The child realize that the meals time provide golden opportunities to get the attention the child needs. However, many difficulties that may appear about eating food can be avoided, if the family used the right way in dealing with this problem. The study aims, in this case, at searching for the reasons that lies behind the child's obstinacy in eating his food and the attempt to study some variables that is related to the research topic.
The results are summed up as follows:
- The number of the sample children is 3 of both sexes between the ages of 3 to 6 years
Not necessarily to be malnutrition is a result of poverty and lack of food, it may be the outcome of the wrong food practices; and the lack of knowledge in nutrition basis and chronic diseases. Some studies have confirmed that the more the knowledge in nutrition basis increased, the more the child has well-balanced food.
Unhealthy eating habits spread among children at an early age, which is one of the negative factors affecting the nutritional status they have causing various disorders as a result of lack or increase of food or lack of balance. The signs and symptoms of these disorders can be simple or can lead to deadly diseases.
Training children on proper eating habits in different fields of life is considered the mos
... Show MoreKE Sharquie, AA Noaimi, MN Almallah, Journal of Cosmetics, Dermatological Sciences and Applications, 2014 - Cited by 2
T-cell activation and alteration of cytokine levels are involved in the pathogenesis of asthma. However, the profile of circulating T-lymphocyte subsets and related cytokines during asthmatic attacks is still unclear. We compared the serum concentrations of proinflammatory cytokines Interleukine-18( IL-18) and Interleukine-12(IL-12), T-helper 2 (Th2) cytokine Interleukine-13(IL-13 ) and Immunoglobuline-E ( IgE) in 27 asthmatic children and 21 sex and age matched healthy control subjects. Serum cytokines and IgE concentrations were measured by enzyme-linked immunosorbent assay. Serum IL-13 , IL-18 and IgE concentrations were significantly higher in asthmatic patients than normal control subjects ( IL-13: median 9.73 versus 4.43 pg/ml, P&l
... Show MoreThis study aimed to find relationship between thymidine kinase-1 (TK-1) as tumor marker and total antioxidant capacity (TAC) in Iraqi children patients with thrombocytopenia and with thrombocytosis. The present study conducted 60 children patients (30 patients with idiopathic thrombocytopenia purpura (ITP) and 30 patients with thrombocytosis caused by leukemia) attending the Children Fever Hospital in the Medical City / Baghdad, and 30 healthy children as a control group. All study groups were with range ages (1-15) years, and they were diagnosed by assay of platelet count, Prothrombin Time (PT), and partial Thromboplastin Time (PTT). The results shown elevation in plasma TK-1 and TAC values in children patients with thrombocytopenia and w
... Show MoreMicrosporum canis is considered one of the filamentous fungi that cause surface fungal contagion in the humans and animals. The present study aimed to diagnose M. canis via the molecular method and differentiating its local Iraqi isolates from global isolates. Microscopic examination showed 55 specimens with M. canis from 130 specimens collected from children aged between 4-10 years suspected of dermatophytes who attended Medical City Laboratories and Baghdad Hospital in Baghdad city from 1/12/2022 to 1/3/2023. The results showed that the frequency of M. canis infections was 55/130 (42.31%). The results demonstrated significant differences in the animals' contact (p <0.0001), lesions (0.03) and habitation area (p =0.002). Whilst
... Show MoreThe aims of the present study are to evaluate the levels of CA19-9 in sera and tissues' homogenate of breast and thyroid benign patients in order to assess its use as an early diagnostic parameter in differentiation between malignant and benign cases. The study was conducted on 8 patients with breast benign tumor and 8 patients with thyroid benign tumor, by the enzyme linked immunosorbent assay (ELISA) technique. The results of CA19-9 levels in sera were (15 ±1.58 and 10.67 ±2.08)U/ml respectively compared with serum CA19-9 levels of control group which was 7.74 ±4.92 U/ml, the results were found to be highly significantly in breast tumor patients and non significantly in thyroid
... Show MoreBackground: Chronic periodontitis defined as “an infectious inflammatory disease within supporting tissues of the teeth, progressive attachment loss and bone loss". Aggressive periodontitis is rare which in most cases manifest themselves clinically during youth. It characterized by rapid rate of disease progression .Pro-inflammatory chemokines organized inflammatory responses. Granulocyte chemotactic protein 2 is involved in neutrophil gathering and movement. The purpose of the study is to detect serum of Granulocyte Chemotactic Protein 2 and correlate to periodontal condition in patients with chronic periodontitis, Aggressive periodontitis and Healthy Control subjects and measurement the count of neutrophils for the studied groups. S
... Show MoreThe diagnosis of acute appendicitis (AA) sometimes is illusive and the accompanying clinical and laboratory manifestations cannot be used for definitive diagnosis. Objective: This study aimed to evaluate the diagnostic value of neutrophil/lymphocyte ratio (NLR) in detection of AA. Materials and Methods: This is a cross-sectional study that included a total of 80 adult patients with AA and 62 age- and gender-matched patients with abdominal pain due to causes other than AA. Three milliliter of peripheral blood were collected from each participant. The NLR was calculated by dividing the absolute neutrophil count by the absolute lymphocyte count. Receiver operating characteristic curve was used to assess the diagnostic value of NLR in detection
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the