Back ground : Fever is a common medical problem in
children. parents have been shown unrealistic fears of
harmful effects of fever in their children. Resulting in
inappropriate management of fever in their children.
Objective: the objective of this study was to survey
parents about their knowledge andattitude concerning fever
in their children.
Methods : The study involved random selection of
parents who brought their febrile children to emergency
department or out-patient clinics of five teaching and non
teaching hospitals in Baghdad from first of October to end
of December 2002.
Parents of 400 febrile children were interviewed using a
standard questionnaire to obtain sociodemographic
information and current knowledge of fever.
Results: Approximately 69% of the respondents were
female, 68% their age was in the range of 21-35 years.
Seventy seven percent of parents had two or more children.
More than 70% of parents demonstrated a poor
understanding of definition of fever , maximum
temperature of untreated fever and threshold temperature
requiring antipyretics . Twenty sevev percent of parents
considered temperature less than 38.0 c
o
to be fever,
another 27% did not know, the definition of fever, 61% felt
that temperature of less than 40,0 c
o
could be dangerous to
a child, and 27% could not define high fever. Another 28%
believed that if left untreated, temperature could rise to
42.0 c
o
or higher, but 39% could not provide an answer,
and about 60% did not know the minimum temperature for
administering antipyretics. And 60% did not know the
minimum temperature for bathing , or sponging.
Approximately 93% of parents demonstrated fear of
consequent body damage from fever , including convulsion
,brain damage ,coma, blindness and even death.
Conclusion: parental misconception about fever reflects
the lack of active health education. Health professionals
have apparently not done enough to educate parents on this
common medical problem and it,
s consequences
The topological indices of the "[(µ3-2, 5-dioxyocyclohexylidene)-bis ((2-hydrido)-nonacarbonyltriruthenium]” were studied within the quantum theory of atoms in the molecule (QTAIM), clusters are
analyzed using the density functional theory (DFT). The estimated topological variables accord with prior
descriptions of comparable transition metal complexes. The Quantum Theory of Atom, in molecules
investigation of the bridging core component, Ru3H2, revealed critical binding points (chemical bonding)
between Ru (1) and Ru (2) and Ru (3). Consequently, delocalization index for this non-bonding interaction
was calculated in the core of Ru3H2, the interaction is of the (5centre–5electron) class.
A simple, rapid, accurate and sensitive spectrophotometric method has been developed for the determing carbamate pesticides in both pure and water samples. The method is appropriate for the determination of carbofuran in the presence of other ingredients that are usually available in dosage forms. The effect of organic solvents on the spectrophotometric properties of the azo dye and the structure of the resulting product have also been worked out and it is found to be 1:1 benzidine :carbofuran. The method can be successfully applied to determination of carbofuran in water samples. The method is based on diazotization of Benzidine (4, 4 – diamino biphenyl) with sodium nitrite and hydrochloric acid followed by coupling with carbofuran
... Show MoreEsculin (ESCN) is used in the pharmaceutical industry with intravenous effect, stimulant and anti-inflammatory capillaries, like vitamin P. It is a significant component of many anti-inflammatory remedies such as esqusan, esflazid and anavenol [14]. It is also found in numerous other remedies available in the market such as proctosone, anustat, and ariproct.
To determine experimental conditions, to elucidate retention behavior of esculin in HILIC mode. Moreover, to suggest new ways to separate and determinate esculin in ointments.
Two hydrophilic c
The qualified subjects for this study included 33 patients with benign and malignant oral tumors aged 15-75 years and 31 matched age and gender healthy subjects used as control. Proteins measurements included total protein, albumin, globulines in sera and saliva samples, and immunoglobulins (IgG, IgM, IgA) in sera samples of control and patients. Meanwhile, polyacrylamide gel electrophoresis (PAGE) was used to differentiate between protein patterns in both serum and saliva samples among the studied groups. The gel was also stained for glycoprotein to evaluate as well the changes in glycoprotein contents. For total protein, the results revealed a signifigant increase (P?0.01) in both samples (serum and saliva) of patient group. Albumin conce
... Show MoreTenofovir disoproxil fumarate, a nucleotide reverse transcriptase inhibitor utilized for the treatment of hepatitis B virus and human immunodeficiency virus infections; and is now one of the most widely used antiretroviral drug. However, tenofovir disoproxil fumarate can induce nephrotoxicity, which may be attributed to the interaction between such drug and the organic anion transporters (hOAT1, and OAT3) with consequent changes in levels of some parameters that may have a role in nephrotoxicity. Thiazide diuretics have high to intermediate potency of inhibition of OAT1s and OAT3; thus, it may possess nephroprotective effects. This study was designed to investigate whether hydrochlorthiazide has nephroprotective effects on tenofovir diso
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show More