Background: Day case surgery has become widely accepted as a safe alternative to the inpatient care in up to 70% of the cases at a children’s hospital. It has the advantage of minimizing the psychological trauma of hospitalization, decreasing nosocomial infection, less costly and frees up hospital beds.Objectives: To assess the advantages and disadvantages of this type of surgery.Methods: this is a prospective study, in which two hundred thirty childhood tonsillectomies were performed as a day-case in the department of otolaryngology at Al Shaheed Gazi hospital, Medical City Complex during the period from October 2009 to September 2010. The patients age range from 3-12 years (Mean 7.2 years).Results: 46.08% males and 53.91% females were included. A total of two hundred twenty three patients were discharged home six hours after the operation. It's found that the incidence of reactionary hemorrhage was 0.8% and the cases presented within 5 hours after leaving the theater. In 99.2% of cases, there was no evidence of serious reactionary hemorrhage.Conclusions: day case tonsillectomy in children is likely to be safe if the patients are discharged after 6 hours period of postoperative observation in day-case unit.
Systemic lupus erythematosus (SLE) is an autoimmune disease, in which the etiology is not well-understood; however, interactions between environmental and genetic factors in predisposed individuals have been recognized. As a consequence, immunological alternations occur and immune cells are involved, especially T and B lymphocytes that are activated to produce different immune components. Among these components are autoantibodies that react with self-antigens aside from non-self-antigens due to the proposed theory of molecular mimicry. Accordingly, the current study was designed to examine the profile of different autoantibodies in SLE patients by using the indirect membrane based enzyme immunoassay
The cost management of cost indicators in housing projects, on the level of planning and design, is the most important quality indicators, for adoption of strategies of planning and design efficient in managing these indicators. So this research points out the need to highlight the most effective and influential cost indicators in housing projects, and to determine strategies in the management of these indicators in order to raise the efficiency of housing projects quality, to seemly the income level target group, taking into consideration the quality of housing standards, to achieve the basic requirements of housing. This paper highlights the importance of the cost management, the types of housing cost, the method
... Show MoreAcute toxicity is a step to evaluate the toxicity of a substance. Rutin is one of the flavonoid compounds with a variety of pharmacological effects. The aim of the study is to calculate the lethal dose that affect fifty percent of the mice used in the experiment (LD50). Thirty Swiss albino male and 30 non-pregnant female mice have been divided equally and randomly into 5 treated groups and one control group (n=5) Rutin has been administered with concentrations 5, 2.5.1.25,0.625 and 0.312 g/kg administered as a single dose intraperitoneally (IP) while the control group received 1% DMSO (IP). Animals were observed for any morbidity and mortality for 14 days. After 14 days the animal blood collected for biochemical and hem
... Show MoreExisting literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors
This work, introduces some concepts in bitopological spaces, which are nm-j-ω-converges to a subset, nm-j-ω-directed toward a set, nm-j-ω-closed mappings, nm-j-ω-rigid set, and nm-j-ω-continuous mappings. The mainline idea in this paper is nm-j-ω-perfect mappings in bitopological spaces such that n = 1,2 and m =1,2 n ≠ m. Characterizations concerning these concepts and several theorems are studied, where j = q , δ, a , pre, b, b.
The work is devoted to the study of the plastics features in modern construction use. The plastics classification in modern construction is generalized. This classification includes: the field of building products application, the features of the materials properties and products, a backup group that includes those products that are not included in the previous groups. The classification considered is the basis for choosing the basic materials properties that affect the quality and durability of products. To improve the plastics types in the construction, the Venn diagram is used. The main materials types for manufacturing a product of the "window profile" type are analyzed; the result of the studies is a comparative diagram.
JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show More