A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 176

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016

File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Risk factors for surgical site infection after general surgery in HIV-infected patients: a retrospective study. | LitMetric

Risk factors for surgical site infection after general surgery in HIV-infected patients: a retrospective study.

BMC Infect Dis

Department of Internal Medicine, Bojishan Hospital, South Boji shan Road, Shizhong District, Jinan, Shandong Province, 250002, People's Republic of China.

Published: November 2024

Background: As the number of HIV-infected patients increased, the number of patients requiring general surgery has subsequently increased. However, impairment of immune function due to HIV infection increases the risk of postoperative surgical-site infection and significant harm to patient health. This study aimed to examine the risk factors for surgical-site infection after general surgery.

Methods: The patients' data were from Zunyi fourth hospital medical information system. Machine learning based Boruta algorithm were used for variable screening. Univariable and multivariable logistic regression and restricted cubic spline analysis were performed to examine the relationship between significant variables and surgical-site infection.

Results: A total of 125 general surgery postoperative HIV-infected patients participated in the study. Surgical-site pathogen culture identified Escherichia coli, Klebsiella pneumoniae, and mixed bacteria as the three most common pathogens causing Surgical-site infection. Univariable and multivariable logistic regression analysis to adjust for risk factors identified type III surgical incision (OR = 9.92, 95% CI = 1.28-76.75) and elevated preoperative white blood cell (WBC) count (OR = 1.30, 95% CI = 1.12-1.51) as independent risk factors for postoperative surgical-site infection, whereas CD4 + T lymphocyte count greater than 400 cells/µL was identified as a protective factor (OR = 0.23, 95% CI = 0.09-0.60) while. The restricted cubic spline analysis results directly reflected the dose-response relationship between continuous variables and postoperative surgical-site infection.

Conclusions: Type III incision and an elevated WBC count pose a higher risk of postoperative surgical-site infection. A CD4 + T lymphocyte counts greater than 400 cells/µL provided a protective effect of lower risk of surgical site infection. Preoperative serum neutrophil percentage, albumin level, red blood cell count, and serum urea level within a specific range were beneficial in reducing the risk of incisional infections. Our research provides a theoretical basis for clinical practice.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11562515PMC
http://dx.doi.org/10.1186/s12879-024-10166-wDOI Listing

Publication Analysis

Top Keywords

surgical-site infection
20
risk factors
16
postoperative surgical-site
16
general surgery
12
hiv-infected patients
12
risk
8
surgical site
8
infection
8
site infection
8
infection general
8

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!