Autism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D CNNs have shown improved accuracy in the classification of ASD compared to traditional machine learning algorithms, on all these datasets with higher accuracy of 99.45%, 98.66%, and 90% for Autistic Spectrum Disorder Screening in Data for Adults, Children, and Adolescents respectively as they are better suited for the analysis of time series data commonly used in the diagnosis of this disorder
The origin of this technique lies in the analysis of François Kenai (1694-1774), the leader of the School of Naturalists, presented in Tableau Economique. This method was developed by Karl Marx in his analysis of the Departmental Relationships and the nature of these relations in the models of " "He said. The current picture of this type of economic analysis is credited to the Russian economist Vasily Leontif. This analytical model is commonly used in developing economic plans in developing countries (p. 1, p. 86). There are several types of input and output models, such as static model, mobile model, regional models, and so on. However, this research will be confined to the open-ended model, which found areas in practical application.
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn the present work, a kinetic study was performed to the extraction of phosphate from Iraqi Akashat phosphate ore using organic acid. Leaching was studied using lactic acid for the separation of calcareous materials (mainly calcite). Reaction conditions were 2% by weight acid concentration and 5ml/gm of acid volume to ore weight ratio. Reaction time was taken in the range 2 to 30 minutes (step 2 minutes) to determine the reaction rate constant k based on the change in calcite concentration. To determine value of activation energy when reaction temperature is varied from 25 to 65 , another investigation was accomplished. Through the kinetic data, it was found that selective leaching was controlled by
... Show MoreThe object of this study is to establish a global model to use of DeNovo programming the strategies of multi-Decision making process in the city of Baghdad.
Thus, we have chosen an important and an effective subject in the life of the citizen due to the importance of this subject in the Iraqi citizen of luck of water and for many reasons.
In this thesis, we have tackled the establishment of a global model to be able to reach solution or an alternative model a money the available alternative.
The alternative proposed here utilizes the application of the (DeNovo) programming approach suggested by (1982) in solving t
... Show MoreStriae distensae SD or stretch mark are frequent skin lesion that cause considerable aesthetic concern. The 1064nm long pulsed Nd:YAG Laser has been used to promote an increase in dermal collagen and is known to be a Laser that has a high affinity to vascular chromphores. Also by using fractional CO2 Laser 10600nm as an effective modality in treatment of striae distensae SD. It works to stimulate fibroblast and enhance Collagen formation, which is important for newly generated skin tissue.
Objectives: This study aims to verify the efficacy of long pulsed Nd: YAG Laser (1064nm) in the treatment of immature striae distensae (SD) and the efficacy of C02 fractional Laser (10600nm) in treatment o
... Show MoreThis paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc
... Show MoreIntroduction: Cutaneous leishmaniasis is considered a parasitic contagion resulting from the flagellated parasite belonging to the genus of Leishmania. Also, cutaneous leishmaniasis is a zoonotic ailment transmitted through the bloodsucking sand-flies bite (belonging to the Phlebotomus genus). The disease's reservoirs included wild or semi-domesticated animals, in general rodents and dogs. Tissue inhibitor metalloproteinase-1 (TIMP-1) is one of the extracellular matrix proteins that have a role in vessel wall degeneration and aneurysm development. In addition, it belongs to the zinc-dependent endopeptidases family that are involved in the degradation of connective tissues proteins which are included in vascular integrity maintenance. The Ge
... Show MoreThe synthesis and properties of two new series of compounds having 1,3-Oxazepineand 1,3-thiazole rings connected through azo linkage are reported. These compounds weresynthesized by the reaction of phthalic anhydride with Schiff bases. The molecular structuresof these compounds were verified by elemental analysis, FTIR and 1HNMR spectroscopy.The mesomorphic behaviors of these compounds were studied by optical polarizedmicroscopy (OPM) and differential scanning calorimetry (DSC). All compounds of the twoseries show liquid crystalline properties. The influence of the central oxazepine and thiazolerings and the terminal substituents on the type and temperature range of the mesomorphousproperties of these compounds has been elucidated