Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D
... Show MoreWhenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas
... Show MoreAccompanied Activity Economic Unity some negative effects in the environment of air, water and soil pollution of difficult to measure each other for being the external costs and to be avoided such expenditures should be measured or estimated value to be disclosed environmental costs at the heart of the financial statements of economic unity to inform managers and users of the financial statements on the implications costs environmental .and impact in reducing environmental costs and increase future income and economic unit, was based on research into the inductive approach through books, letters, journals and the internet to cover the theoretical framework of the research. And to the analyt
... Show MoreThe impact of exposure to different sizes of particulate matter (PM1, PM2.5, PM7, and PM10) was evaluated in Babylon concrete plant workers who had been exposed to concrete dust for at least 10 years. The effects of these particles on the hematological parameters, malondialdehyde (MDA) levels, and antioxidant enzymes (catalase and glutathione peroxidase ) were examined. The results exhibited that the levels of PM2.5 and PM10 were higher than the acceptable limits approved by the National Ambient Air Quality Standards (NAAQS). The blood parameters, namely white blood cells (WBC), red blood cell (RBC) and platelets counts, demonstrated non-significant differences between workers exposed to the PM as compared to the control gro
... Show MoreThis study is conducted in order to, investigate the trophic state of Duhok Lake Dam located within Duhok city, Iraq. Water samples are collected seasonally from three monitored sites during 2011. The parameters used for assessing water quality and trophic status level include: water temperature, pH, EC, TDS, DO, BOD5, nutrients, Secchi disk transparency, and chlorophyll a. The results reveal that DO is above 5 mg.l-1 in all sites, BOD5 value is within permissible level for domestic uses. Water quality considered as a hard type. High sulfate concentration is recorded during the study period. Trophic state shows that water type is classified as mesotrophic during autumn season, while it is regarded as eutrophic in other seasons. TDN/TDP rati
... Show MoreWith the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreArtificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose
... Show More