Surgical Technique for Oblique Lumbar Interbody Fusion
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization :
Other organizations : Kyungpook National University, Kyungpook National University Hospital, Korea University, Keimyung University, Chosun University
Variable analysis
- Surgical technique used for OLIF
- Not explicitly mentioned
- Patients were briefly placed in the right lateral decubitus position for the left-sided retroperitoneal approach
- Surgical level of the disc was marked on the skin in true lateral view under C-arm fluoroscopy
- Oblique skin incision was made 3–5 cm ventral to the anterior margin of the intervertebral disc
- After dissecting the 3 layers of the abdominal wall muscles, the peritoneal fat was identified
- The disc annulus was exposed through an open corridor between the psoas muscle and peritoneum
- At the anterior border of the psoas muscle, the plane between the disc annulus and the psoas muscle was bluntly dissected using a peanut gauze ball to not injure the psoas muscle bundle
- A slight dorsal retraction of the psoas muscle was applied during tubular retractor fixation
- The entire surgery was performed using a Medtronic OLIF system (Medtronic, Memphis, TN, USA) with a minimally invasive tubular retractor, fusion material (Grafton, Medtronic), and a percutaneous pedicle screw fixation system (either Sextant or Longitude system, Medtronic)
- Posterior decompression was not performed on any of the patients included in this study
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!