The largest database of trusted experimental protocols

Stealth navigation system

Manufactured by Medtronic
Sourced in United States

The Stealth navigation system is a medical device designed to provide precision guidance and localization during surgical procedures. It utilizes advanced imaging and tracking technologies to assist healthcare professionals in accurately navigating surgical instruments within the patient's anatomy. The core function of the Stealth navigation system is to enhance the accuracy and efficiency of surgical interventions.

Automatically generated - may contain errors

Lab products found in correlation

3 protocols using stealth navigation system

1

Navigated Spinal Instrumentation Surgery

Check if the same lab product or an alternative is used in the 5 most similar protocols
The application of navigation and robotics in spine surgery is relatively new. Its promise to improve the efficiency and precision of inserting spinal instrumentation serves the needs of outpatient surgery well.10 (link)
Mal-positioned hardware can cause increased pain and, along with the need for possible re-operation, can lead to extended stays. The Stealth Navigation System with O-arm image acquisition was used for most cases (Medtronic Spine, Minneapolis, MN, USA).
+ Open protocol
+ Expand
2

Cerebellar Stimulation Guided by fMRI

Check if the same lab product or an alternative is used in the 5 most similar protocols
In one motor mapping patient (63 year-old male, M4) with a fourth ventricular ependymoma, pre-operative functional MRI was undertaken in order to increase the likelihood of locating sites for cerebellar stimulation to evoke a peripheral response. The sensorimotor fMRI paradigm involved the patient moving their fingers or toes at an irregular rhythm directed by the flashing words ‘fingers’ or ‘toes’ on an LCD screen8 (link). fMRI data were analysed using the FSL software package (http://fsl.fmrib.ox.ac.uk). The functional data were uploaded onto the Stealth navigation system (Medtronic, Minneapolis, USA). The fMRI data and the T1 structural scan (Magnetization-Prepared Rapid Gradient-Echo sequence, MPRAGE41 (link)) were in NIfTI (Neuroimaging Informatics Technology Initiative) format. These were converted to DICOM (Digital Imaging and Communications in Medicine) format compatible to the Stealth navigation system. These were then transformed onto the subject’s T1 structural MRI scan. Cerebellar surface stimulation was carried out at the closest, accessible surface site from the BOLD activated area within the cerebellum.
+ Open protocol
+ Expand
3

Cerebellar fMRI-Guided Stimulation

Check if the same lab product or an alternative is used in the 5 most similar protocols
In one motor mapping patient (63 year-old male, M4) with a fourth ventricular ependymoma, pre-operative functional MRI was undertaken in order to increase the likelihood of locating sites for cerebellar stimulation to evoke a peripheral response. The motor fMRI paradigm involved the patient moving their ngers or toes at an irregular rhythm directed by the ashing words ' ngers' or 'toes' on an LCD screen 8 . fMRI data were analysed using the FSL software package (http://fsl.fmrib.ox.ac.uk). The functional data were uploaded onto the Stealth navigation system (Medtronic, Minneapolis, USA). The fMRI data and the T1 structural scan (Magnetization-Prepared Rapid Gradient-Echo sequence, MPRAGE 40 (link) ) were in NIfTI (Neuroimaging Informatics Technology Initiative) format. These were converted to DICOM (Digital Imaging and Communications in Medicine) format compatible to the Stealth navigation system. These were then transformed onto the T1 structural MRI scan. Cerebellar surface stimulation was carried out at the closest, accessible surface site from the BOLD activated area within the cerebellum.
Authors comply with the publication's requirements for sharing materials.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!