98%
921
2 minutes
20
A 16-year-old woman identified with colonic distention using chest X-rays visited our hospital. Although abdominal computed tomography (CT), colonoscopy, and barium enema study indicated suspected duplication of the sigmoid colon, the exact portion of communication between the normal colon and the duplicated colon could not be determined. The patient was released, but followed up due to the lack of symptoms. After 7 months, she was urgently re-hospitalized due to the complaint of abdominal pain. Her abdominal CT revealed the wall thickness and distention of the duplication as well as voluminous stool containing barium. After the improvement of her symptoms and on the basis of the inflammatory findings, laparoscopic surgery was performed on the patient. Finally, the lesion was diagnosed as tubular- and continuous-type colonic duplication. Duplication of the colon is a relatively rare occurrence in adulthood. Herein, we report a case of duplication of the sigmoid colon diagnosed prior to surgery in an adult.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.11405/nisshoshi.115.211 | DOI Listing |
Int J Surg Case Rep
August 2025
Pediatric Urology and Pediatric Surgery Department, Hospital Santa Marcelina, Chile.
Introduction And Importance: Sigmoid colon duplication is a rare congenital anomaly, particularly when associated with complex urogenital malformations such as bladder and urethral duplication. These anomalies present significant diagnostic and surgical challenges. We previously reported this patient's case focusing on her genitourinary anomalies.
View Article and Find Full Text PDFInt J Surg Case Rep
June 2025
School of Medicine, College of Medicine and Health Sciences, University of Gondar, Gondar, Ethiopia.
Introduction: Duplication of the appendix is a rare congenital anomaly, occurring in approximately 0.004 % to 0.009 % of the population.
View Article and Find Full Text PDFmSystems
June 2025
Laboratory of Molecular Environmental Microbiology, Department of Environmental Science and Ecological Engineering, Korea University, Seoul, Republic of Korea.
Unlabelled: Threonine, an essential amino acid for translation, exhibits toxicity toward slow-growing cyanobacteria. This prompted us to perform transcriptomic and proteomic analyses using cells treated with threonine, revealing a noteworthy upregulation of , annotated as pyridoxal 5'-phosphate (PLP)-dependent threonine synthase. PyMoL-based structural prediction and biochemical assays unveiled the moonlighting functions of ThrC in both threonine biosynthesis and deamination.
View Article and Find Full Text PDFAuton Neurosci
June 2025
Department of Gastroenterology and Hepatology, Maastricht University Medical Center, Maastricht, the Netherlands; NUTRIM School of Nutrition and Translational Research in Metabolism, Maastricht University, Maastricht, the Netherlands.
Introduction: Visceral hypersensitivity is a hallmark of irritable bowel syndrome (IBS). A putative involvement of the Transient Receptor Potential Ankyrin-1 (TRPA1) cation channel has been suggested by several animal studies. Main objective of this study is to assess location-specific TRPA1 expression in the colonic mucosa and its correlation with symptom severity in IBS patients.
View Article and Find Full Text PDFNetwork
December 2024
Department of Computer Science and Engineering, P.S.R Engineering College, Sivakasi, India.
This study proposes a novel multi-agent system designed to detect Distributed Denial of Service (DDoS) attacks, addressing the increasing need for robust cybersecurity measures. The hypothesis posits that a structured multi-agent approach can enhance detection accuracy and response efficiency in DDoS attack scenarios. The methodology involves a five-stage detection model: (1) Preprocessing using a modified double sigmoid normalization technique to eliminate duplicate data; (2) Feature Extraction where raw data and improved correlation-based features, mutual information, and statistical features are identified; (3) Dimensionality Reduction conducted by a reducer agent to streamline the feature set; (4) Classification utilizing Deep Belief Networks (DBN), Bi-LSTM, and Deep Maxout models, with their weights optimally tuned using the hybrid optimization algorithm, WUJSO; and (5) Decision Making by the decision agent to ascertain the presence of attacks, followed by mitigation through modified entropy-based techniques.
View Article and Find Full Text PDF