Preferred Language
Articles
/
jkmc-119
Behavior Management of Children with Autism
...Show More Authors

Background: Pervasive Developmental Disorder (PDD) is a term refers to the overarching group of conditions to which autism spectrum disorder (ASD) belongs .

Objective: This study was designed to determine the existing behavior of children with autism in dental sitting, the behavior improvements in recall dental visits and evaluate the improvement in oral hygiene with using specific visual pedagogy chart.

Type of the study: Cross-sectional study.

Methods: Forty children of both genders, ages ranged from 4 – 6 years having primary teeth only were selected whose medical history included a diagnosis of autism. The behavior of the children in dental sitting were assessed according to the Frankel scale. The dmft index in the first visit was measured, with codes and criteria established by the WHO(1997).Behavior management method used was one or more of the followings: (physical restraint, "Tell-Show-Feel and Do" technique, verbal and non – verbal communication, reinforcement, parent present / absent).

Results: The samples represent by 22 males and 18 females autistic children with no statically significant difference (p> 0.05).The dmft index of autistic children in the first visit. The dmft (mean ± SD) for males was (7.818 ± 0.98) while for females was (6.922 ± 1.09).The frequency of children showed treatment acceptance without difficulty was increase in the recall visits.

Conclusions: The dental professional should be flexible to modify the treatment approach according to the individual patient needs.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Oilfield Produced Water Management: Treatment, Reuse and Disposal
...Show More Authors

Produced water is accompanied with the production of oil and gas especially at the fields producing by water drive or water injection. The quantity of these waters is expected to be more complicated problem with an increasing in water cut which is expected to be 3-8 barrels water/produced barrel oil.Produced water may contain many constituents based on what is present in the subsurface at a particular location. Produced water contains dissolved solids and hydrocarbons (dissolved and suspended) and oxygen depletion. The most common dissolved solid is salt with concentrations range between a few parts per thousand to hundreds parts per thousand. In addition to salt, many produced waters also contain high levels of heavy metals like zinc, bari

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Bulletin Of Electrical Engineering And Informatics
Traffic management inside software-defined data centre networking
...Show More Authors

In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur

... Show More
View Publication
Scopus (16)
Crossref (13)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Professional Safety
How Technology Can Improve OSH Management in Construction
...Show More Authors

Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Global virtual teams management system: project manager guide
...Show More Authors

Global virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Safety management in private construction project in Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 05 2021
Journal Name
Solid State Technology
Genetic Algorithms in Construction Project Management: A Review
...Show More Authors

Genetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Modern Sport
Leadership theories in management and psychologist educational filed
...Show More Authors

All domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work

View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Application Artificial Forecasting Techniques in Cost Management (review)
...Show More Authors

For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s

... Show More
View Publication Preview PDF