Background: Feeding is a complicated process that involves the coordination of cardiovascular, respiratory, gastrointestinal (GI), and oropharyngeal mechanisms, with support from the musculoskeletal and craniofacial systems. The practice of feeding could be correlated with eruption stage and nutritional status in infants. Aim of the study: This study aimed to assess the relation of feeding patterns to a selected oral variable (stage of the eruption of primary teeth) and growth parameters among clinically healthy infants. Subjects and Methods: A cross-sectional comparative study on a sample of (300) infants aged between 6 and 18 months was performed in Karbala City, Iraq. The feeding pattern was investigated using an information sheet answered by parents. The stage of dental emergence was evaluated through intraoral examination. Growth parameters (height, weight, head circumference) were analyzed. Results: Bottle-fed infants had higher total tooth eruption incidence and nutritional status than the other feeding groups, but the difference was not statistically significant. Conclusion: Bottle-fed infants had the highest mean of erupted primary teeth and nutritional status.
The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe purpose of this study is to evaluate the hydraulic performance and efficiency of using direction diverting blocks, DDBs, fixed on the surface on an Ogee spillway in reducing the acceleration and dissipating the energy of the incoming supercritical flow. Fifteen types of DDB models were made from wood with a triangulate shape and different sizes were used. Investigation tests on pressure distribution at the DDBs boundaries were curried out to insure there is no negative pressures is developed that cause cavitation. In these tests, thirty six test runs were accomplished by using six types of blocks with the same size but differ in apex angle. Results of these test showed no negative pressures developed at the boundarie
... Show MoreThis study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational citizenship behavior ).
The questionnair’e has been used as a basic instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris
... Show MoreVascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show MoreDue to the fact that living organisms do not exist individually, but rather exist in clusters interacting with each other, which helps to spread epidemics among them. Therefore, the study of the prey-predator system in the presence of an infectious disease is an important topic because the disease affects the system's dynamics and its existence. The presence of the hunting cooperation characteristic and the induced fear in the prey community impairs the growth rate of the prey and therefore affects the presence of the predator as well. Therefore, this research is interested in studying an eco-epidemiological system that includes the above factors. Therefore, an eco-epidemiological prey-predator model incorporating predation fear and
... Show MoreThe research aims to identify the rates of hair loss during pregnancy and lactation and its relation to the rates get some elements motivator urged through the results of the continued failure to meet the need of daily assessments of these elements, which led to the continuation of Hair Loss
The use of heavy ions in the treatment of cancer tumors allows for accurate radiation of the tumor with minimal collateral damage that may affect the healthy tissue surrounding the infected tissue. For this purpose, the stopping power and the range to which these particles achieved of Nitrogen (N) in the skin tissue were calculated by programs SRIM (The Stopping and Range of Ions in Matter),(SRIM Dictionary) [1],(CaSP)(Convolution approximation for Swift Particles )[2]which are famous programs to calculate stopping power of material and Bethe formula , in the energy range (1 - 1000) MeV .Then the semi - empirical formulas to calculate the stopping power and range of Nitrogen io
... Show MoreElectronic banking services appeared as a result of laying the foundations for the application of electronic automation in the banking field, and despite the clear expansion in its adoption and implementation as an inevitable necessity imposed by international and national developments, its application was not ideal according to the level that was expected to occur after the abandonment of traditional banking services, which produced some risks Which is evident in the absence of a legal system, whether at the level of proving and authoritative electronic banking services such as electronic signature, Or at the level of protecting the confidentiality of these services and ensuring that they are not exp
... Show MoreThe aim of this research is to analyze the content of the science textbook for 7th grade Iraqi schools in the light of the educational concepts of sustainable development, the science textbook (1st edition), for the academic year 2017-2018. To this end, the researchers prepared list of issues in the light of the educational concepts of sustainable development, consisted of (13) issues, branched to (51) subissues, presented to a group of arbitrators and specialists in science curriculum and methods of teaching. The researchers analyzed the content of the 7th grade science textbook, in the light of the list that is built, the idea has been adopted as a unit of analysis. One of the most important findings is attention to neglected sub-issues o
... Show More