 years ago
8

Procedure of autologous transfusion​

Health
1 answer:
Alenkasestr [34]3 years ago
8 0

Answer:

This is the banking of red cell units from the patient before planned surgery.

PAD was stimulated by concerns about viral transmission by donor blood, especially during the HIV epidemic of the early 1980s. With a red cell storage-life of 35 days at 4°C, most healthy adult patients can donate up to three red cell units before elective surgery. Patients may be given iron supplements, sometimes with erythropoietin, to prevent anaemia or allow more donations to be collected. The Blood Safety and Quality Regulations (BSQR, 2005) require that donations for PAD must be performed in a licensed blood establishment, rather than a routine hospital setting. The donations must be processed and tested in the same way as donor blood and are subject to the same requirements for traceability.

Given the current remote risk of viral transfusion-transmitted infection by donor blood in developed countries, the rationale, safety and cost-effectiveness of routine PAD has been severely questioned (see 2007 British Committee for Standards in Haematology (BCSH) Guidelines for Policies on Alternatives to Allogeneic Blood Transfusion. 1. Predeposit Autologous Blood Donation and Transfusion – https://b-s-h.org.uk) and the procedure is now rarely performed in the UK. Although PAD may reduce exposure to donor blood, it does not reduce overall exposure to transfusion procedures or protect against wrong blood into patient episodes due to identification errors at collection from the blood bank or at the bedside. Indeed, the availability of autologous blood may increase the risk of unnecessary transfusion. Most Jehovah’s Witnesses will decline PAD (see Chapter 12). Clinical trials of PAD are mainly small and of low quality and do not provide strong evidence that the risks outweigh the benefits. The BCSH guideline on PAD only recommends its use in ‘exceptional circumstances’, and lists the following indications for PAD:

Patients with rare blood groups or multiple blood group antibodies where compatible allogeneic (donor) blood is difficult to obtain.

Patients at serious psychiatric risk because of anxiety about exposure to donor blood.

Patients who refuse to consent to donor blood transfusion but will accept PAD.

Children undergoing scoliosis surgery (in practice, most specialist units now use other blood conservation measures).

PAD should only be considered in surgery with a significant likelihood of requiring transfusion, operation dates must be guaranteed and the patient’s ability to donate safely must be assessed by a ‘competent clinician’, usually a transfusion medicine specialist. Adverse events and reactions associated with PAD (or other autologous transfusion systems) should be reported to the Serious Hazards of Transfusion (SHOT) haemovigilance scheme and the Medicines and Healthcare Products Regulatory Agency (MHRA).

You might be interested in
Which of the following is not a healthy fat?<br> 1 Omega 10<br> 2 Omega 3<br> 3 Omega 6
chubhunter [2.5K]

Answer: Omega 10  

Explanation:

omega 3 and 6 are both considered healthy fats and are required

3 0
3 years ago
You begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards yo
tamaranim1 [39]

The correct answer would be, Sniffing.

At Gear-up, criminals accessed the company's improperly secured wireless system and stole customers' credit card information as well as employees social security numbers. Gear up faced a computer crime called as Sniffing.

Explanation:

Data or information present on the digital devices are when transferred from one place to another(like through internet), it is transferred in the form of packets. These packets travel from the sender to the receiver through a medium. In a computer crime like Sniffing, these packets are being monitored and captured when passing through a network.

These packets contain information which is retrieved by the sniffers and used to do the criminal activities like stealing and using people's personal banking information, or as mentioned in the question, the social security numbers of Gear up employees were also stolen by the sniffers. All these activities are computer crimes, called as Sniffing.

Learn more about Sniffing at:

brainly.com/question/13700933

#LearnWithBrainly

8 0
3 years ago
Inadvertent behaviours means that you intentionally treat someone unfairly? True or False
Katyanochek1 [597]

Answer:

true

Explanation:

not resulting from or achieved through deliberate planning.

5 0
3 years ago
Read 2 more answers
What is kaycies net income
JulijaS [17]

Answer:

$1,195

Explanation:

5 0
3 years ago
Read 2 more answers
Help plzzz with this ite worth 35 points!​
marishachu [46]

Answer:

acheive full potential

6 0
3 years ago
Read 2 more answers
Other questions:
  • Helpppp ??? Pleasessss
    6·2 answers
  • Which of the following is NOT a function of the cervix?
    12·1 answer
  • A charge nurse is evaluating a plan of care that a novice nurse
    15·1 answer
  • a teenage boy who was involved in a bicycle accident has a puncture wound where the bicycle kick stand impaled his leg. The most
    13·2 answers
  • Females have a longer life expectancy than males true or false
    7·1 answer
  • Which of the following is a likely effect of eating a high-glycemic carbohydrate by itself?
    13·1 answer
  • What is the difference between need and desire​
    12·2 answers
  • Would u rather live without your family or without you parents
    5·2 answers
  • This is hard to me but can i get help please
    9·1 answer
  • What does it feel like when you have a blood clot in your leg?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!