Objectives: The purposes of this article are to describe Byzantine varicose vein surgery and to note its influence on the development of these operations after that time. A study and analysis of the original texts of the Byzantine physicians, written in Greek and containing the now mostly lost knowledge of the earlier Hellenistic and Roman periods, was undertaken.
Results: The Byzantines paid special attention to varicosis surgery from the early period of the empire. The famous fourth-century (ce) physician Oribasius meticulously described a number of surgical methods of confronting varicosis, some of which were derived from the texts of earlier Greek surgeons, to which he added his own keen observations. Later, eminent Byzantine physicians developed these techniques further and evaluated their usefulness.
Conclusions: The study of Byzantine medical texts proves that several surgical techniques on varicosis were widely practiced in Byzantine times and were derived from the work of ancient Greek and Roman physicians. The techniques described had a great influence on western medieval and later European surgery, thus constituting significant roots of modern angiology.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1067/mva.2001.107990 | DOI Listing |
Sci Rep
December 2024
School of Information Engineering, Yangzhou University, Yangzhou, Jiangsu, China.
Consensus algorithms play a critical role in maintaining the consistency of blockchain data, directly affecting the system's security and stability, and are used to determine the binary consensus of whether proposals are correct. With the development of blockchain-related technologies, social choice issues such as Bitcoin scaling and main chain forks, as well as the proliferation of decentralized autonomous organization (DAO) applications based on blockchain technology, require consensus algorithms to reach consensus on a specific proposal among multiple proposals based on node preferences, thereby addressing the multi-value consensus problem. However, existing consensus algorithms, including Practical Byzantine Fault Tolerance (PBFT), do not support nodes expressing preferences.
View Article and Find Full Text PDFSci Rep
December 2024
Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq.
Vehicular Ad-hoc Networks (VANETs) are growing into more desirable targets for malicious individuals due to the quick rise in the number of automated vehicles around the roadside. Secure data transfer is necessary for VANETs to preserve the integrity of the entire network. Federated learning (FL) is often suggested as a safe technique for exchanging data among VANETs, however, its capacity to protect private information is constrained.
View Article and Find Full Text PDFJ Med Syst
November 2024
Department of Electronic Engineering, City University of Hong Kong, 999077, Kowloon Tong, Hong Kong.
In recent years, Electronic health records (EHR) has gradually become the mainstream in the healthcare field. However, due to the fact that EHR systems are provided by different vendors, data is dispersed and stored, which leads to the phenomenon of data silos, making medical information too fragmented and bringing some challenges to current medical services. Therefore, in view of the difficulties in sharing EHR between medical institutions, the risk of privacy leakage, and the lack of EHR usage control by patients, an EHR sharing model based on consortium blockchain is proposed in this paper.
View Article and Find Full Text PDFEntropy (Basel)
August 2024
National Key Laboratory of Wireless Communications, University of Electronic Science and Technology of China, Chengdu 611731, China.
Secure distributed matrix multiplication (SDMM) schemes are crucial for distributed learning algorithms where extensive data computation is distributed across multiple servers. Inspired by the application of repairing Reed-Solomon (RS) codes in distributed storage and secret sharing, we propose SDMM schemes with reduced communication overhead through the use of trace polynomials. Specifically, these schemes are designed to address three critical concerns: (i) ensuring information-theoretic privacy against collusion among servers; (ii) providing security against Byzantine servers; and (iii) offering resiliency against stragglers to mitigate computing delays.
View Article and Find Full Text PDFMed Hist
July 2024
Martin-Buber-Institute for Jewish Studies, University of Cologne, Albertus-Magnus-Platz, 50923Köln, Germany.
Premodern medicine used a variety of mineral substances for therapeutic purposes. The present article deals with pitch-asphalt, and, in particular, a precious kind of it called originating in Persia. It was first described in detail in the Arabic pharmacological tradition, and its fame spread throughout the medieval Mediterranean, including Byzantium.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!