Objective(s): To assess the behavior that impedes the eating of children with autism spectrum disorders in Baghdad city, and find out the relationships between the behaviors that impede eating of autistic children and their demographic characteristics.
Methodology: The study started from the period of 16th September 2019 to the 16th of March 2020. A non-probability (purposive) sample of 80 children with autism spectrum disorders was selected. The questionnaire was designed and composed of two parts: the first part includes the autistic children demographic data, the second part includes scales of behavior that impede eating followed by parents towards autistic child. The reliability of the questionnaire was determined through a pilot study and the validity through a panel of (14) experts. The data were collected by questionnaire. The data were described statistically and analyzed through the use of descriptive and inferential statistical analysis procedures.
Results: The results of the present study indicated that feeding behaviors of autistic children were affected at moderate level, with respect to the relation of autistic children socio-demographic data with their feeding behaviors levels, no significant association was determined.
Recommendations: The study recommended that those children need for special rehabilitative and behavioral programs dealing with their behavioral problems, and to improve their feeding behaviors.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreFor many years it was argued that there may be a gender differences in adverse drug reactions (ADRs). This assumption was based on many possible factors such as hormonal or behavior differences, and it was not clearly identified since the female gender was not preferred to be enrolled in many clinical trials. The primary aim of this study was to assess the extent of possibly relevant gender differences in drug–ADRs regarding causality, severity, preventability, seriousness, expectedness and outcome. While the secondary aim was to assess for which group of drugs and for which ADRs gender differences are identified most often. The study was a retrospective one that depends on processing a specially selected group of data obtained from th
... Show MoreThis research deals with the qualitative and quantitative interpretation of Bouguer gravity anomaly data for a region located to the SW of Qa’im City within Anbar province by using 2D- mapping methods. The gravity residual field obtained graphically by subtracting the Regional Gravity values from the values of the total Bouguer anomaly. The residual gravity field processed in order to reduce noise by applying the gradient operator and 1st directional derivatives filtering. This was helpful in assigning the locations of sudden variation in Gravity values. Such variations may be produced by subsurface faults, fractures, cavities or subsurface facies lateral variations limits. A major fault was predicted to extend with the direction NE-
... Show MoreHumor is an interesting phenomenon that has been studied widely, yet it is considered a universal trait that cannot be an old subject for a study. This study is conducted to investigate humor from a universal pragmatic lens in a stand-up comedy show, namely, You Wanna Hear Something Crazy?. It aims to study humor as a coin with two sides, the production side and the understanding side. To achieve the aim of the study, the researchers use an eclectic contains Grice’s CP model (1975) and Habermas’s UP model (1979, 1984, 1987, 1998). The study has noted that while using the observance and the non-observance of the cooperative maxims to produce humor, the universal validity claims of truth, sincerity, and normative rightness for rea
... Show MoreCuring of concrete is the maintenance of a satisfactory moisture content and temperature for a
period of time immediately following placing so the desired properties are developed. Accelerated
curing is advantages where early strength gain in concrete is important. The expose of concrete
specimens to the accelerated curing conditions which permit the specimens to develop a significant
portion of their ultimate strength within a period of time (1-2 days), depends on the method of the
curing cycle.Three accelerated curing test methods are adopted in this study. These are warm water,
autogenous and proposed test methods. The results of this study has shown good correlation
between the accelerated strength especially for
An expression for the transition charge density is investigated where the deformation in nuclear collective modes is taken into consideration besides the shell model transition density. The inelastic longitudinal form factors C2 calculated using this transition charge density with excitation of the levels for Cr54,52,50 nuclei. In this work, the core polarization transition density is evaluated by adopting the shape of Tassie model together with the derived form of the ground state two-body charge density distributions (2BCDD's). It is noticed that the core polarization effects which represent the collective modes are essential in obtaining a remarkable agreement between the calculated inelastic longitudinal F(q)'s and those of experimen
... Show MoreIn this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show More