Objective(s): To assess the behavior that impedes the eating of children with autism spectrum disorders in Baghdad city, and find out the relationships between the behaviors that impede eating of autistic children and their demographic characteristics.
Methodology: The study started from the period of 16th September 2019 to the 16th of March 2020. A non-probability (purposive) sample of 80 children with autism spectrum disorders was selected. The questionnaire was designed and composed of two parts: the first part includes the autistic children demographic data, the second part includes scales of behavior that impede eating followed by parents towards autistic child. The reliability of the questionnaire was determined through a pilot study and the validity through a panel of (14) experts. The data were collected by questionnaire. The data were described statistically and analyzed through the use of descriptive and inferential statistical analysis procedures.
Results: The results of the present study indicated that feeding behaviors of autistic children were affected at moderate level, with respect to the relation of autistic children socio-demographic data with their feeding behaviors levels, no significant association was determined.
Recommendations: The study recommended that those children need for special rehabilitative and behavioral programs dealing with their behavioral problems, and to improve their feeding behaviors.
After the defeat of the military terrorist organization "ISIS" and the fall of the throne of its alleged state in the Iraqi city of Nineveh, in Syrian Baghouz, and the end of its control over the land, the Syrian camps, especially "Al-Hol" camp, emerge as an incubator for the ideology of the terrorist organization "ISIS" and a vital base for its consolidation and dissemination, which includes (68,000- 73,000) people. During the years following the military defeat of (ISIS), the camp witnesses the spread of extremist ideas widely at the hands of its residents, including the families of the organizations dead's, extremist detainees, and those who deal with it, taking advantage of the deterioration of the environmental, se
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreThe evacuated tube solar collector ETC is studied intensively and extensively by experimental and
theoretical works, in order to investigate its performance and enhancement of heat transfer, for Baghdad climate
from April 2011 till the end of March 2012. Experimental work is carried out on a well instrumented collector
consists of 16 evacuated tubes of aspect ratio 38.6 and thermally insulated tank of volume 112L. The relation
between convective heat transfer and natural circulation inside the tube is estimated, collector efficiency, effect of
tube tilt angles, incidence angle modifier, The solar heating system is investigated under different loads pattern (i.e
closed and open flow) to evaluate the heat loss coefficient
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreCement-based adhesive (CBA) is used as a bonding agent in Carbon Fibre Reinforced Polymer (CFRP) applications as an alternative to epoxy-based adhesive due to the drawbacks of the epoxy system under severe service conditions which negatively affect the bond between the CFRP and strengthened elements. This paper reports the results of, an investigation carried out to develop two types of CBA using magnetized water (MW) for mixing and curing. Two magnetic devices (MD-I and MD-II), with different magnetic field strengths (9000 and 6000 Gauss) respectively, were employed for water magnetization. Different water flows with different water circulation times in the magnetizer were used for each device. Compressive and splitting tensile strength te
... Show More