Sunday, January 26, 2020

Digital Communication Simulation Using Matlab Computer Science Essay

Digital Communication Simulation Using Matlab Computer Science Essay Objective Aim Scope of the assignment The objective of this assessment is to model and analyse modulation and coding in Communication Systems using Matlab.[1] This lab exercise aims to teach (show) modulation demodulation techniques like QAM 64 over AWGN wireless channel throw Matlabs Communication toolbox. In task 1, simulation and analysis of modulation and demodulation (using the 64-QAM) is been perform. By use of Matlabs high performance language, a designed code is been given in each task. Transmitted and received signals are been show in scatter plots at different SNR values. Simulation of the rectangular pulse shaping filter in combination with modulation is been introduced in the second part. The effect of rectangular pulse shaping is been used at the transmitter side after the QAM-64 modulation. Integrate and dump operation effect is been used at the receiver side. A full analysis of these two effects is been given below. In both tasks, the transmission is being over an AWGN (Additive White Gaussian Noise) wireless communication channel. Comparison, analysis and a discussion of the results is been given below each task. Introduction on general modulation/demodulation and 64-QAM AWGN channel, noise and rectangular pulse shaping Modulation Demodulation Modem In the area of telecommunications, modulation is the process of changing a periodic waveform (i.e. a tone), in order to use that signal to transfer a message. Normally the carrier signal (usually is a sinusoidal) has higher frequency than the input signal. Amplitude, phase and frequency are the three key parameters of a sine wave. These parameters can be modified in accordance with a low frequency information signal to obtain the modulated signal. Amplitude modulation (AM), frequency modulation (FM) and phase modulation are the most common analog modulation techniques. Radio and television broadcast stations typically use AM or FM. More complex forms of modulation are Phase Shift Keying (PSK), Amplitude Shift Keying (ASK) and Frequency Shift Keying (FSK) which are the three basic digital modulation techniques. A device that performs modulation is known as a modulator and a device that performs the inverse operation of modulation is known as a demodulator. A modulator converts a digital signal to an analog signal (typically a sinusoidal signal) and a demodulator converts a modulated (analog) signal back to the original unmodulated (digital) signal.[2] A few years ago a computer was connected to the internet through a modem (in now days a different type is being used, ADSL modem/router) over a regular analog line. A modem converts an outgoing digital signal to an outgoing modulated signal, and converts an incoming modulated signal to an incoming digital signal.[2] Modulation is used to change the signals bandwidth so it can be transmitted on a limited-bandwidth communication channel (like a telephone line or a cable TV channel) without too much distortion.[2] It also allows more connected users on the same communication link. Digital modulation Digital modulation schemes transform digital signals into waveforms that are compatible with the nature of the communications channel. There are two major categories of digital modulation. One category uses a constant amplitude carrier and the other carries the information in phase or frequency variations (FSK, PSK). The other category conveys the information in carrier amplitude variations and is known as amplitude shift keying (ASK). In digital communications, modulation is often expressed in terms of I and Q. This is a rectangular representation of the polar diagram. On a polar diagram, the I axis lies on the zero degree phase reference, and the Q axis is rotated by 90 degrees. The signal vectors projection onto the I axis is its I component and the projection onto the Q axis is its Q component.[5] Figure 1 I-Q format [5] Figure 2 Trends in the industry [5] Main Digital Modulation Schemes Techniques Amplitude Shift Keying (ASK) Amplitude shift keying represents digital data as variations in the amplitude of a carrier wave. There is an on/off transmission that represents the binary logic 1/0. ASK has poor performance cause is heavily affected by noise and interference. For binary digital modulation, BASK is the simpler form of ASK. Figure 3 Amplitude Shift Keying (ASK) [3] Frequency Shift Keying (FSK) The carriers frequency is modulated by the digital signal. 1/0 represented by two different frequencies slightly offset from carrier frequency.[4] That means that is a different frequency for 1 and another frequency for 0. FSK can be expanded to a M-ary scheme, employing multiple frequencies as different states.[3] For binary digital modulation BFSK is the simpler form of FSK. Figure 4 Frequency Shift Keying (FSK) [3] Phase Shift Keying (PSK) Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing, or modulating, the phase of the carrier wave. Phases are separated by 180o. Phase modulation can be achieved simply by defining a relative phase shift from the carrier, usually equi-distant for each required state. Therefore a two level phase modulated system, such as Binary Phase Shift Keying, has two relative phase shifts from the carrier, + or 90o. Phase modulation requires coherent generation and as such if an IQ modulation technique is employed this filtering can be performed at baseband. [6] Figure 5 Phases separated by 180o on BPSK [4] Figure 6 Phase Shift Keying (PSK) [3] Multi-Symbol Signalling M-ary Signals Multiple-symbol signaling is the process where multiple levels are used to encode binary information into groups of two bite, four bits, etc. [8] Figure 7 M-ary signals [3] Amplitude and phase shift keying can be combined to transmit several bits per symbol (in the above figure M=4). These modulation schemes are often refered to as linear, as they require linear amplification. 16-QAM has the largest distance between points, but requires very linear amplification. 16PSK has less stringent linearity requirements, but has less spacing between constellation points, and is therefore more affected by noise. M-ary schemes are more bandwidth efficient, but more susceptible to noise. [3] Quadrature Phase Shift Key Modulation (QPSK) Quadrauture Phase Shift Keying is a form of PSK. QPSK is a system of modulating digital signals onto a radio-frequency carrier signal using four phase states to code two digital bits. QPSK is effectively two independent BPSK systems (I and Q), and therefore exhibits the same performance but twice the bandwidth efficiency. QPSK can be filtered using raised cosine filters to achieve excellent out of band suppression. Large envelope variations occur during phase transitions, thus requiring linear amplification. [3] Figure 8 QPSK [4] Quadrature amplitude modulation (QAM) Quadrature amplitude modulation is a combination of amplitude modulation and phase shift keying. It is a modulation scheme-technique which conveys data by modulating the amplitude of two carrier waves. That is an amplitude modulation on both quadrature carriers. These two waves, usually sinusoids, are out of phase with each other by 90Â ° and are that is why they called quadrature carriers. QAM has extensive use in digital microwave radio links. The 16-QAM below stands for 2n discrete levelsÆ’Â   n=2 same as in the above QPSK. Figure 9 16-QAM Figure 10 16-QAM [7] Additive White Gaussian Noise (AWGN) Additive means that the sum of the transmitted signal and noise produce the received signal. White means that its two sided power spectral density is flat for all frequencies of interest for radio communication system. The amplitude of the noise is distributed according to a normal or Gaussian distribution. [8] Its information gives a single impairment. Noise pulse shaping and rectangular pulse shaping In digital telecommunications, pulse shaping can be used to change the waveform of transmitted pulses, so the signal bandwidth matches that of the communication channel, reducing distortion and intersymbol interference. In other words its purpose is to make the transmitted signal suit better to the communication channel by limiting the effective bandwidth of the transmission. Modulation is often followed by pulse shaping. Rectangular pulse shaping repeats each output from the modulator a fixed number of times to create an up-sampled signal. Rectangular pulse shaping can be a first step or an exploratory step in algorithm development, though it is less realistic than other kinds of pulse shaping. If the transmitter up-samples the modulated signal, then the receiver should down-sample the received signal before demodulating. The integrate and dump operation is one way to down-sample the received signal. [8] Demodulation is often preceded by a filtering or an intergrate and dump-operation. Answers to assignments tasks Task 1 In this assignment you are required to design and implement the process of modulating a random binary data stream using 64-level QAM (quadrature amplitude modulation), transmitting it over an AWGN (Additive White Gaussian Noise) wireless communication channel, and demodulating the received signal using the 64- QAM demodulator. Your system should consist of a baseband modulator, AWGN channel, and a demodulator. The following table indicates some relevant functions from the Matlab Communications Toolbox which may be used in this assignment. The functions for 64-QAM modulator/demodulator can be taken from the Matlab Communications Toolbox, or even implemented by you. Job Function Generate a random binary data stream randint Add white Gaussian noise awgn Create a scatter plot scatterplot Compute the systems BER biterr The length of the binary data stream (i.e., the number of the rows in the column vector) is set to 5000. Task 1.1 Write codes to 1) Display the transmitted and received signals in different scatter plots for the following two situations: a) SNR = 40 dB; b) SNR = 14dB; 2) Compute the systems bit error rate (BER) for the two situations. Answer 1.1 1a) The m-file for SNR=40dB x=randint(4998,1); %Random binary data stream of 4998 digits %Bits to symbols mapping xsymbols=bi2de(reshape(x,6,length(x)/6).,left-msb); y=qammod(xsymbols,64); %Modulation using the 64-QAM yTx=y; %Transmitted signal scatterplot(yTx) grid; title(Transmitted Signal) %Transmission over an Additive White Gaussian Noise channel,SNR=40dB ynoise=awgn(yTx,40,measured); yRx=ynoise; %Received signal scatterplot(yRx) grid; title(Received Signal, SNR=40dB) zsymbols=qamdemod(yRx,64); %Demodulation using the 64-QAM z=de2bi(zsymbols,left-msb); %Symbols to bits mapping z=reshape(z.,prod(size(z)),1); %Computation of Number of Erros and Bit Error Rate [Number_of_errors,Bit_Error_Rate]=biterr(x,z) Figure 11 Transmitted signal Figure 12 Received signal 1b) The m-file for SNR=14dB x=randint(4998,1); %Random binary data stream of 4998 digits %Bits to symbols mapping xsymbols=bi2de(reshape(x,6,length(x)/6).,left-msb); y=qammod(xsymbols,64); %Modulation using the 64-QAM yTx=y; %Transmitted signal scatterplot(yTx) grid; title(Transmitted Signal) %Transmission over an Additive White Gaussian Noise channel,SNR=40dB ynoise=awgn(yTx,14,measured); yRx=ynoise; %Received signal scatterplot(yRx) grid; title(Received Signal, SNR=14dB) zsymbols=qamdemod(yRx,64); %Demodulation using the 64-QAM z=de2bi(zsymbols,left-msb); %Symbols to bits mapping z=reshape(z.,prod(size(z)),1); %Computation of Number of Erros and Bit Error Rate [Number_of_errors,Bit_Error_Rate]=biterr(x,z) Figure 13 Transmitted signal Figure 14 Received signal 2) Computation of the systems bit error rate for the two situations SNR=40dB SNR=14dB Task 1.2 Compare/explain in detail the results obtained in a) and b), and explain clearly how the differences come from. Answer 1.2 In the above code, there is a bit to symbol mapping. A bit cant take values from 0-63 but a group of bits can. The two transmitted signals are identical cause both signals modulated with the same modulation schemes (64-QAM) and transmitted throw the same channel (Additive White Gaussian Noise wireless channel). Received signals have different scatter plot. This happens cause the first received signal was transmitted throw a channel with SNR=40dB and the other one was transmitted throw a channel with SNR=14dB. In the second scatter plot it is obvious that the channel is too noisy in accordance with the first scatter plot which seems that it hasnt got any clue of noise. For example, if a ADSL line has SNR lower than 15dB then several problems occurred like frequent disconnections etc. According to scatter plots the bit error rate and the number of errors for the first signal with SNR=40 was expected to be 0 cause the channel was clear from noise. On the contrary, for the second signal with SNR=14dB bit error rate and number of errors expected to be non zero. Both expectations verified. The ratio of the signal strength to the noise level is called the signal to- noise ratio (SNR), . If the SNR is high (ie. the signal power is much greater than the noise power) few errors will occur. However, as the SNR reduces, the noise may cause symbols to be demodulated incorrectly, and errors will occur. [3] Task 2 Modulation is often followed by pulse shaping, and demodulation is often preceded by a filtering or an integrate-and-dump operation. In this task you are required to investigate the effect of rectangular pulse shaping by using it at the transmitter side after the 64-QAM modulation and also the effect of integrate-and-dump operation at the receiver side. Rectangular pulse shaping repeats each output from the modulator a fixed number of times to create an upsampled signal. If the transmitter upsamples the modulated signal, then the receiver should downsample the received signal before demodulation. The integrate-and-dump operation is one way to downsample the received signal. The following table indicates the additional relevant functions from the Matlab Communications Toolbox which may be used in this assignment. Job Function Rectangular pulse shaping rectpulse Intergrate-and-dump downsampling Intdump Task 2.1 Write codes to 1) Display the received signals in scatter plots when a) SNR = 40 dB; b) SNR = 14dB; 2) Compute the systems bit error rate (BER) for the two situations. Answer 2.1 1a) The m-file for SNR=40dB %Random binary data stream of 5004 digits x = randint(5004,1); %Bit to Symbol Mapping xsymbols = bi2de(reshape(x,6,length(x)/6).,left-msb); %Modulation using the 64-QAM. y = qammod(xsymbols,64); %Pulse shaping, 3 samples per symbol shaped=rectpulse(y,6); %Transmitted Signal yTx = shaped; scatterplot(yTx) title(Transmitted signal) grid; %Transmission over an Additive White Gaussian Noise channel,SNR=14dB ynoise = awgn(yTx,40,measured); %Received Signal yRx = ynoise ; %Integrate and dump deshaped=intdump(yRx,6); scatterplot(deshaped) title(Received signal,SRN=40dB) grid; %Demodulation using the 64-QAM zsymbols = qamdemod(deshaped,64); %Symbol to bit mapping > to perform the computation of BER z = de2bi(zsymbols,left-msb); a = reshape(z.,prod(size(z)),1); %Computation of Number of Erros and Bit Error Rate [Number_of_errors,Bit_Error_Rate] = biterr(x,a) Figure 15 Received signal,SNR=40dB 1b) The m-file for SNR=14dB %Random binary data stream of 5004 digits x = randint(5004,1); %Bit to Symbol Mapping xsymbols = bi2de(reshape(x,6,length(x)/6).,left-msb); %Modulation using the 64-QAM. y = qammod(xsymbols,64); %Pulse shaping, 3 samples per symbol shaped=rectpulse(y,6); %Transmitted Signal yTx = shaped; scatterplot(yTx) title(Transmitted signal) grid; %Transmission over an Additive White Gaussian Noise channel,SNR=14dB ynoise = awgn(yTx,14,measured); %Received Signal yRx = ynoise ; %Integrate and dump deshaped=intdump(yRx,6); scatterplot(deshaped) title(Received signal,SRN=14dB) grid; %Demodulation using the 64-QAM zsymbols = qamdemod(deshaped,64); %Symbol to bit mapping > to perform the computation of BER z = de2bi(zsymbols,left-msb); a = reshape(z.,prod(size(z)),1); %Computation of Number of Erros and Bit Error Rate [Number_of_errors,Bit_Error_Rate] = biterr(x,a) Figure 16 Received signal,SNR=14dB 2) Computation of the systems bit error rate for the two situations SNR=40dB SNR=14dB Task 2.2 Compare/explain the results with those obtained in Task 1, and explain clearly how the differences come from. Answer 2.2 The difference between Task1 and Task 2 are the rectangular pulse shaping and integrate and dump operation. Rectangular pulse shape upsampling the signal after modulation. It actually applies a square pulse to the signal and repeats each symbol several times (in this case symbols are repeated 6 times). The dump operation is downsampling the signal. It is actually an integral of the signal for a single period. In this case, modulation followed by pulse shaping and demodulation preceded by integrate and dump operation. Since rectangular pulse shaping repeats each output from the modulator a fixed number of times then we expected our signals to be better than those in task1. This expectation came true since BER for SNR=40 dB is 0 and for SNR=14 dB is 0.0038. In the second case when SNR=14 dB it is obvious that BER and number of errors reduced dramatically. The filtering on the transmitter causes intersymbol interference. The filtering at the transmitter and the channel typically cause the received pulse sequence to suffer from interysmbol interference and this appear as an amorphous smeared signal, not quite ready for sampling and detection. When the channel bandwidth is much greater than the pulse bandwidth, the spreading of the pulse will be slight. When the channel bandwidth is close to the signal bandwidth, the spreading will exceed symbol duration and cause signal pulses to overlap. This overlapping is called intersymbol interference. [11] Rectangular pulse shaping was used to minimize distortion and the effect of intersymbol interference. It made the transmitted signal fit better to the communication channel by limiting the effective bandwidth of the transmission. The BER and number of errors improvement succeeded because symbols were sent several times. In this case, filtering made the signal better. Without filtering, signals would have very fast transitions between states and therefore very wide frequency spectra much wider than is needed for the purpose of sending information. [5] Conclusions If the SRN value is high enough, the received signal is almost clear from noise. High SNR value stands for a value close to zero for Bit Error Rate. In the presence of noise and interference, it is necessary to increase signal power to reduce the possibility of errors. The bit error rate (BER) of a system indicates the quality of the link. Filtering is essential for good bandwidth efficiency. High level M-array schemes (such as 64-QAM) are very bandwidth-efficient but more susceptible to noise and require linear amplification. [3]

Saturday, January 18, 2020

9 Tips for Public Speaking

I remember the very first time I have to give a public speech. That was an amazing experience because I’ve never have that feeling before in my entire life, it’s the feeling of fear, stress, worry, nervous all mixed up together. Especially the 10 minutes before the presentation, it was absolute heart irritating. Public speaking is a common source of stress for everyone. Many of us would like to avoid this problem entirely, but this is hard to do. Whether we work alone or with large numbers of people, eventually we will need to speak in public to get certain tasks accomplished. And if we want to be leaders or achieve anything meaningful in our lives, we will often need to speak to groups, large and small, to be successful. The truth about public speaking, however, is IT DOES NOT HAVE TO BE STRESSFUL! If you correctly understand the hidden causes of public speaking stress, and if you keep just a few key principles in mind, speaking in public will soon become an invigorating and satisfying experience for you. Here’s My 9 Tips For Public Speaking : 1. Be organized and be prepared – When someone are giving a presentation about crap, you’ll know how much effort he put into the preparation of the presentation. This is the crucial step for a successful public speaking, organize and prepare all your material. For first timer you might want to write every single word out or you can highlight the important to helps remind you of the content. 2. Keep it simple – You do not want to create confusion in you presentation, so clarify everything by speaking straight to the point. 3.Practice your talk – Practice your speech in front of a full body size mirror. Take extra attention on your voice tone, body language and expression of your face. Make sure it is comfortable, natural and interesting. 4. Relax – Never, never, never get too nervous about public speaking. Try to think positive instead of worrying. Getting nervous may cause you to forget about your speech or making some mistakes on your presentation. 5. Arrive earlier – Make it early to the place where you are going to give the speech, clam down yourself, feel and get used to the atmosphere. . Never apologize for being nervous – This is the dumbest thing you can say in your presentation. The reason you are up there to give a speech is to have the audience listen to you, and to achieve that you must first gain their trust with your confidence. Saying that will only terminate all the attention because nobody wants to listen to newbie. 7. Be aware of your audiences – How do your audience respond to your presentation? Are they smiling when listening to you? Or maybe laughing? Or are they yawning?. You must be aware of this, if they are yawning or starting to lose the attention already, you might need a 5 minute break to awake them and then continue after that. 8. Answering Question – People might have some question about the topic of your presentation, ask questions at the end of your speech. Answer what is questioned, do not get off-topic. This is the time to gain more trust of your audience by showing your expertise.

Friday, January 10, 2020

Upper Lobectomy

Upper Lobectomy Krysten Miller Pennsylvania College of Technology ?IntroductionAn Upper Lobectomy is the removal of the superior lobe from a lung. This occurs when a neoplasm is confined to a specific area and hilar nodes are not involved. This procedure may be done to remove the spread of cancer, abnormal abscess, or infection within the lungs. The lungs are located below the clavicle and above the diaphragm. They consist of five lobes, both sets being separated by fissure. The right side has three lobes known as superior, middle, and inferior. While the left has superior and inferior. The left side only has two lobes because the anatomical position of the heart needs room to rest. Connected to the lungs are ancillary structures, such as, bronchus, pulmonary artery and vein, and lymphatic vessels. These structures enter at the hilum where the lungs are slightly concave. The surgical goal is to remove the neoplasm without harming other structures. Signs/Symptoms/Risks Generally, signs and symptoms may vary depending on the diagnosis. For example, signs and symptoms of TB are pain in chest, fatigue, fever/chills, or mucus and blood in saliva. Whereas signs and symptoms of cancer consist of a reoccurring respiratory infection, chest pain, weakness in the upper body, and trouble swallowing, change in bowel movement (American Cancer Society, 2018). In most cases signs and symptoms are very common and testing will need done for diagnosis. If these signs and symptoms are noticed a doctor should be consulted and a check-up be made. Diagnosis/Alternatives In addition, a neoplasm may be diagnosed through a Computerized Tomography (CT) or a Magnetic Resonance Image (MRI). During a CT scan small lesions may be identified, whereas, MRI may reveal a mass or nodule. If a spot occurs, a tissue biopsy may be done to identify what the mass or lesion may be. Another diagnosis is sputum cytology. During this assessment the sputum is looked under a microscope for cancer cells to be identified (Mayo Clinic, 2018). Once diagnosed alternative therapy may be assessed if surgery is too much to handle. These sources include radiation, chemotherapy, radiosurgery, and drug therapy. Overall, these alternatives use multiple drugs and or high—power of radiation to kill and reduce the neoplasm within the lungs. Alternative medication to help those with signs and symptoms involve acupuncture, hypnosis, massage, meditation, and yoga. These forms of medicine help relax the tissue and relieve pain within the area. When alternatives are not an option, and the aggression is too far surgery is the option. Surgery Set Up To begin, the set up contains a back table and mayo stand. The back table will consist of three sections: drapes, instruments, and sharps. Drapes will be towels and an adhesive back drape. Electrocautery and suction, as well as, other items that need access to the patient may be placed here as well. Instruments are then placed on the field. Two main trays will be placed along with a variety of other tools. A thoracotomy set will include useful instruments that aid in removal of a rib and exposure to repair the underneath organs. A general vascular set will also be available. This set includes additional cardiovascular instruments that may be useful if needed. In addition, various sizes of hemoclips are separate and kept for hold. Once instruments are placed, sharps and basins are then placed. In the top corner an emission basin and bowl are placed for fluids. Sponges in the form of kitners, laps, and 4Ãâ€"4 are placed on the field. A suture counter is then placed in the corner. This is filled with silk suture ties, polypropylene suture, and pledgets. A number 10, 11, and 15 knife blades are then loaded on a handle. Once the back table is complete with all needed instruments the mayo may be addressed. The common instruments include knife, tissue forceps, and metz and scissors to dissect to operative area. Hemostats, Kocher's and Allis's may be place to grab tissue and retract along with hemostasis. Multiple retractors and elevators may be used either sorted on the mayo or back table. Once the sterile field is prepped, the patient is retrieved and prepped. Patient Preparation Following set-up, the patient is brought into the room. They are transferred to the OR bed and position aids are placed. Antiembolitic hoses are placed on the legs to help with blood flow. Aesthesia may apply Swan-Ganz and CVP lines which allow direct contact to the heart (Goldman, 2008). Once general anesthesia is applied with endotracheal intubation, the patient is placed in lateral position with the surgical site up. During this time a catheter may be placed, as these procedures may be length if problems occur. Padded kidney rests or pillows are placed around the torso to stabilize. The unaffected arm is placed on an arm board while the other is rested above on a padded mayo. The lower leg is slightly bent with a pillow placed on top and the top leg laid flat, this is done to keep the patient from rotating. Pads are placed around the ankles and other bony areas for cushion. During this time, it is needed to be confirmed that blood has been ordered and available for this case. Prep/Draping Once the patient is positioned, prepping and draping of the surgical area may begin. When prepping cleansing for a posterolateral incision is made. Starting at the mid-thorax region, extending from the shoulder, to the iliac crest and down bilaterally. Within the prep the axilla region should be included as well. After the prep is dried, drapes may be placed. Folded towels are placed in a square around the incision site. Towel clips are placed at each inside corner to hold the towels together. An adhesive drape is then placed and unfolded across the patient to create the complete sterile field. Two suction tubes should be thrown up at this time along with any other cords that need to be thrown off. Surgery Following draping, a time out may occur and surgery begins. A posterolateral incision is made into the fourth intercostal space of the ribs with a #10 blade. Rib spreaders are placed to open the ribs and the pleura is cut. The anterosuperior portion of the hilar pleura is then incised and then separated making room to open the thorax. Once opened, the likelihood of the rib instruments being reused are slim and may be removed from the surgical field and onto back table (Frey & Ross, 2014). The upper and lower lobe fissure is opened, and dissection down to the pulmonary artery begins. During this time the surgical technologist should keep count of how much irrigation is used for the account of potential blood replacement. If sponges are to be weighed they must be fully saturated before throwing off. The second count may begin at this time. The pulmonary artery and vein branches are identified. Once identified they are separated. The surgical technologist should move quickly to access suture and assess double ligation of artery and vein. They are then divided. Blunt dissection is then used to free the upper lobe bronchus. It is either clamped with a bronchus clamp or a stapler. Sutures and stapler should be prepared prior to the step, bronchus is divided quickly. The clamp or stapler should be placed 2 cm form the main bronchial trunk (Frey & Ross, 2014). Entry to the bronchial tree changes wound class and results in contaminated instruments. At that time contaminated items shall be separated. The bronchus is then closed with a nonabsorbable suture or staples. Closely watching the surgeon and his assistance allows for anticipation at this time. A pleural flap is secured with sutures over the bronchial stump and the remaining lobes are checked for leakage of air. Leakages are checked by filling the thorax with body-temperature irrigation. The wound is irrigated and chest tubes of sort are placed in the thorax. The lines form the tubes must be hooked with a closed drainage unit and immediately turned on to prevent clotting. Final counts are made while tubes are placed. An injection of 0.25% Marcaine is made for postoperative pain control prior to closure. The fascia is closed with a 2-0 Vicryl and the skin is closed with staples. Dressing is a nonadherent contact layer, may vary depending on the doctor preference. The surgical technologist should not break scrub until the patient has left the operating room. Outcome Following surgery, the patient is then transported to the CCU. The endotracheal tube is still attached at this time to check for postop ventilation and proper breathing. The patient will stay in the hospital 7 to 10 days. If no complications they may leave and have a full recovery. Additional treatments may be essential such as chemotherapy and radiation. These treatments can help determine when normal activity can return. If complications occur hospitalization is longer. This may be a surgical site infection, hemorrhage, atelectasis, pneumothorax, embolus, edema, etc. During this time the patient will be monitored and possible emergency surgery may be done. If no complications occur during surgery this is a Class 1: clean procedure. Conclusion To conclude, an upper lobectomy is the surgical removal of a lobe caused by an abnormal growth or infection. It can be diagnosed through imaging or a tissue biopsy. Alternatives before surgery are a variety of drug therapy and active medicines. Once these are out of the question surgery is an option. The patient is then prepped and assessed for surgery. The lobe is removed and the patient is sent to recovery. They will then be hospitalized for 7 to 10 days and sent home if no other complications occur. ? ReferencesFrey, K. B., & Ross, T. (2014). Surgical technology for the surgical technologist: a positive care approach. Clifton Park, NY: Delmar Cengage Learning.Goldman, M. A. (2008). Pocket guide to the operating room. Philadelphia: F.A. Davis Co.Lung WebMD. (2018). Cancer Symptoms: What You Should Know. Retrieved April 22, 2018, from https://www.webmd.com/lung-cancer/understanding-lung-cancer-symptomsAmerican Cancer Society. (2018). Managing Cancer-related Side Effects. Retrieved April 25, 2018, from https://www.cancer.org/treatment/treatments-and-side-effects/physical-side- effects.html